Suivre
Kwang-Man KO
Kwang-Man KO
SangJi University
Adresse e-mail validée de sangji.ac.kr - Page d'accueil
Titre
Citée par
Citée par
Année
Decentralized consensus for edge-centric internet of things: A review, taxonomy, and research issues
K Yeow, A Gani, RW Ahmad, JJPC Rodrigues, K Ko
IEEE Access 6, 1513-1524, 2017
2902017
Energy harvesting for wearable devices: A review
YW Chong, W Ismail, K Ko, CY Lee
IEEE Sensors Journal 19 (20), 9047-9062, 2019
2222019
A review on the role of blockchain technology in the healthcare domain
HD Zubaydi, YW Chong, K Ko, SM Hanshi, S Karuppayah
Electronics 8 (6), 679, 2019
1402019
An uncertainty-aware integrated fuzzy AHP-WASPAS model to evaluate public cloud computing services
KA Alam, R Ahmed, FS Butt, SG Kim, KM Ko
Procedia computer science 130, 504-509, 2018
722018
Software-defined network forensics: Motivation, potential locations, requirements, and challenges
S Khan, A Gani, AWA Wahab, A Abdelaziz, K Ko, MK Khan, M Guizani
IEEE Network 30 (6), 6-13, 2016
592016
Cost effective network flow measurement for software defined networks: A distributed controller scenario
H Tahaei, RB Salleh, MF Ab Razak, K Ko, NB Anuar
IEEE Access 6, 5182-5198, 2018
532018
Towards native code offloading based MCC frameworks for multimedia applications: A survey
J Shuja, A Gani, MH ur Rehman, E Ahmed, SA Madani, MK Khan, K Ko
Journal of Network and Computer Applications 75, 335-354, 2016
492016
Characterizing dynamic load balancing in cloud environments using virtual machine deployment models
M Liaqat, A Naveed, RL Ali, J Shuja, KM Ko
IEEE Access 7, 145767-145776, 2019
402019
Adaptive Path Finding Algorithm in Dynamic Environment for Warehouse Robot
KM Ko
Informations, 0
40*
SIMDOM: a framework for SIMD instruction translation and offloading in heterogeneous mobile architectures
J Shuja, A Gani, K Ko, K So, S Mustafa, SA Madani, MK Khan
Transactions on Emerging Telecommunications Technologies 29 (4), e3174, 2018
382018
Secure outsourced blockchain-based medical data sharing system using proxy re-encryption
YH Park, Y Kim, SO Lee, K Ko
Applied Sciences 11 (20), 9422, 2021
272021
Localization free energy efficient and cooperative routing protocols for underwater wireless sensor networks
S Shah, A Khan, I Ali, KM Ko, H Mahmood
Symmetry 10 (10), 498, 2018
262018
Intersection-based distance and traffic-aware routing (IDTAR) protocol for smart vehicular communication
AIA Ahmed, A Gani, SH Ab Hamid, S Khan, N Guizani, K Ko
2017 13th international wireless communications and mobile computing …, 2017
262017
Java virtual machine
T Downing, J Meyer
OREILLY, Mar, 1997
261997
A fog computing architecture with multi-layer for computing-intensive iot applications
M Muneeb, KM Ko, YH Park
Applied Sciences 11 (24), 11585, 2021
242021
Towards an applicability of current network forensics for cloud networks: A SWOT analysis
S Khan, A Gani, AWA Wahab, S Iqbal, A Abdelaziz, OA Mahdi, ...
IEEE Access 4, 9800-9820, 2016
232016
Enabling far-edge analytics: performance profiling of frequent pattern mining algorithms
KA Alam, R Ahmad, K Ko
IEEE Access 5, 8236-8249, 2017
192017
Profiling and predicting the cumulative helpfulness (Quality) of crowd-sourced reviews
M Bilal, M Marjani, IAT Hashem, A Gani, M Liaqat, K Ko
Information 10 (10), 295, 2019
152019
DisCO: A distributed and concurrent offloading framework for mobile edge cloud computing
K Ko, Y Son, S Kim, Y Lee
2017 ninth international conference on ubiquitous and future networks (ICUFN …, 2017
142017
Comparative study of AI-enabled DDoS detection technologies in SDN
KM Ko, JM Baek, BS Seo, WB Lee
Applied Sciences 13 (17), 9488, 2023
122023
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20