The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Haeng-Kon Kim: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Ashok K. Harikumar, Roger Y. Lee, Hae Sool Yang, Haeng-Kon Kim, Byeongdo Kang
    A Model for Application Integration Using Web Services. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2005, pp:468-475 [Conf]
  2. Haeng-Kon Kim, Roger Y. Lee, Hae Sool Yang
    Development of Embedded Software with Component Integration Based on ABCD Architectures. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2005, pp:54-60 [Conf]
  3. Roger Y. Lee, Haeng-Kon Kim, Hae Sool Yang
    An Architecture Model for Dynamically Converting Components into Web Services. [Citation Graph (0, 0)][DBLP]
    APSEC, 2004, pp:648-654 [Conf]
  4. Haeng-Kon Kim
    Applying Product Line to the Embedded Systems. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:163-171 [Conf]
  5. Haeng-Kon Kim
    A Study on Evaluation of Component Metric Suites. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:62-70 [Conf]
  6. Haeng-Kon Kim
    A Study on the Mechanism for Mobile Embedded Agent Development Based on Product Line. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2005, pp:906-915 [Conf]
  7. Haeng-Kon Kim
    Software Architecture Generation on UML. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:844-852 [Conf]
  8. Haeng-Kon Kim, Sang-Yong Byun
    SDSEM: Software Development Success Evolution Model. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:84-92 [Conf]
  9. Haeng-Kon Kim, Youn-Ky Chung
    Automatic Translation Form Requirements Model into Use Cases Modeling on UML. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2005, pp:769-777 [Conf]
  10. Haeng-Kon Kim, Youn-Ky Chung
    Transforming a Legacy System into Components. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:198-205 [Conf]
  11. Haeng-Kon Kim, Tai-Hoon Kim
    Design on Mobile Secure Electronic Transaction Protocol with Component Based Development. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:461-470 [Conf]
  12. Tai-Hoon Kim, Haeng-Kon Kim
    A Relationship between Security Engineering and Security Evaluation. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2004, pp:717-724 [Conf]
  13. Haeng-Kon Kim, Oh-Hyun Kwon
    SCTE: Software Component Testing Environments. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:137-146 [Conf]
  14. Soung Won Kim, Myoung Soo Kim, Haeng-Kon Kim
    Frameworks for Model-Driven Software Architecture. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2005, pp:916-926 [Conf]
  15. Haeng-Kon Kim, Eun-Ju Park
    Component Specification Model for the Web Services. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:927-936 [Conf]
  16. Haeng-Kon Kim, Hae Sool Yang
    Security Framework to Verify the Low Level Implementation Codes. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:52-61 [Conf]
  17. Haeng-Kon Kim, Hae Sool Yang
    Software Process Improvement Environment. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:976-984 [Conf]
  18. Ki-Won Song, Haeng Kon Kim, Kyung-Whan Lee
    Design of Opportunity Tree for Organization's Process Strategy Decision-Making Based on SPICE Assessment Experience. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:873-882 [Conf]
  19. Hae Sool Yang, Jung-Hun Hong, Seok-Hyung Hwang, Haeng-Kon Kim
    Implementation of Short Message Service System to Be Based Mobile Wireless Internet. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:1-9 [Conf]
  20. Haeng-Kon Kim
    Knowledge Acqusition for Mobile Embedded Software Development Based on Product Line. [Citation Graph (0, 0)][DBLP]
    KES (1), 2005, pp:1131-1138 [Conf]
  21. Haeng-Kon Kim
    Intelligent Frameworks for Encoding XML Elements Using Mining Algorithm. [Citation Graph (0, 0)][DBLP]
    KES (2), 2006, pp:751-759 [Conf]
  22. Haeng-Kon Kim
    Graphical Knowledge Template of CBD Meta-model. [Citation Graph (0, 0)][DBLP]
    KES (2), 2006, pp:760-768 [Conf]
  23. Haeng-Kon Kim, Deok-Soo Han
    Logic Frameworks for Components Integration Process. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:1317-1324 [Conf]
  24. Hojun Shin, Haeng-Kon Kim, Boyeon Shim
    Development of Business Rule Engine and Builder for Manufacture Process Productivity. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:1305-1311 [Conf]
  25. Haeng-Kon Kim
    Intelligent Retrieval Agent based on Distributed Environment. [Citation Graph (0, 0)][DBLP]
    SERA, 2006, pp:137-143 [Conf]
  26. Haeng-Kon Kim, Hae Sool Yang, Roger Y. Lee
    A Study on Frameworks of Component Integration for Web Applications. [Citation Graph (0, 0)][DBLP]
    SERA, 2004, pp:58-70 [Conf]
  27. Roger Y. Lee, Ashok K. Harikumar, Chia-Chu Chiang, Hae Sool Yang, Haeng-Kon Kim, Byeongdo Kang
    A Framework for Dynamically Converting Components to Web Services. [Citation Graph (0, 0)][DBLP]
    SERA, 2005, pp:431-437 [Conf]
  28. Poornima Ramachandra, Haeng-Kon Kim, Byeongdo Kang, Yan Ha, Roger Y. Lee
    Risk Management through Architecture Design. [Citation Graph (0, 0)][DBLP]
    SERA, 2006, pp:386-395 [Conf]
  29. Haeng-Kon Kim
    A Component-Based Approach for Integrating Mobile Agents Into the Existing Web Infrastructure. [Citation Graph (0, 0)][DBLP]
    SERA, 2005, pp:75-85 [Conf]
  30. Haeng-Kon Kim, Tai-Hoon Kim, Jae-Sung Kim
    Reliability Assurance in Development Process for TOE on the Common Criteria. [Citation Graph (0, 0)][DBLP]
    SERA, 2003, pp:364-375 [Conf]
  31. Haeng-Kon Kim, Roger Y. Lee, Hae Sool Yang
    Requirements for CBD Products and Process Quality. [Citation Graph (0, 0)][DBLP]
    SERA, 2005, pp:375-382 [Conf]
  32. Haeng-Kon Kim, Roger Y. Lee, Hae Sool Yang
    Frameworks for Secured Business Process Management Systems. [Citation Graph (0, 0)][DBLP]
    SERA, 2006, pp:57-65 [Conf]
  33. Haeng-Kon Kim, Tai-Hoon Kim, Jae-Sung Kim
    ECSSL Protocol Based on 3B Algorithm. [Citation Graph (0, 0)][DBLP]
    SNPD, 2003, pp:166-169 [Conf]
  34. Tai-Hoon Kim, Jae-Sung Kim, Eun-Kyoung Yi, Haeng-Kon Kim
    A Study on the Relationship of Assurance Requirements between K Level of KISEC and EAL Level of CC. [Citation Graph (0, 0)][DBLP]
    SNPD, 2003, pp:170-176 [Conf]
  35. Roger Y. Lee, Gopalakrishnan Ramamurthi, Haeng-Kon Kim, Hae Sool Yang
    A New Approach to Requirements Elicitation Process. [Citation Graph (0, 0)][DBLP]
    SNPD, 2004, pp:226-233 [Conf]
  36. Haeng-Kon Kim, Roger Y. Lee
    Management process for supporting the component development. [Citation Graph (0, 0)][DBLP]
    Informatica (Slovenia), 2001, v:25, n:4, pp:- [Journal]
  37. Eun-Ju Park, Haeng-Kon Kim, Roger Y. Lee
    Frameworks of Integration Repository for Software Process Improvement using SOA. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2007, pp:200-206 [Conf]
  38. Jinalben Patel, Roger Y. Lee, Haeng-Kon Kim
    Architectural View in Software Development Life-Cycle Practices. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2007, pp:194-199 [Conf]
  39. Eun-ser Lee, Haeng-Kon Kim, Sang Ho Lee
    Design of the Intelligence User Identification Method for the Improved Password Input Method and the Personality Security. [Citation Graph (0, 0)][DBLP]
    KES (2), 2007, pp:581-588 [Conf]
  40. Haeng-Kon Kim, Sun-myoung Hwang, Eun-ser Lee
    Design of Intelligence Mobile Agent Lifecycle for the Progress Management and Mobile Computing. [Citation Graph (0, 0)][DBLP]
    KES-AMSTA, 2007, pp:721-727 [Conf]

  41. Web Service Security model Using CBD Architecture. [Citation Graph (, )][DBLP]


  42. Design Opportunity Tree of Capability Improve for Level-up and Software Process Improvement. [Citation Graph (, )][DBLP]


  43. Communication of Business's and Software Engineers. [Citation Graph (, )][DBLP]


  44. Analysis the priority of security requirement items for the process improvement by ISO/IEC 15504 and ISO/IEC 15408. [Citation Graph (, )][DBLP]


  45. Frameworks for Maturity Questionnaire Selection Model. [Citation Graph (, )][DBLP]


  46. Development of Mobile Location-Based Systems with Component. [Citation Graph (, )][DBLP]


  47. Development of Mobile Agent on CBD. [Citation Graph (, )][DBLP]


  48. CAS4UA: A Context-Aware Service System Based on Workflow Model for Ubiquitous Agriculture. [Citation Graph (, )][DBLP]


  49. A Power Control Scheme for an Energy-Efficient MAC Protocol. [Citation Graph (, )][DBLP]


  50. Frameworks of Indexing Mechanism for Mobile Devices. [Citation Graph (, )][DBLP]


  51. Frameworks of Process Improvement for Mobile Applications. [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.302secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002