Showing 37001-37010 of 40,151.
Type | Year | Title | Cited | Download |
---|---|---|---|---|
Conference
|
2008 | Design and Implementation of a Linux Phone Emulator Supporting Automated Application Testing Jae-Ho Lee International Conference on Convergence and Hybrid Information Technology (ICCIT) 2008, pp.256-259 | 0 | |
Conference
|
2008 | Cost-effective Implementation of TETRA Codec Using the Primitive Functions of the Compiler Kyung Jin Byun International Conference on Signal Processing and Communication Systems (ICSPCS) 2008, pp.1-4 | 0 | |
Conference
|
2008 | Power Aware Wireless Receiver Design Utilizing Carrier Sensing Based on Cross-Correlation Il-Gu Lee International Conference on Signal Processing and Communication Systems (ICSPCS) 2008, pp.1-2 | 3 | |
Conference
|
2008 | Radiation Efficiency Improvement Method of RFID Tag Antenna for Metallic Objects Printed on Lossy Substrate Hae-Won Son Asia-Pacific Microwave Conference (APMC) 2008, pp.1-4 | 8 | |
Conference
|
2008 | A Feasibility Study of Antenna in a Package Technology for 40GHz Front-End Module Woo-Jin Byun Electrical Design of Advanced Packaging and Systems Symposium (EDAPS) 2008, pp.198-201 | 2 | |
Conference
|
2008 | Real-time Composition Previsualization System Hye-mi Kim ACM SIGGRAPH Asia 2008, pp.1-1 | ||
Conference
|
2008 | Partial EBG Placement on PDN to Effectively Suppress Simultaneous Switching Noise Jong Hwa Kwon Electrical Design of Advanced Packaging and Systems Symposium (EDAPS) 2008, pp.89-92 | 2 | |
Conference
|
2008 | Distortion Estimation in CBR Channel and Its Application for H.264 Rate Control Il Hong Shin International Conference on Multimedia and Expo (ICME) 2008, pp.689-692 | 2 | |
Conference
|
2008 | Integration framework for interoperability of distributed and heterogeneous robot middlewares Janarbek Matai International Conference on Control, Automation, Robotics and Vision (ICARCV) 2008, pp.2337-2343 | 1 | |
Conference
|
2008 | Efficient Hardware Architecture of SHA-256 Algorithm for Trusted Mobile Computing Moo Seop Kim International Conference on Information Security and Cryptology (Inscrypt) 2008 (LNCS 5487), v.5487, pp.240-252 | 22 |