KAIST - COMPUTER SCIENCE

  • korea
  • search
  • login

Directions

 
  • 2007

  • BlueTorrent: Cooperative content sharing for Bluetooth users

    Jung, Sewook, Lee Uichin, Chang, Alexander, Cho, Dae-Ki, Gerla, Mario
    Pervasive and Mobile Computing
    2007

  • Boosted manifold principal angles for image set-based recognition

    Kim Tae Kyun, Arandjelovic, Ognjen, Cipolla, Roberto
    PATTERN RECOGNITION
    2007

  • CISS: An efficient object clustering framework for DHT-based peer-to-peer applications

    Lee, Jinwon, Lee, Hyonik, Kang, Seungwoo, Kim, Su Myeon, Junehwa Song
    COMPUTER NETWORKS
    2007

  • Challanges for web annotation systems on mobile web

    Ibrahim Ahmad, Ho-Jin Choi
    The Second International Conference on Mobile Computing, Communications and Applications (ICMOCCA 2007)
    2007

    []

  • Component composition model providing dynamic, flexible, and hierarchical composition of components for supporting software evolution

    Kim, IG, Doo-Hwan Bae, Hong, JE
    JOURNAL OF SYSTEMS AND SOFTWARE
    2007

    []

  • Converting Relational Databases into OWL Ontology by Multi-way Semantic Extraction

    SoHee Jang, InSuk Park, HoYun Cho, Soon J. Hyun
    9th International conference on Enterprise Information Systems
    2007

    []

  • Cost Analysis of BestRelay Retransmission Trees for Reliable Multicasting

    김창한, 양현재, 염익준
    IEICE TRANSACTIONS ON COMMUNICATIONS
    2007

    []

  • Cost analysis of BestRelay retransmission tress for reliable multicasting

    양재현, 염익준
    IEICE TRANSACTIONS ON COMMUNICATIONS
    2007

    []

  • DTW-Cosine 알고리즘을 이용한 저비율 샘플링 음향 센서네트워크에서의 목표물 식별기법

    김영수, 김대영, 강종구
    한국정보과학회 제34회 추계학술대회
    2007

    []

  • Design Issues and Performance Comparisons in Supporting the Sockets Interface over User-Level Communication Architecture

    JAE WAN JANG, 김진수
    JOURNAL OF SUPERCOMPUTING
    2007

    []

  • Design of an RFID e-ID System for Privacy Protection

    Sung-Bae Ji, Zeen Kim, Kwangjo Kim
    2008 Symposium on Cryptography and Information Security
    2007

    []

  • Design of secure VoIP using ID-Based Cryptosystem

    KyuSuk Han, 윤찬엽, Kwangjo Kim
    2008 Symposium on Cryptography and Information Security
    2007

    []

  • Developing a software process simulation model using SPEM and analytical models

    Park, S., Kim, H., Kang, D., Doo-Hwan Bae
    INTERNATIONAL JOURNAL OF SIMULATION AND PROCESS MODELLING
    2007

    []

  • Discriminative learning and recognition of image set classes using canonical correlations

    Kim Tae Kyun, Kittler, Josef, Cipolla, Roberto
    IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE
    2007

  • Drug Traget Protein Prediction using SVM

    HwieSung Jung, BORA HYUN, SUKHOON JUNG, Woohyuk Jang, Dongsoo Han
    The 18th International Conference on Genome Informatics(GIW 2007)
    2007

    []

  • Effective service discovery in IP-based wireless sensor network

    SeungKu Kim, Joongsoo Lee, Dong-pil Kwak, Younghee LEE
    2008 10th International conference on advanced communication technology
    2007

    []

  • Efficient Resource Registration and Location Scheme in P2P-SIP, using ID-based Signature

    CHANGHWAN LEE, KyuSuk Han, Younghee LEE
    2008 10th International conference on advanced communication technology
    2007

    []

  • Energy Efficient Local Area Source Routing Protocol of Underwater Sensor Networks in the Deep Ocean

    Eunjo Kim, Jonggu Kang, Poh Kit Chong, Seong-eun Yoo, Daeyoung KIM
    ISCIT 2007
    2007

    []

  • Energy Efficient Position-Based Three Dimensional Routing for Wireless Sensor Networks

    JeongDae Kim, Daeyoung KIM
    WMSCI 2007(The 11th World Multi-Conference on Systemics, Cybernetics and Informatics)
    2007

    []

  • Enhancing Privacy and Authentication for Location Based Service using Trusted Authority

    KyuSuk Han, Kwangjo Kim
    Joint Workshop on Information Security (JWIS) 2007
    2007

    []