Showing results 1661 to 1680 of 4139
Identifying Crime-prone Areas Based on Tweet Sentiments Kim, Jaewoo; Cha, Meeyoung; Lee, Won Jae; Sandholm, Thomas, TELECOMMUNICATIONS REVIEW, v.24, no.3, pp.339 - 347, 2014-06 |
Identifying helpful reviews based on customer's mentions about experiences Min, Hye-Jin; Park, Jong Cheol, EXPERT SYSTEMS WITH APPLICATIONS, v.39, no.15, pp.11830 - 11838, 2012-11 |
Identity-based chameleon hashing and signatures without key exposure Chen, Xiaofeng; Zhang, Fangguo; Susilo, Willy; Tian, Haibo; Li, Jin; Kim, Kwangjo, INFORMATION SCIENCES, v.265, pp.198 - 210, 2014-05 |
IEEE 802.11b WLAN performance with variable transmission rates: In view of high level throughput Kim, N; Choi, S; Yoon, Hyunsoo, NETWORKING - ICN 2005, PT 2 Book Series: LECTURE NOTES IN COMPUTER SCIENCE, v.3421, pp.1080 - 1087, 2005 |
IEEE 802.11b WLAN Performance with Variable Transmission Rates: In View of High Level Throughput Kim, Namgi; Choi, Sunwoong; Yoon, Hyunsoo, Lecture Notes in Computer Science, Volume 3421/2005, 1080-1087, 2005-04 |
IEEE-1394 버스의 가용 등시성 대역폭을 활용하기 위한 대역폭 훔치기와 ABR-1394 전송모드 강성일; 이윤직; 이흥규; 강성봉, 한국정보처리학회논문지, v.6, no.6, pp.1609 - 1621, 1999-06 |
IEEE-1394 직렬 버스를 이용한 화상 전화 시스템의 구현 강성일; 편기현; 이충훈; 이흥규; 강성봉, 정보과학회논문지 : 컴퓨팅의 실제 및 레터, v.5, no.3, pp.351 - 369, 1999-06 |
IEEE1394/UPnP software bridge Kim, D; Park, JH; Yevgen, P; Moon, K; Lee, Young-Hee, IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, v.51, no.1, pp.319 - 323, 2005-02 |
ILoA: Indoor Localization Using Augmented Vector of Geomagnetic Field Lee, Sangjae; Chae, SeungWoo; Han, Dong-Soo, IEEE ACCESS, v.8, pp.184242 - 184255, 2020-10 |
IMAGE ENCODING SCHEME IN AN EDGE FIELD WITH THE LAPLACIAN OPERATOR Lee, Geehyuk; KIM, DW; HAN, SB; Kim, Soo Yong, OPTICAL ENGINEERING, v.34, no.1, pp.90 - 101, 1995-01 |
IMAGE GENERATION BY BLASCHKE PRODUCTS IN THE UNIT DISK KIM, HS; Kim, Hong Oh; Shin, Sung-Yong, COMPUTERS GRAPHICS, v.17, no.4, pp.489 - 494, 1993 |
Image Metamorphosis With Scattered Feature Constraints Chwa, Kyung Yong, IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS, v.2, no.4, pp.337 - 354, 1996-12 |
Image Morphing S.Y.Shin; H.K.Kim; S.Y.Lee, MAGAZINE OF THE KITE, v.23, no.6, pp.648 - 658, 1996 |
Image morphing using deformation techniques Lee, SY; Chwa, Kyung Yong; Hahn, J; Shin, Sung-Yong, JOURNAL OF VISUALIZATION AND COMPUTER ANIMATION, v.7, no.1, pp.3 - 23, 1996 |
Image Recapture Prevention Using Secure Display Schemes on Polarized 3D System Ji, Sang-Keun; Lee, Heung-Kyu, IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, v.29, no.8, pp.2296 - 2309, 2019-08 |
Image Watermarking Resistant to Geometric Attack Combined with Removal Attack Lee, Choong-Hoon; Lee, Heung-Kyu; Suh, Youngho, INTERNATIONAL JOURNAL OF IMAGE AND GRAPHICS, v.5, no.1, pp.37 - 65, 2005-01 |
Image watermarking scheme using visual model and BN distribution Kim, SW; Suthaharan, S; Lee, Heung-Kyu; Rao, KR, ELECTRONICS LETTERS, v.35, no.3, pp.212 - 214, 1999-02 |
Image-based acquisition and modeling of polarimetric reflectance Baek, Seung-Hwan; Zeltner, Tizian; Ku, Hyun Jin; Hwang, Inseung; Tong, Xin; Jakob, Wenzel; Kim, Min Hyuk, ACM TRANSACTIONS ON GRAPHICS, v.39, no.4, 2020-07 |
Image-Based Lifelogging: User Emotion Perspective Bum, Junghyun; Choo, Hyunseung; Whang, Joyce Jiyoung, CMC-COMPUTERS MATERIALS & CONTINUA, v.67, no.2, pp.1963 - 1977, 2021-02 |
Impact of Emerging Hardware on Security and Privacy Jaeger, Trent; Kang, Brent ByungHoon; Mentens, Nele; Sturton, Cynthia, IEEE SECURITY & PRIVACY, v.21, no.3, pp.6 - 7, 2023-05 |
Discover