The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Sung Kwon Kim: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Soo-Cheol Kim, Sang Soo Yeo, Sung Kwon Kim
    MARP: Mobile Agent for RFID Privacy Protection. [Citation Graph (0, 0)][DBLP]
    CARDIS, 2006, pp:300-312 [Conf]
  2. Sung Kwon Kim
    Rectangulating Rectilinear Polygons in Parallel. [Citation Graph (0, 0)][DBLP]
    COCOON, 1995, pp:61-70 [Conf]
  3. Sung Kwon Kim, Chan-Su Shin
    Efficient Algorithms for Two-Center Problems for a Convex Polygon. [Citation Graph (0, 0)][DBLP]
    COCOON, 2000, pp:299-309 [Conf]
  4. Chan-Su Shin, Sung Kwon Kim, Kyung-Yong Chwa
    Area-Efficient Algorithms for Upward Straight-Line Tree Drawings (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    COCOON, 1996, pp:106-116 [Conf]
  5. Chan-Su Shin, Jung-Hyun Kim, Sung Kwon Kim, Kyung-Yong Chwa
    Two-Center Problems for a Convex Polygon (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    ESA, 1998, pp:199-210 [Conf]
  6. Sang Soo Yeo, Sung Kwon Kim
    Scalable and Flexible Privacy Protection Scheme for RFID Systems. [Citation Graph (0, 0)][DBLP]
    ESAS, 2005, pp:153-163 [Conf]
  7. Sung Kwon Kim
    A Parallel Algorithm for Path-Min Queries in Trees. [Citation Graph (0, 0)][DBLP]
    ICCI, 1990, pp:425-432 [Conf]
  8. Soon Seok Kim, Sung Kwon Kim, Hong-Jin Park
    New Approach for Secure and Efficient Metering in the Web Advertising. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:215-221 [Conf]
  9. Joonsoo Choi, Chan-Su Shin, Sung Kwon Kim
    Computing Weighted Rectilinear Median and Center Set in the Presence of Obstacles. [Citation Graph (0, 0)][DBLP]
    ISAAC, 1998, pp:29-38 [Conf]
  10. Sung Kwon Kim
    An efficient parallel algorithm for the planar mincut linear arrangement problem for trees. [Citation Graph (0, 0)][DBLP]
    ISPAN, 1997, pp:240-246 [Conf]
  11. Soon Seok Kim, Sang Soo Yeo, Hong-Jin Park, Sung Kwon Kim
    A New Scheme for the Location Information Protection in Mobile Communication Environments. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2005, pp:436-441 [Conf]
  12. Sharat Chandran, Sung Kwon Kim, David M. Mount
    Parallel Computational Geometry of Rectangles. [Citation Graph (0, 0)][DBLP]
    Algorithmica, 1992, v:7, n:1, pp:25-49 [Journal]
  13. Chan-Su Shin, Sung Kwon Kim, Kyung-Yong Chwa
    Area-efficient algorithms for straight-line tree drawings. [Citation Graph (0, 0)][DBLP]
    Comput. Geom., 2000, v:15, n:4, pp:175-202 [Journal]
  14. Sung Kwon Kim
    Order-preserving, upward drawing of binary trees using fewer bends. [Citation Graph (0, 0)][DBLP]
    Discrete Applied Mathematics, 2004, v:143, n:1-3, pp:318-323 [Journal]
  15. Sung Kwon Kim, Chan-Su Shin, Tae-Cheon Yang
    Labeling a Rectilinear Map with Sliding Labels. [Citation Graph (0, 0)][DBLP]
    Int. J. Comput. Geometry Appl., 2001, v:11, n:2, pp:167-179 [Journal]
  16. Sung Kwon Kim
    Linear-time algorithm for finding a maximum-density segment of a sequence. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 2003, v:86, n:6, pp:339-342 [Journal]
  17. Sung Kwon Kim
    Finding a longest nonnegative path in a constant degree tree. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 2005, v:93, n:6, pp:275-279 [Journal]
  18. Sung Kwon Kim
    A Parallel Algorithm for Finding a Maximum Clique of a Set of Circular Arcs of a Circle. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1990, v:34, n:5, pp:235-241 [Journal]
  19. Sung Kwon Kim
    The Range Co-Minima Problem. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1994, v:49, n:3, pp:117-121 [Journal]
  20. Sung Kwon Kim
    Logarithmic Width, Linear Area Upward Drawing of AVL Trees. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1997, v:63, n:6, pp:303-307 [Journal]
  21. Sung Kwon Kim
    Parallel Algorithms for the Segment Dragging Problem. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1990, v:36, n:6, pp:323-327 [Journal]
  22. Sung Kwon Kim, Chan-Su Shin, Tae-Cheon Yang
    Placing two disks in a convex polygon. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 2000, v:73, n:1-2, pp:33-39 [Journal]
  23. Chan-Su Shin, Sung Kwon Kim, Sung-Ho Kim, Kyung-Yong Chwa
    Algorithms for Drawing Binary Trees in the Plane. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1998, v:66, n:3, pp:133-139 [Journal]
  24. Sung Kwon Kim, Chan-Su Shin
    Computing the Optimal Bridge between Two Polygons. [Citation Graph (0, 0)][DBLP]
    Theory Comput. Syst., 2001, v:34, n:4, pp:337-352 [Journal]
  25. Sung Kwon Kim
    Parallel algorithms for planar dominance counting. [Citation Graph (0, 0)][DBLP]
    Parallel Computing, 1990, v:15, n:1-3, pp:241-246 [Journal]
  26. Sung Kwon Kim
    Rectangulating Rectilinear Polygons in Parallel. [Citation Graph (0, 0)][DBLP]
    Parallel Computing, 1997, v:23, n:3, pp:349-367 [Journal]
  27. Sung Kwon Kim
    Constant-Time RMESH Algorithms for the Range Minima and Co-Minima Problems. [Citation Graph (0, 0)][DBLP]
    Parallel Computing, 1998, v:24, n:5-6, pp:965-977 [Journal]
  28. Sung Kwon Kim
    Optimal Parallel Algorithms for Region Labeling and Medial Axis Transform of Binary Images. [Citation Graph (0, 0)][DBLP]
    SIAM J. Discrete Math., 1991, v:4, n:3, pp:385-396 [Journal]
  29. Jae-Dong Shin, Sang Soo Yeo, Tai-Hoon Kim, Sung Kwon Kim
    Hybrid Tag Anti-collision Algorithms in RFID Systems. [Citation Graph (0, 0)][DBLP]
    International Conference on Computational Science (4), 2007, pp:693-700 [Conf]
  30. Sang Soo Yeo, Kouichi Sakurai, SungEon Cho, KiSung Yang, Sung Kwon Kim
    Forward Secure Privacy Protection Scheme for RFID System Using Advanced Encryption Standard. [Citation Graph (0, 0)][DBLP]
    ISPA Workshops, 2007, pp:245-254 [Conf]
  31. Sang Soo Yeo, Soo-Cheol Kim, Sung Kwon Kim
    eMARP: Enhanced Mobile Agent for RFID Privacy Protection and Forgery Detection. [Citation Graph (0, 0)][DBLP]
    KES-AMSTA, 2007, pp:318-327 [Conf]

  32. Enhanced Yoking Proof Protocols for RFID Tags and Tag Groups. [Citation Graph (, )][DBLP]


  33. MarSelHR: A Haplotype Reconstruction System Using Linkage Disequilibrium. [Citation Graph (, )][DBLP]


  34. An Analysis of RFID Tag Authentication Protocols Using Secret Value. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.304secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002