Search concepts
|
Selected filters
|
- 80,150 - 80,200 out of 86,590 results
Search results
-
Conference contribution
Secure vehicular communication for safety applications - A measurement study
Juhong, M., Jihun, H., Sangki, Y., Inhye, K. & Hyogon, K., 2008, 2008 IEEE 67th Vehicular Technology Conference-Spring, VTC. p. 3016-3020 5 p. 4525879. (IEEE Vehicular Technology Conference).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
1 Citation (Scopus) -
Securing Internet gateway discovery protocol in ubiquitous wireless Internet access networks
Park, B. N., Lee, W. & Shin, C., 2006, Embedded and Ubiquitous Computing - International Conference, EUC 2006, Proceedings. Springer Verlag, p. 318-327 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4096 LNCS).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
1 Citation (Scopus) -
Security analysis and implementation leveraging globally networked RFIDs
Park, N., Kim, S., Won, D. & Kim, H., 2006, Personal Wireless Communications - IFIP TC6 11th International Conference, PWC 2006, Proceedings. Cuenca, P. & Orozco-Barbosa, L. (eds.). Springer Verlag, p. 494-505 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4217 LNCS).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Open Access30 Citations (Scopus) -
Security analysis of CIKS-128 and CIKS-128H using key schedule weaknesses
Lee, C., Kim, J., Hong, S., Lee, S., Sung, J. & Lee, H. M., 2008, Proceedings - International Symposium on Computer Science and Its Applications, CSA 2008. p. 199-206 8 p. 4654086. (Proceedings - International Symposium on Computer Science and Its Applications, CSA 2008).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
Security Analysis of One-step QSDC Protocol with Hyperentanglement
Kim, K., Kim, B. & Heo, J., 2022, APWCS 2022 - 2022 IEEE VTS Asia Pacific Wireless Communications Symposium. Institute of Electrical and Electronics Engineers Inc., p. 155-159 5 p. (APWCS 2022 - 2022 IEEE VTS Asia Pacific Wireless Communications Symposium).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
Security analysis of RFID authentication for pervasive systems using model checking
Kim, H. S., Oh, J. H. & Choi, J. Y., 2006, Proceedings - 30th Annual International Computer Software and Applications Conference, COMPSAC 2006 - Short Papers/Workshops/Fast Abstracts/Doctoral Symposium. p. 195-202 8 p. 4020167. (Proceedings - International Computer Software and Applications Conference; vol. 2).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
6 Citations (Scopus) -
Security analysis of smart card based password authentication schemes
Kim, H. S., Seo, S. & Choi, J. Y., 2010, Proceedings - 3rd International Conference on Information Sciences and Interaction Sciences, ICIS 2010. p. 352-356 5 p. 5534807. (Proceedings - 3rd International Conference on Information Sciences and Interaction Sciences, ICIS 2010).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
2 Citations (Scopus) -
Security analysis of the keyschedule of ARIA-128
Kang, H., Lee, Y., Jeong, K., Sung, J. & Hong, S., 2012, Computer Science and Its Applications, CSA 2012. p. 243-251 9 p. (Lecture Notes in Electrical Engineering; vol. 203 LNEE).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
Security analysis on commercial online music streaming service and countermeasures
Lee, S., Choi, D., Won, D. & Kim, S., 2010, Proceedings of the 4th International Conference on Ubiquitous Information Management and Communication, ICUIMC 10. p. 408-414 7 p. (Proceedings of the 4th International Conference on Ubiquitous Information Management and Communication ICUIMC 10).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
2 Citations (Scopus) -
Security analysis on the authentication mechanisms of Korean popular messengers
Shin, D., Choi, Y., Lee, Y., Park, S., Kim, S. & Won, D., 2007, Universal Access in Human-Computer Interaction: Coping with Diversity - 4th International Conference on Universal Access in Human-Computer Interaction, UAHCI 2007. Held as Part of HCI Int. 2007 Proc.. PART 1 ed. Springer Verlag, p. 547-552 6 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4554 LNCS, no. PART 1).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Open Access1 Citation (Scopus) -
Security and handover designs for VoWLAN system
Kim, M. Y., Lim, M., Sohn, J. S. & Lee, D. H., 2007, Managing Next Generation Networks and Services - 10th Asia-Pacific Network Operations and Management Symposium, APNOMS 2007, Proceedings. Springer Verlag, p. 447-456 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4773 LNCS).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
Security and privacy analysis of RFID authentication protocol for ubiquitous computing
Kim, H. S. & Choi, J. Y., 2007, Proceedings of 16th International Conference on Computer Communications and Networks 2007, ICCCN 2007. p. 1359-1363 5 p. 4318010. (Proceedings - International Conference on Computer Communications and Networks, ICCCN).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
2 Citations (Scopus) -
Security and privacy analysis of RFID systems using model checking
Kim, H. S., Kim, I. G., Han, K. H. & Choi, J. Y., 2006, High Performance Computing and Communications - Second International Conference, HPCC 2006, Proceedings. Springer Verlag, p. 495-504 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4208 LNCS).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
1 Citation (Scopus) -
Security assessment for application network services using fault injection
Kang, H. & Lee, D. H., 2007, Intelligence and Security Informatics - Pacific Asia Workshop, PAISI 2007, Proceedings. Springer Verlag, p. 172-183 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4430 LNCS).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
2 Citations (Scopus) -
Security authentication for U-health application services
Ahn, B. H., Hong, J. & Lee, D., 2009, Communication and Networking: International Conference, FGCN/ACN 2009, Held as Part of the Future Generation Information Technology Conference, FGIT 2009, Jeju Island, Korea, December 10-12, 2009. Pro. Slezak, D., Kim, T., Chang, A. C-C., Vasilakos, T., Li, M. & Sakurai, K. (eds.). p. 17-24 8 p. (Communications in Computer and Information Science; vol. 56).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
Security considerations for handover schemes in mobile WiMAX networks
Hur, J., Shim, H., Kim, P., Yoon, H. & Song, N. O., 2008, WCNC 2008 - IEEE Wireless Communications and Networking Conference, Conference Proceedings. Institute of Electrical and Electronics Engineers Inc., p. 2531-2536 6 p. 4489476. (IEEE Wireless Communications and Networking Conference, WCNC).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
32 Citations (Scopus) -
Security engineering methodology for developing secure enterprise information systems: An overview
Kim, Y. G. & Cha, S., 2012, Embedded and Multimedia Computing Technology and Service, EMC 2012. p. 393-400 8 p. (Lecture Notes in Electrical Engineering; vol. 181 LNEE).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
Security enhancing compiler for localization schemes in pervasive sensor networks
Chun, J. Y., Kim, Y. H., Hwang, J. Y. & Lee, D. H., 2009, Proceedings of the 2009 8th IEEE/ACIS International Conference on Computer and Information Science, ICIS 2009. p. 307-312 6 p. 5222880. (Proceedings of the 2009 8th IEEE/ACIS International Conference on Computer and Information Science, ICIS 2009).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
Security evaluation of generalized patchwork algorithm, from cryptanalytic viewpoint
Das, T. K., Kim, H. J. & Maitra, S., 2005, Knowledge-Based Intelligent Information and Engineering Systems - 9th International Conference, KES 2005, Proceedings. Springer Verlag, p. 1240-1247 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3681 LNAI).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
Security manpower scheduling for smart airports
Seo, S., Choi, S. & Lee, C., 2012, Computer Science and Convergence, CSA 2011 and WCC 2011 Proceedings. p. 519-527 9 p. (Lecture Notes in Electrical Engineering; vol. 114 LNEE).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
4 Citations (Scopus) -
Security modelling and analysis of dynamic enterprise networks
Yusuf, S. E., Ge, M., Hong, J. B., Kim, H. K., Kim, P. & Kim, D. S., 2017 Mar 10, Proceedings - 2016 16th IEEE International Conference on Computer and Information Technology, CIT 2016, 2016 6th International Symposium on Cloud and Service Computing, IEEE SC2 2016 and 2016 International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2016. Institute of Electrical and Electronics Engineers Inc., p. 249-256 8 p. 7876345. (Proceedings - 2016 16th IEEE International Conference on Computer and Information Technology, CIT 2016, 2016 6th International Symposium on Cloud and Service Computing, IEEE SC2 2016 and 2016 International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2016).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
31 Citations (Scopus) -
Security specification for conversion technologies of heterogeneous drm systems
Jo, H., Jeon, W., Lee, Y., Kim, S. & Won, D., 2009, Information Security Practice and Experience - 5th International Conference, ISPEC 2009, Proceedings. p. 159-170 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5451 LNCS).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
Security techniques based on EPC Gen2 tag for secure mobile RFID network services
Namje, P., Jin, K., Seungjoo, K., Dongho, W. & Howon, K., 2006, Knowledge-Based Intelligent Information and Engineering Systems - 10th International Conference, KES 2006, Proceedings. Springer Verlag, p. 924-934 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4251 LNAI - I).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
Security weakness in a provable secure authentication protocol given forward secure session key
Kim, M., Jo, H., Kim, S. & Won, D., 2009, Computational Science and Its Applications - ICCSA 2009 - International Conference, Proceedings. PART 2 ed. p. 204-211 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5593 LNCS, no. PART 2).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
6 Citations (Scopus) -
Security weakness in Ren et al.'s group key agreement scheme built on secure two-party protocols
Nam, J., Kim, S. & Won, D., 2005, Information Security Applications - 6th International Workshop, WISA 2005, Revised Selected Papers. p. 1-9 9 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3786 LNCS).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
3 Citations (Scopus) -
SEED: Enabling serverless and efficient encrypted deduplication for cloud storage
Shin, Y., Koo, D., Yun, J. & Hur, J., 2016 Jul 2, Proceedings - 8th IEEE International Conference on Cloud Computing Technology and Science, CloudCom 2016. IEEE Computer Society, p. 482-487 6 p. 7830725. (Proceedings of the International Conference on Cloud Computing Technology and Science, CloudCom; vol. 0).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
1 Citation (Scopus) -
Seed-based hemodynamic connectivity mapping to analyze the effect of hemi-Parkinson's disease using NIR imaging
Paik, S. H., Erdogan, S., Zephaniah Phillips, V., Kim, Y. K., Song, K. I., Park, S. E., Choi, Y., Youn, I. & Kim, B-M., 2018 Jan 1, CLEO: Applications and Technology, CLEO_AT 2018. OSA - The Optical Society, Vol. Part F92-CLEO_AT 2018.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
Seed-based hemodynamic connectivity mapping to analyze the effect of hemi-Parkinson's disease using NIR Imaging
Paik, S. H., Erdogan, S., Phillips, V. Z., Kim, Y. K., Song, K. I., Park, S. E., Choi, Y., Youn, I. & Kim, B-M., 2018 Aug 6, 2018 Conference on Lasers and Electro-Optics, CLEO 2018 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 8427185Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
Seesaw Type Actuator for Haptic Application
Song, K., Park, J. M. & Cha, Y., 2019, Haptic Interaction - Perception, Devices and Algorithms, 2018. Kim, S-Y., Kajimoto, H., Kyung, K-U., Lee, D. & Konyo, M. (eds.). Springer Verlag, p. 169-172 4 p. (Lecture Notes in Electrical Engineering; vol. 535).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
Segmentation, matching and estimation of structure and motion of textured piecewise planar surfaces
Sull, S. & Ahuja, N., 1991, Proceedings of the IEEE Workshop on Visual Motion. Publ by IEEE, p. 274-279 6 p. (Proceedings of the IEEE Workshop on Visual Motion).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
Segmentation and classification of breast tumor using dynamic contrast-enhanced MR images
Zheng, Y., Baloch, S., Englander, S., Schnall, M. D. & Shen, D., 2007 Dec 1, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). PART 2 ed. Vol. 4792 LNCS. p. 393-401 9 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4792 LNCS, no. PART 2).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
Segmentation and classification of breast tumor using dynamic contrast-enhanced MR images
Zheng, Y., Baloch, S., Englander, S., Schnall, M. D. & Shen, D., 2007, Medical Image Computing and Computer-Assisted Intervention - MICCAI 2007 - 10th International Conference, Proceedings. PART 2 ed. Springer Verlag, p. 393-401 9 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4792 LNCS, no. PART 2).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Open Access35 Citations (Scopus) -
Segmentation of craniomaxillofacial bony structures from MRI with a 3D deep-learning based cascade framework
Nie, D., Wang, L., Trullo, R., Li, J., Yuan, P., Xia, J. & Shen, D., 2017, Machine Learning in Medical Imaging - 8th International Workshop, MLMI 2017, Held in Conjunction with MICCAI 2017, Proceedings. Shi, Y., Suk, H-I., Suzuki, K. & Wang, Q. (eds.). Springer Verlag, p. 266-273 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10541 LNCS).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
19 Citations (Scopus) -
Segmentation of infant hippocampus using common feature representations learned for multimodal longitudinal data
Guo, Y., Wu, G., Yap, P. T., Jewells, V., Lin, W. & Shen, D., 2015, Medical Image Computing and Computer-Assisted Intervention – MICCAI 2015 - 18th International Conference, Proceedings. Frangi, A. F., Navab, N., Hornegger, J. & Wells, W. M. (eds.). Springer Verlag, p. 63-71 9 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9351).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
6 Citations (Scopus) -
Segmentation of Organs at Risk in thoracic CT images using a SharpMask architecture and Conditional Random Fields
Trullo, R., Petitjean, C., Ruan, S., Dubray, B., Nie, D. & Shen, D., 2017 Jun 15, 2017 IEEE 14th International Symposium on Biomedical Imaging, ISBI 2017. IEEE Computer Society, p. 1003-1006 4 p. 7950685. (Proceedings - International Symposium on Biomedical Imaging).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
63 Citations (Scopus) -
Segmentation of perivascular spaces using vascular features and structured random forest from 7T MR image
Zhang, J., Gao, Y., Park, S. H., Zong, X., Lin, W. & Shen, D., 2016, Machine Learning in Medical Imaging - 7th International Workshop, MLMI 2016 held in conjunction with MICCAI 2016, Proceedings. Wang, L., Suk, H-I., Shi, Y., Adeli, E. & Wang, Q. (eds.). Springer Verlag, p. 61-68 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10019 LNCS).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
6 Citations (Scopus) -
Segmentation of the left ventricle in myocardial perfusion SPECT using variational level set formulation
Choi, S., Kim, H., Oh, J., Kang, T., Sun, K. & Kim, M., 2007, 2007 IEEE Nuclear Science Symposium and Medical Imaging Conference, NSS-MIC. p. 3060-3064 5 p. 4436776. (IEEE Nuclear Science Symposium Conference Record; vol. 4).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
5 Citations (Scopus) -
Segmented dynamic time warping based signal pattern classification
Hong, J. Y., Park, S. H. & Baek, J. G., 2019 Aug, Proceedings - 22nd IEEE International Conference on Computational Science and Engineering and 17th IEEE International Conference on Embedded and Ubiquitous Computing, CSE/EUC 2019. Qiu, M. (ed.). Institute of Electrical and Electronics Engineers Inc., p. 263-265 3 p. 8919528. (Proceedings - 22nd IEEE International Conference on Computational Science and Engineering and 17th IEEE International Conference on Embedded and Ubiquitous Computing, CSE/EUC 2019).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
8 Citations (Scopus) -
Segmenting ct prostate images using population and patient-Specific statistics for radiotherapy
Fenga, Q., Foskey, M., Tang, S., Chen, W. & Shen, D., 2009, Proceedings - 2009 IEEE International Symposium on Biomedical Imaging: From Nano to Macro, ISBI 2009. p. 282-285 4 p. 5193039. (Proceedings - 2009 IEEE International Symposium on Biomedical Imaging: From Nano to Macro, ISBI 2009).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
11 Citations (Scopus) -
Segmenting hippocampus from 7.0 tesla MR images by combining multiple atlases and auto-context models
Kim, M., Wu, G., Li, W., Wang, L., Son, Y. D., Cho, Z. H. & Shen, D., 2011, Machine Learning in Medical Imaging - Second International Workshop, MLMI 2011, Held in Conjunction with MICCAI 2011, Proceedings. p. 100-108 9 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7009 LNCS).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
6 Citations (Scopus) -
Segmenting hippocampus from infant brains by sparse patch matching with deep-learned features
Guo, Y., Wu, G., Commander, L. A., Szary, S., Jewells, V., Lin, W. & Shen, D., 2014, Medical Image Computing and Computer-Assisted Intervention, MICCAI 2014 - 17th International Conference, Proceedings. PART 2 ed. Springer Verlag, p. 308-315 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8674 LNCS, no. PART 2).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
26 Citations (Scopus) -
Segmenting lung fields in serial chest radiographs using both population and patient-specific shape statistics
Shi, Y., Qi, F., Xue, Z., Ito, K., Matsuo, H. & Shen, D., 2006, Medical Image Computing and Computer-Assisted Intervention, MICCAI 2006 - 9th International Conference, Proceedings. Springer Verlag, p. 83-91 9 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4190 LNCS - I).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Open Access10 Citations (Scopus) -
Seismic reliability assessment model of water supply networks
Yoo, D. G., Kang, D. S. & Kim, J. H., 2013, World Environmental and Water Resources Congress 2013: Showcasing the Future - Proceedings of the 2013 Congress. American Society of Civil Engineers (ASCE), p. 955-966 12 p. (World Environmental and Water Resources Congress 2013: Showcasing the Future - Proceedings of the 2013 Congress).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
7 Citations (Scopus) -
Seismic reliability-based design of water distribution networks using multi-objective harmony search algorithm
Yoo, D. G., Jung, D., Lee, H. M., Choi, Y. H. & Kim, J. H., 2016, Harmony Search Algorithm - Proceedings of the 2nd International Conference on Harmony Search Algorithm, ICHSA 2015. Geem, Z. W. & Kim, J. H. (eds.). Springer Verlag, p. 459-467 9 p. (Advances in Intelligent Systems and Computing; vol. 382).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
Seismic Signal Synthesis by Generative Adversarial Network with Gated Convolutional Neural Network Structure
Li, Y., Ku, B., Kim, G., Ahn, J. K. & Ko, H., 2020 Sept 26, 2020 IEEE International Geoscience and Remote Sensing Symposium, IGARSS 2020 - Proceedings. Institute of Electrical and Electronics Engineers Inc., p. 3857-3860 4 p. 9323670. (International Geoscience and Remote Sensing Symposium (IGARSS)).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
1 Citation (Scopus) -
Selecting genotyping oligo probes via logical analysis of data
Kim, K. & Ryoo, H. S., 2007, Advances in Artificial Intelligence - 20th Conference of the Canadian Society for Computational Studies of Intelligence, Canadian AI 2007, Proceedings. Springer Verlag, p. 86-97 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4509 LNAI).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Open Access1 Citation (Scopus) -
Selecting ridge parameters in infinite dimensional hypothesis spaces
Sugiyama, M. & Müller, K. R., 2002, Artificial Neural Networks, ICANN 2002 - International Conference, Proceedings. Dorronsoro, J. R. & Dorronsoro, J. R. (eds.). Springer Verlag, p. 528-534 7 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2415 LNCS).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
Selective approach to handling topic oriented tasks on the World Wide Web
Awekar, A. C. & Jaewoo, K., 2007, Proceedings of the 2007 IEEE Symposium on Computational Intelligence and Data Mining, CIDM 2007. p. 343-348 6 p. 4221318. (Proceedings of the 2007 IEEE Symposium on Computational Intelligence and Data Mining, CIDM 2007).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
6 Citations (Scopus) -
Selective background adaptation based abnormal acoustic event recognition for audio surveillance
Choi, W., Rho, J., Han, D. K. & Ko, H., 2012, Proceedings - 2012 IEEE 9th International Conference on Advanced Video and Signal-Based Surveillance, AVSS 2012. p. 118-123 6 p. 6327995. (Proceedings - 2012 IEEE 9th International Conference on Advanced Video and Signal-Based Surveillance, AVSS 2012).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
18 Citations (Scopus) -
Selective capture and culture of circulating tumor cells using anti-EpCAM antibody conjugated ethanol-dispersed nanofibers
Yoon, J., Yoon, H. S., Shin, Y., Kim, S., Ju, Y., Kim, J. & Chung, S., 2016, 20th International Conference on Miniaturized Systems for Chemistry and Life Sciences, MicroTAS 2016. Chemical and Biological Microsystems Society, p. 283-284 2 p. (20th International Conference on Miniaturized Systems for Chemistry and Life Sciences, MicroTAS 2016).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution