Showing results 125741 to 125760 of 201895
Rule-based finite element modeling system Choi, Chang Koon; Paik Jong-Gyun, Proceedings of the Asian Pacific Conference on Computational Mechanics, pp.1217 - 1221, 1991-12-11 |
RULE-BASED MODULE LAYOUT SYNTHESIS. Park H.C.; Kim Y.C.; Hong Y.S.; Kim, Myunghwan; Park K.H., Proceedings - TENCON 87: 1987 IEEE Region 10 Conference, 'Computers and Communications Technology Toward 2000'., pp.759 - 763, IEEE, 1987-08 |
Rule-based multi-scale simulation for drug effect pathway analysis![]() Hwang, Woochang; Hwang, Yongdeuk; Lee, Sunjae; Lee, Doheon, BMC MEDICAL INFORMATICS AND DECISION MAKING, v.13, no.sup.1, 2013-04 |
Rule-based Obstacle Avoidence in the Control of Off-Road Vehicles Kim, JinHyung; Eckhardt, W., Proceedings of the Artificial Intelligence Conference, v.0, no.0, pp.0 - 0, 1983-04 |
Rule-based Segmentation by the Integration of Edge Deection and Region Growing Park, Kyu Ho; Lee, H.M.; Byun, Y.J.; Cho, B.L.; Kim, M.H., International Symposium on Electronics Engineering, pp.109 - 113, 1985 |
RUMEN BACTERIA MUTANT AND A PROCESS FOR PREPARING SUCCININC ACID EMPLOYING THE SAME 이상엽; 이상준, 2009-01-27 |
Rumen 미생물을 이용한 주방폐기물 혐기성소화의 효율증진 방안 신항식; 송영채; 손성섭; 배병욱, 한국유기성폐자원학회지, v.1, no.1, pp.103 - 113, 1993-01 |
Rumor Detection over Varying Time Windows![]() Kwon, Sejeong; Cha, Meeyoung; Jung, Kyomin, PLOS ONE, v.12, no.1, 2017-01 |
Rumor Source Detection under Querying with Untruthful Answers Choi, Jaeyoung; Moon, Sangwoo; Woo, Jiin; Son, Kyounghwan; Shin, Jinwoo; Yi, Yung, IEEE Conference on Computer Communications (IEEE INFOCOM), IEEE Communications Society, 2017-05-04 |
Rumor Source Detection: Power of Protector Choi, Jaeyoung; Moon, Sangwoo; Shin, Jinwoo; Yi, Yung, International School and Conference on Network Science 2016, Network Science Society, 2016-06-01 |
Rumor Source Detection: Power of Querying Moon, Sangwoo; Choi, Jaeyoung; Shin, Jinwoo; Yi, Yung, International School and Conference on Network Science 2016, Network Science Society, 2016-06-02 |
Run Away If You Can: Persistent Jamming Attacks against Channel Hopping Wi-Fi Devices in Dense Networks Lee, Il-Gu; Choi, Hyunwoo; Kim, Yongdae; Shin, Seungwon; Kim, Myungchul, The 17th International Symposium on Research in Attacks, Intrusions and Defenses (RAID), RAID Committee, 2014-09-17 |
Run Length Coding의 엔트로피에 관한 연구 Song, Iickho; Ryu, H.G.; Kim, N.H.; Ann, S., 대한전자공학회 추계학술발표회, pp.29 - 31, 대한 전자 공학회, 1983-11 |
Run Your Visual-Inertial Odometry on NVIDIA Jetson: Benchmark Tests on a Micro Aerial Vehicle Jeon, Jinwoo; JUNG, SUNGWOOK; Lee, Eungchang; Choi, Duckyu; Myung, Hyun, 2021 International Conference on Robotics and Automation (ICRA), pp.14476 - 14483, IEEE, 2021-06-03 |
Run Your Visual-Inertial Odometry on NVIDIA Jetson: Benchmark Tests on a Micro Aerial Vehicle Jeon, Jinwoo; Jung, Sungwook; Lee, Eungchang; Choi, Duckyu; Myung, Hyun, IEEE ROBOTICS AND AUTOMATION LETTERS, v.6, no.3, pp.5332 - 5339, 2021-07 |
Run-length code 를 이용한 새로운 chain coding 알고리즘에 관한 연구 = A study on a new chain coding algorithm using run-length codeslink 이정환; Lee, Jeong-Hwan; et al, 한국과학기술원, 1986 |
Run-length code와 Hough Transform을 이용한 Vectorizer 김인중; 김진형, 제 7회 영상 처리 및 이해에 관한 워크샵, v.0, no.0, pp.53 - 58, 1995-02-01 |
Run-time Monitoring and Steering based on Formal Specifications Kannan, Sampath; Kim, Moonzoo; Lee, Insup; Sokolsky, Oleg; Viswanathan, Mahesh, Modeling Software System Structures in a Fastly Moving Scenario, Modeling Software System Structures in a Fastly Moving Scenario, 2000-06 |
Run-to-Run model parameter estimation of multi-step batch process based on history data analysis = 데이터 분석을 기반으로 한 다단회분공정에서의 Run-to-Run 모델 파라미터의 예측link Sim, Ye-Seul; 심예슬; et al, 한국과학기술원, 2014 |
Run-to-run overlay control of steppers in semiconductor manufacturing systems based on history data analysis and neural network modeling Park, Seong-Jin; Lee, Moon-Sang; Shin, Sung-Young; Cho, Kwang-Hyun; Lim, Jong-Tae; Cho, Bong-Su; Jei, Young-Ho; et al, IEEE TRANSACTIONS ON SEMICONDUCTOR MANUFACTURING, v.18, no.4, pp.605 - 613, 2005-11 |
Discover