Hyun-Kyo Lim

Hyun-Kyo Lim
Korea University of Technology and Education | KOREATECH · Computer Engineering

About

25
Publications
14,015
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
268
Citations

Publications

Publications (25)
Article
Full-text available
Edge-cloud computing is an emerging approach in which tasks are offloaded from mobile devices to edge or cloud servers. However, Task offloading may result in increased energy consumption and delays, and the decision to offload the task is dependent on various factors such as time-varying radio channels, available computation resources, and the loc...
Preprint
Full-text available
Edge-cloud computing is an emerging approach in which tasks are offloaded from mobile devices to edge or cloud servers. However, Task offloading may result in increased energy consumption and delays, and the decision to offload the task is dependent on various factors such as time-varying radio channels, available computation resources, and the loc...
Article
Full-text available
Virtual network embedding (VNE) is a promising technique enabling 5G networks to satisfy the given requirements of each service via network virtualization. For better performance of the embedding algorithm, it is necessary to automatically detect the network status and provide an optimal embedding decision. However, existing VNE algorithms disregar...
Article
Full-text available
Nowadays, Reinforcement Learning (RL) is applied to various real-world tasks and attracts much attention in the fields of games, robotics, and autonomous driving. It is very challenging and devices overwhelming to directly apply RL to real-world environments. Due to the reality gap simulated environment does not match perfectly to the real-world sc...
Article
Full-text available
This paper proposes a deep recurrent neural network (RNN)-based traffic classification scheme (deep RNN-TCS) for classifying applications from traffic patterns in a hybrid edge computing and cloud computing architecture.We can also classify traffic from a cloud server, but there will be a time delay when packets transfer to the server. Therefore, t...
Article
Full-text available
Reinforcement learning has recently been studied in various fields and also used to optimally control IoT devices supporting the expansion of Internet connection beyond the usual standard devices. In this paper, we try to allow multiple reinforcement learning agents to learn optimal control policy on their own IoT devices of the same type but with...
Article
Full-text available
Rotary inverted pendulum is an unstable and highly nonlinear device, and has been used as a common application model in nonlinear control engineering field. In this paper, we use a rotary inverted pendulum as a deep reinforcement learning environment. The real device is composed of a cyber environment and physical environment based on OpenFlow netw...
Article
Full-text available
As smart phones have rapidly proliferated over the past few years, LTE operators endeavor to cope with large mobile data traffic volumes. To solve such problems, we propose a new distributed LTE/EPC network architecture based on SDN, NFV, and cloud computing supporting distributed P-GWs and centralized control plane in LTE/EPC networks. It is desig...
Article
Recently, the great number of mobile devices causes excessive data/control traffic problems in the centralized LTE/EPC network and such dramatically increased traffic is emerging as a critical issue. In the Centralized Mobility Management (CMM) based LTE/EPC network, the Packet Data Network Gateway (P-GW) plays the centralized mobility anchor role...
Article
Mobility arises naturally in the Internet of Things networks, since the location of mobile objects, e.g., mobile agents, mobile software, mobile things, or users with wireless hardware, changes as they move. Tracking their current location is essential to mobile computing. To overcome the scalability problem, hierarchical architectures of location...
Article
In order to find meaningful patterns of research trends in the computer science and engineering field, we crawl a significant amount of bibliographic information, 3 million or more scholarly papers published from 1956 to 2015. We also make a list of target key words and analyze their frequency rate over the past 60 years based on the terms extracte...
Article
Utilization of the Constrained Application Protocol (CoAP) that is an important protocol of the Internet of Things (IoT) has increased. So the many associated libraries related with CoAP are also emerging. Among those libraries, CoAPthon, a representative Python-based CoAP library, has advantage in aspect of easy-to-use programming interface to exp...
Chapter
As smart phone has rapidly proliferated over the past few years, LTE operators endeavor to cope with large mobile data traffic volumes. To solve such problems, we propose a new SDN-based distributed mobility management supporting distributed P-GWs and centralized control plane in LTE/EPC networks. For enhancing network performance more, we also pro...
Article
In journal manuscript submission and review systems, authors can submit their manuscript at any time and editorial members are struggling to find proper reviewers for the submitted manuscripts and assign them to such reviewers. In order to solve this problem, we propose a greedy algorithm and a genetic algorithm to recommend proper reviewers for th...

Network

Cited By