Jinyong Kim

Learn More
In a model, two players, heterogeneous in their information quality, compete with each other with perfect information about the other player's information quality. If they can decide their timings of actions endogenously, the less-informed player has an incentive to delay her action for learning. On the other hand, the more-informed player wants to delay(More)
This paper introduces an optimal path finding problem for drone battery charging where their batteries should be charged for the travel from a source to a destination as needed. We present a practically reasonable heuristic to solve the problem by monitoring drones' battery status and traffic conditions in real time through a cloud-based service called(More)
This paper proposes Travel Prediction-based Data forwarding (TPD), tailored and optimized for multihop vehicle-to-vehicle communications. The previous schemes forward data packets mostly utilizing statistical information about road network traffic, which becomes much less accurate when vehicles travel in a light-traffic vehicular network. In this(More)
This paper proposes a framework for security services using Software-Defined Networking (SDN) and Interface to Network Security Functions (I2NSF). It specifies requirements for such a framework for security services based on network virtualization. It describes two representative security systems, such as (i) centralized firewall system and (ii) DDoS-attack(More)
  • 1