Calculated based on number of publications stored in Pure and citations from Scopus
1994 …2021

Research activity per year

Filter
Chapter

Search results

  • 2004

    Enforcement of architectural safety guards to deter malicious code attacks through buffer overflow vulnerabilities

    Choi, L. & Shin, Y., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Müller-Schloer, C., Ungerer, T. & Bauer, B. (eds.). Springer Verlag, p. 47-60 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2981).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  • Scalable packet classification through maximum entropy hashing

    Choi, L., Heo, J., Kim, H., Joung, J. & Kim, S., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Mitrou, N., Kontovasilis, K., Rouskas, G. N., lliadis, I. & Merakos, L. (eds.). Springer Verlag, p. 296-307 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3042).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    Open Access
  • 2003

    Adaptive and automatic creation of hierarchical WML decks for efficient access of wireless internet under wireless application protocol

    Choi, L., Kim, D. G., Lee, S. J. & Kang, C. H., 2003, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Lee, J. & Kang, C-H. (eds.). Springer Verlag, p. 453-460 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2524).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    1 Citation (Scopus)
  • Taming large classifiers with rule reference locality

    Kim, H., Heo, J., Choi, L., Kang, I. & Kim, S., 2003, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Kahng, H-K. (ed.). Springer Verlag, p. 928-937 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2662).

    Research output: Chapter in Book/Report/Conference proceedingChapter