default search action
Sung-Ho Kim 0001
Person information
- affiliation: Kyungpook National University, School of Computer Science and Engineering, Daegu, Korea
Other persons with the same name
- Sung-Ho Kim — disambiguation page
- Sung-Ho Kim 0002 — Korea Advanced Institute of Science and Technology, Division of Applied Mathematics, Daejeon, South Korea
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [c20]Chang Seob Yun, Jae-Hyun Jun, Sung-Ho Kim, Dae-Soo Kim:
Real-Time Forensic Marking Method based on Tiles Parallel Processing. ICTC 2020: 1475-1477
2010 – 2019
- 2019
- [c19]Huiyu Liu, Owolabi Ganiyat O., Sung-Ho Kim:
Automatic Classifications and Recognition for Recycled Garbage by Utilizing Deep Learning Technology. ICIT 2019: 1-4 - 2017
- [j5]Jae-Hyun Jun, Min-Jun Kim, Yong-Suk Jang, Sung-Ho Kim:
Fire Detection Using Multi-Channel Information and Gray Level Co-occurrence Matrix Image Features. J. Inf. Process. Syst. 13(3): 590-598 (2017) - 2016
- [j4]Jonghyuk Park, Nakhoon Baek, Sung-Ho Kim:
A text-based user interface scheme for low-tier embedded systems: an object-oriented approach. Clust. Comput. 19(4): 1879-1884 (2016) - 2014
- [c18]Jae-Hyun Jun, Cheol-Woong Ahn, Sung-Ho Kim:
DDoS attack detection by using packet sampling and flow features. SAC 2014: 711-712 - 2012
- [j3]Min-Jun Kim, Yong-Suk Jang, Yong-Do Choi, Sung-Ho Kim:
Differentiated bandwidth allocation and wavelength assignment method in WDM EPON. Comput. Syst. Sci. Eng. 27(5) (2012) - [c17]Jeong-Hyun Cho, Yong-Do Choi, Sung-Ho Kim:
A Bandwidth Reservation Method for Multicast Streaming Service. ICHIT (1) 2012: 17-24 - 2011
- [c16]Jae-Hyun Jun, Hyunju Oh, Sung-Ho Kim:
DDoS flooding attack detection through a step-by-step investigation. NESEA 2011: 1-5 - [c15]Zhibin Yu, Gi-Beom Kil, Yong-Do Choi, Sung-Ho Kim:
Traffic classification based on visualization. NESEA 2011: 1-6 - 2010
- [c14]Min-Jun Kim, Yong-Suk Jang, Yong-Do Choi, Sung-Ho Kim:
Differentiated Bandwidth Allocation and WaveLength Assignment Method in WDM EPON. BWCCA 2010: 124-128 - [c13]Jae-Hyun Jun, Zhibin Yu, Min-Suk Jung, Sung-Ho Kim:
Inter-ONU Scheduling Scheme for QoS Guarantee in 10G EPON. BWCCA 2010: 137-141 - [c12]Yong-Do Choi, Jae-Hyun Jun, Gi-Beom Kil, Sung-Ho Kim:
Bandwidth Reservation Method to Consider Reservation Failure in VLAN. BWCCA 2010: 175-180 - [c11]Zhibin Yu, Min-Jun Kim, Kyung-Seok Park, Sung-Ho Kim:
Solid Convex-Hull Sequential Support Vector Machine. BWCCA 2010: 181-185 - [c10]Kyung-Seok Park, Zhibin Yu, Jeong-Hyun Cho, Sung-Ho Kim:
An Intra-ONU Scheduling Method in 10G EPON Supporting IEEE 802.1 AVB. CISIS 2010: 631-636
2000 – 2009
- 2008
- [c9]Kyung-Seok Park, Min-Jun Kim, Jeong-Hyun Cho, Sung-Ho Kim:
Search Range Selection Method to Reduce the Complexity in H.264. ALPIT 2008: 230-234 - [c8]Yong-Do Choi, Jung-Won Lee, Sang-Ryul Ryu, Sung-Ho Kim:
A Forwarding Method on the IEEE 802.1 AVB. ALPIT 2008: 497-502 - [c7]Min-Jun Kim, Yong-Suk Jang, Min-Suk Jung, Sung-Ho Kim:
Frame Forwarding Rules for Link Utilization in IEEE 802.1 AVB Networks. ALPIT 2008: 509-512 - 2007
- [c6]Min-Jun Kim, June-Chul Kim, Sang-Ryul Ryu, Sung-Ho Kim:
Similarity Measure and Shadow Casting Method for Object Tracking. ALPIT 2007: 237-241 - [c5]Kyung-Suek Park, Jeong-Hyun Cho, Jae-Hyung Ko, Sung-Ho Kim:
A Viewpoint Switching Method for Multiview Videos Using the MPEG-4 System. ALPIT 2007: 287-292 - [c4]Jun-Cheol Lee, Sang-Ryul Ryu, Se-Yul Lee, Jeong-Hyun Cho, Sung-Ho Kim:
A Method of Object Recognition which Applicable to the Real-Time Processing Using Adaptive Factors. MUE 2007: 686-691 - 2004
- [c3]Min-Suk Jung, Jonghoon Eom, Sang-Ryul Ryu, Sung-Ho Kim:
A Dynamic Bandwidth Allocation Algorithm with Supporting QoS for EPON. AIS 2004: 556-564 - [c2]Jeong-Hyun Cho, Chang-Gyu Choi, Yongseok Chang, Sung-Ho Kim:
Representation of Clipart Image Using Shape and Color with Spatial Relationship. PCM (1) 2004: 165-173 - [c1]Min-Suk Jung, Jonghoon Eom, Sung-Ho Kim:
Performance Analysis of MAC Protocol for EPON Using OPNET. PCM (2) 2004: 356-363
1990 – 1999
- 1998
- [j2]Chan-Su Shin, Sung Kwon Kim, Sung-Ho Kim, Kyung-Yong Chwa:
Algorithms for Drawing Binary Trees in the Plane. Inf. Process. Lett. 66(3): 133-139 (1998) - 1995
- [j1]Sung-Ho Kim, Jung-Heum Park, Seung-Hak Choi, Sung Yong Shin, Kyung-Yong Chwa:
An Optimal Algorithm for Finding the Edge Visibility Polygon under Limited Visibility. Inf. Process. Lett. 53(6): 359-365 (1995)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-18 20:30 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint