Showing results 87161 to 87180 of 279513
Exploiting the Best Lighting in Classroom Facilitated with LEDs Suk, Hyeon-Jeong; Park, Geun-Ly; Na, Noo-Ree, Design Engineering Workshop 2012, Korean Society for Machenical Engineering, 2012-06-25 |
Exploiting the Frame Coherence in Visibility for Walk/Fly-through Heo, JunHyeok; Jung, SoonKi; Wohn, Kwang-Yun, ACM Conference on Virtual Reality Software and Technology, pp.133 - 140, 1996 |
Exploiting the Inherent Parallelisms of Back-Propagation Neural Networks to Design a Systolic Array Chung, Jai-Hoon; Yoon, Hyunsoo; Maeng, Seung Ryooul, Neural Networks, 1991. 1991 IEEE International Joint Conference on, pp.2204-2209, 1991-11 |
Exploiting the inherent parallelisms of back-propagation neural networks to design a systolic array Chung, Jai-Hoon; Yoon, Hyunsoo; Maeng, SeungRyoul, Proceedings of International Joint Conference on Neural Networks, IJCNN'91, 1991-11-18 |
Exploiting the Mutual Coupling Effect on Dipole Antennas for RF Energy Harvesting Kim, J. H.; Cho, S. I.; Kim, H. -J.; Choi, J. -W.; Jang, J. E.; Choi, J. P., IEEE ANTENNAS AND WIRELESS PROPAGATION LETTERS, v.15, pp.1301 - 1304, 2016 |
Exploiting the preferred domain of FDD massive MIMO systems with uniform planar arrays Choi, Junil; Kim, Taeyoung; Love, David J.; Seol, Ji-Yun, IEEE International Conference on Communications, ICC 2015, pp.1465 - 1470, Institute of Electrical and Electronics Engineers Inc., 2015-06 |
Exploiting the speckle-correlation scattering matrix for a compact reference-free holographic image sensor Lee, KyeoReh; Park, Yong Keun, NATURE COMMUNICATIONS, v.7, pp.13359, 2016-10 |
Exploiting the Unicast Functionality of the On-Demand Multicast Routing Protocol Lee, Sung-Ju; Su, William; Gerla, Mario, The IEEE Wireless Communications & Networking Conference (WCNC 2000), IEEE, 2000-09-23 |
Exploiting Triangle Patterns for Heterogeneous Graph Attention Network Yi, Eunjeong; Kim, Min-Soo, 21st International Conference on Web Engineering, ICWE 2021, pp.71 - 81, Springer Science and Business Media Deutschland GmbH, 2021-05 |
Exploiting trustors as well as trustees in trust-based recommendation Hwang, Won-Seok; Li, Shaoyu; Kim, Sang-Wook; Choi, Ho-Jin, 22nd ACM International Conference on Conference on information & knowledge management, pp.1893 - 1896, ACM, 2013-10-29 |
Exploiting underutilized runtime bad blocks for improving solid state drive performance = SSD 성능 개선을 위한 저활용된 런타임 배드 블록 이용 기법link Moon, Junoh; Kim, Soontae; et al, 한국과학기술원, 2022 |
Exploiting Versions for On-line Data Warehouse Maintenance in MOLAP Servers Kang, HG; Chung, Chin-Wan, International Conference on VLDB, pp.742 - 753, Springer Verlag (Germany), 2002-08-20 |
Exploiting Water-Sensitive MOFs in Hollow Fiber Sorbent Architecture to Enable Energy-Efficient CO2 capture Lee, Young Hun; Koh, Dong-Yeun; Oh, Ban Suk, The 9th International Conference on Separation Science and Technology, KICHE, 2019-07-10 |
Exploiting web push notification features in third-party push services = 제 3자 푸시 서비스의 웹 푸시 알림 기능 공격link Kim, Hayeon; Shin, Insik; et al, 한국과학기술원, 2019 |
Exploiting WiFi Guard Band for Safeguarded ZigBee Chae, Yoon; Wang, Shuai; Kim, Song Min, Proceedings of the 16th ACM Conference on Embedded Networked Sensor Systems (ACM SenSys '18), ACM, 2018-11-06 |
Exploration and Exploitation in Complex Networks: The Influence of Interpersonal Network Structure Fang, Christina; Lee, Jeho; Schilling, Melissa A., Proceeding of KSMS, 2006, Korean Strategic Management Society, 2006 |
Exploration and Exploitation in Scale Free Networks Je Ho Lee, The 2007 Annual Meeting of the Academy of Management, 2007 |
Exploration and exploitation in the presence of network externalities Lee, Jongseok; Lee, Jeho; Lee, Habin, Institute for Operations Research and the Management Sciences, pp.306 - 314, The Korean Operations Research and Management Science Society, 2000 |
Exploration and Exploitation in the Presence of Network Externalities Lee, Jongseok; Lee, Jeho; Lee, Habin, MANAGEMENT SCIENCE, v.49, no.4, pp.553 - 570, 2003-04 |
Exploration and exploitation in the presence of network externalities : the role of power users = 네트워크 외부성과 기술선택link Lee, Jong-Seok; 이종석; et al, 한국과학기술원, 2003 |
Discover