default search action
Eun-Ser Lee
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2014
- [j1]Yung-Joon Jung, Donghyouk Lim, Yongbon Koo, Eun-Ser Lee, Hoon Choi:
A real-time responsiveness measurement method of linux-based mobile systems for P2P cloud systems. Peer-to-Peer Netw. Appl. 7(4): 665-675 (2014) - 2012
- [c24]Myung-Jae Lim, Eun-Ser Lee, Young Man Kwon:
Implementing Mobile Interface Based Voice Recognition System. FGIT-EL/DTA/UNESST 2012: 150-157 - [c23]Myung-Jae Lim, Hyun-Jun Seo, Eun-Ser Lee, Ki-Young Lee:
Design of Order System Using NFC Based Smart Phone. FGIT 2012: 188-193 - [c22]Yongyun Cho, Kyung-Ryoung Cho, Chang-Sun Shin, Jangwoo Park, Eun-Ser Lee:
A Recommend Service Based on Expert Knowledge Model in Agricultural Environments. ICHIT (1) 2012: 189-194 - [c21]Eun-Ser Lee:
Proposal of Scenario and Stakeholder for the Software Reliability Based on MFP (Management Focus on Personnel) Process. ICHIT (2) 2012: 436-440 - [p2]Eun-Ser Lee, Joong-soo Kim:
Design of Lifecycle for Reliability of Open Source Software. Software and Network Engineering 2012: 103-109 - [p1]Eun-Ser Lee, Haeng-Kon Kim:
Evaluation of Risk Items for Open Source Software. Software and Network Engineering 2012: 111-117 - 2011
- [c20]Joa Hyoung Lee, Jae-Myung Kim, Byung-Tae Jang, Eun-Ser Lee:
Data Dissemination Protocol Based on Home Agent and Access Node for Mobile Sink in Mobile Wireless Sensor Networks. ICHIT (1) 2011: 306-314 - [c19]Eun-Ser Lee:
Design of Reference Model for Improvement of Security Process. ICHIT (2) 2011: 383-390 - [c18]Jongmyung Choi, Rosa I. Arriaga, Hyun-Joo Moon, Eun-Ser Lee:
A Context-Driven Development Methodology for Context-Aware Systems. ICHIT (1) 2011: 429-436
2000 – 2009
- 2008
- [c17]Hyun-Joo Moon, Sangheon Kim, Jongbae Moon, Eun-Ser Lee:
An Effective Data Processing Method for Fast Clustering. ICCSA (2) 2008: 335-347 - [c16]Eun-Ser Lee, Sang Ho Lee:
Design of the Architecture for Agent of the Personality Security in the Ubiquitous Environment. KES-AMSTA 2008: 444-453 - 2007
- [c15]Eun-Ser Lee, Haeng-Kon Kim, Sang Ho Lee:
Design of the Intelligence User Identification Method for the Improved Password Input Method and the Personality Security. KES (2) 2007: 581-588 - [c14]Haeng-Kon Kim, Sun-myoung Hwang, Eun-Ser Lee:
Design of Intelligence Mobile Agent Lifecycle for the Progress Management and Mobile Computing. KES-AMSTA 2007: 721-727 - [c13]Eun-Ser Lee, Je-Min Bae:
Design Agent for the Reliable Web Security Requirement Control. KES-AMSTA 2007: 765-774 - [c12]Eun-Ser Lee, Je-Min Bae:
Design Opportunity Tree for Requirement Management and Software Process Improvement. MUE 2007: 395-400 - [c11]Eun-Ser Lee, Haeng-Kon Kim, Sun-myoung Hwang:
Design Opportunity Tree of Capability Improve for Level-up and Software Process Improvement. SERA 2007: 19-24 - [c10]Eun-Ser Lee, Haeng-Kon Kim, Sun-myoung Hwang:
Analysis the priority of security requirement items for the process improvement by ISO/IEC 15504 and ISO/IEC 15408. SERA 2007: 25-30 - 2006
- [c9]Nam-Deok Cho, Eun-Ser Lee:
Design and Implementation of Semantic Web Search System Using Ontology and Anchor Text. ICCSA (5) 2006: 546-554 - [c8]Eun-Ser Lee, Sang Ho Lee:
Design Progress Management for Security Requirements in Ubiquitous Computing Using COQUALMO. ICCSA (5) 2006: 555-564 - [c7]Eun-Ser Lee, Sang Ho Lee:
Design Opportunity Tree for Schedule Management and Evaluation by COQUALMO. ICCSA (4) 2006: 1070-1080 - [c6]Nam-Deok Cho, Eun-Ser Lee, Hyun-gun Park:
Security Intelligence: Web Contents Security System for Semantic Web. KES (2) 2006: 819-828 - 2005
- [c5]Eun-Ser Lee, Malrey Lee:
Development System Security Process of ISO/IEC TR 15504 and Security Considerations for Software Process Improvement. ICCSA (2) 2005: 363-372 - [c4]Malrey Lee, Eun-Ser Lee, HeeJo Kang, HeeSook Kim:
An Expert System Development for Operating Procedure Monitoring of PWR Plants. ICCSA (2) 2005: 483-490 - 2004
- [c3]Eun-Ser Lee, Kyung-Whan Lee, Tai-Hoon Kim, Il-Hong Jung:
Introduction and Evaluation of Development System Security Process of ISO/IEC TR 15504. ICCSA (1) 2004: 451-460 - [c2]Eun-Ser Lee, Tai-Hoon Kim:
Development Site Security Process of ISO/IEC TR 15504. KES 2004: 60-66 - [c1]Eun-Ser Lee, Sun-myoung Hwang:
Software Design Method Enhanced by Appended Security Requirements. PCM (1) 2004: 578-585
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 22:47 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint