|
Search the dblp DataBase
Inhye Kang:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Il-Gon Kim, Hyun Seok Kim, Ji-Yeon Lee, Jin-Young Choi, Inhye Kang
Secrecy Analysis of Purchase Transaction in Electronic Purses. [Citation Graph (0, 0)][DBLP] AINA (1), 2006, pp:979-984 [Conf]
- Hyogon Kim, Jaesung Heo, Lynn Choi, Inhye Kang, Sunil Kim
Taming Large Classifiers with Rule Reference Locality. [Citation Graph (0, 0)][DBLP] ICOIN, 2003, pp:928-937 [Conf]
- Hyogon Kim, Jin-Ho Kim, Saewoong Bahk, Inhye Kang
Fast Classification, Calibration, and Visualization of Network Attacks on Backbone Links. [Citation Graph (0, 0)][DBLP] ICOIN, 2004, pp:837-846 [Conf]
- Inhye Kang, Insup Lee
An Efficient State Space Generation for Analysis of Real-Time Systems. [Citation Graph (0, 0)][DBLP] ISSTA, 1996, pp:4-13 [Conf]
- Inhye Kang
TREAT: Timed REachability Analysis Tool. [Citation Graph (0, 0)][DBLP] PDPTA, 1999, pp:586-591 [Conf]
- Myung-Hwan Park, Ki-Seok Bang, Jin-Young Choi, Inhye Kang
Equivalence Checking of Two Statechart Specifications. [Citation Graph (0, 0)][DBLP] IEEE International Workshop on Rapid System Prototyping, 2000, pp:46-51 [Conf]
- Il-Gon Kim, Young-Joo Moon, Inhye Kang, Ji-Yeon Lee, Keun-Hee Han, Jin-Young Choi
Model-Based Analysis of Money Accountability in Electronic Purses. [Citation Graph (0, 0)][DBLP] WINE, 2005, pp:346-355 [Conf]
- Sangki Yun, Hyogon Kim, Inhye Kang
Squeezing 100+ VoIP calls out of 802.11b WLANs. [Citation Graph (0, 0)][DBLP] WOWMOM, 2006, pp:308-314 [Conf]
- Il-Gon Kim, Miyoung Kang, Jin-Young Choi, Peter D. Zegzhda, Maxim O. Kalinin, Dmitry P. Zegzhda, Inhye Kang
Formal Verification of Security Model Using SPR Tool. [Citation Graph (0, 0)][DBLP] Computers and Artificial Intelligence, 2006, v:25, n:5, pp:- [Journal]
- Hyogon Kim, Inhye Kang, Saewoong Bahk
Real-time visualization of network attacks on high-speed links. [Citation Graph (0, 0)][DBLP] IEEE Network, 2004, v:18, n:5, pp:30-39 [Journal]
- Hyogon Kim, Jin-Ho Kim, Inhye Kang, Saewoong Bahk
Preventing Session Table Explosion in Packet Inspection Computers. [Citation Graph (0, 0)][DBLP] IEEE Trans. Computers, 2005, v:54, n:2, pp:238-240 [Journal]
- Inhye Kang, Insup Lee, Young-Si Kim
An Efficient State Space Generation for the Analysis of Real-Time Systems. [Citation Graph (0, 0)][DBLP] IEEE Trans. Software Eng., 2000, v:26, n:5, pp:453-477 [Journal]
- Hyogon Kim, Sangki Yun, Heejo Lee, Inhye Kang, Kyu-Young Choi
A Simple Congestion-Resilient Link Adaptation Algorithm for IEEE 802.11 WLANs. [Citation Graph (0, 0)][DBLP] GLOBECOM, 2006, pp:- [Conf]
Hop-by-Hop Frame Aggregation for VoIP on Multi-Hop Wireless Networks. [Citation Graph (, )][DBLP]
On the Cross-Layer Impact of TCP ACK Thinning on IEEE 802.11 Wireless MAC Dynamics. [Citation Graph (, )][DBLP]
Improving VoIP Call Capacity of Multi-Hop Wireless Networks through Self-Controlled Frame Aggregation. [Citation Graph (, )][DBLP]
Secure Vehicular Communication for Safety Applications - A Measurement Study. [Citation Graph (, )][DBLP]
Search in 0.028secs, Finished in 0.028secs
|