The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Hyung-Jin Lim: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Hyung-Jin Lim, Dong-Young Lee, Tae-Kyung Kim, Tai-Myoung Chung
    An Analysis and Evaluation of Policy-Based Network Management Approaches. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:590-599 [Conf]
  2. Jung-Ho Eom, Sang-Hun Lee, Hyung-Jin Lim, Tai-Myoung Chung
    Qualitative Method-Based the Effective Risk Mitigation Method in the Risk Management. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2006, pp:239-248 [Conf]
  3. Jong-Hyouk Lee, Young-Ju Han, Hyung-Jin Lim, Tai-Myung Chung
    New Binding Update Method using GDMHA in Hierarchical Mobile IPv6. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2005, pp:146-155 [Conf]
  4. Dong-Young Lee, Hyung-Jin Lim, Tai-Myoung Chung
    A Study on Agent-Based Integrated Security Management System for Managing Heterogeneous Firewall Systems. [Citation Graph (0, 0)][DBLP]
    ICCSA (5), 2006, pp:655-664 [Conf]
  5. Hyung-Jin Lim, Hak-Ju Kim, Tae-Kyung Kim, Tai-Myung Chung
    Secure Communication Scheme Applying MX Resource Record in DNSSEC Domain. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:238-245 [Conf]
  6. Hyung-Jin Lim, Moonseong Kim, Dong-Young Lee, Tai-Myoung Chung
    An Analysis of Policy Provisioning Complexity in Accordance with the Application Attributes of the Policy-Based Network. [Citation Graph (0, 0)][DBLP]
    ICCSA (5), 2006, pp:626-634 [Conf]
  7. Hyung-Jin Lim, Dong-Young Lee, Tai-Myoung Chung
    Comparative Analysis of IPv6 VPN Transition in NEMO Environments. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:486-496 [Conf]
  8. Hyung-Jin Lim, Dong-Young Lee, Tae-Kyung Kim, Tai-Myoung Chung
    An Evaluation and Analysis for IP VPN Model in IPv6 Transition Environment. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2006, pp:135-144 [Conf]
  9. Hyung-Jin Lim, Ki-jeong Chun, Tai-Myoung Chung
    Adaptive Bandwidth Control Using Fuzzy Inference in Policy-Based Network Management. [Citation Graph (0, 0)][DBLP]
    ICOIN, 2005, pp:443-451 [Conf]
  10. Jung-Muk Lim, Hyung-Jin Lim, Tai-Myoung Chung
    Performance Evaluation of Public Key Based Mechanisms for Mobile IPv4 Authentication in AAA Environments. [Citation Graph (0, 0)][DBLP]
    ICOIN, 2006, pp:62-71 [Conf]
  11. Tae-Kyung Kim, Hyung-Jin Lim, Tai-Myung Chung
    Service Negotiation Model for Response Time in Distributed Networks. [Citation Graph (0, 0)][DBLP]
    Computers and Artificial Intelligence, 2004, v:23, n:4, pp:- [Journal]

  12. Preventing Out-of-Sequence Packets on the Route Optimization Procedure in Proxy Mobile IPv6. [Citation Graph (, )][DBLP]


  13. Optimizing Access Point Allocation Using Genetic Algorithmic Approach for Smart Home Environments. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002