Showing results 105541 to 105560 of 279371
How to Market in Korea: Small Country, Big Market for PC Games Park, Byungho, Game Developers Conference 2001, Game Developers Conference, 2001-03-24 |
How to Measure and Reduce the Complexities of Human System Interaction in Fault Identification Tasks at Advanced Control Rooms Kim, Jong Hyun; Seong, Poong-Hyun; Kang, Hyun Gook, CSEPC2004, 2004-11 |
How to Measure Human Performance in Main Control Room of an Advanced NPP? Ha, Jun Su; Seong, Poong-Hyun, 한국원자력학회 2004 추계학술발표대회, 한국원자력학회, 2004-10 |
How to measure MIQ (Machine Intelligence Quotient): Methods and Applications Bien, Zeung nam, Proc. of ITC-CSCC 2001 (International Technical Conference on Circuits/Systems, Computers and Communications), 2001 |
How to Measure the Machine Intelligence Quotient(MIQ) : Two Methods and Applications Bien, Zeung nam, WAC(World Automation Congress), pp.275 - 280, 1998 |
How to Measure the Network Vulnerability of Cities to Wildfires: Cases in California, USA Yun, Jeongin; Lee, Jooyoung; Park, Jangseop; Chung, Koohong; Lee, Jinwoo, TRANSPORTATION RESEARCH RECORD, v.2676, no.12, pp.382 - 395, 2022-12 |
How to Measure the Vulnerability of Cities to Wildfires: Cases in California Yun, Jeongin; Lee, Jooyoung; Park, Jangseop; Chung, Koohong; Lee, Jinwoo, Transportation Research Board 101st Annual Meeting, Transportation Research Board, 2022-01-10 |
How to move domain walls in an antiferromagnet Kim, Se Kwon, APS March Meeting 2016, APS Meeting, 2016-03-16 |
How to obtain magnetocapacitance effects at room temperature: The case of Mn-doped BiFeO3 Yang, Chan-Ho; Koo, TY; Jeong, YH, SOLID STATE COMMUNICATIONS, v.134, no.4, pp.299 - 301, 2005-04 |
How to Protect ADS-B: Confidentiality Framework and Efficient Realization Based on Staged Identity-Based Encryption Baek, Junsang; Hableel, Eman; Byon, Youngji; Wong, Duncan; Jang, Kitae; Yeo, Hwasoo, IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, v.18, no.3, pp.690 - 700, 2017-03 |
How to Reach a Thousand-Second in-Plane Polarization Lifetime with 0.97-GeV/c Deuterons in a Storage Ring Guidoboni, G; Stephenson, E; Andrianov, S; Augustyniak, W; Semertzidis, Yannis K., PHYSICAL REVIEW LETTERS, v.117, no.5, pp.054801, 2016-07 |
How to Realize Ubiquitous VR? Kim, S; Lee, Y; WOO, Woontack, Pervasive:TSI Workshop, pp.493 - 504, 2006-06 |
How to Report App Feedback? Analyzing Feedback Reporting Behavior Oh, Jeungmin; Lee, Sang Jeong; Lee, Uichin, ACM SIGCHI Conference on Human Factors in Computing Systems (CHI), ACM Special Interest Group on Computer-Human Interaction (SIGCHI), 2016-05-09 |
How to resolve employee-driven social media crisis? = 소셜미디어 위기에서 사과의 효과 검증: 도미노 피자 사건을 중심으로link Kang, Yeyoung; 강예영; et al, 한국과학기술원, 2016 |
How to respond to the Fourth Industrial Revolution, or the second information technology revolution? Dynamic new combinations between technology, market, and society through open innovation Lee, Min Hwa; Yun, Jinhyo Joseph; Pyka, Andreas; Won, Dongkyu; Kodama, Fumio; Schiuma, Giovanni; Park, Hang Sik; et al, Journal of Open Innovation: Technology, Market, and Complexity, v.4, no.3, 2018 |
How to set up collaborations between academia and industrial biotech companies Pronk, Jack T.; Lee, Sang-Yup; Lievense, Jeff; Pierce, John; Palsson, Bernhard; Uhlen, Mathias; Nielsen, Jens, NATURE BIOTECHNOLOGY, v.33, no.3, pp.237 - 240, 2015-03 |
How to Stabilize Colloidal Quantum Dots by Ligand-Surface Chemistry Ko, Jae Hyeon; YOO, DONGSUK; Kim, Yong-Hyun, ICAE 2017, Seoul National University, 2017-11-23 |
How to Stabilize Colloidal Quantum Dots: Understanding of Ligand-Surface Chemistry 고재현; 유동석; 김용현, Samsung QD Forum 2017, 삼성전자㈜ 종합기술원, 2017-10-26 |
How to Strengthen DES against Two Robust Attacks Kim, Kwangjo; Lee, S; Park, S; Lee, D, 1995 Korea-JapanJoint Workshop onInformation Security and Cryptology (JW-ISC'95), 1995-01-24 |
How to Support Object-Oriented Programming in Many-Sorted Logic 조정완, Proceedings of KISS Conference, pp.341 - 344, 1991 |
Discover