
default search action
Wonil Kim
2020 – today
- 2023
- [c40]Eugene Hwang, Joonhyung Bae, Wonil Kim, Juhan Nam, Jeongmi Lee:
Sense of Convergence: Exploring the Artistic Potential of Cross-modal Sensory Transfer in Virtual Reality. ISMAR-Adjunct 2023: 722-726 - 2021
- [i1]Kyungyun Lee, Wonil Kim, Juhan Nam:
PocketVAE: A Two-step Model for Groove Generation and Control. CoRR abs/2107.05009 (2021) - 2020
- [c39]Soonbeom Choi, Wonil Kim, Saebyul Park, Sangeon Yong, Juhan Nam:
Korean Singing Voice Synthesis Based on Auto-Regressive Boundary Equilibrium Gan. ICASSP 2020: 7234-7238
2010 – 2019
- 2015
- [j7]Gunhee Lee
, Wonil Kim, Kangseok Kim, Sangyoon Oh, Dong-Kyoo Kim:
An approach to mitigate DoS attack based on routing misbehavior in wireless ad hoc networks. Peer-to-Peer Netw. Appl. 8(4): 684-693 (2015) - 2013
- [j6]Wonil Kim
, Rong Xiong
, Qiuguo Zhu, Jun Wu
:
Multiagent Consensus Control under Network-Induced Constraints. J. Appl. Math. 2013: 601652:1-601652:4 (2013) - 2012
- [j5]Wonil Kim, Joo Hwan Lee, Chuleui Hong, Changhee Han, Hanku Lee, Bongshik Jang:
An innovative method for data and software integration in SaaS. Comput. Math. Appl. 64(5): 1252-1258 (2012) - 2011
- [j4]Kangseok Kim, Wonil Kim, Sunshin Kim:
ReMark: an automatic program for clustering orthologs flexibly combining a Recursive and a Markov clustering algorithms. Bioinform. 27(12): 1731-1733 (2011) - [c38]Joo Hwan Lee, Sung Wook Baik
, Kangseok Kim, Changduk Jung, Wonil Kim:
IGC: An Image Genre Classification System. AICI (2) 2011: 360-367 - [c37]Junghyun Kim, Sung Wook Baik
, Kangseok Kim, Changduk Jung, Wonil Kim:
A Cartoon Image Classification System Using MPEG-7 Descriptors. AICI (2) 2011: 368-375 - [c36]Junghyun Kim, Doohong Hwang, Kangseok Kim, Changduk Jung, Wonil Kim:
Development of Real-Time Learning Components Using Expanded SCORM. ICHIT (2) 2011: 501-512 - [c35]Junghyun Kim, Doohong Hwang, Kangseok Kim, Changduk Jung, Wonil Kim:
Development of LMS/LCMS (Contents Link Module) Real-Time Interactive in Videos for Maximizing the Effect of Learning. WISM (2) 2011: 444-451
2000 – 2009
- 2008
- [j3]Jung-Im Heo, Jin-Mo Yang, Donghyun Kim, Kyoungro Yoon, Wonil Kim:
Feature Transformation based Music Retrieval System. Int. J. Fuzzy Log. Intell. Syst. 8(3): 192-195 (2008) - [j2]Jae-Woo Kim, Don-Go Kim, Sanggil Kang, Donghyun Kim, Wonil Kim:
Database using Personal Information Management System. Int. J. Fuzzy Log. Intell. Syst. 8(4): 260-263 (2008) - 2007
- [c34]Song-hwa Chae, Wonil Kim:
Semantic Representation of RTBAC: Relationship-Based Access Control Model. APWeb/WAIM Workshops 2007: 554-563 - 2006
- [j1]Song-hwa Chae, Wonil Kim, Dong-Kyoo Kim:
uT-RBAC: Ubiquitous Role-Based Access Control Model. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 89-A(1): 238-239 (2006) - [c33]Wonik Park, Wonil Kim, Sanggil Kang, Hyunjin Lee, Young-Kuk Kim:
Personalized Digital E-library Service Using Users' Profile Information. ECDL 2006: 528-531 - [c32]Wonil Kim, Sangyoon Oh, Sanggil Kang, Dongkyun Kim:
Multi-module Image Classification System. FQAS 2006: 498-506 - [c31]Wonil Kim, Hanku Lee, Kyoungro Yoon
, HyungSeok Kim
, Changduk Jung:
Personalized Content Presentation for Virtual Gallery. ICAT 2006: 1045-1054 - 2005
- [c30]Wonil Kim, Han-Ku Lee, Jinman Park, Kyoungro Yoon:
Multi Class Adult Image Classification Using Neural Networks. Canadian AI 2005: 222-226 - [c29]Gunhee Lee
, Wonil Kim, Dong-Kyoo Kim:
An Effective Method for Location Privacy in Ubiquitous Computing. EUC Workshops 2005: 1006-1015 - [c28]Wonil Kim, Seong-Joon Yoo, Jin-Sung Kim, Taek Yong Nam, Kyoungro Yoon:
Detecting Adult Images Using Seven MPEG-7 Visual Descriptors. Human.Society@Internet 2005: 336-339 - [c27]Kyunghee Lee, Jungsik Wyee, Wonil Kim, Minkoo Kim:
Adaptive Spam mail filtering. International Conference on Internet Computing 2005: 402-408 - [c26]Wonil Kim, Han-Ku Lee, Seong-Joon Yoo, Sung Wook Baik:
Neural Network Based Adult Image Classification. ICANN (1) 2005: 481-486 - [c25]Tao Jiang, Wonil Kim, Kyung-suk Lhee, Manpyo Hong:
E-mail Worm Detection Using the Analysis of Behavior. ICDCIT 2005: 348-356 - [c24]Keonsoo Lee, Wonil Kim, Minkoo Kim:
Effective Information Sharing Using Concept Mapping. KES (3) 2005: 177-183 - [c23]Song-hwa Chae, Wonil Kim, Dong-Kyoo Kim:
Role-Based Access Control Model for Ubiquitous Computing Environment. WISA 2005: 354-363 - 2004
- [c22]Sanggil Kang, Wonil Kim:
A Novel Approach for Simplifying Neural Networks by Identifying Decoupling Inputs. Australian Conference on Artificial Intelligence 2004: 754-765 - [c21]Hyungjoon Lee, Wonil Kim, Manpyo Hong:
Biologically Inspired Computer Virus Detection System. BioADIT 2004: 153-165 - [c20]Keonsoo Lee, Wonil Kim, Minkoo Kim:
Supply Chain Management using Multi-agent System. CIA 2004: 215-225 - [c19]Chul-Eui Hong, Wonil Kim, Yeong-Joon Kim:
A Novel Approach to Load Balancing Problem. CIS 2004: 188-193 - [c18]Wonil Kim, Chul-Eui Hong, Yeong-Joon Kim:
Asynchronous Distributed Genetic Algorithm for Optimal Channel Routing. CIS 2004: 194-199 - [c17]Wonil Kim, Chul-Eui Hong, Changduk Jung:
A Novel Approach to Function Approximation: Adaptive Multimodule Regression Networks. IBERAMIA 2004: 820-829 - [c16]Chul-Eui Hong, Wonil Kim, Yeong-Joon Kim:
A Novel Hybrid Approach of Mean Field Annealing and Genetic Algorithm for Load Balancing Problem. IBERAMIA 2004: 830-840 - [c15]Cholmin Kim, Wonil Kim, Manpyo Hong:
Effective Detector Set Generation and Evolution for Artificial Immune System. International Conference on Computational Science 2004: 491-498 - [c14]Hyungjoon Lee, Wonil Kim, Manpyo Hong:
Artificial Immune System against Viral Attack. International Conference on Computational Science 2004: 499-506 - [c13]Sihn-Hye Park, Wonil Kim, Dong-Kyoo Kim:
Autonomic Protection System Using Adaptive Security Policy. ICCSA (3) 2004: 896-905 - [c12]Gunhee Lee
, Wonil Kim, Dong-Kyoo Kim:
A Novel Method to Support User's Consent in Usage Control for Stable Trust in E-business. ICCSA (3) 2004: 906-914 - [c11]Song-hwa Chae, Wonil Kim, Dong-Kyoo Kim:
Efficient Role Based Access Control Method in Wireless Environment. PWC 2004: 431-439 - [c10]Chul-Eui Hong, Wonil Kim, Yeong-Joon Kim:
Distributed Channel Routing Using Genetic Algorithm. PDCAT 2004: 234-237 - [c9]Wonil Kim, Chul-Eui Hong, Yeong-Joon Kim:
Distributed Simulated Annealing for Composite Stock Cutting Problem. PDCAT 2004: 238-242 - [c8]Wonil Kim, Chul-Eui Hong, Yeong-Joon Kim:
The Analysis of Hardware Supported Cache Lock Mechanism Without Retry. PDCAT 2004: 787-790 - [c7]Gunhee Lee
, Wonil Kim, Dong-Kyoo Kim, Hongjin Yeh:
Effective Web-Related Resource Security Using Distributed Role Hierarchy. WAIM 2004: 87-96 - 2003
- [c6]Woncheol Kim, Eenjun Hwang, Wonil Kim:
ASPerson: Agent System for Personalizing Web Contents over Wireless Connection. CAEPIA 2003: 187-196 - [c5]Youna Jung, Eenjun Hwang, Wonil Kim:
Sports Image Classification through Bayesian Classifier. CAEPIA 2003: 546-555 - [c4]Woncheol Kim, Eenjun Hwang, Wonil Kim:
Reorganizing News Web Pages for Mobile Users. EPIA 2003: 229-243 - [c3]Min-Ji Lee, Wonil Kim, Jai-Hoon Kim:
Performance Improvement of Information Service Using Priority Driven Method. GCC (2) 2003: 565-572 - [c2]Gunhee Lee
, Hongjin Yeh, Wonil Kim, Dong-Kyoo Kim:
Web Security Using Distributed Role Hierarchy. GCC (1) 2003: 1087-1090 - [c1]Song-hwa Chae, Wonil Kim, Dong-Kyoo Kim:
A Novel Approach to Role-Based Access Control. International Conference on Computational Science 2003: 1060-1068
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
[+][–] Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
[+][–] Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:35 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint