Name
Affiliation
Papers
MIN-SOO KIM
Ajou Univ, Grad Sch Informat & Commun, Suwon, South Korea
88
Collaborators
Citations 
PageRank 
154
437
51.12
Referers 
Referees 
References 
1095
1601
778
Search Limit
1001000
Title
Citations
PageRank
Year
Improving Neural Networks Using Slice Models For Similar Classes00.342020
A Deep Learning Method For Intraoperative Age-Agnostic And Disease-Specific Cardiac Output Monitoring From Arterial Blood Pressure00.342020
MRPrimerW2: an enhanced tool for rapid design of valid high-quality primers with multiple search modes for qPCR experiments.00.342019
Real-Time Connection Monitoring Of Ubiquitous Networks For Intrusion Prediction: A Sequential Knn Voting Approach00.342015
DB-IR integration using tight-coupling in the Odysseus DBMS20.372015
Leveraging spatial join for robust tuple extraction from web pages10.352014
Joins on encoded and partitioned data70.522014
Robust and incremental stitching and calibration with known rotation on pan-tilt-zoom camera00.342013
Regional CRL Distribution Based on the LBS for Vehicular Networks.00.342013
Some symmetric identities on higher order q-Euler polynomials and multivariate fermionic p-adic q-integral on Zp00.342013
A Secure Self-Encryption Scheme for Resource Limited Mobile Devices.10.352012
Hybrid partitioned H.264 full high definition decoder on embedded quad-core.30.402012
Towards secure cooperation in online social networks10.382012
Business Analytics in (a) Blink.211.132012
Symmetry Fermionic -Adic -Integral on ℤ for Eulerian Polynomials.00.342012
A hybrid decision support model to discover informative knowledge in diagnosing acute appendicitis.60.392012
Decision-making model for early diagnosis of congestive heart failure using rough set and decision tree approaches.231.192012
A survey of security issue in multi-agent systems190.672012
A note on sums of products of Bernoulli numbers00.342011
H.264/Avc Uhd Decoder Implementation On Multi-Cluster Platform Using Hybrid Parallelization Method40.472011
Ontology-based Dynamic Role Interaction Control in Multi-Agent Systems.00.342011
Blink: Not Your Father's Database!60.662011
A study on hierarchical policy model for managing heterogeneous security systems10.362011
A study of inchworm robot by using smart materials.00.342011
Tightly-coupled spatial database features in the Odysseus/OpenGIS DBMS for high-performance80.502010
Energy-Efficient Distributed Spatial Join Processing In Wireless Sensor Networks00.342010
Structural consistency: enabling XML keyword search to eliminate spurious results consistently90.492010
Hybrid Spatial Query Processing Between A Server And A Wireless Sensor Network10.362010
Evasion technique and detection of malicious botnet20.392010
H.264 decoder on embedded dual core with dynamically load-balanced functional paritioning120.772010
Situation-Aware Community Computing Model for Developing Dynamic Ubiquitous Computing Systems20.412010
A particle-and-density based evolutionary clustering method for dynamic networks893.942009
Handling Exceptions in Situation-Driven Agent Systems10.352009
The partitioned-layer index: Answering monotone top-k queries using the convex skyline and partitioning-merging technique100.542009
EDCA-TM: IEEE 802.11e MAC enhancement for wireless multi-hop networks80.702009
Installation and evaluation of RFID readers on moving vehicles192.792009
Robot visual servo through trajectory estimation of a moving object using kalman filter00.342009
A Formal Definition of Situation towards Situation-Aware Computing10.392009
Fast Service Selection Using rete Network in Dynamic Environment00.342009
CHRONICLE: A Two-Stage Density-Based Clustering Algorithm for Dynamic Networks70.492009
An architecture for specification and enforcement of temporal access control constraints using OWL41.652009
A Security Coordination Model for an Inter-Organizational Information Incidents Response Supporting Forensic Process00.342008
A Visualization Technique for Installation Evidences Containing Malicious Executable Files Using Machine Language Sequence00.342008
Relevant pattern selection for subspace learning30.402008
Group organization algorithm based on trust and reputation in agent society00.342008
Access Control for Cooperation Systems Based on Group Situation50.602008
A Logical Model And Data Placement Strategies For Mems Storage Devices10.352008
An Automatic Identification of a Damaged Malicious File Using HMM against Anti-Forensics00.342008
Structural optimization of a full-text n-gram index using relational normalization50.582008
Developing Protege Plug-In: Owl Ontology Visualization Using Social Network10.482008
  • 1
  • 2