Showing 36841-36850 of 40,901.
Type | Year | Title | Cited | Download |
---|---|---|---|---|
Conference
|
2006 | Security Techniques Based on EPC Gen2 Tag for Secure Mobile RFID Network Services Nam Je Park International Conference on Knowledge-Based and Intelligent Information and Engineering Systems (KES) 2006 (LNCS 4251), v.4251, pp.924-934 | 0 | |
Conference
|
2006 | Efficient Inter-Mode Decision based on Contextual Prediction for the P-Slice in H.264/AVC Video Coding Byung Gyu Kim International Conference on Image Processing (ICIP) 2006, pp.1333-1336 | 13 | |
Conference
|
2006 | A Personalized Preset-based Audio System for Interactive Service Tae Jin Lee AES Convention 2006, pp.492-497 | ||
Conference
|
2006 | An Objectionable Image Detection System based on Region of Interest Chi Yoon Jeong International Conference on Image Processing (ICIP) 2006, pp.1477-1480 | 9 | |
Conference
|
2006 | A Compact 43Gb/s Clock Recovery Module Using a Dielectric Resonator Filter Sang Kyu Lim IEEE Lasers and Electro-Optics Society (LEOS) Meeting 2006, pp.567-568 | 0 | |
Conference
|
2006 | Garbage Collection in an Embedded Java Virtual Machine Chang-Il Cha International Conference on Knowledge-Based and Intelligent Information and Engineering Systems (KES) 2006 (LNCS 4251), v.4251, pp.443-450 | 0 | |
Conference
|
2006 | Moving Object Removal Based on Global Feature Registration Soon Yong Park International Conference on Advanced Concepts for Intelligent Vision Systems (ACIVS) 2006 (LNCS 4179), v.4179, pp.275-286 | 1 | |
Conference
|
2006 | Secure Biometric Recognition Method in Home Network Yun Kyung Lee Conference of IEEE Industrial Electronics Society (IECON) 2006, pp.3745-3749 | 1 | |
Conference
|
2006 | Effects of the Resistivity and Crystal Orientation of the Silicon PIN Detector on the Dark Current and Radiation Response Characteristics Kun Sik Park IEEE Nuclear Science Symposium Conference Record 2006, pp.1068-1072 | 3 | |
Conference
|
2006 | New Variant of the Self-Shrinking Generator and Its Cryptographic Properties Ku Young Chang International Conference on Information Security and Cryptology (ICISC) 2006 (LNCS 4296), v.4296, pp.41-50 | 3 |