Manpyo Hong
This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.
Bibliography
2020
Adversarial attack-based security vulnerability verification using deep learning library for multimedia video surveillance.
Multim. Tools Appl., 2020
2017
Proceedings of the Information Security Applications - 18th International Conference, 2017
2015
An interactive pervasive whiteboard based on MVC architecture for ubiquitous collaboration.
Multim. Tools Appl., 2015
Int. J. Commun. Syst., 2015
Proceedings of the 2015 International Conference on Information Networking, 2015
2014
J. Appl. Math., 2014
2013
Go anywhere: user-verifiable authentication over distance-free channel for mobile devices.
Pers. Ubiquitous Comput., 2013
Int. J. Comput. Math., 2013
Polynomial-based key management for secure intra-group and inter-group communication.
Comput. Math. Appl., 2013
Proceedings of the International Conference on Information and Communication Technology Convergence, 2013
2011
Proceedings of the 2nd International Conference on Ambient Systems, 2011
A structural view definition for RDF data.
Comput. Syst. Sci. Eng., 2011
CoRR, 2011
Proceedings of the Advances in Digital Forensics VII - 7th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA, January 31, 2011
2010
Proceedings of the IEEE International Conference on Sensor Networks, 2010
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010
2009
Errata on: Light Weight Majority Voting based Data Accuracy Assurance Scheme for Wireless Sensor Networks using Quadtree Topology.
Intell. Autom. Soft Comput., 2009
Light Weight Majority Voting Based Data Accuracy Assurance Scheme for Wireless Sensor Networks Using Quadtree Topology.
Intell. Autom. Soft Comput., 2009
Proceedings of the Information Security and Privacy, 14th Australasian Conference, 2009
Proceedings of the Ninth IEEE International Conference on Computer and Information Technology, 2009
2008
Proceedings of the Information Security and Cryptology, 2008
2007
Proceedings of the Third International Symposium on Information Assurance and Security, 2007
2006
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2006
Proceedings of the Advanced Data Mining and Applications, Second International Conference, 2006
2005
Proceedings of the Mobility Aware Technologies and Applications, 2005
Proceedings of the Information Networking, 2005
Proceedings of the Distributed Computing and Internet Technology, 2005
Proceedings of the Computer Analysis of Images and Patterns, 11th International Conference, 2005
2004
Proceedings of the Computational Science and Its Applications, 2004
Proceedings of the Computational Science and Its Applications, 2004
A Study on Marking Bit Size for Path Identification Method: Deploying the Pi Filter at the End Host.
Proceedings of the Computational Science and Its Applications, 2004
Proceedings of the Computational Science, 2004
Proceedings of the Computational Science, 2004
Proceedings of the Biologically Inspired Approaches to Advanced Information Technology, 2004
2001
SKETHIC: Secure Kernel Extension against Trojan Horses with Information-Carrying Codes.
Proceedings of the Information Security and Privacy, 6th Australasian Conference, 2001
2000
Multiple Pipelined Hash Joins Using Synchronization of Page Execution Time.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2000
1999
Optimal Transmission Scheduling for All-to-All Broadcast in WDM Optical Passive Star Networks.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 1999
Proceedings of the Parallel and Distributed Processing, 1999
1997
Proceedings of the 1997 International Conference on Parallel and Distributed Systems (ICPADS '97), 1997
1996
A Heuristic Scheduling Algorithm of Imprecise Multiprocessor System with O/l Constraint.
Proceedings of the Third International Workshop on Real-Time Computing Systems Application (RTCSA '96), October 30, 1996
A Real-Time Micro Kernel Implemented on Transputer.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 1996
1995
Proceedings of the 2nd International Workshop on Real-Time Computing Systems and Applications, October 25, 1995