default search action
Sung Je Hong
Person information
Other persons with a similar name
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2012
- [j29]Sangho Lee, Jin Seok Kim, Sung Je Hong, Jong Kim:
Distance Bounding with Delayed Responses. IEEE Commun. Lett. 16(9): 1478-1481 (2012) - [j28]Jin Seok Kim, Kookrae Cho, Dae Hyun Yum, Sung Je Hong, Pil Joong Lee:
Lightweight Distance Bounding Protocol against Relay Attacks. IEICE Trans. Inf. Syst. 95-D(4): 1155-1158 (2012) - [j27]Jin Seok Kim, Dae Hyun Yum, Sung Je Hong, Jong Kim, Pil Joong Lee:
Security Condition for Exact Localization in Wireless Ad Hoc Networks. IEICE Trans. Commun. 95-B(7): 2459-2462 (2012) - [j26]Jin Seok Kim, Dae Hyun Yum, Pil Joong Lee, Sung Je Hong, Jong Kim:
A Hybrid Sonar Algorithm for Submersible Cars to Verify the Location of Senders. IEEE Trans. Veh. Technol. 61(6): 2707-2714 (2012) - 2011
- [j25]Dae Hyun Yum, Jin Seok Kim, Sung Je Hong, Pil Joong Lee:
Distance Bounding Protocol with Adjustable False Acceptance Rate. IEEE Commun. Lett. 15(4): 434-436 (2011) - [j24]Dae Hyun Yum, Jin Seok Kim, Pil Joong Lee, Sung Je Hong:
Fast Verification of Hash Chains with Reduced Storage. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 94-A(1): 383-391 (2011) - [j23]Dae Hyun Yum, Jin Seok Kim, Sung Je Hong, Pil Joong Lee:
Distance Bounding Protocol for Mutual Authentication. IEEE Trans. Wirel. Commun. 10(2): 592-601 (2011) - [c29]Dae Hyun Yum, Duk Soo Kim, Jin Seok Kim, Pil Joong Lee, Sung Je Hong:
Order-Preserving Encryption for Non-uniformly Distributed Plaintexts. WISA 2011: 84-97 - 2010
- [c28]Dae Hyun Yum, Jin Seok Kim, Pil Joong Lee, Sung Je Hong:
On Fast Verification of Hash Chains. CT-RSA 2010: 382-396
2000 – 2009
- 2009
- [j22]Sangho Lee, Jong Kim, Sung Je Hong:
Redistributing time-based rights between consumer devices for content sharing in DRM system. Int. J. Inf. Sec. 8(4): 263-273 (2009) - [j21]Sangho Lee, Jong Kim, Sung Je Hong:
Security weakness of Tseng's fault-tolerant conference-key agreement protocol. J. Syst. Softw. 82(7): 1163-1167 (2009) - 2008
- [j20]Jae Keun Park, Wan Yeon Lee, Sung Je Hong, Jong Kim:
Dynamic Two-Tier Cell Structure for Bandwidth Reservation of Handoffs in Cellular Networks. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 91-A(10): 3003-3005 (2008) - [c27]Tae-Hyung Kim, Young-Sik Choi, Jong Kim, Sung Je Hong:
Annulling SYN Flooding Attacks with Whitelist. AINA Workshops 2008: 371-376 - 2007
- [j19]Kwanhee Lee, Joon-Kyung Seong, Ku-Jin Kim, Sung Je Hong:
Minimum distance between two sphere-swept surfaces. Comput. Aided Des. 39(6): 452-459 (2007) - 2006
- [c26]Bong-Soo Roh, O-Hoon Kwon, Sung Je Hong, Jong Kim:
The Exclusion of Malicious Routing Peers in Structured P2P Systems. AP2PC 2006: 43-50 - [c25]So Young Lee, O-Hoon Kwon, Jong Kim, Sung Je Hong:
Mitigating the Impact of Liars by Reflecting Peer's Credibility on P2P File Reputation Systems. AP2PC 2006: 111-122 - [c24]Deok Jin Kim, Tae-Hyung Kim, Jong Kim, Sung Je Hong:
Return Address Randomization Scheme for Annuling Data-Injection Buffer Overflow Attacks. Inscrypt 2006: 238-252 - [c23]Kyong Hoon Kim, Jong Kim, Sung Je Hong:
Dual-Mode r-Reliable Task Model for Flexible Scheduling in Reliable Real-Time Systems. EUC 2006: 308-317 - [c22]Ki Hun Lee, Yuna Kim, Sung Je Hong, Jong Kim:
PolyI-D: Polymorphic Worm Detection Based on Instruction Distribution. WISA 2006: 45-59 - 2005
- [j18]Kyong Hoon Kim, Jong Kim, Sung Je Hong:
An Adaptive FEC Scheme for Firm Real-Time Multimedia Communications in Wireless Networks. IEICE Trans. Commun. 88-B(7): 2794-2801 (2005) - [c21]So Young Lee, O-Hoon Kwon, Jong Kim, Sung Je Hong:
A Trust Management Scheme in Structured P2P Systems. AP2PC 2005: 30-43 - [c20]Byung Joon Kim, Kyong Hoon Kim, Sung Je Hong, Jong Kim:
Ticket-Based Grid Services Architecture for Dynamic Virtual Organizations. EGC 2005: 394-403 - [c19]Jae Keun Park, Sung Je Hong, Jong Kim:
Mobile Multicast Routing Protocol Using Prediction of Dwelling Time of a Mobile Host. ICN (2) 2005: 884-891 - [c18]Junyoung Park, Sung Je Hong, Jong Kim:
Energy-saving design technique achieved by latched pass-transistor adiabatic logic. ISCAS (5) 2005: 4693-4696 - [c17]Ju Yeob Kim, Sung Je Hong, Jong Kim:
Parallely testable design for detection of neighborhood pattern sensitive faults in high density DRAMs. ISCAS (6) 2005: 5854-5857 - [c16]Ha Won Kim, Sung Je Hong, Jong Kim:
Adaptive Location Management Scheme for Mobile IP. PerCom Workshops 2005: 263-267 - [c15]So Young Lee, O-Hoon Kwon, Jong Kim, Sung Je Hong:
A Reputation Management System in Structured Peer-to-Peer Networks. WETICE 2005: 362-367 - 2004
- [j17]Seung-Hyun Kim, Kyong Hoon Kim, Jong Kim, Sung Je Hong, Sangwan Kim:
Workflow-Based Authorization Service in the Grid. J. Grid Comput. 2(1): 43-55 (2004) - [c14]Kyong Hoon Kim, Jong Kim, Sung Je Hong:
Best-Effort Scheduling (m, k)-Firm Real-Time Tasks Based on the (m, k)-Firm Constraint Meeting Probability. ESA/VLSI 2004: 240-248 - [c13]Byung Joon Kim, Sung Je Hong, Jong Kim:
Ticket-based fine-grained authorization service in the dynamic VO environment. SWS 2004: 29-36 - 2003
- [j16]Wan Yeon Lee, Sung Je Hong, Jong Kim, Sunggu Lee:
Dynamic load balancing for switch-based networks. J. Parallel Distributed Comput. 63(3): 286-298 (2003) - [j15]Wan Yeon Lee, Sung Je Hong, Jong Kim:
On-line scheduling of scalable real-time tasks on multiprocessor systems. J. Parallel Distributed Comput. 63(12): 1315-1324 (2003) - [j14]Hyo-Chang Nam, Jong Kim, Sung Je Hong, Sunggu Lee:
Secure checkpointing. J. Syst. Archit. 48(8-10): 237-254 (2003) - [j13]Heejo Lee, Jong Kim, Sung Je Hong, Sunggu Lee:
Task scheduling using a block dependency DAG for block-oriented sparse Cholesky factorization. Parallel Comput. 29(1): 135-159 (2003) - [j12]Heejo Lee, Jong Kim, Sung Je Hong, Sunggu Lee:
Processor Allocation and Task Scheduling of Matrix Chain Products on Parallel Systems. IEEE Trans. Parallel Distributed Syst. 14(4): 394-407 (2003) - [c12]Seung-Hyun Kim, Jong Kim, Sung Je Hong, Sangwan Kim:
Workflow-based Authorization Service in Grid. GRID 2003: 94-100 - [c11]Jaewoo Ahn, Sung Je Hong:
Approximating 3D General Sweep Boundary Using Depth-Buffer. ICCSA (3) 2003: 508-517 - 2001
- [j11]Hee-Seok Heo, Sung Je Hong, Joon-Kyung Seong, Myung-Soo Kim, Gershon Elber:
The Intersection of Two Ringed Surfaces and Some Related Problems. Graph. Model. 63(4): 228-244 (2001) - [c10]Hyo-Chang Nam, Jong Kim, Sung Je Hong, Sunggu Lee:
A Secure Checkpointing System. PRDC 2001: 49-56 - 2000
- [j10]Wan Yeon Lee, Sung Je Hong, Jong Kim:
On the Configuration of Switch-Based Networks with Wormhole Routing. J. Interconnect. Networks 1(2): 95-114 (2000) - [j9]Joo-Haeng Lee, Sung Je Hong, Myung-Soo Kim:
Polygonal boundary approximation for a 2D general sweep based on envelope and boolean operations. Vis. Comput. 16(3-4): 208-240 (2000) - [c9]Hee-Seok Heo, Sung Je Hong, Myung-Soo Kim, Gershon Elber:
The Intersection of Two Ringed Surfaces. PG 2000: 146-153 - [c8]Heejo Lee, Jong Kim, Sung Je Hong, Sunggu Lee:
Task Scheduling using a Block Dependency DAG for Block-Oriented Sparse Cholesky Factorization. SAC (2) 2000: 641-648
1990 – 1999
- 1999
- [j8]SangHo Chae, Jong Kim, Sung Je Hong, Sunggu Lee:
Design and Analysis of the Dual-Torus Network. New Gener. Comput. 17(3): 229-254 (1999) - [c7]Hyo-Chang Nam, Jong Kim, Sung Je Hong, Sunggu Lee:
Reliable Probabilistic Checkpointing. PRDC 1999: 153-160 - 1998
- [j7]Jeong Beom Kim, Sung Je Hong, Jong Kim:
Design of a built-in current sensor for IDDQ testing. IEEE J. Solid State Circuits 33(8): 1266-1272 (1998) - [j6]Tae-Ick Chang, Joo-Haeng Lee, Myung-Soo Kim, Sung Je Hong:
Direct manipulation of generalized cylinders based on B-spline motion. Vis. Comput. 14(5/6): 228-239 (1998) - [c6]Byungjae Kim, Jong Kim, Sung Je Hong, Sunggu Lee:
A Real-Time Communication Method for Wormhole Switching Networks. ICPP 1998: 527-534 - 1997
- [j5]Wan Yeon Lee, Sung Je Hong, Jong Kim:
Dynamic Load Distribution on Meshes with Broadcasting. Int. J. High Speed Comput. 9(4): 337-357 (1997) - [c5]Hyo-Chang Nam, Jong Kim, Sung Je Hong, Sunggu Lee:
Probabilistic Checkpointing. FTCS 1997: 48-57 - [c4]Wan Yeon Lee, Sung Je Hong, Jong Kim:
Dynamic Load Distribution on a Mesh with a Single Bus. ICPADS 1997: 368-375 - [c3]O-Hoon Kwon, Jong Kim, Sung Je Hong, Sunggu Lee:
Real-Time Job Scheduling in Hypercube Systems. ICPP 1997: 166-169 - 1996
- [j4]Min-Ho Kyung, Myung-Soo Kim, Sung Je Hong:
A New Approach to Through-the-Lens Camera Control. CVGIP Graph. Model. Image Process. 58(3): 262-285 (1996) - 1995
- [c2]SangHo Chae, Jong Kim, Dongseung Kim, Sung Je Hong, Sunggu Lee:
DTN: A New Partitionable Torus Topology. ICPP (1) 1995: 84-91 - 1991
- [j3]Sung Je Hong, Saburo Muroga:
Absolute Minimization of Completely Specified Switching Functions. IEEE Trans. Computers 40(1): 53-65 (1991) - 1990
- [j2]Sung Je Hong:
The Design of a Testable Parallel Multiplier. IEEE Trans. Computers 39(3): 411-416 (1990)
1980 – 1989
- 1988
- [c1]Sung Je Hong:
An easily testable parallel multiplier. FTCS 1988: 214-219 - 1983
- [b1]Sung Je Hong:
Design of Minimal Programmable Logic Arrays. University of Illinois Urbana-Champaign, USA, 1983 - 1981
- [j1]Sung Je Hong:
Existence Algorithms for Synchronizing/Distinguishing Sequences. IEEE Trans. Computers 30(3): 234-237 (1981)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:46 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint