Donghyun Kim

According to our database1, Donghyun Kim authored at least 87 papers between 2005 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2018
On Practical Construction of Quality Fault-Tolerant Virtual Backbone in Homogeneous Wireless Networks.
IEEE/ACM Trans. Netw., 2018

Guest Editorial: Special Issue on Combinatorial Optimization and Applications.
Algorithmica, 2018

On latency-aware tree topology construction for emergency responding VANET applications.
Proceedings of the IEEE INFOCOM 2018, 2018

2017
PBF: A New Privacy-Aware Billing Framework for Online Electric Vehicles with Bidirectional Auditability.
Wireless Communications and Mobile Computing, 2017

A New Comprehensive RSU Installation Strategy for Cost-Efficient VANET Deployment.
IEEE Trans. Vehicular Technology, 2017

A New Constant Factor Approximation to Construct Highly Fault-Tolerant Connected Dominating Set in Unit Disk Graph.
IEEE/ACM Trans. Netw., 2017

On Theoretical Trajectory Planning of Multiple Drones To Minimize Latency in Search-and-Reconnaissance Operations.
IEEE Trans. Mob. Comput., 2017

Maximum Lifetime Combined Barrier-Coverage of Weak Static Sensors and Strong Mobile Sensors.
IEEE Trans. Mob. Comput., 2017

Maximizing target-temporal coverage of mission-driven camera sensor networks.
J. Comb. Optim., 2017

A new outsourcing conditional proxy re-encryption suitable for mobile cloud environment.
Concurrency and Computation: Practice and Experience, 2017

A new maximum fault-tolerance barrier-coverage problem in hybrid sensor network and its polynomial time exact algorithm.
Ad Hoc Networks, 2017

Graph-Theory Based Simplification Techniques for Efficient Biological Network Analysis.
Proceedings of the Third IEEE International Conference on Big Data Computing Service and Applications, 2017

2016
Fault-Tolerant Connected Dominating Set.
Encyclopedia of Algorithms, 2016

Strengthening barrier-coverage of static sensor network with mobile sensor nodes.
Wireless Networks, 2016

The first constant factor approximation for minimum partial connected dominating set problem in growth-bounded graphs.
Wireless Networks, 2016

On Approximating Minimum 3-Connected m-Dominating Set Problem in Unit Disk Graph.
IEEE/ACM Trans. Netw., 2016

A joint optimization of data ferry trajectories and communication powers of ground sensors for long-term environmental monitoring.
J. Comb. Optim., 2016

An Adaptive Buffering Method for Practical HTTP Live Streaming on Smart OTT STBs.
TIIS, 2016

Minimum (k, ω)-angle barrier coverage in wireless camera sensor networks.
IJSNet, 2016

Editorial for special issue on Big Data and knowledge extraction for Cyber-Physical Systems 2016.
IJDSN, 2016

On cost-aware biased respondent group selection for minority opinion survey.
Discrete Math., Alg. and Appl., 2016

Efficient respondents selection for biased survey using homophily-high social relation graph.
Discrete Math., Alg. and Appl., 2016

On efficient vaccine distribution strategy to suppress pandemic using social relation.
Discrete Math., Alg. and Appl., 2016

Cognitive radio based connectivity management for resilient end-to-end communications in VANETs.
Computer Communications, 2016

Maximum lifetime dependable barrier-coverage in wireless sensor networks.
Ad Hoc Networks, 2016

Enhancing barrier coverage with β quality of monitoring in wireless camera sensor networks.
Ad Hoc Networks, 2016

Cost effective mobile and static road side unit deployment for vehicular adhoc networks.
Proceedings of the 2016 International Conference on Computing, 2016

A New Mobile Online Social Network Based Location Sharing with Enhanced Privacy Protection.
Proceedings of the 25th International Conference on Computer Communication and Networks, 2016

A Simpler Constant Factor Approximation for the k-Connected m-Domination Set Problem in Unit Disk Graph.
Proceedings of the 25th International Conference on Computer Communication and Networks, 2016

Toward VANET Utopia: A New Privacy Preserving Trustworthiness Management Scheme for VANET.
Proceedings of the 2016 IEEE International Conferences on Big Data and Cloud Computing (BDCloud), 2016

2015
Maximum lifetime suspect monitoring on the street with battery-powered camera sensors.
Wireless Networks, 2015

Improving the influence under IC-N model in social networks.
Discrete Math., Alg. and Appl., 2015

Construction of higher spectral efficiency virtual backbone in wireless networks.
Ad Hoc Networks, 2015

On security and privacy issues of fog computing supported Internet of Things environment.
Proceedings of the 6th International Conference on the Network of the Future, 2015

A New Privacy-Aware Mutual Authentication Mechanism for Charging-on-the-Move in Online Electric Vehicles.
Proceedings of the 11th International Conference on Mobile Ad-hoc and Sensor Networks, 2015

Privacy aware incentive mechanism to collect mobile data while preventing duplication.
Proceedings of the 34th IEEE Military Communications Conference, 2015

Bandwidth-aware breach-free barrier construction with VANET nodes for realtime fugitive search.
Proceedings of the 34th IEEE Military Communications Conference, 2015

Covert communication based privacy preservation in mobile vehicular networks.
Proceedings of the 34th IEEE Military Communications Conference, 2015

A better constant approximation for minimum 3-connected m-dominating set problem in unit disk graph using Tutte decomposition.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

PTZ Camera Scheduling for Selected Area Coverage in Visual Sensor Networks.
Proceedings of the 35th IEEE International Conference on Distributed Computing Systems, 2015

Biased Respondent Group Selection Under Limited Budget for Minority Opinion Survey.
Proceedings of the Computational Social Networks - 4th International Conference, 2015

Social Relation Based Long-Term Vaccine Distribution Planning to Suppress Pandemic.
Proceedings of the Computational Social Networks - 4th International Conference, 2015

2014
Minimum Latency Multiple Data MULETrajectory Planning in Wireless Sensor Networks.
IEEE Trans. Mob. Comput., 2014

k-Fragility Maximization Problem to Attack Robust Terrorist Networks.
J. Inform. and Commun. Convergence Engineering, 2014

Computing an effective decision making group of a society using social network analysis.
J. Comb. Optim., 2014

Desperate Coverage Problem in Mission-Driven Camera Sensor Networks.
IJDSN, 2014

Two new multi-path routing algorithms for fault-tolerant communications in smart grid.
Ad Hoc Networks, 2014

Fortifying Barrier-Coverage of Wireless Sensor Network with Mobile Sensor Nodes.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2014

Trade-off between Service Granularity and User Privacy in Smart Meter Operation.
Proceedings of the 10th International Conference on Mobile Ad-hoc and Sensor Networks, 2014

Imperfection Better Than Perfection: Beyond Optimal Lifetime Barrier Coverage in Wireless Sensor Networks.
Proceedings of the 10th International Conference on Mobile Ad-hoc and Sensor Networks, 2014

Barrier-Coverage for City Block Monitoring in Bandwidth Sensitive Vehicular Adhoc Networks.
Proceedings of the 10th International Conference on Mobile Ad-hoc and Sensor Networks, 2014

Multiple heterogeneous data ferry trajectory planning in wireless sensor networks.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

Conditional proxy re-encryption for secure big data group sharing in cloud environment.
Proceedings of the 2014 Proceedings IEEE INFOCOM Workshops, Toronto, ON, Canada, April 27, 2014

On secure data sharing in cloud environment.
Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication, 2014

Constructing belt-barrier providing β-quality of monitoring with minimum camera sensors.
Proceedings of the 23rd International Conference on Computer Communication and Networks, 2014

Influence maximization in social networks with user attitude modification.
Proceedings of the IEEE International Conference on Communications, 2014

Efficient Respondents Selection for Biased Survey Using Online Social Networks.
Proceedings of the Computing and Combinatorics - 20th International Conference, 2014

2013
On Construction of Quality Fault-Tolerant Virtual Backbone in Wireless Networks.
IEEE/ACM Trans. Netw., 2013

On bounding node-to-sink latency in wireless sensor networks with multiple sinks.
IJSNet, 2013

Maximum lifetime effective-sensing partial target-coverage in camera sensor networks.
Proceedings of the 11th International Symposium and Workshops on Modeling and Optimization in Mobile, 2013

Sweep-Coverage with Energy-Restricted Mobile Wireless Sensor Nodes.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2013

On Combinatoric Approach to Circumvent Internet Censorship Using Decoy Routers.
Proceedings of the 32th IEEE Military Communications Conference, 2013

Rumor restriction in Online Social Networks.
Proceedings of the IEEE 32nd International Performance Computing and Communications Conference, 2013

Target-Temporal Effective-Sensing Coverage in Mission-Driven Camera Sensor Networks.
Proceedings of the 22nd International Conference on Computer Communication and Networks, 2013

A Dominating Set Based Approach to Identify Effective Leader Group of Social Network.
Proceedings of the Computing and Combinatorics, 19th International Conference, 2013

Vehicle Witnesses as a Service: Leveraging Vehicles as Witnesses on the Road in VANET Clouds.
Proceedings of the IEEE 5th International Conference on Cloud Computing Technology and Science, 2013

2012
Constructing weakly connected dominating set for secure clustering in distributed sensor network.
J. Comb. Optim., 2012

Minimum Total Communication Power Connected Dominating Set in Wireless Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2012

Minimizing data collection latency in wireless sensor network with multiple mobile elements.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

A Novel Multi-Channel Data Broadcast Scheme for Multimedia Database Systems.
Proceedings of the 18th IEEE International Conference on Parallel and Distributed Systems, 2012

A New Localized Geometric Routing with Guaranteed Delivery on 3-D Wireless Networks.
Proceedings of the 21st International Conference on Computer Communications and Networks, 2012

On sleep-wakeup scheduling of non-penetrable barrier-coverage of wireless sensors.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

2011
Minimum Data-Latency-Bound $k$-Sink Placement Problem in Wireless Sensor Networks.
IEEE/ACM Trans. Netw., 2011

2010
A Better Approximation Algorithm for Computing Connected Dominating Sets in Unit Ball Graphs.
IEEE Trans. Mob. Comput., 2010

Minimum average routing path clustering problem in multi-hop 2-D underwater sensor networks.
Optimization Letters, 2010

New dominating sets in social networks.
J. Global Optimization, 2010

Hardness of k-Vertex-Connected Subgraph Augmentation Problem.
J. Comb. Optim., 2010

A Better Constant-Factor Approximation for Selected-Internal Steiner Minimum Tree.
Algorithmica, 2010

A New Constant Factor Approximation for Computing 3-Connected m-Dominating Sets in Homogeneous Wireless Networks.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

2009
Constructing Minimum Connected Dominating Sets with Bounded Diameters in Wireless Networks.
IEEE Trans. Parallel Distrib. Syst., 2009

A Better Approximation for Minimum Average Routing Path Clustering Problem in 2-d Underwater Sensor Networks.
Discrete Math., Alg. and Appl., 2009

A PTAS for Minimum d-Hop Underwater Sink Placement Problem in 2-d Underwater Sensor Networks.
Discrete Math., Alg. and Appl., 2009

2008
Construction of Minimum Connected Dominating Set in 3-Dimensional Wireless Network.
Proceedings of the Wireless Algorithms, 2008

Recyclable Connected Dominating Set for Large Scale Dynamic Wireless Networks.
Proceedings of the Wireless Algorithms, 2008

(1+rho)-Approximation for Selected-Internal Steiner Minimum Tree.
Proceedings of the Computing and Combinatorics, 14th Annual International Conference, 2008

Two Constant Approximation Algorithms for Node-Weighted Steiner Tree in Unit Disk Graphs.
Proceedings of the Combinatorial Optimization and Applications, 2008

2005
Identity-Based Key Agreement Protocols in a Multiple PKG Environment.
Proceedings of the Computational Science and Its Applications, 2005


  Loading...