kichang kim
kichang kim
인하대 정보통신공학과 교수의 이메일 확인됨
VLIW compilation techniques in a superscalar environment
K Ebcioglu, RD Groves, KC Kim, GM Silberman, I Ziv
Proceedings of the ACM SIGPLAN 1994 conference on Programming language …, 1994
Probability-based tile pre-fetching and cache replacement algorithms for web geographical information systems
YK Kang, KC Kim, YS Kim
East European Conference on Advances in Databases and Information Systems …, 2001
Design optimization analysis of body attachment for NVH performance improvements
K Kim, I Choi
SAE Technical Paper, 2003
Adaptation of a neighbor selection markov chain for prefetching tiled web gis data
DH Lee, JS Kim, SD Kim, KC Kim, K Yoo-Sung, J Park
International Conference on Advances in Information Systems, 213-222, 2002
A resource-efficient ip traceback technique for mobile ad-hoc networks based on time-tagged bloom filter
IY Kim, KC Kim
2008 Third International Conference on Convergence and Hybrid Information …, 2008
Two-stage ransomware detection using dynamic analysis and machine learning techniques
J Hwang, J Kim, S Lee, K Kim
Wireless Personal Communications 112 (4), 2597-2609, 2020
High-performance internet traffic classification using a markov model and kullback-leibler divergence
J Kim, J Hwang, K Kim
Mobile Information Systems 2016, 2016
Collaborative design by sharing multiple-level encryption files
KC Kim, SB Yoo
Concurrent Engineering 22 (1), 29-37, 2014
Zone-based clustering for intrusion detection architecture in ad-hoc networks
IY Kim, YS Kim, KC Kim
Asia-Pacific Network Operations and Management Symposium, 253-262, 2006
A Case Study: Application of Analytical and Numerical Techniques to Squeak and Rattle Analysis of a Door Assembly
KC Kim, SW Lee, SG Hong, J Kim, GJ Lee, JM Choi, YJ Kim
SAE Technical Paper, 2015
Study of an in-order SMT architecture and grouping schemes
BI Moon, MG Kim, IP Hong, KC Kim, YS Lee
International Journal of Control, Automation, and Systems 1 (3), 339-350, 2003
IP traceback with sparsely-tagged fragment marking scheme under massively multiple attack paths
K Kim, J Kim, J Hwang
Cluster computing 16 (2), 229-239, 2013
Tagged fragment marking scheme with distance-weighted sampling for a fast IP traceback
KC Kim, JS Hwang, BY Kim, SD Kim
Asia-Pacific Web Conference, 442-452, 2003
An analytical study of the mode-coupling effect on the instability of friction induced vibrations to guide design of a squeak test apparatus
GJ Lee, J Kim, K Kim
INTER-NOISE and NOISE-CON Congress and Conference Proceedings 250 (6), 1293-1299, 2015
Ipbio: Embedding biometric data in ip header for per-packet authentication
DS Lee, KC Kim, YB Yoo
International Symposium on Parallel and Distributed Processing and …, 2006
Improved technique of IP address fragmentation strategies for DoS attack traceback
BR Kim, KC Kim
International Computer Science Symposium in Russia, 427-437, 2006
Development of an algorithm to automatically detect and distinguish squeak and rattle noises
GJ Lee, K Kim, J Kim
SAE Technical Paper, 2015
A node split algorithm reducing overlapped index spaces in m-tree index
SH Lim, KI Ku, K Kim, YS Kim
22nd International Conference on Data Engineering Workshops (ICDEW'06), 15-15, 2006
Securing anonymity in P2P network
BR Kim, KC Kim, YS Kim
Proceedings of the 2005 joint conference on Smart objects and ambient …, 2005
Automatic construction of theme melody index from music database for fast content-based retrievals
CH Shin, KI Ku, KC Kim, YS Kim
European Conference on Information Retrieval, 605-612, 2003
현재 시스템이 작동되지 않습니다. 나중에 다시 시도해 주세요.
학술자료 1–20