|
Search the dblp DataBase
Kihong Kim:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Kihong Kim, Sang Kyun Cha
Sibling Clustering of Tree-Based Spatial Indexes for Efficient Spatial Query Processing. [Citation Graph (2, 0)][DBLP] CIKM, 1998, pp:398-405 [Conf]
- Jaesang Lee, Woosuk Ju, Kihong Kim, Choongjae Im
Design and Implementation of the Authoring Tools for the 3D online Action Game. [Citation Graph (0, 0)][DBLP] ADCOG, 2004, pp:85-88 [Conf]
- Kihong Kim, Jinkeun Hong, Jongin Lim
A Secure and Efficient Communication Resume Protocol for Secure Wireless Networks. [Citation Graph (0, 0)][DBLP] DAIS, 2005, pp:157-168 [Conf]
- Kihong Kim, Jinkeun Hong, Jongin Lim
Analysis of the Power Consumption of Secure Communication in Wireless Networks. [Citation Graph (0, 0)][DBLP] DEXA, 2006, pp:894-903 [Conf]
- Kihong Kim, Jinkeun Hong, Jongin Lim
Fast and Secure Communication Resume Protocol for Wireless Networks. [Citation Graph (0, 0)][DBLP] Euro-Par, 2005, pp:1120-1129 [Conf]
- Jinkeun Hong, Kihong Kim
The Approach of Transmission Scheme in Wireless Cipher Communication. [Citation Graph (0, 0)][DBLP] HPCC, 2005, pp:555-559 [Conf]
- K. O. Kenneth, Kihong Kim, Brian A. Floyd, Jesal L. Mehta, Hyun Yoon, Chih-Ming Hung, Daniel F. Bravo, Timothy O. Dickson, Xiaoling Guo, Ran Li, Narasimhan Trichy, James Caserta, Wayne R. Bomstad II, Jason Branch, Dong-Jun Yang, Jose Bohorquez, Jie Chen, Eunyoung Seok, Li Gao, Aravind Sugavanam, Jau-Jr Lin, S. Yu, C. Cao, M.-H. Hwang, Y.-R. Ding, S.-H. Hwang, H. Wu, N. Zhang, Joe E. Brewer
The feasibility of on-chip interconnection using antennas. [Citation Graph (0, 0)][DBLP] ICCAD, 2005, pp:979-984 [Conf]
- Jinkeun Hong, Kihong Kim
Performance Enhancement of Wireless Cipher Communication. [Citation Graph (0, 0)][DBLP] ICCNMC, 2005, pp:443-451 [Conf]
- Juchang Lee, Kihong Kim, Sang Kyun Cha
Differential Logging: A Commutative and Associative Logging Scheme for Highly Parallel Main Memory Databases. [Citation Graph (0, 0)][DBLP] ICDE, 2001, pp:173-182 [Conf]
- Jinkeun Hong, Kihong Kim
Design of Tree Filter Algorithm for Random Number Generator in Crypto Module. [Citation Graph (0, 0)][DBLP] ICIAR, 2005, pp:343-350 [Conf]
- Kihong Kim, Jinkeun Hong, Jongin Lim
Analysis/Synthesis of Speech Signals Based on AbS/OLA Sinusoidal Modeling Using Elliptic Filter. [Citation Graph (0, 0)][DBLP] IDEAL, 2005, pp:141-148 [Conf]
- Jinkeun Hong, Kihong Kim, Dongcheul Son
The Design of Random Number Generator in an Embedded Crypto Module. [Citation Graph (0, 0)][DBLP] ISPA Workshops, 2006, pp:990-999 [Conf]
- Sangweon Suh, Kihong Kim, Heechong Lee, Hyunbin Kim
Neural Network Based Nonlinear Feature Extraction of Head-Related Transfer Function (HRTF) Data in 3-D Sound Processing. [Citation Graph (0, 0)][DBLP] NC, 1998, pp:439-444 [Conf]
- Jinkeun Hong, Kihong Kim
The Efficient Transmission Scheme in Wireless Crypto Communication. [Citation Graph (0, 0)][DBLP] NPC, 2005, pp:470-477 [Conf]
- Jinkeun Hong, Kihong Kim
An Adaptive Filter Mechanism of Random Number Generator in a Crypto Module. [Citation Graph (0, 0)][DBLP] PPAM, 2005, pp:575-582 [Conf]
- Kihong Kim, Sang Kyun Cha, Keunjoo Kwon
Optimizing Multidimensional Index Trees for Main Memory Access. [Citation Graph (0, 0)][DBLP] SIGMOD Conference, 2001, pp:139-150 [Conf]
- Brian A. Floyd, Xiaoling Guo, James Caserta, Timothy O. Dickson, Chih-Ming Hung, Kihong Kim, K. O. Kenneth
Wireless interconnects for clock distribution. [Citation Graph (0, 0)][DBLP] Timing Issues in the Specification and Synthesis of Digital Systems, 2002, pp:105-108 [Conf]
- Kihong Kim, Jinkeun Hong, Jongin Lim
Sinusoidal Modeling Using Wavelet Packet Transform Applied to the Analysis and Synthesis of Speech Signals. [Citation Graph (0, 0)][DBLP] TSD, 2005, pp:241-248 [Conf]
- Sang Kyun Cha, Sangyong Hwang, Kihong Kim, Keunjoo Kwon
Cache-Conscious Concurrency Control of Main-Memory Indexes on Shared-Memory Multiprocessor Systems. [Citation Graph (0, 0)][DBLP] VLDB, 2001, pp:181-190 [Conf]
- Kihong Kim, Jinkeun Hong, Jongin Lim
Approach of the Secure Communication Mechanism in Aero-wireless Environment. [Citation Graph (0, 0)][DBLP] MUE, 2007, pp:1070-1075 [Conf]
Optimum Power Controller for Random Number Generator in the Crypto Module of Ubiquitous Computing Environment. [Citation Graph (, )][DBLP]
A demonstration of the MaxStream federated stream processing system. [Citation Graph (, )][DBLP]
Interference Analysis and Sensing Threshold of Detect and Avoid (DAA) for UWB Coexistence with WiMax. [Citation Graph (, )][DBLP]
Speech Quality Enhancement Based on Sinusoidal Model Using Chebyshev Filter. [Citation Graph (, )][DBLP]
The Genetic Algorithm for RNG in the Crypto Module of Ubiquitous Computing Environment. [Citation Graph (, )][DBLP]
Performance Analysis of Digital Secure Voice Transmission over HF Radio Channel. [Citation Graph (, )][DBLP]
Search in 0.004secs, Finished in 0.282secs
|