default search action
Dong-Young Lee
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2018
- [j6]H. W. Lee, H. W. Lim, D. H. Jeon, C. K. Park, Dong-Young Lee, H. S. Cho, C. W. Seo, K. S. Kim, G. A. Kim, S. Y. Park, S. Y. Kang, J. E. Park, W. S. Kim, Y. H. Lim, T. H. Woo:
Eliminating artifacts in single-grid phase-contrast x-ray imaging for improving image quality. Comput. Biol. Medicine 97: 74-82 (2018) - 2013
- [c21]Sung-Min Jung, Nam-Uk Kim, Seung-Hyun Lee, Dong-Young Lee, Tai-Myoung Chung:
Applying Different Cryptographic Algorithms for Mobile Cloud Computing. MUSIC 2013: 111-116 - 2012
- [c20]Hassan Abid, Haroon Raja, Ali Munir, Jaweria Amjad, Aliya Mazhar, Dong-Young Lee:
Performance Analysis of WiMAX Best Effort and ertPS Service Classes for Video Transmission. ICCSA (3) 2012: 368-375 - [c19]Jae-Won Min, Sung-Min Jung, Dong-Young Lee, Tai-Myoung Chung:
Jump Oriented Programming on Windows Platform (on the x86). ICCSA (3) 2012: 376-390 - 2011
- [c18]Dong-Young Lee, Sungsoo Ahn, Minsoo Kim:
A Study on Hierarchical Policy Model for Managing Heterogeneous Security Systems. ICCSA (4) 2011: 225-234 - [c17]Sungsoo Ahn, Dong-Young Lee:
Performance Analysis of MIMO System Utilizing the Detection Algorithm. ICCSA (4) 2011: 248-257
2000 – 2009
- 2008
- [c16]Dong-Young Lee, Eui Kyung Chung, Simon S. Lam:
A Radius Geocast Routing Protocol. HPCC 2008: 447-455 - [c15]Dong-Young Lee, Simon S. Lam:
Efficient and accurate protocols for distributed delaunay triangulation under churn. ICNP 2008: 124-136 - 2007
- [j5]Yong-Kul Ki, Dong-Young Lee:
A Traffic Accident Recording and Reporting Model at Intersections. IEEE Trans. Intell. Transp. Syst. 8(2): 188-194 (2007) - [c14]Hyuck Han, Hyungsoo Jung, Heon Young Yeom, Dong-Young Lee:
Taste of AOP : Blending concerns in cluster computing software. CLUSTER 2007: 110-117 - [c13]Dong-Young Lee, Simon S. Lam:
Protocol Design for Dynamic Delaunay Triangulation. ICDCS 2007: 26 - 2006
- [c12]Hyung-Jin Lim, Dong-Young Lee, Tae-Kyung Kim, Tai-Myoung Chung:
An Evaluation and Analysis for IP VPN Model in IPv6 Transition Environment. ICCSA (2) 2006: 135-144 - [c11]Hyung-Jin Lim, Dong-Young Lee, Tai-Myoung Chung:
Comparative Analysis of IPv6 VPN Transition in NEMO Environments. ICCSA (3) 2006: 486-496 - [c10]Hyung-Jin Lim, Moonseong Kim, Dong-Young Lee, Tai-Myoung Chung:
An Analysis of Policy Provisioning Complexity in Accordance with the Application Attributes of the Policy-Based Network. ICCSA (5) 2006: 626-634 - [c9]Dong-Young Lee, Hyung-Jin Lim, Tai-Myoung Chung:
A Study on Agent-Based Integrated Security Management System for Managing Heterogeneous Firewall Systems. ICCSA (5) 2006: 655-664 - 2005
- [j4]Hyung-Jin Lim, Dong-Young Lee, Tae-Kyung Kim, Tai-Myoung Chung:
A Model and Evaluation of Route Optimization in Nested NEMO Environment. IEICE Trans. Commun. 88-B(7): 2765-2776 (2005) - [j3]Byung-Doo Moon, Jang-Soo Lee, Dong-Young Lee, Kee-Choon Kwon:
A simple method to compute a periodic solution of the Poisson equation with no boundary conditions. Int. J. Fuzzy Log. Intell. Syst. 5(4): 286-290 (2005) - [c8]Hyung-Jin Lim, Dong-Young Lee, Tae-Kyung Kim, Tai-Myoung Chung:
An Analysis and Evaluation of Policy-Based Network Management Approaches. ICCNMC 2005: 590-599 - [c7]Dong-Young Lee:
A Study on the Centralized Database of the Multi-agents Based Integrated Security Management System for Managing Heterogeneous Firewalls. KES (2) 2005: 1036-1042 - [c6]Sungsoo Ahn, Minsoo Kim, Jungsuk Lee, Dong-Young Lee:
Performance Analysis of a Antenna Array System Using a New Beamforming Algorithm in the CDMA2000 1X Wireless Communication. KES (2) 2005: 1050-1055 - 2004
- [j2]X. Brian Zhang, Simon S. Lam, Dong-Young Lee:
Group rekeying with limited unicast recovery. Comput. Networks 44(6): 855-870 (2004) - 2003
- [j1]X. Brian Zhang, Simon S. Lam, Dong-Young Lee, Yang Richard Yang:
Protocol design for scalable and reliable group rekeying. IEEE/ACM Trans. Netw. 11(6): 908-922 (2003) - [c5]X. Brian Zhang, Simon S. Lam, Dong-Young Lee:
Group rekeying with limited unicast recovery. ICC 2003: 707-714 - [c4]Min Sik Kim, Simon S. Lam, Dong-Young Lee:
Optimal Distribution Tree for Internet Streaming Media. ICDCS 2003: 116-125 - [c3]Tae-Kyung Kim, Dong-Young Lee, Ok-Hwan Byeon, Tai-Myung Chung:
A Policy Propagation Model Using Mobile Agents in Large-Scale Distributed Network Environments. ICSOC 2003: 514-526 - 2002
- [c2]Tae-Kyung Kim, Dong-Young Lee, Tai-Myung Chung:
Mobile Agent-Based Misuse Intrusion Detection Rule Propagation Model for Distributed System. EurAsia-ICT 2002: 842-849
1990 – 1999
- 1999
- [c1]Dong-Young Lee, Heon Young Yeom:
Tip Prefetching: Dealing with the Bit Rate Variability of Video Streams. ICMCS, Vol. 2 1999: 352-356
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-18 19:27 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint