ETRI-Knowledge Sharing Plaform

KOREAN
논문 검색
Type SCI
Year ~ Keyword

Search Results

Showing 28241-28250 of 42,167.

Display
논문 검색결과
Type Year Title Cited Download
Conference
2015 An Energy Efficient Scheduling Method for Embedded Heterogeneous Multi-Core Processor   YungJoon Jung   International Symposium on Embedded Technology (ISET) 2015, pp.117-120
Conference
2015 Preliminary Performance Analysis of Space-Based AIS Payload for KOMPSAT-6   Yong-Min Lee   International Conference on Advances in Satellite and Space Communications (SPACOMM) 2015, pp.63-65
Conference
2015 The Factors of Technology, Organization and Environment Influencing the Adoption and Usage of Big Data in Korean Firms   Jong-Hyun Park   European Regional Conference of the International Telecommunications Society 2015, pp.1-14
Journal
2013 Load-Adaptive 180-Degree Sinusoidal Permanent-Magnet Brushless Motor Control Employing Automatic Angle Compensation   Minki Kim   IEEK Transactions on Smart Processing & Computing, v.2, no.5, pp.310-316
Journal
2014 Design and Implementation of Meter Simulator for Smart Grid Technology   Hyunjeong Lee   International Journal of Electrical Energy, v.2, no.3, pp.254-257
Journal
2013 Influencing Factors for the Adoption of Mobile Office Services: Empirical Investigation among Sales Workers   Jin-Bo Sim   International Journal of Arts and Sciences, v.6, no.3, pp.797-818
Conference
2014 Performance Evaluation for an Inter Vehicle Communication System based on WAVE Technology   Yoo-Seung Song   International Symposium on Embedded Technology (ISET) 2014, pp.1-2
Conference
2014 Adaptive GUI Reconfiguration Mechanism for Mobile Learning Devices   Choongbum Park   International Symposium on Embedded Technology (ISET) 2014, pp.1-5
Journal
2013 Mobile Malware Detection Using Correlational Analysis   Seungyong Yoon   International Journal of Advancements in Computing Technology, v.5, no.16, pp.52-58
Journal
2013 The Design of Vulnerability Management System   GeonLyang Kim   International Journal of Computer Science and Network Security, v.13, no.4, pp.19-25