Showing results 33881 to 33900 of 51620
Security Analysis of FHSS-type Drone Controller Shin, Ho Chul; Choi, Ki Bum; Park, Young Seok; Choi, Jae Yeong; Kim, Yong Dae, The 16th International Workshop on Information Security Applications, Korea Institute of Information Security and Cryptology, 2015-08-21 |
Security analysis of multi-path routing scheme in ad hoc networks Jeong, JM; Ma, JoongSoo, PARALLEL AND DISTRIBUTED COMPUTING: APPLICATIONS AND TECHNOLOGIES, PROCEEDINGS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.3320, pp.694 - 697, 2004 |
Security analysis of quantum key distribution on passive optical networks Lim, Kyongchun; Ko, Heasin; Suh, Changho; Rhee, June-Koo Kevin, OPTICS EXPRESS, v.25, no.10, pp.11894 - 11909, 2017-05 |
Security analysis of quantum key distribution on passive optical networks Lim, Kyongchun; Suh, Changho; 고해신; Lee, June Koo, Quantum ICT Tech Symposium, Quantum ICT Tech Symposium, 2016-05 |
Security analysis of VoLTE service and IMS network in cellular operators = VoLTE 보안 취약점 연구link Kim, Hongil; 김홍일; et al, 한국과학기술원, 2015 |
SECURITY AND PRIVACY IN EMERGING WIRELESS NETWORKS Cao, Guohong; Hubaux, Jean-Pierre; Kim, Yongdae; Zhang, Yanchao, IEEE WIRELESS COMMUNICATIONS, v.17, no.5, pp.10 - 11, 2010-10 |
Security considerations in processor interconnect design = 프로세서 인터커넥트 네트워크에서의 보안문제link Song, Won-Jun; 송원준; et al, 한국과학기술원, 2014 |
Security in Automotive Radar and Vehicular Networks Yeh, Enoch R.; Bhat, Chandra R.; Heath, Robert W., Jr.; Choi, Junil; Prelcic, Nuria G., MICROWAVE JOURNAL, v.60, no.5, pp.148 - 164, 2017-05 |
SECURITY MANAGEMENT METHOD AND APPARATUS IN MULTIMEDIA MIDDLEWARE, AND STORAGE MEDIUM THEREFOR 김문철; 헨드리; 송영주; 정기호, 2012-10-31 |
SECURITY MANAGEMENT METHOD AND APPARATUS IN MULTIMEDIA MIDDLEWARE, AND STORAGE MEDIUM THEREFOR Kim, Munchurl; HENDRY, Hendry; SONG, Young-Joo; JUNG, Ki-Ho |
Security Model for a Multi-Agent Marketplace Jaiswal, Ashutosh; Kim, Yongdae; Gini, Maria, The Fifth International Conference on Electronic Commerce (ICEC 03), ACM, 2003-09 |
Security vulnerability in Processor-Interconnect Router Design wonjun, song; Kim, John Dongjun; Lee, Jae; Dennis Abts, Conference on Computer and Communications Security(CCS), ACM Special Interest Group on Security, Audit and Control (SIGSAC), 2014-11 |
See-through display combined with holographic display and Maxwellian display using switchable holographic optical element based on liquid lens Lee, Jin Su; Kim, YooKwang; Won, Yong Hyub, OPTICS EXPRESS, v.26, no.15, pp.19341 - 19355, 2018-07 |
See-through LCDs using transparent light-guide plates Choi, W.-S.; Lee, J.-H.; Yeon, J.; Yoon, Jun-Bo, 15th International Display Workshops, IDW '08, pp.459 - 462, 2008-12-03 |
SEE-THROUGH-TYPE INTEGRATED THIN-FILM SOLAR CELL, METHOD OF MANUFACTURING THE SAME AND METHOD OF ELECTRICALLY SERIES CONNECTING UNIT CELLS THEREOF Lim, Koeng Su; Kwon, Seong Won; Kwak, Joong Hwan; Yang, Ji Hwan; Park, Sang Il; Kim, Sang Hwan; Lee, Yoo Jin; et al, 2013-05-28 |
Seed accumulating sequential estimation for PN sequence acquisition at low signal-to-noise ratio Yoon, S; Song, Iickho; Kim, SY, SIGNAL PROCESSING, v.82, no.11, pp.1795 - 1799, 2002-11 |
Seed growing for interactive image segmentation using SVM classification with geodesic distance Park, Sun Jeong; Lee, Han Sang; Kim, Junmo, ELECTRONICS LETTERS, v.53, no.1, pp.22 - 23, 2017-01 |
Seed growing for interactive image segmentation with geodesic voting Park, Sun Jeong; Lee, Han Sang; Kim, Junmo, 23rd IEEE International Conference on Image Processing (ICIP), IEEE Signal Processing Society, 2016-09 |
Seed growing method for enhanced interactive image segmentation = 사용자 입력 기반 이미지 분할 기법의 정확도 향상을 위한 시드 확장에 관한 연구link Park, Sun-Jeong; 박선정; et al, 한국과학기술원, 2016 |
Seed light 주입형 RSOA 기반 WDM PON의 외부반사에 대한 내성 분석 정윤철; 전현채; 조근영; Takushima, Y, 광자기술 학술회의, 2008 |
Discover