Ung-Mo Kim
Orcid: 0000-0001-5464-6358
According to our database1,
Ung-Mo Kim
authored at least 95 papers
between 1999 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
2000
2005
2010
2015
2020
0
5
10
15
1
2
1
1
3
1
1
3
1
2
1
3
2
4
2
3
1
4
3
3
7
3
10
9
8
6
7
1
1
1
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Proceedings of the Human-Computer Interaction, 2024
2022
A Study on Traffic Prediction for the Backbone of Korea's Research and Science Network Using Machine Learning.
J. Web Eng., 2022
Proceedings of the Human-Computer Interaction. User Experience and Behavior, 2022
Proceedings of the Human-Computer Interaction. Theoretical Approaches and Design Methods, 2022
OSP-Class: Open Set Pseudo-labeling with Noise Robust Training for Text Classification.
Proceedings of the IEEE International Conference on Big Data, 2022
2021
EnvBERT: Multi-Label Text Classification for Imbalanced, Noisy Environmental News Data.
Proceedings of the 15th International Conference on Ubiquitous Information Management and Communication, 2021
Proceedings of the 15th International Conference on Ubiquitous Information Management and Communication, 2021
2018
A Study on Application Method for Automation Solution Using Blockchain dApp Platform.
Proceedings of the Parallel and Distributed Computing, 2018
Proceedings of the 2018 International Conference on Information Networking, 2018
Efficient Method for Processing Range Spatial Keyword Queries Over Moving Objects Based on Word2Vec.
Proceedings of the Human Interface and the Management of Information. Information in Applications and Services, 2018
Reducing Power Consumption of Mobile Watermarking Application with Energy Refactoring.
Proceedings of the Human Interface and the Management of Information. Information in Applications and Services, 2018
2017
J. Inf. Sci. Eng., 2017
The SSP-Tree: A Method for Distributed Processing of Range Monitoring Queries in Road Networks.
ISPRS Int. J. Geo Inf., 2017
Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, 2017
Proceedings of the International Conference on Advances in Image Processing, 2017
2016
IEICE Trans. Inf. Syst., 2016
Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication, 2016
Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication, 2016
An adaptive space split strategy for distributed processing of region monitoring queries.
Proceedings of the 3rd International Conference on Systems and Informatics, 2016
2015
Evaluation of Content-Matched Range Monitoring Queries over Moving Objects in Mobile Computing Environments.
Sensors, 2015
Proceedings of the 9th International Conference on Ubiquitous Information Management and Communication, 2015
2014
Sensors, 2014
Multim. Tools Appl., 2014
Method for Extracting Valuable Common Structures from Heterogeneous Rooted and Labeled Tree Data.
J. Inf. Sci. Eng., 2014
Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication, 2014
Proceedings of the IEEE 12th International Conference on Dependable, 2014
Proceedings of the 2014 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2014
Proceedings of the 2014 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2014
2013
Proceedings of the Mobile, Ubiquitous, and Intelligent Computing, 2013
Proceedings of the Mobile, Ubiquitous, and Intelligent Computing, 2013
A cooperative method for privacy preservation in real-time location monitoring services.
Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication, 2013
2012
Int. J. Commun. Syst., 2012
Proceedings of the Advances in Data Mining. Applications and Theoretical Aspects, 2012
Research to recommend influencially product group about interest through the TKMA (Transformed K-Means Algorithm).
Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication, 2012
Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication, 2012
2011
Proceedings of the Secure and Trust Computing, Data Management and Applications, 2011
Proceedings of the Secure and Trust Computing, Data Management and Applications, 2011
Proceedings of the Secure and Trust Computing, Data Management, and Applications, 2011
Proceedings of the 5th FTRA International Conference on Multimedia and Ubiquitous Engineering, 2011
Proceedings of the Advanced Intelligent Computing Theories and Applications. With Aspects of Artificial Intelligence, 2011
Proceedings of the International Conference on Computational Science and Its Applications, 2011
Proceedings of the International Conference on Advances in Social Networks Analysis and Mining, 2011
2010
J. Inf. Process. Syst., 2010
Proceedings of the IEEE International Conference on Service-Oriented Computing and Applications, 2010
Proceedings of the 4th International Conference on Ubiquitous Information Management and Communication, 2010
Proceedings of the Advanced Intelligent Computing Theories and Applications, 2010
2009
J. Inf. Sci. Eng., 2009
IEEE Commun. Lett., 2009
Adv. Eng. Softw., 2009
Proceedings of the Agent and Multi-Agent Systems: Technologies and Applications, 2009
Proceedings of the Advances in Neural Networks, 2009
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, 2009
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, 2009
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, 2009
Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication, 2009
Proceedings of the Neural Information Processing, 16th International Conference, 2009
Enhancing Security of a Group Key Exchange Protocol for Users with Individual Passwords.
Proceedings of the Computational Science and Its Applications, 2009
Mining Approximate Frequent Itemsets over Data Streams Using Window Sliding Techniques.
Proceedings of the Database Theory and Application, 2009
Proceedings of the First Asian Conference on Intelligent Information and Database Systems, 2009
2008
Security enhancement to a password-authenticated group key exchange protocol for mobile Ad-hoc networks.
IEEE Commun. Lett., 2008
Proceedings of the Network and Parallel Computing, IFIP International Conference, 2008
Proceedings of the NCM 2008, The Fourth International Conference on Networked Computing and Advanced Information Management, Gyeongju, Korea, September 2-4, 2008, 2008
Proceedings of the NCM 2008, The Fourth International Conference on Networked Computing and Advanced Information Management, Gyeongju, Korea, September 2-4, 2008, 2008
Proceedings of the NCM 2008, The Fourth International Conference on Networked Computing and Advanced Information Management, Gyeongju, Korea, September 2-4, 2008, 2008
Mining Based Decision Support Multi-agent System for Personalized e-Healthcare Service.
Proceedings of the Agent and Multi-Agent Systems: Technologies and Applications, 2008
Proceedings of the IEEE International Conference on Information Reuse and Integration, 2008
Proceedings of the Advanced Intelligent Computing Theories and Applications. With Aspects of Theoretical and Methodological Issues, 2008
Discovery of Useful Patterns from Tree-Structured Documents with Label-Projected Database.
Proceedings of the Autonomic and Trusted Computing, 5th International Conference, 2008
Proceedings of the Progress in WWW Research and Development, 2008
2007
J. Inf. Process. Syst., 2007
Resource-aware protocols for authenticated group key exchange in integrated wired and wireless networks.
Inf. Sci., 2007
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007
Proceedings of the Agent and Multi-Agent Systems: Technologies and Applications, 2007
Infringing Key Authentication of an ID-Based Group Key Exchange Protocol Using Binary Key Trees.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2007
Proceedings of the Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27, 2007
Proceedings of the Advances in Grid and Pervasive Computing, 2007
Proceedings of the Advances in Databases: Concepts, 2007
Mining Maximally Common Substructures from XML Trees with Lists-Based Pattern-Growth Method.
Proceedings of the Computational Intelligence and Security, International Conference, 2007
Constant-Round Authenticated Group Key Exchange with Logarithmic Computation Complexity.
Proceedings of the Applied Cryptography and Network Security, 5th International Conference, 2007
2006
A Simple Yet Efficient Approach for Maximal Frequent Subtrees Extraction from a Collection of XML Documents.
Proceedings of the Web Information Systems - WISE 2006 Workshops, 2006
A New Reflective and Reliable Context-Oriented Event Service Architecture for Pervasive Computing.
Proceedings of the Computational Science and Its Applications, 2006
Proceedings of the Computational Science and Its Applications, 2006
Proceedings of the Computational Science and Its Applications, 2006
Design and Implementation of a Security Framework Based on the Object-Based Storage Device Standard.
Proceedings of the Computational Science and Its Applications, 2006
Proceedings of the Computational Science, 2006
2005
Proceedings of the First Internaltional Workshop on Personalized Context Modeling and Management for UbiComp Applications, 2005
Interaction of Context Descriptor and Ontology for Semantic Service Discovery in Ubiquitous environment.
Proceedings of OntoLex@IJCNLP 2005 - Ontologies and Lexical Resources, Jeju Island, Korea, 2005
Proceedings of the Intelligent Data Engineering and Automated Learning, 2005
Proceedings of the Computational Science and Its Applications, 2005
Proceedings of the Computational Science, 2005
Proceedings of the Computational Science, 2005
Proceedings of the Pattern Recognition and Data Mining, 2005
2002
An Efficient Multicasting Scheme Using Prejoin Technology in Mobile Computing Environments.
Proceedings of the Mobile Communications, 7th CDMA International Conference, CIC 2002, Seoul, Korea, October 29, 2002
2001
A Transaction Length-Sensitive Protocol Based on Altruistic Locking for Multilevel Secure Database Systems.
Proceedings of the Information and Communications Security, Third International Conference, 2001
1999
Transaction Length-Sensitive Scheme for Livelock-Thin Scheduling.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 1999