Wyniki wyszukiwania dla: Im-Yeong Lee
The Journal of Supercomputing > 2019 > 75 > 8 > 4617-4637
Lecture Notes in Computer Science > Computational Science and Its Applications – ICCSA 2004 > Track on Numerical Methods and Algorithms > 66-76
Lecture Notes in Computer Science > Computational Science — ICCS 2003 > Australian Track > 1069-1078
Lecture Notes in Computer Science > EurAsia-ICT 2002: Information and Communication Technology > Intelligent Agents II > 832-841
Lecture Notes in Computer Science > Computational Science and Its Applications – ICCSA 2004 > Track on Mobile Computing Systems > 1020-1028
Lecture Notes in Computer Science > Web Engineering > Security > 279-280
Lecture Notes in Computer Science > Advances in Multimedia Modeling > Ubiquitous Multimedia Service (UMS) > 487-493
Lecture Notes in Computer Science > Computational Science and Its Applications – ICCSA 2005 > Approaches or Methods of Security Engineering Workshop > 177-186
Lecture Notes in Computer Science > Computational Science and Its Applications – ICCSA 2004 > Approaches or Methods of Security Engineering Workshop > 557-566
Lecture Notes in Computer Science > Computational Science and Its Applications – ICCSA 2007 > Workshop on Ubiquitous Applications and Security Service (UASS 7) > 666-677
Lecture Notes in Computer Science > Computational Science and Its Applications – ICCSA 2005 > Approaches or Methods of Security Engineering Workshop > 117-126
Lecture Notes in Computer Science > Advances in Information Security and Assurance > WNGS 2009 and CGMS 2009 > 760-768
Lecture Notes in Computer Science > EurAsia-ICT 2002: Information and Communication Technology > Wireless Communication Technology II > 766-777
Lecture Notes in Computer Science > Knowledge-Based Intelligent Information and Engineering Systems > Hybrid Information Technology Using Computational Intelligence > 793-802
Lecture Notes in Computer Science > E-Commerce and Web Technologies > Security and Privacy II > 324-332
Lecture Notes in Computer Science > Emerging Directions in Embedded and Ubiquitous Computing > TRUST 2006 Workshop > 721-730
Lecture Notes in Computer Science > Computational Science and Its Applications - ICCSA 2006 > Workshop on Ubiquitous Application and Security Service (UASS 2006) > 370-379