ETRI-Knowledge Sharing Plaform

KOREAN
논문 검색
Type SCI
Year ~ Keyword

Search Results

Showing 37501-37510 of 42,135.

Display
논문 검색결과
Type Year Title Cited Download
Journal
2010 Performance Analysis of Dynamic Spectrum Allocation in Heterogeneous Wireless Networks   Jeounglak Ha   ETRI Journal, v.32, no.2, pp.292-301 8 원문
Journal
2015 A Transparent Visuo-haptic Input Device with Optical Waveguide based Thin Film Display, Sensor and Surface Actuator   Bong Je Park   Sensors and Actuators A : Physical, v.233, pp.47-53 8
Conference
2015 Reliable Continuous Object Tracking with Cost Effectiveness in Wireless Sensor Networks   Seungwoo Hong   International Conference on Ubiquitous and Future Networks (ICUFN) 2015, pp.672-676 8
Conference
2015 A Novel Hierarchical Detection Method for Enhancing Anomaly Detection Efficiency   Eunhye Kim   International Conference on Communication Systems and Computing Application Science (CSCAS) 2015, pp.1-5 8
Journal
2015 Analysis of Quasistatic Magnetic Field Penetration into Multiple Slits in a Conducting Plane Loaded With a Ferrite Sheet   Hyun Ho Park  IEEE Transactions on Electromagnetic Compatibility, v.57, no.2, pp.210-215 8
Journal
2015 Compactly Packaged Monolithic Four-Wavelength VCSEL Array with 100-GHz Wavelength Spacing for Future-Proof Mobile Fronthaul Transport   Eun-Gu Lee   Optics Express, v.23, no.1, pp.284-291 8 원문
Journal
2015 Design of a dual‐polarised small base station antenna with a metallic isolator for micro‐cell systems   Jung-Nam Lee   IET Microwaves, Antennas and Propagation, v.9, no.10, pp.1080-1086 8
Journal
2015 Improving Routing Table Lookup in Software Routers   HyunYong Lee   IEEE Communications Letters, v.19, no.6, pp.957-960 8
Journal
2015 NLOS Path Loss Model for Low-Height Antenna Links in High-Rise Urban Street Grid Environments   Juyul Lee   International Journal of Antennas and Propagation, v.2015, pp.1-10 8 원문
Conference
2015 Effects of Contextual Properties on Users' Privacy Preferences in Mobile Computing Environments   Seung-Hyun Kim   International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) 2015, pp.507-514 8