Bumwook Roh, Ph.D. - Publications

Affiliations: 
2007 Pennsylvania State University, State College, PA, United States 
Area:
Materials Science Engineering

98 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2019 Ali J, Roh BH, Lee S. QoS improvement with an optimum controller selection for software-defined networks. Plos One. 14: e0217631. PMID 31150473 DOI: 10.1371/journal.pone.0217631  0.4
2018 Roh BY, Lee WJ, Seo JU, Lee UY, Lee SS. Analysis of forensic odontological examinations at the National Forensic Service of Korea from 2011 to 2015. Legal Medicine (Tokyo, Japan). 32: 37-42. PMID 29505966 DOI: 10.1016/j.legalmed.2018.02.007  0.52
2017 Roh BY, Lee WJ, Ryu JW, Ahn JM, Yoon CL, Lee SS. The application of the Kvaal method to estimate the age of live Korean subjects using digital panoramic radiographs. International Journal of Legal Medicine. PMID 29260393 DOI: 10.1007/s00414-017-1762-8  0.52
2017 Cho SY, Kim E, Park SH, Roh BD, Lee CY, Lee SJ, Jung IY. Effect of Topical Anesthesia on Pain from Needle Insertion and Injection and Its Relationship with Anxiety in Patients Awaiting Apical Surgery: A Randomized Double-blind Clinical Trial. Journal of Endodontics. PMID 28110919 DOI: 10.1016/j.joen.2016.10.036  0.6
2016 Jang Y, Ferracane JL, Pfeifer CS, Park JW, Shin Y, Roh BD. Effect of Insufficient Light Exposure on Polymerization Kinetics of Conventional and Self-adhesive Dual-cure Resin Cements. Operative Dentistry. PMID 27689771 DOI: 10.2341/15-278-L  0.32
2016 Jang Y, Hong HT, Chun HJ, Roh BD. Influence of Dentoalveolar Ankylosis on the Biomechanical Response of a Single-rooted Tooth and Surrounding Alveolar Bone: A 3-dimensional Finite Element Analysis. Journal of Endodontics. PMID 27614415 DOI: 10.1016/j.joen.2016.07.018  0.32
2016 Jang Y, Lee SJ, Yoon TC, Roh BD, Kim E. Survival Rate of Teeth with a C-shaped Canal after Intentional Replantation: A Study of 41 Cases for up to 11 Years. Journal of Endodontics. PMID 27421974 DOI: 10.1016/j.joen.2016.05.010  0.6
2016 Kim JE, Kim JH, Shim JS, Roh BD, Shin Y. Effect of Surface Treatment on Shear Bond Strength between Resin Cement and Ce-TZP/Al2O3. Biomed Research International. 2016: 7576942. PMID 27382569 DOI: 10.1155/2016/7576942  0.6
2016 Kim JY, Cho GY, Roh BD, Shin Y. Effect of curing mode on shear bond strength of self-adhesive cement to composite blocks Materials. 9. DOI: 10.3390/ma9030210  0.6
2016 Syed I, Roh BH. Adaptive backoff algorithm for contention window for dense IEEE 802.11 WLANs Mobile Information Systems. 2016. DOI: 10.1155/2016/8967281  0.36
2016 Lee BU, Roh BH, Ahn MK, Kim YH. Poster: Worm propagation model for cyber warfare modeling and simulation in tactical networks Mobisys 2016 Companion - Companion Publication of the 14th Annual International Conference On Mobile Systems, Applications, and Services. 49. DOI: 10.1145/2938559.2948858  0.36
2016 Shan G, Roh BH. Poster: Discovery of disappeared node in large number of BLE devices environment Mobisys 2016 Companion - Companion Publication of the 14th Annual International Conference On Mobile Systems, Applications, and Services. 77. DOI: 10.1145/2938559.2948853  0.36
2016 Lee GM, Kim K, Roh BH. A routing control overhead mitigation method for route setup in Cognitive Radio Networks Proceedings - Ieee Infocom. 2016: 1041-1042. DOI: 10.1109/INFCOMW.2016.7562243  0.36
2016 Shan G, Im SY, Roh BH. Optimal AdvInterval for BLE scanning in different number of BLE devices environment Proceedings - Ieee Infocom. 2016: 1031-1032. DOI: 10.1109/INFCOMW.2016.7562238  0.36
2016 Im SY, Shin SH, Ryu KY, Roh BH. Performance evaluation of network scanning tools with operation of firewall International Conference On Ubiquitous and Future Networks, Icufn. 2016: 876-881. DOI: 10.1109/ICUFN.2016.7537162  0.36
2016 Lee J, Cho KY, Kim JY, Park S, Roh BD, shin Y. Bonding effectiveness of different dentin conditions on etch-and-rinse mode of two universal adhesives: the confocal laser scanning and shear bond strength Journal of Adhesion Science and Technology. 1-10. DOI: 10.1080/01694243.2016.1235079  0.6
2016 Kim B, Lee GM, Roh BH. Adaptive sensing period adjustment scheme in cognitive radio sensor networks Ad-Hoc and Sensor Wireless Networks. 32: 99-113.  0.36
2015 Jang Y, Ihm JJ, Baik SJ, Yoo KJ, Jang DH, Roh BD, Seo DG. Dentin wear after simulated toothbrushing with water, a liquid dentifrice or a standard toothpaste. American Journal of Dentistry. 28: 333-6. PMID 26846038  0.32
2015 Jang Y, Choi YJ, Lee SJ, Roh BD, Park SH, Kim E. Prognostic Factors for Clinical Outcomes in Autotransplantation of Teeth with Complete Root Formation: Survival Analysis for up to 12 Years. Journal of Endodontics. PMID 26686824 DOI: 10.1016/j.joen.2015.10.021  0.6
2015 Kim JH, Cho BH, Lee JH, Kwon SJ, Yi YA, Shin Y, Roh BD, Seo DG. Influence of preparation design on fit and ceramic thickness of CEREC 3 partial ceramic crowns after cementation. Acta Odontologica Scandinavica. 73: 107-13. PMID 25299600 DOI: 10.3109/00016357.2014.956145  0.6
2015 Kim B, Kim K, Roh BH. ENC-MAC: Energy-efficient non-overlapping channel MAC for cognitive radio enabled sensor networks Ksii Transactions On Internet and Information Systems. 9: 4367-4386. DOI: 10.3837/tiis.2015.11.006  0.36
2015 Kim B, Lee GM, Roh BH. MAC Protocol for Quality-Aware Real-Time Voice Delivery in Cognitive Radio-Enabled WSNs International Journal of Distributed Sensor Networks. 2015. DOI: 10.1155/2015/952951  0.36
2015 Shan G, Park BH, Nam SH, Kim B, Roh BH, Ko YB. A 3-dimensional triangulation scheme to improve the accuracy of indoor localization for IoT services Ieee Pacific Rim Conference On Communications, Computers, and Signal Processing - Proceedings. 2015: 359-363. DOI: 10.1109/PACRIM.2015.7334862  0.36
2015 Lee BU, Im SY, Lee SW, Kim B, Roh BH, Ko YB. The beacon identification using low pass filter for Physical Web based IoT services Ieee Pacific Rim Conference On Communications, Computers, and Signal Processing - Proceedings. 2015: 354-358. DOI: 10.1109/PACRIM.2015.7334861  0.36
2015 Lee MH, Im SY, Lee BU, Roh BH, Kim BM. Red-signal delay scheme to prevent vehicle accidents at the intersection International Conference On Ubiquitous and Future Networks, Icufn. 2015: 232-236. DOI: 10.1109/ICUFN.2015.7182540  0.36
2015 Syed I, Kim B, Roh BH, Oh IH. A novel contention window backoff algorithm for IEEE 802.11 wireless networks 2015 Ieee/Acis 14th International Conference On Computer and Information Science, Icis 2015 - Proceedings. 71-75. DOI: 10.1109/ICIS.2015.7166572  0.36
2015 Jang Y, Song M, Yoo IS, Song Y, Roh BD, Kim E. A Randomized Controlled Study of the Use of ProRoot Mineral Trioxide Aggregate and Endocem as Direct Pulp Capping Materials: 3-month versus 1-year Outcomes Journal of Endodontics. 41: 1201-1206. DOI: 10.1016/j.joen.2015.03.015  0.6
2015 Jang Y, Hong HT, Chun HJ, Roh BD. Influence of apical root resection on the biomechanical response of a single-rooted tooth - Part 2: Apical root resection combined with periodontal bone loss Journal of Endodontics. 41: 412-416. DOI: 10.1016/j.joen.2014.11.011  0.6
2015 Ahn HJ, Kim HS, Kim GH, Park CK, Hong GH, Jin SW, Lee HG, Jung KJ, Lee JS, Kim TS, Won JG, Roh BR, Park KH, Sa JW, Choi CH, et al. Manufacturing progress on the first sector and lower ports for ITER vacuum vessel Fusion Engineering and Design. DOI: 10.1016/j.fusengdes.2016.02.012  0.4
2015 Jang Y, Ihm JJ, Baik SJ, Yoo KJ, Jang DH, Roh BD, Seo DG. Dentin wear after simulated toothbrushing with water, a liquid dentifrice or a standard toothpaste American Journal of Dentistry. 28: 333-336.  0.6
2014 Jang Y, Hong HT, Roh BD, Chun HJ. Influence of apical root resection on the biomechanical response of a single-rooted tooth: a 3-dimensional finite element analysis Journal of Endodontics. 40: 1489-1493. PMID 25146040 DOI: 10.1016/j.joen.2014.03.006  0.6
2014 Kim B, Lee GM, Roh BH. ASPD: Adaptive sensing period decision for time-varying channel in military MANETs Proceedings - Ieee Military Communications Conference Milcom. 643-648. DOI: 10.1109/MILCOM.2014.113  0.36
2014 Kwon S, Kim B, Roh BH. Preemptive opportunistic MAC protocol in distributed cognitive radio networks Ieee Communications Letters. 18: 1155-1158. DOI: 10.1109/LCOMM.2014.2327963  0.36
2013 Shin Y, Kim Y, Roh BD. Maxillary first molar with an O-shaped root morphology: Report of a case International Journal of Oral Science. 5: 242-244. PMID 24008268 DOI: 10.1038/ijos.2013.68  0.6
2013 Kim K, Choi S, Kim S, Roh BH. A push-enabling scheme for live streaming system in content-centric networking Conext Student Workhop 2013 - Proceedings of the 2013 Workshop. 49-51. DOI: 10.1145/2537148.2537162  0.36
2013 Kim E, Kim B, Roh BH. Enhanced message concatenation (EMC) Scheme for QoS provision in multi-hop combat net radio Proceedings - Ieee Military Communications Conference Milcom. 1057-1062. DOI: 10.1109/MILCOM.2013.183  0.36
2013 Weldu HB, Kim B, Roh BH. Deterministic approach to rendezvous channel setup in cognitive radio networks International Conference On Information Networking. 690-695. DOI: 10.1109/ICOIN.2013.6496711  0.36
2013 Choi S, Kim K, Kim S, Roh BH. Threat of DoS by interest flooding attack in content-centric networking International Conference On Information Networking. 315-319. DOI: 10.1109/ICOIN.2013.6496396  0.36
2013 Kim BC, Lee YJ, Hong KH, Sa JW, Kim HS, Park CK, Ahn HJ, Bak JS, Jung KJ, Park KH, Roh BR, Kim TS, Lee JS, Jung YH, Sung HJ, et al. Fabrication progress of the ITER vacuum vessel sector in Korea Fusion Engineering and Design. 88: 1960-1964. DOI: 10.1016/j.fusengdes.2013.01.012  0.4
2013 Roh BH, Kim JW, Ryu KY, Ryu JT. A whitelist-based countermeasure scheme using a Bloom filter against SIP flooding attacks Computers and Security. 37: 46-61. DOI: 10.1016/j.cose.2013.04.001  0.36
2013 Kim JY, Kim B, Roh BH. An enhanced DAP-NAD scheme for multi-hop broadcast based on MIL-STD-188-220 networks International Conference On Advanced Communication Technology, Icact. 552-557.  0.36
2013 Kim JY, Jung JK, Kim EH, Roh BH. Additional bump slot allocation scheme for QoS guarantee of urgent messages in TDMA-based Tactical Wireless networks International Conference On Advanced Communication Technology, Icact. 439-444.  0.36
2013 Kim B, Tuan NM, Roh BH, Kim DY, Park SB. Decentralized spectrum selection algorithm to consider hardware constraints in Cognitive Radio Ad-Hoc Networks International Conference On Advanced Communication Technology, Icact. 755-759.  0.36
2012 Ismail A, Roh BH. Enhancing MIH for optimum network performance and handovers in heterogeneous networks Annual Ieee Communications Society Conference On Sensor, Mesh and Ad Hoc Communications and Networks Workshops. 1: 42-44. DOI: 10.1109/SECON.2012.6275808  0.36
2012 Lee SH, Lee HJ, Kim JH, Hoh M, Shin SH, Kim T, Roh BH. Active buffer management algorithm for silence suppressed voice applications Proceedings - Ieee Military Communications Conference Milcom. DOI: 10.1109/MILCOM.2012.6415861  0.36
2012 Lee Y, Kim K, Roh BH. DDoS attack by file request redirection in Kad P2P network Proceedings of the 2012 International Conference On Cyber-Enabled Distributed Computing and Knowledge Discovery, Cyberc 2012. 497-500. DOI: 10.1109/CyberC.2012.91  0.36
2012 Kang J, Roh BH, Ryu K. Perceived affordance based tangible interfaces for augmented virtuality simulation of aerospace Information. 15: 4101-4112.  0.36
2012 Lee Y, Koo H, Choi S, Roh BH, Lee C. Advanced node insertion attack with availability falsification in Kademlia-based P2P networks International Conference On Advanced Communication Technology, Icact. 73-76.  0.36
2012 Koo H, Lee Y, Kim K, Roh BH, Lee C. A DDoS attack by flooding normal control messages in Kad P2P networks International Conference On Advanced Communication Technology, Icact. 213-216.  0.36
2011 Ismail A, Roh BH. Adaptive handovers in heterogeneous networks using fuzzy MADM Proceedings - 2011 International Conference On Mobile It-Convergence, Icmic 2011. 99-104.  0.36
2011 Kang JS, Roh BH. Geo-cloud space of 3D perception for stereoscopic camera navigation and localization Information. 14: 3395-3407.  0.36
2011 Kim B, Jung JK, Kim K, Roh BH. Label-switched routing protocol with local multi-paths for reliable message delivery in ubiquitous tactical MANET environments Information. 14: 2251-2269.  0.36
2011 Koo H, Kim K, Park HJ, Roh BH, Kang JS. Available-bandwidth estimation considering transmission overheads in IEEE 802.11 wireless LANs Information. 14: 2293-2306.  0.36
2011 Kang J, Roh BH. Hierarchical graphical model-based object identification and categorization for smartphone Information. 14: 2071-2086.  0.36
2011 Kim B, Chang J, Roh BH, Ko YB. Control packet scheduling first for fast route discovery in tactical MANET International Conference On Advanced Communication Technology, Icact. 926-930.  0.36
2011 Kim K, Roh BH, Ko YB, Choi WJ, Son ES. Survivability measure for multichannel MANET-based tactical networks International Conference On Advanced Communication Technology, Icact. 1049-1053.  0.36
2010 Jung JK, Ryu KY, Roh BH. Mission-critical packet transfer with explicit path selection in WMN-based tactical networks 2010 Wireless Telecommunications Symposium, Wts 2010. DOI: 10.1109/WTS.2010.5479658  0.36
2010 Lee SW, Choi JY, Lim KW, Ko YB, Roh BH. A reliable and hybrid multi-path routing protocol for multi-interface tactical ad hoc networks Proceedings - Ieee Military Communications Conference Milcom. 2237-2242. DOI: 10.1109/MILCOM.2010.5680384  0.36
2010 Kim J, Roh BH, Hong M, Kang S, Lee SU. Autonomous defense against flooding-based denial of service of a SIP system 2010 Long Island Systems, Applications and Technology Conference, Lisat 10. DOI: 10.1109/LISAT.2010.5478293  0.36
2010 Kim B, Kim K, Koo HL, Roh BH, Kim YS, Jin JS. Tactical network design and simulator with wireless mesh network-based backbone architecture 2010 Long Island Systems, Applications and Technology Conference, Lisat 10. DOI: 10.1109/LISAT.2010.5478270  0.36
2010 Kim B, Park H, Kim K, Roh BH. Label-switched multi-path routing for mission-critical tactical message delivery 2010 Proceedings of the 5th International Conference On Ubiquitous Information Technologies and Applications, Cute 2010. DOI: 10.1109/ICUT.2010.5677892  0.36
2010 Shin JB, Roh BH. TDMA frame format analysis for applying Policy based management to TDL system 2010 Proceedings of the 5th International Conference On Ubiquitous Information Technologies and Applications, Cute 2010. DOI: 10.1109/ICUT.2010.5677812  0.36
2010 Rho S, Park H, Roh BH, Paik EK, Choi WJ, Son ES. Group mobility model based on mobility prediction in tactical network on-the-move 2010 Proceedings of the 5th International Conference On Ubiquitous Information Technologies and Applications, Cute 2010. DOI: 10.1109/ICUT.2010.5677804  0.36
2010 Park HJ, Roh BH. Accurate Passive Bandwidth Estimation (APBE) in IEEE 802.11 wireless LANs 2010 Proceedings of the 5th International Conference On Ubiquitous Information Technologies and Applications, Cute 2010. DOI: 10.1109/ICUT.2010.5677782  0.36
2010 Kang JS, Roh BH. Development of tangible user interface for linking context modeling and 3D map in smartphone 2010 International Congress On Ultra Modern Telecommunications and Control Systems and Workshops, Icumt 2010. 44-49. DOI: 10.1109/ICUMT.2010.5676660  0.36
2010 Zafar S, Akbar AH, Amjad M, Shams S, Chaudhry SA, Seuk J, Roh BH, Kim KH. BRIDGE: Border-node assIstance for diffusion through a gating mechanism for collocated WPANs Proceedings - 2010 6th International Conference On Emerging Technologies, Icet 2010. 76-81. DOI: 10.1109/ICET.2010.5638378  0.36
2009 Seo D, Yi Y, Roh B. The effect of preparation designs on the marginal and internal gaps in Cerec3 partial ceramic crowns Journal of Dentistry. 37: 374-382. PMID 19282083 DOI: 10.1016/j.jdent.2009.01.008  0.6
2009 Ryu JT, Roh BH, Ryu KY. Detection of SIP flooding attacks based on the upper bound of the possible number of SIP messages Ksii Transactions On Internet and Information Systems. 3: 507-526. DOI: 10.3837/tiis.2009.05.006  0.36
2009 Ha SY, Kim CC, Kang SU, Roh BH. Korean public sector plan for the enhancement of IPTV service 2009 9th International Symposium On Communications and Information Technology, Iscit 2009. 284-289. DOI: 10.1109/ISCIT.2009.5341241  0.36
2009 Hong KT, Roh BH. Service differentiation with the adjustment of remaining backoff time in IEEE 802.11 wireless LAN International Conference On Advanced Communication Technology, Icact. 3: 1863-1866.  0.36
2009 Koo HL, Roh BH, Park YK, Kim SE, Kim YS. Data delivery with end-to-end QoS guarantee in tactical network interconnected with wireless Ad-hoc network and heterogeneous networks International Conference On Advanced Communication Technology, Icact. 1: 804-809.  0.36
2008 Kim SH, Roh BH. Fast detection of distributed global scale network attack symptoms and patterns in high-speed backbone networks Ksii Transactions On Internet and Information Systems. 2: 135-149. DOI: 10.3837/tiis.2008.03.001  0.36
2008 Cha HS, Ryu JT, Roh BH, Kim JW, Jeong HC. Detection of SIP de-registration and call-disruption attacks using a retransmission mechanism and a countermeasure scheme Sitis 2008 - Proceedings of the 4th International Conference On Signal Image Technology and Internet Based Systems. 650-656. DOI: 10.1109/SITIS.2008.56  0.36
2008 Jung SR, Lee JH, Roh BH. An optimized node-disjoint multi-path routing protocol for multimedia data transmission over wireless sensor networks Proceedings of the 2008 International Symposium On Parallel and Distributed Processing With Applications, Ispa 2008. 958-963. DOI: 10.1109/ISPA.2008.64  0.36
2008 Ryu JT, Roh BH, Hong MP, Kim HK, Kim JW. Analysis and its solution on security threats in sip-based mobility support environments 2008 International Conference On Innovations in Information Technology, Iit 2008. 603-607. DOI: 10.1109/INNOVATIONS.2008.4781767  0.36
2008 Choi W, Yoon M, Roh BH. Backward channel protection based on Randomized tree-walking algorithm and its analysis for securing RFID tag information and privacy Ieice Transactions On Communications. 172-182. DOI: 10.1093/ietcom/e91-b.1.172  0.36
2008 Roh BS, Kwon OH, Hong SJ, Kim J. The exclusion of malicious routing peers in structured P2P systems Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4461: 43-50. DOI: 10.1007/978-3-540-79705-0_4  0.32
2008 Roh BH, Kim DH, Cho MK, Park YL, Whang KU. Expression of heat shock protein 70 in human skin cells as a photoprotective function after uv exposure Annals of Dermatology. 20: 184-189.  0.4
2007 Lee YW, Roh BH, Ki CS, Park YL, Shin HB, Lee YK, Choi TY, Whang KU. Identification of a novel mutation in the PTCH gene in a Korean family with naevoid basal cell carcinoma syndrome [2] Clinical and Experimental Dermatology. 32: 202-203. PMID 16780502 DOI: 10.1111/j.1365-2230.2006.02142.x  0.4
2007 Roh B, Macdonald DD. The impact of oxygen vacancies on the oxygen electrode reaction on anodic oxide films on titanium Ecs Transactions. 3: 57-68. DOI: 10.1149/1.2789270  0.96
2007 Roh B, Macdonald DD. Effect of oxygen vacancies in anodic titanium oxide films on the kinetics of the oxygen electrode reaction Russian Journal of Electrochemistry. 43: 125-135. DOI: 10.1134/S1023193507020012  0.96
2007 Yoon M, Roh BH. A novel low-power bus design for bus-invert coding Ieice Transactions On Electronics. 731-734. DOI: 10.1093/ietele/e90-c.4.731  0.36
2007 Roh BH, Whang KU, Kim YM, Cho MK, Park YL, Lee JS. A case of childhood hobnail hemangioma Korean Journal of Dermatology. 45: 979-982.  0.4
2007 Roh BH, Whang KU, Cho MK, Park YL, Lee JS, Lee CW. A study of apoptosis in pemphigus vulgaris Korean Journal of Dermatology. 45: 650-658.  0.4
2006 Roh BD, Lee YE. Analysis of 154 cases of teeth with cracks Dental Traumatology. 22: 118-123. PMID 16643285 DOI: 10.1111/j.1600-9657.2006.00347.x  0.6
2006 Jin GC, Lee SJ, Roh BD. Anatomical study of C-shaped canals in mandibular second molars by analysis of computed tomography Journal of Endodontics. 32: 10-13. PMID 16410060 DOI: 10.1016/j.joen.2005.10.007  0.6
2006 Roh BH, Park SJ, Lee SY, Lee JS, Whang KU. A case of nevoid basal cell carcinoma syndrome with meningioma aad sclerosing stromal tumor of the ovary Korean Journal of Dermatology. 44: 1030-1033.  0.4
2006 Park SJ, Roh BH, Lee JS, Cho MK, Whang KU. A case of eccrine poroma on the scalp Korean Journal of Dermatology. 44: 633-635.  0.4
2006 Choi W, Roh BH. Backward channel protection method for RFID security schemes based on tree-walking algorithms Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3983: 279-287.  0.36
2005 Roh BD, Chung JH. Micro-shear bond strength of five resin-based composites to dentin with five different dentin adhesives American Journal of Dentistry. 18: 333-337. PMID 16433402  0.6
2005 Jin GC, Kim KD, Roh BD, Lee CY, Lee SJ. Buccal bone plate thickness of the Asian people Journal of Endodontics. 31: 430-434. PMID 15917681 DOI: 10.1097/01.don.0000145430.35906.fa  0.6
2005 Lee YH, Kim HJ, Roh BH, Yoo SW, Oh YC. Tree-based classification algorithm for heterogeneous unique item ID schemes Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3823: 1078-1087. DOI: 10.1007/11596042_110  0.36
2005 Roh B, Macdonald DD. Evidence for the involvement of oxygen vacancies in the oxygen electrode reaction on passive titanium Proceedings - Electrochemical Society. 254-263.  0.96
2005 Lee HT, Jo YH, Roh BH, Yoo SW. Energy-efficient cluster reconfiguration with fair cluster formations in sensor networks Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3823: 1118-1127.  0.36
2005 Lee HT, Son DH, Roh BH, Yoo SW, Oh YC. Energy-saving cluster formation algorithm in wireless sensor networks Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3794: 917-926.  0.36
2005 Roh BH, Choi W, Yoon M, Yoo SW. A novel traffic control architecture against global-scale network attacks in highspeed internet backbone networks Lecture Notes in Computer Science. 3391: 853-863.  0.36
2004 Choi W, Roh BH, Yoo SW, Min SW. Measures for detecting network attacks at the aggregate traffic level on high-speed internet backbone links Proceedings of the International Conference On Security and Management, Sam'04. 173-176.  0.36
2004 Roh BG, Kim CS, Lee SU. Progressive coding of binary voxel models based on pattern code representation Ieice Transactions On Fundamentals of Electronics, Communications and Computer Sciences. 3334-3342.  0.44
Show low-probability matches.