Showing results 1281 to 1300 of 4124
Efficient RFID authentication protocols based on pseudorandom sequence generators Lee, Jooyoung; Yeom, Yongjin, DESIGNS CODES AND CRYPTOGRAPHY, v.51, no.2, pp.195 - 210, 2009-05 |
Efficient Route Discovery for Reactive Routing Protocols with Lazy Topology Exchange and Condition Bearing Route Discovery Hoang, XuanTung; Ahn, Soyeon; Kim, Namhoon; Lee, Younghee, International Conference on Information Networking, 2004 |
Efficient route discovery for reactive routing protocols with lazy topology exchange and condition bearing route discovery Hoang, XT; Ahn, S; Kim, N; Lee, Young-Hee, INFORMATION NETWORKING: NETWORKING TECHNOLOGIES FOR BROADBAND AND MOBILE NETWORKS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.3090, pp.114 - 123, 2004 |
Efficient search in graph databases using cross filtering Lee, Chun-Hee; Chung, Chin-Wan, INFORMATION SCIENCES, v.286, pp.1 - 18, 2014-12 |
Efficient search strategy in structural analysis for handwritten mathematical expression recognition Rhee, Taik Heon; Kim, JinHyung, PATTERN RECOGNITION, v.42, no.12, pp.3192 - 3201, 2009-12 |
Efficient service discovery mechanism for wireless sensor networks Jung, Jaehoon; Lee, Seunghak; Kim, Namgi; Yoon, Hyunsoo, COMPUTER COMMUNICATIONS, v.31, no.14, pp.3292 - 3298, 2008-09 |
Efficient time-series subsequence matching using duality in constructing windows Moon, YS; Whang, Kyu-Young; Loh, WK, INFORMATION SYSTEMS, v.26, no.4, pp.279 - 293, 2001-06 |
An Efficient Tree-based Group Key Agreement using Bilinear Map Lee, Sangwon; Kim, Yongdae; Kim, Kwangjo; Ryu, Dae-Hyun, Lecture Notes in Computer Science, Vol.2846, pp.357-371, 2003 |
Efficient view sphere tessellation method based on halfedge data structure and quadtree Hwang, S.C.; Yang, Hyun-Seung, COMPUTERS & GRAPHICS , v.17, no.5, pp.575 - 581, 1993-09 |
Efficient Window Processing over Disordered Data Streams Kim, Hyeon-Gyu; Kang, Woo-Lam; Kim, Myoung Ho, IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E93D, no.3, pp.635 - 638, 2010-03 |
Egocentrically-stable discriminative stimulus-based spatial navigation in mice: implementation and comparison with allocentric cues Chun, Jinsung; Kim, Youngsoo; Choi, Jin Woo; Kim, Daesoo; Jo, Sungho, SCIENTIFIC REPORTS, v.9, 2019-04 |
Eigenvoice 병합을 이용한 연속 음성 인식 시스템의 고속 화자 적응 최동진; 오영환, 말소리, v.1, no.53, pp.140 - 153, 2005-03 |
Elastic learning rate on error backpropagation of online update Lee, TS; Choi, Ho-Jin, PRICAI 2004: TRENDS IN ARTIFICIAL INTELLIGENCE, PROCEEDINGS BOOK SERIES: LECTURE NOTES IN ARTIFICIAL INTELLIGENCE, v.3157, pp.272 - 281, 2004 |
Electric wheelchair control using head pose free eye-gaze tracker Nguyen, Q. X.; Jo, Sung-Ho, ELECTRONICS LETTERS, v.48, no.13, pp.750 - 752, 2012-06 |
Electronic funds transfer protocol using domain-verifiable signcryption scheme Seo, Moonseog; Kim, Kwangjo, INFORMATION SECURITY AND CRYPTOLOGY - ICISC99 BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.1787, pp.269 - 277, 2000-12 |
Electrothermal MEMS parallel plate rotation for single-imager stereoscopic endoscopes Jang, Kyung-Won; Yang, Sung-Pyo; Baek, Seung-Hwan; Lee, Min-Suk; Park, Hyeon-Cheol; Seo, Yeong-Hyeon; Kim, Min Hyuk; et al, OPTICS EXPRESS, v.24, no.9, pp.9667 - 9672, 2016-05 |
EMBA: An Efficient Multihop Broadcast Protocol for Asynchronous Duty-Cycled Wireless Sensor Networks Jang, In-Gook; Yang, Su-Ho; Yoon, Hyun-Soo; Kim, Dong-Wook, IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, v.12, no.4, pp.1640 - 1650, 2013-04 |
Embedded Implementation of MOD Algorithm with Image Fail-Safe for Autonomous Vehicles Kim, Jun-Yeong; Lee, Dong-Gyu; Lee, Shinjae; Kee, Seok, Cheol, Journal of Institute of Control, Robotics and Systems, v.25, no.2, pp.163 - 169, 2019-02 |
Embedding of rings in 2-D meshes and tori with faulty nodes Kim, JS; Maeng, SeungRyoul; Yoon, H, JOURNAL OF SYSTEMS ARCHITECTURE, v.43, no.9, pp.643 - 654, 1997-08 |
Embedding Trees into Recursive Circulants Chwa, Kyung Yong, DISCRETE APPLIED MATHEMATICS, 1996-01 |
Discover