default search action
Dae-Kyoo Kim
Person information
- affiliation: Oakland University, Rochester, MI, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j40]Dae-Kyoo Kim, Yeasun K. Chung:
Addressing Class Imbalances in Software Defect Detection. J. Comput. Inf. Syst. 64(2): 219-231 (2024) - [j39]Purnima Naik, Salomi Nelaballi, Venkata Sai Pusuluri, Dae-Kyoo Kim:
Deep Learning-Based Code Refactoring: A Review of Current Knowledge. J. Comput. Inf. Syst. 64(2): 314-328 (2024) - [c44]Weifeng Pan, Wei Wu, Ming Hua, Dae-Kyoo Kim, Jinkai Yang, Ruochen Liu:
Improving the Condensing of Reverse Engineered Class Diagrams using Weighted Network Metrics. ICSE Companion 2024: 374-375 - 2023
- [j38]Chengjuan Ren, Ziyu Guo, Huipeng Ren, Dongwon Jeong, Dae-Kyoo Kim, Shiyan Zhang, Jiacheng Wang, Guangnan Zhang:
Prostate Segmentation in MRI Using Transformer Encoder and Decoder Framework. IEEE Access 11: 101630-101643 (2023) - [j37]Mohammad A. Yahya, Dae-Kyoo Kim:
CLCD-I: Cross-Language Clone Detection by Using Deep Learning with InferCode. Comput. 12(1): 12 (2023) - [j36]Weifeng Pan, Ming Hua, Dae-Kyoo Kim, Zijiang Yang:
Pride: Prioritizing Documentation Effort Based on a PageRank-Like Algorithm and Simple Filtering Rules. IEEE Trans. Software Eng. 49(3): 1118-1151 (2023) - [c43]Weifeng Pan, Xin Du, Ming Hua, Dae-Kyoo Kim, Zijiang Yang:
Identifying Key Classes for Initial Software Comprehension: Can We Do It Better? ICSE 2023: 1878-1889 - [i5]Dae-Kyoo Kim:
Prompted Software Engineering in the Era of AI Models. CoRR abs/2311.03359 (2023) - 2022
- [j35]Peter Sun, Dae-Kyoo Kim, Ming Hua, Lunjin Lu:
Measuring Impact of Dependency Injection on Software Maintainability. Comput. 11(9): 141 (2022) - [j34]Riley Byrd, Kulin Damani, Hongjia Che, Anthony Calandra, Dae-Kyoo Kim:
A Systematic Literature Review of Volumetric 3D Model Reconstruction Methodologies Using Generative Adversarial Networks. J. Inf. Sci. Eng. 38(6): 1243-1263 (2022) - [j33]Maggie Lei, Hao Li, Ji Li, Namrata Aundhkar, Dae-Kyoo Kim:
Deep learning application on code clone detection: A review of current knowledge. J. Syst. Softw. 184: 111141 (2022) - [j32]Hwimin Kim, Dae-Kyoo Kim, Alaa S. Alaerjan:
ABAC-Based Security Model for DDS. IEEE Trans. Dependable Secur. Comput. 19(5): 3113-3124 (2022) - [i4]Mohammad A. Yahya, Dae-Kyoo Kim:
Cross-Language Source Code Clone Detection Using Deep Learning with InferCode. CoRR abs/2205.04913 (2022) - [i3]Peter Sun, Dae-Kyoo Kim:
Analyzing Impact of Dependency Injection on Software Maintainability. CoRR abs/2205.06381 (2022) - 2021
- [j31]Dae-Kyoo Kim, Yeasun K. Chung:
R-BPMN for abstract modeling of business process patterns. Bus. Process. Manag. J. 27(5): 1445-1462 (2021) - [j30]Weifeng Pan, Ming Hua, Carl K. Chang, Zijiang Yang, Dae-Kyoo Kim:
ElementRank: Ranking Java Software Classes and Packages using a Multilayer Complex Network-Based Approach. IEEE Trans. Software Eng. 47(10): 2272-2295 (2021) - 2020
- [j29]Yiran Wang, Dae-Kyoo Kim, Dongwon Jeong:
A Survey of the Application of Blockchain in Multiple Fields of Financial Services. J. Inf. Process. Syst. 16(4): 935-958 (2020) - [j28]Chengjuan Ren, Dae-Kyoo Kim, Dongwon Jeong:
A Survey of Deep Learning in Agriculture: Techniques and Their Applications. J. Inf. Process. Syst. 16(5): 1015-1033 (2020) - [c42]Dae-Kyoo Kim, Ming Hua, Lunjin Lu:
Reflection on Building Hybrid Access Control by Configuring RBAC and MAC Features. SANER 2020: 522-526
2010 – 2019
- 2019
- [j27]Junha Lee, Dae-Kyoo Kim, Sooyong Park, Hwimin Kim:
Measuring Class Cohesion Using Internal and External Class Relationships. Int. J. Softw. Eng. Knowl. Eng. 29(7): 971-996 (2019) - [c41]Mohammed Hamdi, Rashmi Pethe, Annapoorani Sevugan Chetty, Dae-Kyoo Kim:
Threshold-Driven Class Decomposition. COMPSAC (1) 2019: 884-887 - [c40]Priyanka Bharat Sakhare, Dae-Kyoo Kim, Mohammed Hamdi:
Detecting No-Sleep Bugs Using Sequential Reference Counts. COMPSAC (1) 2019: 940-941 - 2018
- [j26]Dhrgam Al Kafaf, Dae-Kyoo Kim, Lunjin Lu:
A three-phase decision making approach for self-adaptive systems using web services. Complex Adapt. Syst. Model. 6: 8 (2018) - [j25]Peter Miele, Mohammed Alquwaisuwaisuwais uwaisem, Dae-Kyoo Kim:
Comparative Assessment of Static Analysis Tools for Software Vulnerability. J. Comput. 13(10): 1136-1144 (2018) - [j24]Tom Tisdall, Pankaj Chobharkar, Dae-Kyoo Kim:
Challenges in Porting Enterprise Applications to Mobile Platforms. GetMobile Mob. Comput. Commun. 22(1): 21-25 (2018) - [c39]Scott Hall, Suman Nataraj, Dae-Kyoo Kim:
Detecting no-sleep energy bugs using reference counted variables. MOBILESoft@ICSE 2018: 161-165 - 2017
- [j23]Dhrgam Al Kafaf, Dae-Kyoo Kim:
A web service-based approach for developing self-adaptive systems. Comput. Electr. Eng. 63: 260-276 (2017) - [j22]Dae-Kyoo Kim, Alaa S. Alaerjan, Lunjin Lu, Hyo-Sik Yang, Hyuksoo Jang:
Toward Interoperability of Smart Grids. IEEE Commun. Mag. 55(8): 204-210 (2017) - [j21]Byunghun Lee, Dae-Kyoo Kim:
Harmonizing IEC 61850 and CIM for connectivity of substation automation. Comput. Stand. Interfaces 50: 199-208 (2017) - [j20]Byunghun Lee, Dae-Kyoo Kim, Hyo-Sik Yang, Sungsoo Oh:
Model transformation between OPC UA and UML. Comput. Stand. Interfaces 50: 236-250 (2017) - [j19]Dae-Kyoo Kim, Lunjin Lu, Byunghun Lee:
Design pattern-based model transformation supported by QVT. J. Syst. Softw. 125: 289-308 (2017) - [j18]Dae-Kyoo Kim, Eunjee Song, Jungwoo Ryoo, Y. Raghu Reddy:
Special issue on software reuse. Softw. Pract. Exp. 47(7): 941-942 (2017) - [c38]Dhrgam Al Kafaf, Dae-Kyoo Kim, Lunjin Lu:
B-kNN to Improve the Efficiency of kNN. DATA 2017: 126-132 - [c37]Junha Lee, Dae-Kyoo Kim, Jiwoo Park, Sooyong Park:
Class Modularization Using Indirect Relationships. ICECCS 2017: 110-119 - [c36]Priya Murugesan, Swanima Chinnappa, Alaa S. Alaerjan, Dae-Kyoo Kim:
Adopting Attribute-Based Access Control to Data Distribution Service. ICSSA 2017: 112-115 - [c35]Alaa S. Alaerjan, Dae-Kyoo Kim, Dhrgam Al Kafaf:
Modeling functional behaviors of DDS. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2017: 1-7 - 2016
- [j17]Junha Lee, Dae-Kyoo Kim, Suntae Kim, Sooyong Park:
Decomposing class responsibilities using distance-based method similarity. Frontiers Comput. Sci. 10(4): 612-630 (2016) - [c34]Alaa S. Alaerjan, Dae-Kyoo Kim:
Adopting DDS to Smart Grids: Towards Reliable Data Communication. SMARTGREENS/VEHITS (Selected Papers) 2016: 154-169 - [c33]Alaa S. Alaerjan, Dae-Kyoo Kim:
Tailoring DDS to Smart Grids for Improved Communication and Control. SMARTGREENS 2016: 433-438 - 2015
- [j16]Dae-Kyoo Kim, Dongwon Jeong, Lunjin Lu, Debatosh Debnath, Ming Hua:
Opinions on computing education in Korean K-12 system: higher education perspective. Comput. Sci. Educ. 25(4): 371-389 (2015) - [j15]Sukhoon Lee, Dongwon Jeong, Doo-Kwon Baik, Dae-Kyoo Kim:
Path Prediction Method for Effective Sensor Filtering in Sensor Registry System. Int. J. Distributed Sens. Networks 11: 613473:1-613473:14 (2015) - [j14]Byunghun Lee, Dae-Kyoo Kim, Hyo-Sik Yang, Hyuksoo Jang:
Role-based access control for substation automation systems using XACML. Inf. Syst. 53: 237-249 (2015) - [j13]Sujin Choi, Dae-Kyoo Kim, Sooyong Park:
Identifying correlations of findings for building process improvement packages using graph clustering. J. Softw. Evol. Process. 27(8): 514-527 (2015) - [j12]Dae-Kyoo Kim:
Design pattern based model transformation with tool support. Softw. Pract. Exp. 45(4): 473-499 (2015) - [c32]Dae-Kyoo Kim, Byunghun Lee:
Pattern-based transformation of sequence diagrams using QVT. SAC 2015: 1492-1497 - 2014
- [j11]Sangsig Kim, Dae-Kyoo Kim, Lunjin Lu, Eunjee Song:
Building hybrid access control by configuring RBAC and MAC features. Inf. Softw. Technol. 56(7): 763-792 (2014) - [j10]Lunjin Lu, Dae-Kyoo Kim:
Required behavior of sequence diagrams: Semantics and conformance. ACM Trans. Softw. Eng. Methodol. 23(2): 15:1-15:28 (2014) - [c31]Dae-Kyoo Kim, Jungwoo Ryoo, Suntae Kim:
Building Sustainable Software by Preemptive Architectural Design Using Tactic-Equipped Patterns. ARES 2014: 484-489 - [c30]Sujin Choi, Dae-Kyoo Kim, Sooyong Park, Junha Lee, Soojin Park:
Recommending process improvement package using direct and indirect relationships of activities. RSSE@ICSE 2014: 19-23 - [c29]Junha Lee, Dae-Kyoo Kim:
Measuring Class Cohesion Based on Iterative Process Using External Class Relationships. QSIC 2014: 321-326 - 2013
- [c28]Dae-Kyoo Kim, Hyo-Sik Yang, Hyuksoo Jang, Daeseung Hong, Herb Falk, Sangsig Kim, Byunghun Lee:
A metamodeling approach to unifying IEC 61850 and IEC 61970. ISGT 2013: 1-6 - [c27]Lunjin Lu, Dae-Kyoo Kim:
Refinement Inference for Sequence Diagrams. SOFSEM 2013: 432-444 - 2012
- [c26]Sunuk Park, Dae-Kyoo Kim, Sooyong Park:
Pattern-Based Model Transformation Using QVT. APSEC 2012: 472-481 - [c25]Youngdo Cho, Hwangwook Kim, Dae-Kyoo Kim, Sooyong Park:
An Interaction-Driven Approach to Identifying Functional Behaviors of Service Robot Systems. ICECCS 2012: 109-118 - [c24]Sujin Choi, Dae-Kyoo Kim, Sooyong Park:
ReMo: A recommendation model for software process improvement. ICSSP 2012: 135-139 - [i2]Junha Lee, Donghun Lee, Dae-Kyoo Kim, Sooyong Park:
A Semantic-Based Approach for Detecting and Decomposing God Classes. CoRR abs/1204.1967 (2012) - 2011
- [j9]Sangsig Kim, Dae-Kyoo Kim, Lunjin Lu, Suntae Kim, Sooyong Park:
A feature-based approach for modeling role-based access control systems. J. Syst. Softw. 84(12): 2035-2052 (2011) - [c23]Lunjin Lu, Dae-Kyoo Kim:
Required Behavior of Sequence Diagrams: Semantics and Refinement. ICECCS 2011: 127-136 - [c22]Sangsig Kim, Yen-Ting Lee, Yuanlin Zhu, Dae-Kyoo Kim, Lunjin Lu, Vijayan Sugumaran:
A Feature-Based Modeling Approach to Configuring Privacy and Temporality in RBAC. SEKE 2011: 666-671 - [c21]Sangsig Kim, Dae-Kyoo Kim, Lunjin Lu, Sooyong Park, Suntae Kim:
A Feature-Based Modeling Approach for Building Hybrid Access Control Systems. SSIRI 2011: 88-97 - 2010
- [j8]Dae-Kyoo Kim, Juan Trujillo:
Foundations and Practices of Unified Modeling Language. J. Univers. Comput. Sci. 16(17): 2291-2292 (2010) - [j7]Lunjin Lu, Dae-Kyoo Kim, Yuanlin Zhu, Sangsig Kim:
Verification of Structural Pattern Conformance Using Logic Programming. J. Univers. Comput. Sci. 16(17): 2455-2474 (2010) - [c20]Wuwei Shen, Dae-Kyoo Kim, Jian Liu, Chen Zhao:
Supporting Flexible Reification of Design Patterns. APSEC 2010: 127-136 - [c19]Dae-Kyoo Kim, Lunjin Lu, Sangsig Kim:
A Verifiable Modeling Approach to Configurable Role-Based Access Control. FASE 2010: 188-202 - [c18]Suntae Kim, Dae-Kyoo Kim, Sooyong Park:
Tool support for quality-driven development of software architectures. ASE 2010: 127-130 - [i1]Lunjin Lu, Dae-Kyoo Kim:
Semantics-based Refinement of Mandatory Behavior of Sequence Diagrams. CoRR abs/1003.1160 (2010)
2000 – 2009
- 2009
- [j6]Suntae Kim, Dae-Kyoo Kim, Lunjin Lu, Sooyong Park:
Quality-driven architecture development using architectural tactics. J. Syst. Softw. 82(8): 1211-1231 (2009) - [c17]Juan Trujillo, Dae-Kyoo Kim:
Preface to FP-UML 2009. ER Workshops 2009: 105 - [c16]Suntae Kim, Jintae Kim, Sooyong Park, Dae-Kyoo Kim:
GARDIAN: A Tool for Validating Rule-Based Modeling Methods. QSIC 2009: 161-166 - 2008
- [j5]Dae-Kyoo Kim, Wuwei Shen:
Evaluating pattern conformance of UML models: a divide-and-conquer approach and case studies. Softw. Qual. J. 16(3): 329-359 (2008) - [c15]Suntae Kim, Dae-Kyoo Kim, Lunjin Lu, Sooyong Park:
A Tactic-Based Approach to Embodying Non-functional Requirements into Software Architectures. EDOC 2008: 139-148 - [c14]Dae-Kyoo Kim:
Software Quality Improvement via Pattern-Based Model Refactoring. HASE 2008: 293-302 - [c13]Dae-Kyoo Kim, Lunjin Lu:
Pattern-Based Transformation Rules for Developing Interaction Models of Access Control Systems. ICSR 2008: 306-317 - [c12]Wuwei Shen, Dae-Kyoo Kim:
ICER: a tool for finding errors in a UML model. SAC 2008: 804-808 - 2007
- [j4]Dae-Kyoo Kim, Charbel El Khawand:
An approach to precisely specifying the problem domain of design patterns. J. Vis. Lang. Comput. 18(6): 560-591 (2007) - [c11]Dae-Kyoo Kim, Wuwei Shen:
An approach to evaluating structural pattern conformance of UML models. SAC 2007: 1404-1408 - 2006
- [c10]Dae-Kyoo Kim, Priya Gokhale:
A Pattern-Based Technique for Developing UML Models of Access Control Systems. COMPSAC (1) 2006: 317-324 - [c9]Dae-Kyoo Kim, Lunjin Lu:
Inference of Design Pattern Instances in UML models via Logic Programming. ICECCS 2006: 47-56 - 2005
- [c8]Dae-Kyoo Kim:
Evaluating Conformance of UML Models to Design Patterns. ICECCS 2005: 30-31 - [c7]Dae-Kyoo Kim, Jon Whittle:
Generating UML Models from Domain Patterns. SERA 2005: 166-173 - 2004
- [j3]Robert B. France, Dae-Kyoo Kim, Sudipto Ghosh, Eunjee Song:
A UML-Based Pattern Specification Technique. IEEE Trans. Software Eng. 30(3): 193-206 (2004) - [j2]Dae-Kyoo Kim, Robert B. France, Sudipto Ghosh:
A UML-based language for specifying domain-specific patterns. J. Vis. Lang. Comput. 15(3-4): 265-289 (2004) - [c6]Dae-Kyoo Kim, Indrakshi Ray, Robert B. France, Na Li:
Modeling Role-Based Access Control Using Parameterized UML Models. FASE 2004: 180-193 - [c5]João Araújo, Jon Whittle, Dae-Kyoo Kim:
Modeling and Composing Scenario-Based Requirements with Aspects. RE 2004: 58-67 - [c4]Indrakshi Ray, Na Li, Robert B. France, Dae-Kyoo Kim:
Using uml to visualize role-based access control constraints. SACMAT 2004: 115-124 - 2003
- [j1]Robert B. France, Sudipto Ghosh, Eunjee Song, Dae-Kyoo Kim:
A Metamodeling Approach to Pattern-Based Model Refactoring. IEEE Softw. 20(5): 52-58 (2003) - [c3]Dae-Kyoo Kim, Robert B. France, Sudipto Ghosh, Eunjee Song:
A Role-Based Metamodeling Approach to Specifying Design Patterns. COMPSAC 2003: 452- - [c2]Indrakshi Ray, Na Li, Dae-Kyoo Kim, Robert B. France:
Using Parameterized UML to Specify and Compose Access Control Models. IICIS 2003: 49-65 - 2002
- [c1]Dae-Kyoo Kim, Robert B. France, Sudipto Ghosh, Eunjee Song:
Using Role-Based Modeling Language (RBML) to Characterize Model Families. ICECCS 2002: 107-116
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-16 20:50 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint