


default search action
Seokjoo Shin
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j35]Najafi Mohammadreza
, Masoud Daneshtalab
, Jeong-A Lee
, Ghazal Saadloonia, Seokjoo Shin
:
Enhancing Global Model Performance in Federated Learning With Non-IID Data Using a Data-Free Generative Diffusion Model. IEEE Access 12: 148230-148239 (2024) - [j34]Nazmul Islam
, Seokjoo Shin
:
Deep Learning in Physical Layer: Review on Data Driven End-to-End Communication Systems and Their Enabling Semantic Applications. IEEE Open J. Commun. Soc. 5: 4207-4240 (2024) - [c72]Nazmul Islam, Seokjoo Shin:
Impact of Source Coding on Downstream AI Applications. ICAIIC 2024: 93-96 - [c71]Uttam Khatri, Seokjoo Shin, Goo-Rak Kwon:
Convolution Driven Vision Transformer for the Prediction of Mild Cognitive Impairment to Alzheimer's disease Progression. ICCE 2024: 1-7 - [c70]Ijaz Ahmad, Seokjoo Shin:
Perceptual Image Encryption: A Communication Perspective. ICOIN 2024: 657-660 - [c69]Ijaz Ahmad, Joongheon Kim, Seokjoo Shin:
A Searchable Encryption Technique for Secure Color Image Retrieval. ICTC 2024: 36-41 - [i8]Nazmul Islam, Seokjoo Shin:
Deep Learning in Physical Layer: Review on Data Driven End-to-End Communication Systems and their Enabling Semantic Applications. CoRR abs/2401.12800 (2024) - 2023
- [j33]Ijaz Ahmad
, Wooyeol Choi
, Seokjoo Shin
:
Comprehensive Analysis of Compressible Perceptual Encryption Methods - Compression and Encryption Perspectives. Sensors 23(8): 4057 (2023) - [c68]Ijaz Ahmad
, Seokjoo Shin:
Noise-cuts-Noise Approach for Mitigating the JPEG Distortions in Deep Learning. ICAIIC 2023: 221-226 - [c67]Nazmul Islam, Ijaz Ahmad
, Seokjoo Shin:
Robustness of Deep Learning enabled IoT Applications Utilizing Higher Order QAM in OFDM Image Communication System. ICAIIC 2023: 630-635 - [c66]Ijaz Ahmad
, Seokjoo Shin:
Perceptual Encryption-based Privacy-Preserving Deep Learning for Medical Image Analysis. ICOIN 2023: 224-229 - [c65]Iftekharul Islam Shovon, Seokjoo Shin:
The Performance of Graph Neural Network in Detecting Fake News from Social Media Feeds. ICOIN 2023: 560-564 - [c64]Nazmul Islam, Seokjoo Shin:
Evaluation of Neural Demappers for Trainable Constellation in an End-to-End Communication System. ICUFN 2023: 39-42 - [c63]Ijaz Ahmad, Seokjoo Shin:
Deep Learning-based Image Quality Assessment Metric for Quantifying Perceptual Distortions in Transmitted Images. ISCIT 2023: 208-213 - [i7]Nazmul Islam, Seokjoo Shin:
Review of Deep Learning-based Malware Detection for Android and Windows System. CoRR abs/2307.01494 (2023) - 2022
- [j32]Ijaz Ahmad
, Seokjoo Shin
:
IIB-CPE: Inter and Intra Block Processing-Based Compressible Perceptual Encryption Method for Privacy-Preserving Deep Learning. Sensors 22(20): 8074 (2022) - [c62]Ijaz Ahmad
, Nazmul Islam, Seokjoo Shin:
Performance Analysis of Cloud-based Deep Learning Models on Images Recovered without Channel Correction in OFDM System. APCC 2022: 225-259 - [c61]Ijaz Ahmad
, Suk-Seung Hwang, Seokjoo Shin:
Determining Jigsaw Puzzle State from an Image based on Deep Learning. ICAIIC 2022: 30-32 - [c60]So-Yeong Kim, Eun-Ji Lee, Uttam Khatri, Seokjoo Shin, Ji-In Kim, Goo-Rak Kwon:
Comparative analysis of solar power generation prediction system using deep learning. ICAIIC 2022: 383-386 - [c59]Ijaz Ahmad
, Seokjoo Shin:
Encryption-then-Compression System for Cloud-based Medical Image Services. ICOIN 2022: 30-33 - [c58]Ijaz Ahmad
, Seokjoo Shin:
Perceptual Encryption-based Privacy-Preserving Deep Learning in Internet of Things Applications. ICTC 2022: 1817-1822 - [c57]Heui-Seon Park, Suk-Seung Hwang, Seokjoo Shin, Jae-Young Pyun:
Beamspace based AIC and MDL Algorithm for Counting the Number of Signals in Specific Range. ICUFN 2022: 130-133 - [c56]Ijaz Ahmad
, Eunkyung Kim
, Suk-Seung Hwang, Seokjoo Shin:
Privacy-Preserving Surveillance for Smart Cities. ICUFN 2022: 301-306 - [i6]Ijaz Ahmad, Seokjoo Shin:
A Pixel-based Encryption Method for Privacy-Preserving Deep Learning Models. CoRR abs/2203.16780 (2022) - [i5]Ijaz Ahmad, Seokjoo Shin:
Just-Noticeable-Difference Based Edge Map Quality Measure. CoRR abs/2204.03155 (2022) - [i4]Ijaz Ahmad, Seokjoo Shin:
Channel model for end-to-end learning of communications systems: A survey. CoRR abs/2204.03944 (2022) - 2021
- [j31]Lilian Charles Mutalemwa
, Seokjoo Shin
:
Novel Approaches to Realize the Reliability of Location Privacy Protocols in Monitoring Wireless Networks. IEEE Access 9: 104820-104836 (2021) - [j30]Ijaz Ahmad
, Seokjoo Shin:
A novel hybrid image encryption-compression scheme by combining chaos theory and number theory. Signal Process. Image Commun. 98: 116418 (2021) - [c55]Ijaz Ahmad
, Seokjoo Shin:
An Approach to Run Pre-Trained Deep Learning Models on Grayscale Images. ICAIIC 2021: 177-180 - [c54]Lilian Charles Mutalemwa, Seokjoo Shin:
Energy Balancing and Source Node Privacy Protection in Event Monitoring Wireless Networks. ICOIN 2021: 792-797 - [c53]Lilian Charles Mutalemwa, Seokjoo Shin:
On the Performance of Source Location Privacy Protocols under Varied Sensor Node Residual Energy. ICTC 2021: 237-240 - [c52]Lilian Charles Mutalemwa, Seokjoo Shin:
The Impact of Energy-Inefficient Communications on Location Privacy Protection in Monitoring Wireless Networks. ICUFN 2021: 289-294 - 2020
- [j29]Lilian Charles Mutalemwa, Seokjoo Shin
:
Comprehensive Performance Analysis of Privacy Protection Protocols Utilizing Fake Packet Injection Techniques. IEEE Access 8: 76935-76950 (2020) - [j28]Lilian Charles Mutalemwa
, Seokjoo Shin
:
A Classification of the Enabling Techniques for Low Latency and Reliable Communications in 5G and Beyond: AI-Enabled Edge Caching. IEEE Access 8: 205502-205533 (2020) - [j27]Devarani Devi Ningombam
, Seokjoo Shin
:
Traffic Offloading in Multicast Device-to-Device Cellular Networks: A Combinatorial Auction-Based Matching Algorithm. Sensors 20(4): 1128 (2020) - [c51]Lilian Charles Mutalemwa, Moonsoo Kang, Seokjoo Shin:
Controlling the Communication Overhead of Source Location Privacy Protocols in Multi-hop Communication Wireless Networks. ICAIIC 2020: 55-59 - [c50]Ijaz Ahmad
, Bumshik Lee, Seokjoo Shin:
Analysis of Chinese Remainder Theorem for Data Compression. ICOIN 2020: 634-636 - [c49]Sifat Rezwan, Seokjoo Shin, Wooyeol Choi:
Efficient User Clustering and Reinforcement Learning Based Power Allocation for NOMA Systems. ICTC 2020: 143-147 - [c48]Lilian Charles Mutalemwa, Seokjoo Shin:
Improving the Packet Delivery Reliability and Privacy Protection in Monitoring Wireless Networks. ICTC 2020: 1083-1088 - [c47]Rehenuma Tasnim Rodoshi, Seokjoo Shin, Wooyeol Choi:
A Survey on Deep Learning for Cloud Radio Access Networks. SMA 2020: 4-9 - [c46]Ijaz Ahmad
, Seokjoo Shin:
Region-based Selective Compression and Selective Encryption of Medical Images. SMA 2020: 34-38 - [c45]Lilian Charles Mutalemwa, Seokjoo Shin:
Experimental Comparison of Traffic Analysis Adversaries in Event Monitoring Wireless Networks. SMA 2020: 44-49 - [c44]Anup Marahatta, Yaju Rajbhandari, Ashish Shrestha, Ajay Singh, Anup Thapa, Seokjoo Shin:
LoRa Mesh Network for Smart Metering in Rural Electrification. SMA 2020: 319-324
2010 – 2019
- 2019
- [j26]Lilian Charles Mutalemwa, Seokjoo Shin
:
Regulating the Packet Transmission Cost of Source Location Privacy Routing Schemes in Event Monitoring Wireless Networks. IEEE Access 7: 140169-140181 (2019) - [j25]Samaneh Gholami, Keyvan Jaferzadeh
, Seokjoo Shin, Inkyu Moon:
An efficient image-based verification scheme by fusion of double random phase encoding and dynamic chaotic map. Multim. Tools Appl. 78(17): 25001-25018 (2019) - [j24]Ningombam Devarani Devi
, Seokjoo Shin
:
Optimal Resource Management and Binary Power Control in Network-Assisted D2D Communications for Higher Frequency Reuse Factor. Sensors 19(2): 251 (2019) - [j23]Lilian Charles Mutalemwa, Seokjoo Shin
:
Achieving Source Location Privacy Protection in Monitoring Wireless Sensor Networks through Proxy Node Routing. Sensors 19(5): 1037 (2019) - [j22]Madiha Razzaq, Seokjoo Shin
:
Fuzzy-Logic Dijkstra-Based Energy-Efficient Algorithm for Data Transmission in WSNs. Sensors 19(5): 1040 (2019) - [c43]Devarani Devi Ningombam
, Jae-Young Pyun, Suk-Seung Hwang, Seokjoo Shin:
Bipartite Matching Mechanism for Fractional Frequency Reuse-Based D2D Multicast Communications. ACSSC 2019: 286-290 - [c42]Ningombam Devarani Devi
, Chung Ghiu Lee, Seokjoo Shin:
Interference Mitigation for Multicast D2D Communications Underlay Cellular Networks. ICAIIC 2019: 1-4 - [c41]Lilian Charles Mutalemwa, Seokjoo Shin:
Investigating the Influence of Routing Scheme Algorithms on the Source Location Privacy Protection and Network Lifetime. ICTC 2019: 1188-1191 - [c40]Devarani Devi Ningombam
, Suk-Seung Hwang, Seokjoo Shin:
Decentralized Resource Allocation for Multicast D2D Communications Using Stochastic Geometry. ICUFN 2019: 703-706 - [c39]Lilian Charles Mutalemwa, Junhee Seok, Seokjoo Shin:
Experimental Evaluation of Source Location Privacy Routing Schemes and Energy Consumption Performance. ISCIT 2019: 86-90 - [c38]Devarani Devi Ningombam
, Seokjoo Shin:
Resource-sharing optimization for multicast D2D communications underlaying LTE-A uplink cellular networks. SAC 2019: 2001-2007 - 2018
- [j21]Ningombam Devarani Devi
, Seokjoo Shin:
Distance-Constrained Outage Probability Analysis for Device-to-Device Communications Underlaying Cellular Networks with Frequency Reuse Factor of 2. Comput. 7(4): 50 (2018) - [j20]Lilian Charles Mutalemwa, Seokjoo Shin:
Strategic Location-Based Random Routing for Source Location Privacy in Wireless Sensor Networks. Sensors 18(7): 2291 (2018) - [c37]Suk-Seung Hwang, Seokjoo Shin, Jae-Young Pyun, Chung Ghiu Lee:
AOA Estimation Algorithm Based on Composite and Null Despreaders for Multiple GPS Signals. ACSSC 2018: 1157-1162 - [c36]Madiha Razzaq, Goo-Rak Kwon, Seokjoo Shin:
Energy efficient Dijkstra-based weighted sum minimization routing protocol for WSN. FMEC 2018: 246-251 - [c35]Devarani Devarani Devim, Seokjoo Shin:
Outage probability analysis of device-to-device communications with frequency reuse-2 in fractional frequency reuse method. ICOIN 2018: 341-345 - [c34]Madiha Razzaq, Ningombam Devarani Devi
, Seokjoo Shin:
Energy efficient K-means clustering-based routing protocol for WSN using optimal packet size. ICOIN 2018: 632-635 - [c33]Lilian Charles Mutalemwa, Seokjoo Shin:
Realizing Source Location Privacy in Wireless Sensor Networks Through Agent Node Routing. ICTC 2018: 1283-1285 - [c32]Ningombam Devarani Devi, Suk-Seung Hwang, Seokjoo Shin:
A Novel Resource Sharing Mechanism for Device-to-Device Communications Underlaying LTE-A Uplink Cellular Networks. ICUFN 2018: 829-833 - 2017
- [j19]Sabita Nepal
, Amod Pudasani, Seokjoo Shin:
A Fast Channel Assignment Scheme for Emergency Handling in Wireless Body Area Networks. Sensors 17(3): 477 (2017) - [c31]Ningombam Devarani Devi
, Jae-Young Pyun, Suk-Seung Hwang, Seokjoo Shin:
Fractional frequency reuse scheme for interference mitigation in device-to-device communication underlying LTE-A networks. ACSSC 2017: 1402-1406 - [c30]Ningombam Devarani Devi
, Seokjoo Shin:
Radio resource allocation and power control scheme to mitigate interference in device-to-device communications underlaying LTE-A uplink cellular networks. ICTC 2017: 961-963 - [c29]Amod Pudasaini, Ningombam Devarani Devi, Suk-Seung Hwang, Seokjoo Shin:
Directional random routing for enhancing source location privacy in wireless sensor networks. ICUFN 2017: 344-348 - [c28]Irvanda Kurniadi Virdaus, Moonsoo Kang, Seokjoo Shin, Chung Ghiu Lee, Jae-Young Pyim:
A counting-based broadcast model of emergency message dissemination in VANETs. ICUFN 2017: 927-930 - 2016
- [j18]Moonsoo Kang, Irvanda Kurniadi Virdaus, Seokjoo Shin
, Chung Ghiu Lee:
Limited area broadcast for warning message delivery over vehicular ad-hoc networks. EURASIP J. Wirel. Commun. Netw. 2016: 159 (2016) - [c27]Sajina Pradhan
, Seokjoo Shin, Goo-Rak Kwon, Jae-Young Pyun, Suk-Seung Hwang:
The advanced TOA trilateration algorithms with performance analysis. ACSSC 2016: 923-928 - [c26]Ramesh Kumar Lama, Seokjoo Shin, Moonsoo Kang, Goo-Rak Kwon, Moo-Rak Choi:
Interpolation using wavelet transform and discrete cosine transform for high resolution display. ICCE 2016: 184-186 - [c25]Sabita Nepal
, Amod Pudasaini, Jae-Young Pyun, Suk-Seung Hwang, Chung Ghiu Lee, Seokjoo Shin:
A New MAC Protocol for emergency handling in wireless body area networks. ICUFN 2016: 588-590 - [c24]Santosh Subedi
, Goo-Rak Kwon, Seokjoo Shin, Suk-Seung Hwang, Jae-Young Pyun:
Beacon based indoor positioning system using weighted centroid localization approach. ICUFN 2016: 1016-1019 - 2015
- [j17]Subodh Pudasaini, Kyung Sup Kwak, Seokjoo Shin:
On maximising tag reading efficiency of a multi-packet reception capable radio frequency identification reader. IET Commun. 9(5): 701-706 (2015) - [c23]Saurav Dahal
, Junghee Lee, Jungmin Kang, Seokjoo Shin:
Analysis on end-to-end node selection probability in Tor network. ICOIN 2015: 46-50 - [c22]Sabita Nepal
, Saurav Dahal
, Seokjoo Shin:
Deanonymizing schemes of hidden services in tor network: A survey. ICOIN 2015: 468-473 - [c21]Thanh Duc Nguyen, Seokjoo Shin:
A proposal antenna polarization diversity for LTE 2 × 2 MIMO in indoor testbed. ICUFN 2015: 35-36 - 2014
- [j16]Sunil Dhakal, Seokjoo Shin:
Precise-Optimal Frame Length Based Collision Reduction Schemes for Frame Slotted Aloha RFID Systems. KSII Trans. Internet Inf. Syst. 8(1): 165-182 (2014) - [j15]Jay Shree Ranjit, Subodh Pudasaini, Seokjoo Shin:
A New Emergency Handling Mechanism based on IEEE 802.15.4 for Health Monitoring Applications. KSII Trans. Internet Inf. Syst. 8(2): 406-423 (2014) - [j14]Anup Thapa, Kyung Sup Kwak, Seokjoo Shin:
Efficient Transmission Mode Selection Scheme for MIMO-based WLANs. KSII Trans. Internet Inf. Syst. 8(7): 2365-2382 (2014) - [c20]Rico Hartono Jahja, Saurav Dahal
, Suk-Seung Hwang, Goo-Rak Kwon, Jae-Young Pyun, Seokjoo Shin:
Improving IEEE 1588v2 time synchronization performance with phase locked loop. ACSSC 2014: 252-257 - [c19]Sajina Pradhan
, Jae-Young Pyun, Goo-Rak Kwon, Seokjoo Shin, Suk-Seung Hwang:
Enhanced location detection algorithms based on time of arrival trilateration. ACSSC 2014: 1179-1183 - [c18]Youngtae Noh
, Seokjoo Shin:
Survey on MAC protocols in Underwater Acoustic Sensor Networks. ISCIT 2014: 80-84 - [c17]Wansu Lim, Seokjoo Shin, Yeon-Mo Yang
:
MAC protocol designs for OFDMA-PONs. ISCIT 2014: 419-423 - [c16]Subodh Pudasaini, Seokjoo Shin, Kyung Sup Kwak:
Run-length aware hybrid modulation scheme for diffusion-based molecular communication. ISCIT 2014: 439-442 - [i3]Subodh Pudasaini, Seokjoo Shin, Kyung Sup Kwak:
Robust Modulation Technique for Diffusion-based Molecular Communication in Nanonetworks. CoRR abs/1401.3938 (2014) - 2013
- [j13]Jay Shree Ranjit, Seokjoo Shin:
A Modified IEEE 802.15.4 Superframe Structure for Guaranteed Emergency Handling in Wireless Body Area Network. Netw. Protoc. Algorithms 5(2): 1-15 (2013) - [j12]Sunil Dhakal, Seokjoo Shin:
Precise Time System Efficiency of a Frame Slotted Aloha based Anti-Collision Algorithm in a RFID System. Netw. Protoc. Algorithms 5(2): 16-27 (2013) - [c15]Suk-Seung Hwang, Goo-Rak Kwon, Jae-Young Pyun, Seokjoo Shin:
AOA selection algorithm for multiple GPS signals. ACSSC 2013: 481-485 - [c14]Sungjin Park, Yusun Chang, Seokjoo Shin, John A. Copeland:
Characterizing hidden nodes with experimental evaluation in noisy MANETs. ICC 2013: 1763-1768 - [i2]Subodh Pudasaini, Seokjoo Shin, Kyung Sup Kwak:
Optimum Tag Reading Efficiency of Multi-Packet Reception Capable RFID Readers. CoRR abs/1311.7458 (2013) - [i1]Subodh Pudasaini, Seokjoo Shin:
Initial Ranging for Prioritized Network Entry in IEEE 802.16 Network. CoRR abs/1312.1437 (2013) - 2012
- [j11]Subodh Pudasaini, Seokjoo Shin, Kiseon Kim:
Throughput and Reliability Analysis of a Scalable Broadcast MAC for Distributed Wireless Networks. EURASIP J. Wirel. Commun. Netw. 2012: 254 (2012) - [j10]Anup Thapa, Seokjoo Shin:
QoS Provisioning in Wireless Body Area Networks: A Review on MAC Aspects. KSII Trans. Internet Inf. Syst. 6(5): 1267-1285 (2012) - [j9]Subodh Pudasaini, Seokjoo Shin, Kiseon Kim:
Carrier sense multiple access with improvised collision avoidance and short-term fairness. Wirel. Networks 18(8): 915-927 (2012) - [j8]Subodh Pudasaini, Seokjoo Shin:
Cross-Layer Performance Analysis of CSMA/iCA Based Wireless Local Area Network. Wirel. Pers. Commun. 67(1): 63-77 (2012) - [c13]Subodh Pudasaini, Seokjoo Shin:
QoS provisioning in CSMA/iCA based medium access control protocol for WLAN. ICUFN 2012: 340-345 - [c12]Suk-Seung Hwang, Cheol Park, Seong-min Kim, Goo-Rak Kwon, Jae-Young Pyun, Seokjoo Shin:
TPMS switching beamformer based on duplex wireless communications for interference suppression. ICVES 2012: 228-233 - 2011
- [j7]Anup Thapa, Subodh Pudasaini, Seokjoo Shin:
Performance characterization of CSMA/CA adapted multi-user MIMO aware MAC in WLANs. EURASIP J. Wirel. Commun. Netw. 2011: 141 (2011) - [c11]Jinyoun Cho, Seokjoo Shin, John A. Copeland:
Fast broadcast at the intersection in VANET. CCNC 2011: 65-69 - [c10]Giang Hai Tong, Subodh Pudasaini, Seokjoo Shin:
Adaptive best-M feedback scheduling in multiuser OFDMA systems. RACS 2011: 113-117 - 2010
- [j6]Subodh Pudasaini, Moonsoo Kang, Seokjoo Shin, John A. Copeland:
COMIC: Intelligent Contention Window Control for Distributed Medium Access. IEEE Commun. Lett. 14(7): 656-658 (2010) - [j5]Subodh Pudasaini, Yusun Chang, Seokjoo Shin:
A Reactive Cross Collision Exclusionary Backoff Algorithm in IEEE. KSII Trans. Internet Inf. Syst. 4(6): 1098-1115 (2010) - [c9]Subodh Pudasaini, Anup Thapa, Moonsoo Kang, Seokjoo Shin:
An Intelligent Contention Window Control Scheme for Distributed Medium Access. CCNC 2010: 1-2
2000 – 2009
- 2009
- [c8]Anup Thapa, Seokjoo Shin:
Utility Based Backoff (UBB) Algorithm for Initial Ranging Procedure in WiBro. VTC Spring 2009 - 2007
- [j4]Seungjae Bahng, Seokjoo Shin, Youn-Ok Park:
ML Approaching MIMO Detection Based on Orthogonal Projection. IEEE Commun. Lett. 11(6): 474-476 (2007) - [c7]Seokjoo Shin, Kanghee Kim, Sangwook Na:
Scheduled Uplink Packet Transmission Schemes for Voice Traffic in OFDMA-Based Wireless Communication Systems. ICOIN 2007: 70-79 - 2006
- [j3]Seungjae Bahng, Seokjoo Shin, Anders Høst-Madsen:
Block Iterative CM-Based Blind Multiuser Detector. IEICE Trans. Commun. 89-B(4): 1443-1446 (2006) - 2005
- [j2]Seungjae Bahng, Seokjoo Shin, Anders Høst-Madsen:
Improvement of Blind/Group-Blind Multiuser Detectors Based on CM Iteration. IEICE Trans. Commun. 88-B(7): 3062-3064 (2005) - [j1]Seokjoo Shin, Kyounghwan Lee, Yeomin Yoon:
Uplink Performance of WCDMA with Mixed Traffics of Voice/WWW over DCH/CPCH. IEICE Trans. Commun. 88-B(10): 4102-4106 (2005) - [c6]Seokjoo Shin, Seungjae Bahng, Insoo Koo, Kiseon Kim:
QoS-Oriented Packet Scheduling Schemes for Multimedia Traffics in OFDMA Systems. ICN (1) 2005: 153-160 - [c5]Insoo Koo, Seokjoo Shin, Kiseon Kim:
Performance Analysis of Random Access Channel in OFDMA Systems. Systems Communications 2005: 128-133 - 2004
- [c4]Yeomin Yoon, Seokjoo Shin, Ohju Kwon, Kiseon Kim:
The Performance and the Computational Complexity of the Digital Demultiplexers. HSNMC 2004: 867-877 - [c3]Insoo Koo, Seokjoo Shin, Kiseon Kim:
A Heuristic Scheduling Algorithm for 1xEV-DO-Like Systems. HSNMC 2004: 885-893 - 2003
- [c2]Seokjoo Shin, Yeomin Yoon, Kiseon Kim:
Performance of the packet scheduling schemes in DS/CDMA systems. WCNC 2003: 1639-1644 - 2002
- [c1]Seokjoo Shin, Kyounghwan Lee, Kiseon Kim:
Performance of the packet data transmission using the other-cell-interference factor in DS/CDMA downlink. WCNC 2002: 400-404
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-29 22:13 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint