KAIST - COMPUTER SCIENCE

  • korea
  • search
  • login

Directions

 
  • 2010

  • A Social Transitivity Based Data Dissemination Scheme for Opportunistic Networks

    Ku, J, Ko, Y, An, J, Dongman Lee
    IEEE WoWMoM 2010
    2010

    []

  • A Software Cost Estimation Model Development in the Korean Defense Domain

    Taeyong Kwon, Jongmoon BAIK, TAE HO LEE, 최돈오, 전수명
    International Conference on Managenment Science and Engineering (MSE2010)
    2010

    []

  • A Survey on RFID Security and Provably Secure RFID Grouping-proof Protocols

    Duc, Dang Nguyen, Konidala, Divyan M., Hyun Rok Lee, Kwangjo Kim
    International Journal of Internet Technology and Secured Transactions
    2010

  • A Verification Method for Web Service Composition based on Discrete Event System Modeling & Simulation

    SeongYong Lim, Jongmoon BAIK, Ho-Jin Choi, Danhyung LEE
    2010 Spring Simulation Multiconference (SpringSim 2010)
    2010

    [] []

  • A Wikipedia Matching Approach to Contextual Advertising

    Alexander Nikolaevich Pak, Chin-Wan Chung
    WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS
    2010

    [] []

  • A Wrist-Type Fall Detector with Statistical Classifier for the Elderly Care

    박찬규, Ho-Jin Choi
    Joint Conferences: ICONI 2010 & APIC-IST 2010
    2010

    [] []

  • A binary string approach for updates in dynamic ordered XML data

    고혜경, Lee, SangKeun
    IEEE Transactions on Knowledge and Data Engineering
    2010

    []

  • A historically-based task composition mechanism to support spontaneous interactions among users in urban computing environments

    Jimenez-Molina, Angel, In-Young Ko
    14th International Conference on Knowledge-Based and Intelligent Information and Engineering Systems, KES 2010
    2010

    []

  • A local decision test for sparse polynomials

    Grigorescu, E, Jung, Kyomin, Rubinfeld, R
    INFORMATION PROCESSING LETTERS
    2010

    [] []

  • A pattern-based outlier detection method identifying abnormal attributes in software project data

    Kyung-A Yoon, Doo-Hwan Bae
    INFORMATION AND SOFTWARE TECHNOLOGY
    2010

    [] []

  • A privacy-preserving kid's safety care service based on sensor network in u-City

    Jang Seong Kim, Myung-han Yoo, Kwangjo Kim
    Symposium on Cryptography and Information Security 2010 (SCIS 2010)
    2010

    []

  • A scalable and efficient path management scheme for internet-based sensor data delivery infrastructure

    Cho, Kyungmin, Ju, Younghyun, Jo, Sungjae, Rhee, Yunseok, Junehwa Song
    34th Annual IEEE International Computer Software and Applications Conference, COMPSAC 2010
    2010

    []

  • A scheme for systematically selecting an enterprise architecture framework

    Odongo, Agnes Owuato, Sungwon Kang, In-Young Ko
    9th IEEE/ACIS International Conference on Computer and Information Science, ICIS 2010
    2010

    []

  • A survey of urban vehicular sensing platforms

    Lee Uichin, Gerla, Mario
    COMPUTER NETWORKS
    2010

    []

  • A task-oriented approach to support spontaneous interactions among users in urban computing environments

    Jimenez-Molina, Angel, Kang, Byung-Seok, Kim, Jun-Sung, In-Young Ko
    2010 8th IEEE International Conference on Pervasive Computing and Communications Workshops, PERCOM Workshops 2010
    2010

    []

  • A transport protocol for multimedia transmission in overlay networks

    Kang, Byung-Seok, Shin, Kwangcheol, In-Young Ko, Kim, Pyoung-Yun
    24th IEEE International Conference on Advanced Information Networking and Applications, AINA2010
    2010

    []

  • A ubiquitous smart parenting and customized education service robot

    Lee, Ho-Joon, Jong C. Park
    2010 IEEE Workshop on Advanced Robotics and Its Social Impacts, ARSO 2010
    2010

    []

  • A usability-pattern-based requirements-analysis method to bridge the gap between user tasks and application features

    Lee, Sang-Hyun, In-Young Ko, Sungwon Kang, Danhyung LEE
    34th Annual IEEE International Computer Software and Applications Conference, COMPSAC 2010
    2010

    []

  • A visual shape descriptor using sectors and shape context of contour lines

    Peng, Shao-Hu, Kim, Deok-Hwan, Lee, Seok-Lyong, Chin-Wan Chung
    INFORMATION SCIENCES
    2010

    [] []

  • AODV-RIP: improved security in mobile ad hoc networks through route investigation procedure

    Byung-Seok Kang, Kim, Han-Shik, In-Young Ko
    CONCURRENCY AND COMPUTATION-PRACTICE EXPERIENCE
    2010

    [] []