Showing results 39001 to 39020 of 50924
Wheelchair-Based Robotic Arm System, KARES II, for the Disabled - A Robotic Arm and Visual Servoing Pyung-Hun Chang; Bien, Zeung nam, IEEE, pp.0 - 0, 2001-05-01 |
When Cellular Networks Met IPv6: Security Problems of Middleboxes in IPv6 Cellular Networks Hong, Hyunwook; Choi, Hyunwoo; Kim, Dongkwan; Kim, Hongil; Hong, Byeongdo; Noh, Jiseong; Kim, Yongdae, 2nd IEEE European Symposium on Security and Privacy (EuroS&P), pp.595, IEEE, 2017-04-02 |
When Interactive TV Meets Online Auction: A Study On Factors Affecting User Adoption Choi, JunKyun, pp.65 - 74, 2007-11 |
When is compress-and-forward optimal? Lee, S.H.; Chung, Sae-Young, 2010 Information Theory and Applications Workshop, ITA 2010, pp.64 - 66, 2010 Information Theory and Applications Workshop, ITA 2010, 2010-01-31 |
When Pilots Should Not Be Reused Across Interfering Cells in Massive MIMO Sohn, Ji Yong; Yoon, Sung Whan; Moon, Jae Kyun, IEEE International Conference on Communications 2015 / Smart city & Smart World, pp.1257 - 1263, IEEE, 2015-06-11 |
When Satellites Work as Eavesdroppers Jung, Dong-Hyun; Ryu, Joon-Gyu; Choi, Junil, IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, v.17, pp.2784 - 2799, 2022 |
When to Realign the Receive Beam in High Mobility V2X Communications? Kang, Yoonseong; Seo, Hyowoon; Choi, Wan, IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, v.69, no.11, pp.13180 - 13195, 2020-11 |
When to Use Graph Side Information in Matrix Completion Suh, Geewon; Jeon, Sangwoo; Suh, Changho, 2021 IEEE International Symposium on Information Theory, ISIT 2021, pp.2113 - 2118, IEEE, 2021-07-15 |
Where is your player : Deep pixel-wise visual localization on baseball game data via text-phrase = 야구 게임 데이터에 대한 텍스트 문구 기반 심층 픽셀 단위 시각적 위치 추정link Kim, Minsu; Yoo, Chang D.; et al, 한국과학기술원, 2018 |
Where Is Your Player: Deep Pixel-wise Visual Localization based on Text-phrase by Baseball Game Data Kim, Min-Su; PARK, HYOUNG WOO; Yoo, Chang-Dong, IEEE Conference on Computer Vision and Pattern Recognition (CVPR), IEEE Computer Society and the Computer Vision Foundation (CVF), 2018-06-20 |
Which Metrics for Network Pruning: Final Accuracy? Or Accuracy Drop? Joo, Donggyu; Baek, Sunghyun; Kim, Junmo, IEEE International Conference on Image Processing, ICIP 2022, IEEE, 2022-10-16 |
Which One Is Better to Cache: Requested Contents or Interfering Contents? Song, Jaeyoung; Song, Hojin; Choi, Wan, IEEE WIRELESS COMMUNICATIONS LETTERS, v.8, no.3, pp.861 - 864, 2019-06 |
Who is knocking on the telnet port: A large-scale empirical study of network scanning Heo, Hwan Jo; Shin, Seungwon, 13th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2018, pp.625 - 636, Association for Computing Machinery, Inc, 2018-06-08 |
Who Spent My EOS? On the (In)Security of Resource Management of EOS.IO Lee, Sangsup; Kim, Daejun; Kim, Dongkwan; Son, Sooel; Kim, Yongdae, Workshop on Offensive Technologies, USENIX, 2019-08-13 |
Why Are Deep Representations Good Perceptual Quality Features? Tariq, Taimoor; Kim, Munchurl; Tursun, Okan Tarhan; Didyk, Piotr, 16th European Conference on Computer Vision, pp.445 - 461, ECCV, 2020-08-24 |
Why is HTTP Adaptive Streaming So Hard? Bae, Sangwook; Jang, Dahyun; Park, Kyoung-Soo, 6th ACM SIGOPS Asia-Pacific Workshop on Systems (APSys 2015), ACM, 2015-07-28 |
Why Kad Lookup Fails Kang, Hun J.; Chan-Tin, Eric; Hopper, Nicholas; Kim, Yongdae, IEEE International Conference on Peer-to-Peer Computing (P2P), 2009 , IEEE, 2009-09 |
Why You Should Charge Your Friends for Borrowing Your Stuff Shin, Kijung; Lee, Euiwoong; Eswaran, Dhivya; Procaccia, Ariel D., International Joint Conference on Artificial Intelligence (IJCAI), International Joint Conferences on Artificial Intelligence Organization (IJCAI), 2017-08-25 |
WI 코더의 개선된 특성파형 분리 방법 한민수; 조근석; 정상배, 2009 한국음성학회 가을학술대회, pp.34 - 35, 2009 |
Wi-Fi Sensing: Should Mobiles Sleep Longer as They Age? Jeong, Jae Seong; Yi, Yung; Cho, Jeong Woo; Eun, Do Young; Chong, Song, IEEE INFOCOM 2013, pp.2328 - 2336, IEEE, 2013-04 |
Discover