Search the dblp DataBase
Young Ik Eom :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Gu Su Kim , Kyoung-in Kim , Young Ik Eom Dynamic Load Balancing Scheme Based on Resource Reservation for Migration of Agent in the Pure P2P Network Environment. [Citation Graph (0, 0)][DBLP ] AIS, 2004, pp:538-546 [Conf ] Gu Su Kim , Young Ik Eom Fault-tolerant MA Migration Scheme based on Encrypted Checkpoints. [Citation Graph (0, 0)][DBLP ] CAINE, 2003, pp:40-43 [Conf ] In-suk Kim , Moon Jeong Kim , Young Ik Eom Mobile Agent Based Discovery Scheme in Pure P2P Environments. [Citation Graph (0, 0)][DBLP ] CAINE, 2003, pp:44-49 [Conf ] Sang Yun Park , Ki Seon Ryu , Ung-Mo Kim , Young Ik Eom An Efficient Multicasting Scheme Using Prejoin Technology in Mobile Computing Environments. [Citation Graph (0, 0)][DBLP ] CDMA International Conference, 2002, pp:349-361 [Conf ] Jae-Gon Kim , Gu Su Kim , Young Ik Eom Lightweight Mobile Agent Authentication Scheme for Home Network Environments. [Citation Graph (0, 0)][DBLP ] CIS, 2004, pp:853-859 [Conf ] Kwangsun Ko , Insook Jang , Yong-hyeog Kang , Jinseok Lee , Young Ik Eom Characteristic Classification and Correlation Analysis of Source-Level Vulnerabilities in the Linux Kernel. [Citation Graph (0, 0)][DBLP ] CIS (2), 2005, pp:1149-1156 [Conf ] In-suk Kim , Yong-hyeog Kang , Young Ik Eom An Efficient Contents Discovery Mechanism in Pure P2P Environments. [Citation Graph (0, 0)][DBLP ] GCC (1), 2003, pp:420-427 [Conf ] Hyeog Man Kwon , Moon Jeong Kim , Young Ik Eom A Nested Token-Based Delegation Scheme for Cascaded Delegation in Mobile Agent Environments. [Citation Graph (0, 0)][DBLP ] Human.Society@Internet 2003, 2003, pp:537-547 [Conf ] Juryon Paik , Young Ik Eom , Ung-Mo Kim Extraction of Interesting Financial Information from Heterogeneous XML-Based Data. [Citation Graph (0, 0)][DBLP ] International Conference on Computational Science (4), 2006, pp:356-363 [Conf ] Kwangsun Ko , Gu Su Kim , June Kim , JungHyun Han , Ung-Mo Kim , Young Ik Eom Design and Implementation of a Security Framework Based on the Object-Based Storage Device Standard. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2006, pp:1028-1035 [Conf ] Hee-Wan Kim , Hae-Kyung Rhee , Tai M. Chung , Young Ik Eom , Ung-Mo Kim A Transaction Length-Sensitive Protocol Based on Altruistic Locking for Multilevel Secure Database Systems. [Citation Graph (0, 0)][DBLP ] ICICS, 2001, pp:107-118 [Conf ] Moon Seog Han , Sang Yun Park , Young Ik Eom A File Migration Scheme for Reducing File Access Latency in Mobile Computing Environments. [Citation Graph (0, 0)][DBLP ] ICOIN (2), 2002, pp:644-655 [Conf ] Sang Yun Park , Ki Seon Ryu , Young Ik Eom RAMRP Protocol for Reliable Multicasting in Wireless Ad-Hoc Network Environments. [Citation Graph (0, 0)][DBLP ] ICOIN, 2003, pp:222-231 [Conf ] JungHyun Han , Ingu Kang , Chungmin Hyun , Jong-Sik Woo , Young Ik Eom Multi-platform Online Game Design and Architecture. [Citation Graph (0, 0)][DBLP ] INTERACT, 2005, pp:1116-1119 [Conf ] Ingu Kang , Young Ik Eom , JungHyun Han A Multi-resolution Technique for Real-time Animation of Large Crowds. [Citation Graph (0, 0)][DBLP ] ISCIS, 2006, pp:384-393 [Conf ] Kwangsun Ko , Eun-kyung Cho , Taekeun Lee , Yong-hyeog Kang , Young Ik Eom The Abnormal Traffic Control Framework Based on QoS Mechanisms. [Citation Graph (0, 0)][DBLP ] ISCIS, 2004, pp:167-175 [Conf ] Gu Su Kim , Young Ik Eom Domain-Based Mobile Agent Fault-Tolerance Scheme for Home Network Environments. [Citation Graph (0, 0)][DBLP ] ISPEC, 2006, pp:269-277 [Conf ] Jung Hee Kim , Hyun-chul Sim , Yong-hyeog Kang , Young Ik Eom Design and Implementation of a Remote Debugger for Concurrent Debugging of Multiple Processes in Embedded Linux Systems. [Citation Graph (0, 0)][DBLP ] NPC, 2004, pp:280-283 [Conf ] Hyun-Ho Kim , Jung Hee Kim , Yong-hyeog Kang , Young Ik Eom An Energy-Tree Based Routing Algorithm in Wireless Ad-Hoc Network Environments. [Citation Graph (0, 0)][DBLP ] PATMOS, 2005, pp:156-165 [Conf ] Ki Seon Ryu , Sang Yun Park , Young Ik Eom A Reliable Multicast Routing Scheme for Wireless Ad-hoc Networks. [Citation Graph (0, 0)][DBLP ] PDPTA, 2000, pp:- [Conf ] Moon Jeong Kim , Young Ik Eom An Adaptive Routing Protocol Supporting Reliable Communication in Wireless Ad-Hoc Network Environments. [Citation Graph (0, 0)][DBLP ] PRDC, 2001, pp:206-213 [Conf ] Hyun-jin Cho , Gu Su Kim , Young Ik Eom Partial Group Session Key Agreement Scheme for Mobile Agents in e-Commerce Environment. [Citation Graph (0, 0)][DBLP ] PRIMA, 2006, pp:420-431 [Conf ] Hyun Suk Lee , Hyeog Man Kwon , Young Ik Eom Reliable Cascaded Delegation Scheme for Mobile Agent Environments. [Citation Graph (0, 0)][DBLP ] WISA, 2003, pp:55-68 [Conf ] Gu Su Kim , Kwangsun Ko , Ung-Mo Kim , Young Ik Eom Implementation of OSD Security Framework and Credential Cache. [Citation Graph (0, 0)][DBLP ] GPC, 2007, pp:666-671 [Conf ] Gu Su Kim , Hyun-jin Cho , Young Ik Eom The Implementation of Adaptive User Interface Migration Based on Ubiquitous Mobile Agents. [Citation Graph (0, 0)][DBLP ] HCI (8), 2007, pp:659-668 [Conf ] Gu Su Kim , Hyun-jin Cho , Young Ik Eom Dynamic Cell Phone UI Generation for Mobile Agents. [Citation Graph (0, 0)][DBLP ] HCI (9), 2007, pp:563-571 [Conf ] Gu Su Kim , Chul-Seung Kim , Hyun-Su Jang , Moon-Seok Chang , Young Ik Eom Design and Implementation of DLNA DMS Through IEEE1394. [Citation Graph (0, 0)][DBLP ] International Conference on Computational Science (4), 2007, pp:542-545 [Conf ] Kwangsun Ko , Seong-Goo Kang , Gyehyeon Gyeong , Young Ik Eom Recursive Priority Inheritance Protocol for Solving Priority Inversion Problems in Real-Time Operating Systems. [Citation Graph (0, 0)][DBLP ] International Conference on Computational Science (4), 2007, pp:977-980 [Conf ] Moon Jeong Kim , Dong Hoon Lee , Young Ik Eom Enhanced Non-disjoint Multi-path Source Routing Protocol for Wireless Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP ] ICCSA (3), 2007, pp:1187-1196 [Conf ] Cross-Layer Service Discovery Using Multi-Path for Wireless Environments. [Citation Graph (, )][DBLP ] User Adaptive Recommendation Model by Using User Clustering based on Decision Tree. [Citation Graph (, )][DBLP ] A Transformation Scheme for Interconnection Networks. [Citation Graph (, )][DBLP ] KAST: K-associative sector translation for NAND flash memory in real-time systems. [Citation Graph (, )][DBLP ] Overlay Ring Based Secure Group Communication Scheme for Mobile Agents. [Citation Graph (, )][DBLP ] Analysis of the Propagation Pattern of a Worm with Random Scanning Strategy Based on Usage Rate of Network Bandwidth. [Citation Graph (, )][DBLP ] Design and implementation of page sharing scheme between guests in virtualization environments. [Citation Graph (, )][DBLP ] Design of RBAC-based secure KAgent framework for home network applications. [Citation Graph (, )][DBLP ] Design and implementation of VoIP device management scheme in SOHO environments. [Citation Graph (, )][DBLP ] Design and implementation of the management agent for mobile devices based on OMA DM. [Citation Graph (, )][DBLP ] A cooperative content delivery scheme for multimedia services in contents delivery networks. [Citation Graph (, )][DBLP ] A Cooperative Authentication of IPSec and SEND Mechanisms in IPv6 Environments. [Citation Graph (, )][DBLP ] Design of a Multi-middleware Bridge for Supporting Interoperability in Home Network Environments. [Citation Graph (, )][DBLP ] NeoMAN: Negotiation Management Method for IKE Protocol Based on X.509. [Citation Graph (, )][DBLP ] Search in 0.003secs, Finished in 0.308secs