Showing results 2521 to 2540 of 4162
RETHINKING ENERGY-PERFORMANCE TRADE-OFF in Mobile Web Page Loading Bui, Hoang Duc; Liu, Yunxin; Kim, Hyosu; Shin, Insik; Zhao, Feng, MOBILE COMPUTING AND COMMUNICATIONS REVIEW, v.20, no.2, pp.39 - 42, 2016-04 |
Retinal Blood Vessel Caliber Estimation for Optical Coherence Tomography Angiography Images Based on 3D Superellipsoid Modeling Han, Myounghee; Kim, Yongjoo; Park, Jang Ryul; Vakoc, Benjamin J.; Oh, Wang-Yuhl; Ryu, Sukyoung, INTERNATIONAL JOURNAL OF IMAGE AND GRAPHICS, v.19, no.2, 2019-04 |
A Retransmission-Enhanced Duty-Cycle MAC Protocol Based on the Channel Quality for Wireless Sensor Networks Kweon, Kisuk; Lee, Hanjin; Yoon, Hyunsoo, IEICE Transactions on Communications, Vol.E93-B, No.11, pp.3156-3160, 2010-11 |
Retrofitting the Partially Privileged Mode for TEE Communication Channel Protection Jang, Jinsoo; Kang, Brent Byunghoon, IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, v.17, no.5, pp.1000 - 1014, 2018-05 |
Reusability Enhancement by Using Flexible Topology Architecture for Network Management System Lee, Heewon; Hwang, Chankyou; Yoo, Jaehyoung; Choi, Ho-Jin; Kang, Sungwon; Lee, Danhyung, Studies in Computational Intelligence, v.131, pp.131 - 145, 2008 |
Reverse Nearest Neighbor Queries in Fixed Dimension Cheong, Otfried; Vigneron, Antoine; Yon, Juyoung, INTERNATIONAL JOURNAL OF COMPUTATIONAL GEOMETRY APPLICATIONS, v.21, no.2, pp.179 - 188, 2011-04 |
Reverse nearest neighbor search with a non-spatial aspect Park, Jeong Hoon; Chung, Chin-Wan; Kang, U, INFORMATION SYSTEMS, v.54, pp.92 - 112, 2015-12 |
Reversible data hiding exploiting spatial correlation between sub-sampled images Kim, Kyung-Soo; Lee, Min-Jeong; Lee, Hae-Yeoun; Lee, Heung-Kyu, PATTERN RECOGNITION, v.42, pp.3083 - 3096, 2009-11 |
Review of machine learning methods in soft robotics Kim, Daekyum; Kim, Sang-Hun; Kim, Taekyoung; Kang, Brian Byunghyun; Lee, Minhyuk; Park, Wookeun; Ku, Subyeong; et al, PLOS ONE, v.16, no.2, pp.e0246102, 2021-02 |
Revisiting Binary Code Similarity Analysis using Interpretable Feature Engineering and Lessons Learned Kim, Dongkwan; Kim, Eunsoo; Cha, Sang Kil; Son, Sooel; Kim, Yongdae, IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, v.49, no.4, pp.1661 - 1682, 2023-04 |
Revisiting Shared Cache Contention Problems: A Practical Hardware-Software Cooperative Approach Pak, Eun-Ji; Kim, Sang-Hoon; Huh, Jae-Hyuk; Maeng, Seung-Ryoul, IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E96D, no.7, pp.1457 - 1466, 2013-07 |
Reviving Delay-based TCP for Data Centers Lee, Chang-Hyun; Jang, Keon; Moon, Sue-Bok, COMPUTER COMMUNICATION REVIEW, v.42, no.4, pp.111 - 112, 2012-10 |
RFID Data Processing in Supply Chain Management Using a Path Encoding Scheme Lee, Chun-Hee; Chung, Chin-Wan, IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, v.23, no.5, pp.742 - 758, 2011-05 |
RFID와 USN 통합 인프라스트럭처를 위한 EPC 센서 네트워크 성종우; 김대영, 한국통신학회논문지, v.23, no.12, pp.37 - 46, 2006-12 |
RGB-D 이미지를 활용한 CNN 기반 실시간 파지점 탐색 김수지; 최성희, 정보과학회 컴퓨팅의 실제 논문지, v.26, no.2, pp.116 - 121, 2020-02 |
Rhythmic-motion synthesis based on motion-beat analysis Kim, TH; Park, SI; Shin, Sung-Yong, ACM TRANSACTIONS ON GRAPHICS, v.22, no.3, pp.392 - 401, 2003-07 |
Rigorous Rental Memory Management for Embedded Systems Jeong, Jinkyu; Kim, Hwanju; Hwang, Jeaho; Lee, Joonwon; Maeng, SeungRyoul, ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, v.12, 2013-03 |
The ring authenticated encryption scheme – How to provide a clue wisely Lv, Jiqiang; Ren, Kui; Chen, Xiaofeng; Kim, Kwangjo, Information Sciences, Vol.179, pp.161-168, 2009 |
Ring embedding in faulty star graphs Chang, JH; Shin, CS; Chwa, Kyung Yong, IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, v.E82A, no.9, pp.1953 - 1964, 1999-09 |
RM-MAC: a reservation based multi-channel MAC protocol for wireless sensor networks Pyeon, Dohoo; Jang, Ingook; Yoon, Hyunsoo; Kim, Dongwook, WIRELESS NETWORKS, v.22, no.8, pp.2727 - 2739, 2016-11 |
Discover