default search action
NamUk Kim
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c17]Wook-Hyung Kim, Cheul-Hee Hahm, Anant Baijal, Namuk Kim, Ilhyun Cho, Jayoon Koo:
LiNuIQA: Lightweight No-Reference Image Quality Assessment Based on Non-Uniform Weighting. ICASSP 2023: 1-5 - 2022
- [i1]Wook-Hyung Kim, Cheul-Hee Hahm, Anant Baijal, Namuk Kim, Ilhyun Cho, Jayoon Koo:
Pixel-by-pixel Mean Opinion Score (pMOS) for No-Reference Image Quality Assessment. CoRR abs/2206.06541 (2022)
2010 – 2019
- 2019
- [j13]Nam-Uk Kim, Sung-Chang Lim, Jungwon Kang, Hui Yong Kim, Yung-Lyul Lee:
Transform with residual rearrangement for HEVC intra coding. Signal Process. Image Commun. 78: 322-330 (2019) - [c16]Vinh Pham, Namuk Kim, Eunil Seo, Jun Suk Ha, Tai-Myoung Chung:
A Method to Enhance the Security Capability of Python IDE. FDSE 2019: 399-410 - [c15]Nam-Uk Kim, Tai-Myoung Chung:
An efficient MSD protection and authentication scheme for automotive ICT based emergency call system. ICACT 2019: 435-439 - 2018
- [j12]Nam-Uk Kim, Yung-Lyul Lee:
Blocking-artifact detection in frequency domain for frame-rate up-conversion. Pers. Ubiquitous Comput. 22(1): 173-184 (2018) - 2017
- [c14]Nam-Uk Kim, Tai-Myoung Chung:
AMI-SIM: An NS-2 Based Simulator for Advanced Metering Infrastructure Network. ICISA 2017: 61-68 - 2016
- [c13]Namuk Kim, Seungsu Jeon, Hiuk Jae Shim, Byeungwoo Jeon, Sung-Chang Lim, Hyunsuk Ko:
Adaptive keypoint-based CU depth decision for HEVC intra coding. BMSB 2016: 1-3 - 2015
- [j11]NamUk Kim, DongKwon Yang:
Performance Analysis of A Centralized Burst-Mode Traffic Shaping for Distributed Parallel Queues. IEEE Commun. Lett. 19(3): 351-354 (2015) - [j10]Dang Ngoc Hai Nguyen, NamUk Kim, Yung-Lyul Lee:
Frame Rate Up-Conversion Using Median Filter and Motion Estimation with Occlusion Detection. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 98-A(1): 455-458 (2015) - [j9]Sung-Hwan Kim, Nam-Uk Kim, Tai-Myung Chung:
Study on sensitive information leakage vulnerability modeling. Kybernetes 44(1): 77-88 (2015) - [c12]Tae-Young Kim, Nam-Uk Kim, Tai-Myoung Chung:
The Design of Log Analysis Mechanism in SDN Quarantined Network System. CSA/CUTE 2015: 331-336 - [c11]Ji-Hoon Hong, Nam-Uk Kim, Tai-Myoung Chung:
A Study on the Defense MITM with Message Authentication in WLAN Environments. CSA/CUTE 2015: 337-344 - 2014
- [j8]NamUk Kim, GanHo Choi, JaeHyeong Choi:
A Scalable Carrier-Grade DPI System Architecture Using Synchronization of Flow Information. IEEE J. Sel. Areas Commun. 32(10): 1834-1848 (2014) - 2013
- [c10]Sung-Min Jung, Nam-Uk Kim, Tai-Myoung Chung:
Applying Scheduling Algorithms with QoS in the Cloud Computing. ICISA 2013: 1-2 - [c9]Nam-Uk Kim, Sung-Min Jung, Tai-Myoung Chung:
A Remote Control Architecture for Thin-Client in Mobile Cloud Computing. ICISA 2013: 1-2 - [c8]Sung-Hwan Kim, Nam-Uk Kim, Tai-Myoung Chung:
Attribute Relationship Evaluation Methodology for Big Data Security. ICITCS 2013: 1-4 - [c7]Sung-Min Jung, Nam-Uk Kim, Seung-Hyun Lee, Dong-Young Lee, Tai-Myoung Chung:
Applying Different Cryptographic Algorithms for Mobile Cloud Computing. MUSIC 2013: 111-116 - 2012
- [c6]Jung-Ho Eom, Nam-Uk Kim, Sung-Hwan Kim, Tai-Myoung Chung:
Cyber military strategy for cyberspace superiority in cyber warfare. CyberSec 2012: 295-299 - [c5]Nam-Uk Kim, Jung-Ho Eom, Sung-Hwan Kim, Tai-Myoung Chung:
The Architecture of User-End Client for Mobile Clout Service. ICHIT (2) 2012: 699-706 - [c4]Sung-Min Jung, Nam-Uk Kim, Tai-Myoung Chung:
The clusterhead chaining scheme considering scalability of the wireless sensor networks. ICOIN 2012: 497-500 - 2011
- [c3]Nam-Uk Kim, Sung-Min Jung, Tai-Myoung Chung:
An Efficient Hash-Based Load Balancing Scheme to Support Parallel NIDS. ICCSA (1) 2011: 537-549 - 2010
- [j7]NamUk Kim, Hyunsu Lim, Hong-Shik Park, Minho Kang:
Detection of Multicast Video Flooding Attack using the Pattern of Bandwidth Provisioning Efficiency. IEEE Commun. Lett. 14(12): 1170-1172 (2010)
2000 – 2009
- 2008
- [j6]Yonggyu Lee, NamUk Kim, Minho Kang:
Service differentiation scheme in OBS networks. Photonic Netw. Commun. 15(1): 67-75 (2008) - [j5]NamUk Kim, Tae-Yeon Kim, SeungJin Lee, Minho Kang:
Coordination of wavelength and time-window assignment in WDM-based TDM hybrid-PONs. Photonic Netw. Commun. 16(2): 139-147 (2008) - 2007
- [j4]NamUk Kim, HyunHo Yun, Tae-Yeon Kim, Jeong-Ju Yoo, Byong-Whi Kim, Minho Kang:
Share Based-Channel Scheduling Algorithm for Multicast Video Delivery in WDM Optical Access Networks. IEICE Trans. Commun. 90-B(3): 499-507 (2007) - [j3]Tae-Yeon Kim, NamUk Kim, Sang-Ho Lee, Jeong-Ju Yoo, Byong-Whi Kim:
Design and Analysis of Scalable WDM-Based Ethernet Hybrid-PON Architecture. IEICE Trans. Commun. 90-B(5): 1032-1041 (2007) - [j2]Nam-Uk Kim, HyunHo Yun, Minho Kang:
Analysis of effect of load-based excess bandwidth reservation on performances of differentiated services in E-PON. IET Commun. 1(3): 382-390 (2007) - 2005
- [j1]NamUk Kim, Minho Kang:
Priority-Based Optimized Bandwidth Reservation for Efficient Differentiated Services in Ethernet-Pon. IEICE Trans. Commun. 88-B(10): 3962-3970 (2005) - 2004
- [c2]NamUk Kim, HyunHo Yun, Yonggyu Lee, Minho Kang:
A QoS Based Service Reservation: Supporting Multiple Service in Optical Access Networks. ECUMN 2004: 81-90 - [c1]NamUk Kim, HyunHo Yun, Minho Kang:
A Fair Service Work Scheduling Approach for Differentiated Services in Optical Access Networks. NETWORKING 2004: 1372-1377
Coauthor Index
aka: Tai-Myoung Chung
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:48 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint