1 |
YoungGun Pu et al., "Wide-Band Fine-Resolution DCO with an Active Inductor and Three-Step Coarse Tunning Loop," ETRI J., vol. 33, no. 2, Apr. 2011, pp. 201-209./
|
|
2 |
A. Holzer and J. Ondrus, "Mobile Application Market: A Developer's Perspective," Telematics and Informatics, vol. 28, 2011, pp. 22-31./
|
|
3 |
K. Shin et al., "Transformation Approach to Model Online Gaming Traffic," ETRI J., vol. 33, no. 2, Apr. 2011, pp. 219-229./
|
|
4 |
Y. Kim et al., "Improved Additive Wavelet Image Fusion," IEEE Geosci. Remote Sens. Lett., vol. 8, no. 2, 2011, pp. 263-267./
|
|
5 |
Y. Hwang et al., "Orbit Determination Using Single and Double- Differenced Methods: SAC-C and KOMPSAT-2," Adv. Space Res., vol. 47, no. 1, 2011, pp.138-148./
|
|
6 |
X.-F. Li, N. Zhou, and H.-S. Liu, "Joint Source/Channel Coding Based on Two-Dimensional Optimization for Scalable H.264/AVC Video," ETRI J., vol. 33, no. 2, Apr. 2011, pp. 155-162./
|
|
7 |
L.B. Oliveira et al., "TinyPBC: Pairings for authenticated Identity- Based Non-interactive Key Distribution in Sensor Networks," Elsevier, Computer Communications, vol. 34, 2011, pp. 485-493./
|
|
8 |
M.H. Moattar and M.M. Homayounpour, "A Weighted Feature Voting Approach for Robust and Real-Time Voice Activity Detection," ETRI J., vol. 33, no. 1, 2011, pp. 99-109./
|
|
9 |
S. Ghosh, D. Mukhopadhyay, and D. Chowdhury, "Fault Attack and Countermeasures on Pairing-Based Cryptography," Int. J. Netw. Security, vol. 12, no. 1, Jan. 2011, pp. 21-28./
|
|
10 |
S.H. Jang et al., "Performance Optimization of Time Delay Estimation Based on Chirp Spread Spectrum Using ESPRIT," IEICE Trans. Commun., vol. E94-B, no. 2, Feb. 2011, pp. 607-609./
|
|