default search action
Hae-Duck Joshua Jeong
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [c19]Kyungmin Lee, Mincheol Shin, Yongho Kim, Hae-Duck J. Jeong:
An Intelligent Travel Application Using CNN-Based Deep Learning Technologies. IMIS 2021: 221-231 - 2020
- [c18]Jiha Kim, Hyewon Kim, WooSeok Hyun, Hae-Duck J. Jeong:
An Accounting Ledger System Using the Hyperledger Fabric-Based Blockchain. IMIS 2020: 65-72
2010 – 2019
- 2017
- [j13]Hae-Duck J. Jeong, WonHwi Ahn, Hyeonggeun Kim, Jong-Suk Ruth Lee:
Anomalous Traffic Detection and Self-Similarity Analysis in the Environment of ATMSim. Cryptogr. 1(3): 24 (2017) - [j12]Hae-Duck J. Jeong, Myeong-Un Ryu, Min-Jun Ji, You-Been Cho, Sang-Kug Ye, Jong-Suk Ruth Lee:
ATMSim: a Hadoop and self-similarity-based simulator for collecting, detecting, measuring and analysing anomalous traffic. Int. J. Web Grid Serv. 13(3): 334-350 (2017) - [c17]Hae-Duck J. Jeong, Gil-Seong Jeong, Won-Jung Kim, Jinwon Kim, Hanbin Song, Myeong-Un Ryu, Jongsuk R. Lee:
A Search for Computationally Efficient Supervised Learning Algorithms of Anomalous Traffic. IMIS 2017: 590-600 - 2016
- [c16]Hae-Duck Joshua Jeong, Hyeonggeun Kim, WonHwi Ahn, Jung-Hee Oh, Dawoon Lee, Sang-Kug Ye, Jongsuk Ruth Lee:
Analysis and Detection of Anomalous Network Traffic. IMIS 2016: 403-408 - 2015
- [j11]Hae-Duck Joshua Jeong, Woojin Lee, Jiyoung Lim, WooSeok Hyun:
Utilizing a Bluetooth remote lock system for a smartphone. Pervasive Mob. Comput. 24: 150-165 (2015) - [c15]Yongwoo Kwon, Inhyeok Jeon, WooSeok Hyun, Jiyoung Lim, Ilsun You, Hae-Duck Joshua Jeong:
An Enhanced Java-Based Mobile Device Theft Response System. IMIS 2015: 41-46 - 2014
- [j10]Hae-Duck Joshua Jeong, Sang-Kug Ye, Jiyoung Lim, Ilsun You, WooSeok Hyun:
A computer remote control system based on speech recognition technologies of mobile devices and wireless communication technologies. Comput. Sci. Inf. Syst. 11(3): 1001-1016 (2014) - [j9]Jongsuk Ruth Lee, Sang-Kug Ye, Hae-Duck Joshua Jeong:
ATMSim: An anomaly teletraffic detection measurement analysis simulator. Simul. Model. Pract. Theory 49: 98-109 (2014) - [c14]Hae-Duck Joshua Jeong, Jiyoung Lim, WooSeok Hyun, Woojin Lee:
A Remote Lock System Using Bluetooth Communication. IMIS 2014: 441-446 - 2013
- [j8]Hae-Duck Joshua Jeong, Jiyoung Lim, WooSeok Hyun, Arisu An:
A real-time location-based SNS smartphone application for the disabled population. Comput. Sci. Inf. Syst. 10(2): 747-765 (2013) - [j7]Jong-Hyouk Lee, Hae-Duck Joshua Jeong, Roksana Boreli, Krzysztof Pawlikowski:
Performance Modeling and Simulation for Future Mobile Networks. Math. Comput. Model. 57(11-12): 2718-2719 (2013) - [c13]Hae-Duck Joshua Jeong, Sang-Kug Ye, Jiyoung Lim, Ilsun You, WooSeok Hyun, Hee-Kyoung Song:
A Remote Computer Control System Using Speech Recognition Technologies of Mobile Devices. IMIS 2013: 595-600 - [c12]Jongsuk Ruth Lee, Sang-Kug Ye, Hae-Duck Joshua Jeong:
Detecting Anomaly Teletraffic Using Stochastic Self-Similarity Based on Hadoop. NBiS 2013: 282-287 - 2012
- [j6]Jongsuk Ruth Lee, Don McNickle, Krzysztof Pawlikowski, Hae-Duck Joshua Jeong:
Self-similar properties of malicious teletraffic. Comput. Syst. Sci. Eng. 27(6) (2012) - [c11]Arisu An, Hae-Duck Joshua Jeong, Jiyoung Lim, WooSeok Hyun:
Design and Implementation of Location-Based SNS Smartphone Application for the Disabled Population. IMIS 2012: 365-370 - [c10]Hae-Duck Joshua Jeong, WooSeok Hyun, Jiyoung Lim, Ilsun You:
Anomaly Teletraffic Intrusion Detection Systems on Hadoop-Based Platforms: A Survey of Some Problems and Solutions. NBiS 2012: 766-770 - [e1]Ilsun You, Leonard Barolli, Antonio Gentile, Hae-Duck Joshua Jeong, Marek R. Ogiela, Fatos Xhafa:
Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2012, Palermo, Italy, July 4-6, 2012. IEEE Computer Society 2012, ISBN 978-1-4673-1328-5 [contents] - 2011
- [c9]Jong-Suk Ruth Lee, Hae-Duck Joshua Jeong, Donald C. McNickle, Krzysztof Pawlikowski:
Self-Similar Properties of Spam. IMIS 2011: 347-352 - 2010
- [j5]Wen-Tzeng Huang, Chin-Hsing Chen, Hae-Duck Joshua Jeong, C. T. Chen:
A New Adaptive Grey Decision-Energy Aware Management System Based On The Optimal Read Only-Write Buffer Architecture For Flash Memory In Embedded And Mobile Devices. Intell. Autom. Soft Comput. 16(4): 495-506 (2010)
2000 – 2009
- 2009
- [c8]Wen-Tzeng Huang, Hae-Duck Joshua Jeong:
A Novel High-Reliable Platform for Wireless Sensor Networks with Serpentine-Antenna Design. CISIS 2009: 577-583 - 2008
- [c7]Jong-Suk Ruth Lee, Hae-Duck Joshua Jeong:
Quality improvement of sequential steady-state simulations for telecommunication networks. ACSAC 2008: 1-8 - 2007
- [j4]Hae-Duck Joshua Jeong, Jong-Suk Ruth Lee, Donald C. McNickle, Krzysztof Pawlikowski:
Suggestions of efficient self-similar generators. Simul. Model. Pract. Theory 15(3): 328-353 (2007) - [j3]Hae-Duck Joshua Jeong, Jong-Suk Ruth Lee, Donald C. McNickle, Krzysztof Pawlikowski:
Comparison of various estimators in simulated FGN. Simul. Model. Pract. Theory 15(9): 1173-1191 (2007) - [c6]Jong-Suk Ruth Lee, Hae-Duck Joshua Jeong:
Heuristic Rules for Improving the Quality of Simulation Based on the Sequential Non-overlapping Batch Mean. IPC 2007: 105-110 - 2006
- [c5]Hae-Duck Joshua Jeong, Jong-Suk Ruth Lee:
A Study on Transformation of Self-similar Processes with Arbitrary Marginal Distributions. Asia-Pacific Computer Systems Architecture Conference 2006: 137-146 - 2005
- [j2]Hae-Duck Joshua Jeong, Jong-Suk Ruth Lee, Donald C. McNickle, Krzysztof Pawlikowski:
Distributed steady-state simulation of telecommunication networks with self-similar teletraffic. Simul. Model. Pract. Theory 13(3): 233-256 (2005) - [c4]Jong-Suk Ruth Lee, Hae-Duck Joshua Jeong:
Practical Modelling for Generating Self-similar VBR Video Traffic. International Conference on Computational Science (1) 2005: 655-663 - 2004
- [c3]Hae-Duck Joshua Jeong, Jong-Suk Ruth Lee, Hyoung-Woo Park:
Teletraffic Generation of Self-Similar Processes with Arbitrary Marginal Distributions for Simulation: Analysis of Hurst Parameters. ICCSA (3) 2004: 827-836 - [c2]Jong-Suk Ruth Lee, Hyoung-Woo Park, Hae-Duck Joshua Jeong:
Impact of self-similar input processes in the initial transient period in communication networks. Parallel and Distributed Computing and Networks 2004: 276-281 - 2002
- [j1]Krzysztof Pawlikowski, Hae-Duck Joshua Jeong, Jong-Suk Ruth Lee:
On credibility of simulation studies of telecommunication networks. IEEE Commun. Mag. 40(1): 132-139 (2002)
1990 – 1999
- 1999
- [c1]Hae-Duck Joshua Jeong, Donald C. McNickle, Krzysztof Pawlikowski:
Fast self-similar teletraffic generation based on FGN and wavelets. ICON 1999: 75-82
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-10 01:14 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint