Showing results 208321 to 208340 of 279369
Truncated power adaptation in multicarrier CDMA downlink Kim H.J.; Kim S.W., 2005 NPRA Annual Meeting, pp.111 - 116, 2005-03-13 |
Truncated power control in code division multiple access communications s. w. kim; a.goldmith, IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, v.49, no.3, pp.965 - 972, 2000-05 |
Truncated power control in code division multiple access communications Kim Sang Wu; Goldsmith Andrea, Proceedings of the 1997 IEEE Global Telecommunications Conference. Part 2 (of 3), pp.1488 - 1493, IEEE, 1997-11-03 |
Truncated SRA RNA derivatives inhibit estrogen receptor-alpha-mediated transcription Jung, Euihan; Jang, Seonghui; Lee, Jungmin; Kim, Youngmi; Shin, Heegwon; Park, Hee-Sung; Lee, Younghoon, MOLECULAR BIOLOGY REPORTS, v.43, no.10, pp.1019 - 1025, 2016-10 |
Truncated step response models for model predictive control Hovd, M.; Lee, JayHyung; Morari, M., JOURNAL OF PROCESS CONTROL, v.3, no.2, pp.67 - 73, 1993-05 |
Truncated Tetrahedron Seed Crystals Initiating Stereoaligned Growth of FeSi Nanowires Kim, Si-in; Yoon, Hana; Seo, Kwanyong; Yoo, Youngdong; Lee, Sungyul; Kim, Bongsoo, ACS NANO, v.6, no.10, pp.8652 - 8657, 2012-10 |
Truncation error evaluation method for minimal cut set-based fault tree analysis Choi, JS; Cho, Nam-Zin, JOURNAL OF NUCLEAR SCIENCE AND TECHNOLOGY, v.42, no.10, pp.854 - 860, 2005-10 |
Trunk range of motion: A wearable sensor-based test protocol and indicator of fall risk in older people Yu, Xiaoqun; Park, Seonghyeok; Xiong, Shuping, APPLIED ERGONOMICS, v.108, 2023-04 |
Trust and Equity Theory in Prisoner's Dilemma Jung, Eun-Soo; Kim, Bo-Kyeong; Lee, Soo-Young, 19th International Conference on Neural Information Processing, ICONIP 2012, pp.560 - 567, United Development Company PSC (UDC), 2012-11 |
Trust based games for secure routing in wireless sensor networks = 무선 센서네트워크에서 안전한 라우팅을 위한 신뢰게임에 관한 연구link Rubarth, Kai; 루바트 카이; et al, 한국과학기술원, 2008 |
Trust evaluation model for wireless sensor networks = 무선 센서 네트워크에서의 신뢰평가 모델link Hur, Jun-Beom; 허준범; et al, 한국과학기술원, 2005 |
Trust evaluation model for wireless sensor networks Hurt, J.; Lee, Y.; Yoon, Hyunsoo; Choi, D.; Jin, S., 7th International Conference on Advanced Communication Technology, ICACT 2005, pp.491 - 496, Springer Verlag (Germany), 2005-02-21 |
Trust Games for Secure Routing in Wireless Sensor Network 김세헌, Conference paper and presentation @ CISC, 2007-12 |
Trust in government's social media service and citizen's patronage behavior Park, Min Jae; Choi, Hyeri; Kim, Suk Kyoung; Rho, Jae Jeung, TELEMATICS AND INFORMATICS, v.32, no.4, pp.629 - 641, 2015-11 |
Trust management for resilient wireless sensor networks Hur, Junbeom; Lee, Younho; Hong, Seong-Min; Yoon, Hyunsoo, INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2005 BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.3935, pp.56 - 68, 2006 |
Trust management for user-centric identity management on the Internet Choi, D.; Jin, S.-H.; Yoon, Hyunsoo, 2007 IEEE International Symposium on Consumer Electronics, ISCE, pp.629 - 683, IEEE, 2007-06-20 |
“Trust me, I have a Ph.D.”: A propensity score analysis on the halo effect of disclosing one’s offline social status in online communities Park, Kunwoo; Kwak, Haewoon; Song, Hyunho; Cha, Meeyoung, 14th International Conference on Web and Social Media (ICWSM-2020), The International Conference on Web and Social Media, 2020-06-09 |
Trust ME: a Trust Decision Framework for Mobile Environments Huerta, G; Lee, DongMan; Han, Seon Yeong, IEEE TrustCom 2011, IEEE Computer Society, 2011-11-16 |
Trust Region Sequential Variational Inference Kim, Geon-Hyeong; Jang, Youngsoo; Lee, Jongmin; Jeon, Wonseok; Yang, Hongseok; Kim, Kee-Eung, Conference on Asian Conference on Machine Learning (ACML 2019), Asian Conference on Machine Learning, 2019-11-19 |
Trust Visualization for Object Management in Internet of Things Oh, Hyeontaek; An, Sanghong; Yang, Jinhong; Choi, Jun Kyun, 2016 IEEE 5th Global Conference on Consumer Electronics (GCCE), 2016 IEEE 5th Global Conference on Consumer Electronics (GCCE), 2016-10-11 |
Discover