Search the dblp DataBase
Hyogon Kim :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Dae Y. Kim , Sunil Kim , Lynn Choi , Hyogon Kim A High-Throughput System Architecture for Deep Packet Filtering in Network Intrusion Prevention. [Citation Graph (0, 0)][DBLP ] ARCS, 2006, pp:407-421 [Conf ] Hyogon Kim Implementation experience with NHRP prototype software. [Citation Graph (0, 0)][DBLP ] Broadband Networking Technologies, 1997, pp:166-175 [Conf ] Hyogon Kim , David J. Farber A new congestion control framework for large bandwidth-delay product networks. [Citation Graph (0, 0)][DBLP ] HPN, 1995, pp:294-304 [Conf ] Jin-Ho Kim , Saewoong Bahk , Hyogon Kim Effect of Coarse Timer Granularities on QoS Guarantees in Unix Based Systems. [Citation Graph (0, 0)][DBLP ] ICC (2), 2000, pp:969-973 [Conf ] Won Hyong Park , Saewoong Bahk , Hyogon Kim A Modified RIO Algorithm that Alleviates the Bandwidth Skew Problem in Internet Differentiated Service. [Citation Graph (0, 0)][DBLP ] ICC (3), 2000, pp:1599-1603 [Conf ] Narayanan Natarajan , Latha Kant , Changdong Kiu , Arunendu Roy , Hyogon Kim A Network Management System Design to Support End-To-End IP QoS. [Citation Graph (0, 0)][DBLP ] ICC (1), 2000, pp:216-221 [Conf ] Hyogon Kim , Jaesung Heo , Lynn Choi , Inhye Kang , Sunil Kim Taming Large Classifiers with Rule Reference Locality. [Citation Graph (0, 0)][DBLP ] ICOIN, 2003, pp:928-937 [Conf ] Hyogon Kim , Jin-Ho Kim , Saewoong Bahk , Inhye Kang Fast Classification, Calibration, and Visualization of Network Attacks on Backbone Links. [Citation Graph (0, 0)][DBLP ] ICOIN, 2004, pp:837-846 [Conf ] Changhee Joo , Saewoong Bahk , Hyogon Kim Synchronizing TCP with Block Acknowledgement over Multi-hop Wireless Networks. [Citation Graph (0, 0)][DBLP ] ICOIN, 2006, pp:267-275 [Conf ] Lynn Choi , Jaesung Heo , Hyogon Kim , Jinoo Joung , Sunil Kim Scalable Packet Classification through Maximum Entropy Hashing. [Citation Graph (0, 0)][DBLP ] NETWORKING, 2004, pp:296-307 [Conf ] Sangki Yun , Hyogon Kim , Inhye Kang Squeezing 100+ VoIP calls out of 802.11b WLANs. [Citation Graph (0, 0)][DBLP ] WOWMOM, 2006, pp:308-314 [Conf ] Hyogon Kim , Inhye Kang , Saewoong Bahk Real-time visualization of network attacks on high-speed links. [Citation Graph (0, 0)][DBLP ] IEEE Network, 2004, v:18, n:5, pp:30-39 [Journal ] Jin-Ho Kim , Saewoong Bahk , Hyogon Kim Performance Impact of Coarse Timer Granularities on QoS Guarantees in Unix-Based Systems. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Computers, 2003, v:52, n:1, pp:51-58 [Journal ] Hyogon Kim , Jin-Ho Kim , Inhye Kang , Saewoong Bahk Preventing Session Table Explosion in Packet Inspection Computers. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Computers, 2005, v:54, n:2, pp:238-240 [Journal ] Wan Yeon Lee , Heejo Lee , Hyogon Kim Energy-Aware QoS Adjustment of Multimedia Tasks with Uncertain Execution Time. [Citation Graph (0, 0)][DBLP ] International Conference on Computational Science (4), 2007, pp:709-712 [Conf ] Changhee Joo , Saewoong Bahk , Hyogon Kim Detecting spatial congestion in multihop wireless networks. [Citation Graph (0, 0)][DBLP ] IWCMC, 2006, pp:509-514 [Conf ] Jin-Ho Kim , Hyogon Kim , Saewoong Bahk On the Effectiveness of Service Registration-Based Worm Defense. [Citation Graph (0, 0)][DBLP ] GLOBECOM, 2006, pp:- [Conf ] Hyogon Kim , Sangki Yun , Heejo Lee , Inhye Kang , Kyu-Young Choi A Simple Congestion-Resilient Link Adaptation Algorithm for IEEE 802.11 WLANs. [Citation Graph (0, 0)][DBLP ] GLOBECOM, 2006, pp:- [Conf ] Botnet Detection by Monitoring Group Activities in DNS Traffic. [Citation Graph (, )][DBLP ] Hop-by-Hop Frame Aggregation for VoIP on Multi-Hop Wireless Networks. [Citation Graph (, )][DBLP ] Sidewalk: A RFID Tag Anti-Collision Algorithm Exploiting Sequential Arrangements of Tags. [Citation Graph (, )][DBLP ] Collision-Free Downlink Scheduling in the IEEE 802.15.4 Network. [Citation Graph (, )][DBLP ] Unified Rate Limiting in Broadband Access Networks for Defeating Internet Worms and DDoS Attacks. [Citation Graph (, )][DBLP ] Maximizing Differentiated Throughput in IEEE 802.11e Wireless LANs. [Citation Graph (, )][DBLP ] Data Fragmentation Scheme in IEEE 802.15.4 Wireless Sensor Networks. [Citation Graph (, )][DBLP ] On the Cross-Layer Impact of TCP ACK Thinning on IEEE 802.11 Wireless MAC Dynamics. [Citation Graph (, )][DBLP ] Improving VoIP Call Capacity of Multi-Hop Wireless Networks through Self-Controlled Frame Aggregation. [Citation Graph (, )][DBLP ] Secure Vehicular Communication for Safety Applications - A Measurement Study. [Citation Graph (, )][DBLP ] Boosting Video Capacity of IEEE 802.11n through Multiple Receiver Frame Aggregation. [Citation Graph (, )][DBLP ] SPLASH: A Simple Multi-Channel Migration Scheme for IEEE 802.11 Networks. [Citation Graph (, )][DBLP ] A Linear-Complexity Burst Packing Scheme for IEEE 802.16e OFDMA Downlink Frames. [Citation Graph (, )][DBLP ] Multi-Room IPTV Delivery through Pseudo-Broadcast over IEEE 802.11 Links. [Citation Graph (, )][DBLP ] NSF: Network-Based Spam Filtering Based on On-Line Blacklisting against Spamming Botnets. [Citation Graph (, )][DBLP ] Energy-efficient scheduling of a real-time task on DVFS-enabled multi-cores. [Citation Graph (, )][DBLP ] FDF: Frequency detection-based filtering of scanning worms. [Citation Graph (, )][DBLP ] Fast detection and visualization of network attacks on parallel coordinates. [Citation Graph (, )][DBLP ] Search in 0.002secs, Finished in 0.304secs