kichang kim
kichang kim
인하대 정보통신공학과 교수
Verified email at
Cited by
Cited by
Vliw compilation techniques in a superscalar environment
K Ebcioglu, RD Groves, KC Kim, GM Silberman, I Ziv
Proceedings of the ACM SIGPLAN 1994 conference on Programming language …, 1994
Probability-based tile pre-fetching and cache replacement algorithms for web geographical information systems
YK Kang, KC Kim, YS Kim
East European Conference on Advances in Databases and Information Systems …, 2001
Design optimization analysis of body attachment for NVH performance improvements
K Kim, I Choi
SAE Technical Paper, 2003
Adaptation of a neighbor selection markov chain for prefetching tiled web gis data
DH Lee, JS Kim, SD Kim, KC Kim, K Yoo-Sung, J Park
International Conference on Advances in Information Systems, 213-222, 2002
High-performance internet traffic classification using a markov model and kullback-leibler divergence
J Kim, J Hwang, K Kim
Mobile Information Systems 2016, 2016
A resource-efficient ip traceback technique for mobile ad-hoc networks based on time-tagged bloom filter
IY Kim, KC Kim
2008 Third International Conference on Convergence and Hybrid Information …, 2008
Zone-based clustering for intrusion detection architecture in ad-hoc networks
IY Kim, YS Kim, KC Kim
Asia-Pacific Network Operations and Management Symposium, 253-262, 2006
Collaborative design by sharing multiple-level encryption files
KC Kim, SB Yoo
Concurrent Engineering 22 (1), 29-37, 2014
Study of an in-order SMT architecture and grouping schemes
BI Moon, MG Kim, IP Hong, KC Kim, YS Lee
International Journal of Control, Automation, and Systems 1 (3), 339-350, 2003
Two-Stage Ransomware Detection Using Dynamic Analysis and Machine Learning Techniques
J Hwang, J Kim, S Lee, K Kim
Wireless Personal Communications 112 (4), 2597-2609, 2020
Tagged fragment marking scheme with distance-weighted sampling for a fast IP traceback
KC Kim, JS Hwang, BY Kim, SD Kim
Asia-Pacific Web Conference, 442-452, 2003
An analytical study of the mode-coupling effect on the instability of friction induced vibrations to guide design of a squeak test apparatus
GJ Lee, J Kim, K Kim
INTER-NOISE and NOISE-CON Congress and Conference Proceedings 250 (6), 1293-1299, 2015
A Case Study: Application of Analytical and Numerical Techniques to Squeak and Rattle Analysis of a Door Assembly
KC Kim, SW Lee, SG Hong, J Kim, GJ Lee, JM Choi, YJ Kim
SAE Technical Paper, 2015
IP traceback with sparsely-tagged fragment marking scheme under massively multiple attack paths
K Kim, J Kim, J Hwang
Cluster computing 16 (2), 229-239, 2013
Ipbio: Embedding biometric data in ip header for per-packet authentication
DS Lee, KC Kim
International Symposium on Parallel and Distributed Processing and …, 2006
Improved technique of IP address fragmentation strategies for DoS attack traceback
BR Kim, KC Kim
International Computer Science Symposium in Russia, 427-437, 2006
A node split algorithm reducing overlapped index spaces in m-tree index
SH Lim, KI Ku, K Kim, YS Kim
22nd International Conference on Data Engineering Workshops (ICDEW'06), 15-15, 2006
Securing anonymity in P2P network
BR Kim, KC Kim, YS Kim
Proceedings of the 2005 joint conference on Smart objects and ambient …, 2005
Automatic construction of theme melody index from music database for fast content-based retrievals
CH Shin, KI Ku, KC Kim, YS Kim
European Conference on Information Retrieval, 605-612, 2003
A middleware implementation of active rules for odbms
SB Yoo, KC Kim, SK Cha
Proceedings. 6th International Conference on Advanced Systems for Advanced …, 1999
The system can't perform the operation now. Try again later.
Articles 1–20