default search action
Jeong Geun Kim
Person information
Other persons with a similar name
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j18]Xing Fu, Jeong Geun Kim:
Deep-Q-Network-Based Packet Scheduling in an IoT Environment. Sensors 23(3): 1339 (2023) - 2021
- [j17]Xing Fu, Loberi Lopez-Estrada, Jeong Geun Kim:
A Q-Learning-Based Approach for Enhancing Energy Efficiency of Bluetooth Low Energy. IEEE Access 9: 21286-21295 (2021)
2010 – 2019
- 2019
- [j16]Shu Li, Jeong Geun Kim, Doo Hee Han, Kye San Lee:
A Survey of Energy-Efficient Communication Protocols with QoS Guarantees in Wireless Multimedia Sensor Networks. Sensors 19(1): 199 (2019) - 2016
- [c18]Yun Kyung Kim, Jeong Geun Kim:
Dynamic placement of relay robot for throughput enhancement in networked robots. ICTC 2016: 714-716 - 2013
- [c17]Shu Li, Jeong Geun Kim:
Impacts of random forwarding on network performance of wireless sensor networks. WCNC 2013: 1163-1167 - 2012
- [j15]Choongyong Shin, Jinsung Cho, Jeong Geun Kim, Ben Lee:
An AHP-based resource management scheme for CRRM in heterogeneous wireless networks. Ann. des Télécommunications 67(11-12): 511-522 (2012) - [c16]Shu Li, Jeong Geun Kim:
A Geographic Routing Protocol for Wireless Multimedia Sensor Networks. ICHIT (2) 2012: 17-22 - [c15]Shu Li, Jeong Geun Kim:
Inter-session and Intra-session Network Coding for Wireless Sensor Networks. ICHIT (1) 2012: 33-40 - 2011
- [j14]Yongsuk Park, Kyu Yeol Lee, Ca Van Phan, Hyo Hyun Choi, Jeong Geun Kim:
A Location-Aware Routing with Hole Detouring Technique for Wireless Sensor Networks. IEICE Trans. Commun. 94-B(3): 827-830 (2011) - [j13]Chang-Ho Chin, Jeong Geun Kim, Deokjoo Lee:
Stability of Slotted Aloha with Selfish Users under Delay Constraint. KSII Trans. Internet Inf. Syst. 5(3): 542-559 (2011) - 2010
- [j12]Ca Van Phan, Yongsuk Park, Hyo Hyun Choi, Jinsung Cho, Jeong Geun Kim:
An energy-efficient transmission strategy for wireless sensor networks. IEEE Trans. Consumer Electron. 56(2): 597-605 (2010) - [c14]Bo Kyung Jang, Young-A. Song, Jeong Geun Kim:
Throughput analysis of IEEE 802.11 wireless networks with network coding. ICTC 2010: 18-19
2000 – 2009
- 2009
- [j11]Woo Jin Shin, Jeong Geun Kim:
A capture-aware access control method for enhanced RFID anti-collision performance. IEEE Commun. Lett. 13(5): 354-356 (2009) - [j10]Jeong Geun Kim:
A Combined Polling and Random Access Technique for Enhanced Anti-Collision Performance in RFID Systems. IEICE Trans. Commun. 92-B(4): 1357-1360 (2009) - [j9]Jeong Geun Kim, Ca Van Phan, Wonha Kim:
Performance Analysis of an Opportunistic Transmission Scheme for Wireless Sensor Networks. IEICE Trans. Commun. 92-B(6): 2259-2262 (2009) - 2008
- [j8]Jeong Geun Kim:
A Divide-and-Conquer Technique for Throughput Enhancement of RFID Anti-collision Protocol. IEEE Commun. Lett. 12(6): 474-476 (2008) - [j7]Hyung Suk Oh, Wonha Kim, Jeong Geun Kim:
Image Resizing on the Integer DCT Domain Used in H.264/AVC. IEICE Trans. Commun. 91-B(5): 1599-1607 (2008) - [c13]Ca Van Phan, Thuy-Dan Nguyen, Eui-Jik Kim, Hyo Hyun Choi, Jeong Geun Kim:
Performance Analysis of an Opportunistic Transmission Scheme for Wireless Sensor Networks. ICC 2008: 2317-2321 - 2007
- [c12]Ca Van Phan, Kikyung Baek, Jeong Geun Kim:
Opportunistic Transmission for Wireless Sensor Networks Under Delay Constraints. ICCSA (3) 2007: 858-871 - [c11]Jeong Geun Kim, Woo Jin Shin, Ji Ho Yoo:
Performance Analysis of EPC Class-1 Generation-2 RFID Anti-collision Protocol. ICCSA (3) 2007: 1017-1026 - [c10]Woo Jin Shin, Jeong Geun Kim:
Partitioning of Tags for Near-Optimum RFID Anti-collision Performance. WCNC 2007: 1673-1678 - [c9]Ca Van Phan, Jeong Geun Kim:
An Energy-Efficient Transmission Strategy for Wireless Sensor Networks. WCNC 2007: 3406-3411 - 2006
- [j6]Een-Kee Hong, Sang Hyuck Yun, Jeong Geun Kim:
On the carrier spacing for mobile multimedia systems. J. Commun. Networks 8(2): 182-186 (2006) - 2004
- [c8]Jeong Geun Kim, Een-Kee Hong:
Opportunistic Scheduling for QoS Guarantees in 3G Wireless Links. PWC 2004: 54-68 - 2002
- [j5]Bernard P. Zeigler, Hyup J. Cho, Jeong Geun Kim, Hessam S. Sarjoughian, Jong S. Lee:
Quantization-based filtering in distributed discrete event simulation. J. Parallel Distributed Comput. 62(11): 1629-1647 (2002) - 2001
- [j4]Marwan Krunz, Jeong Geun Kim:
Fluid analysis of delay and packet discard performance for QoS support in wireless networks. IEEE J. Sel. Areas Commun. 19(2): 384-395 (2001) - 2000
- [j3]Jeong Geun Kim, Marwan Krunz:
Bandwidth allocation in wireless networks with guaranteed packet-loss performance. IEEE/ACM Trans. Netw. 8(3): 337-349 (2000) - [j2]Jeong Geun Kim, Marwan Krunz:
Delay analysis of selective repeat ARQ for a Markovian source over a wireless channel. IEEE Trans. Veh. Technol. 49(5): 1968-1981 (2000)
1990 – 1999
- 1999
- [c7]Jeong Geun Kim, Marwan Krunz:
Fluid Analysis of Delay Performance for QoS Support in Wireless Networks. ICNP 1999: 254-261 - [c6]Jeong Geun Kim, Marwan Krunz:
Quality of Service over Wireless ATM Links. INFOCOM 1999: 1003-1010 - [c5]Jeong Geun Kim, Marwan Krunz:
Delay Analysis of Selective Repeat ARQ for a Markovian Source Over a Wireless Channel. WOWMOM 1999: 59-66 - 1998
- [c4]Jeong Geun Kim, Marwan Krunz:
Effective Bandwidth in Wireless ATM Networks. MobiCom 1998: 233-241 - 1997
- [j1]Brian P. Crow, Indra Widjaja, Jeong Geun Kim, Prescott Sakai:
IEEE 802.11 Wireless Local Area Networks. IEEE Commun. Mag. 35(9): 116-126 (1997) - [c3]Anindya Datta, Aslihan Celik, Jeong Geun Kim, Debra E. VanderMeer, Vijay Kumar:
Adaptive Broadcast Protocols to Support Power Conservant Retrieval by Mobile Users. ICDE 1997: 124-133 - [c2]Brian P. Crow, Indra Widjaja, Jeong Geun Kim, Prescott Sakai:
Investigation of the IEEE 802.11 Medium Access Control (MAC). INFOCOM 1997: 126-133 - 1996
- [c1]Bernard P. Zeigler, Yoonkeon Moon, Doohwan Kim, Jeong Geun Kim:
DEVS-C++: A High Performance Modelling and Simulation Environment. HICSS (1) 1996: 350-359
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:50 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint