Zobrazeno 1 - 10
of 51
pro vyhledávání: '"Yongsuk Lee"'
Publikováno v:
The Asian Journal of Kinesiology, Vol 22, Iss 1, Pp 9-14 (2020)
OBJECTIVES This study established the relationship and reliability of vertical jump height measurements using both the jump-reach method and the flight-time method. METHODS Sixteen healthy subjects (13 males and 3 females, body mass index: 22.5 kg/m2
Externí odkaz:
https://doaj.org/article/7c7adcd851f04eb3a225b6bc62a8c84d
Autor:
Yongsuk Lee, Gyungho Lee
Publikováno v:
IEEE Access, Vol 7, Pp 10811-10822 (2019)
Ensuring that a program follows an uncompromised control flow at the machine instruction level can provide sound protection from control flow attacks that transfer a control flow to the attacker's flow during program execution. This paper proposes an
Externí odkaz:
https://doaj.org/article/d3b408617da84d1d8be83e883d74aafd
Publikováno v:
Applied Sciences, Vol 11, Iss 6, p 2830 (2021)
To examine individual or combined effects of static stretch and explosive contraction on quadriceps spinal-reflex excitability (the peak Hoffmann’s reflex normalized by the peak motor-response) and the latency times of the Hoffmann’s reflex and m
Externí odkaz:
https://doaj.org/article/c1fd46f2ce8245e5af97454919a6685c
Publikováno v:
International Journal of Communication (19328036); 2023, Vol. 17, p72-91, 20p, 2 Charts
With the rise of mobile media and snack culture, the webtoon has become a leading form of popular culture in Korea. Korea is also producing a growing number of webtoon-based TV dramas. If the proliferation of the mobile phone and the migration of tra
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::edede39cd7b6e047e1518b36bb54e152
https://doi.org/10.4324/9780367246549-9
https://doi.org/10.4324/9780367246549-9
Autor:
Yongsuk Lee, Gyungho Lee
Publikováno v:
Computer. 51:40-47
Code reuse attacks (CRAs) allow attackers to produce malicious results by using legitimate code binaries in memory. The authors propose incorporating control-flow validation into the processors instruction execution pipeline, along with a mis-predict
Publikováno v:
International Journal of Communication (19328036); 2019, Vol. 13, p2179-2198, 20p, 2 Charts
Publikováno v:
Journal of The Korean Society of Disaster Information. 13:106-117
Publikováno v:
Journal of Information Security. :42-55
ARM® is the prevalent processor architecture for embedded and mobile applications. For the smartphones, it is the processor for which software applications are running, whether the platform is with Apple’s iOS or Google’s Android. Software opera