Search

Your search keyword '"Byung-ki Kim"' showing total 30 results

Search Constraints

Start Over You searched for: Author "Byung-ki Kim" Remove constraint Author: "Byung-ki Kim" Topic computer science Remove constraint Topic: computer science
30 results on '"Byung-ki Kim"'

Search Results

2. A Load Balanced Clustering Model for Energy Efficient Packet Transmission in Wireless Sensor Networks

3. Procedural Animation Method for Realistic Behavior Control of Artificial Fish

4. Timer-based Credit Scheduler for Supporting Low Latency Task

5. Implement of The Authoring Tool for WIPI Business Program using UIDL(User Interface Description Language)

6. Decision of Abnormal Quality Unit Lists from Claim Database

7. XML Language for Generating J2ME MIDlet User Interfaces

8. Design and Implementation of Dynamic Web Server Page Builder on Web

9. An Experience Type Virtual Reality Training System for CT(Computerized Tomography) Operations

10. Improved Object Recognition using Wavelet Transform & Histogram Equalization in the variable illumination

12. Highly reliable Cu interconnect strategy for 10nm node logic technology and beyond

13. Low Latency Scheduling on Multi BOOST Environment

14. Design and Implementation of Resource Management Tool for Virtual Machine

15. VCPU Shaping for Supporting Latency Sensitive Workloads

16. Monitoring and Feedback Tools for Realtime Workloads for Xen Virtual Machine

17. Feedback Scheduling for Realtime Task on Xen Virtual Machine

18. ICLS : Intelligent Cricket-based Location Tracking System Using Sensor Fusion

19. A Fuzzy Reasoning Model of Two-Dimensional Warranty System

20. On Determination of Early Warning Grade Based on AHP Analysis in Warranty Database

21. A Fuzzy Logic-Based Approach to Two-Dimensional Warranty System

22. Kinematical Access for Realistic Behavior Generation of Artificial Fish

23. Real-Time Motion Simulation of Artificial Fish for Virtual Marine World

24. Kimchi: A Binary Rewriting Defense Against Format String Attacks

25. Protection Against Format String Attacks by Binary Rewriting

26. Building Security Requirements Using State Transition Diagram at Security Threat Location

27. Space, polarization, and angle diversity for cellular base stations operating in urban environments

28. Kimchi: A Binary Rewriting Defense Against Format String Attacks.

29. Building Security Requirements Using State Transition Diagram at Security Threat Location.

30. Protection Against Format String Attacks by Binary Rewriting.

Catalog

Books, media, physical & digital resources