Остановите войну!
for scientists:
default search action
Dongwon Jeong
- > Home > Persons > Dongwon Jeong
Publications
- 2016
- [j20]Hyunjun Jung, Dongwon Jeong, Byung-Won On, Doo-Kwon Baik:
A Reconfiguration Method for Preserving Network Bandwidth and Nodes Energy of Wireless Sensor Networks. KSII Trans. Internet Inf. Syst. 10(5): 2181-2202 (2016) - [j19]Hyunjun Jung, Dongwon Jeong, Sukhoon Lee, Byung-Won On, Doo-Kwon Baik:
A Network Coverage Information-Based Sensor Registry System for IoT Environments. Sensors 16(8): 1154 (2016) - 2015
- [j17]Sukhoon Lee, Dongwon Jeong, Doo-Kwon Baik, Dae-Kyoo Kim:
Path Prediction Method for Effective Sensor Filtering in Sensor Registry System. Int. J. Distributed Sens. Networks 11: 613473:1-613473:14 (2015) - 2014
- [j16]Sukhoon Lee, Dongwon Jeong, Jangwon Gim, Doo-Kwon Baik:
Canonical Sensor Ontology Builder Based on ISO/IEC 11179 for Sensor Network Environments: A Standardized Approach. Int. J. Distributed Sens. Networks 10 (2014) - 2011
- [c39]Jang-won Kim, Sukhoon Lee, Dongwon Jeong, Doo-Kwon Baik:
Ontology-Based Negotiation Model. SERA 2011: 125-130 - 2009
- [j14]Shinae Shin, Dongwon Jeong, Doo-Kwon Baik:
Translating Topic Maps to RDF/RDF Schema for The Semantic Web. J. Res. Pract. Inf. Technol. 41(3): 223-238 (2009) - [j13]Jang-won Kim, Dongwon Jeong, Jinhyung Kim, Doo-Kwon Baik:
Wb-T: a WordNet-Based Translation Algorithm for RDB-to-XML Conversion. Int. J. Pattern Recognit. Artif. Intell. 23(1): 145-158 (2009) - [j12]Yixin Jing, Dongwon Jeong, Doo-Kwon Baik:
An Inference-Enabled Access Control Model for RDF Ontology. Int. J. Softw. Eng. Knowl. Eng. 19(3): 339-360 (2009) - [j11]Dongwon Jeong, Heeyoung Shin, Doo-Kwon Baik, Young-Sik Jeong:
An Efficient Web Ontology Storage Considering Hierarchical Knowledge for Jena-based Applications. J. Inf. Process. Syst. 5(1): 11-18 (2009) - [j10]Jinhyung Kim, Dongwon Jeong, Doo-Kwon Baik:
A Translation Algorithm for Effective RDB-to-XML Schema Conversion Considering Referential Integrity Information. J. Inf. Sci. Eng. 25(1): 137-166 (2009) - [j9]Yixin Jing, Dongwon Jeong, Doo-Kwon Baik:
SPARQL graph pattern rewriting for OWL-DL inference queries. Knowl. Inf. Syst. 20(2): 243-262 (2009) - [c38]Jinhyung Kim, Dongwon Jeong, Doo-Kwon Baik:
Ontology Storage Model for Effective Management of Hierarchical Information. SWWS 2009: 25-30 - 2008
- [j8]Shinae Shin, Dongwon Jeong, Doo-Kwon Baik:
Novel Topic Maps to RDF/RDF Schema Translation Method. IEICE Trans. Inf. Syst. 91-D(11): 2626-2637 (2008) - [c37]Jeong-Dong Kim, Dongwon Jeong, Doo-Kwon Baik:
Extending the UbiMDR Supporting Situation-Aware Access Control. FGCN (2) 2008: 348-351 - [c35]Jinhyung Kim, Dongwon Jeong, Doo-Kwon Baik:
A Vision: RDB-Based XML Security Models Considering Data Levels. FGCN (2) 2008: 356-361 - [c34]Jiseong Son, Dongwon Jeong, Doo-Kwon Baik:
Practical Approach: Independently Using SPARQL-to-SQL Translation Algorithms on Storage. NCM (2) 2008: 598-603 - [c33]Yixin Jing, Dongwon Jeong, Doo-Kwon Baik:
SPARQL Graph Pattern Rewriting for OWL-DL Inference Query. NCM (2) 2008: 675-680 - 2007
- [c32]Jang-won Kim, Dongwon Jeong, Jinhyung Kim, Doo-Kwon Baik:
An Algorithm for Extracting Referential Integrity Relations Using Similarity during RDB-to-XML Translation. CIS 2007: 157-161 - [c29]Dongwon Jeong, Yixin Jing, Doo-Kwon Baik:
Access Control Model Based on RDB Security Policy for OWL Ontology. International Conference on Computational Science (2) 2007: 720-727 - [c28]Jinhyung Kim, Dongwon Jeong, Doo-Kwon Baik:
Formal Verification and Performance Evaluation of User Query Pattern-Based Relational Schema-to-XML Schema Translation Algorithm. ISPA 2007: 337-346 - [c27]Jeong-Dong Kim, Dongwon Jeong, Jinhyung Kim, Doo-Kwon Baik:
Evaluation on the UbiMDR Framework. ISPA 2007: 601-611 - [c26]Jeong-Dong Kim, Dongwon Jeong, Jinhyung Kim, Yixin Jing, Doo-Kwon Baik:
Implementation and Quantitative Evaluation of UbiMDR Framework. UIC 2007: 993-1002 - 2006
- [j6]Young-Gab Kim, Chang-Joo Moon, Dongwon Jeong, Doo-Kwon Baik:
Formal Verification of Bundle Authentication Mechanism in Osgi Service Platform: Ban Logic. Int. J. Softw. Eng. Knowl. Eng. 16(2): 153-174 (2006) - [c24]Dongwon Jeong, Keunhwan Jeon, Jang-won Kim, Jinhyung Kim, Doo-Kwon Baik:
Ontology-Based RFID System Model for Supporting Semantic Consistency in Ubiquitous Environment. CIS 2006: 357-366 - [c23]Young-Gab Kim, Dongwon Jeong, Soo-Hyun Park, Jongin Lim, Doo-Kwon Baik:
Modeling and Simulation for Security Risk Propagation in Critical Information Systems. CIS 2006: 858-868 - [c19]Jinhyung Kim, Dongwon Jeong, Yixin Jing, Doo-Kwon Baik:
QP-T: Query Pattern-Based RDB-to-XML Translation. OTM Workshops (2) 2006: 1844-1853 - [c17]Dongwon Jeong, Yixin Jing, Jinhyung Kim, Doo-Kwon Baik:
A Framework for Application-Independent Semantic Management for Ubiquitous Computing Environment. SERA 2006: 417-422 - [c16]Yixin Jing, Dongwon Jeong, Jinhyung Kim, Doo-Kwon Baik:
A Rule-Based Publish-Subscribe Message Routing System for Ubiquitous Computing. UCS 2006: 1-12 - 2005
- [j4]Dongwon Jeong, Hoh Peter In, Fran Jarnjak, Young-Gab Kim, Doo-Kwon Baik:
A message conversion system, XML-based metadata semantics description language and metadata repository. J. Inf. Sci. 31(5): 394-406 (2005) - [c14]Young-Gab Kim, Chang-Joo Moon, Dongwon Jeong, Jeong-Oog Lee, Chee-Yang Song, Doo-Kwon Baik:
Context-Aware Access Control Mechanism for Ubiquitous Applications. AWIC 2005: 236-242 - [c13]Jinhyung Kim, Dongwon Jeong, Doo-Kwon Baik:
An Algorithm for Automatic Inference of Referential Integrities During Translation from Relational Database to XML Schema. CIS (2) 2005: 725-730 - [c12]Fran Jarnjak, Jinhyung Kim, Yixin Jing, Hoh Peter In, Dongwon Jeong, Doo-Kwon Baik:
TS-U: Temporal-Spatial Methodology for Application Checking of the Systems in the Ubiquitous Environment. EUC Workshops 2005: 161-170 - 2004
- [j3]JuHum Kwon, Dongwon Jeong, Lee-Sub Lee, Doo-Kwon Baik:
Intelligent Semantic Concept Mapping For Semantic Query Rewriting/Optimization In Ontology-Based Information Integration System. Int. J. Softw. Eng. Knowl. Eng. 14(5): 519-542 (2004) - [j2]Dongwon Jeong, Doo-Kwon Baik:
Incremental data integration based on hierarchical metadata registry with data visibility. Inf. Sci. 162(3-4): 147-181 (2004) - [c7]Dongwon Jeong, Young-Gab Kim, Young-Shil Kim, Lee-Sub Lee, Soo-Hyun Park, Doo-Kwon Baik:
A Secure Migration Mechanism of Mobile Agents Under Mobile Agent Environments. PARA 2004: 974-982 - [c6]Dongwon Jeong, Young-Gab Kim, Soo-Hyun Park, Doo-Kwon Baik:
Uniformly Handling Metadata Registries. SERA 2004: 81-91 - [c5]Shinae Shin, Dongwon Jeong, Doo-Kwon Baik:
Conversion of Topic Map Metadata to RDF Metadata for Knowledge Retrieval on the Web. SERA 2004: 123-137 - [c4]Dongwon Jeong, Young-Gab Kim, Doo-Kwon Baik:
SQL/MDR: Query Language for Consistent Access of Metadata Registries Based on SQL3. WAIM 2004: 239-248 - [c3]Young-Gab Kim, Dongwon Jeong, Doo-Kwon Baik:
Verifying a MAC-Based Service Bundle Authentication Mechanism for the OSGi Service Platform. WAIM 2004: 684-689 - 2003
- [j1]Dongwon Jeong, Doo-Kwon Baik, Soo-Hyun Park:
A Practical Approach: Localization-Based Global Metadata Registry for Progressive Data Integration. J. Inf. Knowl. Manag. 2(4): 391-401 (2003) - [c2]Dongwon Jeong, Doo-Kwon Baik:
Multi-Layered Metadata Registry System for Distributed Metadata Management. SNPD 2003: 389-397 - 2002
- [c1]Dongwon Jeong, Doo-Kwon Baik:
AMC: An Adaptive Mobile Computing Model for Dynamic Resource Management in Distributed Computing Environments. ICOIN (2) 2002: 671-678
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2023-10-24 02:04 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint