Dong Chun Lee

Orcid: 0000-0002-4847-9087

According to our database1, Dong Chun Lee authored at least 50 papers between 1998 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2019
Novel routing protocol scheme for real-time applications in mobile Ad Hoc networks.
Clust. Comput., 2019

2017
Location and Direction Estimation-Based Resource Reservation Scheme for the Handoff in Micro Cellular Multimedia Networks.
Wirel. Pers. Commun., 2017

Improved Authentication of Binding Update Protocol in Mobile IPv6 Networks.
Wirel. Pers. Commun., 2017

Secure Route Optimization Scheme for Network Mobility Support in Heterogeneous Mobile Networks.
Wirel. Pers. Commun., 2017

Improved protocols for spreading vehicle emergency messages in mobile ad hoc networks.
Clust. Comput., 2017

2014
Improved Authentication Scheme of Binding Update Protocol in Mobile IPv6 Networks.
Proceedings of the 2014 International Conference on IT Convergence and Security, 2014

2009
Handover Control Method Using Resource Reservation in Mobile Multimedia Networks.
IEICE Trans. Commun., 2009

2008
Analytic Model of BEB Algorithm With Multiple Priorities in Mobile Information Systems.
Comput. Informatics, 2008

2007
Design and Implementation of Multi-Agents for Learner-oriented Course Scheduling on the Internet.
Proceedings of the E-Service Intelligence: Methodologies, Technologies and Applications, 2007

2006
Secure Authentication Protocol in Mobile IPv6 Networks.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2006

Analysis of Security Vulnerability Diagnosis in Mobile IP Networks.
Proceedings of the Frontiers of High Performance Computing and Networking, 2006

Protection Structure Building for Malicious Traffic Protecting in Intranet Systems.
Proceedings of the Computational Science and Its Applications, 2006

Mobility Management for INS in 3G Mobile Networks.
Proceedings of the Computational Science and Its Applications, 2006

Hybrid Queuing Scheme to Reduce Call Blocking in Multimedia Mobile Networks.
Proceedings of the Computational Science and Its Applications, 2006

Analytic Model of the Collision Resolution Protocol with Voice/Data in Mobile Networks.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2006

A New Authentication Scheme of Binding Update Protocol on Handover in Mobile IPv6 Networks.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2006

2005
Performance Analysis of the Distributed Location Management Scheme in Large Mobile Networks.
J. Inf. Process. Syst., 2005

Fuzzy-Based Prefetching Scheme for Effective Information Support in Mobile Networks.
Proceedings of the Mobile Ad-hoc and Sensor Networks, First International Conference, 2005

Assurance Method of High Availability in Information Security Infrastructure System.
Proceedings of the Mobile Ad-hoc and Sensor Networks, First International Conference, 2005

Static Registration Grouping Scheme to Reduce HLR Traffic Cost in Mobile Networks.
Proceedings of the Mobile Ad-hoc and Sensor Networks, First International Conference, 2005

Home Network Observation System Using User's Activate Pattern and Multimedia Streaming.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005

Efficient Migration Scheme Using Backward Recovery Algorithm for Mobile Agents in WLAN.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005

Prefetching Scheme Considering Mobile User's Preference in Mobile Networks.
Proceedings of the Computational Science and Its Applications, 2005

System Development of Security Vulnerability Diagnosis in Wireless Internet Networks.
Proceedings of the Computational Science and Its Applications, 2005

Improved Authentication Scheme in W-CDMA Networks.
Proceedings of the Computational Science and Its Applications, 2005

Workflow System Modeling in the Mobile Healthcare B2B Using Semantic Information.
Proceedings of the Computational Science and Its Applications, 2005

Delay of the Slotted ALOHA Protocol with Binary Exponential Backoff Algorithm.
Proceedings of the Computational Science and Its Applications, 2005

Call Tracking Management Using Caching Scheme in IMT-2000 Networks.
Proceedings of the High Performance Computing and Communications, 2005

2004
Fuzzy Logic Adaptive Mobile Location Estimation.
Proceedings of the Network and Parallel Computing, IFIP International Conference, 2004

Enhanced Algorithm of TCP Performance on Handover in Wireless Internet Networks.
Proceedings of the Network and Parallel Computing, IFIP International Conference, 2004

Mobility Grouping Scheme to Reduce HLR Traffic in IMT-2000 Networks.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2004

Call Tracking and Location Updating Using DHS in Mobile Networks.
Proceedings of the Computational Science and Its Applications, 2004

Reduction Method of Threat Phrases by Classifying Assets.
Proceedings of the Computational Science and Its Applications, 2004

Multi-level Protection Building for Virus Protection Infrastructure.
Proceedings of the Computational Science, 2004

Improved Location Scheme Using Circle Location Register in Mobile Networks.
Proceedings of the Computational Science, 2004

2003
Improved Structure Management of Gateway Firewall Systems for Effective Networks Security.
Proceedings of the Computer and Information Sciences, 2003

New CX Searching Algorithm for Handoff Control in Wireless ATM Networks.
Proceedings of the Computer and Information Sciences, 2003

Efficient Queuing Management Scheme with Image/Voice/Data Calls for Reducing Blocking Rate in Multimedia Mobile Networks.
Proceedings of the Computational Science and Its Applications, 2003

Mobility Management Scheme for Reducing Location Traffic Cost in IMT-2000 Networks.
Proceedings of the Computational Science and Its Applications, 2003

Web-Based Object-Oriented Modeling on Internet.
Proceedings of the Computational Science and Its Applications, 2003

Threat Description for the PP by Using the Concept of the Assets Protected by TOE.
Proceedings of the Computational Science - ICCS 2003, 2003

2002
Performance Modeling of Location Management Using Multicasting HLR with Forward Pointer in Mobile Networks.
Proceedings of the Computational Science - ICCS 2002, 2002

Hybrid Queuing Strategy to Reduce Call Blocking in Multimedia Wireless Networks.
Proceedings of the EurAsia-ICT 2002: Information and Communication Technology, 2002

Location Management Using Multicasting HLR in Mobile Networks.
Proceedings of the EurAsia-ICT 2002: Information and Communication Technology, 2002

New Location Management for Reducing HLR Overhead Traffic in Mobile Networks.
Proceedings of the On the Move to Meaningful Internet Systems, 2002 - DOA/CoopIS/ODBASE 2002 Confederated International Conferences DOA, CoopIS and ODBASE 2002 Irvine, California, USA, October 30, 2002

2001
Adaptive Migration Strategy for Mobile Agents on Internet.
Proceedings of the Technologies for E-Services, Second International Workshop, 2001

2000
Radiance simulation of multispectral remote sensor data for water resource applications.
Proceedings of the ISCA 15th International Conference Computers and Their Applications, 2000

A conceptual framework for GIS-based vehicle monitoring system.
Proceedings of the ISCA 15th International Conference Computers and Their Applications, 2000

Performance of Location Caching Scheme to Support Call Locality in Wireless Networks.
Proceedings of the Advances in Computing Science, 2000

1998
Performance analysis of queueing strategies with multiple priorities in multimedia PCS.
Proceedings of the Computers and Their Applications (CATA-98), 1998


  Loading...