Zobrazeno 1 - 10
of 26
pro vyhledávání: '"Ki-Seok Bang"'
Publikováno v:
Asia-Pacific Journal of Atmospheric Sciences. 59:271-280
The Dual Tipping Bucket Gauge (DTBG) is newly developed to improve the accuracy of rainfall measurements. DTBG includes two tipping buckets (TBs) in a gauge cylinder, named TB01 and TB05. The measurement resolution of TB01 and TB05 are 0.1 mm and 0.5
Publikováno v:
The Journal of Korean Institute of Information Technology. 17:67-76
Autor:
Christos Komninos, Keum Sook So, Koon Ho Rha, Woong Kyu Han, Sung Jun Hong, Heon-Jae Jeong, Tae Young Shin, Won Ki Lee, Byung Ha Jung, Sang Kon Lee, Sey Kiat Lim, Dong Wook Kim, Ki Seok Bang
Publikováno v:
Journal of Urology. 193:423-429
Preoperatively predicting postoperative kidney function is an essential step to achieve improved renal function and prevent chronic kidney disease. We introduce a novel formula especially to calculate resected and ischemic volume before partial nephr
Autor:
Geonha Kim, Ki-Seok Bang
Publikováno v:
Productivity Review. 27:345-369
Publikováno v:
Journal of Korean Institute of Information Technology. 15:9
Publikováno v:
IEEE Transactions on Software Engineering. 27:573-576
The paper by G.J. Holzmann (see ibid., vol.23, no.5, p.279-95, 1997) describes how to apply SPIN to the verification of a synchronization algorithm (L.M. Ruane, 1990) in process scheduling of an operating system. We report an error in the verificatio
Publikováno v:
2008 10th International Conference on Advanced Communication Technology.
Web has influenced the form of software applications. These web applications are generally difficult to distribute by novice users since their usage was restricted to the network based massive servers which has many server modules requiring difficult
Publikováno v:
2008 International Conference on Convergence and Hybrid Information Technology.
A data stream management system (DSMS) for the real-time processing of a large volume of RFID events is proposed herein. It allows the real-time scheduling of groups of operators, the components of a query, to process user queries of various kinds wi
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783540726944
WWIC
WWIC
This paper analyses security mechanisms in wireless networks, and designs for secure and efficient protocol for a handover reusing the key materials generated before the handover phase. In order to be sure that our handover protocol does not have any
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::d3b22cb2bb855ed35c340524df46d132
https://doi.org/10.1007/978-3-540-72697-5_6
https://doi.org/10.1007/978-3-540-72697-5_6
Publikováno v:
The 9th International Conference on Advanced Communication Technology.
The embedded mobile phone based on L4 microkernel are known to be difficult to predict their behavioral correctness since L4 microkernel communicates with various components for their execution. That means its correctness is not easy to guarantee by