BibTeX records: Sehun Kim

download as .bib file

@inproceedings{DBLP:conf/ismir/KimTT23,
  author       = {Sehun Kim and
                  Kazuya Takeda and
                  Tomoki Toda},
  editor       = {Augusto Sarti and
                  Fabio Antonacci and
                  Mark Sandler and
                  Paolo Bestagini and
                  Simon Dixon and
                  Beici Liang and
                  Ga{\"{e}}l Richard and
                  Johan Pauwels},
  title        = {Sequence-to-Sequence Network Training Methods for Automatic Guitar
                  Transcription With Tokenized Outputs},
  booktitle    = {Proceedings of the 24th International Society for Music Information
                  Retrieval Conference, {ISMIR} 2023, Milan, Italy, November 5-9, 2023},
  pages        = {524--531},
  year         = {2023},
  url          = {https://doi.org/10.5281/zenodo.10265341},
  doi          = {10.5281/ZENODO.10265341},
  timestamp    = {Mon, 18 Dec 2023 11:22:29 +0100},
  biburl       = {https://dblp.org/rec/conf/ismir/KimTT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ras/KimR22,
  author       = {Sehun Kim and
                  Jeha Ryu},
  title        = {Robust interaction control for environments having uncertainties},
  journal      = {Robotics Auton. Syst.},
  volume       = {151},
  pages        = {104023},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.robot.2022.104023},
  doi          = {10.1016/J.ROBOT.2022.104023},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ras/KimR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eusipco/KimHT22,
  author       = {Sehun Kim and
                  Tomoki Hayashi and
                  Tomoki Toda},
  title        = {Note-level Automatic Guitar Transcription Using Attention Mechanism},
  booktitle    = {30th European Signal Processing Conference, {EUSIPCO} 2022, Belgrade,
                  Serbia, August 29 - Sept. 2, 2022},
  pages        = {229--233},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://ieeexplore.ieee.org/document/9909659},
  timestamp    = {Tue, 25 Oct 2022 21:20:45 +0200},
  biburl       = {https://dblp.org/rec/conf/eusipco/KimHT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/robotics/KimXR19,
  author       = {Sehun Kim and
                  Wenjun Xu and
                  Hongliang Ren},
  title        = {Inverse Kinematics with a Geometrical Approximation for Multi-Segment
                  Flexible Curvilinear Robots},
  journal      = {Robotics},
  volume       = {8},
  number       = {2},
  pages        = {48},
  year         = {2019},
  url          = {https://doi.org/10.3390/robotics8020048},
  doi          = {10.3390/ROBOTICS8020048},
  timestamp    = {Mon, 28 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/robotics/KimXR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vcip/KimKKL18,
  author       = {Wontae Kim and
                  Sehun Kim and
                  Jin{-}Sung Kim and
                  Hyuk{-}Jae Lee},
  title        = {A New Update Strategy for Blocks with Low Correlation in 3-D Recursive
                  Search},
  booktitle    = {{IEEE} Visual Communications and Image Processing, {VCIP} 2018, Taichung,
                  Taiwan, December 9-12, 2018},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/VCIP.2018.8698610},
  doi          = {10.1109/VCIP.2018.8698610},
  timestamp    = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl       = {https://dblp.org/rec/conf/vcip/KimKKL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ppna/KimKPK16,
  author       = {Eunhye Kim and
                  Roger P. Karrer and
                  Ju{-}Won Park and
                  Sehun Kim},
  title        = {A novel fairness-aware parallel download scheme},
  journal      = {Peer-to-Peer Netw. Appl.},
  volume       = {9},
  number       = {1},
  pages        = {42--53},
  year         = {2016},
  url          = {https://doi.org/10.1007/s12083-014-0310-2},
  doi          = {10.1007/S12083-014-0310-2},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ppna/KimKPK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icinfa/KimXG016,
  author       = {Sehun Kim and
                  Wenjun Xu and
                  Xiaoyi Gu and
                  Hongliang Ren},
  title        = {Preliminary design and study of a bio-inspired wire-driven serpentine
                  robotic manipulator with direct drive capability},
  booktitle    = {{IEEE} International Conference on Information and Automation, {ICIA}
                  2016, Ningbo, China, August 1-3, 2016},
  pages        = {1409--1413},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICInfA.2016.7832040},
  doi          = {10.1109/ICINFA.2016.7832040},
  timestamp    = {Mon, 28 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icinfa/KimXG016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aimech/TranKLKR15,
  author       = {Quoc Van Tran and
                  Sehun Kim and
                  Kyunghwan Lee and
                  Sungchul Kang and
                  Jeha Ryu},
  title        = {Force/torque sensorless impedance control for indirect driven robot-aided
                  gait rehabilitation system},
  booktitle    = {{IEEE} International Conference on Advanced Intelligent Mechatronics,
                  {AIM} 2015, Busan, South Korea, July 7-11, 2015},
  pages        = {652--657},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/AIM.2015.7222611},
  doi          = {10.1109/AIM.2015.7222611},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aimech/TranKLKR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/urai/TranKLR15,
  author       = {Quoc Van Tran and
                  Sehun Kim and
                  Kyunghwan Lee and
                  Jeha Ryu},
  title        = {Preliminary results of force/torque sensorless impedance control for
                  Walkbot},
  booktitle    = {12th International Conference on Ubiquitous Robots and Ambient Intelligence,
                  {URAI} 2015, Goyang, South Korea, October 28-30, 2015},
  pages        = {597--602},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/URAI.2015.7358840},
  doi          = {10.1109/URAI.2015.7358840},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/urai/TranKLR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eswa/KimLK14,
  author       = {Gisung Kim and
                  Seungmin Lee and
                  Sehun Kim},
  title        = {A novel hybrid intrusion detection method integrating anomaly detection
                  with misuse detection},
  journal      = {Expert Syst. Appl.},
  volume       = {41},
  number       = {4},
  pages        = {1690--1700},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.eswa.2013.08.066},
  doi          = {10.1016/J.ESWA.2013.08.066},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eswa/KimLK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eswa/ShinLKK13,
  author       = {Seong{-}jun Shin and
                  Seungmin Lee and
                  Hyunwoo Kim and
                  Sehun Kim},
  title        = {Advanced probabilistic approach for network intrusion forecasting
                  and detection},
  journal      = {Expert Syst. Appl.},
  volume       = {40},
  number       = {1},
  pages        = {315--322},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.eswa.2012.07.057},
  doi          = {10.1016/J.ESWA.2012.07.057},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eswa/ShinLKK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdsn/KimKKK13,
  author       = {Dong{-}uk Kim and
                  Hyo{-}Won Kim and
                  Gisung Kim and
                  Sehun Kim},
  title        = {A Counterattack-Detection Scheme in Transmission Time-Based Wormhole
                  Detection Methods},
  journal      = {Int. J. Distributed Sens. Networks},
  volume       = {9},
  year         = {2013},
  url          = {https://doi.org/10.1155/2013/184931},
  doi          = {10.1155/2013/184931},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdsn/KimKKK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/music/KimK13,
  author       = {Eunhye Kim and
                  Sehun Kim},
  editor       = {James J. Park and
                  Hojjat Adeli and
                  Namje Park and
                  Isaac Woungang},
  title        = {A Novel Anomaly Detection System Based on {HFR-MLR} Method},
  booktitle    = {Mobile, Ubiquitous, and Intelligent Computing - {MUSIC} 2013, {FTRA}
                  4th International Conference on Mobile, Ubiquitous, and Intelligent
                  Computing, September 4-6, 2013, Gwangju, Korea},
  series       = {Lecture Notes in Electrical Engineering},
  volume       = {274},
  pages        = {279--286},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40675-1\_43},
  doi          = {10.1007/978-3-642-40675-1\_43},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/music/KimK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdsn/ChoiKK12,
  author       = {Jaeun Choi and
                  Gisung Kim and
                  Sehun Kim},
  title        = {A Congestion-Aware {IDS} Node Selection Method for Wireless Sensor
                  Networks},
  journal      = {Int. J. Distributed Sens. Networks},
  volume       = {8},
  year         = {2012},
  url          = {https://doi.org/10.1155/2012/582139},
  doi          = {10.1155/2012/582139},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdsn/ChoiKK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/ChoiKKK12,
  author       = {Jaeun Choi and
                  Gisung Kim and
                  Tae Ghyoon Kim and
                  Sehun Kim},
  editor       = {Dong Hoon Lee and
                  Moti Yung},
  title        = {An Efficient Filtering Method for Detecting Malicous Web Pages},
  booktitle    = {Information Security Applications - 13th International Workshop, {WISA}
                  2012, Jeju Island, Korea, August 16-18, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7690},
  pages        = {241--253},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35416-8\_17},
  doi          = {10.1007/978-3-642-35416-8\_17},
  timestamp    = {Tue, 14 May 2019 10:00:35 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/ChoiKKK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eswa/LeeKK11,
  author       = {Seungmin Lee and
                  Gisung Kim and
                  Sehun Kim},
  title        = {Self-adaptive and dynamic clustering for online anomaly detection},
  journal      = {Expert Syst. Appl.},
  volume       = {38},
  number       = {12},
  pages        = {14891--14898},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.eswa.2011.05.058},
  doi          = {10.1016/J.ESWA.2011.05.058},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eswa/LeeKK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eswa/ShimKK10,
  author       = {Woochul Shim and
                  Gisung Kim and
                  Sehun Kim},
  title        = {A distributed sinkhole detection method using cluster analysis},
  journal      = {Expert Syst. Appl.},
  volume       = {37},
  number       = {12},
  pages        = {8486--8491},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.eswa.2010.05.028},
  doi          = {10.1016/J.ESWA.2010.05.028},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eswa/ShimKK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jise/KimLKK10,
  author       = {Eunhye Kim and
                  Seungmin Lee and
                  Ki Hoon Kwon and
                  Sehun Kim},
  title        = {Feature Construction Scheme for Efficient Intrusion Detection System},
  journal      = {J. Inf. Sci. Eng.},
  volume       = {26},
  number       = {2},
  pages        = {527--547},
  year         = {2010},
  url          = {http://www.iis.sinica.edu.tw/page/jise/2010/201003\_12.html},
  timestamp    = {Fri, 16 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jise/KimLKK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvt/ShimHK10,
  author       = {Woochul Shim and
                  Younggoo Han and
                  Sehun Kim},
  title        = {Fairness-Aware Resource Allocation in a Cooperative {OFDMA} Uplink
                  System},
  journal      = {{IEEE} Trans. Veh. Technol.},
  volume       = {59},
  number       = {2},
  pages        = {932--939},
  year         = {2010},
  url          = {https://doi.org/10.1109/TVT.2009.2037328},
  doi          = {10.1109/TVT.2009.2037328},
  timestamp    = {Thu, 25 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tvt/ShimHK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/KimLK09,
  author       = {Jaehong Kim and
                  Sangjae Lee and
                  Sehun Kim},
  title        = {An Adjustable Scheduling Algorithm for Multi-User {MIMO} Systems},
  journal      = {{IEICE} Trans. Commun.},
  volume       = {92-B},
  number       = {2},
  pages        = {527--532},
  year         = {2009},
  url          = {https://doi.org/10.1587/transcom.E92.B.527},
  doi          = {10.1587/TRANSCOM.E92.B.527},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/KimLK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/KimKK09,
  author       = {Jongin Kim and
                  Dongwoo Kim and
                  Sehun Kim},
  title        = {The Capacity of Downlink Multiuser {OFDM} with Quality Based {CSI}
                  Feedback},
  journal      = {{IEICE} Trans. Commun.},
  volume       = {92-B},
  number       = {4},
  pages        = {1252--1257},
  year         = {2009},
  url          = {https://doi.org/10.1587/transcom.E92.B.1252},
  doi          = {10.1587/TRANSCOM.E92.B.1252},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/KimKK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/HanSK09,
  author       = {Younggoo Han and
                  Woochul Shim and
                  Sehun Kim},
  title        = {A Goal Programming Approach for Resource Allocation Considering Client
                  Demands in a Multiuser {OFDMA} Downlink System},
  journal      = {{IEICE} Trans. Commun.},
  volume       = {92-B},
  number       = {4},
  pages        = {1376--1379},
  year         = {2009},
  url          = {https://doi.org/10.1587/transcom.E92.B.1376},
  doi          = {10.1587/TRANSCOM.E92.B.1376},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/HanSK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/LeePLNK09,
  author       = {Seungmin Lee and
                  Tae{-}Jun Park and
                  Donghyeok Lee and
                  Taekyong Nam and
                  Sehun Kim},
  title        = {Chaotic Order Preserving Encryption for Efficient and Secure Queries
                  on Databases},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {92-D},
  number       = {11},
  pages        = {2207--2217},
  year         = {2009},
  url          = {https://doi.org/10.1587/transinf.E92.D.2207},
  doi          = {10.1587/TRANSINF.E92.D.2207},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/LeePLNK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tce/LeeSK09,
  author       = {Seungmin Lee and
                  Woochul Shim and
                  Sehun Kim},
  title        = {Hierarchical system for objectionable video detection},
  journal      = {{IEEE} Trans. Consumer Electron.},
  volume       = {55},
  number       = {2},
  pages        = {677--684},
  year         = {2009},
  url          = {https://doi.org/10.1109/TCE.2009.5174439},
  doi          = {10.1109/TCE.2009.5174439},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tce/LeeSK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/ChoiLKK09,
  author       = {Jaeun Choi and
                  Myungjong Lee and
                  Gisung Kim and
                  Sehun Kim},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Monitoring Node Selection Algorithm for Intrusion Detection in Congested
                  Sensor Network},
  booktitle    = {{SECRYPT} 2009, Proceedings of the International Conference on Security
                  and Cryptography, Milan, Italy, July 7-10, 2009, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {117--120},
  publisher    = {{INSTICC} Press},
  year         = {2009},
  timestamp    = {Thu, 10 Sep 2009 21:15:22 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/ChoiLKK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eswa/LeeKKHK08,
  author       = {Keunsoo Lee and
                  Juhyun Kim and
                  Ki Hoon Kwon and
                  Younggoo Han and
                  Sehun Kim},
  title        = {DDoS attack detection method using cluster analysis},
  journal      = {Expert Syst. Appl.},
  volume       = {34},
  number       = {3},
  pages        = {1659--1665},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.eswa.2007.01.040},
  doi          = {10.1016/J.ESWA.2007.01.040},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eswa/LeeKKHK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/KimSKKH08,
  author       = {Sehun Kim and
                  Seong{-}jun Shin and
                  Hyunwoo Kim and
                  Ki Hoon Kwon and
                  Younggoo Han},
  title        = {Hybrid Intrusion Forecasting Framework for Early Warning System},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {91-D},
  number       = {5},
  pages        = {1234--1241},
  year         = {2008},
  url          = {https://doi.org/10.1093/ietisy/e91-d.5.1234},
  doi          = {10.1093/IETISY/E91-D.5.1234},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/KimSKKH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wisa/2007,
  editor       = {Sehun Kim and
                  Moti Yung and
                  Hyung{-}Woo Lee},
  title        = {Information Security Applications, 8th International Workshop, {WISA}
                  2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4867},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-77535-5},
  doi          = {10.1007/978-3-540-77535-5},
  isbn         = {978-3-540-77534-8},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/2007.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/KwonHK07,
  author       = {Ki Hoon Kwon and
                  Younggoo Han and
                  Sehun Kim},
  title        = {Efficient Subcarrier and Power Allocation Algorithm in {OFDMA} Uplink
                  System},
  journal      = {{IEICE} Trans. Commun.},
  volume       = {90-B},
  number       = {2},
  pages        = {368--371},
  year         = {2007},
  url          = {https://doi.org/10.1093/ietcom/e90-b.2.368},
  doi          = {10.1093/IETCOM/E90-B.2.368},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/KwonHK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/KimHCK07,
  author       = {Hyunwoo Kim and
                  Younggoo Han and
                  Myeonggil Choi and
                  Sehun Kim},
  title        = {Curriculum Design and Evaluation for E-Commerce Security Education
                  Using {AHP}},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {90-D},
  number       = {3},
  pages        = {668--675},
  year         = {2007},
  url          = {https://doi.org/10.1093/ietisy/e90-d.3.668},
  doi          = {10.1093/IETISY/E90-D.3.668},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/KimHCK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/MinK07,
  author       = {Chan{-}Ho Min and
                  Sehun Kim},
  title        = {On-demand utility-based power control routing for energy-aware optimization
                  in mobile ad hoc networks},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {30},
  number       = {2},
  pages        = {706--727},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.jnca.2005.12.001},
  doi          = {10.1016/J.JNCA.2005.12.001},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/MinK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/MinK07,
  author       = {Chan{-}Ho Min and
                  Sehun Kim},
  title        = {On-Demand Utility-Based Power Control Routing for Energy-Aware Optimization
                  in Mobile Ad Hoc Networks},
  journal      = {Wirel. Pers. Commun.},
  volume       = {41},
  number       = {2},
  pages        = {259--280},
  year         = {2007},
  url          = {https://doi.org/10.1007/s11277-006-9142-6},
  doi          = {10.1007/S11277-006-9142-6},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wpc/MinK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/KimKK06a,
  author       = {Insook Kim and
                  Dongwoo Kim and
                  Sehun Kim},
  title        = {Maximization of Carried Traffic by Prioritizing New Call Attempts
                  in a {CDMA} Base Station with Finite Receiver Processors},
  journal      = {{IEICE} Trans. Commun.},
  volume       = {89-B},
  number       = {6},
  pages        = {1879--1882},
  year         = {2006},
  url          = {https://doi.org/10.1093/ietcom/e89-b.6.1879},
  doi          = {10.1093/IETCOM/E89-B.6.1879},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/KimKK06a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/JeongKK06,
  author       = {Seok Bong Jeong and
                  Hyunwoo Kim and
                  Sehun Kim},
  title        = {An Effective DDoS Attack Detection and Packet-Filtering Scheme},
  journal      = {{IEICE} Trans. Commun.},
  volume       = {89-B},
  number       = {7},
  pages        = {2033--2042},
  year         = {2006},
  url          = {https://doi.org/10.1093/ietcom/e89-b.7.2033},
  doi          = {10.1093/IETCOM/E89-B.7.2033},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/JeongKK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/ChoiKK06,
  author       = {Young{-}Woo Choi and
                  Seong{-}Lyun Kim and
                  Sehun Kim},
  title        = {On the Multihop Packet Scheduling in Uplink {DS-CDMA} Systems},
  journal      = {{IEICE} Trans. Commun.},
  volume       = {89-B},
  number       = {8},
  pages        = {2249--2253},
  year         = {2006},
  url          = {https://doi.org/10.1093/ietcom/e89-b.8.2249},
  doi          = {10.1093/IETCOM/E89-B.8.2249},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/ChoiKK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icat/KimKHOWR06,
  author       = {Yeongmi Kim and
                  Sehun Kim and
                  Taejin Ha and
                  Ian Oakley and
                  Woontack Woo and
                  Jeha Ryu},
  editor       = {Zhigeng Pan and
                  Adrian David Cheok and
                  Michael Haller and
                  Rynson W. H. Lau and
                  Hideo Saito and
                  Ronghua Liang},
  title        = {Air-Jet Button Effects in {AR}},
  booktitle    = {Advances in Artificial Reality and Tele-Existence, 16th International
                  Conference on Artificial Reality and Telexistence, {ICAT} 2006, Hangzhou,
                  China, November 29 - December 1, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4282},
  pages        = {384--391},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11941354\_39},
  doi          = {10.1007/11941354\_39},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icat/KimKHOWR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/KimK06a,
  author       = {Eunhye Kim and
                  Sehun Kim},
  title        = {Anomaly Detection in Network Security Based on Nonparametric Techniques},
  booktitle    = {{INFOCOM} 2006. 25th {IEEE} International Conference on Computer Communications,
                  Joint Conference of the {IEEE} Computer and Communications Societies,
                  23-29 April 2006, Barcelona, Catalunya, Spain},
  publisher    = {{IEEE}},
  year         = {2006},
  url          = {https://doi.org/10.1109/INFOCOM.2006.76},
  doi          = {10.1109/INFOCOM.2006.76},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/KimK06a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/JeongHKSKK06,
  author       = {Youngok Jeong and
                  Younggoo Han and
                  Hyunwoo Kim and
                  Woochul Shim and
                  Jaehong Kim and
                  Sehun Kim},
  editor       = {Jae{-}Kwang Lee and
                  Okyeon Yi and
                  Moti Yung},
  title        = {Cost-Effective {IDS} Operating Scheme in MANETs},
  booktitle    = {Information Security Applications, 7th International Workshop, {WISA}
                  2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4298},
  pages        = {198--210},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-540-71093-6\_16},
  doi          = {10.1007/978-3-540-71093-6\_16},
  timestamp    = {Tue, 14 May 2019 10:00:35 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/JeongHKSKK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cor/JeongKL05,
  author       = {Seok Bong Jeong and
                  Sehun Kim and
                  Heesoo Lee},
  title        = {Data traffic scheduling algorithm for multiuser {OFDM} system with
                  adaptive modulation considering fairness among users},
  journal      = {Comput. Oper. Res.},
  volume       = {32},
  pages        = {1723--1737},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.cor.2003.11.021},
  doi          = {10.1016/J.COR.2003.11.021},
  timestamp    = {Tue, 18 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cor/JeongKL05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisedu/KimHKC05,
  author       = {Hyunwoo Kim and
                  Younggoo Han and
                  Sehun Kim and
                  Myeonggil Choi},
  title        = {A Curriculum Design for E-Commerce Security},
  journal      = {J. Inf. Syst. Educ.},
  volume       = {16},
  number       = {1},
  pages        = {55--64},
  year         = {2005},
  url          = {https://jise.org/Volume16/n1/JISEv16n1p55.html},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisedu/KimHKC05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvt/LimK05,
  author       = {Euntaek Lim and
                  Sehun Kim},
  title        = {Transmission rate scheduling with fairness constraints in downlink
                  of {CDMA} data networks},
  journal      = {{IEEE} Trans. Veh. Technol.},
  volume       = {54},
  number       = {1},
  pages        = {328--337},
  year         = {2005},
  url          = {https://doi.org/10.1109/TVT.2004.838839},
  doi          = {10.1109/TVT.2004.838839},
  timestamp    = {Thu, 25 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tvt/LimK05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccbss/ChoiKKK05,
  author       = {Myeonggil Choi and
                  Hyunwoo Kim and
                  Eunhye Kim and
                  Sehun Kim},
  editor       = {Xavier Franch and
                  Daniel Port},
  title        = {Decision on Replacing Components of Security Functions in COTS-Based
                  Information Systems},
  booktitle    = {COTS-Based Software Systems, 4th International Conference, {ICCBSS}
                  2005, Bilbao, Spain, February 7-11, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3412},
  pages        = {11},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-30587-3\_10},
  doi          = {10.1007/978-3-540-30587-3\_10},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/iccbss/ChoiKKK05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvt/KimMK04,
  author       = {Dongwoo Kim and
                  Chan{-}Ho Min and
                  Sehun Kim},
  title        = {On-demand {SIR} and bandwidth-guaranteed routing with transmit power
                  assignment in ad hoc mobile networks},
  journal      = {{IEEE} Trans. Veh. Technol.},
  volume       = {53},
  number       = {4},
  pages        = {1215--1223},
  year         = {2004},
  url          = {https://doi.org/10.1109/TVT.2004.830140},
  doi          = {10.1109/TVT.2004.830140},
  timestamp    = {Thu, 25 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tvt/KimMK04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/JeongCK04,
  author       = {Seok Bong Jeong and
                  Young{-}Woo Choi and
                  Sehun Kim},
  editor       = {Chae Hoon Lim and
                  Moti Yung},
  title        = {An Effective Placement of Detection Systems for Distributed Attack
                  Detection in Large Scale Networks},
  booktitle    = {Information Security Applications, 5th International Workshop, {WISA}
                  2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3325},
  pages        = {204--210},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-31815-6\_17},
  doi          = {10.1007/978-3-540-31815-6\_17},
  timestamp    = {Tue, 14 May 2019 10:00:35 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/JeongCK04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cor/AhnK03,
  author       = {Koo{-}Min Ahn and
                  Sehun Kim},
  title        = {Optimal bandwidth allocation for bandwidth adaptation in wireless
                  multimedia networks},
  journal      = {Comput. Oper. Res.},
  volume       = {30},
  number       = {13},
  pages        = {1917--1929},
  year         = {2003},
  url          = {https://doi.org/10.1016/S0305-0548(02)00115-6},
  doi          = {10.1016/S0305-0548(02)00115-6},
  timestamp    = {Tue, 18 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cor/AhnK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvt/KimK03,
  author       = {Tae{-}Suk Kim and
                  Sehun Kim},
  title        = {A fast rerouting scheme using reservation in wireless {ATM}},
  journal      = {{IEEE} Trans. Veh. Technol.},
  volume       = {52},
  number       = {4},
  pages        = {1125--1142},
  year         = {2003},
  url          = {https://doi.org/10.1109/TVT.2002.807134},
  doi          = {10.1109/TVT.2002.807134},
  timestamp    = {Thu, 25 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tvt/KimK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/LeeK02a,
  author       = {Ki{-}Dong Lee and
                  Sehun Kim},
  title        = {Modeling variable user mobility with stochastic correlation concept},
  journal      = {Comput. Networks},
  volume       = {38},
  number       = {5},
  pages        = {603--612},
  year         = {2002},
  url          = {https://doi.org/10.1016/S1389-1286(01)00274-2},
  doi          = {10.1016/S1389-1286(01)00274-2},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/LeeK02a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/LeeK02b,
  author       = {Ki{-}Dong Lee and
                  Sehun Kim},
  title        = {Optimization for adaptive bandwidth reservation in wireless multimedia
                  networks},
  journal      = {Comput. Networks},
  volume       = {38},
  number       = {5},
  pages        = {631--643},
  year         = {2002},
  url          = {https://doi.org/10.1016/S1389-1286(01)00276-6},
  doi          = {10.1016/S1389-1286(01)00276-6},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/LeeK02b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cor/YeoLK02,
  author       = {Jaehyun Yeo and
                  Heesoo Lee and
                  Sehun Kim},
  title        = {An efficient broadcast scheduling algorithm for {TDMA} ad-hoc networks},
  journal      = {Comput. Oper. Res.},
  volume       = {29},
  number       = {13},
  pages        = {1793--1806},
  year         = {2002},
  url          = {https://doi.org/10.1016/S0305-0548(01)00057-0},
  doi          = {10.1016/S0305-0548(01)00057-0},
  timestamp    = {Tue, 18 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cor/YeoLK02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisedu/KimC02,
  author       = {Sehun Kim and
                  Myeonggil Choi},
  title        = {Educational Requirements Analysis for Information Security Professionals
                  in Korea},
  journal      = {J. Inf. Syst. Educ.},
  volume       = {13},
  number       = {3},
  pages        = {237--248},
  year         = {2002},
  url          = {https://jise.org/Volume13/n3/JISEv13n3p237.html},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisedu/KimC02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cor/ChoiLLKL01,
  author       = {Hong Suk Choi and
                  Heesoo Lee and
                  Ki{-}Dong Lee and
                  Sehun Kim and
                  Jong Hyup Lee},
  title        = {Optimal locations of switches and interconnections for {ATM} LANs},
  journal      = {Comput. Oper. Res.},
  volume       = {28},
  number       = {13},
  pages        = {1347--1366},
  year         = {2001},
  url          = {https://doi.org/10.1016/S0305-0548(00)00044-7},
  doi          = {10.1016/S0305-0548(00)00044-7},
  timestamp    = {Tue, 18 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cor/ChoiLLKL01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vtc/KimKSK01,
  author       = {Jongin Kim and
                  Dong{-}hoi Kim and
                  Pyeong{-}jung Song and
                  Sehun Kim},
  title        = {Design of optimum parameters for handover initiation in {WCDMA}},
  booktitle    = {Proceedings of the 54th {IEEE} Vehicular Technology Conference, {VTC}
                  Fall 2001, 7-11 October 2001, Atlantic City, New Jersey, {USA}},
  pages        = {2768--2772},
  publisher    = {{IEEE}},
  year         = {2001},
  url          = {https://doi.org/10.1109/VTC.2001.957265},
  doi          = {10.1109/VTC.2001.957265},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/vtc/KimKSK01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cor/KimK00,
  author       = {Sehun Kim and
                  Jae{-}In Kim},
  title        = {An adaptive time slot assignment algorithm for variable bandwidth
                  switching systems},
  journal      = {Comput. Oper. Res.},
  volume       = {27},
  number       = {5},
  pages        = {423--435},
  year         = {2000},
  url          = {https://doi.org/10.1016/S0305-0548(99)00060-X},
  doi          = {10.1016/S0305-0548(99)00060-X},
  timestamp    = {Tue, 18 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cor/KimK00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcc/LeeMLKKH00,
  author       = {Young Joo Lee and
                  Jae Yeol Maeng and
                  Eok{-}Kyun Lee and
                  Bongsoo Kim and
                  Sehun Kim and
                  Kyu{-}Kwang Han},
  title        = {Melting behaviors of icosahedral metal clusters studied by Monte Carlo
                  simulations},
  journal      = {J. Comput. Chem.},
  volume       = {21},
  number       = {5},
  pages        = {380--387},
  year         = {2000},
  url          = {https://doi.org/10.1002/(SICI)1096-987X(20000415)21:5\&\#60;380::AID-JCC4\&\#62;3.0.CO;2-C},
  doi          = {10.1002/(SICI)1096-987X(20000415)21:5\&\#60;380::AID-JCC4\&\#62;3.0.CO;2-C},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcc/LeeMLKKH00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/telsys/KimCK00,
  author       = {Soo{-}Hyun Kim and
                  Kun{-}Nyeong Chang and
                  Sehun Kim},
  title        = {A channel allocation for cellular mobile radio systems using simulated
                  annealing},
  journal      = {Telecommun. Syst.},
  volume       = {14},
  number       = {1-4},
  pages        = {95--106},
  year         = {2000},
  url          = {https://doi.org/10.1023/A:1019133231776},
  doi          = {10.1023/A:1019133231776},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/telsys/KimCK00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cor/KimY98,
  author       = {Sehun Kim and
                  Jaehyun Yeo},
  title        = {Optimal scheduling in cdma packet radio networks},
  journal      = {Comput. Oper. Res.},
  volume       = {25},
  number       = {3},
  pages        = {219--228},
  year         = {1998},
  url          = {https://doi.org/10.1016/S0305-0548(97)00049-X},
  doi          = {10.1016/S0305-0548(97)00049-X},
  timestamp    = {Tue, 18 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cor/KimY98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cor/ChangK97,
  author       = {Kun{-}Nyeong Chang and
                  Sehun Kim},
  title        = {Channel allocation in cellular radio networks},
  journal      = {Comput. Oper. Res.},
  volume       = {24},
  number       = {9},
  pages        = {849--860},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0305-0548(96)00098-6},
  doi          = {10.1016/S0305-0548(96)00098-6},
  timestamp    = {Tue, 18 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cor/ChangK97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijscn/KimK97,
  author       = {Soo{-}Hyun Kim and
                  Sehun Kim},
  title        = {Time slot assignment in a heterogeneous environment of a {SS/TDMA}
                  system},
  journal      = {Int. J. Satell. Commun. Netw.},
  volume       = {15},
  number       = {5},
  pages        = {197--203},
  year         = {1997},
  url          = {https://doi.org/10.1002/(SICI)1099-1247(199709/10)15:5\&\#60;197::AID-SAT576\&\#62;3.0.CO;2-J},
  doi          = {10.1002/(SICI)1099-1247(199709/10)15:5\&\#60;197::AID-SAT576\&\#62;3.0.CO;2-J},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijscn/KimK97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pimrc/ChangK96,
  author       = {Kun{-}Nyeong Chang and
                  Sehun Kim},
  title        = {Call blocking performance of new dynamic channel assignment scheme
                  in microcellular radio networks},
  booktitle    = {The 7th {IEEE} International Symposium on Personal, Indoor and Mobile
                  Radio Communications, {PIMRC} 1996, Taipei, Taiwan, October 15-18,
                  1996},
  pages        = {198--202},
  year         = {1996},
  url          = {https://doi.org/10.1109/PIMRC.1996.567545},
  doi          = {10.1109/PIMRC.1996.567545},
  timestamp    = {Thu, 28 May 2020 11:01:18 +0200},
  biburl       = {https://dblp.org/rec/conf/pimrc/ChangK96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mp/KimCL95,
  author       = {Sehun Kim and
                  Kun{-}Nyeong Chang and
                  Jun{-}Yeon Lee},
  title        = {A descent method with linear programming subproblems for nondifferentiable
                  convex optimization},
  journal      = {Math. Program.},
  volume       = {71},
  pages        = {17--28},
  year         = {1995},
  url          = {https://doi.org/10.1007/BF01592242},
  doi          = {10.1007/BF01592242},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mp/KimCL95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/orl/KimU93,
  author       = {Sehun Kim and
                  Bong{-}sik Um},
  title        = {An improved subgradient method for constrained nondifferentiable optimization},
  journal      = {Oper. Res. Lett.},
  volume       = {14},
  number       = {1},
  pages        = {61--64},
  year         = {1993},
  url          = {https://doi.org/10.1016/0167-6377(93)90020-H},
  doi          = {10.1016/0167-6377(93)90020-H},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/orl/KimU93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mp/KimAC91,
  author       = {Sehun Kim and
                  Hyunsil Ahn and
                  Seong{-}Cheol Cho},
  title        = {Variable target value subgradient method},
  journal      = {Math. Program.},
  volume       = {49},
  pages        = {359--369},
  year         = {1991},
  url          = {https://doi.org/10.1007/BF01588797},
  doi          = {10.1007/BF01588797},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mp/KimAC91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mp/KimA91,
  author       = {Sehun Kim and
                  Hyunsil Ahn},
  title        = {Convergence of a generalized subgradient method for nondifferentiable
                  convex optimization},
  journal      = {Math. Program.},
  volume       = {50},
  pages        = {75--80},
  year         = {1991},
  url          = {https://doi.org/10.1007/BF01594925},
  doi          = {10.1007/BF01594925},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mp/KimA91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cor/Kim86,
  author       = {Sehun Kim},
  title        = {Computation of a large-scale competitive equilibrium through optimization},
  journal      = {Comput. Oper. Res.},
  volume       = {13},
  number       = {4},
  pages        = {507--515},
  year         = {1986},
  url          = {https://doi.org/10.1016/0305-0548(86)90038-9},
  doi          = {10.1016/0305-0548(86)90038-9},
  timestamp    = {Tue, 18 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cor/Kim86.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mp/Kim84,
  author       = {Sehun Kim},
  title        = {Economic planning with institutional price constraints for a decentralized
                  economy},
  journal      = {Math. Program.},
  volume       = {29},
  number       = {1},
  pages        = {100--112},
  year         = {1984},
  url          = {https://doi.org/10.1007/BF02591732},
  doi          = {10.1007/BF02591732},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mp/Kim84.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}