Conference
|
2020 |
De-identification and Restoration Methods for Protecting Privacy in Off-line Documents
Han Jin Hee International Conference on Information and Communication Technology Convergence (ICTC) 2020, pp.1543-1545 |
0 |
원문
|
Journal
|
2018 |
Efficient Texture Creation Based on Random Patches in Database and Guided Filter
Yoo Seok Bong IEICE Transactions on Information and Systems, v.E101-D, no.11, pp.2840-2843 |
2 |
원문
|
Journal
|
2018 |
Resource Allocation for NOMA-Based D2D Systems Coexisting With Cellular Networks
Yoon Tae Hyun IEEE Access, v.6, pp.66293-66304 |
52 |
원문
|
Journal
|
2017 |
Comparing the Performance of Indoor Localization Systems through the EvAAL Framework
Francesco Potorti Sensors, v.17, no.10, pp.1-28 |
76 |
원문
|
Conference
|
2017 |
NetAware: Network Architecture-Aware Reliability Management Schemes for Softwareized Network Systems
Sejun Song Conference on Network Softwarization (NetSoft) 2017, pp.1-5 |
0 |
원문
|
Journal
|
2016 |
Cost Effective Silica-Based 100 G DP-QPSK Coherent Receiver
Lee Seo Young ETRI Journal, v.38, no.5, pp.981-987 |
7 |
원문
|
Journal
|
2016 |
Data-Driven Kinematic Control for Robotic Spatial Augmented Reality System with Loose Kinematic Specifications
Lee Ahyun ETRI Journal, v.38, no.2, pp.337-346 |
14 |
원문
|
Conference
|
2015 |
Robust Authenticated Key Exchange Using Passwords and Identity-Based Signatures
Jung Yeon Hwang International Conference on Security Standardisation Research (SSR) 2015, v.9497, pp.43-69 |
4 |
원문
|
Journal
|
2014 |
Knowledge Reduction Information Retrieval Model in Pathology Medical Domain
Yoon Changwoo World Journal of Computer Application and Technology, v.2, no.5, pp.104-113 |
|
원문
|
Conference
|
2011 |
Task Allocation Strategy of Heterogeneous Multi-Robot for Indoor Surveillance
Jeon Seohyun International Conference on Ubiquitous Robots and Ambient Intelligence (URAI) 2011, pp.169-173 |
3 |
원문
|
Conference
|
2010 |
An Effective Defense Mechanism Against DoS/DDoS Attacks in Flow-based Routers
Park Pyung-Koo International Conference on Advances in Mobile Computing and Multimedia (MoMM) 2010, pp.442-446 |
6 |
원문
|
Conference
|
2007 |
A Novel Model-based Indoor Positioning using Signal Strength
Kamran Sayrafian-Pour International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC) 2007, pp.1-5 |
2 |
원문
|
Journal
|
2007 |
Efficient Verifier-based Password-authenticated Key Exchange in the Three-party Setting
권정옥 Computer Standards & Interfaces, v.29, no.5, pp.513-520 |
33 |
원문
|
Conference
|
2006 |
Forensic Analysis of Autonomous System Reachability
이동기 Workshop on Mining Network Data (MineNet) 2006, pp.335-340 |
0 |
원문
|
Conference
|
2006 |
Design of Multi-channel Telemetry Processing and Data Management of ROS in COMS SGCS
Kim Myungja AIAA International Communications Satellite Systems Conference (ICSSC) 2006, pp.282-288 |
|
|
Conference
|
2005 |
The Design and Implementation of Asset Management System on the NGIS
Park Choon Seo International Conference on Computer and Information Science (ICIS) 2005, pp.589-592 |
0 |
원문
|
Conference
|
2005 |
IMM algorithm based on the analytic solution of steady state Kalman filter for radar target tracking
Kim Byung Doo International Radar Conference 2005, pp.1-6 |
13 |
원문
|
Conference
|
2005 |
IPv6: No more Next Generation
Kim Yong-Woon International Conference on Advanced Communication Technology (ICACT) 2005, pp.8-11 |
|
원문
|
Conference
|
2004 |
On-Offline Efficent Management Through Virtual Information Storage-based Bussiness Model
Lee Kure-Chel 차세대 통신소프트웨어 학술 대회 (NCS) 2004, pp.429-431 |
|
|
Journal
|
2004 |
미국 텔레매틱스 서비스 및 사업 동향
Heo Pil Sun 주간기술동향, v.1170, pp.1-15 |
|
|
Conference
|
2002 |
Development of Authoring Tool Based on RDF for Metadata Management
조성훈 한국정보처리학회 학술 발표 대회 (추계) 2002, pp.2231-2234 |
|
|
Conference
|
2002 |
Adaptive blind channel identification under unit-norm constraint
Cho Juphil Asilomar Conference on Signals, Systems and Computers (ACSSC) 2002, pp.684-688 |
|
원문
|