ETRI-Knowledge Sharing Plaform

KOREAN
논문 검색
Type SCI
Year ~ Keyword

Search Results

Showing 36841-36850 of 40,901.

Display
논문 검색결과
Type Year Title Cited Download
Conference
2006 Security Techniques Based on EPC Gen2 Tag for Secure Mobile RFID Network Services   Nam Je Park   International Conference on Knowledge-Based and Intelligent Information and Engineering Systems (KES) 2006 (LNCS 4251), v.4251, pp.924-934 0
Conference
2006 Efficient Inter-Mode Decision based on Contextual Prediction for the P-Slice in H.264/AVC Video Coding   Byung Gyu Kim   International Conference on Image Processing (ICIP) 2006, pp.1333-1336 13
Conference
2006 A Personalized Preset-based Audio System for Interactive Service   Tae Jin Lee   AES Convention 2006, pp.492-497
Conference
2006 An Objectionable Image Detection System based on Region of Interest   Chi Yoon Jeong   International Conference on Image Processing (ICIP) 2006, pp.1477-1480 9
Conference
2006 A Compact 43Gb/s Clock Recovery Module Using a Dielectric Resonator Filter   Sang Kyu Lim   IEEE Lasers and Electro-Optics Society (LEOS) Meeting 2006, pp.567-568 0
Conference
2006 Garbage Collection in an Embedded Java Virtual Machine   Chang-Il Cha  International Conference on Knowledge-Based and Intelligent Information and Engineering Systems (KES) 2006 (LNCS 4251), v.4251, pp.443-450 0
Conference
2006 Moving Object Removal Based on Global Feature Registration   Soon Yong Park  International Conference on Advanced Concepts for Intelligent Vision Systems (ACIVS) 2006 (LNCS 4179), v.4179, pp.275-286 1
Conference
2006 Secure Biometric Recognition Method in Home Network   Yun Kyung Lee   Conference of IEEE Industrial Electronics Society (IECON) 2006, pp.3745-3749 1
Conference
2006 Effects of the Resistivity and Crystal Orientation of the Silicon PIN Detector on the Dark Current and Radiation Response Characteristics   Kun Sik Park   IEEE Nuclear Science Symposium Conference Record 2006, pp.1068-1072 3
Conference
2006 New Variant of the Self-Shrinking Generator and Its Cryptographic Properties   Ku Young Chang   International Conference on Information Security and Cryptology (ICISC) 2006 (LNCS 4296), v.4296, pp.41-50 3