dblp.uni-trier.dewww.uni-trier.de

Dong-Sub Cho

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2009
17EEDae-Hee Seo, Jang-Mi Baek, Dong-Sub Cho: Secure RFID authentication scheme for EPC class Gen2. ICUIMC 2009: 221-227
2008
16EEDae-Hee Seo, Jang-Mi Baek, Dong-Sub Cho: Secure authentication and management scheme for RFID. Q2SWinet 2008: 106-110
2007
15EESu-Hong Min, Byong Lee, Dong-Sub Cho: Dynamic Workload Balancing for Collaboration Strategy in Hybrid P2P System. GPC 2007: 374-384
14EESu-Hong Min, Byong Lee, Dong-Sub Cho: Efficient Content Distribution Method Based on Location and Similarity in Unstructured P2P System. KES (1) 2007: 781-788
2006
13EESu-Hong Min, Dong-Sub Cho: Super-Peer Selection Based Framework Using Dynamic Capacity and Similarity. ISCIS 2006: 803-812
2005
12EEOk-Ran Jeong, Dong-Sub Cho: A Three-Step Preprocessing Algorithm for Minimizing E-Mail Document's Atypical Characteristics. FSKD (2) 2005: 561-566
11 Mira Kwak, Dong-Sub Cho: Host State Representation for Intrusion Detection. Security and Management 2005: 518-523
2004
10EEYung Bok Kim, Mira Kwak, Dong-Sub Cho: Performance Analysis for User Interface in Real-Time Ubiquitous Information Network. APCHI 2004: 171-179
9EEOk-Ran Jeong, Dong-Sub Cho: Component-Based Recommendation Agent System for Efficient Email Inbox Management. CIS 2004: 812-818
8EEOk-Ran Jeong, Dong-Sub Cho: A Personalized Recommendation Agent System for E-mail Document Classification. ICCSA (3) 2004: 558-565
7EEOk-Ran Jeong, Dong-Sub Cho: A Rule Filtering Component Based on Recommendation Agent System for Classifying Email Document. PDCAT 2004: 729-735
6 Mira Kwak, Dong-Sub Cho: Modeling Host Status Transition for Network Intrusion Detection. Security and Management 2004: 421-426
2003
5 Ok-Ran Jeong, Dong-Sub Cho: Personalized Filtering Agent for E-Mail Classification. Security and Management 2003: 274-280
4 Su-Hong Min, Ok-Ran Jeong, Dong-Sub Cho: A Web-Based Login System Using the Time Based Password (TBP). Security and Management 2003: 415-420
3 Mira Kwak, Dong-Sub Cho: Extended Probabilistic Packet Marking Scheme for IP Traceback. Security and Management 2003: 521-526
2002
2EEWon Kim, Ki-Joon Chae, Dong-Sub Cho, Byoungju Choi, Anmo Jeong, Myung Kim, Kiho Lee, Meejeong Lee, Sang-Ho Lee, Seung-Soo Park, Hwan-Seung Yong: The Chamois Component-Based Knowledge Engineering Framework. IEEE Computer 35(5): 46-54 (2002)
1EEWon Kim, Ki-Joon Chae, Dong-Sub Cho, Byoungju Choi, Anmo Jeong, Myung Kim, Kiho Lee, Meejeong Lee, Minsoo Lee, Sang-Ho Lee, Seung-Soo Park, Hwan-Seung Yong, Ho-Sook Kim, Jung-Won Lee, Wol-Young Lee: The Chamois Reconfigurable Data-Mining Architecture. Journal of Object Technology 1(2): 21-33 (2002)

Coauthor Index

1Jang-Mi Baek [16] [17]
2Kijoon Chae (Ki-Joon Chae) [1] [2]
3Byoungju Choi [1] [2]
4Anmo Jeong [1] [2]
5Ok-Ran Jeong [4] [5] [7] [8] [9] [12]
6Ho-Sook Kim [1]
7Myung Kim [1] [2]
8Won Kim [1] [2]
9Yung Bok Kim [10]
10Mira Kwak [3] [6] [10] [11]
11Byong Lee [14] [15]
12Jung-Won Lee [1]
13Kiho Lee [1] [2]
14Meejeong Lee [1] [2]
15Minsoo Lee [1]
16Sang-Ho Lee [1] [2]
17Wol-Young Lee [1]
18Su-Hong Min [4] [13] [14] [15]
19Seung-Soo Park [1] [2]
20Dae-Hee Seo [16] [17]
21Hwan-Seung Yong [1] [2]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)