DGIST Library Repository
menu
Home
Library
FAQ
search
BROWSE
Communities & Collections
Researchers
Titles
DGIST Scholar
Browse by Researchers
곽정호(Kwak, Jeongho)
Department
Department of Electrical Engineering and Computer Science
Affiliated Community
Intelligent Computing & Networking Laboratory
Research Interests
클라우드 컴퓨팅; 엣지컴퓨팅; 네트워크 자원관리; 모바일 시스템
Website
https://icnl.dgist.ac.kr/
E-mail
jeongho.kwak
@
dgist.ac.kr
Discover
Infographic
- Co-Author
Daewon Kim
1
Galanopoulos, Apostolos
1
Hoseung Song
1
Jeon, Suhyeon
1
Jeong, Jaehwan
1
Joseph, Jude Vivek
1
이전
다음
- Keyword
Controller area network (CAN), Intrusion detection system (IDS), Transmitter identification, Temperature, Physical layer security, 침임 탐지 시스템, 송신기 식별, 차량의 작동온도, 물리계층 보안
1
In-vehicle Networks (IVNs) , Controller Area Network (CAN), Automotive Ethernet, Latency, Advanced Driver Assistance System (ADAS), Lane Keeping Assistance System (LKAS), Data Compression
1
V2X communication, DSRC, C-V2X, Traffic flow improvement
1
V2X communication, DSRC, C-V2X, V2X application
1
beam activation, user scheduling, power allocation, interference management, Lyapunov optimization
1
satellite communication, mobile satellite service (MSS), land mobile satellite (LMS) channel, Doppler effect, time-varying satellite topology, mega-constellation, inter-satellite link (ISL), optical communication, end-to-end routing
1
- Year
2022
6
2020
4
ACCE
3
2021
2
다음
Co-Author(s)
FusionCharts.
Related Keyword
[{"link":"javascript:doSearch(5G MOBILE COMMUNICATION);","weight":"∞","text":"5G MOBILE COMMUNICATION"},{"link":"javascript:doSearch(5G NETWORKS);","weight":"∞","text":"5G NETWORKS"},{"link":"javascript:doSearch(ADVANCED ENCRYPTION STANDARD (AES));","weight":"∞","text":"ADVANCED ENCRYPTION STANDARD (AES)"},{"link":"javascript:doSearch(AREA-BS ASSOCIATION);","weight":"∞","text":"AREA-BS ASSOCIATION"},{"link":"javascript:doSearch(ARRAY SIGNAL PROCESSING);","weight":"∞","text":"ARRAY SIGNAL PROCESSING"},{"link":"javascript:doSearch(ASSOCIATION);","weight":"∞","text":"ASSOCIATION"},{"link":"javascript:doSearch(BASE STATIONS);","weight":"∞","text":"BASE STATIONS"},{"link":"javascript:doSearch(BEAM ACTIVATION, USER SCHEDULING, POWER ALLOCATION, INTERFERENCE MANAGEMENT, LYAPUNOV OPTIMIZATION);","weight":"∞","text":"BEAM ACTIVATION, USER SCHEDULING, POWER ALLOCATION, INTERFERENCE MANAGEMENT, LYAPUNOV OPTIMIZATION"},{"link":"javascript:doSearch(BEAMFORMING);","weight":"∞","text":"BEAMFORMING"},{"link":"javascript:doSearch(CACHE RENTAL BUDGET);","weight":"∞","text":"CACHE RENTAL BUDGET"},{"link":"javascript:doSearch(CAPACITY);","weight":"∞","text":"CAPACITY"},{"link":"javascript:doSearch(CHANNEL CODING);","weight":"∞","text":"CHANNEL CODING"},{"link":"javascript:doSearch(CIPHER FEEDBACK (CFB) MODE);","weight":"∞","text":"CIPHER FEEDBACK (CFB) MODE"},{"link":"javascript:doSearch(CIPHERS);","weight":"∞","text":"CIPHERS"},{"link":"javascript:doSearch(CLOUD);","weight":"∞","text":"CLOUD"},{"link":"javascript:doSearch(CLOUD COMPUTING);","weight":"∞","text":"CLOUD COMPUTING"},{"link":"javascript:doSearch(CLOUD INFRASTRUCTURES);","weight":"∞","text":"CLOUD INFRASTRUCTURES"},{"link":"javascript:doSearch(COLLABORATION);","weight":"∞","text":"COLLABORATION"},{"link":"javascript:doSearch(COMP);","weight":"∞","text":"COMP"},{"link":"javascript:doSearch(COMPUTATION THEORY);","weight":"∞","text":"COMPUTATION THEORY"},{"link":"javascript:doSearch(COMPUTATIONAL RESOURCES);","weight":"∞","text":"COMPUTATIONAL RESOURCES"},{"link":"javascript:doSearch(COMPUTATIONAL TASK);","weight":"∞","text":"COMPUTATIONAL TASK"},{"link":"javascript:doSearch(COMPUTER ARCHITECTURE);","weight":"∞","text":"COMPUTER ARCHITECTURE"},{"link":"javascript:doSearch(CONTENT DELIVERY);","weight":"∞","text":"CONTENT DELIVERY"},{"link":"javascript:doSearch(CONTROLLER AREA NETWORK (CAN), INTRUSION DETECTION SYSTEM (IDS), TRANSMITTER IDENTIFICATION, TEMPERATURE, PHYSICAL LAYER SECURITY, 침임 탐지 시스템, 송신기 식별, 차량의 작동온도, 물리계층 보안);","weight":"∞","text":"CONTROLLER AREA NETWORK (CAN), INTRUSION DETECTION SYSTEM (IDS), TRANSMITTER IDENTIFICATION, TEMPERATURE, PHYSICAL LAYER SECURITY, 침임 탐지 시스템, 송신기 식별, 차량의 작동온도, 물리계층 보안"},{"link":"javascript:doSearch(DATA ANALYSIS);","weight":"∞","text":"DATA ANALYSIS"},{"link":"javascript:doSearch(DELAY);","weight":"∞","text":"DELAY"},{"link":"javascript:doSearch(DELAYS);","weight":"∞","text":"DELAYS"},{"link":"javascript:doSearch(DOWNLINK);","weight":"∞","text":"DOWNLINK"},{"link":"javascript:doSearch(DYNAMIC COMPUTATIONS);","weight":"∞","text":"DYNAMIC COMPUTATIONS"},{"link":"javascript:doSearch(DYNAMIC RESOURCE);","weight":"∞","text":"DYNAMIC RESOURCE"},{"link":"javascript:doSearch(DYNAMIC SCHEDULING);","weight":"∞","text":"DYNAMIC SCHEDULING"},{"link":"javascript:doSearch(DYNAMIC SERVICE CHAINING);","weight":"∞","text":"DYNAMIC SERVICE CHAINING"},{"link":"javascript:doSearch(EDGE);","weight":"∞","text":"EDGE"},{"link":"javascript:doSearch(EDGE COMPUTING);","weight":"∞","text":"EDGE COMPUTING"},{"link":"javascript:doSearch(ELASTIC CDN);","weight":"∞","text":"ELASTIC CDN"},{"link":"javascript:doSearch(ENCRYPTION);","weight":"∞","text":"ENCRYPTION"},{"link":"javascript:doSearch(ENERGY CONSUMPTION);","weight":"∞","text":"ENERGY CONSUMPTION"},{"link":"javascript:doSearch(ENERGY-DELAY TRADEOFF);","weight":"∞","text":"ENERGY-DELAY TRADEOFF"},{"link":"javascript:doSearch(FILE CACHING);","weight":"∞","text":"FILE CACHING"},{"link":"javascript:doSearch(HETEROGENEOUS SERVICES);","weight":"∞","text":"HETEROGENEOUS SERVICES"},{"link":"javascript:doSearch(HEURISTIC ALGORITHMS);","weight":"∞","text":"HEURISTIC ALGORITHMS"},{"link":"javascript:doSearch(IN-VEHICLE NETWORKS (IVNS) , CONTROLLER AREA NETWORK (CAN), AUTOMOTIVE ETHERNET, LATENCY, ADVANCED DRIVER ASSISTANCE SYSTEM (ADAS), LANE KEEPING ASSISTANCE SYSTEM (LKAS), DATA COMPRESSION);","weight":"∞","text":"IN-VEHICLE NETWORKS (IVNS) , CONTROLLER AREA NETWORK (CAN), AUTOMOTIVE ETHERNET, LATENCY, ADVANCED DRIVER ASSISTANCE SYSTEM (ADAS), LANE KEEPING ASSISTANCE SYSTEM (LKAS), DATA COMPRESSION"},{"link":"javascript:doSearch(INDEXES);","weight":"∞","text":"INDEXES"},{"link":"javascript:doSearch(INTEGRATED CIRCUITS);","weight":"∞","text":"INTEGRATED CIRCUITS"},{"link":"javascript:doSearch(INTERNET OF THINGS);","weight":"∞","text":"INTERNET OF THINGS"},{"link":"javascript:doSearch(JOINT ENCRYPTION);","weight":"∞","text":"JOINT ENCRYPTION"},{"link":"javascript:doSearch(LINEAR PROGRAMMING);","weight":"∞","text":"LINEAR PROGRAMMING"},{"link":"javascript:doSearch(LYAPUNOV DRIFT-PLUS-PENALTY);","weight":"∞","text":"LYAPUNOV DRIFT-PLUS-PENALTY"},{"link":"javascript:doSearch(MASSIVE MIMO);","weight":"∞","text":"MASSIVE MIMO"},{"link":"javascript:doSearch(MASSIVE-MIMO);","weight":"∞","text":"MASSIVE-MIMO"},{"link":"javascript:doSearch(MINIMIZATION);","weight":"∞","text":"MINIMIZATION"},{"link":"javascript:doSearch(MULTI-PATH ROUTING);","weight":"∞","text":"MULTI-PATH ROUTING"},{"link":"javascript:doSearch(MULTIPLE RESOURCE MANAGEMENT);","weight":"∞","text":"MULTIPLE RESOURCE MANAGEMENT"},{"link":"javascript:doSearch(NETWORK);","weight":"∞","text":"NETWORK"},{"link":"javascript:doSearch(NETWORK SLICING);","weight":"∞","text":"NETWORK SLICING"},{"link":"javascript:doSearch(NETWORKS);","weight":"∞","text":"NETWORKS"},{"link":"javascript:doSearch(OPTIMIZATION);","weight":"∞","text":"OPTIMIZATION"},{"link":"javascript:doSearch(POPULARITY);","weight":"∞","text":"POPULARITY"},{"link":"javascript:doSearch(PROCESS CONTROL);","weight":"∞","text":"PROCESS CONTROL"},{"link":"javascript:doSearch(PROCESSOR SCHEDULING);","weight":"∞","text":"PROCESSOR SCHEDULING"},{"link":"javascript:doSearch(QUALITY OF SERVICE);","weight":"∞","text":"QUALITY OF SERVICE"},{"link":"javascript:doSearch(RANDOMIZED CACHE LEASE METHOD);","weight":"∞","text":"RANDOMIZED CACHE LEASE METHOD"},{"link":"javascript:doSearch(RECEIVERS);","weight":"∞","text":"RECEIVERS"},{"link":"javascript:doSearch(RESOURCE MANAGEMENT);","weight":"∞","text":"RESOURCE MANAGEMENT"},{"link":"javascript:doSearch(RESOURCE-ALLOCATION);","weight":"∞","text":"RESOURCE-ALLOCATION"},{"link":"javascript:doSearch(ROUTING);","weight":"∞","text":"ROUTING"},{"link":"javascript:doSearch(SADDLE POINT THEORY);","weight":"∞","text":"SADDLE POINT THEORY"},{"link":"javascript:doSearch(SATELLITE BROADCASTING);","weight":"∞","text":"SATELLITE BROADCASTING"},{"link":"javascript:doSearch(SATELLITE COMMUNICATION);","weight":"∞","text":"SATELLITE COMMUNICATION"},{"link":"javascript:doSearch(SATELLITE COMMUNICATION, MOBILE SATELLITE SERVICE (MSS), LAND MOBILE SATELLITE (LMS) CHANNEL, DOPPLER EFFECT, TIME-VARYING SATELLITE TOPOLOGY, MEGA-CONSTELLATION, INTER-SATELLITE LINK (ISL), OPTICAL COMMUNICATION, END-TO-END ROUTING);","weight":"∞","text":"SATELLITE COMMUNICATION, MOBILE SATELLITE SERVICE (MSS), LAND MOBILE SATELLITE (LMS) CHANNEL, DOPPLER EFFECT, TIME-VARYING SATELLITE TOPOLOGY, MEGA-CONSTELLATION, INTER-SATELLITE LINK (ISL), OPTICAL COMMUNICATION, END-TO-END ROUTING"},{"link":"javascript:doSearch(SATELLITE IOT);","weight":"∞","text":"SATELLITE IOT"},{"link":"javascript:doSearch(SATELLITE NETWORK);","weight":"∞","text":"SATELLITE NETWORK"},{"link":"javascript:doSearch(SATELLITES);","weight":"∞","text":"SATELLITES"},{"link":"javascript:doSearch(SCHEME);","weight":"∞","text":"SCHEME"},{"link":"javascript:doSearch(SDN/NFV INTEGRATION);","weight":"∞","text":"SDN/NFV INTEGRATION"},{"link":"javascript:doSearch(SECURITY);","weight":"∞","text":"SECURITY"},{"link":"javascript:doSearch(SENDING RATE ALLOCATION);","weight":"∞","text":"SENDING RATE ALLOCATION"},{"link":"javascript:doSearch(SERVERS);","weight":"∞","text":"SERVERS"},{"link":"javascript:doSearch(SERVICE CHARACTERISTICS);","weight":"∞","text":"SERVICE CHARACTERISTICS"},{"link":"javascript:doSearch(SUBMODULARITY);","weight":"∞","text":"SUBMODULARITY"},{"link":"javascript:doSearch(SYSTEMS);","weight":"∞","text":"SYSTEMS"},{"link":"javascript:doSearch(TASK ANALYSIS);","weight":"∞","text":"TASK ANALYSIS"},{"link":"javascript:doSearch(THROUGHPUT);","weight":"∞","text":"THROUGHPUT"},{"link":"javascript:doSearch(TURBO CODES);","weight":"∞","text":"TURBO CODES"},{"link":"javascript:doSearch(UNDIRECTED GRAPH.);","weight":"∞","text":"UNDIRECTED GRAPH."},{"link":"javascript:doSearch(USER SCHEDULING);","weight":"∞","text":"USER SCHEDULING"},{"link":"javascript:doSearch(V2X COMMUNICATION, DSRC, C-V2X, TRAFFIC FLOW IMPROVEMENT);","weight":"∞","text":"V2X COMMUNICATION, DSRC, C-V2X, TRAFFIC FLOW IMPROVEMENT"},{"link":"javascript:doSearch(V2X COMMUNICATION, DSRC, C-V2X, V2X APPLICATION);","weight":"∞","text":"V2X COMMUNICATION, DSRC, C-V2X, V2X APPLICATION"},{"link":"javascript:doSearch(VARIATIONAL INEQUALITIES);","weight":"∞","text":"VARIATIONAL INEQUALITIES"},{"link":"javascript:doSearch(VARIATIONAL TECHNIQUES);","weight":"∞","text":"VARIATIONAL TECHNIQUES"},{"link":"javascript:doSearch(VIRTUALIZED ENVIRONMENT);","weight":"∞","text":"VIRTUALIZED ENVIRONMENT"},{"link":"javascript:doSearch(WIRELESS);","weight":"∞","text":"WIRELESS"},{"link":"javascript:doSearch(WIRELESS COMMUNICATION);","weight":"∞","text":"WIRELESS COMMUNICATION"}]
Journal Articles
Conference Papers
Patent
News
ETC
Journal Articles
Conference Papers
Patent
News
ETC
Issue Date
Title
First-Author(s)
Journal
Issue Date
View
Export XLS
BROWSE
Communities & Collections
Researchers
Titles
LIBRARY