Showing 7161-7170 of 42,135.
| Type | Year | Title | Cited | Download |
|---|---|---|---|---|
|
Conference
|
2008 | Sensor Data Management System in Sensor Network for Low Power Young Bag Moon International Conference on Advanced Communication Technology (ICACT) 2008, pp.504-507 | 1 | |
|
Conference
|
2008 | A User Friendly Internet Identity Management System Dae Seon Choi International Conference on Advanced Communication Technology (ICACT) 2008, pp.1163-1166 | 2 | |
|
Conference
|
2008 | Adaptive Channel Hopping Algorithm for Reader Anti-collision in RFID Systems Chi Young Ok International Conference on Advanced Communication Technology (ICACT) 2008, pp.90-94 | 7 | |
|
Conference
|
2008 | USN Standard and Technology Eun Sook Eun Ah Kim International Conference on Advanced Communication Technology (ICACT) 2008, pp.1415-1418 | 4 | |
|
Conference
|
2008 | A Study on Methods of MCID(Multimedia Caller IDentification) Supplementary Service Based on SIP Il Jin Lee International Conference on Advanced Communication Technology (ICACT) 2008, pp.1269-1272 | 0 | |
|
Conference
|
2008 | Analysis and Standardization Activity for Mobile Web Best Practice Sung Han Kim International Conference on Advanced Communication Technology (ICACT) 2008, pp.1747-1750 | 0 | |
|
Conference
|
2008 | Personalized Identity Agent for User-Centric IdM Seung-Hyun Kim International Conference on Advanced Communication Technology (ICACT) 2008, pp.1308-1313 | 2 | |
|
Conference
|
2008 | Address Structure for supporting Ubiquitous Networking using IPv6 Gyu Myoung Lee International Conference on Advanced Communication Technology (ICACT) 2008, pp.1088-1090 | 6 | |
|
Conference
|
2008 | Radio Access Network Fairly Distributing Multimedia Calls and Method Controlling Call Process Load Ji Soo Park International Conference on Advanced Communication Technology (ICACT) 2008, pp.473-477 | 0 | |
|
Conference
|
2008 | Inter-domain Socket Communications Supporting High Performance and Full Binary Compatibility on Xen Kang Ho Kim International Conference on Virtual Execution Environments (VEE) 2008, pp.11-20 | 101 |