Kim

Results: 9600



#Item
11Interactive Debugging for Extensible Languages in Multi-Stage Transformation Environments Domenik Pavletic Kim Haßlbauer

Interactive Debugging for Extensible Languages in Multi-Stage Transformation Environments Domenik Pavletic Kim Haßlbauer

Add to Reading List

Source URL: mbeddr.com

Language: English - Date: 2018-08-02 04:06:51
12TRecSo: Enhancing Top-k Recommendation With Social Information ∗ Chanyoung Park, Donghyun Kim, Jinoh Oh, Hwanjo Yu† Dept. of Computer Science and Engineering

TRecSo: Enhancing Top-k Recommendation With Social Information ∗ Chanyoung Park, Donghyun Kim, Jinoh Oh, Hwanjo Yu† Dept. of Computer Science and Engineering

Add to Reading List

Source URL: gdac.uqam.ca

Language: English - Date: 2017-10-04 00:59:03
13Taming Undefined Behavior in LLVM Juneyoung Lee Yoonseung Kim Youngju Song Chung-Kil Hur Seoul National University, Korea

Taming Undefined Behavior in LLVM Juneyoung Lee Yoonseung Kim Youngju Song Chung-Kil Hur Seoul National University, Korea

Add to Reading List

Source URL: www.cs.utah.edu

Language: English - Date: 2017-04-14 11:35:39
14WorldECR The Kim-Trump Summit: a new era? 2  US announces ‘strictest BIS compliance

WorldECR The Kim-Trump Summit: a new era? 2 US announces ‘strictest BIS compliance

Add to Reading List

Source URL: www.mme.ch

Language: English - Date: 2018-08-13 09:32:09
15XXXX Authentication Challenges in a Global Environment Stephanos Matsumoto, Carnegie Mellon University/ETH Zurich Raphael M. Reischuk, ETH Zurich Pawel Szalachowski, ETH Zurich Tiffany Hyun-Jin Kim, HRL Laboratories

XXXX Authentication Challenges in a Global Environment Stephanos Matsumoto, Carnegie Mellon University/ETH Zurich Raphael M. Reischuk, ETH Zurich Pawel Szalachowski, ETH Zurich Tiffany Hyun-Jin Kim, HRL Laboratories

Add to Reading List

Source URL: www.netsec.ethz.ch

Language: English
16Poster: Flow Inspection Scheduling for Cyber Security on Software-Defined Networks Sunghwan Kim, Seunghyun Yoon, and Hyuk Lim School of Electrical Engineering and Computer Science Gwangju Institute of Science and Technol

Poster: Flow Inspection Scheduling for Cyber Security on Software-Defined Networks Sunghwan Kim, Seunghyun Yoon, and Hyuk Lim School of Electrical Engineering and Computer Science Gwangju Institute of Science and Technol

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-14 15:46:40
17Poster: IoTcube: An Automated Analysis Platform for Finding Security Vulnerabilities Seulbae Kim, Seunghoon Woo, Heejo Lee, Hakjoo Oh Department of Computer Science and Engineering Korea University Seoul, Korea

Poster: IoTcube: An Automated Analysis Platform for Finding Security Vulnerabilities Seulbae Kim, Seunghoon Woo, Heejo Lee, Hakjoo Oh Department of Computer Science and Engineering Korea University Seoul, Korea

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-21 15:07:31
18Comparing the Usability of Cryptographic APIs Yasemin Acar, Michael Backes, Sascha Fahl, Simson Garfinkel∗ , Doowon Kim† , Michelle L. Mazurek† , and Christian Stransky CISPA, Saarland University; ∗ National Inst

Comparing the Usability of Cryptographic APIs Yasemin Acar, Michael Backes, Sascha Fahl, Simson Garfinkel∗ , Doowon Kim† , Michelle L. Mazurek† , and Christian Stransky CISPA, Saarland University; ∗ National Inst

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-03 15:56:35
19

PDF Document

Add to Reading List

Source URL: www.kim-lab.info

- Date: 2018-03-28 02:12:35
    20

    PDF Document

    Add to Reading List

    Source URL: www.kim.nrw.de

    - Date: 2017-10-10 10:33:57