The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Ki-Young Kim: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Chin-Su Ko, Ki-Young Kim, Rim-Wo Hwang, YoungSeop Kim, Sang-Bum Rhee
    Robust Audio Watermarking in Wavelet Domain Using Pseudorandom Sequences. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2005, pp:397-401 [Conf]
  2. Yong-Sung Jeon, Sang-Woo Lee, Ki-Young Kim
    An Efficient Design of High Speed Network Security Platform using Network Processor. [Citation Graph (0, 0)][DBLP]
    ESA, 2006, pp:121-123 [Conf]
  3. Ki-Young Kim, Seung-Yong Kim, Seok-Yoon Kim
    An Efficient Delay Metric on RC Interconnects Under Saturated Ramp Inputs. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:612-621 [Conf]
  4. Byoung-Koo Kim, Ik-Kyun Kim, Ki-Young Kim, Jong-Soo Jang
    Design and Implementation of High-Performance Intrusion Detection System. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2004, pp:594-602 [Conf]
  5. Seung-Won Shin, Kwang-ho Baik, Ki-Young Kim, Jong-Soo Jang
    QS-Ware: The Middleware for Providing QoS and Secure Ability to Web Server. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:988-997 [Conf]
  6. Seung-Won Shin, Ki-Young Kim, Jong-Soo Jang
    LSAD: Lightweight SYN Flooding Attack Detector. [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2004, pp:385-390 [Conf]
  7. Sang-Woo Lee, Yong-Sung Jeon, Jeong-Nyeo Kim, Ki-Young Kim, Jong-Soo Jang
    Design and Implementation of a Gigabit Router using Network Processor. [Citation Graph (0, 0)][DBLP]
    IMSA, 2005, pp:32-35 [Conf]
  8. Seung-Won Shin, Ki-Young Kim, Jong-Soo Jang
    D-SAT: Detecting SYN Flooding Attack by Two-Stage Statistical Approach. [Citation Graph (0, 0)][DBLP]
    SAINT, 2005, pp:430-436 [Conf]
  9. Seung-Won Shin, Ki-Young Kim, Jong-Su Jang
    LRU Based Small Latency First Replacement (SLFR) Algorithm for the Proxy Cache. [Citation Graph (0, 0)][DBLP]
    Web Intelligence, 2003, pp:499-502 [Conf]

  10. Development of a Human arm-liked Robotic Surgical System with Force Measurement for Laparoscopic Surgery. [Citation Graph (, )][DBLP]


  11. Design of Network Security Platform with two XFI Interfaces using Network Processor. [Citation Graph (, )][DBLP]


  12. Reducing the Far-end Crosstalk Using Advanced Guard Trace in PCB Transmission Lines. [Citation Graph (, )][DBLP]


  13. Analytic Models for Peak Current Computation in General Interconnect Circuits. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.003secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002