Results 21-30 of 1355 (Search time: 0.004 seconds).
NO | Title, Author(s) (Publication Title, Volume Issue, Page, Issue Date) |
---|---|
Heuristic Query Tree Protocol: Use of Known Tags for RFID Tag Anti-Collision Sung, Jongwoo; Kim, Daeyoung; Kim, Taehong; Choi, Jinhyuk, IEICE TRANSACTIONS ON COMMUNICATIONS, v.E95B, no.2, pp.603 - 606, 2012-02 | |
Characterizing user navigation and interactions in online social networks Benevenuto, Fabricio; Rodrigues, Tiago; Cha, Meeyoung; Almeida, Virgilio, INFORMATION SCIENCES, v.195, pp.1 - 24, 2012-07 | |
객체의 시공간 관계를 자동으로 생성하는 비디오 주석 시스템 김준수; 김탁은; 김명호, 정보과학회논문지 : 컴퓨팅의 실제 및 레터, v.18, no.10, pp.701 - 710, 2012-10 | |
Generic security-amplifying methods of ordinary digital signatures Li, Jin; Zhang, Fangguo; Chen, Xiaofeng; Kim, Kwangjo; Wong, Duncan S., INFORMATION SCIENCES, v.201, pp.128 - 139, 2012-10 | |
소프트웨어공학을 위한 웹 2.0 기술 활동 동향 및 사례분석 한대희; 구형민; 고인영, 정보과학회논문지 : 소프트웨어 및 응용, v.39, no.9, pp.714 - 722, 2012-09 | |
Laxity dynamics and LLF schedulability analysis on multiprocessor platforms Lee, Jinkyu; Easwaran, Arvind; Shin, Insik, REAL-TIME SYSTEMS, v.48, no.6, pp.716 - 749, 2012-11 | |
Subspace Snooping: Exploiting Temporal Sharing Stability for Snoop Reduction Ahn, Jeong-Seob; Kim, Dae-Hoon; Kim, Jae-Hong; Huh, Jae-Hyuk, IEEE TRANSACTIONS ON COMPUTERS, v.61, no.11, pp.1624 - 1637, 2012-11 | |
Enhanced buffer management policy that utilises message properties for delay-tolerant networks Shin, Kwang-Cheol; Kim, Soon-Tae, IET COMMUNICATIONS, v.5, no.6, pp.753 - 759, 2011-04 | |
실감형 교과서를 위한멀티모달 콘텐츠 저작 및 재생 프레임워크 설계 김석열; 박진아, 한국콘텐츠학회 논문지, v.10, no.8, pp.1 - 10, 2010-08 | |
Efficient construction of histograms for multidimensional data using quad-trees Roh, Yohan J.; Kim, Jae Ho; Son, Jin Hyun; Kim, Myoung Ho, DECISION SUPPORT SYSTEMS, v.52, no.1, pp.82 - 94, 2011-12 |