Showing results 87161 to 87180 of 279500
Exploiting the speckle-correlation scattering matrix for a compact reference-free holographic image sensor Lee, KyeoReh; Park, Yong Keun, NATURE COMMUNICATIONS, v.7, pp.13359, 2016-10 |
Exploiting the Unicast Functionality of the On-Demand Multicast Routing Protocol Lee, Sung-Ju; Su, William; Gerla, Mario, The IEEE Wireless Communications & Networking Conference (WCNC 2000), IEEE, 2000-09-23 |
Exploiting Triangle Patterns for Heterogeneous Graph Attention Network Yi, Eunjeong; Kim, Min-Soo, 21st International Conference on Web Engineering, ICWE 2021, pp.71 - 81, Springer Science and Business Media Deutschland GmbH, 2021-05 |
Exploiting trustors as well as trustees in trust-based recommendation Hwang, Won-Seok; Li, Shaoyu; Kim, Sang-Wook; Choi, Ho-Jin, 22nd ACM International Conference on Conference on information & knowledge management, pp.1893 - 1896, ACM, 2013-10-29 |
Exploiting underutilized runtime bad blocks for improving solid state drive performance = SSD 성능 개선을 위한 저활용된 런타임 배드 블록 이용 기법link Moon, Junoh; Kim, Soontae; et al, 한국과학기술원, 2022 |
Exploiting Versions for On-line Data Warehouse Maintenance in MOLAP Servers Kang, HG; Chung, Chin-Wan, International Conference on VLDB, pp.742 - 753, Springer Verlag (Germany), 2002-08-20 |
Exploiting Water-Sensitive MOFs in Hollow Fiber Sorbent Architecture to Enable Energy-Efficient CO2 capture Lee, Young Hun; Koh, Dong-Yeun; Oh, Ban Suk, The 9th International Conference on Separation Science and Technology, KICHE, 2019-07-10 |
Exploiting web push notification features in third-party push services = 제 3자 푸시 서비스의 웹 푸시 알림 기능 공격link Kim, Hayeon; Shin, Insik; et al, 한국과학기술원, 2019 |
Exploiting WiFi Guard Band for Safeguarded ZigBee Chae, Yoon; Wang, Shuai; Kim, Song Min, Proceedings of the 16th ACM Conference on Embedded Networked Sensor Systems (ACM SenSys '18), ACM, 2018-11-06 |
Exploration and Exploitation in Complex Networks: The Influence of Interpersonal Network Structure Fang, Christina; Lee, Jeho; Schilling, Melissa A., Proceeding of KSMS, 2006, Korean Strategic Management Society, 2006 |
Exploration and Exploitation in Scale Free Networks Je Ho Lee, The 2007 Annual Meeting of the Academy of Management, 2007 |
Exploration and exploitation in the presence of network externalities Lee, Jongseok; Lee, Jeho; Lee, Habin, Institute for Operations Research and the Management Sciences, pp.306 - 314, The Korean Operations Research and Management Science Society, 2000 |
Exploration and Exploitation in the Presence of Network Externalities Lee, Jongseok; Lee, Jeho; Lee, Habin, MANAGEMENT SCIENCE, v.49, no.4, pp.553 - 570, 2003-04 |
Exploration and exploitation in the presence of network externalities : the role of power users = 네트워크 외부성과 기술선택link Lee, Jong-Seok; 이종석; et al, 한국과학기술원, 2003 |
Exploration and exploitation in virtual organizations : Is it a bad thing to lose hubs? = 가상조직의 구조와 조직학습 전략link Lee, Su-Yong; 이수용; et al, 한국과학기술원, 2008 |
Exploration and Exploitation: The Influence of Organizational Structure on Oganizational Learning Je Ho Lee, International Conference on Complex Systems, 2007 |
Exploration and Exploitation: The Influence of Organizational Structure on Organizational Learning Lee, Jeho; Fang, Christina; Schilling, Melissa A., KAIST BUSINESS SCHOOL WORKING PAPER SERIES, 2007-03 |
Exploration behavior of task-related attributes in uninformed reinforcement learning task = 강화학습 과제 시 인간의 과제 관련 정보 탐색 행동에 관한 모델 제시 및 뇌 신호 분석link Choung, Oh-hyeon; Jeong, Yong; et al, 한국과학기술원, 2017 |
Exploration driven by a medial preoptic circuit facilitates fear extinction in mice Shin, Anna; Ryoo, Jia; Shin, Kwanhoo; Lee, Junesu; Bae, Seohui; Kim, Dae-Gun; Park, Sae-Geun; et al, COMMUNICATIONS BIOLOGY, v.6, no.1, 2023-01 |
Exploration for Double-stranded RNA Interactome Evading Innate Immune Response Lee, Yong-Ki; Lee, NamSeok; Stephanie, Tan; Ku, Doyeong; Kim, Yoosik, 2023 KSBB Spring Meeting and International Symposium, pp.398, The Korean Society of Biotechnology and Bioengineering, 2023-04-13 |
Discover