default search action
Jinpyo Hong
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2018
- [c27]Jinpyo Hong, Il Im:
Captive Targeting: A Field Study on Mobile Transit Advertising. ICIS 2018 - 2017
- [c26]Jinpyo Hong, Jaewon Lee:
The Role of Consumption-based Analytics in Digital Publishing Markets: Implications for the Creative Digital Economy. ICIS 2017 - 2016
- [c25]Hyunji So, Jinpyo Hong, Sang Pil Han, Wonseok Oh:
Conflict between Two Selves: Mobile Temptation and Self-Control through Precommitment. ICIS 2016 - 2015
- [c24]Sang Pil Han, Jinpyo Hong, Jae Yun Moon, Wonseok Oh:
The Economics of All-You-Can-Read Pricing: Tariff Choice, Contract Renewal, and Switching for E-Book Purchases. ICIS 2015 - 2014
- [c23]Dooyeol Yun, Kwangsue Chung, Jinpyo Hong:
Efficient Bandwidth Estimation for HTTP adaptive streaming. ICOIN 2014: 464-468 - 2013
- [j4]Jinpyo Hong, Hwangnam Kim:
A Dual Mobility Model with User Profiling: Decoupling User Mobile Patterns from Association Patterns. Comput. J. 56(6): 771-784 (2013) - [c22]Tuan LeAnh, Nguyen Van Mui, Cuong T. Do, Choong Seon Hong, Sungwon Lee, Jinpyo Hong:
Optimal network selection coordination in heterogeneous Cognitive Radio Networks. ICOIN 2013: 163-168 - [c21]Dooyeol Yoon, Sungchang Lee, Jinpyo Hong, Kwangsue Chung:
Weighted bandwidth sharing scheme to guarantee the video quality in home networks. ICOIN 2013: 423-427 - 2012
- [c20]Duc Ngoc Minh Dang, Nguyen Tran Quang, Choong Seon Hong, Jinpyo Hong:
An enhanced multi-channel MAC protocol for wireless ad hoc networks. APNOMS 2012: 1-4 - [c19]Cuong T. Do, Choong Seon Hong, Jinpyo Hong:
Pricing control for hybrid overlay/underlay spectrum access in Cognitive Radio networks. APNOMS 2012: 1-6 - [c18]Sunghee Lee, Seoung-Jun Oh, Jinpyo Hong, Kwangsue Chung:
Adaptive rate control scheme to improve QoS of multimedia streaming application. ICOIN 2012: 76-80 - 2011
- [j3]Jinpyo Hong, Hwangnam Kim:
An empirical framework for user mobility models: Refining and modeling user registration patterns. J. Comput. Syst. Sci. 77(5): 869-883 (2011) - [c17]Dongchil Kim, Jahon Koo, Jinpyo Hong, Seoung-Jun Oh, Kwangsue Chung:
A Priority-based Differentiated Streaming scheme to guarantee the media quality in mobile WiMAX. ICOIN 2011: 463-467
2000 – 2009
- 2009
- [j2]Shinuk Woo, Jinpyo Hong, Hwangnam Kim:
Modeling and Simulation Framework for Assessing Interference in Multi-Hop Wireless Ad Hoc Networks. KSII Trans. Internet Inf. Syst. 3(1): 26-51 (2009) - [c16]Jinpyo Hong, Hwangnam Kim:
Refining Elusive User Registration Patterns for Empirical Mobility Models. ICCCN 2009: 1-6 - [c15]Mustafizur Rahman, Dae Sun Kim, Choong Seon Hong, Sunyoung Han, Jinpyo Hong:
A routing protocol for multi-rate wireless ad-hoc networks: Cross layer approach. ICOIN 2009: 1-5 - 2008
- [c14]Jinpyo Hong, J. Ramanujam:
Address Register Allocation in Digital Signal Processors. ICESS 2008: 331-337 - [c13]Jinpyo Hong, J. Ramanujam:
Scheduling DAGs for Fixed-point DSP Processors by Using Worm Partitions. ICESS 2008: 567-574 - 2007
- [c12]Jinpyo Hong, J. Ramanujam:
Memory Offset Assignment for DSPs. ICESS 2007: 80-87 - [c11]Jin Sub Ahn, Ilwoo Paik, Baek Dong Seong, Jinpyo Hong, Sunyoung Han, Wonjun Lee:
A Reliable Multicast Transport Protocol for Communicating Real-Time Distributed Objects. ICOIN 2007: 801-810 - [c10]Sai Pinnepalli, Jinpyo Hong, J. Ramanujam, Doris L. Carver:
Code Size Optimization for Embedded Processors using Commutative Transformations. RTCSA 2007: 409-416 - 2006
- [j1]J. Ramanujam, Jinpyo Hong, Mahmut T. Kandemir, Amit Narayan, Ankush Agarwal:
Estimating and reducing the memory requirements of signal processing codes for embedded systems. IEEE Trans. Signal Process. 54(1): 286-294 (2006) - [c9]Min Kyu Han, Ilwoo Paik, Byung Hee Lee, Jinpyo Hong:
A Framework for Seamless Information Retrieval between an EPC Network and a Mobile RFID Network. CIT 2006: 98 - [c8]Hoyoung Lee, Sunyoung Han, Jinpyo Hong:
Efficient Mechanism for Source Mobility in Source Specific Multicast. ICOIN 2006: 82-91 - [c7]Bok-Nyong Park, Wonjun Lee, Choonhwa Lee, Jinpyo Hong, Joonmo Kim:
LAID: Load-Adaptive Internet Gateway Discovery for Ubiquitous Wireless Internet Access Networks. ICOIN 2006: 349-358 - 2005
- [c6]Jungwook Song, Sunyoung Han, Bok-Gyu Joo, Jinpyo Hong:
Route Optimization in Nested Mobile Network Using Direct Tunneling Method. ICOIN 2005: 894-903 - 2004
- [c5]Kiyong Park, Sunyoung Han, Bok-Gyu Joo, Keecheon Kim, Jinpyo Hong:
Route Optimization Technique to Support Multicast in Mobile Networks. International Conference on Computational Science 2004: 1185-1192 - [c4]Sungjune Hong, Sunyoung Han, Keecheon Kim, Jinpyo Hong, Kwanho Song:
Personal Service on Application Level Active Network for Ubiquitous Computing Environments. ICOIN 2004: 83-92 - 2002
- [c3]J. Ramanujam, Sandeep Deshpande, Jinpyo Hong, Mahmut T. Kandemir:
A Heuristic for Clock Selection in High-Level Synthesis. ASP-DAC/VLSI Design 2002: 414-419 - [c2]J. Ramanujam, Satish Krishnamurthy, Jinpyo Hong, Mahmut T. Kandemir:
Address Code and Arithmetic Optimizations for Embedded Systems. ASP-DAC/VLSI Design 2002: 619-624 - 2001
- [c1]J. Ramanujam, Jinpyo Hong, Mahmut T. Kandemir, Amit Narayan:
Reducing Memory Requirements of Nested Loops for Embedded Systems. DAC 2001: 359-364
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:51 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint