The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Juryon Paik: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Juryon Paik, Young Ik Eom, Ung-Mo Kim
    Extraction of Interesting Financial Information from Heterogeneous XML-Based Data. [Citation Graph (0, 0)][DBLP]
    International Conference on Computational Science (4), 2006, pp:356-363 [Conf]
  2. Juryon Paik, Dong Ryeol Shin, Ung-Mo Kim
    EFoX: A Scalable Method for Extracting Frequent Subtrees. [Citation Graph (0, 0)][DBLP]
    International Conference on Computational Science (3), 2005, pp:813-817 [Conf]
  3. Juryon Paik, Hee Yong Youn, Ung-Mo Kim
    A New Method for Mining Association Rules from a Collection of XML Documents. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:936-945 [Conf]
  4. Juryon Paik, Hee Yong Youn, Ung-Mo Kim
    Extraction of Implicit Context Information in Ubiquitous Computing Environments. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:456-465 [Conf]
  5. Juryon Paik, Dongho Won, Farshad Fotouhi, Ung-Mo Kim
    EXiT-B: A New Approach for Extracting Maximal Frequent Subtrees from XML Data. [Citation Graph (0, 0)][DBLP]
    IDEAL, 2005, pp:1-8 [Conf]
  6. Juryon Paik, Ung-Mo Kim
    A Simple Yet Efficient Approach for Maximal Frequent Subtrees Extraction from a Collection of XML Documents. [Citation Graph (0, 0)][DBLP]
    WISE Workshops, 2006, pp:94-103 [Conf]
  7. Junghyun Nam, Juryon Paik, Ung-Mo Kim, Dongho Won
    Constant-Round Authenticated Group Key Exchange with Logarithmic Computation Complexity. [Citation Graph (0, 0)][DBLP]
    ACNS, 2007, pp:158-176 [Conf]
  8. Juryon Paik, Junghyun Nam, SeungCheol Lee, Ung-Mo Kim
    A Framework for Data Structure-Guided Extraction of XML Association Rules. [Citation Graph (0, 0)][DBLP]
    International Conference on Computational Science (3), 2007, pp:709-716 [Conf]
  9. Junghyun Nam, Juryon Paik, Youngsook Lee, Jin Kwak, Ung-Mo Kim, Dongho Won
    Infringing Key Authentication of an ID-Based Group Key Exchange Protocol Using Binary Key Trees. [Citation Graph (0, 0)][DBLP]
    KES (1), 2007, pp:672-679 [Conf]
  10. Junghyun Nam, Juryon Paik, Ung-Mo Kim, Dongho Won
    Resource-aware protocols for authenticated group key exchange in integrated wired and wireless networks. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 2007, v:177, n:23, pp:5441-5467 [Journal]

  11. Mining Maximal Frequent Subtrees with Lists-Based Pattern-Growth Method. [Citation Graph (, )][DBLP]


  12. Discovery of Useful Patterns from Tree-Structured Documents with Label-Projected Database. [Citation Graph (, )][DBLP]


  13. Mining Maximally Common Substructures from XML Trees with Lists-Based Pattern-Growth Method. [Citation Graph (, )][DBLP]


  14. Enhancing Security of a Group Key Exchange Protocol for Users with Individual Passwords. [Citation Graph (, )][DBLP]


  15. Mining association rules in tree structured XML data. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002