The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Inhye Kang: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Il-Gon Kim, Hyun Seok Kim, Ji-Yeon Lee, Jin-Young Choi, Inhye Kang
    Secrecy Analysis of Purchase Transaction in Electronic Purses. [Citation Graph (0, 0)][DBLP]
    AINA (1), 2006, pp:979-984 [Conf]
  2. Hyogon Kim, Jaesung Heo, Lynn Choi, Inhye Kang, Sunil Kim
    Taming Large Classifiers with Rule Reference Locality. [Citation Graph (0, 0)][DBLP]
    ICOIN, 2003, pp:928-937 [Conf]
  3. Hyogon Kim, Jin-Ho Kim, Saewoong Bahk, Inhye Kang
    Fast Classification, Calibration, and Visualization of Network Attacks on Backbone Links. [Citation Graph (0, 0)][DBLP]
    ICOIN, 2004, pp:837-846 [Conf]
  4. Inhye Kang, Insup Lee
    An Efficient State Space Generation for Analysis of Real-Time Systems. [Citation Graph (0, 0)][DBLP]
    ISSTA, 1996, pp:4-13 [Conf]
  5. Inhye Kang
    TREAT: Timed REachability Analysis Tool. [Citation Graph (0, 0)][DBLP]
    PDPTA, 1999, pp:586-591 [Conf]
  6. Myung-Hwan Park, Ki-Seok Bang, Jin-Young Choi, Inhye Kang
    Equivalence Checking of Two Statechart Specifications. [Citation Graph (0, 0)][DBLP]
    IEEE International Workshop on Rapid System Prototyping, 2000, pp:46-51 [Conf]
  7. Il-Gon Kim, Young-Joo Moon, Inhye Kang, Ji-Yeon Lee, Keun-Hee Han, Jin-Young Choi
    Model-Based Analysis of Money Accountability in Electronic Purses. [Citation Graph (0, 0)][DBLP]
    WINE, 2005, pp:346-355 [Conf]
  8. Sangki Yun, Hyogon Kim, Inhye Kang
    Squeezing 100+ VoIP calls out of 802.11b WLANs. [Citation Graph (0, 0)][DBLP]
    WOWMOM, 2006, pp:308-314 [Conf]
  9. Il-Gon Kim, Miyoung Kang, Jin-Young Choi, Peter D. Zegzhda, Maxim O. Kalinin, Dmitry P. Zegzhda, Inhye Kang
    Formal Verification of Security Model Using SPR Tool. [Citation Graph (0, 0)][DBLP]
    Computers and Artificial Intelligence, 2006, v:25, n:5, pp:- [Journal]
  10. Hyogon Kim, Inhye Kang, Saewoong Bahk
    Real-time visualization of network attacks on high-speed links. [Citation Graph (0, 0)][DBLP]
    IEEE Network, 2004, v:18, n:5, pp:30-39 [Journal]
  11. Hyogon Kim, Jin-Ho Kim, Inhye Kang, Saewoong Bahk
    Preventing Session Table Explosion in Packet Inspection Computers. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 2005, v:54, n:2, pp:238-240 [Journal]
  12. Inhye Kang, Insup Lee, Young-Si Kim
    An Efficient State Space Generation for the Analysis of Real-Time Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 2000, v:26, n:5, pp:453-477 [Journal]
  13. Hyogon Kim, Sangki Yun, Heejo Lee, Inhye Kang, Kyu-Young Choi
    A Simple Congestion-Resilient Link Adaptation Algorithm for IEEE 802.11 WLANs. [Citation Graph (0, 0)][DBLP]
    GLOBECOM, 2006, pp:- [Conf]

  14. Hop-by-Hop Frame Aggregation for VoIP on Multi-Hop Wireless Networks. [Citation Graph (, )][DBLP]


  15. On the Cross-Layer Impact of TCP ACK Thinning on IEEE 802.11 Wireless MAC Dynamics. [Citation Graph (, )][DBLP]


  16. Improving VoIP Call Capacity of Multi-Hop Wireless Networks through Self-Controlled Frame Aggregation. [Citation Graph (, )][DBLP]


  17. Secure Vehicular Communication for Safety Applications - A Measurement Study. [Citation Graph (, )][DBLP]


Search in 0.028secs, Finished in 0.028secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002