default search action
BibTeX records: Sehun Kim
@inproceedings{DBLP:conf/ismir/KimTT23, author = {Sehun Kim and Kazuya Takeda and Tomoki Toda}, editor = {Augusto Sarti and Fabio Antonacci and Mark Sandler and Paolo Bestagini and Simon Dixon and Beici Liang and Ga{\"{e}}l Richard and Johan Pauwels}, title = {Sequence-to-Sequence Network Training Methods for Automatic Guitar Transcription With Tokenized Outputs}, booktitle = {Proceedings of the 24th International Society for Music Information Retrieval Conference, {ISMIR} 2023, Milan, Italy, November 5-9, 2023}, pages = {524--531}, year = {2023}, url = {https://doi.org/10.5281/zenodo.10265341}, doi = {10.5281/ZENODO.10265341}, timestamp = {Mon, 18 Dec 2023 11:22:29 +0100}, biburl = {https://dblp.org/rec/conf/ismir/KimTT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ras/KimR22, author = {Sehun Kim and Jeha Ryu}, title = {Robust interaction control for environments having uncertainties}, journal = {Robotics Auton. Syst.}, volume = {151}, pages = {104023}, year = {2022}, url = {https://doi.org/10.1016/j.robot.2022.104023}, doi = {10.1016/J.ROBOT.2022.104023}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ras/KimR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eusipco/KimHT22, author = {Sehun Kim and Tomoki Hayashi and Tomoki Toda}, title = {Note-level Automatic Guitar Transcription Using Attention Mechanism}, booktitle = {30th European Signal Processing Conference, {EUSIPCO} 2022, Belgrade, Serbia, August 29 - Sept. 2, 2022}, pages = {229--233}, publisher = {{IEEE}}, year = {2022}, url = {https://ieeexplore.ieee.org/document/9909659}, timestamp = {Tue, 25 Oct 2022 21:20:45 +0200}, biburl = {https://dblp.org/rec/conf/eusipco/KimHT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/robotics/KimXR19, author = {Sehun Kim and Wenjun Xu and Hongliang Ren}, title = {Inverse Kinematics with a Geometrical Approximation for Multi-Segment Flexible Curvilinear Robots}, journal = {Robotics}, volume = {8}, number = {2}, pages = {48}, year = {2019}, url = {https://doi.org/10.3390/robotics8020048}, doi = {10.3390/ROBOTICS8020048}, timestamp = {Mon, 28 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/robotics/KimXR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vcip/KimKKL18, author = {Wontae Kim and Sehun Kim and Jin{-}Sung Kim and Hyuk{-}Jae Lee}, title = {A New Update Strategy for Blocks with Low Correlation in 3-D Recursive Search}, booktitle = {{IEEE} Visual Communications and Image Processing, {VCIP} 2018, Taichung, Taiwan, December 9-12, 2018}, pages = {1--4}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/VCIP.2018.8698610}, doi = {10.1109/VCIP.2018.8698610}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/vcip/KimKKL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ppna/KimKPK16, author = {Eunhye Kim and Roger P. Karrer and Ju{-}Won Park and Sehun Kim}, title = {A novel fairness-aware parallel download scheme}, journal = {Peer-to-Peer Netw. Appl.}, volume = {9}, number = {1}, pages = {42--53}, year = {2016}, url = {https://doi.org/10.1007/s12083-014-0310-2}, doi = {10.1007/S12083-014-0310-2}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ppna/KimKPK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icinfa/KimXG016, author = {Sehun Kim and Wenjun Xu and Xiaoyi Gu and Hongliang Ren}, title = {Preliminary design and study of a bio-inspired wire-driven serpentine robotic manipulator with direct drive capability}, booktitle = {{IEEE} International Conference on Information and Automation, {ICIA} 2016, Ningbo, China, August 1-3, 2016}, pages = {1409--1413}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ICInfA.2016.7832040}, doi = {10.1109/ICINFA.2016.7832040}, timestamp = {Mon, 28 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icinfa/KimXG016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aimech/TranKLKR15, author = {Quoc Van Tran and Sehun Kim and Kyunghwan Lee and Sungchul Kang and Jeha Ryu}, title = {Force/torque sensorless impedance control for indirect driven robot-aided gait rehabilitation system}, booktitle = {{IEEE} International Conference on Advanced Intelligent Mechatronics, {AIM} 2015, Busan, South Korea, July 7-11, 2015}, pages = {652--657}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/AIM.2015.7222611}, doi = {10.1109/AIM.2015.7222611}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aimech/TranKLKR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/urai/TranKLR15, author = {Quoc Van Tran and Sehun Kim and Kyunghwan Lee and Jeha Ryu}, title = {Preliminary results of force/torque sensorless impedance control for Walkbot}, booktitle = {12th International Conference on Ubiquitous Robots and Ambient Intelligence, {URAI} 2015, Goyang, South Korea, October 28-30, 2015}, pages = {597--602}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/URAI.2015.7358840}, doi = {10.1109/URAI.2015.7358840}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/urai/TranKLR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eswa/KimLK14, author = {Gisung Kim and Seungmin Lee and Sehun Kim}, title = {A novel hybrid intrusion detection method integrating anomaly detection with misuse detection}, journal = {Expert Syst. Appl.}, volume = {41}, number = {4}, pages = {1690--1700}, year = {2014}, url = {https://doi.org/10.1016/j.eswa.2013.08.066}, doi = {10.1016/J.ESWA.2013.08.066}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eswa/KimLK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eswa/ShinLKK13, author = {Seong{-}jun Shin and Seungmin Lee and Hyunwoo Kim and Sehun Kim}, title = {Advanced probabilistic approach for network intrusion forecasting and detection}, journal = {Expert Syst. Appl.}, volume = {40}, number = {1}, pages = {315--322}, year = {2013}, url = {https://doi.org/10.1016/j.eswa.2012.07.057}, doi = {10.1016/J.ESWA.2012.07.057}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eswa/ShinLKK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdsn/KimKKK13, author = {Dong{-}uk Kim and Hyo{-}Won Kim and Gisung Kim and Sehun Kim}, title = {A Counterattack-Detection Scheme in Transmission Time-Based Wormhole Detection Methods}, journal = {Int. J. Distributed Sens. Networks}, volume = {9}, year = {2013}, url = {https://doi.org/10.1155/2013/184931}, doi = {10.1155/2013/184931}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdsn/KimKKK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/music/KimK13, author = {Eunhye Kim and Sehun Kim}, editor = {James J. Park and Hojjat Adeli and Namje Park and Isaac Woungang}, title = {A Novel Anomaly Detection System Based on {HFR-MLR} Method}, booktitle = {Mobile, Ubiquitous, and Intelligent Computing - {MUSIC} 2013, {FTRA} 4th International Conference on Mobile, Ubiquitous, and Intelligent Computing, September 4-6, 2013, Gwangju, Korea}, series = {Lecture Notes in Electrical Engineering}, volume = {274}, pages = {279--286}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40675-1\_43}, doi = {10.1007/978-3-642-40675-1\_43}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/music/KimK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdsn/ChoiKK12, author = {Jaeun Choi and Gisung Kim and Sehun Kim}, title = {A Congestion-Aware {IDS} Node Selection Method for Wireless Sensor Networks}, journal = {Int. J. Distributed Sens. Networks}, volume = {8}, year = {2012}, url = {https://doi.org/10.1155/2012/582139}, doi = {10.1155/2012/582139}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdsn/ChoiKK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/ChoiKKK12, author = {Jaeun Choi and Gisung Kim and Tae Ghyoon Kim and Sehun Kim}, editor = {Dong Hoon Lee and Moti Yung}, title = {An Efficient Filtering Method for Detecting Malicous Web Pages}, booktitle = {Information Security Applications - 13th International Workshop, {WISA} 2012, Jeju Island, Korea, August 16-18, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7690}, pages = {241--253}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35416-8\_17}, doi = {10.1007/978-3-642-35416-8\_17}, timestamp = {Tue, 14 May 2019 10:00:35 +0200}, biburl = {https://dblp.org/rec/conf/wisa/ChoiKKK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eswa/LeeKK11, author = {Seungmin Lee and Gisung Kim and Sehun Kim}, title = {Self-adaptive and dynamic clustering for online anomaly detection}, journal = {Expert Syst. Appl.}, volume = {38}, number = {12}, pages = {14891--14898}, year = {2011}, url = {https://doi.org/10.1016/j.eswa.2011.05.058}, doi = {10.1016/J.ESWA.2011.05.058}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eswa/LeeKK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eswa/ShimKK10, author = {Woochul Shim and Gisung Kim and Sehun Kim}, title = {A distributed sinkhole detection method using cluster analysis}, journal = {Expert Syst. Appl.}, volume = {37}, number = {12}, pages = {8486--8491}, year = {2010}, url = {https://doi.org/10.1016/j.eswa.2010.05.028}, doi = {10.1016/J.ESWA.2010.05.028}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eswa/ShimKK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jise/KimLKK10, author = {Eunhye Kim and Seungmin Lee and Ki Hoon Kwon and Sehun Kim}, title = {Feature Construction Scheme for Efficient Intrusion Detection System}, journal = {J. Inf. Sci. Eng.}, volume = {26}, number = {2}, pages = {527--547}, year = {2010}, url = {http://www.iis.sinica.edu.tw/page/jise/2010/201003\_12.html}, timestamp = {Fri, 16 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jise/KimLKK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvt/ShimHK10, author = {Woochul Shim and Younggoo Han and Sehun Kim}, title = {Fairness-Aware Resource Allocation in a Cooperative {OFDMA} Uplink System}, journal = {{IEEE} Trans. Veh. Technol.}, volume = {59}, number = {2}, pages = {932--939}, year = {2010}, url = {https://doi.org/10.1109/TVT.2009.2037328}, doi = {10.1109/TVT.2009.2037328}, timestamp = {Thu, 25 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tvt/ShimHK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/KimLK09, author = {Jaehong Kim and Sangjae Lee and Sehun Kim}, title = {An Adjustable Scheduling Algorithm for Multi-User {MIMO} Systems}, journal = {{IEICE} Trans. Commun.}, volume = {92-B}, number = {2}, pages = {527--532}, year = {2009}, url = {https://doi.org/10.1587/transcom.E92.B.527}, doi = {10.1587/TRANSCOM.E92.B.527}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/KimLK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/KimKK09, author = {Jongin Kim and Dongwoo Kim and Sehun Kim}, title = {The Capacity of Downlink Multiuser {OFDM} with Quality Based {CSI} Feedback}, journal = {{IEICE} Trans. Commun.}, volume = {92-B}, number = {4}, pages = {1252--1257}, year = {2009}, url = {https://doi.org/10.1587/transcom.E92.B.1252}, doi = {10.1587/TRANSCOM.E92.B.1252}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/KimKK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/HanSK09, author = {Younggoo Han and Woochul Shim and Sehun Kim}, title = {A Goal Programming Approach for Resource Allocation Considering Client Demands in a Multiuser {OFDMA} Downlink System}, journal = {{IEICE} Trans. Commun.}, volume = {92-B}, number = {4}, pages = {1376--1379}, year = {2009}, url = {https://doi.org/10.1587/transcom.E92.B.1376}, doi = {10.1587/TRANSCOM.E92.B.1376}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/HanSK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/LeePLNK09, author = {Seungmin Lee and Tae{-}Jun Park and Donghyeok Lee and Taekyong Nam and Sehun Kim}, title = {Chaotic Order Preserving Encryption for Efficient and Secure Queries on Databases}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {92-D}, number = {11}, pages = {2207--2217}, year = {2009}, url = {https://doi.org/10.1587/transinf.E92.D.2207}, doi = {10.1587/TRANSINF.E92.D.2207}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/LeePLNK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tce/LeeSK09, author = {Seungmin Lee and Woochul Shim and Sehun Kim}, title = {Hierarchical system for objectionable video detection}, journal = {{IEEE} Trans. Consumer Electron.}, volume = {55}, number = {2}, pages = {677--684}, year = {2009}, url = {https://doi.org/10.1109/TCE.2009.5174439}, doi = {10.1109/TCE.2009.5174439}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tce/LeeSK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/ChoiLKK09, author = {Jaeun Choi and Myungjong Lee and Gisung Kim and Sehun Kim}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {Monitoring Node Selection Algorithm for Intrusion Detection in Congested Sensor Network}, booktitle = {{SECRYPT} 2009, Proceedings of the International Conference on Security and Cryptography, Milan, Italy, July 7-10, 2009, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {117--120}, publisher = {{INSTICC} Press}, year = {2009}, timestamp = {Thu, 10 Sep 2009 21:15:22 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/ChoiLKK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eswa/LeeKKHK08, author = {Keunsoo Lee and Juhyun Kim and Ki Hoon Kwon and Younggoo Han and Sehun Kim}, title = {DDoS attack detection method using cluster analysis}, journal = {Expert Syst. Appl.}, volume = {34}, number = {3}, pages = {1659--1665}, year = {2008}, url = {https://doi.org/10.1016/j.eswa.2007.01.040}, doi = {10.1016/J.ESWA.2007.01.040}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eswa/LeeKKHK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/KimSKKH08, author = {Sehun Kim and Seong{-}jun Shin and Hyunwoo Kim and Ki Hoon Kwon and Younggoo Han}, title = {Hybrid Intrusion Forecasting Framework for Early Warning System}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {91-D}, number = {5}, pages = {1234--1241}, year = {2008}, url = {https://doi.org/10.1093/ietisy/e91-d.5.1234}, doi = {10.1093/IETISY/E91-D.5.1234}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/KimSKKH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/wisa/2007, editor = {Sehun Kim and Moti Yung and Hyung{-}Woo Lee}, title = {Information Security Applications, 8th International Workshop, {WISA} 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4867}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-77535-5}, doi = {10.1007/978-3-540-77535-5}, isbn = {978-3-540-77534-8}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/2007.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/KwonHK07, author = {Ki Hoon Kwon and Younggoo Han and Sehun Kim}, title = {Efficient Subcarrier and Power Allocation Algorithm in {OFDMA} Uplink System}, journal = {{IEICE} Trans. Commun.}, volume = {90-B}, number = {2}, pages = {368--371}, year = {2007}, url = {https://doi.org/10.1093/ietcom/e90-b.2.368}, doi = {10.1093/IETCOM/E90-B.2.368}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/KwonHK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/KimHCK07, author = {Hyunwoo Kim and Younggoo Han and Myeonggil Choi and Sehun Kim}, title = {Curriculum Design and Evaluation for E-Commerce Security Education Using {AHP}}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {90-D}, number = {3}, pages = {668--675}, year = {2007}, url = {https://doi.org/10.1093/ietisy/e90-d.3.668}, doi = {10.1093/IETISY/E90-D.3.668}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/KimHCK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/MinK07, author = {Chan{-}Ho Min and Sehun Kim}, title = {On-demand utility-based power control routing for energy-aware optimization in mobile ad hoc networks}, journal = {J. Netw. Comput. Appl.}, volume = {30}, number = {2}, pages = {706--727}, year = {2007}, url = {https://doi.org/10.1016/j.jnca.2005.12.001}, doi = {10.1016/J.JNCA.2005.12.001}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/MinK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/MinK07, author = {Chan{-}Ho Min and Sehun Kim}, title = {On-Demand Utility-Based Power Control Routing for Energy-Aware Optimization in Mobile Ad Hoc Networks}, journal = {Wirel. Pers. Commun.}, volume = {41}, number = {2}, pages = {259--280}, year = {2007}, url = {https://doi.org/10.1007/s11277-006-9142-6}, doi = {10.1007/S11277-006-9142-6}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wpc/MinK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/KimKK06a, author = {Insook Kim and Dongwoo Kim and Sehun Kim}, title = {Maximization of Carried Traffic by Prioritizing New Call Attempts in a {CDMA} Base Station with Finite Receiver Processors}, journal = {{IEICE} Trans. Commun.}, volume = {89-B}, number = {6}, pages = {1879--1882}, year = {2006}, url = {https://doi.org/10.1093/ietcom/e89-b.6.1879}, doi = {10.1093/IETCOM/E89-B.6.1879}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/KimKK06a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/JeongKK06, author = {Seok Bong Jeong and Hyunwoo Kim and Sehun Kim}, title = {An Effective DDoS Attack Detection and Packet-Filtering Scheme}, journal = {{IEICE} Trans. Commun.}, volume = {89-B}, number = {7}, pages = {2033--2042}, year = {2006}, url = {https://doi.org/10.1093/ietcom/e89-b.7.2033}, doi = {10.1093/IETCOM/E89-B.7.2033}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/JeongKK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/ChoiKK06, author = {Young{-}Woo Choi and Seong{-}Lyun Kim and Sehun Kim}, title = {On the Multihop Packet Scheduling in Uplink {DS-CDMA} Systems}, journal = {{IEICE} Trans. Commun.}, volume = {89-B}, number = {8}, pages = {2249--2253}, year = {2006}, url = {https://doi.org/10.1093/ietcom/e89-b.8.2249}, doi = {10.1093/IETCOM/E89-B.8.2249}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/ChoiKK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icat/KimKHOWR06, author = {Yeongmi Kim and Sehun Kim and Taejin Ha and Ian Oakley and Woontack Woo and Jeha Ryu}, editor = {Zhigeng Pan and Adrian David Cheok and Michael Haller and Rynson W. H. Lau and Hideo Saito and Ronghua Liang}, title = {Air-Jet Button Effects in {AR}}, booktitle = {Advances in Artificial Reality and Tele-Existence, 16th International Conference on Artificial Reality and Telexistence, {ICAT} 2006, Hangzhou, China, November 29 - December 1, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4282}, pages = {384--391}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11941354\_39}, doi = {10.1007/11941354\_39}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icat/KimKHOWR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/KimK06a, author = {Eunhye Kim and Sehun Kim}, title = {Anomaly Detection in Network Security Based on Nonparametric Techniques}, booktitle = {{INFOCOM} 2006. 25th {IEEE} International Conference on Computer Communications, Joint Conference of the {IEEE} Computer and Communications Societies, 23-29 April 2006, Barcelona, Catalunya, Spain}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/INFOCOM.2006.76}, doi = {10.1109/INFOCOM.2006.76}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/infocom/KimK06a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/JeongHKSKK06, author = {Youngok Jeong and Younggoo Han and Hyunwoo Kim and Woochul Shim and Jaehong Kim and Sehun Kim}, editor = {Jae{-}Kwang Lee and Okyeon Yi and Moti Yung}, title = {Cost-Effective {IDS} Operating Scheme in MANETs}, booktitle = {Information Security Applications, 7th International Workshop, {WISA} 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4298}, pages = {198--210}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-540-71093-6\_16}, doi = {10.1007/978-3-540-71093-6\_16}, timestamp = {Tue, 14 May 2019 10:00:35 +0200}, biburl = {https://dblp.org/rec/conf/wisa/JeongHKSKK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cor/JeongKL05, author = {Seok Bong Jeong and Sehun Kim and Heesoo Lee}, title = {Data traffic scheduling algorithm for multiuser {OFDM} system with adaptive modulation considering fairness among users}, journal = {Comput. Oper. Res.}, volume = {32}, pages = {1723--1737}, year = {2005}, url = {https://doi.org/10.1016/j.cor.2003.11.021}, doi = {10.1016/J.COR.2003.11.021}, timestamp = {Tue, 18 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cor/JeongKL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisedu/KimHKC05, author = {Hyunwoo Kim and Younggoo Han and Sehun Kim and Myeonggil Choi}, title = {A Curriculum Design for E-Commerce Security}, journal = {J. Inf. Syst. Educ.}, volume = {16}, number = {1}, pages = {55--64}, year = {2005}, url = {https://jise.org/Volume16/n1/JISEv16n1p55.html}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisedu/KimHKC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvt/LimK05, author = {Euntaek Lim and Sehun Kim}, title = {Transmission rate scheduling with fairness constraints in downlink of {CDMA} data networks}, journal = {{IEEE} Trans. Veh. Technol.}, volume = {54}, number = {1}, pages = {328--337}, year = {2005}, url = {https://doi.org/10.1109/TVT.2004.838839}, doi = {10.1109/TVT.2004.838839}, timestamp = {Thu, 25 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tvt/LimK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccbss/ChoiKKK05, author = {Myeonggil Choi and Hyunwoo Kim and Eunhye Kim and Sehun Kim}, editor = {Xavier Franch and Daniel Port}, title = {Decision on Replacing Components of Security Functions in COTS-Based Information Systems}, booktitle = {COTS-Based Software Systems, 4th International Conference, {ICCBSS} 2005, Bilbao, Spain, February 7-11, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3412}, pages = {11}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-30587-3\_10}, doi = {10.1007/978-3-540-30587-3\_10}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/iccbss/ChoiKKK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvt/KimMK04, author = {Dongwoo Kim and Chan{-}Ho Min and Sehun Kim}, title = {On-demand {SIR} and bandwidth-guaranteed routing with transmit power assignment in ad hoc mobile networks}, journal = {{IEEE} Trans. Veh. Technol.}, volume = {53}, number = {4}, pages = {1215--1223}, year = {2004}, url = {https://doi.org/10.1109/TVT.2004.830140}, doi = {10.1109/TVT.2004.830140}, timestamp = {Thu, 25 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tvt/KimMK04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/JeongCK04, author = {Seok Bong Jeong and Young{-}Woo Choi and Sehun Kim}, editor = {Chae Hoon Lim and Moti Yung}, title = {An Effective Placement of Detection Systems for Distributed Attack Detection in Large Scale Networks}, booktitle = {Information Security Applications, 5th International Workshop, {WISA} 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3325}, pages = {204--210}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-31815-6\_17}, doi = {10.1007/978-3-540-31815-6\_17}, timestamp = {Tue, 14 May 2019 10:00:35 +0200}, biburl = {https://dblp.org/rec/conf/wisa/JeongCK04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cor/AhnK03, author = {Koo{-}Min Ahn and Sehun Kim}, title = {Optimal bandwidth allocation for bandwidth adaptation in wireless multimedia networks}, journal = {Comput. Oper. Res.}, volume = {30}, number = {13}, pages = {1917--1929}, year = {2003}, url = {https://doi.org/10.1016/S0305-0548(02)00115-6}, doi = {10.1016/S0305-0548(02)00115-6}, timestamp = {Tue, 18 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cor/AhnK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvt/KimK03, author = {Tae{-}Suk Kim and Sehun Kim}, title = {A fast rerouting scheme using reservation in wireless {ATM}}, journal = {{IEEE} Trans. Veh. Technol.}, volume = {52}, number = {4}, pages = {1125--1142}, year = {2003}, url = {https://doi.org/10.1109/TVT.2002.807134}, doi = {10.1109/TVT.2002.807134}, timestamp = {Thu, 25 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tvt/KimK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/LeeK02a, author = {Ki{-}Dong Lee and Sehun Kim}, title = {Modeling variable user mobility with stochastic correlation concept}, journal = {Comput. Networks}, volume = {38}, number = {5}, pages = {603--612}, year = {2002}, url = {https://doi.org/10.1016/S1389-1286(01)00274-2}, doi = {10.1016/S1389-1286(01)00274-2}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/LeeK02a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/LeeK02b, author = {Ki{-}Dong Lee and Sehun Kim}, title = {Optimization for adaptive bandwidth reservation in wireless multimedia networks}, journal = {Comput. Networks}, volume = {38}, number = {5}, pages = {631--643}, year = {2002}, url = {https://doi.org/10.1016/S1389-1286(01)00276-6}, doi = {10.1016/S1389-1286(01)00276-6}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/LeeK02b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cor/YeoLK02, author = {Jaehyun Yeo and Heesoo Lee and Sehun Kim}, title = {An efficient broadcast scheduling algorithm for {TDMA} ad-hoc networks}, journal = {Comput. Oper. Res.}, volume = {29}, number = {13}, pages = {1793--1806}, year = {2002}, url = {https://doi.org/10.1016/S0305-0548(01)00057-0}, doi = {10.1016/S0305-0548(01)00057-0}, timestamp = {Tue, 18 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cor/YeoLK02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisedu/KimC02, author = {Sehun Kim and Myeonggil Choi}, title = {Educational Requirements Analysis for Information Security Professionals in Korea}, journal = {J. Inf. Syst. Educ.}, volume = {13}, number = {3}, pages = {237--248}, year = {2002}, url = {https://jise.org/Volume13/n3/JISEv13n3p237.html}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisedu/KimC02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cor/ChoiLLKL01, author = {Hong Suk Choi and Heesoo Lee and Ki{-}Dong Lee and Sehun Kim and Jong Hyup Lee}, title = {Optimal locations of switches and interconnections for {ATM} LANs}, journal = {Comput. Oper. Res.}, volume = {28}, number = {13}, pages = {1347--1366}, year = {2001}, url = {https://doi.org/10.1016/S0305-0548(00)00044-7}, doi = {10.1016/S0305-0548(00)00044-7}, timestamp = {Tue, 18 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cor/ChoiLLKL01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vtc/KimKSK01, author = {Jongin Kim and Dong{-}hoi Kim and Pyeong{-}jung Song and Sehun Kim}, title = {Design of optimum parameters for handover initiation in {WCDMA}}, booktitle = {Proceedings of the 54th {IEEE} Vehicular Technology Conference, {VTC} Fall 2001, 7-11 October 2001, Atlantic City, New Jersey, {USA}}, pages = {2768--2772}, publisher = {{IEEE}}, year = {2001}, url = {https://doi.org/10.1109/VTC.2001.957265}, doi = {10.1109/VTC.2001.957265}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/vtc/KimKSK01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cor/KimK00, author = {Sehun Kim and Jae{-}In Kim}, title = {An adaptive time slot assignment algorithm for variable bandwidth switching systems}, journal = {Comput. Oper. Res.}, volume = {27}, number = {5}, pages = {423--435}, year = {2000}, url = {https://doi.org/10.1016/S0305-0548(99)00060-X}, doi = {10.1016/S0305-0548(99)00060-X}, timestamp = {Tue, 18 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cor/KimK00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcc/LeeMLKKH00, author = {Young Joo Lee and Jae Yeol Maeng and Eok{-}Kyun Lee and Bongsoo Kim and Sehun Kim and Kyu{-}Kwang Han}, title = {Melting behaviors of icosahedral metal clusters studied by Monte Carlo simulations}, journal = {J. Comput. Chem.}, volume = {21}, number = {5}, pages = {380--387}, year = {2000}, url = {https://doi.org/10.1002/(SICI)1096-987X(20000415)21:5\&\#60;380::AID-JCC4\&\#62;3.0.CO;2-C}, doi = {10.1002/(SICI)1096-987X(20000415)21:5\&\#60;380::AID-JCC4\&\#62;3.0.CO;2-C}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcc/LeeMLKKH00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/telsys/KimCK00, author = {Soo{-}Hyun Kim and Kun{-}Nyeong Chang and Sehun Kim}, title = {A channel allocation for cellular mobile radio systems using simulated annealing}, journal = {Telecommun. Syst.}, volume = {14}, number = {1-4}, pages = {95--106}, year = {2000}, url = {https://doi.org/10.1023/A:1019133231776}, doi = {10.1023/A:1019133231776}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/telsys/KimCK00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cor/KimY98, author = {Sehun Kim and Jaehyun Yeo}, title = {Optimal scheduling in cdma packet radio networks}, journal = {Comput. Oper. Res.}, volume = {25}, number = {3}, pages = {219--228}, year = {1998}, url = {https://doi.org/10.1016/S0305-0548(97)00049-X}, doi = {10.1016/S0305-0548(97)00049-X}, timestamp = {Tue, 18 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cor/KimY98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cor/ChangK97, author = {Kun{-}Nyeong Chang and Sehun Kim}, title = {Channel allocation in cellular radio networks}, journal = {Comput. Oper. Res.}, volume = {24}, number = {9}, pages = {849--860}, year = {1997}, url = {https://doi.org/10.1016/S0305-0548(96)00098-6}, doi = {10.1016/S0305-0548(96)00098-6}, timestamp = {Tue, 18 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cor/ChangK97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijscn/KimK97, author = {Soo{-}Hyun Kim and Sehun Kim}, title = {Time slot assignment in a heterogeneous environment of a {SS/TDMA} system}, journal = {Int. J. Satell. Commun. Netw.}, volume = {15}, number = {5}, pages = {197--203}, year = {1997}, url = {https://doi.org/10.1002/(SICI)1099-1247(199709/10)15:5\&\#60;197::AID-SAT576\&\#62;3.0.CO;2-J}, doi = {10.1002/(SICI)1099-1247(199709/10)15:5\&\#60;197::AID-SAT576\&\#62;3.0.CO;2-J}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijscn/KimK97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pimrc/ChangK96, author = {Kun{-}Nyeong Chang and Sehun Kim}, title = {Call blocking performance of new dynamic channel assignment scheme in microcellular radio networks}, booktitle = {The 7th {IEEE} International Symposium on Personal, Indoor and Mobile Radio Communications, {PIMRC} 1996, Taipei, Taiwan, October 15-18, 1996}, pages = {198--202}, year = {1996}, url = {https://doi.org/10.1109/PIMRC.1996.567545}, doi = {10.1109/PIMRC.1996.567545}, timestamp = {Thu, 28 May 2020 11:01:18 +0200}, biburl = {https://dblp.org/rec/conf/pimrc/ChangK96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mp/KimCL95, author = {Sehun Kim and Kun{-}Nyeong Chang and Jun{-}Yeon Lee}, title = {A descent method with linear programming subproblems for nondifferentiable convex optimization}, journal = {Math. Program.}, volume = {71}, pages = {17--28}, year = {1995}, url = {https://doi.org/10.1007/BF01592242}, doi = {10.1007/BF01592242}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mp/KimCL95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/orl/KimU93, author = {Sehun Kim and Bong{-}sik Um}, title = {An improved subgradient method for constrained nondifferentiable optimization}, journal = {Oper. Res. Lett.}, volume = {14}, number = {1}, pages = {61--64}, year = {1993}, url = {https://doi.org/10.1016/0167-6377(93)90020-H}, doi = {10.1016/0167-6377(93)90020-H}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/orl/KimU93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mp/KimAC91, author = {Sehun Kim and Hyunsil Ahn and Seong{-}Cheol Cho}, title = {Variable target value subgradient method}, journal = {Math. Program.}, volume = {49}, pages = {359--369}, year = {1991}, url = {https://doi.org/10.1007/BF01588797}, doi = {10.1007/BF01588797}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mp/KimAC91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mp/KimA91, author = {Sehun Kim and Hyunsil Ahn}, title = {Convergence of a generalized subgradient method for nondifferentiable convex optimization}, journal = {Math. Program.}, volume = {50}, pages = {75--80}, year = {1991}, url = {https://doi.org/10.1007/BF01594925}, doi = {10.1007/BF01594925}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mp/KimA91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cor/Kim86, author = {Sehun Kim}, title = {Computation of a large-scale competitive equilibrium through optimization}, journal = {Comput. Oper. Res.}, volume = {13}, number = {4}, pages = {507--515}, year = {1986}, url = {https://doi.org/10.1016/0305-0548(86)90038-9}, doi = {10.1016/0305-0548(86)90038-9}, timestamp = {Tue, 18 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cor/Kim86.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mp/Kim84, author = {Sehun Kim}, title = {Economic planning with institutional price constraints for a decentralized economy}, journal = {Math. Program.}, volume = {29}, number = {1}, pages = {100--112}, year = {1984}, url = {https://doi.org/10.1007/BF02591732}, doi = {10.1007/BF02591732}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mp/Kim84.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.