Jinsuk Baek

Orcid: 0000-0003-4848-4772

According to our database1, Jinsuk Baek authored at least 42 papers between 2004 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
A Strategic Sensor Placement for a Smart Farm Water Sprinkler System: A Computational Model.
Proceedings of the 23rd International Conference on Advanced Communication Technology, 2021

2020
A Set Notation Configuration CoAP Scheme for Internet of Things.
Proceedings of the 22nd International Conference on Advanced Communication Technology, 2020

2018
fFTP: a fast file transfer protocol for home N-screen platform.
Pers. Ubiquitous Comput., 2018

Mining intelligent solution to compensate missing data context of medical IoT devices.
Pers. Ubiquitous Comput., 2018

Special Issue: Real-Time Data Hiding and Visual Cryptography.
J. Real Time Image Process., 2018

2017
Generation of Finite Inductive, Pseudo Random, Binary Sequences.
J. Inf. Process. Syst., 2017

Packet Damage-Resistant Analysis Using a Data Mining Mechanism in Wireless Sensor Networks.
Proceedings of the 2017 International Conference on Intelligent Environments, 2017

2016
An energy-efficient video transport protocol for personal cloud-based computing.
J. Real Time Image Process., 2016

2015
A Smart Backoff Scheme for Multicast Flows in Wireless LAN.
Smart Comput. Rev., 2015

APPMPS: An Asynchronous Parallel Plastic Multiprocessing System.
IEEE Syst. J., 2015

2014
Lossless Data Hiding for Binary Document Images Using n n -Pairs Pattern.
Proceedings of the Information Security and Cryptology - ICISC 2014, 2014

Adaptive video streaming over HTTP.
Proceedings of the 2014 ACM Southeast Regional Conference, Kennesaw, GA, USA, March 28, 2014

2013
An auto-scaling mechanism for virtual resources to support mobile, pervasive, real-time healthcare applications in cloud computing.
IEEE Netw., 2013

Static Analysis, Code Transformation and Runtime Profiling for Self-healing.
J. Comput., 2013

Implementation of framework to identify potential phishing websites.
Proceedings of the 2013 IEEE International Conference on Intelligence and Security Informatics, 2013

2012
A reliable overlay video transport protocol for multicast agents in wireless mesh networks.
Int. J. Commun. Syst., 2012

Self-Healing by Means of Runtime Execution Profiling
CoRR, 2012

A Secure Group Collaboration Protocol for Nonverbal Human Social Signals Featuring Deception Detection.
Proceedings of the 2012 International Conference on Privacy, 2012

Motion recognition with smart phone embedded 3-axis accelerometer sensor.
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2012

2011
An Adaptive Primary Path Switching Scheme for Seamless mSCTP Handover.
Smart Comput. Rev., 2011

A Fair Transmission Opportunity by Detecting and Punishing the Malicious Wireless Stations in IEEE 802.11e EDCA Network.
IEEE Syst. J., 2011

On a moving direction pattern based MAP selection model for HMIPv6 networks.
Comput. Commun., 2011

Improving QoS for ECG Data Transmission with Enhanced Admission Control in EDCA-Based WLANs.
Proceedings of the Global Communications Conference, 2011

Impact of mobile sink for wireless sensor network.
Proceedings of the 49th Annual Southeast Regional Conference, 2011

2010
A Lightweight SCTP for Partially Reliable Overlay Video Multicast Service for Mobile Terminals.
IEEE Trans. Multim., 2010

Dynamic cluster header selection and conditional re-clustering for wireless sensor networks.
IEEE Trans. Consumer Electron., 2010

(N, 1) secret sharing approach based on steganography with gray digital images.
Proceedings of the IEEE International Conference on Wireless Communications, 2010

An Enhancement of mSCTP Handover with an Adaptive Primary Path Switching Scheme.
Proceedings of the 72nd IEEE Vehicular Technology Conference, 2010

The Complexity and Application of Syntactic Pattern Recognition Using Finite Inductive Strings.
Proceedings of the Pattern Recognition in Bioinformatics, 2010

2009
A strategic deployment and cluster-header selection for wireless sensor networks.
IEEE Trans. Consumer Electron., 2009

A multiplayer real-time game protocol architecture for reducing network latency.
IEEE Trans. Consumer Electron., 2009

Syntactic Pattern Recognition Using Finite Inductive Strings.
Proceedings of the Pattern Recognition in Bioinformatics, 2009

FI-based file access predictor.
Proceedings of the 47th Annual Southeast Regional Conference, 2009

2008
A Scalable Recovery Tree Construction Scheme Considering Spatial Locality of Packet Loss.
KSII Trans. Internet Inf. Syst., 2008

FI-Based Local Group Key Generation/Distribution for Mobile Multicast in a Hierarchical Mobile IPv6 Network.
KSII Trans. Internet Inf. Syst., 2008

Secure Scalable and Reliable Mobile Multicast with FI-Based Local Group Key.
Proceedings of the 2008 International Conference on Internet Computing, 2008

An object discarding policy with FI systems for cooperative hybrid caching architecture.
Proceedings of the 46th Annual Southeast Regional Conference, 2008

2007
An admission control scheme for repair server in a tree-based reliable multicast.
Proceedings of the 45th Annual Southeast Regional Conference, 2007

2006
A Dynamic Mobility Management Scheme for VoIP Services.
Proceedings of the Third International Conference on Information Technology: New Generations (ITNG 2006), 2006

2005
A tree-based reliable multicast scheme exploiting the temporal locality of transmission errors.
Proceedings of the 24th IEEE International Performance Computing and Communications Conference, 2005

2004
A heuristic buffer management scheme for tree-based reliable multicast.
Proceedings of the 9th IEEE Symposium on Computers and Communications (ISCC 2006), June 28, 2004

A buffer management scheme for tree-based reliable multicast using infrequent acknowledgments.
Proceedings of the 23rd IEEE International Performance Computing and Communications Conference, 2004


  Loading...