DGIST Library Repository
menu
Home
Library
FAQ
search
BROWSE
Communities & Collections
Researchers
Titles
DGIST Scholar
Browse by Researchers
이제민(Lee, Jemin)
Department
Department of Information and Communication Engineering
Affiliated Community
ISC(Information Security and Communication) Lab
Research Interests
Wireless Communication System; Information Security
Website
https://sites.google.com/site/jeminleeweb
E-mail
jmnlee
@
dgist.ac.kr
Discover
Infographic
- Co-Author
Lee, Jemin
41
Quek, Tony Q. S.
20
이제민
14
Lee, Je Min
10
Hsu, Ruei-Hau
7
Kim, Minsu
5
다음
- Keyword
Deterministic Approximation
2
SYSTEMS
2
ACCESS
1
AD-HOC NETWORKS
1
Achievable Rate Region
1
Ad Hoc Networks
1
다음
- Year
2019
14
2020
13
2018
11
2021
11
2017
10
2016
7
다음
Co-Author(s)
FusionCharts.
Related Keyword
[{"link":"javascript:doSearch(5G);","weight":"∞","text":"5G"},{"link":"javascript:doSearch(5G MOBILE COMMUNICATION SYSTEMS);","weight":"∞","text":"5G MOBILE COMMUNICATION SYSTEMS"},{"link":"javascript:doSearch(5G MOBILE COMMUNICATIONS);","weight":"∞","text":"5G MOBILE COMMUNICATIONS"},{"link":"javascript:doSearch(ACCESS);","weight":"∞","text":"ACCESS"},{"link":"javascript:doSearch(ACHIEVABLE RATE REGION);","weight":"∞","text":"ACHIEVABLE RATE REGION"},{"link":"javascript:doSearch(ACTIVE REVOCATION);","weight":"∞","text":"ACTIVE REVOCATION"},{"link":"javascript:doSearch(AD HOC NETWORKS);","weight":"∞","text":"AD HOC NETWORKS"},{"link":"javascript:doSearch(AD-HOC NETWORKS);","weight":"∞","text":"AD-HOC NETWORKS"},{"link":"javascript:doSearch(AERIAL NETWORKS);","weight":"∞","text":"AERIAL NETWORKS"},{"link":"javascript:doSearch(AGE OF INFORMATION);","weight":"∞","text":"AGE OF INFORMATION"},{"link":"javascript:doSearch(AIR-TO-AIR CHANNEL);","weight":"∞","text":"AIR-TO-AIR CHANNEL"},{"link":"javascript:doSearch(ALTITUDE);","weight":"∞","text":"ALTITUDE"},{"link":"javascript:doSearch(ANALYTICAL MODELS);","weight":"∞","text":"ANALYTICAL MODELS"},{"link":"javascript:doSearch(ANONYMITY);","weight":"∞","text":"ANONYMITY"},{"link":"javascript:doSearch(ANONYMOUS AUTHENTICATION);","weight":"∞","text":"ANONYMOUS AUTHENTICATION"},{"link":"javascript:doSearch(ANTENNA ARRAYS);","weight":"∞","text":"ANTENNA ARRAYS"},{"link":"javascript:doSearch(ANTENNA CONFIGURATIONS);","weight":"∞","text":"ANTENNA CONFIGURATIONS"},{"link":"javascript:doSearch(ANTENNA PLACEMENT);","weight":"∞","text":"ANTENNA PLACEMENT"},{"link":"javascript:doSearch(ANTENNAS);","weight":"∞","text":"ANTENNAS"},{"link":"javascript:doSearch(AREA SPECTRAL EFFICIENCIES);","weight":"∞","text":"AREA SPECTRAL EFFICIENCIES"},{"link":"javascript:doSearch(AREA SPECTRAL EFFICIENCY);","weight":"∞","text":"AREA SPECTRAL EFFICIENCY"},{"link":"javascript:doSearch(ARTIFICIAL NOISE);","weight":"∞","text":"ARTIFICIAL NOISE"},{"link":"javascript:doSearch(ARTIFICIAL-NOISE);","weight":"∞","text":"ARTIFICIAL-NOISE"},{"link":"javascript:doSearch(ASSISTED CELLULAR NETWORKS);","weight":"∞","text":"ASSISTED CELLULAR NETWORKS"},{"link":"javascript:doSearch(ATTACK STRATEGIES);","weight":"∞","text":"ATTACK STRATEGIES"},{"link":"javascript:doSearch(AUTHENTICATION);","weight":"∞","text":"AUTHENTICATION"},{"link":"javascript:doSearch(AUTHENTICATION SCHEME);","weight":"∞","text":"AUTHENTICATION SCHEME"},{"link":"javascript:doSearch(AUTONOMOUS INSTRUMENTS);","weight":"∞","text":"AUTONOMOUS INSTRUMENTS"},{"link":"javascript:doSearch(AVERAGE NUMBERS);","weight":"∞","text":"AVERAGE NUMBERS"},{"link":"javascript:doSearch(BASE STATION COORDINATIONS);","weight":"∞","text":"BASE STATION COORDINATIONS"},{"link":"javascript:doSearch(BASE STATIONS);","weight":"∞","text":"BASE STATIONS"},{"link":"javascript:doSearch(BEAMFORMING);","weight":"∞","text":"BEAMFORMING"},{"link":"javascript:doSearch(BERT, OLAP, NLU, NLP, SRL, BERT, OLAP, 자연어 이해, 자연어 처리, 의미역 결정);","weight":"∞","text":"BERT, OLAP, NLU, NLP, SRL, BERT, OLAP, 자연어 이해, 자연어 처리, 의미역 결정"},{"link":"javascript:doSearch(BLOCKCHAIN);","weight":"∞","text":"BLOCKCHAIN"},{"link":"javascript:doSearch(BROADCAST CHANNEL);","weight":"∞","text":"BROADCAST CHANNEL"},{"link":"javascript:doSearch(BROADCAST CHANNELS);","weight":"∞","text":"BROADCAST CHANNELS"},{"link":"javascript:doSearch(BURSTY TRAFFIC);","weight":"∞","text":"BURSTY TRAFFIC"},{"link":"javascript:doSearch(CELL-FREE MASSIVE MIMO);","weight":"∞","text":"CELL-FREE MASSIVE MIMO"},{"link":"javascript:doSearch(CELLULAR NETWORKS);","weight":"∞","text":"CELLULAR NETWORKS"},{"link":"javascript:doSearch(CHANNEL CAPACITY);","weight":"∞","text":"CHANNEL CAPACITY"},{"link":"javascript:doSearch(CHANNEL MODELS);","weight":"∞","text":"CHANNEL MODELS"},{"link":"javascript:doSearch(CHANNEL STATE INFORMATION);","weight":"∞","text":"CHANNEL STATE INFORMATION"},{"link":"javascript:doSearch(CHANNELS);","weight":"∞","text":"CHANNELS"},{"link":"javascript:doSearch(CLUSTER CENTRIC NETWORK);","weight":"∞","text":"CLUSTER CENTRIC NETWORK"},{"link":"javascript:doSearch(CLUSTER-CENTRIC NETWORK);","weight":"∞","text":"CLUSTER-CENTRIC NETWORK"},{"link":"javascript:doSearch(CO-LOCATED);","weight":"∞","text":"CO-LOCATED"},{"link":"javascript:doSearch(COEXISTENCE);","weight":"∞","text":"COEXISTENCE"},{"link":"javascript:doSearch(COGNITIVE RADIO);","weight":"∞","text":"COGNITIVE RADIO"},{"link":"javascript:doSearch(COMMUNICATION);","weight":"∞","text":"COMMUNICATION"},{"link":"javascript:doSearch(COMPUTER CRIME);","weight":"∞","text":"COMPUTER CRIME"},{"link":"javascript:doSearch(CONSTRAINTS);","weight":"∞","text":"CONSTRAINTS"},{"link":"javascript:doSearch(COOPERATION);","weight":"∞","text":"COOPERATION"},{"link":"javascript:doSearch(COOPERATIVE TRANSMISSION);","weight":"∞","text":"COOPERATIVE TRANSMISSION"},{"link":"javascript:doSearch(COORDINATED MULTI POINT (COMP));","weight":"∞","text":"COORDINATED MULTI POINT (COMP)"},{"link":"javascript:doSearch(COORDINATED MULTIPOINT);","weight":"∞","text":"COORDINATED MULTIPOINT"},{"link":"javascript:doSearch(COORDINATED MULTIPOINT JOINT TRANSMISSION);","weight":"∞","text":"COORDINATED MULTIPOINT JOINT TRANSMISSION"},{"link":"javascript:doSearch(COVERAGE PROBABILITIES);","weight":"∞","text":"COVERAGE PROBABILITIES"},{"link":"javascript:doSearch(CRITICAL APPLICATIONS);","weight":"∞","text":"CRITICAL APPLICATIONS"},{"link":"javascript:doSearch(CUSTOMERS);","weight":"∞","text":"CUSTOMERS"},{"link":"javascript:doSearch(D2D COMMUNICATION);","weight":"∞","text":"D2D COMMUNICATION"},{"link":"javascript:doSearch(DATA INTEGRITY);","weight":"∞","text":"DATA INTEGRITY"},{"link":"javascript:doSearch(DATA PRIVACY);","weight":"∞","text":"DATA PRIVACY"},{"link":"javascript:doSearch(DEGREES OF FREEDOM (MECHANICS));","weight":"∞","text":"DEGREES OF FREEDOM (MECHANICS)"},{"link":"javascript:doSearch(DENIAL-OF-SERVICE ATTACK);","weight":"∞","text":"DENIAL-OF-SERVICE ATTACK"},{"link":"javascript:doSearch(DESIGN);","weight":"∞","text":"DESIGN"},{"link":"javascript:doSearch(DETERMINISTIC APPROXIMATION);","weight":"∞","text":"DETERMINISTIC APPROXIMATION"},{"link":"javascript:doSearch(DETERMINISTIC MODELING);","weight":"∞","text":"DETERMINISTIC MODELING"},{"link":"javascript:doSearch(DISTRIBUTED ANTENNAS);","weight":"∞","text":"DISTRIBUTED ANTENNAS"},{"link":"javascript:doSearch(DISTRIBUTIONS);","weight":"∞","text":"DISTRIBUTIONS"},{"link":"javascript:doSearch(DIVERSITY);","weight":"∞","text":"DIVERSITY"},{"link":"javascript:doSearch(DOS ATTACK);","weight":"∞","text":"DOS ATTACK"},{"link":"javascript:doSearch(DOWNLINK);","weight":"∞","text":"DOWNLINK"},{"link":"javascript:doSearch(EAVESDROPPER);","weight":"∞","text":"EAVESDROPPER"},{"link":"javascript:doSearch(EAVESDROPPING);","weight":"∞","text":"EAVESDROPPING"},{"link":"javascript:doSearch(ECC);","weight":"∞","text":"ECC"},{"link":"javascript:doSearch(EDGE COMPUTING);","weight":"∞","text":"EDGE COMPUTING"},{"link":"javascript:doSearch(EFFICIENT);","weight":"∞","text":"EFFICIENT"},{"link":"javascript:doSearch(ELECTRONIC MAIL);","weight":"∞","text":"ELECTRONIC MAIL"},{"link":"javascript:doSearch(ENCRYPTION);","weight":"∞","text":"ENCRYPTION"},{"link":"javascript:doSearch(END-TO-END SECURITY);","weight":"∞","text":"END-TO-END SECURITY"},{"link":"javascript:doSearch(ENERGY CONSUMPTION);","weight":"∞","text":"ENERGY CONSUMPTION"},{"link":"javascript:doSearch(ENERGY EFFICIENCY);","weight":"∞","text":"ENERGY EFFICIENCY"},{"link":"javascript:doSearch(ENVIRONMENTAL CONDITIONS);","weight":"∞","text":"ENVIRONMENTAL CONDITIONS"},{"link":"javascript:doSearch(ENVIRONMENTS);","weight":"∞","text":"ENVIRONMENTS"},{"link":"javascript:doSearch(ERROR);","weight":"∞","text":"ERROR"},{"link":"javascript:doSearch(FABRICS);","weight":"∞","text":"FABRICS"},{"link":"javascript:doSearch(FADING CHANNELS);","weight":"∞","text":"FADING CHANNELS"},{"link":"javascript:doSearch(FINITE BLOCKLENGTH, AGE OF INFORMATION, AOI VIOLATION PROBABILITY, CELLULAR NETWORK, DECODING ERROR, SHORT PACKET COMMUNICATIONS, 정보의 나이, 나이 위반 확률, 디코딩 에러 확률, 유한 블록길이, 셀룰러 네트워크, 짧은 패킷 통신);","weight":"∞","text":"FINITE BLOCKLENGTH, AGE OF INFORMATION, AOI VIOLATION PROBABILITY, CELLULAR NETWORK, DECODING ERROR, SHORT PACKET COMMUNICATIONS, 정보의 나이, 나이 위반 확률, 디코딩 에러 확률, 유한 블록길이, 셀룰러 네트워크, 짧은 패킷 통신"},{"link":"javascript:doSearch(FULL-DUPLEX SYSTEMS);","weight":"∞","text":"FULL-DUPLEX SYSTEMS"},{"link":"javascript:doSearch(FUNDAMENTAL LIMITS);","weight":"∞","text":"FUNDAMENTAL LIMITS"},{"link":"javascript:doSearch(GAME);","weight":"∞","text":"GAME"},{"link":"javascript:doSearch(GATEWAYS (COMPUTER NETWORKS));","weight":"∞","text":"GATEWAYS (COMPUTER NETWORKS)"},{"link":"javascript:doSearch(GAUSSIAN DISTRIBUTION);","weight":"∞","text":"GAUSSIAN DISTRIBUTION"},{"link":"javascript:doSearch(GAUSSIAN INTERFERENCE);","weight":"∞","text":"GAUSSIAN INTERFERENCE"},{"link":"javascript:doSearch(GRAPH CONVOLUTIONAL NETWORK, HETEROGENEOUS GRAPH, GRAPH PATTERN);","weight":"∞","text":"GRAPH CONVOLUTIONAL NETWORK, HETEROGENEOUS GRAPH, GRAPH PATTERN"},{"link":"javascript:doSearch(GROUP ANONYMITY);","weight":"∞","text":"GROUP ANONYMITY"},{"link":"javascript:doSearch(GROUP KEY);","weight":"∞","text":"GROUP KEY"},{"link":"javascript:doSearch(HANDOVER);","weight":"∞","text":"HANDOVER"},{"link":"javascript:doSearch(HETEROGENEOUS CELLULAR NETWORKS);","weight":"∞","text":"HETEROGENEOUS CELLULAR NETWORKS"},{"link":"javascript:doSearch(HETEROGENEOUS NETWORK);","weight":"∞","text":"HETEROGENEOUS NETWORK"},{"link":"javascript:doSearch(HETEROGENEOUS NETWORKS);","weight":"∞","text":"HETEROGENEOUS NETWORKS"},{"link":"javascript:doSearch(INFORMATION SIGNALS);","weight":"∞","text":"INFORMATION SIGNALS"},{"link":"javascript:doSearch(INFORMATION THEORETIC SECRECY);","weight":"∞","text":"INFORMATION THEORETIC SECRECY"},{"link":"javascript:doSearch(INFORMATION THEORY);","weight":"∞","text":"INFORMATION THEORY"},{"link":"javascript:doSearch(INTEGRATED CIRCUITS);","weight":"∞","text":"INTEGRATED CIRCUITS"},{"link":"javascript:doSearch(INTERFERENCE);","weight":"∞","text":"INTERFERENCE"},{"link":"javascript:doSearch(INTERFERENCE CHANNELS);","weight":"∞","text":"INTERFERENCE CHANNELS"},{"link":"javascript:doSearch(INTERFERENCE SUPPRESSION);","weight":"∞","text":"INTERFERENCE SUPPRESSION"},{"link":"javascript:doSearch(INTERFERING NODE);","weight":"∞","text":"INTERFERING NODE"},{"link":"javascript:doSearch(INTERNET OF THINGS (IOT));","weight":"∞","text":"INTERNET OF THINGS (IOT)"},{"link":"javascript:doSearch(INTRUSION DETECTION);","weight":"∞","text":"INTRUSION DETECTION"},{"link":"javascript:doSearch(JAMMERS);","weight":"∞","text":"JAMMERS"},{"link":"javascript:doSearch(JAMMING);","weight":"∞","text":"JAMMING"},{"link":"javascript:doSearch(JOINT TRANSMISSIONS);","weight":"∞","text":"JOINT TRANSMISSIONS"},{"link":"javascript:doSearch(JOINT-TRANSMISSION);","weight":"∞","text":"JOINT-TRANSMISSION"},{"link":"javascript:doSearch(KEY EXCHANGE);","weight":"∞","text":"KEY EXCHANGE"},{"link":"javascript:doSearch(KEY GENERATION);","weight":"∞","text":"KEY GENERATION"},{"link":"javascript:doSearch(LATENCY);","weight":"∞","text":"LATENCY"},{"link":"javascript:doSearch(LEAKAGE RATES);","weight":"∞","text":"LEAKAGE RATES"},{"link":"javascript:doSearch(LIGHTWEIGHT);","weight":"∞","text":"LIGHTWEIGHT"},{"link":"javascript:doSearch(LINE OF SIGHT);","weight":"∞","text":"LINE OF SIGHT"},{"link":"javascript:doSearch(LINE OF SIGHT (LOS) PROBABILITY);","weight":"∞","text":"LINE OF SIGHT (LOS) PROBABILITY"},{"link":"javascript:doSearch(LINE-OF-SIGHT);","weight":"∞","text":"LINE-OF-SIGHT"},{"link":"javascript:doSearch(LINE-OF-SIGHT (LOS) PROBABILITY);","weight":"∞","text":"LINE-OF-SIGHT (LOS) PROBABILITY"},{"link":"javascript:doSearch(LINE-OF-SIGHT PROBABILITY);","weight":"∞","text":"LINE-OF-SIGHT PROBABILITY"},{"link":"javascript:doSearch(LINEAR DETERMINISTIC MODELS);","weight":"∞","text":"LINEAR DETERMINISTIC MODELS"},{"link":"javascript:doSearch(LOS);","weight":"∞","text":"LOS"},{"link":"javascript:doSearch(LOS/NLOS);","weight":"∞","text":"LOS/NLOS"},{"link":"javascript:doSearch(LSM-TREE,COMPACTION TRIGGER);","weight":"∞","text":"LSM-TREE,COMPACTION TRIGGER"},{"link":"javascript:doSearch(MARKET);","weight":"∞","text":"MARKET"},{"link":"javascript:doSearch(MASSIVE MIMO);","weight":"∞","text":"MASSIVE MIMO"},{"link":"javascript:doSearch(MEASUREMENT);","weight":"∞","text":"MEASUREMENT"},{"link":"javascript:doSearch(MICROPROCESSORS);","weight":"∞","text":"MICROPROCESSORS"},{"link":"javascript:doSearch(MIMO);","weight":"∞","text":"MIMO"},{"link":"javascript:doSearch(MIMO SYSTEMS);","weight":"∞","text":"MIMO SYSTEMS"},{"link":"javascript:doSearch(MITIGATION);","weight":"∞","text":"MITIGATION"},{"link":"javascript:doSearch(MOBILE EDGE COMPUTING);","weight":"∞","text":"MOBILE EDGE COMPUTING"},{"link":"javascript:doSearch(MULTI-TIER NETWORKS);","weight":"∞","text":"MULTI-TIER NETWORKS"},{"link":"javascript:doSearch(MULTIPLE INPUT SINGLE OUTPUTS);","weight":"∞","text":"MULTIPLE INPUT SINGLE OUTPUTS"},{"link":"javascript:doSearch(MULTIPLE NETWORK LAYER);","weight":"∞","text":"MULTIPLE NETWORK LAYER"},{"link":"javascript:doSearch(MULTIPLE-ACCESS);","weight":"∞","text":"MULTIPLE-ACCESS"},{"link":"javascript:doSearch(MUTUAL AUTHENTICATION);","weight":"∞","text":"MUTUAL AUTHENTICATION"},{"link":"javascript:doSearch(NETWORK ENERGY EFFICIENCY);","weight":"∞","text":"NETWORK ENERGY EFFICIENCY"},{"link":"javascript:doSearch(NETWORK INTERFERENCE);","weight":"∞","text":"NETWORK INTERFERENCE"},{"link":"javascript:doSearch(NETWORK LAYERS);","weight":"∞","text":"NETWORK LAYERS"},{"link":"javascript:doSearch(NETWORKS);","weight":"∞","text":"NETWORKS"},{"link":"javascript:doSearch(NON-LINE-OF-SIGHT);","weight":"∞","text":"NON-LINE-OF-SIGHT"},{"link":"javascript:doSearch(NONLINE OF SIGHT);","weight":"∞","text":"NONLINE OF SIGHT"},{"link":"javascript:doSearch(OFDM SYSTEMS);","weight":"∞","text":"OFDM SYSTEMS"},{"link":"javascript:doSearch(OFFLOADING);","weight":"∞","text":"OFFLOADING"},{"link":"javascript:doSearch(OPPORTUNISTIC ATTACK);","weight":"∞","text":"OPPORTUNISTIC ATTACK"},{"link":"javascript:doSearch(OPTIMAL LOCATIONS);","weight":"∞","text":"OPTIMAL LOCATIONS"},{"link":"javascript:doSearch(OPTIMAL POWER ALLOCATION);","weight":"∞","text":"OPTIMAL POWER ALLOCATION"},{"link":"javascript:doSearch(OPTIMAL TRANSMISSION STRATEGY);","weight":"∞","text":"OPTIMAL TRANSMISSION STRATEGY"},{"link":"javascript:doSearch(OUTAGE PROBABILITY);","weight":"∞","text":"OUTAGE PROBABILITY"},{"link":"javascript:doSearch(OUTAGES);","weight":"∞","text":"OUTAGES"},{"link":"javascript:doSearch(PARTIAL CHANNEL STATE INFORMATION);","weight":"∞","text":"PARTIAL CHANNEL STATE INFORMATION"},{"link":"javascript:doSearch(PARTITION BASED CACHING);","weight":"∞","text":"PARTITION BASED CACHING"},{"link":"javascript:doSearch(PARTITION-BASED CACHING);","weight":"∞","text":"PARTITION-BASED CACHING"},{"link":"javascript:doSearch(PEER-TO-PEER COMPUTING);","weight":"∞","text":"PEER-TO-PEER COMPUTING"},{"link":"javascript:doSearch(PHYSICAL LAYER SECURITY);","weight":"∞","text":"PHYSICAL LAYER SECURITY"},{"link":"javascript:doSearch(PHYSICAL-LAYER SECURITY);","weight":"∞","text":"PHYSICAL-LAYER SECURITY"},{"link":"javascript:doSearch(PHYSICALLY UNCLONEABLE FUNCTIONS (PUFS));","weight":"∞","text":"PHYSICALLY UNCLONEABLE FUNCTIONS (PUFS)"},{"link":"javascript:doSearch(PLACEMENT);","weight":"∞","text":"PLACEMENT"},{"link":"javascript:doSearch(POWER ALLOCATION);","weight":"∞","text":"POWER ALLOCATION"},{"link":"javascript:doSearch(POWER CONTROL);","weight":"∞","text":"POWER CONTROL"},{"link":"javascript:doSearch(PRELIMINARY ANALYSIS);","weight":"∞","text":"PRELIMINARY ANALYSIS"},{"link":"javascript:doSearch(PRIVACY);","weight":"∞","text":"PRIVACY"},{"link":"javascript:doSearch(PRIVACY-PRESERVING AUTHENTICATION);","weight":"∞","text":"PRIVACY-PRESERVING AUTHENTICATION"},{"link":"javascript:doSearch(PROBABILITY);","weight":"∞","text":"PROBABILITY"},{"link":"javascript:doSearch(PROBABILITY DISTRIBUTIONS);","weight":"∞","text":"PROBABILITY DISTRIBUTIONS"},{"link":"javascript:doSearch(PROOF OF CONCEPT);","weight":"∞","text":"PROOF OF CONCEPT"},{"link":"javascript:doSearch(PROPAGATION LOSSES);","weight":"∞","text":"PROPAGATION LOSSES"},{"link":"javascript:doSearch(PROPOSALS);","weight":"∞","text":"PROPOSALS"},{"link":"javascript:doSearch(PROTOCOLS);","weight":"∞","text":"PROTOCOLS"},{"link":"javascript:doSearch(PROXIMITY SERVICE);","weight":"∞","text":"PROXIMITY SERVICE"},{"link":"javascript:doSearch(QUADRATIC RESIDUES);","weight":"∞","text":"QUADRATIC RESIDUES"},{"link":"javascript:doSearch(QUEUEING);","weight":"∞","text":"QUEUEING"},{"link":"javascript:doSearch(QUEUEING THEORY);","weight":"∞","text":"QUEUEING THEORY"},{"link":"javascript:doSearch(RADIO FREQUENCY IDENTIFICATION (RFID));","weight":"∞","text":"RADIO FREQUENCY IDENTIFICATION (RFID)"},{"link":"javascript:doSearch(RANDOM LOCATION);","weight":"∞","text":"RANDOM LOCATION"},{"link":"javascript:doSearch(RANDOMLY DISTRIBUTED);","weight":"∞","text":"RANDOMLY DISTRIBUTED"},{"link":"javascript:doSearch(RAYLEIGH CHANNELS);","weight":"∞","text":"RAYLEIGH CHANNELS"},{"link":"javascript:doSearch(REAL-TIME SYSTEMS);","weight":"∞","text":"REAL-TIME SYSTEMS"},{"link":"javascript:doSearch(RECEIVED SIGNALS);","weight":"∞","text":"RECEIVED SIGNALS"},{"link":"javascript:doSearch(RECEIVERS);","weight":"∞","text":"RECEIVERS"},{"link":"javascript:doSearch(RELATIVE STRENGTH);","weight":"∞","text":"RELATIVE STRENGTH"},{"link":"javascript:doSearch(RESIDUAL SELF-INTERFERENCE);","weight":"∞","text":"RESIDUAL SELF-INTERFERENCE"},{"link":"javascript:doSearch(SCHEME);","weight":"∞","text":"SCHEME"},{"link":"javascript:doSearch(SECRECY);","weight":"∞","text":"SECRECY"},{"link":"javascript:doSearch(SECRECY CAPACITY REGIONS);","weight":"∞","text":"SECRECY CAPACITY REGIONS"},{"link":"javascript:doSearch(SECRECY OUTAGE);","weight":"∞","text":"SECRECY OUTAGE"},{"link":"javascript:doSearch(SECRECY OUTAGE PROBABILITIES);","weight":"∞","text":"SECRECY OUTAGE PROBABILITIES"},{"link":"javascript:doSearch(SECRECY OUTAGE PROBABILITY);","weight":"∞","text":"SECRECY OUTAGE PROBABILITY"},{"link":"javascript:doSearch(SECRECY OUTAGES);","weight":"∞","text":"SECRECY OUTAGES"},{"link":"javascript:doSearch(SECRECY RATE);","weight":"∞","text":"SECRECY RATE"},{"link":"javascript:doSearch(SECRECY TRANSMISSION PROBABILITY);","weight":"∞","text":"SECRECY TRANSMISSION PROBABILITY"},{"link":"javascript:doSearch(SECRET HANDSHAKES);","weight":"∞","text":"SECRET HANDSHAKES"},{"link":"javascript:doSearch(SECURE AUTHENTICATIONS);","weight":"∞","text":"SECURE AUTHENTICATIONS"},{"link":"javascript:doSearch(SECURITY);","weight":"∞","text":"SECURITY"},{"link":"javascript:doSearch(SECURITY SYSTEMS);","weight":"∞","text":"SECURITY SYSTEMS"},{"link":"javascript:doSearch(SECURITY TESTING);","weight":"∞","text":"SECURITY TESTING"},{"link":"javascript:doSearch(SECURITY TESTS);","weight":"∞","text":"SECURITY TESTS"},{"link":"javascript:doSearch(SENSOR NODES);","weight":"∞","text":"SENSOR NODES"},{"link":"javascript:doSearch(SERVERS);","weight":"∞","text":"SERVERS"},{"link":"javascript:doSearch(SERVICE);","weight":"∞","text":"SERVICE"},{"link":"javascript:doSearch(SIGNAL INTERFERENCE);","weight":"∞","text":"SIGNAL INTERFERENCE"},{"link":"javascript:doSearch(SMALL CELL COOPERATION);","weight":"∞","text":"SMALL CELL COOPERATION"},{"link":"javascript:doSearch(SMALL CELL NETWORK);","weight":"∞","text":"SMALL CELL NETWORK"},{"link":"javascript:doSearch(SMALL CELLS);","weight":"∞","text":"SMALL CELLS"},{"link":"javascript:doSearch(SMART HEALTHCARE SYSTEM, POINT-OF-CARE TESTING, MOBILE DEVICE, MACHINE LEARNING);","weight":"∞","text":"SMART HEALTHCARE SYSTEM, POINT-OF-CARE TESTING, MOBILE DEVICE, MACHINE LEARNING"},{"link":"javascript:doSearch(SPATIAL DIVERSITY);","weight":"∞","text":"SPATIAL DIVERSITY"},{"link":"javascript:doSearch(SPATIAL NETWORKS);","weight":"∞","text":"SPATIAL NETWORKS"},{"link":"javascript:doSearch(SPATIALLY INTERACTING QUEUES);","weight":"∞","text":"SPATIALLY INTERACTING QUEUES"},{"link":"javascript:doSearch(SPATIOTEMPORAL PHENOMENA);","weight":"∞","text":"SPATIOTEMPORAL PHENOMENA"},{"link":"javascript:doSearch(SPECTRUM SHARING);","weight":"∞","text":"SPECTRUM SHARING"},{"link":"javascript:doSearch(STABILITY);","weight":"∞","text":"STABILITY"},{"link":"javascript:doSearch(STABILITY REGION);","weight":"∞","text":"STABILITY REGION"},{"link":"javascript:doSearch(STOCHASTIC GEOMETRY);","weight":"∞","text":"STOCHASTIC GEOMETRY"},{"link":"javascript:doSearch(STOCHASTIC MODELS);","weight":"∞","text":"STOCHASTIC MODELS"},{"link":"javascript:doSearch(STOCHASTIC SYSTEMS);","weight":"∞","text":"STOCHASTIC SYSTEMS"},{"link":"javascript:doSearch(SUCCESSIVE DECODING);","weight":"∞","text":"SUCCESSIVE DECODING"},{"link":"javascript:doSearch(SUCCESSIVE INTERFERENCE CANCELLATION (SIC));","weight":"∞","text":"SUCCESSIVE INTERFERENCE CANCELLATION (SIC)"},{"link":"javascript:doSearch(SYSTEMS);","weight":"∞","text":"SYSTEMS"},{"link":"javascript:doSearch(TASK ANALYSIS);","weight":"∞","text":"TASK ANALYSIS"},{"link":"javascript:doSearch(TEMPERATURE DISTRIBUTION);","weight":"∞","text":"TEMPERATURE DISTRIBUTION"},{"link":"javascript:doSearch(TESTBED FRAMEWORK);","weight":"∞","text":"TESTBED FRAMEWORK"},{"link":"javascript:doSearch(TESTBEDS);","weight":"∞","text":"TESTBEDS"},{"link":"javascript:doSearch(THROUGHPUT);","weight":"∞","text":"THROUGHPUT"},{"link":"javascript:doSearch(TRANSMISSION);","weight":"∞","text":"TRANSMISSION"},{"link":"javascript:doSearch(TRANSMISSION CAPACITY);","weight":"∞","text":"TRANSMISSION CAPACITY"},{"link":"javascript:doSearch(TRANSMISSION POWER);","weight":"∞","text":"TRANSMISSION POWER"},{"link":"javascript:doSearch(TRANSMISSION PROBABILITIES);","weight":"∞","text":"TRANSMISSION PROBABILITIES"},{"link":"javascript:doSearch(TRANSMISSION RATES);","weight":"∞","text":"TRANSMISSION RATES"},{"link":"javascript:doSearch(TRANSMISSION STRATEGIES);","weight":"∞","text":"TRANSMISSION STRATEGIES"},{"link":"javascript:doSearch(TRANSMISSIONS);","weight":"∞","text":"TRANSMISSIONS"},{"link":"javascript:doSearch(TRANSMITTERS);","weight":"∞","text":"TRANSMITTERS"},{"link":"javascript:doSearch(TRANSMITTING ANTENNAS);","weight":"∞","text":"TRANSMITTING ANTENNAS"},{"link":"javascript:doSearch(TRUST DEGREE);","weight":"∞","text":"TRUST DEGREE"},{"link":"javascript:doSearch(UAV COMMUNICATIONS);","weight":"∞","text":"UAV COMMUNICATIONS"},{"link":"javascript:doSearch(ULTRA-DENSE NETWORK);","weight":"∞","text":"ULTRA-DENSE NETWORK"},{"link":"javascript:doSearch(ULTRA-DENSE NETWORKS);","weight":"∞","text":"ULTRA-DENSE NETWORKS"},{"link":"javascript:doSearch(ULTRA-DENSE NETWORKS (UDN));","weight":"∞","text":"ULTRA-DENSE NETWORKS (UDN)"},{"link":"javascript:doSearch(UNLICENSED SPECTRUM);","weight":"∞","text":"UNLICENSED SPECTRUM"},{"link":"javascript:doSearch(UNMANNED AERIAL VEHICLE);","weight":"∞","text":"UNMANNED AERIAL VEHICLE"},{"link":"javascript:doSearch(UNMANNED AERIAL VEHICLE (UAV));","weight":"∞","text":"UNMANNED AERIAL VEHICLE (UAV)"},{"link":"javascript:doSearch(UNMANNED AERIAL VEHICLES);","weight":"∞","text":"UNMANNED AERIAL VEHICLES"},{"link":"javascript:doSearch(UNMANNED AERIAL VEHICLES (UAV));","weight":"∞","text":"UNMANNED AERIAL VEHICLES (UAV)"},{"link":"javascript:doSearch(UPLINK);","weight":"∞","text":"UPLINK"},{"link":"javascript:doSearch(USER ANONYMITY);","weight":"∞","text":"USER ANONYMITY"},{"link":"javascript:doSearch(USER AUTHENTICATION PROTOCOLS);","weight":"∞","text":"USER AUTHENTICATION PROTOCOLS"},{"link":"javascript:doSearch(VECTOR QUANTIZATION);","weight":"∞","text":"VECTOR QUANTIZATION"},{"link":"javascript:doSearch(VEHICLE TO VEHICLE COMMUNICATIONS);","weight":"∞","text":"VEHICLE TO VEHICLE COMMUNICATIONS"},{"link":"javascript:doSearch(VIOLATION PROBABILITY);","weight":"∞","text":"VIOLATION PROBABILITY"},{"link":"javascript:doSearch(WEARABLE DEVICES);","weight":"∞","text":"WEARABLE DEVICES"},{"link":"javascript:doSearch(WEARABLE TECHNOLOGY);","weight":"∞","text":"WEARABLE TECHNOLOGY"},{"link":"javascript:doSearch(WIRE-TAP CHANNELS);","weight":"∞","text":"WIRE-TAP CHANNELS"},{"link":"javascript:doSearch(WIRELESS COMMUNICATION);","weight":"∞","text":"WIRELESS COMMUNICATION"},{"link":"javascript:doSearch(WIRELESS COMMUNICATIONS);","weight":"∞","text":"WIRELESS COMMUNICATIONS"},{"link":"javascript:doSearch(WIRELESS NETWORKS);","weight":"∞","text":"WIRELESS NETWORKS"},{"link":"javascript:doSearch(WIRELESS SENSOR NETWORK (WSN));","weight":"∞","text":"WIRELESS SENSOR NETWORK (WSN)"},{"link":"javascript:doSearch(WIRELESS SENSOR NETWORKS (WSNS));","weight":"∞","text":"WIRELESS SENSOR NETWORKS (WSNS)"},{"link":"javascript:doSearch(WSN);","weight":"∞","text":"WSN"},{"link":"javascript:doSearch(Z INTERFERENCE CHANNEL);","weight":"∞","text":"Z INTERFERENCE CHANNEL"},{"link":"javascript:doSearch(정보의 최신성, 블록체인, 하이퍼레저 패브릭, 지연 시간, STOCHASTIC GEOMETRY);","weight":"∞","text":"정보의 최신성, 블록체인, 하이퍼레저 패브릭, 지연 시간, STOCHASTIC GEOMETRY"}]
Journal Articles
Conference Papers
Patent
News
ETC
Journal Articles
Conference Papers
Patent
News
ETC
Issue Date
Title
First-Author(s)
Journal
Issue Date
View
Export XLS
BROWSE
Communities & Collections
Researchers
Titles
LIBRARY