Search > Reference Search
Search Result
학술지
No Reference Title /Author/Journal Title Citing Article
1 YoungGun Pu et al., "Wide-Band Fine-Resolution DCO with an Active Inductor and Three-Step Coarse Tunning Loop," ETRI J., vol. 33, no. 2, Apr. 2011, pp. 201-209./   DOI View Article
2 A. Holzer and J. Ondrus, "Mobile Application Market: A Developer's Perspective," Telematics and Informatics, vol. 28, 2011, pp. 22-31./   DOI   Ndsl View Article
3 K. Shin et al., "Transformation Approach to Model Online Gaming Traffic," ETRI J., vol. 33, no. 2, Apr. 2011, pp. 219-229./   DOI View Article
4 Y. Kim et al., "Improved Additive Wavelet Image Fusion," IEEE Geosci. Remote Sens. Lett., vol. 8, no. 2, 2011, pp. 263-267./   DOI View Article
5 Y. Hwang et al., "Orbit Determination Using Single and Double- Differenced Methods: SAC-C and KOMPSAT-2," Adv. Space Res., vol. 47, no. 1, 2011, pp.138-148./   DOI   Ndsl View Article
6 X.-F. Li, N. Zhou, and H.-S. Liu, "Joint Source/Channel Coding Based on Two-Dimensional Optimization for Scalable H.264/AVC Video," ETRI J., vol. 33, no. 2, Apr. 2011, pp. 155-162./   DOI View Article
7 L.B. Oliveira et al., "TinyPBC: Pairings for authenticated Identity- Based Non-interactive Key Distribution in Sensor Networks," Elsevier, Computer Communications, vol. 34, 2011, pp. 485-493./   DOI   Ndsl View Article
8 M.H. Moattar and M.M. Homayounpour, "A Weighted Feature Voting Approach for Robust and Real-Time Voice Activity Detection," ETRI J., vol. 33, no. 1, 2011, pp. 99-109./   DOI View Article
9 S. Ghosh, D. Mukhopadhyay, and D. Chowdhury, "Fault Attack and Countermeasures on Pairing-Based Cryptography," Int. J. Netw. Security, vol. 12, no. 1, Jan. 2011, pp. 21-28./ View Article
10 S.H. Jang et al., "Performance Optimization of Time Delay Estimation Based on Chirp Spread Spectrum Using ESPRIT," IEICE Trans. Commun., vol. E94-B, no. 2, Feb. 2011, pp. 607-609./   DOI   Ndsl View Article