default search action
Jinsuk Baek
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [c23]Jinsuk Baek, Munene W. Kanampiu:
A Strategic Sensor Placement for a Smart Farm Water Sprinkler System: A Computational Model. ICACT 2022: 53-57 - 2021
- [c22]Jinsuk Baek, Munene W. Kanampiu:
A Strategic Sensor Placement for a Smart Farm Water Sprinkler System: A Computational Model. ICACT 2021: 53-57 - 2020
- [c21]Jinsuk Baek, Munene W. Kanampiu, Byeong Hyun Ko:
A Set Notation Configuration CoAP Scheme for Internet of Things. ICACT 2020: 43-47
2010 – 2019
- 2018
- [j19]Cheonshik Kim, Chin-Chen Chang, Ching-Nung Yang, Xinpeng Zhang, Jinsuk Baek:
Special Issue: Real-Time Data Hiding and Visual Cryptography. J. Real Time Image Process. 14(1): 1-4 (2018) - [j18]Doowon Kim, Jinsuk Baek, Paul S. Fisher, Sangchul Kim:
fFTP: a fast file transfer protocol for home N-screen platform. Pers. Ubiquitous Comput. 22(1): 143-152 (2018) - [j17]Paul S. Fisher, Jimmy James II, Jinsuk Baek, Cheonshik Kim:
Mining intelligent solution to compensate missing data context of medical IoT devices. Pers. Ubiquitous Comput. 22(1): 219-224 (2018) - 2017
- [j16]Paul S. Fisher, Nawaf Aljohani, Jinsuk Baek:
Generation of Finite Inductive, Pseudo Random, Binary Sequences. J. Inf. Process. Syst. 13(6): 1554-1574 (2017) - [c20]Jinsuk Baek, Paul S. Fisher:
Packet Damage-Resistant Analysis Using a Data Mining Mechanism in Wireless Sensor Networks. Intelligent Environments 2017: 176-179 - 2016
- [j15]Jinsuk Baek, Cheonshik Kim:
An energy-efficient video transport protocol for personal cloud-based computing. J. Real Time Image Process. 12(2): 303-310 (2016) - 2015
- [j14]Paul S. Fisher, Jinsuk Baek, Howard Fisher:
APPMPS: An Asynchronous Parallel Plastic Multiprocessing System. IEEE Syst. J. 9(2): 382-392 (2015) - [j13]Jinsuk Baek, Mingyung Kwak, Paul S. Fisher:
A Smart Backoff Scheme for Multicast Flows in Wireless LAN. Smart Comput. Rev. 5(3): 159-167 (2015) - 2014
- [c19]Doowon Kim, Jinsuk Baek, Paul S. Fisher:
Adaptive video streaming over HTTP. ACM Southeast Regional Conference 2014: 26:1-26:3 - [c18]Cheonshik Kim, Jinsuk Baek, Paul S. Fisher:
Lossless Data Hiding for Binary Document Images Using n n -Pairs Pattern. ICISC 2014: 317-327 - 2013
- [j12]Mohammad Muztaba Fuad, Debzani Deb, Jinsuk Baek:
Static Analysis, Code Transformation and Runtime Profiling for Self-healing. J. Comput. 8(5): 1127-1135 (2013) - [j11]Yong woon Ahn, Albert M. K. Cheng, Jinsuk Baek, Minho Jo, Hsiao-Hwa Chen:
An auto-scaling mechanism for virtual resources to support mobile, pervasive, real-time healthcare applications in cloud computing. IEEE Netw. 27(5): 62-68 (2013) - [c17]Doowon Kim, Chaitanya Achan, Jinsuk Baek, Paul S. Fisher:
Implementation of framework to identify potential phishing websites. ISI 2013: 268 - 2012
- [j10]Jinsuk Baek, Paul S. Fisher, Minho Jo, Hsiao-Hwa Chen:
A reliable overlay video transport protocol for multicast agents in wireless mesh networks. Int. J. Commun. Syst. 25(5): 553-570 (2012) - [c16]Hyunju Cho, Sangchul Kim, Jinsuk Baek, Paul S. Fisher:
Motion recognition with smart phone embedded 3-axis accelerometer sensor. SMC 2012: 919-924 - [c15]Munene W. Kanampiu, Justin Zhan, Jinsuk Baek:
A Secure Group Collaboration Protocol for Nonverbal Human Social Signals Featuring Deception Detection. SocialCom/PASSAT 2012: 813-818 - [i1]Mohammad Muztaba Fuad, Debzani Deb, Jinsuk Baek:
Self-Healing by Means of Runtime Execution Profiling. CoRR abs/1203.5748 (2012) - 2011
- [j9]Jinsuk Baek, Jan Fischer, Hsiao-Hwa Chen, Minho Jo:
On a moving direction pattern based MAP selection model for HMIPv6 networks. Comput. Commun. 34(2): 150-158 (2011) - [j8]Yong woon Ahn, Jinsuk Baek, Albert Mo Kim Cheng, Paul S. Fisher, Minho Jo:
A Fair Transmission Opportunity by Detecting and Punishing the Malicious Wireless Stations in IEEE 802.11e EDCA Network. IEEE Syst. J. 5(4): 486-494 (2011) - [j7]Jinsuk Baek, Doowon Kim, Paul S. Fisher, Minho Jo:
An Adaptive Primary Path Switching Scheme for Seamless mSCTP Handover. Smart Comput. Rev. 1(2): 150-160 (2011) - [c14]Edward Jordan, Jinsuk Baek, Wood Kanampiu:
Impact of mobile sink for wireless sensor network. ACM Southeast Regional Conference 2011: 338-339 - [c13]Yong woon Ahn, Chaitanya Belwal, Albert M. K. Cheng, Jinsuk Baek:
Improving QoS for ECG Data Transmission with Enhanced Admission Control in EDCA-Based WLANs. GLOBECOM 2011: 1-5 - 2010
- [j6]Jinsuk Baek, Sun Kyong An, Paul S. Fisher:
Dynamic cluster header selection and conditional re-clustering for wireless sensor networks. IEEE Trans. Consumer Electron. 56(4): 2249-2257 (2010) - [j5]Jinsuk Baek, Paul S. Fisher, Minho Jo, Hsiao-Hwa Chen:
A Lightweight SCTP for Partially Reliable Overlay Video Multicast Service for Mobile Terminals. IEEE Trans. Multim. 12(7): 754-766 (2010) - [c12]Elijah Myers, Paul S. Fisher, Keith Irwin, Jinsuk Baek, João C. Setubal:
The Complexity and Application of Syntactic Pattern Recognition Using Finite Inductive Strings. PRIB 2010: 125-136 - [c11]Jinsuk Baek, Paul S. Fisher, Minho Jo:
An Enhancement of mSCTP Handover with an Adaptive Primary Path Switching Scheme. VTC Fall 2010: 1-5 - [c10]Jinsuk Baek, Cheonshik Kim, Paul S. Fisher, Hongyang Chao:
(N, 1) secret sharing approach based on steganography with gray digital images. WCNIS 2010: 325-329
2000 – 2009
- 2009
- [j4]Yong woon Ahn, Albert Mo Kim Cheng, Jinsuk Baek, Paul S. Fisher:
A multiplayer real-time game protocol architecture for reducing network latency. IEEE Trans. Consumer Electron. 55(4): 1883-1889 (2009) - [j3]Tarandeep Kaur, Jinsuk Baek:
A strategic deployment and cluster-header selection for wireless sensor networks. IEEE Trans. Consumer Electron. 55(4): 1890-1897 (2009) - [c9]Jinsuk Baek, Paul S. Fisher, Mingyung Kwak:
FI-based file access predictor. ACM Southeast Regional Conference 2009 - [c8]Paul S. Fisher, Howard Fisher, Jinsuk Baek, Cleopas O. Angaye:
Syntactic Pattern Recognition Using Finite Inductive Strings. PRIB 2009: 89-101 - 2008
- [j2]Jinsuk Baek, Paul S. Fisher, Mingyung Kwak:
FI-Based Local Group Key Generation/Distribution for Mobile Multicast in a Hierarchical Mobile IPv6 Network. KSII Trans. Internet Inf. Syst. 2(1): 5-22 (2008) - [j1]Jinsuk Baek, Jehan-François Pâris:
A Scalable Recovery Tree Construction Scheme Considering Spatial Locality of Packet Loss. KSII Trans. Internet Inf. Syst. 2(2): 82-102 (2008) - [c7]Jinsuk Baek, Paul S. Fisher, Yuri Kim, Mingyung Kwak, Hyungoo Han:
An object discarding policy with FI systems for cooperative hybrid caching architecture. ACM Southeast Regional Conference 2008: 411-416 - [c6]Jinsuk Baek, Paul S. Fisher, Mingyung Kwak, Hyungoo Han:
Secure Scalable and Reliable Mobile Multicast with FI-Based Local Group Key. International Conference on Internet Computing 2008: 188-194 - 2007
- [c5]Jinsuk Baek, Munene W. Kanampiu:
An admission control scheme for repair server in a tree-based reliable multicast. ACM Southeast Regional Conference 2007: 191-197 - 2006
- [c4]Eunjung Lee, Jinsuk Baek, Shou-Hsuan Stephen Huang:
A Dynamic Mobility Management Scheme for VoIP Services. ITNG 2006: 340-345 - 2005
- [c3]Jinsuk Baek, Jehan-François Pâris:
A tree-based reliable multicast scheme exploiting the temporal locality of transmission errors. IPCCC 2005: 275-282 - 2004
- [c2]Jinsuk Baek, Jehan-François Pâris:
A buffer management scheme for tree-based reliable multicast using infrequent acknowledgments. IPCCC 2004: 13-20 - [c1]Jinsuk Baek, Jehan-François Pâris:
A heuristic buffer management scheme for tree-based reliable multicast. ISCC 2004: 1123-1128
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:59 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint