Showing 27841-27850 of 42,167.
| Type | Year | Title | Cited | Download |
|---|---|---|---|---|
|
Conference
|
2010 | Privacy Description and Accessing API Standards for Web Applications Won Suk Lee W3C Workshop on Privacy for Advanced Web APIs 2010, pp.1-2 | ||
|
Conference
|
2010 | Procedural Approach for RealisticWoven Fabric Rendering Sung-Soo Kim Eurographics 2010, pp.1-2 | ||
|
Conference
|
2010 | R&D Activities of ETRI Seong Kyun Jeong International Conference on Space, Aeronautical and Navigational Electronics (ICSANE) 2010, pp.1-5 | ||
|
Conference
|
2010 | real-time Implementation of Simulator for Seamless Lawful Interception Byung Sik Yoon International Conference Circuits and Systems (CS) 2010, pp.231-235 | ||
|
Conference
|
2010 | Robust Telecommand Operation Systems for COMS In Jun Kim Korea-Vietnam International Conference on Information and Communications (ICIC) 2010, pp.1-2 | ||
|
Conference
|
2010 | Scanning and Tracking Fingerprint Images for Detecting Privacy Violators Hak Jae Kim International Conference on Internet (ICONI) 2010 / Asia Pacific International Conference on Information Science and Technology (APIC-IST) 2010, pp.109-113 | ||
|
Conference
|
2010 | Seamless Lawful Interception Architectures for Wireless Networks Myoung Rak Lee International Conference on Internet (ICONI) 2010 / Asia Pacific International Conference on Information Science and Technology (APIC-IST) 2010, pp.559-560 | ||
|
Conference
|
2010 | Security Enhancement of Fuzzy Fingerprint Vault Using One-Time Templates Woo Yong Choi International Conference on Internet (ICONI) 2010 / Asia Pacific International Conference on Information Science and Technology (APIC-IST) 2010, pp.1-2 | ||
|
Conference
|
2010 | SIP-based Lawful Interception Process in IP Multimedia Subsystem Jung-Been Lee International Conference on Internet (ICONI) 2010 / Asia Pacific International Conference on Information Science and Technology (APIC-IST) 2010, pp.837-838 | ||
|
Conference
|
2010 | SRS-based Automatic Secure Device Pairing on Audio Channels Young Sam Kim International Conference for Internet Technology and Secured Transactions (ICITST) 2010, pp.1-6 |