default search action
Yong Ho Kim
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2019
- [j12]Hyun Hee Kim, Yong Ho Kim:
Video summarization using event-related potential responses to shot boundaries in real-time video watching. J. Assoc. Inf. Sci. Technol. 70(2): 164-175 (2019) - [j11]Hyun Hee Kim, Yong Ho Kim:
ERP/MMR Algorithm for Classifying Topic-Relevant and Topic-Irrelevant Visual Shots of Documentary Videos. J. Assoc. Inf. Sci. Technol. 70(9): 931-941 (2019) - 2016
- [j10]Hyun Hee Kim, Yong Ho Kim:
Generic speech summarization of transcribed lecture videos: Using tags and their semantic relations. J. Assoc. Inf. Sci. Technol. 67(2): 366-379 (2016) - 2011
- [c23]Soo Hyeok Kang, Yong Ho Kim, Eun Jin Lee, Soon-Geul Lee, Byung-Cheol Min, Jinung An, Dong Han Kim:
Implementation of Smart Floor for multi-robot system. ICARA 2011: 46-51 - [c22]Soo Hyeok Kang, Yong Ho Kim, Byung-Cheol Min, Soon-Geul Lee, Jinung An, Dong Han Kim:
Smart Floor with Learning Capability for Mobile Robot System. ICARA (selected extended papers) 2011: 205-215 - 2010
- [j9]Hyun Hee Kim, Yong Ho Kim:
Toward a conceptual framework of key-frame extraction and storyboard display for video summarization. J. Assoc. Inf. Sci. Technol. 61(5): 927-939 (2010) - [c21]Hyun Hee Kim, Yong Ho Kim:
Semantic video search using tagsonomies. ASIST 2010: 1-2
2000 – 2009
- 2009
- [c20]Ji Young Chun, Yong Ho Kim, Jung Yeon Hwang, Dong Hoon Lee:
Security Enhancing Compiler for Localization Schemes in Pervasive Sensor Networks. ACIS-ICIS 2009: 307-312 - [c19]Hyun Hee Kim, Yong Ho Kim:
A two-step model for video key-frame determination. ASIST 2009: 1-16 - [c18]Yun Sub Jung, Yong Ho Kim, Dong Ha Lee, Sang Ho Lee, Jeong Joo Song, Jong Hyo Kim:
Automatic patient-adaptive bleeding detection in a capsule endoscopy. Medical Imaging: Computer-Aided Diagnosis 2009: 72603T - 2008
- [j8]Yong Ho Kim, Dong Hoon Lee:
An authentication scheme for filtering injected bogus data in sensor networks. Comput. Commun. 31(17): 3929-3932 (2008) - [j7]Hyun Hee Kim, Yong Ho Kim:
Usability study of digital institutional repositories. Electron. Libr. 26(6): 863-881 (2008) - [j6]Yong Ho Kim, Hyun Hee Kim:
Development and validation of evaluation indicators for a consortium of institutional repositories: A case study of dcollection. J. Assoc. Inf. Sci. Technol. 59(8): 1282-1294 (2008) - [c17]Hyun Hee Kim, Yong Ho Kim:
Design and evaluation of a key-frame arrangement framework for video storyboard surrogates. ASIST 2008: 13 - [c16]Yong Ho Kim, Kyu Young Choi, Jongin Lim, Dong Hoon Lee:
An Efficient Key Establishment Scheme for Self-organizing Sensor Networks. ICDCN 2008: 345-349 - [c15]Yuri Choi, Soonil Kwon, Yong Ho Kim:
Le salon de récurrence. ACM Multimedia 2008: 1127-1128 - [c14]Yong Ho Kim, Hwaseong Lee, Dong Hoon Lee:
A Key Distribution Scheme for Wireless Sensor Networks. PerCom 2008: 572-577 - 2007
- [c13]Hwaseong Lee, Yong Ho Kim, Dong Hoon Lee, Jongin Lim:
Classification of Key Management Schemes for Wireless Sensor Networks. APWeb/WAIM Workshops 2007: 664-673 - [c12]Yong Ho Kim, Hwaseong Lee, Jong Hyuk Park, Laurence Tianruo Yang, Dong Hoon Lee:
Key Establishment Scheme for Sensor Networks with Low Communication Cost. ATC 2007: 441-448 - [c11]Joon Wan Kim, Yong Ho Kim, Hwaseong Lee, Dong Hoon Lee:
A Practical Inter-sensor Broadcast Authentication Scheme. HCI (5) 2007: 399-405 - [c10]Yong Ho Kim, Jong Hwan Park, Dong Hoon Lee, Jongin Lim:
Bogus Data Filtering in Sensor Networks. PAKDD Workshops 2007: 629-635 - [c9]Ji Young Chun, Yong Ho Kim, Jongin Lim, Dong Hoon Lee:
Location-aware Random Pair-wise Keys Scheme for Wireless Sensor Networks. SECPerU 2007: 31-36 - [c8]Yong Ho Kim, Hwaseong Lee, Dong Hoon Lee:
A secure and efficient key management scheme for wireless sensor networks. SecureComm 2007: 162-167 - [c7]Yong Ho Kim, Nan Sol Seo, Young Yong Kim:
A NETwork COding based Multicasting (NETCOM) over IEEE 802.11 Multi-hop. VTC Spring 2007: 845-848 - 2006
- [c6]Hyun Hee Kim, Yong Ho Kim:
An Evaluation Model for the National Consortium of Institutional Repositories of Korean Universities. ASIST 2006: 1-19 - [c5]Yong Ho Kim, Hwaseong Lee, Dong Hoon Lee, Jongin Lim:
A Key Management Scheme for Large Scale Distributed Sensor Networks. PWC 2006: 437-446 - 2005
- [j5]Yong Ho Kim, Tae Yong Kim, Young Yong Kim:
A Novel Approach for Modeling a Hybrid ARQ (Automatic Repeat Request) Based on the Hidden Markov Model. IEICE Trans. Commun. 88-B(9): 3772-3775 (2005) - [c4]Yong Ho Kim, Mu Hyun Kim, Dong Hoon Lee, Changwook Kim:
A Key Management Scheme for Commodity Sensor Networks. ADHOC-NOW 2005: 113-126 - [c3]Hyeong-Gyun Kim, Yong Ho Kim, Jong-Geun Jeong:
Matching Algorithm for Hangul Recognition Based on PDA. IWANN 2005: 889-898 - [c2]Minsik Park, Yong Ho Kim, Jin Soo Choi, Jin Woo Hong:
Data Broadcast Metadata Based on PMCP for Open Interface to a DTV Data Server. PCM (1) 2005: 234-245 - 2002
- [j4]Hong Seong Park, Yong Ho Kim, Dong-Sung Kim, Wook Hyun Kwon:
A scheduling method for network-based control systems. IEEE Trans. Control. Syst. Technol. 10(3): 318-330 (2002) - [c1]Seung Sik Choi, Yong Ho Kim, Jong-Seog Koh, Dong-Ho Cho:
Packet Fair Queueing Scheduling in an Integrated CDMA System Based on Channel Status Information. CDMA International Conference 2002: 275-284 - 2000
- [j3]Yong Ho Kim, Sang Chul Ahn, Wook Hyun Kwon:
Computational complexity of general fuzzy logic control and its simplification for a loop controller. Fuzzy Sets Syst. 111(2): 215-224 (2000)
1990 – 1999
- 1999
- [j2]Wook Hyun Kwon, Yong Ho Kim, Sang Jeong Lee, Ki-Nam Paek:
Event-based modeling and control for the burnthrough point in sintering processes. IEEE Trans. Control. Syst. Technol. 7(1): 31-41 (1999) - 1998
- [j1]Sang Chul Ahn, Yong Ho Kim, Wook Hyun Kwon:
A fuzzy generalized predictive control using affine fuzzy predictors for nonlinear systems. J. Intell. Fuzzy Syst. 6(2): 185-207 (1998)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 22:57 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint