default search action
Manki Min
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c35]Miraz Uz Zaman, Manki Min:
Supersingular Isogeny-Based Single Compression Cryptographic Hash Function. GLOBECOM 2023: 4479-4484 - [c34]Zakaria EI-Awadi, Manki Min:
Edge Oriented Redistribution of Computational Load for Authentication Systems. INFOCOM Workshops 2023: 1-6 - 2022
- [c33]Miraz Uz Zaman, Aaron Hutchinson, Manki Min:
Implementation Aspects of Supersingular Isogeny-Based Cryptographic Hash Function. WiCON 2022: 14-27 - 2020
- [j13]Byungkwan Jung, Sunho Lim, Jinseok Chae, Cong Pu, Manki Min:
MQry: Elastic Validity Region for Querying Mobile Point-of-Interests in Infrastructure-Less Networks. IEEE Syst. J. 14(2): 1852-1861 (2020) - [c32]Manki Min:
On-Demand, Unattended Authentication: A Novel Online Access Model Without Cumbersome Login Procedures. CCNC 2020: 1-2 - [c31]Miraz Uz Zaman, Manki Min:
Decentrally-Consented-Server-Based Blockchain System for Universal Types of Data. ISNCC 2020: 1-6 - [c30]Manki Min, Sunho Lim:
Congestion-minimal and Traffic-adaptive Platooning Evacuation. SysCon 2020: 1-7 - [c29]Baker Al Smadi, Manki Min:
A Critical review of Credit Card Fraud Detection Techniques. UEMCON 2020: 732-736
2010 – 2019
- 2019
- [c28]Miraz Uz Zaman, Tong Shen, Manki Min:
Proof of Sincerity: A New Lightweight Consensus Approach for Mobile Blockchains. CCNC 2019: 1-4 - [c27]Manki Min:
Effectiveness of in-class active learning activities and video-recorded lectures for Computer Science courses. FIE 2019: 1-8 - [c26]Miraz Uz Zaman, Tong Shen, Manki Min:
Hash Vine: A New Hash Structure for Scalable Generation of Hierarchical Hash Codes. SysCon 2019: 1-6 - 2018
- [c25]Manki Min, Sunho Lim, Yi Liu, Hyeun Joong Yoon:
Authentication pedigree scheme for supply chain. SysCon 2018: 1-8 - 2017
- [j12]Chunchao Liang, Sunho Lim, Manki Min, Wei Wang:
Pseudo geometric broadcast protocols in wireless sensor networks: Design, evaluation, and analysis. Comput. Commun. 101: 82-93 (2017) - [c24]Harshith Keni, Montana Earle, Manki Min:
Product authentication using hash chains and printed QR codes. CCNC 2017: 319-324 - [c23]Cong Pu, Sunho Lim, Byungkwan Jung, Manki Min:
Mitigating stealthy collision attack in energy harvesting motivated networks. MILCOM 2017: 539-544 - [c22]Manki Min, Sunho Lim:
Segmented arrival graph based evacuation plan assessment algorithm using linear programming. SysCon 2017: 1-8 - 2016
- [c21]Chunchao Liang, Sunho Lim, Manki Min, Wei Wang:
TCast: A transitional region aware broadcast protocol in variable wireless link qualities. CCNC 2016: 674-679 - [c20]Nishaben Patel, Manki Min, Sunho Lim:
Accurate evacuation route planning using forward-backward shortest paths. SysCon 2016: 1-6 - 2015
- [c19]Chunchao Liang, Sunho Lim, Manki Min, Wei Wang:
Network coverage sensitive pseudo geometric broadcast protocols in wireless sensor networks. CCNC 2015: 543-548 - 2014
- [j11]Sunho Lim, Yumin Lee, Jongpil Cheon, Manki Min, Wei Wang:
User-defined consistency sensitive cache invalidation strategies for wireless data access. Comput. Commun. 41: 55-66 (2014) - [c18]Chunchao Liang, Sunho Lim, Manki Min, Wei Wang:
Geometric broadcast without GPS support in dense wireless sensor networks. CCNC 2014: 405-410 - [c17]Manki Min, Jonguk Lee, Sunho Lim:
Effective evacuation route planning algorithms by updating earliest arrival time of multiple paths. MobiGIS 2014: 8-17 - [c16]Cong Pu, Tejaswi Gade, Sunho Lim, Manki Min, Wei Wang:
Lightweight Forwarding Protocols in Energy Harvesting Wireless Sensor Networks. MILCOM 2014: 1053-1059 - 2013
- [c15]Yuto Fujikawa, Manki Min:
A new environment for algorithm research using gamification. EIT 2013: 1-6 - [c14]Manki Min, Jonguk Lee:
Maximum throughput flow-based contraflow evacuation routing algorithm. PerCom Workshops 2013: 511-516 - 2012
- [c13]Manki Min:
Synchronized Flow-Based Evacuation Route Planning. WASA 2012: 411-422 - 2011
- [c12]Manki Min, Bipin C. Neupane:
An evacuation planner algorithm in flat time graphs. ICUIMC 2011: 99 - [c11]Sunho Lim, Yumin Lee, Manki Min:
ConSens: Consistency-sensitive opportunistic data access in wireless networks. MILCOM 2011: 804-809 - 2010
- [j10]Manki Min, Austin F. O'Brien, Sung Y. Shin:
Improved PSOR algorithm for minimum power multicast tree problem in wireless ad hoc networks. Int. J. Sens. Networks 8(3/4): 193-201 (2010) - [c10]Manki Min, Bipin C. Neupane:
Incremental minimality: A property of optimal solutions for the minimum power broadcast tree problem in wireless ad hoc networks. IPCCC 2010: 59-66
2000 – 2009
- 2009
- [c9]Manki Min, Austin F. O'Brien, Sung Y. Shin:
Partitioning-Based SOR for Minimum Energy Multicast Tree Problem in Wireless Ad Hoc Networks. ICCCN 2009: 1-6 - [c8]Manki Min, Bipin C. Neupane:
Virtual Center: A characteristic of minimum power broadcast trees in wireless ad hoc networks. IPCCC 2009: 103-110 - [c7]Manki Min, Austin F. O'Brien:
Lookahead Expansion Algorithm for Minimum Power Multicasting in Wireless Ad Hoc Networks. WASA 2009: 70-79 - 2008
- [j9]Manki Min, Panos M. Pardalos:
OMEGa: an optimistic most energy gain method for minimum energy multicasting in wireless ad hoc networks. J. Comb. Optim. 16(1): 81-95 (2008) - [j8]Sangho Kim, Shashi Shekhar, Manki Min:
Contraflow Transportation Network Reconfiguration for Evacuation Route Planning. IEEE Trans. Knowl. Data Eng. 20(8): 1115-1129 (2008) - [c6]Manki Min, Austin F. O'Brien, Sung Y. Shin:
SOR Revisited: Partitioning and Recovering after Shrinking. ICCCN 2008: 783-788 - [c5]Manki Min:
Comparison of Iterated Algorithms for the Minimum Energy Multicast Tree Problem in Wireless Ad Hoc Networks. ICWN 2008: 215-221 - [c4]Manki Min:
A Simple Yet Effective Diversifying Improvement of the Minimum Power Multicast Tree Algorithms in Wireless Ad Hoc Networks. WASA 2008: 52-62 - 2007
- [j7]Manki Min, Panos M. Pardalos:
Total energy optimal multicasting in wireless ad hoc networks. J. Comb. Optim. 13(4): 365-378 (2007) - 2006
- [j6]Manki Min, Oleg A. Prokopyev, Panos M. Pardalos:
Optimal solutions to minimum total energy broadcasting problem in wireless ad hoc networks. J. Comb. Optim. 11(1): 59-69 (2006) - [j5]Manki Min, Hongwei Du, Xiaohua Jia, Christina Xiao Huang, Scott C.-H. Huang, Weili Wu:
Improving Construction for Connected Dominating Set with Steiner Tree in Wireless Sensor Networks. J. Glob. Optim. 35(1): 111-119 (2006) - [j4]Maggie Xiaoyan Cheng, Jianhua Sun, Manki Min, Yingshu Li, Weili Wu:
Energy-efficient broadcast and multicast routing in multihop ad hoc wireless networks. Wirel. Commun. Mob. Comput. 6: 213-223 (2006) - [p1]Manki Min, Altannar Chinchuluun:
Optimization in Wireless Networks. Handbook of Optimization in Telecommunications 2006: 891-915 - 2005
- [c3]Feng Wang, Manki Min, Yingshu Li, Ding-Zhu Du:
On the construction of stable virtual backbones in mobile ad-hoc networks. IPCCC 2005: 355-362 - 2004
- [j3]Ionut Cardei, Srivatsan Varadarajan, Allalaghatta Pavan, Lee Graba, Mihaela Cardei, Manki Min:
Resource Management for Ad-Hoc Wireless Networks with Cluster Organization. Clust. Comput. 7(1): 91-103 (2004) - [c2]Manki Min, Feng Wang, Ding-Zhu Du, Panos M. Pardalos:
A reliable virtual backbone scheme in mobile ad-hoc networks. MASS 2004: 60-69 - 2003
- [j2]Maggie Xiaoyan Cheng, Xiufeng Du, Manki Min, Hung Q. Ngo, Lu Ruan, Jianhua Sun, Weili Wu:
Super link-connectivity of iterated line digraphs. Theor. Comput. Sci. 304(1-3): 461-469 (2003) - [c1]Maggie Xiaoyan Cheng, Jianhua Sun, Manki Min, Ding-Zhu Du:
Energy-efficient broadcast and multicast routing in ad hoc wireless networks. IPCCC 2003: 87-94 - 2002
- [j1]Mihaela Cardei, David MacCallum, Maggie Xiaoyan Cheng, Manki Min, Xiaohua Jia, Deying Li, Ding-Zhu Du:
Wireless Sensor Networks with Energy Efficient Organization. J. Interconnect. Networks 3(3-4): 213-229 (2002)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:15 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint