default search action
Wonho Kim
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j12]Byunguk Lee, Wonho Kim, Seunghwan Lee:
An Extended Vector Polar Histogram Method Using Omni-Directional LiDAR Information. Symmetry 15(8): 1545 (2023)
2010 – 2019
- 2019
- [j11]Quang Thinh Truong, Ngo Ha Quang Thinh, Thanh Phuong Nguyen, Hung Nguyen, Wonho Kim:
A Novel Infrastructure Design of Industrial Autonomous System. Int. J. Fuzzy Log. Intell. Syst. 19(2): 103-111 (2019) - [c11]Jiwon Hong, Sung-Jun Park, Taeri Kim, Yung-Kyun Noh, Sang-Wook Kim, Dongphil Kim, Wonho Kim:
Malware classification for identifying author groups: a graph-based approach. RACS 2019: 169-174 - [i1]Kevin Lewi, Wonho Kim, Ilya Maykov, Stephen A. Weis:
Securing Update Propagation with Homomorphic Hashing. IACR Cryptol. ePrint Arch. 2019: 227 (2019) - 2018
- [j10]Jiwon Hong, Sanghyun Park, Sang-Wook Kim, Dongphil Kim, Wonho Kim:
Classifying malwares for identification of author groups. Concurr. Comput. Pract. Exp. 30(3) (2018) - 2016
- [c10]Kaushik Veeraraghavan, Justin Meza, David Chou, Wonho Kim, Sonia Margulis, Scott Michelson, Rajesh Nishtala, Daniel Obenshain, Dmitri Perelman, Yee Jiun Song:
Kraken: Leveraging Live Traffic Tests to Identify and Resolve Resource Utilization Bottlenecks in Large Scale Web Services. OSDI 2016: 635-651 - 2014
- [j9]Ngo Ha Quang Thinh, Wonho Kim:
Implementation of Fuzzy Self-Tuning PID and Feed-Forward Design for High-Performance Motion Control System. Int. J. Fuzzy Log. Intell. Syst. 14(2): 136-144 (2014) - [j8]Wonho Kim:
DSP Embedded Early Fire Detection Method Using IR Thermal Video. KSII Trans. Internet Inf. Syst. 8(10): 3475-3489 (2014) - [j7]Sunghyuk Park, Wonho Kim, Sung-Il Kim:
A Numerical Prediction Model for Vibration and Noise of Axial Flux Motors. IEEE Trans. Ind. Electron. 61(10): 5757-5762 (2014) - [j6]Sung-Il Kim, Sunghyuk Park, Taesang Park, Jinwoo Cho, Wonho Kim, Seongtaek Lim:
Investigation and Experimental Verification of a Novel Spoke-Type Ferrite-Magnet Motor for Electric-Vehicle Traction Drive Applications. IEEE Trans. Ind. Electron. 61(10): 5763-5770 (2014) - 2012
- [b1]Wonho Kim:
Understanding Resource Usage and Performance in Wide-Area Distributed Systems. Princeton University, USA, 2012 - [c9]Wonho Kim, Puneet Sharma:
Hercules: Integrated control framework for datacenter traffic management. NOMS 2012: 70-78 - [c8]Wonho Kim, KyoungSoo Park, Vivek S. Pai:
Server-assisted Latency Management for Wide-area Distributed Systems. USENIX ATC 2012: 249-260 - 2011
- [c7]Wonho Kim, Ajay Roopakalu, Katherine Y. Li, Vivek S. Pai:
Understanding and characterizing PlanetLab resource usage for federated network testbeds. Internet Measurement Conference 2011: 515-532 - [c6]Andrew R. Curtis, Wonho Kim, Praveen Yalagandula:
Mahout: Low-overhead datacenter traffic management using end-host-based elephant detection. INFOCOM 2011: 1629-1637 - 2010
- [j5]Hoang-Giap Nguyen, Wonho Kim, Jin-Ho Shin:
A Study on an Adaptive Robust Fuzzy Controller with GAs for Path Tracking of a Wheeled Mobile Robot. Int. J. Fuzzy Log. Intell. Syst. 10(1): 12-18 (2010) - [j4]Quang-Vinh Tran, Wonho Kim, Jin-Ho Shin, Woon-Bo Baek:
ECAM Control System Based on Auto-tuning PID Velocity Controller with Disturbance Observer and Velocity Compensator. Int. J. Fuzzy Log. Intell. Syst. 10(2): 113-118 (2010) - [c5]Wonho Kim, Puneet Sharma, Jeongkeun Lee, Sujata Banerjee, Jean Tourrilhes, Sung-Ju Lee, Praveen Yalagandula:
Automated and Scalable QoS Control for Network Convergence. INM/WREN 2010 - [c4]Muhammad Asim Jamshed, Wonho Kim, KyoungSoo Park:
Suppressing bot traffic with accurate human attestation. ApSys 2010: 43-48
2000 – 2009
- 2009
- [j3]Jeongkeun Lee, Sung-Ju Lee, Wonho Kim, Daehyung Jo, Taekyoung Kwon, Yanghee Choi:
Understanding interference and carrier sensing in wireless mesh networks. IEEE Commun. Mag. 47(7): 102-109 (2009) - [j2]Wonho Kim:
Implementation of an Adaptive Robust Neural Network Based Motion Controller for Position Tracking of AC Servo Drives. Int. J. Fuzzy Log. Intell. Syst. 9(4): 294-300 (2009) - 2008
- [j1]Ha Quang Thinh Ngo, Jin-Ho Shin, Wonho Kim:
Fuzzy sliding mode control for a robot manipulator. Artif. Life Robotics 13(1): 124-128 (2008) - 2007
- [c3]Wonho Kim, Jeongkeun Lee, Taekyoung Kwon, Sung-Ju Lee, Yanghee Choi:
Quantifying the Interference Gray Zone in Wireless Networks: A Measurement Study. ICC 2007: 3758-3763 - [c2]Jeongkeun Lee, Wonho Kim, Sung-Ju Lee, Daehyung Jo, Jiho Ryu, Taekyoung Kwon, Yanghee Choi:
An experimental study on the capture effect in 802.11a networks. WiNTECH 2007: 19-26 - [c1]Jeongkeun Lee, Sung-Ju Lee, Wonho Kim, Daehyung Jo, Taekyoung Kwon, Yanghee Choi:
RSS-based Carrier Sensing and Interference Estimation in 802.11 Wireless Networks. SECON 2007: 491-500
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-20 20:32 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint