Name
Affiliation
Papers
INHYE KANG
Department of Computer and Information Science, University of Pennsylvania, Philadelphia, PA
30
Collaborators
Citations 
PageRank 
50
169
17.91
Referers 
Referees 
References 
420
537
276
Search Limit
100537
Title
Citations
PageRank
Year
Overcoming IoT Language Barriers Using Smartphone SDRs.10.352017
A process algebraic approach to the schedulability analysis and workload abstraction of hierarchical real-time systems.20.362017
A Process Algebraic Approach to Resource-Parameterized Timing Analysis of Automotive Software Architectures.00.342016
A Verification Method Of Sdn Firewall Applications00.342016
Geographic scheduling of directional transmission for periodic safety messages in IEEE WAVE.10.352016
Formal synthesis of application and platform behaviors of embedded software systems20.372015
Formal Modeling and Verification of Motor Drive Software for Networked Motion Control Systems.00.342014
Generating composite behavior of embedded software components based on UML behavioral model and process algebra10.352011
Analysis Of The Rate-Based Channel Access Prioritization For Drive-Thru Applications In The Ieee 802.11p Wave00.342010
Timed and Resource-oriented Statecharts for Embedded Software.140.742010
UML Behavior Models of Real-Time Embedded Software for Model-Driven Architecture30.412010
Hop-By-Hop Frame Aggregation For Voip On Multi-Hop Wireless Networks81.062008
Secure Vehicular Communication for Safety Applications - A Measurement Study00.342008
100+ VoIP Calls on 802.11b: The Power of Combining Voice Frame Aggregation and Uplink-Downlink Bandwidth Control in Wireless LANs91.062007
A Simple Congestion-Resilient Link Adaptation Algorithm For Ieee 802.11 Wlans20.442006
Formal Verification Of Security Model Using Spr Tool10.382006
Squeezing 100+ VoIP calls out of 802.11b WLANs10.372006
Improving VoIP Call Capacity of Multi-Hop Wireless Networks through Self-Controlled Frame Aggregation10.372006
Secrecy Analysis of Purchase Transaction in Electronic Purses00.342006
On the Cross-Layer Impact of TCP ACK Thinning on IEEE 802.11 Wireless MAC Dynamics40.472006
Preventing Session Table Explosion in Packet Inspection Computers90.602005
Model-Based analysis of money accountability in electronic purses00.342005
Resolving 802.11 performance anomalies through QoS differentiation412.242005
Real-time visualization of network attacks on high-speed links201.192004
Determining embryonic connection timeout in stateful inspection40.772003
On the effectiveness of Martian address filtering and its extensions50.682003
Measurement-based multi-call voice frame grouping in Internet telephony40.552002
Reducing TCP response time in face of wireless uplink losses40.552001
Equivalence checking of two Statechart specifications60.662000
An efficient state space generation for analysis of real-time systems261.231996