The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Sung Y. Shin: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Sung Y. Shin, Jung-Yeop Kim, Rex E. Gantenbein, Charles M. Lundquist
    Design A Working Model of Secure Data Transfer Using a Data Mart. [Citation Graph (0, 0)][DBLP]
    CAINE, 2001, pp:66-69 [Conf]
  2. Sung Y. Shin, Charlie Yong-Sang Shim, Su Jung Byun
    Bird Species Identification System Using Kernel based PCA. [Citation Graph (0, 0)][DBLP]
    CAINE, 2002, pp:142-145 [Conf]
  3. Sung Y. Shin, Charlie Y. Shim, Xiaohng Chen, Chang Oan Sung
    A Web-Based Approach for Myofascial Pain Syndrome Monitoring System in the Home. [Citation Graph (0, 0)][DBLP]
    CAINE, 2003, pp:246-249 [Conf]
  4. Sung Y. Shin, Chan G. Yoo, Kwan-Jong Yoo
    Design and Performance Analysis of Communication Module for Linux Clustering VOD Server. [Citation Graph (0, 0)][DBLP]
    CAINE, 2003, pp:254-257 [Conf]
  5. Sangsu Kim, Jiman Hong, Yookun Cho, Sung Y. Shin
    Memory Profiling Checkpoint. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2003, pp:325-328 [Conf]
  6. Moonju Park, Jiman Hong, Sung Y. Shin
    A Priority Assignment Method for Earliest Deadline Scheduling. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2003, pp:316-320 [Conf]
  7. Sung Shin, ChanGon Yoo, Chih-Cheng Hung
    Reliable High-Speed Communication Module for Linux Cluster File System Using M-VIA. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2004, pp:205-208 [Conf]
  8. Sung Y. Shin, Su Jeong Byun, Won Don Lee
    User Verification System on Telebanking Using Kernel based PCA. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2002, pp:102-105 [Conf]
  9. Rex E. Gantenbein, Thomas L. James, Garrace DeGroot, Harshi L. Allen, Sung Y. Shin
    Analyzing security in distributed collaborative systems. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2000, pp:72-75 [Conf]
  10. Charlie Y. Shim, Alireza Salehnia, Sung Y. Shin
    An Approach from Software Reliability Modeling to Security Modeling. [Citation Graph (0, 0)][DBLP]
    CATA, 2002, pp:63-66 [Conf]
  11. Dong Chun Lee, Sung Y. Shin
    Radiance simulation of multispectral remote sensor data for water resource applications. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2000, pp:400-403 [Conf]
  12. Dong Chun Lee, Jay H. Kwon, Keehwan Hong, Sung Y. Shin
    A conceptual framework for GIS-based vehicle monitoring system. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2000, pp:404-407 [Conf]
  13. Su Jeong Byun, Won Don Lee, Sung Y. Shin, Chih-Cheng Hung
    The performance comparison between backpropagation and extended incremental network model on speaker verification. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2001, pp:256-259 [Conf]
  14. Charlie Y. Shim, Jung Y. Kim, Sung Y. Shin, Jiman Hong
    Using Feedback Cycle for Developing an Adjustable Security Design Metric. [Citation Graph (0, 0)][DBLP]
    FSKD (2), 2005, pp:1158-1161 [Conf]
  15. Yoojin Chung, Sang-Young Cho, Sung Y. Shin
    Parallel Prediction of Protein-Protein Interactions Using Proximal SVM. [Citation Graph (0, 0)][DBLP]
    RSFDGrC (2), 2005, pp:430-437 [Conf]
  16. Jongmoo Choi, Seungjae Baek, Sung Y. Shin
    Design and implementation of a kernel resource protector for robustness of Linux module programming. [Citation Graph (0, 0)][DBLP]
    SAC, 2006, pp:1477-1481 [Conf]
  17. Junyoung Heo, Sangho Yi, Yookun Cho, Jiman Hong, Sung Y. Shin
    Space-efficient page-level incremental checkpointing. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1558-1562 [Conf]
  18. Dongseob Jang, Sung Y. Shin, Charlie Y. Shim, C. C. Hung
    A comparison on information fusion methods for air target identification. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:45-46 [Conf]
  19. Haklin Kimm, Sung Shin, Chang Oan Sung
    Evaluation of interval-based dynamic voltage scaling algorithms on mobile Linux system. [Citation Graph (0, 0)][DBLP]
    SAC, 2007, pp:1141-1145 [Conf]
  20. Sung Y. Shin, Chang Oan Sung
    Heuristic rules for data warehouse developments. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 1999, pp:10-13 [Conf]
  21. Sung Y. Shin, Ming Y. Wang
    Design and implementation of window NT real time email "talk". [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 1999, pp:214-217 [Conf]
  22. Sung Y. Shin, Charlie Yong-Sang Shim, Rex E. Gantenbein
    The optimal data interval for message passing to update checkpointed states in a fault-tolerant distributed systems. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 1998, pp:376-379 [Conf]
  23. Chae-Gon Yoo, Sung Y. Shin, Chi-Jung Hwang
    Coarse matching method on aerial city image using distance weighted intensity transformation. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 1998, pp:295-298 [Conf]
  24. Junghoon Lee, Mikyung Kang, Gyung-Leen Park, Sung Y. Shin
    Design of a Reliable Real-Time Scheduling Policy for Dual-Channel Networks. [Citation Graph (0, 0)][DBLP]
    J. Inf. Sci. Eng., 2007, v:23, n:5, pp:1407-1419 [Journal]

  25. SOR Revisited: Partitioning and Recovering after Shrinking. [Citation Graph (, )][DBLP]


  26. Secure deletion for NAND flash file system. [Citation Graph (, )][DBLP]


  27. Message from the software engineering track chairs: editorial. [Citation Graph (, )][DBLP]


  28. Failure management development for integrated automotive safety-critical software systems. [Citation Graph (, )][DBLP]


  29. A hybrid prefetch policy for the retrieval of link-associated information on vehicular networks. [Citation Graph (, )][DBLP]


Search in 0.015secs, Finished in 0.016secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002