|
Search the dblp DataBase
Hyung-Jin Lim:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Hyung-Jin Lim, Dong-Young Lee, Tae-Kyung Kim, Tai-Myoung Chung
An Analysis and Evaluation of Policy-Based Network Management Approaches. [Citation Graph (0, 0)][DBLP] ICCNMC, 2005, pp:590-599 [Conf]
- Jung-Ho Eom, Sang-Hun Lee, Hyung-Jin Lim, Tai-Myoung Chung
Qualitative Method-Based the Effective Risk Mitigation Method in the Risk Management. [Citation Graph (0, 0)][DBLP] ICCSA (2), 2006, pp:239-248 [Conf]
- Jong-Hyouk Lee, Young-Ju Han, Hyung-Jin Lim, Tai-Myung Chung
New Binding Update Method using GDMHA in Hierarchical Mobile IPv6. [Citation Graph (0, 0)][DBLP] ICCSA (1), 2005, pp:146-155 [Conf]
- Dong-Young Lee, Hyung-Jin Lim, Tai-Myoung Chung
A Study on Agent-Based Integrated Security Management System for Managing Heterogeneous Firewall Systems. [Citation Graph (0, 0)][DBLP] ICCSA (5), 2006, pp:655-664 [Conf]
- Hyung-Jin Lim, Hak-Ju Kim, Tae-Kyung Kim, Tai-Myung Chung
Secure Communication Scheme Applying MX Resource Record in DNSSEC Domain. [Citation Graph (0, 0)][DBLP] ICCSA (1), 2004, pp:238-245 [Conf]
- Hyung-Jin Lim, Moonseong Kim, Dong-Young Lee, Tai-Myoung Chung
An Analysis of Policy Provisioning Complexity in Accordance with the Application Attributes of the Policy-Based Network. [Citation Graph (0, 0)][DBLP] ICCSA (5), 2006, pp:626-634 [Conf]
- Hyung-Jin Lim, Dong-Young Lee, Tai-Myoung Chung
Comparative Analysis of IPv6 VPN Transition in NEMO Environments. [Citation Graph (0, 0)][DBLP] ICCSA (3), 2006, pp:486-496 [Conf]
- Hyung-Jin Lim, Dong-Young Lee, Tae-Kyung Kim, Tai-Myoung Chung
An Evaluation and Analysis for IP VPN Model in IPv6 Transition Environment. [Citation Graph (0, 0)][DBLP] ICCSA (2), 2006, pp:135-144 [Conf]
- Hyung-Jin Lim, Ki-jeong Chun, Tai-Myoung Chung
Adaptive Bandwidth Control Using Fuzzy Inference in Policy-Based Network Management. [Citation Graph (0, 0)][DBLP] ICOIN, 2005, pp:443-451 [Conf]
- Jung-Muk Lim, Hyung-Jin Lim, Tai-Myoung Chung
Performance Evaluation of Public Key Based Mechanisms for Mobile IPv4 Authentication in AAA Environments. [Citation Graph (0, 0)][DBLP] ICOIN, 2006, pp:62-71 [Conf]
- Tae-Kyung Kim, Hyung-Jin Lim, Tai-Myung Chung
Service Negotiation Model for Response Time in Distributed Networks. [Citation Graph (0, 0)][DBLP] Computers and Artificial Intelligence, 2004, v:23, n:4, pp:- [Journal]
Preventing Out-of-Sequence Packets on the Route Optimization Procedure in Proxy Mobile IPv6. [Citation Graph (, )][DBLP]
Optimizing Access Point Allocation Using Genetic Algorithmic Approach for Smart Home Environments. [Citation Graph (, )][DBLP]
Search in 0.002secs, Finished in 0.002secs
|