default search action
Byeong-Hee Roh
Person information
- affiliation: Ajou University
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j40]Seungwoon Lee, Sijung Kim, Byeong-Hee Roh:
Mixed Reality Virtual Device (MRVD) for seamless MR-IoT-Digital Twin convergence. Internet Things 26: 101155 (2024) - [j39]Maira Khalid, Jehad Ali, Byeong-Hee Roh:
Artificial Intelligence and Machine Learning Technologies for Integration of Terrestrial in Non-Terrestrial Networks. IEEE Internet Things Mag. 7(1): 28-33 (2024) - [j38]Jisi Chandroth, Byeong-Hee Roh, Jehad Ali:
Reliable paths prediction with intelligent data plane monitoring enabled reinforcement learning in SD-IoT. J. King Saud Univ. Comput. Inf. Sci. 36(3): 102006 (2024) - [c67]Chunjiong Zhang, Byeong-Hee Roh, Gaoyang Shan:
Federated Anomaly Detection. DSN-S 2024: 148-149 - [c66]Haichuan Chen, Gaoyang Shan, Byeong-Hee Roh, Sj Kim, Junghyun Lim, Geunkyung Choi:
Visual Landmark Map-Based Spatial Recognition Using a Monocular Camera. ICCE 2024: 1-4 - [c65]Zhen Shen, Qingyang Zhang, Byeong-Hee Roh, Jie Song, Xiaoqing Wen:
CQCTL: A Cost-Optimized and Quadruple-Node-Upset Completely Tolerant Latch Design for Safety-Critical Applications. ITC-Asia 2024: 1-6 - [c64]Yunhwan Jeong, Junghyun Lim, Geunkyung Choi, Byeong-Hee Roh:
Deep Deterministic Policy Gradient-Based Load Balancing Method in SDN Environments. SmartNets 2024: 1-6 - 2023
- [j37]Muhammad Yasir Khan, Muhammad Adnan, Jawaid Iqbal, Noor Ul Amin, Byeong-Hee Roh, Jehad Ali:
A Hierarchal Clustered Based Proactive Caching in NDN-Based Vehicular Network. Comput. Syst. Sci. Eng. 47(1): 1185-1208 (2023) - [j36]Jehad Ali, Gaoyang Shan, Noor Gul, Byeong-Hee Roh:
An Intelligent Blockchain-based Secure Link Failure Recovery Framework for Software-defined Internet-of-Things. J. Grid Comput. 21(4): 57 (2023) - [j35]Jehad Ali, Rutvij H. Jhaveri, Mohannad A. Alswailim, Byeong-Hee Roh:
ESCALB: An effective slave controller allocation-based load balancing scheme for multi-domain SDN-enabled-IoT networks. J. King Saud Univ. Comput. Inf. Sci. 35(6): 101566 (2023) - [c63]Chunjiong Zhang, Byeong-Hee Roh, Gaoyang Shan:
Poster: Dynamic Clustered Federated Framework for Multi-domain Network Anomaly Detection. CoNEXT (Companion) 2023: 71-72 - [c62]Byeong-Hee Roh, Geunkyung Choi, Seungwoon Lee, Si Jung Kim, Jinsuk Kang:
Mixed Reality-Enabled Multilateral Collaboration Application Platform with AI and IoT Convergence. ICCE 2023: 1-4 - [c61]Gaoyang Shan, Geunkyung Choi, Byeong-Hee Roh:
Bluetooth Low Energy-based Adaptive Scheme for IoT Services. ICUFN 2023: 573-575 - 2022
- [j34]Gaoyang Shan, Byeong-Hee Roh:
Maximized Effective Transmission Rate Model for Advanced Neighbor Discovery Process in Bluetooth Low Energy 5.0. IEEE Internet Things J. 9(17): 16272-16283 (2022) - [j33]Jehad Ali, Byeong-Hee Roh, Zamil S. Alzamil:
E2E Service Class Mapping in Heterogeneous IOUT: SDN-Based Architecture. IEEE Internet Things Mag. 5(4): 48-52 (2022) - [j32]Gaoyang Shan, Byeong-Hee Roh:
A slotted random request scheme for connectionless data transmission in bluetooth low energy 5.0. J. Netw. Comput. Appl. 207: 103493 (2022) - [j31]Jehad Ali, Byeong-Hee Roh:
An Effective Approach for Controller Placement in Software-Defined Internet-of-Things (SD-IoT). Sensors 22(8): 2992 (2022) - [j30]Jehad Ali, Byeong-Hee Roh:
A Novel Scheme for Controller Selection in Software-Defined Internet-of-Things (SD-IoT). Sensors 22(9): 3591 (2022) - [c60]Jehad Ali, Muhammad Adnan, Thippa Reddy Gadekallu, Rutvij H. Jhaveri, Byeong-Hee Roh:
A QoS-Aware Software Defined Mobility Architecture for Named Data Networking. GLOBECOM (Workshops) 2022: 444-449 - [c59]Seungwoon Lee, Byeong-Hee Roh, Si Jung Kim:
The Convergence System of an IoT Standard Service Platform and an Autonomous Drone. ICCE 2022: 1-3 - [c58]Jisi Chandroth, Byeong-Hee Roh, Jehad Ali:
Performance Analysis of Python Based SDN Controllers over Real Internet Topology. ICUFN 2022: 283-288 - [c57]Dae-ha Yoo, Gaoyang Shan, Byeong-Hee Roh:
A vision-based indoor positioning systems utilizing computer aided design drawing. MobiCom 2022: 880-882 - 2021
- [j29]Hyun Jae Park, Cheol-woong Lee, Taeyoung Shin, Byeong-Hee Roh, Soo Bum Park, Jungwook Choi:
Implementation of Embedded Testbeds Using USRP and GNU-Radio for Performance Measurement and Analysis of PPS and PCO-Based Time Synchronizations. Int. J. Interdiscip. Telecommun. Netw. 13(1): 25-35 (2021) - [j28]Cheol-Woong Lee, Gyu-Min Lee, Byeong-Hee Roh:
Adaptive Strategy to Change Firing Phases of Collided Nodes in Extended-Desync TDMA-Based MANETs. Sensors 21(20): 6776 (2021) - [c56]Jehad Ali, Byeong-Hee Roh:
An Efficient Approach for Load balancing in Software-Defined Networks. ICCCS 2021: 1-6 - [c55]Gyu-min Lee, Cheol-woong Lee, Byeong-Hee Roh:
Riverbed Modeler Reinforcement Learning M&S Framework Supported by Supervised Learning. ICOIN 2021: 824-827 - [i1]Khalil Khan, Jehad Ali, Irfan Uddin, Sahib Khan, Byeong-Hee Roh:
A Facial Feature Discovery Framework for Race Classification Using Deep Learning. CoRR abs/2104.02471 (2021) - 2020
- [j27]Jehad Ali, Byeong-Hee Roh:
An Effective Hierarchical Control Plane for Software-Defined Networks Leveraging TOPSIS for End-to-End QoS Class-Mapping. IEEE Access 8: 88990-89006 (2020) - [j26]Muhammad Adil, Rahim Khan, Jehad Ali, Byeong-Hee Roh, Qui Thanh Hoai Ta, Mohammed Amin Almaiah:
An Energy Proficient Load Balancing Routing Scheme for Wireless Sensor Networks to Maximize Their Lifespan in an Operational Environment. IEEE Access 8: 163209-163224 (2020) - [j25]Sangrez Khan, Ahmad Naseem Alvi, Muhammad Awais Javed, Byeong-Hee Roh, Jehad Ali:
An Efficient Superframe Structure with Optimal Bandwidth Utilization and Reduced Delay for Internet of Things Based Wireless Sensor Networks. Sensors 20(7): 1971 (2020) - [j24]Seungwoon Lee, Si Jung Kim, Jungtae Lee, Byeong-Hee Roh:
Supervised Learning-Based Fast, Stealthy, and Active NAT Device Identification Using Port Response Patterns. Symmetry 12(9): 1444 (2020) - [j23]Gaoyang Shan, Byeong-Hee Roh:
Performance Model for Advanced Neighbor Discovery Process in Bluetooth Low Energy 5.0-Enabled Internet of Things Networks. IEEE Trans. Ind. Electron. 67(12): 10965-10974 (2020) - [c54]Jehad Ali, Byeong-Hee Roh, Byungkyu Lee, Jimyung Oh, Muhammad Adil:
A Machine Learning Framework for Prevention of Software-Defined Networking controller from DDoS Attacks and dimensionality reduction of big data. ICTC 2020: 515-519
2010 – 2019
- 2019
- [c53]Seungwoon Lee, Gyumin Lee, Geunkyoung Choi, Byeong-Hee Roh, Jinsuk Kang:
Integration of OneM2M-based IoT Service Platform and Mixed Reality Device. ICCE 2019: 1-4 - [c52]Seungwoon Lee, Jehad Ali, Byeong-Hee Roh:
Performance Comparison of Software Defined Networking Simulators for Tactical Network: Mininet vs. OPNET. ICNC 2019: 197-202 - [c51]Ratih Hikmah Puspita, Syed Danial Ali Shah, Gyumin Lee, Byeong-Hee Roh, Jimyeong Oh, Sungjin Kang:
Reinforcement Learning Based 5G Enabled Cognitive Radio Networks. ICTC 2019: 555-558 - [c50]Taeyoung Shin, Byeong-Hee Roh:
Component Mapping Method for Indoor Localization System based on Mixed Reality. ICUFN 2019: 379-383 - [c49]Jehad Ali, Seungwoon Lee, Byeong-Hee Roh:
Using the Analytical Network Process for Controller Placement in Software Defined Networks. MobiSys 2019: 545-546 - [c48]Woogeun Kil, Kwangpyo Ko, Seungwoon Lee, Byeong-Hee Roh:
MR and IoT Convergence Platform with AI Support for Disaster Recognition. MobiSys 2019: 614-615 - 2018
- [j22]Gaoyang Shan, Byeong-Hee Roh:
Advertisement Interval to Minimize Discovery Time of Whole BLE Advertisers. IEEE Access 6: 17817-17825 (2018) - [j21]Seungwoon Lee, Seung-Hun Shin, Byeong-Hee Roh:
Classification of Freenet Traffic Flow Based on Machine Learning. J. Commun. 13(Nocember): 654-660 (2018) - [j20]Ikram Syed, Seung-Hun Shin, Byeong-Hee Roh, Muhammad Adnan:
Performance Improvement of QoS-Enabled WLANs Using Adaptive Contention Window Backoff Algorithm. IEEE Syst. J. 12(4): 3260-3270 (2018) - [c47]Cheol-woong Lee, Gyumin Lee, Byeong-Hee Roh:
Adjustment of firing phase changing probability in extended-Desync TDMA. WTS 2018: 1-5 - 2017
- [j19]Hyun Jae Park, Gyumin Lee, Seung-Hun Shin, Byeong-Hee Roh, Ji Myeong Oh:
Implementation of Multi-Hop Cognitive Radio Testbed using Raspberry Pi and USRP. Int. J. Interdiscip. Telecommun. Netw. 9(4): 37-48 (2017) - [j18]Kwangsoo Kim, Seung-Hun Shin, Byeong-Hee Roh:
Firing Offset Adjustment of Bio-Inspired DESYNC-TDMA to Improve Slot Utilization Performances in Wireless Sensor Networks. KSII Trans. Internet Inf. Syst. 11(3): 1492-1509 (2017) - [c46]Gaoyang Shan, Byeong-uk Lee, Seung-Hun Shin, Byeong-Hee Roh:
Design and implementation of simulator for analysis of BLE broadcast signal collision. ICOIN 2017: 448-452 - [c45]Seungwoon Lee, Seung-Hun Shin, Byeong-Hee Roh:
Abnormal Behavior-Based Detection of Shodan and Censys-Like Scanning. ICUFN 2017: 1048-1052 - 2016
- [j17]Bosung Kim, Gyumin Lee, Byeong-Hee Roh:
Adaptive Sensing Period Adjustment Scheme in Cognitive Radio Sensor Networks. Ad Hoc Sens. Wirel. Networks 32(1-2): 99-113 (2016) - [j16]Kwangsoo Kim, Cheol-Woong Lee, Byeong-Hee Roh, Bongsoo Roh, Myoung-hun Han:
Routing Metric based on Slot Length of AODV on Multihop DESYNC-TDMA. EAI Endorsed Trans. Mob. Commun. Appl. 2(9): e2 (2016) - [j15]Bongsoo Roh, Myoung-hun Han, Mijeong Hoh, Hwi-Sung Park, Kwangsoo Kim, Byeong-Hee Roh:
Distributed Call Admission Control for DESYNC-TDMA in Mobile Ad Hoc Networks. EAI Endorsed Trans. Mob. Commun. Appl. 2(9): e3 (2016) - [j14]Ikram Syed, Byeong-Hee Roh:
Adaptive Backoff Algorithm for Contention Window for Dense IEEE 802.11 WLANs. Mob. Inf. Syst. 2016: 8967281:1-8967281:11 (2016) - [c44]Hanbyeol Park, Seung-Hun Shin, Byeong-Hee Roh, Cheolho Lee:
Identification of hosts behind a NAT device utilizing multiple fields of IP and TCP. ICTC 2016: 484-486 - [c43]Seungwoon Lee, Sun-young Im, Seung-Hun Shin, Byeong-Hee Roh, Cheolho Lee:
Implementation and vulnerability test of stealth port scanning attacks using ZMap of censys engine. ICTC 2016: 681-683 - [c42]Sun-young Im, Seung-Hun Shin, Ki-Yeol Ryu, Byeong-Hee Roh:
Performance evaluation of network scanning tools with operation of firewall. ICUFN 2016: 876-881 - [c41]Gaoyang Shan, Sun-young Im, Byeong-Hee Roh:
Optimal AdvInterval for BLE scanning in different number of BLE devices environment. INFOCOM Workshops 2016: 1031-1032 - [c40]Gyumin Lee, Kwangsoo Kim, Byeong-Hee Roh:
A routing control overhead mitigation method for route setup in Cognitive Radio Networks. INFOCOM Workshops 2016: 1041-1042 - [c39]Ikram Syed, Byeong-Hee Roh:
Delay analysis of IEEE 802.11e EDCA with enhanced QoS for delay sensitive applications. IPCCC 2016: 1-4 - [c38]Bosung Kim, Gyumin Lee, Geunkyung Choi, Byeong-Hee Roh:
Effective bandwidth based capacity request for real-time voice in GEO satellite system. MILCOM 2016: 379-384 - [c37]Bongsoo Roh, Myoung-hun Han, Mijeong Hoh, Kwangsoo Kim, Byeong-Hee Roh:
Tactical MANET architecture for Unmanned Autonomous Maneuver Network. MILCOM 2016: 829-834 - [c36]Byeong-uk Lee, Byeong-Hee Roh, Myung Kil Ahn, Yonghyun Kim:
Poster: Worm Propagation Model for Cyber Warfare Modeling and Simulation in Tactical Networks. MobiSys (Companion Volume) 2016: 49 - [c35]Gaoyang Shan, Byeong-Hee Roh:
Poster: Discovery of Disappeared Node in Large Number of BLE Devices Environment. MobiSys (Companion Volume) 2016: 77 - 2015
- [j13]Bosung Kim, Gyumin Lee, Byeong-Hee Roh:
MAC Protocol for Quality-Aware Real-Time Voice Delivery in Cognitive Radio-Enabled WSNs. Int. J. Distributed Sens. Networks 11: 952951:1-952951:10 (2015) - [j12]Bosung Kim, Kwangsoo Kim, Byeong-Hee Roh:
ENC-MAC: Energy-efficient Non-overlapping Channel MAC for Cognitive Radio enabled Sensor Networks. KSII Trans. Internet Inf. Syst. 9(11): 4367-4386 (2015) - [c34]Ikram Syed, Bosung Kim, Byeong-Hee Roh, Il-hyuk Oh:
A novel contention window backoff algorithm for IEEE 802.11 wireless networks. ICIS 2015: 71-75 - [c33]Bongsoo Roh, Myoung-hun Han, Mijeong Hoh, Hwi-Sung Park, Kwangsoo Kim, Byeong-Hee Roh:
Distributed Call Admission Control for DESYNC-TDMA in Mobile Ad Hoc Networks. BICT 2015: 411-413 - [c32]Kwangsoo Kim, Cheol-Woong Lee, Byeong-Hee Roh, Bongsoo Roh, Myoung-hun Han:
Routing Metric based on Slot Length of AODV on Multihop DESYNC-TDMA. BICT 2015: 414-417 - [c31]Mi-hye Lee, Sun-young Im, Byeong-uk Lee, Byeong-Hee Roh, Bo-mi Kim:
Red-signal delay scheme to prevent vehicle accidents at the intersection. ICUFN 2015: 232-236 - [c30]Cheol-Woong Lee, Kwangsoo Kim, Byeong-Hee Roh, Bongsoo Roh, Jeungwon Choi:
SMAT: Simulator Monitoring And Analysis Tool. ICUFN 2015: 482-485 - [c29]Byeong-uk Lee, Sun-young Im, Seungwoon Lee, Bosung Kim, Byeong-Hee Roh, Young-Bae Ko:
The beacon identification using low pass filter for Physical Web based IoT services. PACRIM 2015: 354-358 - [c28]Gaoyang Shan, Byeong-hun Park, Song-hyeon Nam, Bosung Kim, Byeong-Hee Roh, Young-Bae Ko:
A 3-dimensional triangulation scheme to improve the accuracy of indoor localization for IoT services. PACRIM 2015: 359-363 - 2014
- [j11]Sehoon Kwon, Bosung Kim, Byeong-Hee Roh:
Preemptive Opportunistic MAC Protocol in Distributed Cognitive Radio Networks. IEEE Commun. Lett. 18(7): 1155-1158 (2014) - [c27]Kwangsoo Kim, Byeong-Hee Roh, Bongsoo Roh, Jeungwon Choi:
Enhanced DESYNC-TDMA Algorithm for Efficient Packet Delivery in Distributed MANETs. BICT 2014 - [c26]Bongsoo Roh, Dong-Won Kum, Taehyun Kim, Jeungwon Choi, Kwangsoo Kim, Byeong-Hee Roh:
Efficient and Adaptive Resource Allocation Scheme for Self-Organizing DESYNC TDMA Network. BICT 2014 - [c25]Bosung Kim, Gyu-Min Lee, Byeong-Hee Roh:
ASPD: Adaptive Sensing Period Decision for Time-Varying Channel in Military MANETs. MILCOM 2014: 643-648 - 2013
- [j10]Byeong-Hee Roh, Ju Wan Kim, Ki-Yeol Ryu, Jea-Tek Ryu:
A whitelist-based countermeasure scheme using a Bloom filter against SIP flooding attacks. Comput. Secur. 37: 46-61 (2013) - [c24]Kwangsoo Kim, Seungoh Choi, Seongmin Kim, Byeong-Hee Roh:
A push-enabling scheme for live streaming system in content-centric networking. CoNEXT Student Workhop 2013: 49-52 - [c23]Seungoh Choi, Kwangsoo Kim, Seongmin Kim, Byeong-Hee Roh:
Threat of DoS by interest flooding attack in content-centric networking. ICOIN 2013: 315-319 - [c22]Haile B. Weldu, Bosung Kim, Byeong-Hee Roh:
Deterministic approach to rendezvous channel setup in cognitive radio networks. ICOIN 2013: 690-695 - [c21]Eunho Kim, Bosung Kim, Byeong-Hee Roh:
Enhanced Message Concatenation (EMC) Scheme for QoS Provision in Multi-hop Combat Net Radio. MILCOM 2013: 1057-1062 - 2012
- [j9]Jea-Tek Ryu, Byeong-Hee Roh, Ki-Yeol Ryu, Myungchul Yoon:
Detection And Countermeasure Scheme For Call-Disruption Attacks On SIP-Based Voip Services. KSII Trans. Internet Inf. Syst. 6(7): 1854-1873 (2012) - [c20]Yeonju Lee, Kwangsoo Kim, Byeong-Hee Roh:
DDoS Attack by File Request Redirection in Kad P2P Network. CyberC 2012: 497-500 - [c19]Sung-Hyung Lee, Hyun-Jin Lee, Jae-Hyun Kim, Mijeong Hoh, Sang-heon Shin, Taewan Kim, Byeong-Hee Roh:
Active buffer management algorithm for silence suppressed voice applications. MILCOM 2012: 1-4 - [c18]Atif Ismail, Byeong-Hee Roh:
Enhancing MIH for optimum network performance and handovers in heterogeneous networks. SECON 2012: 42-44 - 2010
- [c17]Jin-Suk Kang, Byeong-Hee Roh:
Development of tangible user interface for linking context modeling and 3D map in smartphone. ICUMT 2010: 44-49 - [c16]Jong-kwan Jung, Ki-Yeol Ryu, Byeong-Hee Roh:
Mission-critical packet transfer with explicit path selection in WMN-based tactical networks. WTS 2010: 1-5
2000 – 2009
- 2009
- [j8]Jea-Tek Ryu, Byeong-Hee Roh, Ki-Yeol Ryu:
Detection of SIP Flooding Attacks based on the Upper Bound of the Possible Number of SIP Messages. KSII Trans. Internet Inf. Syst. 3(5): 507-526 (2009) - 2008
- [j7]Wonjoon Choi, Myungchul Yoon, Byeong-Hee Roh:
Backward Channel Protection Based on Randomized Tree-Walking Algorithm and Its Analysis for Securing RFID Tag Information and Privacy. IEICE Trans. Commun. 91-B(1): 172-182 (2008) - [j6]Sun Ho Kim, Byeong-Hee Roh:
Fast Detection of Distributed Global Scale Network Attack Symptoms and Patterns in High-speed Backbone Networks. KSII Trans. Internet Inf. Syst. 2(3): 135-149 (2008) - [c15]Sung-rok Jung, Jeong-hoon Lee, Byeong-Hee Roh:
An Optimized Node-Disjoint Multi-path Routing Protocol for Multimedia Data Transmission over Wireless Sensor Networks. ISPA 2008: 958-963 - [c14]Hyun-Soo Cha, Jea-Tek Ryu, Byeong-Hee Roh, JeongWook Kim, Hyun-Cheol Jeong:
Detection of SIP De-Registration and Call-Disruption Attacks Using a Retransmission Mechanism and a Countermeasure Scheme. SITIS 2008: 650-656 - 2007
- [j5]Myungchul Yoon, Byeong-Hee Roh:
A Novel Low-Power Bus Design for Bus-Invert Coding. IEICE Trans. Electron. 90-C(4): 731-734 (2007) - 2006
- [c13]Wonjoon Choi, Byeong-Hee Roh:
Backward Channel Protection Method for RFID Security Schemes Based on Tree-Walking Algorithms. ICCSA (4) 2006: 279-287 - 2005
- [c12]Yong Hwan Lee, Hee Jung Kim, Byeong-Hee Roh, Seung W. Yoo, Y. C. Oh:
Tree-Based Classification Algorithm for Heterogeneous Unique Item ID Schemes. EUC Workshops 2005: 1078-1087 - [c11]Hyang-tack Lee, Yong-Hyun Jo, Byeong-Hee Roh, Seung W. Yoo:
Energy-Efficient Cluster Reconfiguration with Fair Cluster Formations in Sensor Networks. EUC Workshops 2005: 1118-1127 - [c10]Byeong-Hee Roh, Wonjoon Choi, Myungchul Yoon, Seung W. Yoo:
A Novel Traffic Control Architecture Against Global-Scale Network Attacks in Highspeed Internet Backbone Networks. ICOIN 2005: 853-863 - [c9]Hyang-tack Lee, Dae-hong Son, Byeong-Hee Roh, Seung W. Yoo, Y. C. Oh:
Energy-Saving Cluster Formation Algorithm in Wireless Sensor Networks. MSN 2005: 917-926 - 2004
- [c8]Wonjoon Choi, Byeong-Hee Roh, Seung W. Yoo:
Measures for Detecting Network Attacks at the Aggregate Traffic Level on High-Speed Internet Backbone Links. Security and Management 2004: 173-178 - [c7]Yong-jae Jeon, Byeong-Hee Roh, Seung W. Yoo:
Traffic Characterization of Network Attack Flows on the Internet Backbone Links. International Conference on Internet Computing 2004: 335-338 - [c6]Hyun Soo Kim, Chang Ho Kim, Byeong-Hee Roh, Seung W. Yoo:
SIP Signaling Performance Evaluation for Supporting Mobility in Cellular-IP Integrated Wireless Networks. ICOIN 2004: 231-240 - [c5]Hyun Soo Kim, Chang Ho Kim, Byeong-Hee Roh, Seung W. Yoo:
Handoff Delay Performance Comparisons of IP Mobility Management Schemes Using SIP and MIP. ICT 2004: 997-1006 - [c4]Byeong-Hee Roh, Seung W. Yoo:
A Novel Detection Methodology of Network Attack Symptoms at Aggregate Traffic Level on Highspeed Internet Backbone Links. ICT 2004: 1226-1235 - 2003
- [j4]Jinsoo Kim, Byeong-Hee Roh:
An adaptive multiplexing algorithm of delay-sensitive multiple VBR-coded bit streams. Multim. Syst. 9(1): 68-77 (2003) - [c3]Sang-Chol Shin, Byeong-Hee Roh:
An Empirical Study on Characteristics of Feedback Information for Streaming Real-Time Multimedia in the Internet. International Conference on Internet Computing 2003: 272-277 - 2000
- [j3]Tae-Yong Kim, Byeong-Hee Roh, Jae-kyoon Kim:
An accurate bit-rate control for real-time MPEG video encoder. Signal Process. Image Commun. 15(6): 479-492 (2000) - [j2]Tae-Yong Kim, Byeong-Hee Roh, Jae-kyoon Kim:
Bandwidth renegotiation with traffic smoothing and joint rate control for VBR MPEG video over ATM. IEEE Trans. Circuits Syst. Video Technol. 10(5): 693-703 (2000)
1990 – 1999
- 1999
- [j1]Byeong-Hee Roh, Jae-kyoon Kim:
Starting time selection and scheduling methods for minimum cell loss ratio of superposed VBR MPEG video traffic. IEEE Trans. Circuits Syst. Video Technol. 9(6): 920-928 (1999) - 1998
- [c2]Byeong-Hee Roh, Heejune Ahn, Jae-Kyoon Kim:
Starting time selection method for minimum cell loss ratio of superposed VBR MPEG video traffic in ATM networks. ICC 1998: 573-577 - 1997
- [c1]Byeong-Hee Roh, Jae-kyoon Kim:
An Efficient Traffic Control Framework for VBR MPEG Video Sources in ATM Networks. ICC (1) 1997: 518-522
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 21:25 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint