The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Young Ik Eom: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Gu Su Kim, Kyoung-in Kim, Young Ik Eom
    Dynamic Load Balancing Scheme Based on Resource Reservation for Migration of Agent in the Pure P2P Network Environment. [Citation Graph (0, 0)][DBLP]
    AIS, 2004, pp:538-546 [Conf]
  2. Gu Su Kim, Young Ik Eom
    Fault-tolerant MA Migration Scheme based on Encrypted Checkpoints. [Citation Graph (0, 0)][DBLP]
    CAINE, 2003, pp:40-43 [Conf]
  3. In-suk Kim, Moon Jeong Kim, Young Ik Eom
    Mobile Agent Based Discovery Scheme in Pure P2P Environments. [Citation Graph (0, 0)][DBLP]
    CAINE, 2003, pp:44-49 [Conf]
  4. Sang Yun Park, Ki Seon Ryu, Ung-Mo Kim, Young Ik Eom
    An Efficient Multicasting Scheme Using Prejoin Technology in Mobile Computing Environments. [Citation Graph (0, 0)][DBLP]
    CDMA International Conference, 2002, pp:349-361 [Conf]
  5. Jae-Gon Kim, Gu Su Kim, Young Ik Eom
    Lightweight Mobile Agent Authentication Scheme for Home Network Environments. [Citation Graph (0, 0)][DBLP]
    CIS, 2004, pp:853-859 [Conf]
  6. Kwangsun Ko, Insook Jang, Yong-hyeog Kang, Jinseok Lee, Young Ik Eom
    Characteristic Classification and Correlation Analysis of Source-Level Vulnerabilities in the Linux Kernel. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:1149-1156 [Conf]
  7. In-suk Kim, Yong-hyeog Kang, Young Ik Eom
    An Efficient Contents Discovery Mechanism in Pure P2P Environments. [Citation Graph (0, 0)][DBLP]
    GCC (1), 2003, pp:420-427 [Conf]
  8. Hyeog Man Kwon, Moon Jeong Kim, Young Ik Eom
    A Nested Token-Based Delegation Scheme for Cascaded Delegation in Mobile Agent Environments. [Citation Graph (0, 0)][DBLP]
    Human.Society@Internet 2003, 2003, pp:537-547 [Conf]
  9. Juryon Paik, Young Ik Eom, Ung-Mo Kim
    Extraction of Interesting Financial Information from Heterogeneous XML-Based Data. [Citation Graph (0, 0)][DBLP]
    International Conference on Computational Science (4), 2006, pp:356-363 [Conf]
  10. Kwangsun Ko, Gu Su Kim, June Kim, JungHyun Han, Ung-Mo Kim, Young Ik Eom
    Design and Implementation of a Security Framework Based on the Object-Based Storage Device Standard. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2006, pp:1028-1035 [Conf]
  11. Hee-Wan Kim, Hae-Kyung Rhee, Tai M. Chung, Young Ik Eom, Ung-Mo Kim
    A Transaction Length-Sensitive Protocol Based on Altruistic Locking for Multilevel Secure Database Systems. [Citation Graph (0, 0)][DBLP]
    ICICS, 2001, pp:107-118 [Conf]
  12. Moon Seog Han, Sang Yun Park, Young Ik Eom
    A File Migration Scheme for Reducing File Access Latency in Mobile Computing Environments. [Citation Graph (0, 0)][DBLP]
    ICOIN (2), 2002, pp:644-655 [Conf]
  13. Sang Yun Park, Ki Seon Ryu, Young Ik Eom
    RAMRP Protocol for Reliable Multicasting in Wireless Ad-Hoc Network Environments. [Citation Graph (0, 0)][DBLP]
    ICOIN, 2003, pp:222-231 [Conf]
  14. JungHyun Han, Ingu Kang, Chungmin Hyun, Jong-Sik Woo, Young Ik Eom
    Multi-platform Online Game Design and Architecture. [Citation Graph (0, 0)][DBLP]
    INTERACT, 2005, pp:1116-1119 [Conf]
  15. Ingu Kang, Young Ik Eom, JungHyun Han
    A Multi-resolution Technique for Real-time Animation of Large Crowds. [Citation Graph (0, 0)][DBLP]
    ISCIS, 2006, pp:384-393 [Conf]
  16. Kwangsun Ko, Eun-kyung Cho, Taekeun Lee, Yong-hyeog Kang, Young Ik Eom
    The Abnormal Traffic Control Framework Based on QoS Mechanisms. [Citation Graph (0, 0)][DBLP]
    ISCIS, 2004, pp:167-175 [Conf]
  17. Gu Su Kim, Young Ik Eom
    Domain-Based Mobile Agent Fault-Tolerance Scheme for Home Network Environments. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2006, pp:269-277 [Conf]
  18. Jung Hee Kim, Hyun-chul Sim, Yong-hyeog Kang, Young Ik Eom
    Design and Implementation of a Remote Debugger for Concurrent Debugging of Multiple Processes in Embedded Linux Systems. [Citation Graph (0, 0)][DBLP]
    NPC, 2004, pp:280-283 [Conf]
  19. Hyun-Ho Kim, Jung Hee Kim, Yong-hyeog Kang, Young Ik Eom
    An Energy-Tree Based Routing Algorithm in Wireless Ad-Hoc Network Environments. [Citation Graph (0, 0)][DBLP]
    PATMOS, 2005, pp:156-165 [Conf]
  20. Ki Seon Ryu, Sang Yun Park, Young Ik Eom
    A Reliable Multicast Routing Scheme for Wireless Ad-hoc Networks. [Citation Graph (0, 0)][DBLP]
    PDPTA, 2000, pp:- [Conf]
  21. Moon Jeong Kim, Young Ik Eom
    An Adaptive Routing Protocol Supporting Reliable Communication in Wireless Ad-Hoc Network Environments. [Citation Graph (0, 0)][DBLP]
    PRDC, 2001, pp:206-213 [Conf]
  22. Hyun-jin Cho, Gu Su Kim, Young Ik Eom
    Partial Group Session Key Agreement Scheme for Mobile Agents in e-Commerce Environment. [Citation Graph (0, 0)][DBLP]
    PRIMA, 2006, pp:420-431 [Conf]
  23. Hyun Suk Lee, Hyeog Man Kwon, Young Ik Eom
    Reliable Cascaded Delegation Scheme for Mobile Agent Environments. [Citation Graph (0, 0)][DBLP]
    WISA, 2003, pp:55-68 [Conf]
  24. Gu Su Kim, Kwangsun Ko, Ung-Mo Kim, Young Ik Eom
    Implementation of OSD Security Framework and Credential Cache. [Citation Graph (0, 0)][DBLP]
    GPC, 2007, pp:666-671 [Conf]
  25. Gu Su Kim, Hyun-jin Cho, Young Ik Eom
    The Implementation of Adaptive User Interface Migration Based on Ubiquitous Mobile Agents. [Citation Graph (0, 0)][DBLP]
    HCI (8), 2007, pp:659-668 [Conf]
  26. Gu Su Kim, Hyun-jin Cho, Young Ik Eom
    Dynamic Cell Phone UI Generation for Mobile Agents. [Citation Graph (0, 0)][DBLP]
    HCI (9), 2007, pp:563-571 [Conf]
  27. Gu Su Kim, Chul-Seung Kim, Hyun-Su Jang, Moon-Seok Chang, Young Ik Eom
    Design and Implementation of DLNA DMS Through IEEE1394. [Citation Graph (0, 0)][DBLP]
    International Conference on Computational Science (4), 2007, pp:542-545 [Conf]
  28. Kwangsun Ko, Seong-Goo Kang, Gyehyeon Gyeong, Young Ik Eom
    Recursive Priority Inheritance Protocol for Solving Priority Inversion Problems in Real-Time Operating Systems. [Citation Graph (0, 0)][DBLP]
    International Conference on Computational Science (4), 2007, pp:977-980 [Conf]
  29. Moon Jeong Kim, Dong Hoon Lee, Young Ik Eom
    Enhanced Non-disjoint Multi-path Source Routing Protocol for Wireless Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2007, pp:1187-1196 [Conf]

  30. Cross-Layer Service Discovery Using Multi-Path for Wireless Environments. [Citation Graph (, )][DBLP]


  31. User Adaptive Recommendation Model by Using User Clustering based on Decision Tree. [Citation Graph (, )][DBLP]


  32. A Transformation Scheme for Interconnection Networks. [Citation Graph (, )][DBLP]


  33. KAST: K-associative sector translation for NAND flash memory in real-time systems. [Citation Graph (, )][DBLP]


  34. Overlay Ring Based Secure Group Communication Scheme for Mobile Agents. [Citation Graph (, )][DBLP]


  35. Analysis of the Propagation Pattern of a Worm with Random Scanning Strategy Based on Usage Rate of Network Bandwidth. [Citation Graph (, )][DBLP]


  36. Design and implementation of page sharing scheme between guests in virtualization environments. [Citation Graph (, )][DBLP]


  37. Design of RBAC-based secure KAgent framework for home network applications. [Citation Graph (, )][DBLP]


  38. Design and implementation of VoIP device management scheme in SOHO environments. [Citation Graph (, )][DBLP]


  39. Design and implementation of the management agent for mobile devices based on OMA DM. [Citation Graph (, )][DBLP]


  40. A cooperative content delivery scheme for multimedia services in contents delivery networks. [Citation Graph (, )][DBLP]


  41. A Cooperative Authentication of IPSec and SEND Mechanisms in IPv6 Environments. [Citation Graph (, )][DBLP]


  42. Design of a Multi-middleware Bridge for Supporting Interoperability in Home Network Environments. [Citation Graph (, )][DBLP]


  43. NeoMAN: Negotiation Management Method for IKE Protocol Based on X.509. [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.308secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002