The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Ung-Mo Kim: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Sang Yun Park, Ki Seon Ryu, Ung-Mo Kim, Young Ik Eom
    An Efficient Multicasting Scheme Using Prejoin Technology in Mobile Computing Environments. [Citation Graph (0, 0)][DBLP]
    CDMA International Conference, 2002, pp:349-361 [Conf]
  2. Doosung Hwang, Ung-Mo Kim, Jaehun Choi, Jeho Park, Jang-Hee Yoo
    Predictive Model for Protein Function Using Modular Neural Approach. [Citation Graph (0, 0)][DBLP]
    ICAPR (1), 2005, pp:400-409 [Conf]
  3. Youn Chul Jung, Hee Yong Youn, Ung-Mo Kim
    Efficient Indexing of Moving Objects Using Time-Based Partitioning with R-Tree. [Citation Graph (0, 0)][DBLP]
    International Conference on Computational Science (2), 2005, pp:568-575 [Conf]
  4. Juryon Paik, Young Ik Eom, Ung-Mo Kim
    Extraction of Interesting Financial Information from Heterogeneous XML-Based Data. [Citation Graph (0, 0)][DBLP]
    International Conference on Computational Science (4), 2006, pp:356-363 [Conf]
  5. Juryon Paik, Dong Ryeol Shin, Ung-Mo Kim
    EFoX: A Scalable Method for Extracting Frequent Subtrees. [Citation Graph (0, 0)][DBLP]
    International Conference on Computational Science (3), 2005, pp:813-817 [Conf]
  6. Kwangsun Ko, Gu Su Kim, June Kim, JungHyun Han, Ung-Mo Kim, Young Ik Eom
    Design and Implementation of a Security Framework Based on the Object-Based Storage Device Standard. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2006, pp:1028-1035 [Conf]
  7. Hyuk Jin Ko, Dongho Won, Dong Ryul Shin, Hyunseung Choo, Ung-Mo Kim
    A Semantic Context-Aware Access Control in Pervasive Environments. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2006, pp:165-174 [Conf]
  8. Juryon Paik, Hee Yong Youn, Ung-Mo Kim
    A New Method for Mining Association Rules from a Collection of XML Documents. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:936-945 [Conf]
  9. Juryon Paik, Hee Yong Youn, Ung-Mo Kim
    Extraction of Implicit Context Information in Ubiquitous Computing Environments. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:456-465 [Conf]
  10. Sung-Keun Song, Hee Yong Youn, Ung-Mo Kim
    A New Reflective and Reliable Context-Oriented Event Service Architecture for Pervasive Computing. [Citation Graph (0, 0)][DBLP]
    ICCSA (5), 2006, pp:139-148 [Conf]
  11. Hee-Wan Kim, Hae-Kyung Rhee, Tai M. Chung, Young Ik Eom, Ung-Mo Kim
    A Transaction Length-Sensitive Protocol Based on Altruistic Locking for Multilevel Secure Database Systems. [Citation Graph (0, 0)][DBLP]
    ICICS, 2001, pp:107-118 [Conf]
  12. Juryon Paik, Dongho Won, Farshad Fotouhi, Ung-Mo Kim
    EXiT-B: A New Approach for Extracting Maximal Frequent Subtrees from XML Data. [Citation Graph (0, 0)][DBLP]
    IDEAL, 2005, pp:1-8 [Conf]
  13. Hae-Kyung Rhee, Ung-Mo Kim
    Transaction Length-Sensitive Scheme for Livelock-Thin Scheduling. [Citation Graph (0, 0)][DBLP]
    PDPTA, 1999, pp:698-704 [Conf]
  14. Juryon Paik, Ung-Mo Kim
    A Simple Yet Efficient Approach for Maximal Frequent Subtrees Extraction from a Collection of XML Documents. [Citation Graph (0, 0)][DBLP]
    WISE Workshops, 2006, pp:94-103 [Conf]
  15. In-sang Song, Ju-ryun Paik, Ung-Mo Kim
    Semantic-based Similarity Computation for XML Document. [Citation Graph (0, 0)][DBLP]
    MUE, 2007, pp:796-803 [Conf]
  16. Junghyun Nam, Juryon Paik, Ung-Mo Kim, Dongho Won
    Constant-Round Authenticated Group Key Exchange with Logarithmic Computation Complexity. [Citation Graph (0, 0)][DBLP]
    ACNS, 2007, pp:158-176 [Conf]
  17. Kyu Il Kim, Hyuk Jin Ko, Hyun Sik Hwang, Ung-Mo Kim
    Context RBAC/MAC Access Control for Ubiquitous Environment. [Citation Graph (0, 0)][DBLP]
    DASFAA, 2007, pp:1075-1085 [Conf]
  18. Gu Su Kim, Kwangsun Ko, Ung-Mo Kim, Young Ik Eom
    Implementation of OSD Security Framework and Credential Cache. [Citation Graph (0, 0)][DBLP]
    GPC, 2007, pp:666-671 [Conf]
  19. Juryon Paik, Junghyun Nam, SeungCheol Lee, Ung-Mo Kim
    A Framework for Data Structure-Guided Extraction of XML Association Rules. [Citation Graph (0, 0)][DBLP]
    International Conference on Computational Science (3), 2007, pp:709-716 [Conf]
  20. Junghyun Nam, Juryon Paik, Youngsook Lee, Jin Kwak, Ung-Mo Kim, Dongho Won
    Infringing Key Authentication of an ID-Based Group Key Exchange Protocol Using Binary Key Trees. [Citation Graph (0, 0)][DBLP]
    KES (1), 2007, pp:672-679 [Conf]
  21. Eunyoung Kang, Yongsoon Im, Ungmo Kim
    Remote Control Multi-Agent System for u-Healthcare Service. [Citation Graph (0, 0)][DBLP]
    KES-AMSTA, 2007, pp:636-644 [Conf]
  22. Junghyun Nam, Juryon Paik, Ung-Mo Kim, Dongho Won
    Resource-aware protocols for authenticated group key exchange in integrated wired and wireless networks. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 2007, v:177, n:23, pp:5441-5467 [Journal]

  23. Mining Maximal Frequent Subtrees with Lists-Based Pattern-Growth Method. [Citation Graph (, )][DBLP]


  24. Discovery of Useful Patterns from Tree-Structured Documents with Label-Projected Database. [Citation Graph (, )][DBLP]


  25. Mining Maximally Common Substructures from XML Trees with Lists-Based Pattern-Growth Method. [Citation Graph (, )][DBLP]


  26. Enhancing Security of a Group Key Exchange Protocol for Users with Individual Passwords. [Citation Graph (, )][DBLP]


  27. DHT-Based Mobile Service Discovery Protocol for Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP]


  28. A new agent characterization model and grouping method for multi-agent system. [Citation Graph (, )][DBLP]


  29. Adaptive Neighbor Selection for Service Discovery in Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP]


  30. Mining Based Decision Support Multi-agent System for Personalized e-Healthcare Service. [Citation Graph (, )][DBLP]


  31. A Secure Delegation Model Based on Multi-agent in Pervasive Environments. [Citation Graph (, )][DBLP]


  32. RBAC-based access control for privacy protection in pervasive environments. [Citation Graph (, )][DBLP]


  33. Mining association rules in tree structured XML data. [Citation Graph (, )][DBLP]


  34. A method for opinion mining of product reviews using association rules. [Citation Graph (, )][DBLP]


  35. Mining opinions from messenger. [Citation Graph (, )][DBLP]


  36. Distributed File Discovery Protocol in Mobile Peer-to-Peer Networks. [Citation Graph (, )][DBLP]


  37. A Data Sanitization Method for Privacy Preserving Data Re-publication. [Citation Graph (, )][DBLP]


  38. Extracting Temporal Behavior Patterns of Mobile User. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.304secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002