Showing 5091-5100 of 42,123.
| Type | Year | Title | Cited | Download |
|---|---|---|---|---|
|
Conference
|
2003 | Design of integrated gateway systems configuration for wireless-Internet service in cdma2000 and W-CDMA Soon-Choul Kim IEEE Topical Conference on Wireless Communication Technology 2003, pp.109-112 | 1 | |
|
Conference
|
2003 | Secure sharing method for a secret binary image and its reconstruction system Sang-Su Lee International Conference on Control, Automation and Systems (ICCAS) 2003, pp.1240-1243 | ||
|
Conference
|
2003 | Development of a Frame Buffer Driver for Embedded Linux Graphic System Ga-Gue Kim International Conference on Control, Automation and Systems (ICCAS) 2003, pp.5116-5120 | ||
|
Conference
|
2003 | Single Supply, High Linearity, High Efficient PHEMT Power Devices and Amplifier for 2 GHz & 5 GHz WLAN Applications Min Park European Microwave Conference (EuMC) 2003, pp.371-374 | 9 | |
|
Conference
|
2003 | Design of watermark trace-back system to supplement connection maintenance problem Hwan-Kuk Kim International Conference on Control, Automation and Systems (ICCAS) 2003, pp.2152-2154 | ||
|
Conference
|
2003 | Certificate Validation Service using XKMS for Computational Grid Namje Park ACM Workshop on XML Security (XMLSEC) 2003, pp.112-120 | 7 | |
|
Conference
|
2003 | Certificate Validation Scheme of Open Grid Service Usage XKMS Namje Park International Conference on Grid and Cooperative Computing (GCC) 2003 (LNCS 3032), pp.849-858 | 2 | |
|
Conference
|
2003 | Self-aligned microlens fabricated on the sidewall of 45°-angled optical fiber for NSOM illumination system Myun-Sik Kim IEEE LEOS International Conference on Optical MEMS 2003, pp.18-19 | 3 | |
|
Conference
|
2003 | Architecture Based Software Reengineering Approach for Transforming from Legacy System to Component Based System through Applying Design Patterns Jung Eun Cha International Conference on Software Engineering Research and Applications (SERA) 2003 (LNCS 3026), v.3026, pp.266-278 | 7 | |
|
Conference
|
2004 | Analysis and Countermeasure on Vulnerability of WPA Key Exchange Mechanism You Sung Kang International Conference on Information Networking (ICOIN) 2004 (LNCS 3090), v.3090, pp.915-924 | 1 |