default search action
Inhye Kang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2017
- [j19]Junkil Park, Insup Lee, Oleg Sokolsky, Dae-Yon Hwang, So Jin Ahn, Jin-Young Choi, Inhye Kang:
A process algebraic approach to the schedulability analysis and workload abstraction of hierarchical real-time systems. J. Log. Algebraic Methods Program. 92: 1-18 (2017) - [j18]Yongtae Park, Seungho Kuk, Inhye Kang, Hyogon Kim:
Overcoming IoT Language Barriers Using Smartphone SDRs. IEEE Trans. Mob. Comput. 16(3): 816-828 (2017) - 2016
- [j17]Byungjo Kim, Jihun Ha, Inhye Kang, Yongtae Park, Seungho Kuk, Hyogon Kim:
Geographic scheduling of directional transmission for periodic safety messages in IEEE WAVE. Comput. Commun. 78: 1-15 (2016) - [j16]Miyoung Kang, Jin-Young Choi, Inhye Kang, Hee-Hwan Kwak, So Jin Ahn, Myung-Ki Shin:
A Verification Method of SDN Firewall Applications. IEICE Trans. Commun. 99-B(7): 1408-1415 (2016) - [j15]Jin Hyun Kim, Inhye Kang, Sungwon Kang, Abdeldjalil Boudjadar:
A Process Algebraic Approach to Resource-Parameterized Timing Analysis of Automotive Software Architectures. IEEE Trans. Ind. Informatics 12(2): 655-671 (2016) - 2015
- [j14]Jinhyun Kim, Inhye Kang, Jin-Young Choi, Insup Lee, Sungwon Kang:
Formal synthesis of application and platform behaviors of embedded software systems. Softw. Syst. Model. 14(2): 839-859 (2015) - 2014
- [j13]Youngdong Kim, Ikhwan Kim, Inhye Kang, Taehyoun Kim, Minyoung Sung:
Formal Modeling and Verification of Motor Drive Software for Networked Motion Control Systems. J. Univers. Comput. Sci. 20(14): 1903-1925 (2014) - [j12]Byungjo Kim, Inhye Kang, Hyogon Kim:
Resolving the Unfairness of Distributed Rate Control in the IEEE WAVE Safety Messaging. IEEE Trans. Veh. Technol. 63(5): 2284-2297 (2014) - 2011
- [j11]Jin Hyun Kim, Jin-Young Choi, Inhye Kang, Insup Lee:
Generating composite behavior of embedded software components based on UML behavioral model and process algebra. ACM SIGSOFT Softw. Eng. Notes 36(1): 1-9 (2011) - 2010
- [j10]Inhye Kang, Hyogon Kim:
Analysis of the Rate-Based Channel Access Prioritization for Drive-Thru Applications in the IEEE 802.11p WAVE. IEICE Trans. Commun. 93-B(6): 1605-1607 (2010) - [j9]Jin Hyun Kim, Jin-Young Choi, Inhye Kang, Insup Lee:
UML Behavior Models of Real-Time Embedded Software for Model-Driven Architecture. J. Univers. Comput. Sci. 16(17): 2415-2434 (2010) - [j8]Jin Hyun Kim, Inhye Kang, Jin-Young Choi, Insup Lee:
Timed and Resource-oriented Statecharts for Embedded Software. IEEE Trans. Ind. Informatics 6(4): 568-578 (2010)
2000 – 2009
- 2008
- [c18]Kyungsoo Lee, Sangki Yun, Inhye Kang, Hyogon Kim:
Hop-by-Hop Frame Aggregation for VoIP on Multi-Hop Wireless Networks. ICC 2008: 2454-2459 - [c17]Jihun Ha, Kyungsoo Lee, Hyogon Kim, Inhye Kang:
A snooping rate adaptation algorithm for IEEE 802.11 WLANs. ISWPC 2008: 606-609 - [c16]Juhong Min, Jihun Ha, Sangki Yun, Inhye Kang, Hyogon Kim:
Secure Vehicular Communication for Safety Applications - A Measurement Study. VTC Spring 2008: 3016-3020 - 2007
- [j7]Sangki Yun, Hyogon Kim, Heejo Lee, Inhye Kang:
100+ VoIP Calls on 802.11b: The Power of Combining Voice Frame Aggregation and Uplink-Downlink Bandwidth Control in Wireless LANs. IEEE J. Sel. Areas Commun. 25(4): 689-698 (2007) - 2006
- [j6]Il-Gon Kim, Miyoung Kang, Jin-Young Choi, Peter D. Zegzhda, Maxim O. Kalinin, Dmitry P. Zegzhda, Inhye Kang:
Formal Verification of Security Model Using SPR Tool. Comput. Artif. Intell. 25(5): 353-368 (2006) - [c15]Il-Gon Kim, Hyun Seok Kim, Ji-Yeon Lee, Jin-Young Choi, Inhye Kang:
Secrecy Analysis of Purchase Transaction in Electronic Purses. AINA (1) 2006: 979-984 - [c14]Hyogon Kim, Sangki Yun, Heejo Lee, Inhye Kang, Kyu-Young Choi:
A Simple Congestion-Resilient Link Adaptation Algorithm for IEEE 802.11 WLANs. GLOBECOM 2006 - [c13]Hyogon Kim, Heejo Lee, Sangmin Shin, Inhye Kang:
On the Cross-Layer Impact of TCP ACK Thinning on IEEE 802.11 Wireless MAC Dynamics. VTC Fall 2006: 1-6 - [c12]Sangki Yun, Hyogon Kim, Heejo Lee, Inhye Kang:
Improving VoIP Call Capacity of Multi-Hop Wireless Networks through Self-Controlled Frame Aggregation. VTC Fall 2006: 1-5 - [c11]Sangki Yun, Hyogon Kim, Inhye Kang:
Squeezing 100+ VoIP calls out of 802.11b WLANs. WOWMOM 2006: 308-314 - 2005
- [j5]Hyogon Kim, Sangki Yun, Inhye Kang, Saewoong Bahk:
Resolving 802.11 performance anomalies through QoS differentiation. IEEE Commun. Lett. 9(7): 655-657 (2005) - [j4]Hyogon Kim, Jin-Ho Kim, Inhye Kang, Saewoong Bahk:
Preventing Session Table Explosion in Packet Inspection Computers. IEEE Trans. Computers 54(2): 238-240 (2005) - [c10]Il-Gon Kim, Young-Joo Moon, Inhye Kang, Ji-Yeon Lee, Keun-Hee Han, Jin-Young Choi:
Model-Based Analysis of Money Accountability in Electronic Purses. WINE 2005: 346-355 - 2004
- [j3]Hyogon Kim, Inhye Kang, Saewoong Bahk:
Real-time visualization of network attacks on high-speed links. IEEE Netw. 18(5): 30-39 (2004) - [c9]Hyogon Kim, Inhye Kang:
On the functional validity of the worm-killing worm. ICC 2004: 1902-1906 - [c8]Hyogon Kim, Jin-Ho Kim, Saewoong Bahk, Inhye Kang:
Fast Classification, Calibration, and Visualization of Network Attacks on Backbone Links. ICOIN 2004: 837-846 - 2003
- [c7]Hyogon Kim, Inhye Kang:
On the effectiveness of Martian address filtering and its extensions. GLOBECOM 2003: 1348-1352 - [c6]Inhye Kang, Hyogon Kim:
Determining embryonic connection timeout in stateful inspection. ICC 2003: 458-462 - [c5]Hyogon Kim, Jaesung Heo, Lynn Choi, Inhye Kang, Sunil Kim:
Taming Large Classifiers with Rule Reference Locality. ICOIN 2003: 928-937 - 2002
- [j2]Hyogon Kim, Inhye Kang, Eenjun Hwang:
Measurement-based multi-call voice frame grouping in Internet telephony. IEEE Commun. Lett. 6(5): 199-201 (2002) - 2001
- [c4]Hyogon Kim, Changhoon Han, Inhye Kang:
Reducing TCP response time in face of wireless uplink losses. VTC Fall 2001: 262-266 - 2000
- [j1]Inhye Kang, Insup Lee, Young-Si Kim:
An Efficient State Space Generation for the Analysis of Real-Time Systems. IEEE Trans. Software Eng. 26(5): 453-477 (2000) - [c3]Myung-Hwan Park, Ki-Seok Bang, Jin-Young Choi, Inhye Kang:
Equivalence Checking of Two Statechart Specifications. IEEE International Workshop on Rapid System Prototyping 2000: 46-51
1990 – 1999
- 1999
- [c2]Inhye Kang:
TREAT: Timed REachability Analysis Tool. PDPTA 1999: 586-591 - 1996
- [c1]Inhye Kang, Insup Lee:
An Efficient State Space Generation for Analysis of Real-Time Systems. ISSTA 1996: 4-13
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-08 21:51 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint