default search action
Dong Chun Lee
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2019
- [j8]Dong Chun Lee, Do Hyeon Lee:
Novel routing protocol scheme for real-time applications in mobile Ad Hoc networks. Clust. Comput. 22(Suppl 1): 977-988 (2019) - 2017
- [j7]Soonju Park, Dong Chun Lee, Youngmi Kwon:
Improved protocols for spreading vehicle emergency messages in mobile ad hoc networks. Clust. Comput. 20(1): 731-739 (2017) - [j6]Dong Chun Lee, Kuinam J. Kim, Jong Chan Lee:
Location and Direction Estimation-Based Resource Reservation Scheme for the Handoff in Micro Cellular Multimedia Networks. Wirel. Pers. Commun. 94(2): 187-208 (2017) - [j5]Kuinam J. Kim, Dong Chun Lee:
Secure Route Optimization Scheme for Network Mobility Support in Heterogeneous Mobile Networks. Wirel. Pers. Commun. 94(3): 331-349 (2017) - [j4]Dong Chun Lee, Kuinam J. Kim:
Improved Authentication of Binding Update Protocol in Mobile IPv6 Networks. Wirel. Pers. Commun. 94(3): 351-367 (2017) - 2014
- [c41]Dong Chun Lee, Kuinam J. Kim:
Improved Authentication Scheme of Binding Update Protocol in Mobile IPv6 Networks. ICITCS 2014: 1-4
2000 – 2009
- 2009
- [j3]Dong Chun Lee, Jongchan Lee:
Handover Control Method Using Resource Reservation in Mobile Multimedia Networks. IEICE Trans. Commun. 92-B(8): 2684-2697 (2009) - 2008
- [j2]Dong Chun Lee:
Analytic Model of BEB Algorithm With Multiple Priorities in Mobile Information Systems. Comput. Informatics 27(6): 875-890 (2008) - 2007
- [p1]Dong Chun Lee, Keun-Wang Lee:
Design and Implementation of Multi-Agents for Learner-oriented Course Scheduling on the Internet. E-Service Intelligence 2007: 601-626 - 2006
- [c40]Dong Chun Lee:
Analytic Model of the Collision Resolution Protocol with Voice/Data in Mobile Networks. EUC Workshops 2006: 953-961 - [c39]Jung Doo Koo, Jungsook Koo, Dong Chun Lee:
A New Authentication Scheme of Binding Update Protocol on Handover in Mobile IPv6 Networks. EUC Workshops 2006: 972-978 - [c38]Dong Chun Lee:
Mobility Management for INS in 3G Mobile Networks. ICCSA (2) 2006: 1017-1024 - [c37]Si Choon Noh, Eun Jee Song, Dong Chun Lee:
Protection Structure Building for Malicious Traffic Protecting in Intranet Systems. ICCSA (2) 2006: 1051-1059 - [c36]Hong-Jin Kim, Sok-Pal Cho, Dong Chun Lee:
Hybrid Queuing Scheme to Reduce Call Blocking in Multimedia Mobile Networks. ICCSA (2) 2006: 1082-1089 - [c35]Dong Chun Lee:
Analysis of Security Vulnerability Diagnosis in Mobile IP Networks. ISPA Workshops 2006: 949-954 - [c34]Jung Doo Koo, Jungsook Koo, Dong Chun Lee:
Secure Authentication Protocol in Mobile IPv6 Networks. KES (3) 2006: 548-555 - [e1]Xiaobo Zhou, Oleg Sokolsky, Lu Yan, Eun-Sun Jung, Zili Shao, Yi Mu, Dong Chun Lee, Daeyoung Kim, Young-Sik Jeong, Cheng-Zhong Xu:
Emerging Directions in Embedded and Ubiquitous Computing, EUC 2006 Workshops: NCUS, SecUbiq, USN, TRUST, ESO, and MSA, Seoul, Korea, August 1-4, 2006, Proceedings. Lecture Notes in Computer Science 4097, Springer 2006, ISBN 3-540-36850-7 [contents] - 2005
- [j1]Dong Chun Lee, Hong-Jin Kim, Jongchan Lee, Yi-Bing Lin:
Performance Analysis of the Distributed Location Management Scheme in Large Mobile Networks. J. Inf. Process. Syst. 1(1): 55-61 (2005) - [c33]Dong Chun Lee:
Call Tracking Management Using Caching Scheme in IMT-2000 Networks. HPCC 2005: 1077-1086 - [c32]Sun Hur, Jeong Kee Kim, Dong Chun Lee:
Delay of the Slotted ALOHA Protocol with Binary Exponential Backoff Algorithm. ICCSA (2) 2005: 714-722 - [c31]Dong Chun Lee, Hyo Young Shin, Joung Chul Ahn, Jae-Young Koh:
Improved Authentication Scheme in W-CDMA Networks. ICCSA (2) 2005: 741-748 - [c30]Sang-Young Lee, Yung-Hyeon Lee, Jeom Goo Kim, Dong Chun Lee:
Workflow System Modeling in the Mobile Healthcare B2B Using Semantic Information. ICCSA (2) 2005: 762-770 - [c29]Jin Ah Yoo, In Seon Choi, Dong Chun Lee:
Prefetching Scheme Considering Mobile User's Preference in Mobile Networks. ICCSA (2) 2005: 889-895 - [c28]Byoung-Muk Min, Sok-Pal Cho, Hong-Jin Kim, Dong Chun Lee:
System Development of Security Vulnerability Diagnosis in Wireless Internet Networks. ICCSA (2) 2005: 896-903 - [c27]Kyung-Sang Sung, Dong Chun Lee, Hyun-Chul Kim, Hae-Seok Oh:
Home Network Observation System Using User's Activate Pattern and Multimedia Streaming. KES (3) 2005: 74-80 - [c26]Dong Chun Lee:
Efficient Migration Scheme Using Backward Recovery Algorithm for Mobile Agents in WLAN. KES (3) 2005: 101-106 - [c25]Dong Chun Lee:
Static Registration Grouping Scheme to Reduce HLR Traffic Cost in Mobile Networks. MSN 2005: 1065-1072 - [c24]Si Choon Noh, Jeom Gu Kim, Dong Chun Lee:
Assurance Method of High Availability in Information Security Infrastructure System. MSN 2005: 1110-1116 - [c23]Jin Ah Yoo, Dong Chun Lee:
Fuzzy-Based Prefetching Scheme for Effective Information Support in Mobile Networks. MSN 2005: 1117-1124 - 2004
- [c22]Dong Chun Lee, Hongjin Kim, Il-Sun Hwang:
Improved Location Scheme Using Circle Location Register in Mobile Networks. International Conference on Computational Science 2004: 594-597 - [c21]Si Choon Noh, Dong Chun Lee, Kuinam J. Kim:
Multi-level Protection Building for Virus Protection Infrastructure. International Conference on Computational Science 2004: 631-634 - [c20]Tai-Hoon Kim, Dong Chun Lee:
Reduction Method of Threat Phrases by Classifying Assets. ICCSA (1) 2004: 1052-1059 - [c19]Dong Chun Lee:
Call Tracking and Location Updating Using DHS in Mobile Networks. ICCSA (1) 2004: 1097-1104 - [c18]Dong Chun Lee, Gwang-Hyun Kim, Seung-Jae Yoo:
Mobility Grouping Scheme to Reduce HLR Traffic in IMT-2000 Networks. KES 2004: 110-115 - [c17]Jongchan Lee, Seung-Jae Yoo, Dong Chun Lee:
Fuzzy Logic Adaptive Mobile Location Estimation. NPC 2004: 626-634 - [c16]Dong Chun Lee, Hong-Jin Kim, Jae-Young Koh:
Enhanced Algorithm of TCP Performance on Handover in Wireless Internet Networks. NPC 2004: 684-690 - 2003
- [c15]Tai-Hoon Kim, Byung-Gyu No, Dong Chun Lee:
Threat Description for the PP by Using the Concept of the Assets Protected by TOE. International Conference on Computational Science 2003: 605-614 - [c14]Won Shik Na, Dong Chun Lee, In Tai Ryoo:
Efficient Queuing Management Scheme with Image/Voice/Data Calls for Reducing Blocking Rate in Multimedia Mobile Networks. ICCSA (2) 2003: 11-20 - [c13]Dong Chun Lee, Jeom Goo Kim, Kuinam J. Kim:
Mobility Management Scheme for Reducing Location Traffic Cost in IMT-2000 Networks. ICCSA (2) 2003: 50-59 - [c12]Shin Hwan Cho, Hong-Jin Kim, Dong Chun Lee:
Web-Based Object-Oriented Modeling on Internet. ICCSA (2) 2003: 60-69 - [c11]Si Choon Noh, Dong Chun Lee, Kuinam J. Kim:
Improved Structure Management of Gateway Firewall Systems for Effective Networks Security. ISCIS 2003: 1076-1083 - [c10]Dong Chun Lee, Gi-sung Lee, Chiwon Kang, Joong Kyu Park:
New CX Searching Algorithm for Handoff Control in Wireless ATM Networks. ISCIS 2003: 1090-1097 - 2002
- [c9]Dong Chun Lee, Hyun Cheul Shin, Jeom Goo Kim:
New Location Management for Reducing HLR Overhead Traffic in Mobile Networks. OTM 2002: 529-530 - [c8]Dong Chun Lee:
Location Management Using Multicasting HLR in Mobile Networks. EurAsia-ICT 2002: 358-365 - [c7]Dong Chun Lee, Il-Sun Hwang, Robert Young Chul Kim:
Hybrid Queuing Strategy to Reduce Call Blocking in Multimedia Wireless Networks. EurAsia-ICT 2002: 615-623 - [c6]Dong Chun Lee, Sung-Kook Han, Youngsong Mun:
Performance Modeling of Location Management Using Multicasting HLR with Forward Pointer in Mobile Networks. International Conference on Computational Science (3) 2002: 1118-1127 - 2001
- [c5]Dong Chun Lee, Jeom Goo Kim:
Adaptive Migration Strategy for Mobile Agents on Internet. TES 2001: 201-212 - 2000
- [c4]Dong Chun Lee, Jeom Goo Kim, JooSeok Song:
Performance of Location Caching Scheme to Support Call Locality in Wireless Networks. ASIAN 2000: 43-57 - [c3]Dong Chun Lee, Sung Y. Shin:
Radiance simulation of multispectral remote sensor data for water resource applications. CATA 2000: 400-403 - [c2]Dong Chun Lee, Jay H. Kwon, Keehwan Hong, Sung Y. Shin:
A conceptual framework for GIS-based vehicle monitoring system. CATA 2000: 404-407
1990 – 1999
- 1998
- [c1]Dong Chun Lee, SeungJoon Park, JooSeok Song:
Performance analysis of queueing strategies with multiple priorities in multimedia PCS. CATA 1998: 93-97
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:57 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint