2014-09 | Generalized Background Subtraction using Superpixels with Label Integrated Motion Estimation | 임종우 |
2014-09 | A power-efficient vertical handover with MIH-based network scanning through consistency check | 조인휘 |
2014-09 | Online 3D Reconstruction and 6-DoF Pose Estimation for RGB-D Sensors | 임종우 |
2014-09 | L0-Regularized Object Representation for Visual Tracking | 임종우 |
2011-11 | 다중 패턴 매칭을 위한 변형된 wu-mander 알고리즘의 병렬화 및 성능분석 | 박희진 |
2011-11 | 네트워크 침입 탐지 시스템을 위한 Aho-Crasick 패턴 매칭 알고리즘 분석 및 멀티쓰레딩을 활용한 성능 향상 | 박희진 |
2014-10 | Post Ranking in a Blogosphere | 김상욱 |
2014-10 | GPU-based Matrix Multiplication Methods for Social Networks Analysis | 김상욱 |
2014-10 | Real-Time Priority Assignment for AUTOSAR-based Systems with Time-Driven Synchronization | 유민수 |
2014-10 | TASEL: Dynamic Taint Analysis with Selective Control Dependency | 임을규 |
2014-10 | TASEL: Dynamic Taint Analysis with Selective Control Dependency | 유민수 |
2014-10 | Similarity Calculation Method for User-Define Functions to Detect Malware Variants | 임을규 |
2014-10 | Metadata Based Combined Approach for Effective Collaborative Recommendation | 최용석 |
2014-08 | 미래 이더넷 스위치 : SDN을 위한 Open vSwitch | 최진식 |
2014-06 | 동적 기호 실행을 이용한그래프 기반 바이너리 코드 실행 경로 탐색 플랫폼 | 임을규 |
2014-06 | Multiattribute SCADA-Specific Intrusion Detection System for Power Networks | 임을규 |
2014-01 | Analyzing Network Privacy Preserving Methods: A Perspective of Social Network Characteristics | 김상욱 |
2014-03 | Analyzing Network Privacy Preserving Methods: A Perspective of Social Network Characteristics | 박용수 |
2014-06 | On Computing Similarity in Academic Literature Data: Methods and Evaluation | 김상욱 |
2014-06 | Exploiting the uFLIP Benchmark for Analyzing SSDs Performance | 김상욱 |