default search action
Kye Kyung Kim
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c26]Won Shik Kim, Kye Kyung Kim:
Abnormal Detection of Worker by Interaction Analysis of Accident-Causing Objects. RO-MAN 2023: 884-889
2010 – 2019
- 2019
- [c25]Yejin Lee, Kye Kyung Kim, Jaehong Kim:
Prevention of Safety Accidents through Artificial Intelligence Monitoring of Infants in the Home Environment. ICTC 2019: 474-477 - 2017
- [c24]Sangseung Kang, Kye Kyung Kim:
Multiple concurrent operations and flexible robotic picking for manufacturing process environments. URAI 2017: 380-381 - [c23]Jihyeong Pyo, Jaemin Cho, Sangseung Kang, Kye Kyung Kim:
Precise pose estimation using landmark feature extraction and blob analysis for bin picking. URAI 2017: 494-496 - 2015
- [c22]Kye Kyung Kim, Sangseung Kang, Suyoung Chi, Jaehong Kim, Jinho Kim:
Disguised Face Identification Using Face Graph and SVM Classifier. BigDAS 2015: 282-283 - [c21]Sangseung Kang, Kye Kyung Kim, Suyoung Chi:
Multimodal Data Fusion and Intention Recognition for Horse Riding Simulators. BigDAS 2015: 296-297 - [c20]Kye Kyung Kim, Sangseung Kang, Jaehong Kim, Jaeyeon Lee, Joongbae Kim:
Bin picking method using multiple local features. URAI 2015: 148-150 - [c19]Kye Kyung Kim, Sangseung Kang, Sooyoung Chi, Jaehong Kim:
Human age estimation using multi-class SVM. URAI 2015: 370-372 - 2014
- [c18]Sangseung Kang, Kye Kyung Kim, Suyoung Chi, Jaehong Kim:
Interaction control for postural correction on a riding simulation system. HRI 2014: 194-195 - [c17]Jaeyeon Lee, Taewoo Kim, Sangseung Kang, Kye Kyung Kim, Jaehong Kim, Joongbae Kim:
Bin picking for the objects of non-Lambertian reflectance without using an explicit object model. URAI 2014: 489-493 - 2013
- [c16]Dongjin Lee, Kye Kyung Kim, Chankyu Park, Ho-Sub Yoon, Jaehong Kim, Cheong Hee Park:
Real-time user pose verification in a depth image for simulator. RO-MAN 2013: 316-317 - [c15]Hyungkwan Son, Suyoung Chi, Kye Kyung Kim, Sangseung Kang:
User segmentation using moving edge detection for sports simulator. RO-MAN 2013: 318-319 - [c14]Kye Kyung Kim, Sangseung Kang, Suyoung Chi, Dongjin Lee, Jaehong Kim:
User identification on horse riding simulator. RO-MAN 2013: 328-329 - [c13]Sangseung Kang, Kye Kyung Kim, Suyoung Chi:
Interactive interface on a sports simulator for improved interaction and personalized services. URAI 2013: 236-237 - [c12]Kye Kyung Kim, Sangseung Kang, Jaehong Kim, Jaeyeon Lee, Joongbae Kim, Jinho Kim:
Multiple objects recognition for industrial robot applications. URAI 2013: 257-259 - [c11]Jaeyeon Lee, Sangseung Kang, Kye Kyung Kim, Jaehong Kim, Joongbae Kim:
A development of easily trainable vision system for the multi-purpose dual arm robots. URAI 2013: 609-614
2000 – 2009
- 2006
- [c10]Hyunsang Ahn, Do-Hyung Kim, Jaeyeon Lee, Suyoung Chi, Kye Kyung Kim, Jinsul Kim, Minsoo Hahn, Hyunseok Kim:
A Robot Photographer with User Interactivity. IROS 2006: 5637-5643 - 2005
- [c9]Kyungsook Bae, Kye Kyung Kim, Yun Koo Chung, Wonpil Yu:
Character Recognition System for Cellular Phone with Camera. COMPSAC (1) 2005: 539-544 - 2004
- [c8]K. C. Kim, H. R. Byun, Y. J. Song, Young-Woo Choi, S. Y. Chi, Kye Kyung Kim, YunKoo Chung:
Scene Text Extraction in Natural Scene Images using Hierarchical Feature Combining and Verification. ICPR (2) 2004: 679-682 - 2003
- [c7]Suyeong Ji, YunKoo Chung, Taeyuen Kim, Kye Kyung Kim:
A Comparative Performance Study of Threshold Methods for Actual Documents Recognition System based on Post-PC Environment. Applied Informatics 2003: 1269-1271 - 2002
- [j2]Kye Kyung Kim, Jin-Ho Kim, Ching Y. Suen:
Segmentation-based recognition of handwritten touching pairs of digits using structural features. Pattern Recognit. Lett. 23(1-3): 13-24 (2002) - [c6]Kye Kyung Kim, YunKoo Chung, Ching Y. Suen:
Post-Processing Scheme for Improving Recognition Performance of Touching Handwritten Numeral Strings. ICPR (3) 2002: 327-330 - 2001
- [c5]Kye Kyung Kim, YunKoo Chung, Jin-Ho Kim, Ching Y. Suen:
Recognition of Unconstrained Handwritten Numeral Strings Using Decision Value Generator. ICDAR 2001: 14-17 - [c4]Kye Kyung Kim, Jin-Ho Kim, YunKoo Chung, Ching Y. Suen:
Legal Amount Recognition Based on the Segmentation Hypotheses for Bank Check Processing. ICDAR 2001: 964-967 - 2000
- [j1]Jin-Ho Kim, Kye Kyung Kim, Ching Y. Suen:
An HMM-MLP Hybrid Model for Cursive Script Recognition. Pattern Anal. Appl. 3(4): 314-324 (2000) - [c3]Jin-Ho Kim, Kye Kyung Kim, Christine P. Nadal, Ching Y. Suen:
A Methodology of Combining HMM and MLP Classifiers for Cursive Word Recognition. ICPR 2000: 2319-2322 - [c2]Kye Kyung Kim, Ching Y. Suen, Jin-Ho Kim:
Recognition of Unconstrained Handwritten Numeral Strings by Composite Segmentation Method. ICPR 2000: 2594-2597 - [c1]Ching Y. Suen, Kye Kyung Kim, Qizhi Xu, Jin-Ho Kim, Louisa Lam:
Handwriting Recognition - The Last Frontiers. ICPR 2000: 4001-4010
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:14 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint