Search the dblp DataBase
Dong-il Seo :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Dong-ho Kang , Dong-il Seo , Jongsoo Jang A Study on Bandwidth Consumption DDoS: Attack Defense. [Citation Graph (0, 0)][DBLP ] Security and Management, 2003, pp:491-494 [Conf ] Wonjoo Park , Dong-il Seo , Daeyoung Kim The Methods of IPsec Applying Between MN and HA in Mobile IPv6. [Citation Graph (0, 0)][DBLP ] Security and Management, 2003, pp:475-478 [Conf ] Seung-Kyu Lee , Dong-il Seo , Byung Ro Moon A Hybrid Genetic Algorithm For Optimal Hexagonal Tortoise Problem. [Citation Graph (0, 0)][DBLP ] GECCO, 2002, pp:689- [Conf ] Dong-il Seo , Sung-Soon Choi , Byung Ro Moon New Epistasis Measures for Detecting Independently Optimizable Partitions of Variables. [Citation Graph (0, 0)][DBLP ] GECCO (2), 2004, pp:150-161 [Conf ] Dong-il Seo , Yong-Hyuk Kim , Byung Ro Moon New Entropy-Based Measures of Gene Significance and Epistasis. [Citation Graph (0, 0)][DBLP ] GECCO, 2003, pp:1345-1356 [Conf ] Dong-il Seo , Byung Ro Moon Voronoi Quantizied Crossover For Traveling Salesman Problem. [Citation Graph (0, 0)][DBLP ] GECCO, 2002, pp:544-552 [Conf ] Dong-il Seo , Byung Ro Moon A Hybrid Genetic Algorithm Based on Complete Graph Representation for the Sequential Ordering Problem. [Citation Graph (0, 0)][DBLP ] GECCO, 2003, pp:669-680 [Conf ] Dong-il Seo , Byung Ro Moon A Survey on Chromosomal Structures and Operators for Exploiting Topological Linkages of Genes. [Citation Graph (0, 0)][DBLP ] GECCO, 2003, pp:1357-1368 [Conf ] Dong-il Seo , Byung Ro Moon Computing the epistasis variance of large-scale traveling salesman problems. [Citation Graph (0, 0)][DBLP ] GECCO, 2005, pp:1169-1176 [Conf ] Yang-Seo Choi , Dong-il Seo , Sung Won Sohn , Sang-Ho Lee Network-Based Real-Time Connection Traceback System (NRCTS) with Packet Marking Technology. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2003, pp:31-40 [Conf ] Yang-Seo Choi , Dong-il Seo , Sung Won Sohn A New Stack Buffer Overflow Hacking Defense Technique with Memory Address Confirmation. [Citation Graph (0, 0)][DBLP ] ICISC, 2001, pp:146-159 [Conf ] A Study on Security Middleware Framework for the Ubiquitous Platform. [Citation Graph (, )][DBLP ] End-to-end Internet/intranet service management in multi-domain environment using SLA concept. [Citation Graph (, )][DBLP ] An Information-Theoretic Analysis on the Interactions of Variables in Combinatorial Optimization Problems. [Citation Graph (, )][DBLP ] Search in 0.001secs, Finished in 0.002secs