Dae-Kyoo Kim

Orcid: 0000-0002-7133-9111

Affiliations:
  • Oakland University, Rochester, MI, USA


According to our database1, Dae-Kyoo Kim authored at least 86 papers between 2002 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Pride: Prioritizing Documentation Effort Based on a PageRank-Like Algorithm and Simple Filtering Rules.
IEEE Trans. Software Eng., March, 2023

CLCD-I: Cross-Language Clone Detection by Using Deep Learning with InferCode.
Comput., January, 2023

Prompted Software Engineering in the Era of AI Models.
CoRR, 2023

Prostate Segmentation in MRI Using Transformer Encoder and Decoder Framework.
IEEE Access, 2023

Identifying Key Classes for Initial Software Comprehension: Can We Do It Better?
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering, 2023

2022
ABAC-Based Security Model for DDS.
IEEE Trans. Dependable Secur. Comput., 2022

Deep learning application on code clone detection: A review of current knowledge.
J. Syst. Softw., 2022

A Systematic Literature Review of Volumetric 3D Model Reconstruction Methodologies Using Generative Adversarial Networks.
J. Inf. Sci. Eng., 2022

Analyzing Impact of Dependency Injection on Software Maintainability.
CoRR, 2022

Cross-Language Source Code Clone Detection Using Deep Learning with InferCode.
CoRR, 2022

Measuring Impact of Dependency Injection on Software Maintainability.
Comput., 2022

2021
ElementRank: Ranking Java Software Classes and Packages using a Multilayer Complex Network-Based Approach.
IEEE Trans. Software Eng., 2021

R-BPMN for abstract modeling of business process patterns.
Bus. Process. Manag. J., 2021

2020
A Survey of the Application of Blockchain in Multiple Fields of Financial Services.
J. Inf. Process. Syst., 2020

A Survey of Deep Learning in Agriculture: Techniques and Their Applications.
J. Inf. Process. Syst., 2020

Reflection on Building Hybrid Access Control by Configuring RBAC and MAC Features.
Proceedings of the 27th IEEE International Conference on Software Analysis, 2020

2019
Measuring Class Cohesion Using Internal and External Class Relationships.
Int. J. Softw. Eng. Knowl. Eng., 2019

Detecting No-Sleep Bugs Using Sequential Reference Counts.
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019

Threshold-Driven Class Decomposition.
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019

2018
Challenges in Porting Enterprise Applications to Mobile Platforms.
GetMobile Mob. Comput. Commun., 2018

Comparative Assessment of Static Analysis Tools for Software Vulnerability.
J. Comput., 2018

A three-phase decision making approach for self-adaptive systems using web services.
Complex Adapt. Syst. Model., 2018

Detecting no-sleep energy bugs using reference counted variables.
Proceedings of the 5th International Conference on Mobile Software Engineering and Systems, MOBILESoft@ICSE 2018, Gothenburg, Sweden, May 27, 2018

2017
Special issue on software reuse.
Softw. Pract. Exp., 2017

Design pattern-based model transformation supported by QVT.
J. Syst. Softw., 2017

Model transformation between OPC UA and UML.
Comput. Stand. Interfaces, 2017

Harmonizing IEC 61850 and CIM for connectivity of substation automation.
Comput. Stand. Interfaces, 2017

Toward Interoperability of Smart Grids.
IEEE Commun. Mag., 2017

A web service-based approach for developing self-adaptive systems.
Comput. Electr. Eng., 2017

Modeling functional behaviors of DDS.
Proceedings of the 2017 IEEE SmartWorld, 2017

Adopting Attribute-Based Access Control to Data Distribution Service.
Proceedings of the International Conference on Software Security and Assurance, 2017

Class Modularization Using Indirect Relationships.
Proceedings of the 22nd International Conference on Engineering of Complex Computer Systems, 2017

B-kNN to Improve the Efficiency of kNN.
Proceedings of the 6th International Conference on Data Science, 2017

2016
Decomposing class responsibilities using distance-based method similarity.
Frontiers Comput. Sci., 2016

Adopting DDS to Smart Grids: Towards Reliable Data Communication.
Proceedings of the Smart Cities, Green Technologies, and Intelligent Transport Systems, 2016

Tailoring DDS to Smart Grids for Improved Communication and Control.
Proceedings of the SMARTGREENS 2016, 2016

2015
Design pattern based model transformation with tool support.
Softw. Pract. Exp., 2015

Identifying correlations of findings for building process improvement packages using graph clustering.
J. Softw. Evol. Process., 2015

Role-based access control for substation automation systems using XACML.
Inf. Syst., 2015

Path Prediction Method for Effective Sensor Filtering in Sensor Registry System.
Int. J. Distributed Sens. Networks, 2015

Opinions on computing education in Korean K-12 system: higher education perspective.
Comput. Sci. Educ., 2015

Pattern-based transformation of sequence diagrams using QVT.
Proceedings of the 30th Annual ACM Symposium on Applied Computing, 2015

2014
Required behavior of sequence diagrams: Semantics and conformance.
ACM Trans. Softw. Eng. Methodol., 2014

Building hybrid access control by configuring RBAC and MAC features.
Inf. Softw. Technol., 2014

Measuring Class Cohesion Based on Iterative Process Using External Class Relationships.
Proceedings of the 2014 14th International Conference on Quality Software, 2014

Recommending process improvement package using direct and indirect relationships of activities.
Proceedings of the 4th International Workshop on Recommendation Systems for Software Engineering, 2014

Building Sustainable Software by Preemptive Architectural Design Using Tactic-Equipped Patterns.
Proceedings of the Ninth International Conference on Availability, 2014

2013
Refinement Inference for Sequence Diagrams.
Proceedings of the SOFSEM 2013: Theory and Practice of Computer Science, 2013

A metamodeling approach to unifying IEC 61850 and IEC 61970.
Proceedings of the IEEE PES Innovative Smart Grid Technologies Conference, 2013

2012
A Semantic-Based Approach for Detecting and Decomposing God Classes
CoRR, 2012

ReMo: A recommendation model for software process improvement.
Proceedings of the 2012 International Conference on Software and System Process, 2012

An Interaction-Driven Approach to Identifying Functional Behaviors of Service Robot Systems.
Proceedings of the 17th IEEE International Conference on Engineering of Complex Computer Systems, 2012

Pattern-Based Model Transformation Using QVT.
Proceedings of the 19th Asia-Pacific Software Engineering Conference, 2012

2011
A feature-based approach for modeling role-based access control systems.
J. Syst. Softw., 2011

A Feature-Based Modeling Approach for Building Hybrid Access Control Systems.
Proceedings of the Fifth International Conference on Secure Software Integration and Reliability Improvement, 2011

A Feature-Based Modeling Approach to Configuring Privacy and Temporality in RBAC.
Proceedings of the 23rd International Conference on Software Engineering & Knowledge Engineering (SEKE'2011), 2011

Required Behavior of Sequence Diagrams: Semantics and Refinement.
Proceedings of the 16th IEEE International Conference on Engineering of Complex Computer Systems, 2011

2010
Verification of Structural Pattern Conformance Using Logic Programming.
J. Univers. Comput. Sci., 2010

Foundations and Practices of Unified Modeling Language.
J. Univers. Comput. Sci., 2010

Semantics-based Refinement of Mandatory Behavior of Sequence Diagrams
CoRR, 2010

Tool support for quality-driven development of software architectures.
Proceedings of the ASE 2010, 2010

A Verifiable Modeling Approach to Configurable Role-Based Access Control.
Proceedings of the Fundamental Approaches to Software Engineering, 2010

Supporting Flexible Reification of Design Patterns.
Proceedings of the 17th Asia Pacific Software Engineering Conference, 2010

2009
Quality-driven architecture development using architectural tactics.
J. Syst. Softw., 2009

GARDIAN: A Tool for Validating Rule-Based Modeling Methods.
Proceedings of the Ninth International Conference on Quality Software, 2009

Preface to FP-UML 2009.
Proceedings of the Advances in Conceptual Modeling - Challenging Perspectives, 2009

2008
Evaluating pattern conformance of UML models: a divide-and-conquer approach and case studies.
Softw. Qual. J., 2008

ICER: a tool for finding errors in a UML model.
Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), 2008

Pattern-Based Transformation Rules for Developing Interaction Models of Access Control Systems.
Proceedings of the High Confidence Software Reuse in Large Systems, 2008

Software Quality Improvement via Pattern-Based Model Refactoring.
Proceedings of the 11th IEEE High Assurance Systems Engineering Symposium, 2008

A Tactic-Based Approach to Embodying Non-functional Requirements into Software Architectures.
Proceedings of the 12th International IEEE Enterprise Distributed Object Computing Conference, 2008

2007
An approach to precisely specifying the problem domain of design patterns.
J. Vis. Lang. Comput., 2007

An approach to evaluating structural pattern conformance of UML models.
Proceedings of the 2007 ACM Symposium on Applied Computing (SAC), 2007

2006
Inference of Design Pattern Instances in UML models via Logic Programming.
Proceedings of the 11th International Conference on Engineering of Complex Computer Systems (ICECCS 2006), 2006

A Pattern-Based Technique for Developing UML Models of Access Control Systems.
Proceedings of the 30th Annual International Computer Software and Applications Conference, 2006

2005
Generating UML Models from Domain Patterns.
Proceedings of the Third ACIS International Conference on Software Engineering, 2005

Evaluating Conformance of UML Models to Design Patterns.
Proceedings of the 10th International Conference on Engineering of Complex Computer Systems (ICECCS 2005), 2005

2004
A UML-based language for specifying domain-specific patterns.
J. Vis. Lang. Comput., 2004

A UML-Based Pattern Specification Technique.
IEEE Trans. Software Eng., 2004

Using uml to visualize role-based access control constraints.
Proceedings of the 9th ACM Symposium on Access Control Models and Technologies, 2004

Modeling and Composing Scenario-Based Requirements with Aspects.
Proceedings of the 12th IEEE International Conference on Requirements Engineering (RE 2004), 2004

Modeling Role-Based Access Control Using Parameterized UML Models.
Proceedings of the Fundamental Approaches to Software Engineering, 2004

2003
A Metamodeling Approach to Pattern-Based Model Refactoring.
IEEE Softw., 2003

Using Parameterized UML to Specify and Compose Access Control Models.
Proceedings of the Integrity and Internal Control in Information Systems VI, 2003

A Role-Based Metamodeling Approach to Specifying Design Patterns.
Proceedings of the 27th International Computer Software and Applications Conference (COMPSAC 2003): Design and Assessment of Trustworthy Software-Based Systems, 2003

2002
Using Role-Based Modeling Language (RBML) to Characterize Model Families.
Proceedings of the 8th International Conference on Engineering of Complex Computer Systems (ICECCS 2002), 2002


  Loading...