dblp.uni-trier.dewww.uni-trier.de

Tae Ho Cho

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2009
33EESoo Young Moon, Tae Ho Cho: Energy efficient filtering method in sensor networks. ICUIMC 2009: 580-585
32EESang Jin Lee, Hae Young Lee, Tae Ho Cho: Adaptive threshold determination method for the dynamic filtering in wireless sensor networks using fuzzy logic. ICUIMC 2009: 597-601
2008
31EEHae Young Lee, Tae Ho Cho: A General Framework for Adaptive Filtering in Wireless Sensor Networks Based on Fuzzy Logic. ICIC (1) 2008: 1234-1241
30EEByung Hee Kim, Tae Ho Cho: Efficient selection method of message authentication codes for filtering scheme in sensor networks. ICUIMC 2008: 511-514
29EEJin Myoung Kim, Tae Ho Cho: A*-based key tree structure generation for group key management in wireless sensor networks. Computer Communications 31(10): 2414-2419 (2008)
28EEHae Young Lee, Tae Ho Cho: A* -based layout design for gratings allocation. Computer-Aided Design 40(4): 455-464 (2008)
27EESang Ryul Kim, Hae Young Lee, Tae Ho Cho: Fuzzy Adaptive Partitioning Method for the Statistical Filtering. IEICE Transactions 91-D(7): 2065-2067 (2008)
2007
26EEHae Young Lee, Tae Ho Cho: Fuzzy Security Parameter Determining Method for the Commutative Cipher Based Filtering in Sensor Networks. ICCSA (2) 2007: 573-583
25EEJin Myoung Kim, Tae Ho Cho: Routing Path Generation for Reliable Transmission in Sensor Networks Using GA with Fuzzy Logic Based Fitness Function. ICCSA (3) 2007: 637-648
24EEMun Su Kim, Tae Ho Cho: A Fuzzy-Based En-Route Filtering Scheme in Sensor Networks. ICIC (1) 2007: 230-239
23EEByung Hee Kim, Hae Young Lee, Tae Ho Cho: Fuzzy Key Dissemination Limiting Method for the Dynamic Filtering-Based Sensor Networks. ICIC (1) 2007: 263-272
22EEJin Myoung Kim, Tae Ho Cho: Genetic Algorithm Based Routing Method for Efficient Data Transmission in Sensor Networks. ICIC (1) 2007: 273-282
21EEHae Young Lee, Tae Ho Cho: Fuzzy Adaptive Threshold Determining in the Key Inheritance Based Sensor Networks. IEA/AIE 2007: 64-73
20EEHae Young Lee, Tae Ho Cho: Fuzzy-Based Reliable Data Delivery for Countering Selective Forwarding in Sensor Networks. UIC 2007: 535-544
19EEHae Young Lee, Tae Ho Cho: Fuzzy Adaptive Selection of Filtering Schemes for Energy Saving in Sensor Networks. IEICE Transactions 90-B(12): 3346-3353 (2007)
18EEMun Su Kim, Tae Ho Cho: A Multipath En-Route Filtering Method for Dropping Reports in Sensor Networks. IEICE Transactions 90-D(12): 2108-2109 (2007)
2006
17EESang Hoon Chi, Tae Ho Cho: Fuzzy Logic Anomaly Detection Scheme for Directed Diffusion Based Sensor Networks. FSKD 2006: 725-734
16EESang Hoon Chi, Tae Ho Cho: Fuzzy Logic Based Propagation Limiting Method for Message Routing in Wireless Sensor Networks. ICCSA (4) 2006: 58-67
15EEHae Young Lee, Tae Ho Cho: Key Inheritance-Based False Data Filtering Scheme in Wireless Sensor Networks. ICDCIT 2006: 116-127
14EEMi Ra Yi, Jihyun Hong, Tae Ho Cho: Genetic Algorithms for Improving Material Utilization in Manufacturing. ICIC (1) 2006: 717-724
13EEHae Young Lee, Tae Ho Cho: Fuzzy-Based Adaptive Threshold Determining Method for the Interleaved Authentication in Sensor Networks. MICAI 2006: 112-121
2005
12EEHee Suk Seo, Tae Ho Cho: Application of Fuzzy Logic for Distributed Intrusion Detection. CIS (2) 2005: 340-347
11EESeung-Beom Baeg, Tae Ho Cho: Transmission Relay Method for Balanced Energy Depletion in Wireless Sensor Networks Using Fuzzy Logic. FSKD (2) 2005: 998-1007
2004
10EEWon Young Lee, Hee Suk Seo, Tae Ho Cho: Modeling of Policy-Based Network with SVDB. AIS 2004: 323-332
9EEMi Ra Yi, Tae Ho Cho: Simulation Modeling with Hierarchical Planning: Application to a Metal Manufacturing System. AIS 2004: 71-80
8EEHyung-Jong Kim, Joonmo Kim, Kang Shin Lee, Hongsub Lee, Tae Ho Cho: Simulation-Based Security Testing for Continuity of Essential Service. ICCSA (1) 2004: 567-576
7EEHee Suk Seo, Tae Ho Cho: Distributed Security Agent Modeling in the Policy-Based Networking. PDCAT 2004: 782-786
2003
6EEHee Suk Seo, Tae Ho Cho, Sung-Do Chi: Modeling and Simulation of Distributed Security Models. International Conference on Computational Science 2003: 809-818
5EEMi Ra Yi, Tae Ho Cho: Hierarchical simulation model with animation. Eng. Comput. (Lond.) 19(2-3): 203-212 (2003)
2002
4EEHee Suk Seo, Tae Ho Cho: Modeling and Simulation for Detecting a Distributed Denial of Service Attack. Australian Joint Conference on Artificial Intelligence 2002: 179-190
3EEJong-Young Koh, Mi Ra Yi, Tae Ho Cho, Hyung-Jong Kim, Hong-Geun Kim: Knowledge-Based Modeling and Simulation of Network Access Control Mechanisms Representing Security Policies. ICICS 2002: 374-385
2001
2EEHee Suk Seo, Tae Ho Cho: Simulation of Network Security with Collaboration among IDS Models. Australian Joint Conference on Artificial Intelligence 2001: 438-448
1EEMi Ra Yi, Tae Ho Cho: Hierarchical Simulation Model with Animation for Large Network Security. ICICS 2001: 456-460

Coauthor Index

1Seung-Beom Baeg [11]
2Sang Hoon Chi [16] [17]
3Sung-Do Chi [6]
4Jihyun Hong [14]
5Byung Hee Kim [23] [30]
6Hong-Geun Kim [3]
7Hyung-Jong Kim [3] [8]
8Jin Myoung Kim [22] [25] [29]
9Joonmo Kim [8]
10Mun Su Kim [18] [24]
11Sang Ryul Kim [27]
12Jong-Young Koh [3]
13Hae Young Lee [13] [15] [19] [20] [21] [23] [26] [27] [28] [31] [32]
14Hongsub Lee [8]
15Kang Shin Lee [8]
16Sang Jin Lee [32]
17Won Young Lee [10]
18Soo Young Moon [33]
19Hee Suk Seo [2] [4] [6] [7] [10] [12]
20Mi Ra Yi [1] [3] [5] [9] [14]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)