The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Ki-Chang Kim: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Yong-Kyoon Kang, Ki-Chang Kim, Yoo-Sung Kim
    Probability-Based Tile Pre-fetching and Cache Replacement Algorithms for Web Geographical Information Systems. [Citation Graph (0, 0)][DBLP]
    ADBIS, 2001, pp:127-140 [Conf]
  2. Dong-Ho Lee, Jung Sup Kim, Soo Duk Kim, Ki-Chang Kim, Yoo-Sung Kim, Jaehyun Park
    Adaptation of a Neighbor Selection Markov Chain for Prefetching Tiled Web GIS Data. [Citation Graph (0, 0)][DBLP]
    ADVIS, 2002, pp:213-222 [Conf]
  3. Dongho Lee, Jungsup Kim, Soo Duk Kim, Ki-Chang Kim, Jaehyun Park
    Robustness of a Neighbor Selection Markov Chain in Prefetching Tiled Web Data. [Citation Graph (0, 0)][DBLP]
    AISA, 2002, pp:57-66 [Conf]
  4. Il-Yong Kim, Yoo-Sung Kim, Ki-Chang Kim
    Zone-Based Clustering for Intrusion Detection Architecture in Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP]
    APNOMS, 2006, pp:253-262 [Conf]
  5. Ki-Chang Kim, Jin Soo Hwang, Byung Yong Kim, Soo Duk Kim
    Tagged Fragment Marking Scheme with Distance-Weighted Sampling for a Fast IP Traceback. [Citation Graph (0, 0)][DBLP]
    APWeb, 2003, pp:442-452 [Conf]
  6. Byung Ryong Kim, Ki-Chang Kim
    Improved Technique of IP Address Fragmentation Strategies for DoS Attack Traceback. [Citation Graph (0, 0)][DBLP]
    CSR, 2006, pp:427-437 [Conf]
  7. Chang-Hwan Shin, Kyong-I Ku, Ki-Chang Kim, Yoo-Sung Kim
    Automatic Construction of Theme Melody Index from Music Database for Fast Content-Based Retrievals. [Citation Graph (0, 0)][DBLP]
    ECIR, 2003, pp:605-612 [Conf]
  8. Yoon-Chan Jhi, Ki-Chang Kim, Kemal Ebcioglu, Yong Surk Lee
    A Prolog Tailoring Technique on an Epilog Tailored Procedure. [Citation Graph (0, 0)][DBLP]
    Ershov Memorial Conference, 2001, pp:421-433 [Conf]
  9. Byung Ryong Kim, Ki-Chang Kim
    Anonymous Communication Systems in P2P Network with Random Agent Nodes. [Citation Graph (0, 0)][DBLP]
    GCC, 2005, pp:767-775 [Conf]
  10. Dae Sung Lee, Jeong Seob Kim, Jaehyun Park, Ki-Chang Kim
    Reducing Interrupt Latency at Linux Kernel Level for Real-Time Network. [Citation Graph (0, 0)][DBLP]
    ICAT, 2006, pp:643-650 [Conf]
  11. Byung Ryong Kim, Ki-Chang Kim
    A Proposal of Extension of FMS-Based Mechanism to Find Attack Paths. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:476-485 [Conf]
  12. Sang-Hyuk Lim, Kyong-I Ku, Ki-Chang Kim, Yoo-Sung Kim
    A Node Split Algorithm Reducing Overlapped Index Spaces in M-tree Index. [Citation Graph (0, 0)][DBLP]
    ICDE Workshops, 2006, pp:15- [Conf]
  13. Ki-Chang Kim, Alexandru Nicolau
    Parallelizing Non-Vectorizable Loops for MIMD Machines. [Citation Graph (0, 0)][DBLP]
    ICPP (2), 1990, pp:114-118 [Conf]
  14. Yoo-Sung Kim, Ki-Chang Kim, Soo Duk Kim
    Prefetching Tiled Internet Data Using a Neighbor Selection Markov Chain. [Citation Graph (0, 0)][DBLP]
    IICS, 2001, pp:103-115 [Conf]
  15. K. W. Ko, I. T. Kim, Sang B. Yoo, Ki-Chang Kim, Soo Duk Kim, J. S. Kim, Yong Surk Lee
    Compiling Rule-Based Agent for Distributed Databases. [Citation Graph (0, 0)][DBLP]
    IICS, 2002, pp:205-215 [Conf]
  16. Ki-Chang Kim, Alexandru Nicolau
    Parallelizing Tightly Nested Loops. [Citation Graph (0, 0)][DBLP]
    IPPS, 1991, pp:630-633 [Conf]
  17. Jeong Seob Kim, Dae Sung Lee, Ki-Chang Kim, Jae Hyun Park
    Ensuring Immediate Processing of Real-Time Packets at Kernel Level. [Citation Graph (0, 0)][DBLP]
    ISPA Workshops, 2006, pp:738-747 [Conf]
  18. Dae Sung Lee, Ki-Chang Kim, Year Back Yoo
    IPBio: Embedding Biometric Data in IP Header for Per-Packet Authentication. [Citation Graph (0, 0)][DBLP]
    ISPA Workshops, 2006, pp:927-938 [Conf]
  19. Byung Ryong Kim, Ki-Chang Kim
    Efficient Caching Strategies for Gnutella-Like Systems to Achieve Anonymity in Unstructured P2P File Sharing. [Citation Graph (0, 0)][DBLP]
    NGITS, 2006, pp:117-128 [Conf]
  20. Kemal Ebcioglu, Randy D. Groves, Ki-Chang Kim, Gabriel M. Silberman, Isaac Ziv
    VLIW Compilation Techniques in a Superscalar Environment. [Citation Graph (0, 0)][DBLP]
    PLDI, 1994, pp:36-48 [Conf]
  21. Byung Ryong Kim, Ki-Chang Kim
    Query Processing to Efficient Search in Ubiquitous Computing. [Citation Graph (0, 0)][DBLP]
    International Conference on Computational Science (4), 2007, pp:849-852 [Conf]
  22. Dae Sung Lee, Ki-Chang Kim, Year Back Yoo
    Enhancing Security by Embedding Biometric Data in IP Header. [Citation Graph (0, 0)][DBLP]
    SOFSEM (1), 2007, pp:726-737 [Conf]

Search in 0.018secs, Finished in 0.020secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002