Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Traffic-Aware MAC Protocol Using Adaptive Duty Cycle for Wireless Sensor Networks

    Most of sensor MAC protocols have a fixed duty cycle, which performs poorly under the dynamic traffic condition observed in event-driven sensor applications such as surveillance, fire detection, and object-tra...

    Seungkyu Bac, Dongho Kwak, Cheeha Kim in Information Networking. Towards Ubiquitous… (2008)

  2. No Access

    Chapter and Conference Paper

    Optimal Transmission Range for Topology Management in Wireless Sensor Networks

    Topology management protocols aim to minimize the number of nodes in densely distributed sensor networks that constitute the topology. Most protocols construct the topology with a fixed transmission range (i.e...

    Jongmin Shin, Miae Chin, Cheeha Kim in Information Networking. Advances in Data C… (2006)

  3. No Access

    Book and Conference Proceedings

    Information Networking. Convergence in Broadband and Mobile Networking

    International Conference, ICOIN 2005, Jeju Island, Korea, January 31- February 2, 2005. Proceedings

    Cheeha Kim in Lecture Notes in Computer Science (2005)

  4. No Access

    Chapter and Conference Paper

    An Efficient Backup Path Selection Algorithm in MPLS Networks

    The rapid growth of real-time and multimedia traffic over IP networks makes not only QoS guarantees but also network survivability more critical. This paper proposes an efficient algorithm which supports end-t...

    Wook Jeong, Geunhyung Kim, Cheeha Kim in Quality of Service in Multiservice IP Networks (2005)

  5. No Access

    Chapter and Conference Paper

    S-RO: Simple Route Optimization Scheme with NEMO Transparency

    Network mobility (NEMO) basic support protocol maintains the connectivity when mobile router (MR) changes its point of attachment to the Internet by establishing a bidirectional tunnel between MR and Home Agen...

    Hanlim Kim, Geunhyung Kim, Cheeha Kim in Information Networking. Convergence in Bro… (2005)

  6. No Access

    Chapter and Conference Paper

    Deterministic Edge-to-Edge Delay Bounds for a Flow in a DiffServ Network Domain

    It is important to understand delay bounds of an individual flow in the Internet in order to provide real-time applications such as Voice over IP (VoIP). In this paper, we study the deterministic bounds on edg...

    Geunhyung Kim, Cheeha Kim in Information Networking. Networking Technol… (2004)

  7. Chapter and Conference Paper

    Low-Latency Non-predictive Handover Scheme in Mobile IPv6 Environments

    In IP-based wireless/mobile networks, minimizing handover latency is one of the most important issues. Fast handover mobile IPv6 (FMIPv6) reduces the handover latency by handover prediction with link-layer inf...

    Geunhyung Kim, Cheeha Kim in Personal Wireless Communications (2004)

  8. No Access

    Chapter and Conference Paper

    Periodic Communication Support in Multiple Access Networks Exploiting Token with Timer

    Timed token medium access protocols are widely adopted in real-time multiple access networks because of bounded access time. However, timed token protocols inadequately provide periodic communication service, ...

    Young-yeol Choo, Cheeha Kim in Information Networking (2003)