Search results for: Sangjin Kim
Cluster Computing > 2017 > 20 > 3 > 2231-2252
Lecture Notes in Computer Science > Computational Science and Its Applications – ICCSA 2007 > Workshop on Advanced Security Services (ASS 7) > 987-995
Wireless Personal Communications > 2017 > 92 > 3 > 1011-1028
Lecture Notes in Computer Science > Content Computing > Session 8: Web Services and Content Applications (I) > 337-345
Lecture Notes in Computer Science > Information Security Applications > Anonymity/Authentication/Access Control > 268-280
Lecture Notes in Computer Science > Computational Science and Its Applications – ICCSA 2005 > Tracks > 877-886
Lecture Notes in Computer Science > Advances in Multimedia Information Processing - PCM 2005 > 843-853
Lecture Notes in Computer Science > Innovations in Applied Artificial Intelligence > Fuzzy Logic > 695-704
Lecture Notes in Computer Science > Computational Science and Its Applications - ICCSA 2006 > Workshop on Ubiquitous Application and Security Service (UASS 2006) > 388-395
Lecture Notes in Computer Science > Information Security Applications > e-Commerce Security > 286-301
Lecture Notes in Computer Science > Distributed Computing and Internet Technology > Wireless Sensor Network II – Localization and Coverage > 63-72
Lecture Notes in Computer Science > Advances in Multimedia Information Processing - PCM 2004 > Surveillance and Tracking > 69-78
Lecture Notes in Computer Science > Information and Communications Security > Key Management > 323-335
Lecture Notes in Computer Science > Distributed Computing and Internet Technology > Section 7 - e-Applications > 327-335
Communications in Computer and Information Science > Signal Processing, Image Processing and Pattern Recognition > 221-227
Child Development > 87 > 1 > 111 - 121