Investigating Influence of North Korea Threat Events on Attractiveness of South Korea for Foreign Visitors through Big Data Analysis. | 0 | 0.34 | 2018 |
DataCon: Easier Data Sharing, Exploration, and Fusion with Automatic Metadata Generation. | 0 | 0.34 | 2016 |
Data Lifecycle and Tagging for Internet of Things Applications. | 0 | 0.34 | 2016 |
Signal Interference of Ubiquitous Wireless Networks on Data Throughput | 0 | 0.34 | 2014 |
A Contents Service Profit Model Based on the Quality of Experience and User Group Characteristics. | 0 | 0.34 | 2013 |
Performance analysis of authentication and key distribution scheme for mobile multi-hop relay in IEEE 802.16j | 1 | 0.37 | 2012 |
Hybrid Authentication And Key Distribution Scheme For Wireless Mobile Multi-Hop Networks | 1 | 0.48 | 2009 |
Optimal TCP segment size for mobile server access over wireless links of cellular networks | 0 | 0.34 | 2008 |
A Scalable And Practical Authentication Protocol In Mobile Ip | 0 | 0.34 | 2008 |
Re-key Interval Optimization for Secure Group Communications | 1 | 0.37 | 2007 |
Customer Behavior Analysis for Internet Health Information Market Segmentation in Korea | 0 | 0.34 | 2007 |
Optimal Frame Payload Size for Mobile Communications over Wireless Links of Cellular Networks | 0 | 0.34 | 2007 |
A Real Time Traffic Engineering Scheme for Broadband Convergence Network (BCN) | 0 | 0.34 | 2007 |
Detour path optimization algorithm based on traffic duration time in MPLS network | 0 | 0.34 | 2005 |
Design and Implementation of a Data Sharing Scheme with Security and Flexibility Applicable to Extended P2P Systems | 0 | 0.34 | 2005 |
Alternate Route Selection Algorithm For Short-Lived Traffic (Arsast) In Mpls Network | 0 | 0.34 | 2005 |
Packet Diversity In Wireless Uplink Channels | 0 | 0.34 | 2005 |
Virtual cellular network: a new wireless communications architecture with multiple access ports | 14 | 1.96 | 1994 |