default search action
Myung Ho Kim
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j31]Dong-Min Kim, JeongHyeon Ahn, Seung-Wook Kim, Jongmin Lee, Myungho Kim, JungHyun Han:
Real-time reconstruction of pipes using RGB-D cameras. Comput. Animat. Virtual Worlds 35(1) (2024) - 2023
- [j30]Junmo Choi, Jaewoo Kim, Younggun Ji, Seongju Lee, Jungran Lee, Byunggil Yu, Seulgi Park, Myungho Kim, Kyung-Young Jung:
SIW-Fed Patch Array Filtenna With Significant Suppression of Adjacent 5G Spectrum for Radio Altimeters. IEEE Access 11: 135846-135854 (2023) - 2022
- [j29]Young-Jong Kim, Sungil Jang, Myung Ho Kim, Jinho Park:
PBFT Blockchain-Based OpenStack Identity Service. J. Inf. Process. Syst. 18(6): 741-754 (2022) - [c22]Songhee Kang, Myung Ho Kim, Kibae Kim:
Raising Skepticisms on the Feasibility of Algorithmic Tacit Collusion. ICIS 2022 - 2020
- [j28]Minji Seo, Myungho Kim:
Fusing Visual Attention CNN and Bag of Visual Words for Cross-Corpus Speech Emotion Recognition. Sensors 20(19): 5559 (2020) - [j27]Kihyun Yu, JeongHyeon Ahn, Jongmin Lee, Myungho Kim, JungHyun Han:
Collaborative SLAM and AR-guided navigation for floor layout inspection. Vis. Comput. 36(10): 2051-2063 (2020)
2010 – 2019
- 2019
- [j26]Ao Zhou, Shangguang Wang, Ching-Hsien Hsu, Myung Ho Kim, Kok-Seng Wong:
Virtual machine placement with (m, n)-fault tolerance in cloud data center. Clust. Comput. 22(5): 11619-11631 (2019) - [c21]Kok-Seng Wong, Myung Ho Kim:
A Privacy-Preserving Coalition Loyalty Program. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2019: 1283-1288 - 2018
- [j25]Kok-Seng Wong, Myung Ho Kim:
Emerging issues and challenges for cloud data at the edge. Int. J. Web Grid Serv. 14(2): 123-145 (2018) - [j24]Kok-Seng Wong, Myung Ho Kim:
Toward a fair indictment for sealed-bid auction with self-enforcing privacy. J. Supercomput. 74(8): 3801-3819 (2018) - [i6]Jaydip Sen, Moonkun Lee, Sunghyeon Lee, Yeongbok Choe, Menachem Domb, Arpan Pal, Hemant Kumar Rath, Samar Shailendra, Abhijan Bhattacharyya, Albena Mihovska, Mahasweta Sarkar, Hyun Jung Lee, Myungho Kim, Alexandru Averian:
Internet of Things: Technology, Applications and Standardardization. CoRR abs/1808.09390 (2018) - 2017
- [j23]Ao Zhou, Shangguang Wang, Ching-Hsien Hsu, Myung Ho Kim, Kok-Seng Wong:
Network failure-aware redundant virtual machine placement in a cloud data center. Concurr. Comput. Pract. Exp. 29(24) (2017) - [j22]Kok-Seng Wong, Myung Ho Kim:
Secure rank correlation computation for IoT applications. Int. J. Serv. Technol. Manag. 23(1/2): 40-51 (2017) - [j21]Yan Guo, Shangguang Wang, Kok-Seng Wong, Myung Ho Kim:
Skyline service selection approach based on QoS prediction. Int. J. Web Grid Serv. 13(4): 425-447 (2017) - [j20]Kok-Seng Wong, Myung Ho Kim:
Privacy Protection for Data-Driven Smart Manufacturing Systems. Int. J. Web Serv. Res. 14(3): 17-32 (2017) - 2016
- [j19]Kok-Seng Wong, Myung Ho Kim:
An enhanced user authentication solution for mobile payment systems using wearables. Secur. Commun. Networks 9(17): 4639-4649 (2016) - 2015
- [j18]Kok-Seng Wong, Myung Ho Kim:
Towards a respondent-preferred k i -anonymity model. Frontiers Inf. Technol. Electron. Eng. 16(9): 720-731 (2015) - [c20]Chee Een Yap, Myung Ho Kim:
Sensor Data Management for Driver Monitoring System. IOV 2015: 152-163 - [c19]Kok-Seng Wong, Minji Seo, Myung Ho Kim:
Secure Two-Party Rank Correlation Computations for Recommender Systems. TrustCom/BigDataSE/ISPA (1) 2015: 1022-1028 - 2014
- [j17]Min Soo Kang, Yong-Gyu Jung, Myung Ho Kim, Kichan Ahn:
Development of sensor nodes based on fault tolerance. Int. J. Secur. Networks 9(4): 190-196 (2014) - [j16]Kok-Seng Wong, Myung Ho Kim:
Towards Self-Awareness Privacy Protection for Internet of Things Data Collection. J. Appl. Math. 2014: 827959:1-827959:9 (2014) - [j15]Kok-Seng Wong, Myung Ho Kim:
On private Hamming distance computation. J. Supercomput. 69(3): 1123-1138 (2014) - [c18]Kok-Seng Wong, Myung Ho Kim:
Privacy-Preserving Data Collection with Self-Awareness Protection. FCC 2014: 365-371 - 2013
- [j14]Kok-Seng Wong, Myung Ho Kim:
Privacy-preserving similarity coefficients for binary data. Comput. Math. Appl. 65(9): 1280-1290 (2013) - [c17]Kok-Seng Wong, Myung Ho Kim:
Secure Re-publication of Dynamic Big Data. CSS 2013: 468-477 - [c16]Dae Woong Jo, Myung Ho Kim:
Web-Based Semantic Web Retrieval Service for Law Ontology. HPCC/EUC 2013: 666-673 - [c15]Chee Een Yap, Myung Ho Kim:
Instance-Based Ontology Matching with Rough Set Features Selection. ICITCS 2013: 1-4 - 2012
- [j13]Iksu Kim, Myungho Kim:
Agent-based honeynet framework for protecting servers in campus networks. IET Inf. Secur. 6(3): 202-211 (2012) - [j12]Kok-Seng Wong, Myung Ho Kim:
Privacy-preserving frequent itemsets mining via secure collaborative framework. Secur. Commun. Networks 5(3): 263-272 (2012) - [c14]Kok-Seng Wong, Myung Ho Kim:
Secure Biometric-Based Authentication for Cloud Computing. CLOSER (Selected Papers) 2012: 86-101 - [c13]Kok-Seng Wong, Myung Ho Kim:
Towards Biometric-based Authentication for Cloud Computing. CLOSER 2012: 501-510 - [c12]Ji-Woong Choi, Myung Ho Kim:
Generating OWL Ontology from Relational Database. MUSIC 2012: 53-59 - [c11]Kok-Seng Wong, Myung Ho Kim:
A Privacy-Preserving Biometric Matching Protocol for Iris Codes Verification. MUSIC 2012: 120-125 - 2010
- [j11]Ji Hye Jung, Seok-Jin Kang, Myungho Kim, Sungsoon Kim, Jeong-Youn Yu:
Adjoint crystals and Young walls for Up(sl2). Eur. J. Comb. 31(3): 738-758 (2010) - [j10]Kok-Seng Wong, Myung Ho Kim:
Semi-trusted Collaborative Framework for Multi-party Computation. KSII Trans. Internet Inf. Syst. 4(3): 411-427 (2010)
2000 – 2009
- 2007
- [c10]Jongbae Moon, Hyungil Park, Myungho Kim:
Reliable and Scalable State Management Using Migration of State Information in Web Services. International Conference on Computational Science (1) 2007: 382-389 - [c9]Iksu Kim, Myungho Kim:
The DecoyPort: Redirecting Hackers to Honeypots. NBiS 2007: 59-68 - 2006
- [c8]Jongbae Moon, Sangkeon Lee, Jaeyoung Choi, Myungho Kim, Jysoo Lee:
Design and Implementation of a Resource Management System Using On-Demand Software Streaming on Distributed Computing Environment. International Conference on Computational Science (1) 2006: 1059-1062 - 2005
- [c7]Jongbae Moon, Myung Ho Kim:
Dynamic Load Balancing Method Based on DNS for Distributed Web Systems. EC-Web 2005: 238-247 - [c6]Jaewoo Ahn, Myung Ho Kim:
General-Purpose Text Entry Rules for Devices with 4x3 Configurations of Buttons. ICCSA (1) 2005: 223-231 - 2004
- [c5]Jongbae Moon, Myungho Kim:
A Performance Evaluation of High-Availability Webserver Cluster System Employing Multiple Front-ends for Small and Middle-sized Web Sites. PDPTA 2004: 486-494 - 2003
- [i5]Gene Kim, MyungHo Kim:
A Representation of Changes of Images and its Application for Developmental Biolology. CoRR cs.CC/0305008 (2003) - [i4]Gene Kim, MyungHo Kim:
2D Electrophoresis Gel Image and Diagnosis of a Disease. CoRR cs.CC/0305048 (2003) - 2002
- [i3]Gene Kim, MyungHo Kim:
A Novel Statistical Diagnosis of Clinical Data. CoRR cs.CE/0209001 (2002) - 2001
- [i2]Gene Kim, MyungHo Kim:
Application of Support Vector Machine to detect an association between a disease or trait and multiple SNP variations. CoRR cs.CC/0104015 (2001) - 2000
- [j9]Myung Ho Kim:
A Geometric Model of Information Retrieval Systems. Complex Syst. 12(1) (2000)
1990 – 1999
- 1999
- [j8]Henri Casanova, MyungHo Kim, James S. Plank, Jack J. Dongarra:
Adaptive Scheduling for Task Farming with Grid Middleware. Int. J. High Perform. Comput. Appl. 13(3): 231-240 (1999) - [c4]Henri Casanova, MyungHo Kim, James S. Plank, Jack J. Dongarra:
Adaptive Scheduling for Task Farming with Grid Middleware. Euro-Par 1999: 30-43 - [c3]Seogchan Hwang, Jaeyoung Choi, Myungho Kim:
JANEC: Java-based Network Computer System. PDPTA 1999: 1203-1209 - [c2]Paul B. Kantor, Endre Boros, Benjamin Melamed, David J. Neu, Vladimir Menkov, Qin Shi, Myung Ho Kim:
Ant World (demonstration abstract). SIGIR 1999: 323 - [i1]Myung Ho Kim:
A Geometric Model for Information Retrieval Systems. CoRR cs.IR/9912002 (1999) - 1997
- [j7]Myung Ho Kim:
A Functional Approach to Type Constraints of Generic Definitions. ACM SIGPLAN Notices 32(6): 45-52 (1997) - 1995
- [j6]Myung Ho Kim, Chang-Sung Jeong:
An Optimal Parallel Matching Algorithm for a Convex Bipartite Graph on a Mesh-connected Computer. Parallel Algorithms Appl. 5(1-2): 15-35 (1995) - [j5]Myung Ho Kim, Chang-Sung Jeong:
An Optimal Parallel Matching Algorithm for a Convex Bipartite Graph on a Mesh-connected Computer. Parallel Algorithms Appl. 6(2-3): 129-141 (1995) - [j4]Myung Ho Kim:
A New Iteration Mechanism for The C++ Programming Language. ACM SIGPLAN Notices 30(1): 20-26 (1995) - 1994
- [j3]Yunho Choi, Myungho Kim, Hyunsoon Jang, Taejin Kim, Seung-hoon Lee, Ho-cheol Lee, Churoo Park, Siyeol Lee, Cheol-soo Kim, Soo-In Cho, Ejaz Haq, J. Karp, Daeje Chin:
16-Mb synchronous DRAM with 125-Mbyte/s data rate. IEEE J. Solid State Circuits 29(4): 529-533 (1994) - [c1]Myung Ho Kim, Chang-Sung Jeong, Myung-Soo Kim:
An Optimal Parallel Matching Algorithm for a Convex Bipartite Graph on a Mesh-Connected Computer. IPPS 1994: 229-233 - 1991
- [j2]Chang-Sung Jeong, Myung Ho Kim:
Fast parallel simulated annealing for traveling salesman problem on SIMD machines with linear interconnections. Parallel Comput. 17(2-3): 221-228 (1991)
1980 – 1989
- 1989
- [j1]Myung Ho Kim, Yong Rae Kwon:
SPEX: A Method for Specifying the Dynamics of Structured Specifications Including Control Information. Aust. Comput. J. 21(1): 19-26 (1989)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 21:22 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint