Browse "School of Computing(전산학부)" by Type Article

Showing results 1661 to 1680 of 4134

1661
IEEE 802.11b WLAN performance with variable transmission rates: In view of high level throughput

Kim, N; Choi, S; Yoon, Hyunsoo, NETWORKING - ICN 2005, PT 2 Book Series: LECTURE NOTES IN COMPUTER SCIENCE, v.3421, pp.1080 - 1087, 2005

1662
IEEE 802.11b WLAN Performance with Variable Transmission Rates: In View of High Level Throughput

Kim, Namgi; Choi, Sunwoong; Yoon, Hyunsoo, Lecture Notes in Computer Science, Volume 3421/2005, 1080-1087, 2005-04

1663
IEEE-1394 버스의 가용 등시성 대역폭을 활용하기 위한 대역폭 훔치기와 ABR-1394 전송모드

강성일; 이윤직; 이흥규; 강성봉, 한국정보처리학회논문지, v.6, no.6, pp.1609 - 1621, 1999-06

1664
IEEE-1394 직렬 버스를 이용한 화상 전화 시스템의 구현

강성일; 편기현; 이충훈; 이흥규; 강성봉, 정보과학회논문지 : 컴퓨팅의 실제 및 레터, v.5, no.3, pp.351 - 369, 1999-06

1665
IEEE1394/UPnP software bridge

Kim, D; Park, JH; Yevgen, P; Moon, K; Lee, Young-Hee, IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, v.51, no.1, pp.319 - 323, 2005-02

1666
ILoA: Indoor Localization Using Augmented Vector of Geomagnetic Field

Lee, Sangjae; Chae, SeungWoo; Han, Dong-Soo, IEEE ACCESS, v.8, pp.184242 - 184255, 2020-10

1667
IMAGE ENCODING SCHEME IN AN EDGE FIELD WITH THE LAPLACIAN OPERATOR

Lee, Geehyuk; KIM, DW; HAN, SB; Kim, Soo Yong, OPTICAL ENGINEERING, v.34, no.1, pp.90 - 101, 1995-01

1668
IMAGE GENERATION BY BLASCHKE PRODUCTS IN THE UNIT DISK

KIM, HS; Kim, Hong Oh; Shin, Sung-Yong, COMPUTERS GRAPHICS, v.17, no.4, pp.489 - 494, 1993

1669
Image Metamorphosis With Scattered Feature Constraints

Chwa, Kyung Yong, IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS, v.2, no.4, pp.337 - 354, 1996-12

1670
Image Morphing

S.Y.Shin; H.K.Kim; S.Y.Lee, MAGAZINE OF THE KITE, v.23, no.6, pp.648 - 658, 1996

1671
Image morphing using deformation techniques

Lee, SY; Chwa, Kyung Yong; Hahn, J; Shin, Sung-Yong, JOURNAL OF VISUALIZATION AND COMPUTER ANIMATION, v.7, no.1, pp.3 - 23, 1996

1672
Image Recapture Prevention Using Secure Display Schemes on Polarized 3D System

Ji, Sang-Keun; Lee, Heung-Kyu, IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, v.29, no.8, pp.2296 - 2309, 2019-08

1673
Image Watermarking Resistant to Geometric Attack Combined with Removal Attack

Lee, Choong-Hoon; Lee, Heung-Kyu; Suh, Youngho, INTERNATIONAL JOURNAL OF IMAGE AND GRAPHICS, v.5, no.1, pp.37 - 65, 2005-01

1674
Image watermarking scheme using visual model and BN distribution

Kim, SW; Suthaharan, S; Lee, Heung-Kyu; Rao, KR, ELECTRONICS LETTERS, v.35, no.3, pp.212 - 214, 1999-02

1675
Image-based acquisition and modeling of polarimetric reflectance

Baek, Seung-Hwan; Zeltner, Tizian; Ku, Hyun Jin; Hwang, Inseung; Tong, Xin; Jakob, Wenzel; Kim, Min Hyuk, ACM TRANSACTIONS ON GRAPHICS, v.39, no.4, 2020-07

1676
Image-Based Lifelogging: User Emotion Perspective

Bum, Junghyun; Choo, Hyunseung; Whang, Joyce Jiyoung, CMC-COMPUTERS MATERIALS & CONTINUA, v.67, no.2, pp.1963 - 1977, 2021-02

1677
Impact of Emerging Hardware on Security and Privacy

Jaeger, Trent; Kang, Brent ByungHoon; Mentens, Nele; Sturton, Cynthia, IEEE SECURITY & PRIVACY, v.21, no.3, pp.6 - 7, 2023-05

1678
Imperfect Shadow Maps for Efficient Computation of Indirect Illumination

Ritschel, T.; Grosch, T.; Kim, Min Hyuk; Seidel, H. -P.; Dachsbacher, C.; Kautz, J., ACM TRANSACTIONS ON GRAPHICS, v.27, no.5, 2008-12

1679
Impersonating-Resilient Dynamic Key Management for Large-Scale Wireless Sensor Networks

Jeong, Gowun; Seo, Yong-Ho; Yang, Hyun-Seung, INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2013

1680
IMPERSONATION ATTACK ON THE STRONG IDENTIFICATION BASED ON A HARD-ON-AVERAGE PROBLEM

Koo, Bonwook; Kwon, Daesung; Lee, Jooyoung; Song, Jung Hwan, BULLETIN OF THE KOREAN MATHEMATICAL SOCIETY, v.47, no.1, pp.63 - 71, 2010-01

Discover

Type

. next

Open Access

Date issued

. next

Subject

. next

rss_1.0 rss_2.0 atom_1.0