Jeom Goo Kim

According to our database1, Jeom Goo Kim authored at least 21 papers between 2000 and 2015.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2015
A revised cache allocation algorithm for VoD multicast service.
Multim. Tools Appl., 2015

2014
IKEv2 authentication exchange model and performance analysis in mobile IPv6 networks.
Pers. Ubiquitous Comput., 2014

Optimizing image processing on multi-core CPUs with Intel parallel programming technologies.
Multim. Tools Appl., 2014

Fingerprint-based access control using smart cards in IPTV.
Multim. Tools Appl., 2014

2013
A study on abnormal event correlation analysis for convergence security monitor.
Clust. Comput., 2013

A Revised Cache Allocation Algorithm for VoD Multicast Service.
Proceedings of the International Conference on Information Science and Applications, 2013

A Construction for the Information System and Network of Sports Industry.
Proceedings of the International Conference on Information Science and Applications, 2013

2012
A vertical Path Computation Element (PCE) based path provisioning scheme in multilayer optical networks.
Telecommun. Syst., 2012

2007
A Design of Fair Blind Signatures Protocol Using PVNIOT.
Proceedings of the Computational Science and Its Applications, 2007

An Access Control Using SPKI Certificate in Peer-to-Peer Environment.
Proceedings of the Computational Science and Its Applications, 2007

Efficient an Implementation Method Research of a Smart Card Atomic Operation.
Proceedings of the Computational Science and Its Applications, 2007

2006
Conversion Scheme for Reducing Security Vulnerability in IPv4/ IPv6 Networks.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2006

HOIDS-Based Detection Method of Vicious Event in Large Networks.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2006

2005
Workflow System Modeling in the Mobile Healthcare B2B Using Semantic Information.
Proceedings of the Computational Science and Its Applications, 2005

2004
Perimeter Defence Policy Model of Cascade MPLS VPN Networks.
Proceedings of the Computational Science and Its Applications, 2004

2003
Mobility Management Scheme for Reducing Location Traffic Cost in IMT-2000 Networks.
Proceedings of the Computational Science and Its Applications, 2003

Certificate Management Client System for E-transactions on Internet.
Proceedings of the Computational Science - ICCS 2003, 2003

2002
New Location Management for Reducing HLR Overhead Traffic in Mobile Networks.
Proceedings of the On the Move to Meaningful Internet Systems, 2002 - DOA/CoopIS/ODBASE 2002 Confederated International Conferences DOA, CoopIS and ODBASE 2002 Irvine, California, USA, October 30, 2002

2001
Adaptive Migration Strategy for Mobile Agents on Internet.
Proceedings of the Technologies for E-Services, Second International Workshop, 2001

2000
An Implementation of Vulnerability Evaluation System for Network Security on CC.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2000

Performance of Location Caching Scheme to Support Call Locality in Wireless Networks.
Proceedings of the Advances in Computing Science, 2000


  Loading...