The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Wonil Kim: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Wonil Kim, Han-Ku Lee, Jinman Park, Kyoungro Yoon
    Multi Class Adult Image Classification Using Neural Networks. [Citation Graph (0, 0)][DBLP]
    Canadian Conference on AI, 2005, pp:222-226 [Conf]
  2. Sanggil Kang, Wonil Kim
    A Novel Approach for Simplifying Neural Networks by Identifying Decoupling Inputs. [Citation Graph (0, 0)][DBLP]
    Australian Conference on Artificial Intelligence, 2004, pp:754-765 [Conf]
  3. Hyungjoon Lee, Wonil Kim, Manpyo Hong
    Biologically Inspired Computer Virus Detection System. [Citation Graph (0, 0)][DBLP]
    BioADIT, 2004, pp:153-165 [Conf]
  4. Youna Jung, Eenjun Hwang, Wonil Kim
    Sports Image Classification through Bayesian Classifier. [Citation Graph (0, 0)][DBLP]
    CAEPIA, 2003, pp:546-555 [Conf]
  5. Woncheol Kim, Eenjun Hwang, Wonil Kim
    ASPerson: Agent System for Personalizing Web Contents over Wireless Connection. [Citation Graph (0, 0)][DBLP]
    CAEPIA, 2003, pp:187-196 [Conf]
  6. Keonsoo Lee, Wonil Kim, Minkoo Kim
    Supply Chain Management using Multi-agent System. [Citation Graph (0, 0)][DBLP]
    CIA, 2004, pp:215-225 [Conf]
  7. Chul-Eui Hong, Wonil Kim, Yeong-Joon Kim
    A Novel Approach to Load Balancing Problem. [Citation Graph (0, 0)][DBLP]
    CIS, 2004, pp:188-193 [Conf]
  8. Wonil Kim, Chul-Eui Hong, Yeong-Joon Kim
    Asynchronous Distributed Genetic Algorithm for Optimal Channel Routing. [Citation Graph (0, 0)][DBLP]
    CIS, 2004, pp:194-199 [Conf]
  9. Woncheol Kim, Eenjun Hwang, Wonil Kim
    Reorganizing News Web Pages for Mobile Users. [Citation Graph (0, 0)][DBLP]
    EPIA, 2003, pp:229-243 [Conf]
  10. Wonik Park, Wonil Kim, Sanggil Kang, Hyunjin Lee, Young-Kuk Kim
    Personalized Digital E-library Service Using Users' Profile Information. [Citation Graph (0, 0)][DBLP]
    ECDL, 2006, pp:528-531 [Conf]
  11. Gunhee Lee, Wonil Kim, Dong-Kyoo Kim
    An Effective Method for Location Privacy in Ubiquitous Computing. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:1006-1015 [Conf]
  12. Wonil Kim, Sangyoon Oh, Sanggil Kang, Dongkyun Kim
    Multi-module Image Classification System. [Citation Graph (0, 0)][DBLP]
    FQAS, 2006, pp:498-506 [Conf]
  13. Gunhee Lee, Hongjin Yeh, Wonil Kim, Dong-Kyoo Kim
    Web Security Using Distributed Role Hierarchy. [Citation Graph (0, 0)][DBLP]
    GCC (1), 2003, pp:1087-1090 [Conf]
  14. Min-Ji Lee, Wonil Kim, Jai-Hoon Kim
    Performance Improvement of Information Service Using Priority Driven Method. [Citation Graph (0, 0)][DBLP]
    GCC (2), 2003, pp:565-572 [Conf]
  15. Wonil Kim, Seong-Joon Yoo, Jin-Sung Kim, Taek Yong Nam, Kyoungro Yoon
    Detecting Adult Images Using Seven MPEG-7 Visual Descriptors. [Citation Graph (0, 0)][DBLP]
    Human.Society@Internet, 2005, pp:336-339 [Conf]
  16. Chul-Eui Hong, Wonil Kim, Yeong-Joon Kim
    A Novel Hybrid Approach of Mean Field Annealing and Genetic Algorithm for Load Balancing Problem. [Citation Graph (0, 0)][DBLP]
    IBERAMIA, 2004, pp:830-840 [Conf]
  17. Wonil Kim, Chul-Eui Hong, Changduk Jung
    A Novel Approach to Function Approximation: Adaptive Multimodule Regression Networks. [Citation Graph (0, 0)][DBLP]
    IBERAMIA, 2004, pp:820-829 [Conf]
  18. Kyunghee Lee, Jungsik Wyee, Wonil Kim, Minkoo Kim
    Adaptive Spam mail filtering. [Citation Graph (0, 0)][DBLP]
    International Conference on Internet Computing, 2005, pp:402-408 [Conf]
  19. Wonil Kim, Han-Ku Lee, Seong-Joon Yoo, Sung Wook Baik
    Neural Network Based Adult Image Classification. [Citation Graph (0, 0)][DBLP]
    ICANN (1), 2005, pp:481-486 [Conf]
  20. Wonil Kim, Hanku Lee, Kyoungro Yoon, HyungSeok Kim, Changduk Jung
    Personalized Content Presentation for Virtual Gallery. [Citation Graph (0, 0)][DBLP]
    ICAT, 2006, pp:1045-1054 [Conf]
  21. Song-hwa Chae, Wonil Kim, Dong-Kyoo Kim
    A Novel Approach to Role-Based Access Control. [Citation Graph (0, 0)][DBLP]
    International Conference on Computational Science, 2003, pp:1060-1068 [Conf]
  22. Cholmin Kim, Wonil Kim, Manpyo Hong
    Effective Detector Set Generation and Evolution for Artificial Immune System. [Citation Graph (0, 0)][DBLP]
    International Conference on Computational Science, 2004, pp:491-498 [Conf]
  23. Hyungjoon Lee, Wonil Kim, Manpyo Hong
    Artificial Immune System against Viral Attack. [Citation Graph (0, 0)][DBLP]
    International Conference on Computational Science, 2004, pp:499-506 [Conf]
  24. Gunhee Lee, Wonil Kim, Dong-Kyoo Kim
    A Novel Method to Support User's Consent in Usage Control for Stable Trust in E-business. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2004, pp:906-914 [Conf]
  25. Sihn-hye Park, Wonil Kim, Dong-Kyoo Kim
    Autonomic Protection System Using Adaptive Security Policy. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2004, pp:896-905 [Conf]
  26. Tao Jiang, Wonil Kim, Kyung-suk Lhee, Manpyo Hong
    E-mail Worm Detection Using the Analysis of Behavior. [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2005, pp:348-356 [Conf]
  27. Song-hwa Chae, Wonil Kim, Dong-Kyoo Kim
    Efficient Role Based Access Control Method in Wireless Environment. [Citation Graph (0, 0)][DBLP]
    PWC, 2004, pp:431-439 [Conf]
  28. Keonsoo Lee, Wonil Kim, Minkoo Kim
    Effective Information Sharing Using Concept Mapping. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:177-183 [Conf]
  29. Chul-Eui Hong, Wonil Kim, Yeong-Joon Kim
    Distributed Channel Routing Using Genetic Algorithm. [Citation Graph (0, 0)][DBLP]
    PDCAT, 2004, pp:234-237 [Conf]
  30. Wonil Kim, Chul-Eui Hong, Yeong-Joon Kim
    Distributed Simulated Annealing for Composite Stock Cutting Problem. [Citation Graph (0, 0)][DBLP]
    PDCAT, 2004, pp:238-242 [Conf]
  31. Wonil Kim, Chul-Eui Hong, Yeong-Joon Kim
    The Analysis of Hardware Supported Cache Lock Mechanism Without Retry. [Citation Graph (0, 0)][DBLP]
    PDCAT, 2004, pp:787-790 [Conf]
  32. Gunhee Lee, Wonil Kim, Dong-Kyoo Kim, Hongjin Yeh
    Effective Web-Related Resource Security Using Distributed Role Hierarchy. [Citation Graph (0, 0)][DBLP]
    WAIM, 2004, pp:87-96 [Conf]
  33. Song-hwa Chae, Wonil Kim, Dong-Kyoo Kim
    Role-Based Access Control Model for Ubiquitous Computing Environment. [Citation Graph (0, 0)][DBLP]
    WISA, 2005, pp:354-363 [Conf]
  34. Song-hwa Chae, Wonil Kim
    Semantic Representation of RTBAC: Relationship-Based Access Control Model. [Citation Graph (0, 0)][DBLP]
    APWeb/WAIM Workshops, 2007, pp:554-563 [Conf]

Search in 0.027secs, Finished in 0.030secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002