Showing 38871-38880 of 41,534.
| Type | Year | Title | Cited | Download |
|---|---|---|---|---|
|
Conference
|
2012 | Security-Enhanced Key Establishment Schemes Using Network Coding You Sung Kang International Conference on Computing and Convergence Technology (ICCCT) 2012, pp.1056-1061 | ||
|
Conference
|
2012 | WiP Abstract: From Design to Operation of a Large-Scale CPS Won-Tae Kim International Conference on Cyber-Physical Systems (ICCPS) 2012, pp.215-215 | 5 | |
|
Conference
|
2014 | A Fast Electromagnetic Solver for Microwave Medical Imaging Nikolai Simonov International Microwave Workshop Series on RF and Wireless Technologies for Biomedical and Healthcare Applications (IMWS-Bio) 2014, pp.1-3 | 3 | |
|
Conference
|
2014 | A Safer Way to Share a Car based on SNS to Increase Use Efficiency of Released Vehicles Myunghee Son International Carnahan Conference on Security Technology (ICCST) 2014, pp.1-6 | 0 | |
|
Conference
|
2014 | A Whitebox Cryptography Application for Mobile Device Security against Whitebox Attacks - How to Apply WBC on Mobile Device Jong-Yeon Park International Conference on IT Convergence and Security (ICITCS) 2014, pp.1-4 | 3 | |
|
Conference
|
2014 | Adaptive Self-Similarity based Image Super-Resolution using Non Local Means Ji-Hoon Choi Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC) 2014, pp.1-5 | 2 | |
|
Conference
|
2014 | An Equivalent Circuit Model for GaN-based MIM Capacitor Sang-Heung Lee International Symposium on Advanced and Applied Convergence (ISAAC) 2014, pp.1-4 | ||
|
Conference
|
2014 | An Optimized Support Vector Machine Classifier to Extract Abnormal Features from Breast Microwave Tomography Data Samaneh Aminikhanghahi Research in Adaptive and Convergent Systems (RACS) 2014, pp.111-115 | 4 | |
|
Conference
|
2014 | Analysis of Mobile Malware based on User Awareness Youngho Kim Conference on Research in Information Technology (RIIT) 2014, pp.51-51 | 0 | |
|
Conference
|
2014 | Analysis of the Communications of Sleepy Nodes in Constrained Node Networks YongGeun Hong International Industrial Information Systems Conference (IIISC) 2014, pp.121-124 |