default search action
Hyun-Jin Lee
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j6]Ikjae Kim, Moosung Park, Hyun-Jin Lee, Jisoo Jang, Soojin Lee, Dongkyoo Shin:
A Study on the Multi-Cyber Range Application of Mission-Based Cybersecurity Testing and Evaluation in Association with the Risk Management Framework. Inf. 15(1): 18 (2024)
2010 – 2019
- 2017
- [c12]Trung V. Phan, Nguyen Khac Bao, Youngpin Kim, Hyun-Jin Lee, Minho Park:
Optimizing resource allocation for elastic security VNFs in the SDNFV-enabled cloud computing. ICOIN 2017: 163-166 - [c11]Philipp Hehnle, Pascal Keilbach, Hyun-Jin Lee, Sabrina Lejn, Daniel Steidinger, Marina Weinbrenner, Hanno Langweg:
One Click Privacy for Online Social Networks. SAFECOMP Workshops 2017: 435-442 - 2016
- [j5]Kwang-Chun Go, Hyun-Jin Lee, Jae-Hyun Kim:
Estimation-based cell search method for a mobile relay deployed on a moving network. Wirel. Commun. Mob. Comput. 16(16): 2542-2556 (2016) - 2014
- [j4]Hyun-Jin Lee, Jae-Hyun Kim:
A Handover Mechanism Considering the Abstracted R-Factor. IEEE Trans. Veh. Technol. 63(6): 2687-2696 (2014) - [c10]Hyun-Jin Lee, Jae-Hyun Kim:
An Effective Bandwidth Based Admission Control for Multimedia Service in WLAN. MILCOM 2014: 1003-1008 - 2012
- [c9]Sung-Hyung Lee, Hyun-Jin Lee, Jae-Hyun Kim, Mijeong Hoh, Sang-heon Shin, Taewan Kim, Byeong-Hee Roh:
Active buffer management algorithm for silence suppressed voice applications. MILCOM 2012: 1-4 - 2011
- [c8]Kyu-Hwan Lee, Hyun-Jin Lee, Jae-Hyun Kim:
An active buffer management based on the virtual transmission delay for video streaming service. MILCOM 2011: 816-821 - 2010
- [c7]Hyun-Jin Lee, Kyu-Hwan Lee, Jae-Hyun Kim:
A QoS provisioning mechanisms based on effective bandwidth for the polling based WLAN system. ICUIMC 2010: 11
2000 – 2009
- 2009
- [c6]Hyun-Jin Lee, Sang-Jin Cha, Young-Hoon Yu, GeunSik Jo:
Large Neighborhood Search Using Constraint Satisfaction Techniques in Vehicle Routing Problem. Canadian AI 2009: 229-232 - 2008
- [j3]Hyun-Jin Lee, Jae-Hyun Kim:
A Novel Piggyback Selection Scheme in IEEE 802.11e HCCA. IEICE Trans. Commun. 91-B(5): 1619-1622 (2008) - [j2]Jae-Hyun Kim, Hyun-Jin Lee, Sung-Min Oh, Sunghyun Cho:
Performance modeling and evaluation of data/voice services in wireless networks. Wirel. Networks 14(2): 233-246 (2008) - 2007
- [c5]Hyun-Jin Lee, Jae-Hyun Kim, Sunghyun Cho:
A Novel Piggyback Selection Scheme in IEEE 802.11e HCCA. ICC 2007: 4529-4534 - [c4]Hyun-Jin Lee, Jae-Hyun Kim, Sunghyun Cho:
A Delay-Based Piggyback Scheme in IEEE 802.11. WCNC 2007: 447-451 - 2005
- [j1]Hyun-Jin Lee, Jae-Hyun Kim:
Analysis of Bandwidth Gain Over Various Timer CU of AAL2 for Voice Traffic Multiplexing. IEEE Trans. Veh. Technol. 54(4): 1438-1446 (2005) - [c3]Sung-Min Oh, Hyun-Jin Lee, Jae-Hyun Kim:
End-to-End Wireless Performance Simulator: Modelling Methodology and Performance. ICN (1) 2005: 258-267 - 2004
- [c2]Hyun-Jin Lee, Jae-Hyun Kim, Bong-Ho Kim:
Decision Point of AAL2 Multiplexing for Voice and Data Services in 3G WCDMA Network. ICOIN 2004: 524-533 - [c1]Jong-Gyu Hwang, Kamil Ratajczak, Hyun-Jin Lee, Young-Bu Kim, Sung-Woon Kim, Yong-Jin Park:
Multi-Wavelength-Minimum Interference Path Routing Algorithm for Establishing Optimal Optical-LSPs in OVPN. ICOIN 2004: 718-728
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-26 00:47 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint