Jong-Won Ko

According to our database1, Jong-Won Ko authored at least 14 papers between 2011 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2018
Towards Unified Deep Learning Model for NSFW Image and Video Captioning.
Proceedings of the Advanced Multimedia and Ubiquitous Engineering, 2018

Superpixel Based ImageCut Using Object Detection.
Proceedings of the Advanced Multimedia and Ubiquitous Engineering, 2018

2017
A Machine-Learning Based Approach for Extracting Logical Structure of a Styled Document.
KSII Trans. Internet Inf. Syst., 2017

Visualization Approach for R&D Monitoring - A Tracking of Research Contents Changes Perspective.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2017

2016
A Study of the Extended Definition of Relation for Research Content Based Traceability.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2016

2015
Model transformation verification using similarity and graph comparison algorithm.
Multim. Tools Appl., 2015

Do We Need New Management Perspectives for Software Research Projects?
Proceedings of the Computational Science and Its Applications - ICCSA 2015, 2015

Contents Based Traceability Between Research Artifact and Process for R&D Projects.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2015

2012
Intelligent Recommendation System for Automotive Parts Assembly.
Proceedings of the International Conference on IT Convergence and Security, 2012

Model Transformation Verification Using Mapping Pattern and Model Transformation Similarity.
Proceedings of the International Conference on IT Convergence and Security, 2012

Analysis of Threat-Factors for Biometric-Information Processing Systems According to Goal-Oriented Threat- Modeling.
Proceedings of the International Conference on IT Convergence and Security, 2012

2011
Pattern Based Model Transformation Using Mapping Patterns for Model Transformation Verification.
Proceedings of the International Conference on IT Convergence and Security, 2011

Model Optimization with Graph Transformation and PSO Algorithm for Model Transformation Verification.
Proceedings of the International Conference on IT Convergence and Security, 2011

Goal-Heuristic Analysis Method for an Adaptive Process Mining.
Proceedings of the International Conference on IT Convergence and Security, 2011


  Loading...