Korean Voice Phishing Detection Applying NER With Key Tags and Sentence-Level N-Gram.
IEEE Access, 2024
Identifying Semantic Outliers of Source Code Artifacts and Their Application to Software Architecture Recovery.
IEEE Access, 2020
Software Architecture Module-View Recovery Using Cluster Ensembles.
IEEE Access, 2019
Energy Efficient Real-Time Scheduling Using DPM on Mobile Sensors with a Uniform Multi-Cores.
Sensors, 2017
Deep learning-based real-time query processing for wireless sensor network.
Int. J. Distributed Sens. Networks, 2017
Assessing the Bug-Prediction with Re-Usability Based Package Organization for Object Oriented Software Systems.
IEICE Trans. Inf. Syst., 2017
T-L Plane Abstraction-Based Energy-Efficient Real-Time Scheduling for Multi-Core Wireless Sensors.
Sensors, 2016
Adaptive Weighting of Structural Dependency and Textual Similarity in Software Architecture Recovery.
IEICE Trans. Inf. Syst., 2016
Comparative Analysis of Modularity Metrics for Evaluating Evolutionary Software.
IEICE Trans. Inf. Syst., 2015
Split-Jaccard Distance of Hierarchical Decompositions for Software Architecture.
IEICE Trans. Inf. Syst., 2015
T-L Plane Based Real-Time Scheduling Using Dynamic Power Management.
IEICE Trans. Inf. Syst., 2015
RETE-ADH: An Improvement to RETE for Composite Context-Aware Service.
Int. J. Distributed Sens. Networks, 2014
Model-Driven Monitoring of Time-Critical Systems Based on Aspect-Oriented Programming.
Proceedings of the Fifth International Conference on Secure Software Integration and Reliability Improvement, 2011
Lazy Approaches for Interval Timing Correlation of Sensor Data Streams.
Sensors, 2010
Residual vibration reduction for a flexible structure using a modified input shaping technique.
Robotica, 2002