default search action
Jeom Goo Kim
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2015
- [j6]Hyun Jong Lee, Wonhyuk Lee, Seunghae Kim, Minki Noh, Jeom Goo Kim, Hyuncheol Kim:
A revised cache allocation algorithm for VoD multicast service. Multim. Tools Appl. 74(16): 6557-6572 (2015) - 2014
- [j5]Cheong Ghil Kim, Jeom Goo Kim, Do Hyeon Lee:
Optimizing image processing on multi-core CPUs with Intel parallel programming technologies. Multim. Tools Appl. 68(2): 237-251 (2014) - [j4]Eun-A Jun, Hyun Sook Rhee, Jeom Goo Kim, Seok Won Jung, Dong Hoon Lee:
Fingerprint-based access control using smart cards in IPTV. Multim. Tools Appl. 73(2): 647-661 (2014) - [j3]Do Hyeon Lee, Jeom Goo Kim:
IKEv2 authentication exchange model and performance analysis in mobile IPv6 networks. Pers. Ubiquitous Comput. 18(3): 493-501 (2014) - 2013
- [j2]Dong Hwi Lee, Jeom Goo Kim, Kuinam J. Kim:
A study on abnormal event correlation analysis for convergence security monitor. Clust. Comput. 16(2): 219-227 (2013) - [c15]Sunyoung Kang, Seunghae Kim, Seungae Kang, Jeom Goo Kim, Hyuncheol Kim:
A Construction for the Information System and Network of Sports Industry. ICISA 2013: 1-4 - [c14]Hyun Jong Lee, Wonhyuk Lee, Jeom Goo Kim, Hyuncheol Kim:
A Revised Cache Allocation Algorithm for VoD Multicast Service. ICISA 2013: 1-6 - 2012
- [j1]Hyuncheol Kim, Jeom Goo Kim:
A vertical Path Computation Element (PCE) based path provisioning scheme in multilayer optical networks. Telecommun. Syst. 51(2-3): 107-113 (2012)
2000 – 2009
- 2007
- [c13]Eun-A Jun, Seok Won Jung, Jeom Goo Kim, Jong In Lim:
Efficient an Implementation Method Research of a Smart Card Atomic Operation. ICCSA (2) 2007: 113-121 - [c12]Jeom Goo Kim, Do Hyeon Lee, Jeong-Bae Lee:
A Design of Fair Blind Signatures Protocol Using PVNIOT. ICCSA (2) 2007: 140-147 - [c11]Jeom Goo Kim, Do Hyeon Lee:
An Access Control Using SPKI Certificate in Peer-to-Peer Environment. ICCSA (2) 2007: 148-156 - 2006
- [c10]Dong Hwi Lee, Jeom Goo Kim, Kuinam J. Kim:
HOIDS-Based Detection Method of Vicious Event in Large Networks. EUC Workshops 2006: 998-1005 - [c9]Do Hyeon Lee, Jeom Goo Kim:
Conversion Scheme for Reducing Security Vulnerability in IPv4/ IPv6 Networks. KES (3) 2006: 564-571 - 2005
- [c8]Sang-Young Lee, Yung-Hyeon Lee, Jeom Goo Kim, Dong Chun Lee:
Workflow System Modeling in the Mobile Healthcare B2B Using Semantic Information. ICCSA (2) 2005: 762-770 - 2004
- [c7]Won Shik Na, Jeom Goo Kim, Intae Ryoo:
Perimeter Defence Policy Model of Cascade MPLS VPN Networks. ICCSA (1) 2004: 1026-1034 - 2003
- [c6]Jeom Goo Kim, Yoochan Ra, Jaehwan Lim:
Certificate Management Client System for E-transactions on Internet. International Conference on Computational Science 2003: 596-604 - [c5]Dong Chun Lee, Jeom Goo Kim, Kuinam J. Kim:
Mobility Management Scheme for Reducing Location Traffic Cost in IMT-2000 Networks. ICCSA (2) 2003: 50-59 - 2002
- [c4]Dong Chun Lee, Hyun Cheul Shin, Jeom Goo Kim:
New Location Management for Reducing HLR Overhead Traffic in Mobile Networks. OTM 2002: 529-530 - 2001
- [c3]Dong Chun Lee, Jeom Goo Kim:
Adaptive Migration Strategy for Mobile Agents on Internet. TES 2001: 201-212 - 2000
- [c2]Dong Chun Lee, Jeom Goo Kim, JooSeok Song:
Performance of Location Caching Scheme to Support Call Locality in Wireless Networks. ASIAN 2000: 43-57 - [c1]Jeom Goo Kim, Young-Cheol Lee, Jae-Kwang Lee:
An Implementation of Vulnerability Evaluation System for Network Security on CC. PDPTA 2000
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 22:55 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint