Showing results 87321 to 87340 of 109618
Truck Backer-Upper Control Using Genetic Algorithm Lee, Soo-Young, International Conference on Neural Information Processing, pp.1883 - 1888, 1994 |
True nonvolatile analog memory cell using coupling-charge balancing Kim, Kyu-hyoun; Lee, Kwyro, Proceedings of the 1996 IEEE International Solid-State Circuits Conference, v.39, pp.268 - 269, 1996-02-08 |
True Risk Bounds for the Regression of Real-Valued Functions Kil, Rhee Man, IJCNN, 2003 |
True Temporal Resolution TWIST Imaging using Annihilating Filter-based Low-rank wrap around Hankel Matrix Cha, Eunju; Jin, Kyong Hwan; Kim, Eung Yeop; Ye, Jong Chul, The International Society for Magnetic Resonance in Medicine, ISMRM, 2017-04 |
Truncated acoustic black hole structure with the optimized tapering shape and damping coating Ih, Jeong Guon; Kim, Mi Seong; Lee, Ik Jin; Jensen, Jakob S, Inter-Noise 2016, InterNoise, 2016-08-22 |
Truncated adaptive transmission in cdma2000 multicarrier downlink Sang-Wu Kim, IEEE Int. Conf. on Thrid Generation Wireless Communications, 2000 |
Truncated cone shaped epitaxial growth using monocrystalline shadow mask and its application to surface emission LED Park Eun-Hyun; Kwon, Young Se, Proceedings of the 1999 Pacific Rim Conference on Lasers and Electro-Optcis (CLEO/PACIFIC Rim '99), v.2, pp.316 - 317, 1999-08-30 |
Truncated power adaptation in mobile multimedia CDMA Sang-Wu Kim, International Workshop on Mobile Multimedia Communications, pp.443 - 446, 1997 |
Truncated power adaptation in multicarrier CDMA downlink Kim H.J.; Kim S.W., 2005 NPRA Annual Meeting, pp.111 - 116, 2005-03-13 |
Truncated power control in code division multiple access communications Kim Sang Wu; Goldsmith Andrea, Proceedings of the 1997 IEEE Global Telecommunications Conference. Part 2 (of 3), pp.1488 - 1493, IEEE, 1997-11-03 |
Trust and Equity Theory in Prisoner's Dilemma Jung, Eun-Soo; Kim, Bo-Kyeong; Lee, Soo-Young, 19th International Conference on Neural Information Processing, ICONIP 2012, pp.560 - 567, United Development Company PSC (UDC), 2012-11 |
Trust evaluation model for wireless sensor networks Hurt, J.; Lee, Y.; Yoon, Hyunsoo; Choi, D.; Jin, S., 7th International Conference on Advanced Communication Technology, ICACT 2005, pp.491 - 496, Springer Verlag (Germany), 2005-02-21 |
Trust Games for Secure Routing in Wireless Sensor Network 김세헌, Conference paper and presentation @ CISC, 2007-12 |
Trust management for user-centric identity management on the Internet Choi, D.; Jin, S.-H.; Yoon, Hyunsoo, 2007 IEEE International Symposium on Consumer Electronics, ISCE, pp.629 - 683, IEEE, 2007-06-20 |
“Trust me, I have a Ph.D.”: A propensity score analysis on the halo effect of disclosing one’s offline social status in online communities Park, Kunwoo; Kwak, Haewoon; Song, Hyunho; Cha, Meeyoung, 14th International Conference on Web and Social Media (ICWSM-2020), The International Conference on Web and Social Media, 2020-06-09 |
Trust ME: a Trust Decision Framework for Mobile Environments Huerta, G; Lee, DongMan; Han, Seon Yeong, IEEE TrustCom 2011, IEEE Computer Society, 2011-11-16 |
Trust Region Sequential Variational Inference Kim, Geon-Hyeong; Jang, Youngsoo; Lee, Jongmin; Jeon, Wonseok; Yang, Hongseok; Kim, Kee-Eung, Conference on Asian Conference on Machine Learning (ACML 2019), Asian Conference on Machine Learning, 2019-11-19 |
Trust Visualization for Object Management in Internet of Things Oh, Hyeontaek; An, Sanghong; Yang, Jinhong; Choi, Jun Kyun, 2016 IEEE 5th Global Conference on Consumer Electronics (GCCE), 2016 IEEE 5th Global Conference on Consumer Electronics (GCCE), 2016-10-11 |
Trust-Based Secure Aggregation in Wireless Sensor Networks Hur, J; Lee, Y; Hong, S; Yoon, Hyunsoo, 3rd International Conference on Computing, Communications and Control Technologies (CCCT'05), pp.1 - 6, CCCT'05 (International Conference on Computing, Communications and Control Technologies), 2005-07 |
Trustworthy Distributed Computing on Social Networks Mohaisen, Abedelaziz; Tran, Huy; Chandra, Abhishek; Kim, Yongdae, 8th ACM Symposium on Information, Computer and Communications Security, pp.155 - 160, ACM Special Interest Group on Security, Audit and Control (SIGSAC), 2013-05-08 |
Discover