The SCEAS System
Navigation Menu

Search the dblp DataBase


Hyogon Kim: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Dae Y. Kim, Sunil Kim, Lynn Choi, Hyogon Kim
    A High-Throughput System Architecture for Deep Packet Filtering in Network Intrusion Prevention. [Citation Graph (0, 0)][DBLP]
    ARCS, 2006, pp:407-421 [Conf]
  2. Hyogon Kim
    Implementation experience with NHRP prototype software. [Citation Graph (0, 0)][DBLP]
    Broadband Networking Technologies, 1997, pp:166-175 [Conf]
  3. Hyogon Kim, David J. Farber
    A new congestion control framework for large bandwidth-delay product networks. [Citation Graph (0, 0)][DBLP]
    HPN, 1995, pp:294-304 [Conf]
  4. Jin-Ho Kim, Saewoong Bahk, Hyogon Kim
    Effect of Coarse Timer Granularities on QoS Guarantees in Unix Based Systems. [Citation Graph (0, 0)][DBLP]
    ICC (2), 2000, pp:969-973 [Conf]
  5. Won Hyong Park, Saewoong Bahk, Hyogon Kim
    A Modified RIO Algorithm that Alleviates the Bandwidth Skew Problem in Internet Differentiated Service. [Citation Graph (0, 0)][DBLP]
    ICC (3), 2000, pp:1599-1603 [Conf]
  6. Narayanan Natarajan, Latha Kant, Changdong Kiu, Arunendu Roy, Hyogon Kim
    A Network Management System Design to Support End-To-End IP QoS. [Citation Graph (0, 0)][DBLP]
    ICC (1), 2000, pp:216-221 [Conf]
  7. Hyogon Kim, Jaesung Heo, Lynn Choi, Inhye Kang, Sunil Kim
    Taming Large Classifiers with Rule Reference Locality. [Citation Graph (0, 0)][DBLP]
    ICOIN, 2003, pp:928-937 [Conf]
  8. Hyogon Kim, Jin-Ho Kim, Saewoong Bahk, Inhye Kang
    Fast Classification, Calibration, and Visualization of Network Attacks on Backbone Links. [Citation Graph (0, 0)][DBLP]
    ICOIN, 2004, pp:837-846 [Conf]
  9. Changhee Joo, Saewoong Bahk, Hyogon Kim
    Synchronizing TCP with Block Acknowledgement over Multi-hop Wireless Networks. [Citation Graph (0, 0)][DBLP]
    ICOIN, 2006, pp:267-275 [Conf]
  10. Lynn Choi, Jaesung Heo, Hyogon Kim, Jinoo Joung, Sunil Kim
    Scalable Packet Classification through Maximum Entropy Hashing. [Citation Graph (0, 0)][DBLP]
    NETWORKING, 2004, pp:296-307 [Conf]
  11. Sangki Yun, Hyogon Kim, Inhye Kang
    Squeezing 100+ VoIP calls out of 802.11b WLANs. [Citation Graph (0, 0)][DBLP]
    WOWMOM, 2006, pp:308-314 [Conf]
  12. Hyogon Kim, Inhye Kang, Saewoong Bahk
    Real-time visualization of network attacks on high-speed links. [Citation Graph (0, 0)][DBLP]
    IEEE Network, 2004, v:18, n:5, pp:30-39 [Journal]
  13. Jin-Ho Kim, Saewoong Bahk, Hyogon Kim
    Performance Impact of Coarse Timer Granularities on QoS Guarantees in Unix-Based Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 2003, v:52, n:1, pp:51-58 [Journal]
  14. Hyogon Kim, Jin-Ho Kim, Inhye Kang, Saewoong Bahk
    Preventing Session Table Explosion in Packet Inspection Computers. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 2005, v:54, n:2, pp:238-240 [Journal]
  15. Wan Yeon Lee, Heejo Lee, Hyogon Kim
    Energy-Aware QoS Adjustment of Multimedia Tasks with Uncertain Execution Time. [Citation Graph (0, 0)][DBLP]
    International Conference on Computational Science (4), 2007, pp:709-712 [Conf]
  16. Changhee Joo, Saewoong Bahk, Hyogon Kim
    Detecting spatial congestion in multihop wireless networks. [Citation Graph (0, 0)][DBLP]
    IWCMC, 2006, pp:509-514 [Conf]
  17. Jin-Ho Kim, Hyogon Kim, Saewoong Bahk
    On the Effectiveness of Service Registration-Based Worm Defense. [Citation Graph (0, 0)][DBLP]
    GLOBECOM, 2006, pp:- [Conf]
  18. Hyogon Kim, Sangki Yun, Heejo Lee, Inhye Kang, Kyu-Young Choi
    A Simple Congestion-Resilient Link Adaptation Algorithm for IEEE 802.11 WLANs. [Citation Graph (0, 0)][DBLP]
    GLOBECOM, 2006, pp:- [Conf]

  19. Botnet Detection by Monitoring Group Activities in DNS Traffic. [Citation Graph (, )][DBLP]

  20. Hop-by-Hop Frame Aggregation for VoIP on Multi-Hop Wireless Networks. [Citation Graph (, )][DBLP]

  21. Sidewalk: A RFID Tag Anti-Collision Algorithm Exploiting Sequential Arrangements of Tags. [Citation Graph (, )][DBLP]

  22. Collision-Free Downlink Scheduling in the IEEE 802.15.4 Network. [Citation Graph (, )][DBLP]

  23. Unified Rate Limiting in Broadband Access Networks for Defeating Internet Worms and DDoS Attacks. [Citation Graph (, )][DBLP]

  24. Maximizing Differentiated Throughput in IEEE 802.11e Wireless LANs. [Citation Graph (, )][DBLP]

  25. Data Fragmentation Scheme in IEEE 802.15.4 Wireless Sensor Networks. [Citation Graph (, )][DBLP]

  26. On the Cross-Layer Impact of TCP ACK Thinning on IEEE 802.11 Wireless MAC Dynamics. [Citation Graph (, )][DBLP]

  27. Improving VoIP Call Capacity of Multi-Hop Wireless Networks through Self-Controlled Frame Aggregation. [Citation Graph (, )][DBLP]

  28. Secure Vehicular Communication for Safety Applications - A Measurement Study. [Citation Graph (, )][DBLP]

  29. Boosting Video Capacity of IEEE 802.11n through Multiple Receiver Frame Aggregation. [Citation Graph (, )][DBLP]

  30. SPLASH: A Simple Multi-Channel Migration Scheme for IEEE 802.11 Networks. [Citation Graph (, )][DBLP]

  31. A Linear-Complexity Burst Packing Scheme for IEEE 802.16e OFDMA Downlink Frames. [Citation Graph (, )][DBLP]

  32. Multi-Room IPTV Delivery through Pseudo-Broadcast over IEEE 802.11 Links. [Citation Graph (, )][DBLP]

  33. NSF: Network-Based Spam Filtering Based on On-Line Blacklisting against Spamming Botnets. [Citation Graph (, )][DBLP]

  34. Energy-efficient scheduling of a real-time task on DVFS-enabled multi-cores. [Citation Graph (, )][DBLP]

  35. FDF: Frequency detection-based filtering of scanning worms. [Citation Graph (, )][DBLP]

  36. Fast detection and visualization of network attacks on parallel coordinates. [Citation Graph (, )][DBLP]

Search in 0.274secs, Finished in 0.275secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002