ETRI-Knowledge Sharing Plaform

KOREAN
논문 검색
Type SCI
Year ~ Keyword

Search Results

Showing 29911-29920 of 40,960.

Display
논문 검색결과
Type Year Title Cited Download
Conference
2008 Ranging Supporting MAC with GTS based on IEEE 802.15.4a   Cheol Hyo Lee   International Conference on Computers, Communications and Systems (ICCCS) 2008, pp.1-4
Conference
2008 An Architecture of Unknown Attack Detection System against Zero-day Worm   Ik Kyun Kim   International Conference on Applied Computer Science (ACS) 2008, pp.205-211
Conference
2008 A Study on Target Market Selection for Mobile WiMAX Deployment   Jeong Tae Kim   International Conference on Computers, Communications and Systems (ICCCS) 2008, pp.1-5
Conference
2008 Forensic Index Search of Large Scale Digital Evidences   Su Hyung Jo   International Conference on Computers, Communications and Systems (ICCCS) 2008, pp.1-4
Conference
2008 The Service-Oriented SLA Management System Development in the VPN Service   Hyun-Chul Kang   International Conference on Computer Applications in Industry and Engineering (CAINE)2008, pp.1-5
Conference
2008 An Efficient Multi-hash Pattern Matching Scheme for Intrusion Detection in FPGA-based Reconfiguring Hardware   Byoung Koo Kim   International Conference on Applied Computer Science (ACS) 2008, pp.199-204
Conference
2008 Wireless Body Area Network in a Ubiquitous Healthcare System for Physiological Signal Monitoring and Health Consulting   Joon Young Jung   International Conference on Future Generation Communication and Networking (FGCN) 2008, pp.1-8
Conference
2008 Recognition of Voice and Hand Activities Through Fusion of Acceleration and Speech   Young-Giu Jung   International Conference on Semantic and Digital Media Technologies (SAMT) 2008, pp.67-74
Journal
2009 Multi-Hash based Pattern Matching Mechanism for High-Performance Intrusion Detection   Byoung Koo Kim   International Journal of Computers, v.3, no.1, pp.115-124
Journal
2008 H/W based Stateful Packet Inspection using a Novel Session Architecture   Seung Yong Yoon   International Journal of Computers, v.3, no.2, pp.310-319