Showing results 1661 to 1680 of 4134
IEEE 802.11b WLAN performance with variable transmission rates: In view of high level throughput Kim, N; Choi, S; Yoon, Hyunsoo, NETWORKING - ICN 2005, PT 2 Book Series: LECTURE NOTES IN COMPUTER SCIENCE, v.3421, pp.1080 - 1087, 2005 |
IEEE 802.11b WLAN Performance with Variable Transmission Rates: In View of High Level Throughput Kim, Namgi; Choi, Sunwoong; Yoon, Hyunsoo, Lecture Notes in Computer Science, Volume 3421/2005, 1080-1087, 2005-04 |
IEEE-1394 버스의 가용 등시성 대역폭을 활용하기 위한 대역폭 훔치기와 ABR-1394 전송모드 강성일; 이윤직; 이흥규; 강성봉, 한국정보처리학회논문지, v.6, no.6, pp.1609 - 1621, 1999-06 |
IEEE-1394 직렬 버스를 이용한 화상 전화 시스템의 구현 강성일; 편기현; 이충훈; 이흥규; 강성봉, 정보과학회논문지 : 컴퓨팅의 실제 및 레터, v.5, no.3, pp.351 - 369, 1999-06 |
IEEE1394/UPnP software bridge Kim, D; Park, JH; Yevgen, P; Moon, K; Lee, Young-Hee, IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, v.51, no.1, pp.319 - 323, 2005-02 |
ILoA: Indoor Localization Using Augmented Vector of Geomagnetic Field Lee, Sangjae; Chae, SeungWoo; Han, Dong-Soo, IEEE ACCESS, v.8, pp.184242 - 184255, 2020-10 |
IMAGE ENCODING SCHEME IN AN EDGE FIELD WITH THE LAPLACIAN OPERATOR Lee, Geehyuk; KIM, DW; HAN, SB; Kim, Soo Yong, OPTICAL ENGINEERING, v.34, no.1, pp.90 - 101, 1995-01 |
IMAGE GENERATION BY BLASCHKE PRODUCTS IN THE UNIT DISK KIM, HS; Kim, Hong Oh; Shin, Sung-Yong, COMPUTERS GRAPHICS, v.17, no.4, pp.489 - 494, 1993 |
Image Metamorphosis With Scattered Feature Constraints Chwa, Kyung Yong, IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS, v.2, no.4, pp.337 - 354, 1996-12 |
Image Morphing S.Y.Shin; H.K.Kim; S.Y.Lee, MAGAZINE OF THE KITE, v.23, no.6, pp.648 - 658, 1996 |
Image morphing using deformation techniques Lee, SY; Chwa, Kyung Yong; Hahn, J; Shin, Sung-Yong, JOURNAL OF VISUALIZATION AND COMPUTER ANIMATION, v.7, no.1, pp.3 - 23, 1996 |
Image Recapture Prevention Using Secure Display Schemes on Polarized 3D System Ji, Sang-Keun; Lee, Heung-Kyu, IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, v.29, no.8, pp.2296 - 2309, 2019-08 |
Image Watermarking Resistant to Geometric Attack Combined with Removal Attack Lee, Choong-Hoon; Lee, Heung-Kyu; Suh, Youngho, INTERNATIONAL JOURNAL OF IMAGE AND GRAPHICS, v.5, no.1, pp.37 - 65, 2005-01 |
Image watermarking scheme using visual model and BN distribution Kim, SW; Suthaharan, S; Lee, Heung-Kyu; Rao, KR, ELECTRONICS LETTERS, v.35, no.3, pp.212 - 214, 1999-02 |
Image-based acquisition and modeling of polarimetric reflectance Baek, Seung-Hwan; Zeltner, Tizian; Ku, Hyun Jin; Hwang, Inseung; Tong, Xin; Jakob, Wenzel; Kim, Min Hyuk, ACM TRANSACTIONS ON GRAPHICS, v.39, no.4, 2020-07 |
Image-Based Lifelogging: User Emotion Perspective Bum, Junghyun; Choo, Hyunseung; Whang, Joyce Jiyoung, CMC-COMPUTERS MATERIALS & CONTINUA, v.67, no.2, pp.1963 - 1977, 2021-02 |
Impact of Emerging Hardware on Security and Privacy Jaeger, Trent; Kang, Brent ByungHoon; Mentens, Nele; Sturton, Cynthia, IEEE SECURITY & PRIVACY, v.21, no.3, pp.6 - 7, 2023-05 |
Imperfect Shadow Maps for Efficient Computation of Indirect Illumination Ritschel, T.; Grosch, T.; Kim, Min Hyuk; Seidel, H. -P.; Dachsbacher, C.; Kautz, J., ACM TRANSACTIONS ON GRAPHICS, v.27, no.5, 2008-12 |
Impersonating-Resilient Dynamic Key Management for Large-Scale Wireless Sensor Networks Jeong, Gowun; Seo, Yong-Ho; Yang, Hyun-Seung, INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2013 |
IMPERSONATION ATTACK ON THE STRONG IDENTIFICATION BASED ON A HARD-ON-AVERAGE PROBLEM Koo, Bonwook; Kwon, Daesung; Lee, Jooyoung; Song, Jung Hwan, BULLETIN OF THE KOREAN MATHEMATICAL SOCIETY, v.47, no.1, pp.63 - 71, 2010-01 |
Discover