Browse by Title 

Showing results 107501 to 107520 of 278615

107501
Identifying the white matter structural network of motor reserve in early Parkinson's disease

Kim, Yae Ji; Park, Chan Wook; Shin, Hye Won; Lee, Hye Sun; Kim, Yun Joong; Yun, Mijin; Lee, Phil Hyu; et al, PARKINSONISM & RELATED DISORDERS, v.102, pp.108 - 114, 2022-09

107502
Identifying traceability between feature model and software architecture in software product line using formal concept analysis

Satyananda, T.K.; Lee, Danhyung; Kang, Sungwon; Hashmi, S.I., 2007 International Conference on Computational Science and its Applications, ICCSA 2007, v.0, no.0, pp.380 - 386, IEEE, 2007-08-26

107503
Identifying Trajectories from Catch-up to Path Creation: Transition Process Model and Case Studies in Korea

Bae, Zong-Tae; Kim, Young-Bae; Jong H. Wi, 2010 7th Asialics International Conference , Asialics, 2010

107504
Identifying Unique Car Design Elements Among Car Brands for Evaluating Visual Significance

Hyun, Kyung Hoon; Lee, Ji-Hyun, 2014 Design Engineering Workshop (DEWS 2014): Design meets Engineering, The Design Society, 2014-11-20

107505
Identifying urban block type for environmental uses

박의윤; 김영철, 제8회 도시환경 EDISON SW활용 경진대회, pp.166 - 173, 과학기술정보통신부, 2019-01-25

107506
Identifying Urban Geometric Types as Energy Performance Patterns

OH, Minseok; KIM, Youngchul, ENERGY FOR SUSTAINABLE DEVELOPMENT, v.48, pp.115 - 129, 2019-02

107507
Identifying User Interests from Online Social Networks by Using Semantic Clusters Generated from Linked Data

Ko, Han-Gyu; Ko, In-Young; Kim, Taehun; Lee, Dongman; Hyun, Soon J., In proceedings of the 1st Workshop on Semantic Social Networks (SSN 2013), Co-located with ICWE 2013, pp.302 - 309, ICWE, 2013-07-08

107508
Identifying Users with Application-Specific Command Streams

Masri, Alaa El; Wechsler, Harry; Likarish, Peter; Kang, Brent Byunghoon, Twelfth Annual International Conference on Privacy, Security and Trust (PST 2014), IEEE, 2014-07-23

107509
Identifying, organising and exploring problem space for interaction design

Yoon, Wan Chul, 8th IFAC/IFIP/IFORS/IEA symposium on Human-machine systems, pp.81 - 86, IFAC, 2001-09

107510
Identigram/Watermark removal using cross-channel correlation

Park Jaesik; Tai, Yu-Wing; Kweon, In-So, 2012 IEEE Conference on Computer Vision and Pattern Recognition (CVPR 2012), IEEE(Computer Society), 2012-06

107511
Identity and Status: When Counterspeech Increases Hate Speech Reporting and Why

Kim, Jae Yeon; Sim, Jaeung; Cho, Daegon, INFORMATION SYSTEMS FRONTIERS, v.25, no.5, pp.1683 - 1694, 2023-10

107512
Identity Centric Management of Distributed User Created Content

Choi, D; Kim, S; Jin, S; Yeo, K; Yoon, Hyunsoo, International Ubiquitous Convergence Conference (IUC 2006), pp.263 - 267, 2006-12-07

107513
Identity Claims and Diffusion of Sustainability Report: Evidence from Korean Listed Companies, 2003-2010

Byun, Heejung; Kim, Tae-Hyun, JOURNAL OF BUSINESS ETHICS, v.140, no.3, pp.551 - 565, 2017-02

107514
Identity Frame as the Anchor of Interstate Conflicts: The Case of the United States-North Korea Denuclearization Negotiation

Park, Doyoun; Seo, Yongseok, INTERNATIONAL NEGOTIATION-A JOURNAL OF THEORY AND PRACTICE, v.27, no.2, pp.215 - 246, 2022-04

107515
Identity frame at metaphor layer as the driving force for nuclear strategy: The US nuclear strategy during the cold war

Park, Doyoun; Seo, Yongseok, FUTURES, v.152, 2023-09

107516
Identity of mouse IA-2 and PTP35 genes of the tyrosine phosphatase family, and their expression in neuroendocrine tissues

Suk, Kyoungho; Hwang, Dae-Yeon; Kim, Sunshin; Kim, Yun-Hee; Kim, Kyoung Ah; Seo, Yeon-Soo; Suh, Yeon-Lim; et al, DIABETES RESEARCH AND CLINICAL PRACTICE, v.50, no.1, pp.17 - 26, 2000-09

107517
Identity play : self-presentation and transformations in MMORPG = 아이덴티티 플레이 : MMORPG 아바타 커스터마이징에서 자기 표현과 변형link

Paik, Paul Chul-ho; 백철호; et al, 한국과학기술원, 2012

107518
Identity-aware face completion for face editing applications = 얼굴 보정 어플리케이션을 위한 고유성 보존 인페인팅link

Han, Sangeun; Kim, Junmo; et al, 한국과학기술원, 2021

107519
Identity-based chameleon hash scheme without key exposure

Chen, X.; Zhang, F.; Susilo, W.; Tian, H.; Li, J.; Kim, Kwangjo, 15th Australasian Conference on Information Security and Privacy, ACISP 2010, pp.200 - 215, ACISP 2010, 2010-07-05

107520
Identity-based chameleon hashing and signatures without key exposure

Chen, Xiaofeng; Zhang, Fangguo; Susilo, Willy; Tian, Haibo; Li, Jin; Kim, Kwangjo, INFORMATION SCIENCES, v.265, pp.198 - 210, 2014-05

rss_1.0 rss_2.0 atom_1.0