2006 |
8 | EE | Hyungwoo Kang,
Kibom Kim,
Soon Jwa Hong,
Dong Hoon Lee:
A Model for Security Vulnerability Pattern.
ICCSA (3) 2006: 385-394 |
2002 |
7 | EE | MaengSoon Baik,
Jin Gon Shon,
Kibom Kim,
JinHo Ahn,
Chong-Sun Hwang:
An Efficient Coordinated Checkpointing Scheme Based on PWD Model.
ICOIN (2) 2002: 780-790 |
2000 |
6 | | Kibom Kim,
Jin Gon Shon,
Soon Yong Jung,
Chong-Sun Hwang:
Causal Message Logging Protocol Considering In-Transit Messages.
ICDCS Workshop on Distributed Real-Time Systems 2000: B21-B28 |
1999 |
5 | | KwonWoo Yang,
Joon-Min Gil,
Kibom Kim,
Soon Yong Jung,
Chong-Sun Hwang:
A Location Tracking Scheme Using Call Locality in PCN.
Applied Informatics 1999: 28l-284 |
4 | EE | Kibom Kim,
KwonWoo Yang,
Joon-Min Gil,
Chong-Sun Hwang:
Tracking Mobile Users Using User Locality in Mobile Computing Systems.
ICPP Workshops 1999: 428-433 |
3 | | KwonWoo Yang,
Joon-Min Gil,
Kibom Kim,
Chong-Sun Hwang:
Movement Locality-Based Location Tracking Strategy Reducing Location Management Cost in Mobile Computing Systems.
PDPTA 1999: 1026-1032 |
2 | | JinHo Ahn,
Kibom Kim,
Chong-Sun Hwang:
Low-Overhead Fault-Tolerance for Java Parallel Applications on Heterogeneous Networked Computers.
PDPTA 1999: 1770-1775 |
1997 |
1 | EE | Kwang-Sik Chung,
Kibom Kim,
Chong-Sun Hwang,
Jin Gon Shon,
Heon-Chang Yu:
Hybrid checkpointing protocol based on selective-sender-based message logging.
ICPADS 1997: 788-793 |