Search the dblp DataBase
Ung-Mo Kim :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Sang Yun Park , Ki Seon Ryu , Ung-Mo Kim , Young Ik Eom An Efficient Multicasting Scheme Using Prejoin Technology in Mobile Computing Environments. [Citation Graph (0, 0)][DBLP ] CDMA International Conference, 2002, pp:349-361 [Conf ] Doosung Hwang , Ung-Mo Kim , Jaehun Choi , Jeho Park , Jang-Hee Yoo Predictive Model for Protein Function Using Modular Neural Approach. [Citation Graph (0, 0)][DBLP ] ICAPR (1), 2005, pp:400-409 [Conf ] Youn Chul Jung , Hee Yong Youn , Ung-Mo Kim Efficient Indexing of Moving Objects Using Time-Based Partitioning with R-Tree. [Citation Graph (0, 0)][DBLP ] International Conference on Computational Science (2), 2005, pp:568-575 [Conf ] Juryon Paik , Young Ik Eom , Ung-Mo Kim Extraction of Interesting Financial Information from Heterogeneous XML-Based Data. [Citation Graph (0, 0)][DBLP ] International Conference on Computational Science (4), 2006, pp:356-363 [Conf ] Juryon Paik , Dong Ryeol Shin , Ung-Mo Kim EFoX: A Scalable Method for Extracting Frequent Subtrees. [Citation Graph (0, 0)][DBLP ] International Conference on Computational Science (3), 2005, pp:813-817 [Conf ] Kwangsun Ko , Gu Su Kim , June Kim , JungHyun Han , Ung-Mo Kim , Young Ik Eom Design and Implementation of a Security Framework Based on the Object-Based Storage Device Standard. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2006, pp:1028-1035 [Conf ] Hyuk Jin Ko , Dongho Won , Dong Ryul Shin , Hyunseung Choo , Ung-Mo Kim A Semantic Context-Aware Access Control in Pervasive Environments. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2006, pp:165-174 [Conf ] Juryon Paik , Hee Yong Youn , Ung-Mo Kim A New Method for Mining Association Rules from a Collection of XML Documents. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:936-945 [Conf ] Juryon Paik , Hee Yong Youn , Ung-Mo Kim Extraction of Implicit Context Information in Ubiquitous Computing Environments. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2006, pp:456-465 [Conf ] Sung-Keun Song , Hee Yong Youn , Ung-Mo Kim A New Reflective and Reliable Context-Oriented Event Service Architecture for Pervasive Computing. [Citation Graph (0, 0)][DBLP ] ICCSA (5), 2006, pp:139-148 [Conf ] Hee-Wan Kim , Hae-Kyung Rhee , Tai M. Chung , Young Ik Eom , Ung-Mo Kim A Transaction Length-Sensitive Protocol Based on Altruistic Locking for Multilevel Secure Database Systems. [Citation Graph (0, 0)][DBLP ] ICICS, 2001, pp:107-118 [Conf ] Juryon Paik , Dongho Won , Farshad Fotouhi , Ung-Mo Kim EXiT-B: A New Approach for Extracting Maximal Frequent Subtrees from XML Data. [Citation Graph (0, 0)][DBLP ] IDEAL, 2005, pp:1-8 [Conf ] Hae-Kyung Rhee , Ung-Mo Kim Transaction Length-Sensitive Scheme for Livelock-Thin Scheduling. [Citation Graph (0, 0)][DBLP ] PDPTA, 1999, pp:698-704 [Conf ] Juryon Paik , Ung-Mo Kim A Simple Yet Efficient Approach for Maximal Frequent Subtrees Extraction from a Collection of XML Documents. [Citation Graph (0, 0)][DBLP ] WISE Workshops, 2006, pp:94-103 [Conf ] In-sang Song , Ju-ryun Paik , Ung-Mo Kim Semantic-based Similarity Computation for XML Document. [Citation Graph (0, 0)][DBLP ] MUE, 2007, pp:796-803 [Conf ] Junghyun Nam , Juryon Paik , Ung-Mo Kim , Dongho Won Constant-Round Authenticated Group Key Exchange with Logarithmic Computation Complexity. [Citation Graph (0, 0)][DBLP ] ACNS, 2007, pp:158-176 [Conf ] Kyu Il Kim , Hyuk Jin Ko , Hyun Sik Hwang , Ung-Mo Kim Context RBAC/MAC Access Control for Ubiquitous Environment. [Citation Graph (0, 0)][DBLP ] DASFAA, 2007, pp:1075-1085 [Conf ] Gu Su Kim , Kwangsun Ko , Ung-Mo Kim , Young Ik Eom Implementation of OSD Security Framework and Credential Cache. [Citation Graph (0, 0)][DBLP ] GPC, 2007, pp:666-671 [Conf ] Juryon Paik , Junghyun Nam , SeungCheol Lee , Ung-Mo Kim A Framework for Data Structure-Guided Extraction of XML Association Rules. [Citation Graph (0, 0)][DBLP ] International Conference on Computational Science (3), 2007, pp:709-716 [Conf ] Junghyun Nam , Juryon Paik , Youngsook Lee , Jin Kwak , Ung-Mo Kim , Dongho Won Infringing Key Authentication of an ID-Based Group Key Exchange Protocol Using Binary Key Trees. [Citation Graph (0, 0)][DBLP ] KES (1), 2007, pp:672-679 [Conf ] Eunyoung Kang , Yongsoon Im , Ungmo Kim Remote Control Multi-Agent System for u-Healthcare Service. [Citation Graph (0, 0)][DBLP ] KES-AMSTA, 2007, pp:636-644 [Conf ] Junghyun Nam , Juryon Paik , Ung-Mo Kim , Dongho Won Resource-aware protocols for authenticated group key exchange in integrated wired and wireless networks. [Citation Graph (0, 0)][DBLP ] Inf. Sci., 2007, v:177, n:23, pp:5441-5467 [Journal ] Mining Maximal Frequent Subtrees with Lists-Based Pattern-Growth Method. [Citation Graph (, )][DBLP ] Discovery of Useful Patterns from Tree-Structured Documents with Label-Projected Database. [Citation Graph (, )][DBLP ] Mining Maximally Common Substructures from XML Trees with Lists-Based Pattern-Growth Method. [Citation Graph (, )][DBLP ] Enhancing Security of a Group Key Exchange Protocol for Users with Individual Passwords. [Citation Graph (, )][DBLP ] DHT-Based Mobile Service Discovery Protocol for Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP ] A new agent characterization model and grouping method for multi-agent system. [Citation Graph (, )][DBLP ] Adaptive Neighbor Selection for Service Discovery in Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP ] Mining Based Decision Support Multi-agent System for Personalized e-Healthcare Service. [Citation Graph (, )][DBLP ] A Secure Delegation Model Based on Multi-agent in Pervasive Environments. [Citation Graph (, )][DBLP ] RBAC-based access control for privacy protection in pervasive environments. [Citation Graph (, )][DBLP ] Mining association rules in tree structured XML data. [Citation Graph (, )][DBLP ] A method for opinion mining of product reviews using association rules. [Citation Graph (, )][DBLP ] Mining opinions from messenger. [Citation Graph (, )][DBLP ] Distributed File Discovery Protocol in Mobile Peer-to-Peer Networks. [Citation Graph (, )][DBLP ] A Data Sanitization Method for Privacy Preserving Data Re-publication. [Citation Graph (, )][DBLP ] Extracting Temporal Behavior Patterns of Mobile User. [Citation Graph (, )][DBLP ] Search in 0.002secs, Finished in 0.304secs