Digital Library
Search: "[ keyword: Mobile ]" (284)
Flow-based Seamless Handover Scheme for WLANs Using an Overlaid 4G Network
Jae In Choi , In Soo Park , You Ze Cho KIPS Transactions on Computer and Communication Systems,
Vol. 3, No. 1, pp. 7-14,
Jan.
2014
10.3745/KTCCS.2014.3.1.7
10.3745/KTCCS.2014.3.1.7
A Study on the SmartPhone GPS based Graphical Password Approach
Tae Eun Kim , Hyeon Hong Kim , Moon Seog Jun KIPS Transactions on Computer and Communication Systems,
Vol. 2, No. 12, pp. 525-532,
Dec.
2013
10.3745/KTCCS.2013.2.12.525
10.3745/KTCCS.2013.2.12.525
A Proposal for "Security Verification Method for Implementation of Secure Android Mobile Application"
Hur Hwan Seok , Kang Sung Hoon , Kim Seung Joo KIPS Transactions on Computer and Communication Systems,
Vol. 2, No. 10, pp. 445-460,
Oct.
2013
10.3745/KTCCS.2013.2.10.445
10.3745/KTCCS.2013.2.10.445
Design and Implementation of Mobile Teleconference System Based on Hybrid Web
Yun Kyoung Kim , Ji Hyun Choi KIPS Transactions on Computer and Communication Systems,
Vol. 2, No. 10, pp. 437-444,
Oct.
2013
10.3745/KTCCS.2013.2.10.437
10.3745/KTCCS.2013.2.10.437
Authentication Scheme based on NTRU for the Protection of Payment Information in NFC Mobile Environment
Im Yeong Lee , Sung Wook Park KIPS Transactions on Computer and Communication Systems,
Vol. 2, No. 3, pp. 133-142,
Mar.
2013
10.3745/KTCCS.2013.2.3.133
10.3745/KTCCS.2013.2.3.133
Low-Cost Global Mobility Management Scheme in Proxy Mobile IPv6 Networks
Jongyoun Kim , Jongsun Park , Jongpil Jeong KIPS Transactions on Computer and Communication Systems,
Vol. 1, No. 3, pp. 193-204,
Dec.
2012
10.3745/KTCCS.2012.1.3.193
10.3745/KTCCS.2012.1.3.193
Reducing of Authentication Signaling Traffic in LTE Networks
Seonho Kim , Jongpil Jeong KIPS Transactions on Computer and Communication Systems,
Vol. 1, No. 2, pp. 109-118,
Nov.
2012
10.3745/KTCCS.2012.1.2.109
10.3745/KTCCS.2012.1.2.109
Optimized Handoff Scheme with Fuzzy logic in Heterogeneous Vehicular Mobile Networks
Youngsam Roh , Jongpil Jeong KIPS Transactions on Computer and Communication Systems,
Vol. 1, No. 1, pp. 35-46,
Oct.
2012
10.3745/KTCCS.2012.1.1.35
10.3745/KTCCS.2012.1.1.35
Hybrid Offloading Technique Based on Auction Theory and Reinforcement Learning in MEC Industrial IoT Environment
Bae Hyeon Ji, Kim Sung Wook KIPS Transactions on Computer and Communication Systems,
Vol. 12, No. 9, pp. 263-272,
Sep.
2023
https://doi.org/10.3745/KTCCS.2023.12.9.263
Keywords: Mobile Edge Computing(MEC), Device-to-Device(D2D) Offloading, Industrial Internet of Things(IIoT), McAfee’s Double Auction, Multi-Armed Bandit(MAB)
https://doi.org/10.3745/KTCCS.2023.12.9.263
Keywords: Mobile Edge Computing(MEC), Device-to-Device(D2D) Offloading, Industrial Internet of Things(IIoT), McAfee’s Double Auction, Multi-Armed Bandit(MAB)
UAV-MEC Offloading and Migration Decision Algorithm for Load Balancing in Vehicular Edge Computing Network
A Young Shin, Yujin Lim KIPS Transactions on Computer and Communication Systems,
Vol. 11, No. 12, pp. 437-444,
Dec.
2022
https://doi.org/10.3745/KTCCS.2022.11.12.437
Keywords: Mobile Edge Computing, offloading, Migration, genetic algorithm, Q-learning
https://doi.org/10.3745/KTCCS.2022.11.12.437
Keywords: Mobile Edge Computing, offloading, Migration, genetic algorithm, Q-learning