Sang-Ho Lee

According to our database1, Sang-Ho Lee authored at least 127 papers between 1990 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
Temporal Changes in Air Quality According to Land-Use Using Real Time Big Data from Smart Sensors in Korea.
Sensors, 2020

Assessment and Improvement of Global Gridded Sea Surface Temperature Datasets in the Yellow Sea Using In Situ Ocean Buoy and Research Vessel Observations.
Remote. Sens., 2020

Timely directional data delivery to multiple destinations through relay population control in vehicular ad hoc network.
Int. J. Distributed Sens. Networks, 2020

Asynchronous Edge Learning using Cloned Knowledge Distillation.
CoRR, 2020

Cost-Sensitive Feature Selection using Particle Swarm Optimization: A Post-Processing Approach.
Proceedings of the 2020 International Conference on Information Networking, 2020

Machine Learning Optimizes Assessment: New Insights for the Development of Numerosity Estimation.
Proceedings of the 42th Annual Meeting of the Cognitive Science Society, 2020

Progressive Deep Network with Channel Back-Projection for Hyperspectral Recovery from RGB.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2020

URNet: User-Resizable Residual Networks with Conditional Gating Module.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020

2019
A web-based 3D ontology navigation system for spinal disease diagnosis.
J. Supercomput., 2019

An Intelligent Product Recommendation Model to Reflect the Recent Purchasing Patterns of Customers.
Mob. Networks Appl., 2019

3-Stage Complexity- and Accuracy-Efficient Synchronization Scheme for Wireless IoT Systems.
Proceedings of the 90th IEEE Vehicular Technology Conference, 2019

Low Power Digital PWM Buck Converter With a Clock-Gating Shift-Register.
Proceedings of the International Conference on Electronics, Information, and Communication, 2019

Active Learning for a Number-Line Task with Two Design Variables.
Proceedings of the 41th Annual Meeting of the Cognitive Science Society, 2019

2018
Improving Color Constancy in an Ambient Light Environment Using the Phong Reflection Model.
IEEE Trans. Image Process., 2018

Retrieval of Reflected Shortwave Radiation at the Top of the Atmosphere Using Himawari-8/AHI Data.
Remote. Sens., 2018

Code refactoring techniques for reducing energy consumption in embedded computing environment.
Clust. Comput., 2018

Personalized Recommendation System for Efficient Integrated Cognitive Rehabilitation Training Based on Bigdata.
Proceedings of the HCI International 2018 - Posters' Extended Abstracts, 2018

Image Restoration by Estimating Frequency Distribution of Local Patches.
Proceedings of the 2018 IEEE Conference on Computer Vision and Pattern Recognition, 2018

Computational Modeling of Cognitive Control in a Flanker Task.
Proceedings of the 40th Annual Meeting of the Cognitive Science Society, 2018

2017
An evaluation method for secure virtual network embedding algorithms.
J. Comput. Virol. Hacking Tech., 2017

Output and R&D subsidies in a mixed oligopoly.
Oper. Res. Lett., 2017

Robust skin-roughness estimation based on co-occurrence matrix.
J. Vis. Commun. Image Represent., 2017

Mobile gamer's epistemic curiosity affecting continuous play intention. Focused on players' switching costs and epistemic curiosity.
Comput. Hum. Behav., 2017

An Efficient Tag Recommendation Method using Topic Modeling Approaches.
Proceedings of the International Conference on Research in Adaptive and Convergent Systems, 2017

Two-step multi-illuminant color constancy for outdoor scenes.
Proceedings of the 2017 IEEE International Conference on Image Processing, 2017

2016
Company Name Discrimination in Tweets using Topic Signatures Extracted from News Corpus.
J. Comput. Sci. Eng., 2016

Efficient reconfigurable bandwidth allocation mechanism for virtual network.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2016

2014
Investigation for Software Power Consumption of Code Refactoring Techniques.
Proceedings of the 26th International Conference on Software Engineering and Knowledge Engineering, 2014

Comparison of coastal sea surface temperature derived from ship-, air-, and space-borne thermal infrared systems.
Proceedings of the 2014 IEEE Geoscience and Remote Sensing Symposium, 2014

Design and implementation of energy application services for energy management technology.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2014

2013
BER performance of phase compensation according to the FFT start point offset in OFDM system.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2013

A non-memorization bio-password scheme with confidence interval sets.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2013

2012
A scheme for predicting recognition performance by using confidence intervals.
IEICE Electron. Express, 2012

A Conceptual Study on the Analytical Process of Information for Crisis Monitoring and Response.
Proceedings of the Convergence and Hybrid Information Technology, 2012

Web crawler with URL signature - A performance study.
Proceedings of the 4th Conference on Data Mining and Optimization, 2012

StrapMaster: A robotic band-strapping system.
Proceedings of the 2012 IEEE International Conference on Automation Science and Engineering, 2012

2011
Discriminant analysis of binary data following multivariate Bernoulli distribution.
Expert Syst. Appl., 2011

Malicious Software Detection System in a Virtual Machine Using Database.
Proceedings of the Convergence and Hybrid Information Technology, 2011

2010
Classifying Web Pages Using Information Extraction Patterns Preliminary Results and Findings.
Proceedings of the Sixth International Conference on Signal-Image Technology and Internet-Based Systems, 2010

2009
An Evaluation of Relative Damage to the Powertrain System in Tracked Vehicles.
Sensors, 2009

Multiple and Unlinkable Public Key Encryption without Certificates.
IACR Cryptol. ePrint Arch., 2009

2008
Secure user identification for consumer electronics devices.
IEEE Trans. Consumer Electron., 2008

An Effective Aggregation Policy for RSS Services.
Proceedings of the Weaving Services and People on the World Wide Web, 2008

A new aggregation policy for RSS services.
Proceedings of the 2008 International Workshop on Context Enabled Source and Service Selection, 2008

Efficient Authentication Architecture for Frequency Overlay in Mobile Broadband Wireless Access.
Proceedings of the 68th IEEE Vehicular Technology Conference, 2008

Identifying Equivalent URLs Using URL Signatures.
Proceedings of the 4th IEEE International Conference on Signal Image Technology and Internet Based Systems, 2008

Design of the Architecture for Agent of the Personality Security in the Ubiquitous Environment.
Proceedings of the Agent and Multi-Agent Systems: Technologies and Applications, 2008

Security Issues of Collaborative Review System.
Proceedings of the Fifth International Conference on Information Technology: New Generations (ITNG 2008), 2008

A Study on the Acoustic Noise Reduction of Interior Permanent Magnet Motor with Concentrated Winding.
Proceedings of the Industry Applications Society Annual Meeting, 2008

2007
A comparative study of molecular dynamics in Cartesian and in internal coordinates: Dynamical instability in the latter caused by nonlinearity of the equations of motion.
J. Comput. Chem., 2007

Design and Analysis of Scalable WDM-Based Ethernet Hybrid-PON Architecture.
IEICE Trans. Commun., 2007

The Selection of Tunable DBMS Resources Using the Incremental/Decremental Relationship.
Proceedings of the Advances in Data and Web Management, 2007

Efficient IMS Authentication Architecture based on Initial Access Authentication in WiBro-Evolution (WiBro-EVO) System.
Proceedings of the 65th IEEE Vehicular Technology Conference, 2007

Efficient Overlay Multicast Protocol in Mobile Ad hoc Networks.
Proceedings of the 65th IEEE Vehicular Technology Conference, 2007

Design of the Intelligence User Identification Method for the Improved Password Input Method and the Personality Security.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2007

An Efficient ID-Based Verifiably Encrypted Signature Scheme Based on Hess's Scheme.
Proceedings of the Information Security Practice and Experience, 2007

Non-Uniform Spectral Compression with the Formant-Emphasized Filterbank for Noisy Speech Recognition.
Proceedings of the 2007 International Conference on Image Processing, 2007

Scrawler: A Seed-By-Seed Parallel Web Crawler.
Proceedings of the ICE-B 2007, 2007

Graph Structure of the Korea Web.
Proceedings of the Advances in Databases: Concepts, 2007

An Empirical Study of Similarity Search in Stock Data.
Proceedings of the Integrating Artificial Intelligence and Data Mining, 2007

Explorative Data Mining on Stock Data - Experimental Results and Findings.
Proceedings of the Advanced Data Mining and Applications, Third International Conference, 2007

2006
Variables sampling plans for Weibull distributed lifetimes under sudden death testing.
IEEE Trans. Reliab., 2006

Enriched meshfree collocation method with diffuse derivatives for elastic fracture.
Comput. Math. Appl., 2006

Identity-Based Key Issuing Without Secure Channel in a Broad Area.
Proceedings of the Information Security Applications, 7th International Workshop, 2006

Security Analysis and Improvement for Key Issuing Schemes in ID-Based Cryptography.
Proceedings of the Trust and Privacy in Digital Business, Third International Conference, 2006

Privacy for Low-Power Sensor Node based on Alias in Ubiquitous Network.
Proceedings of the Fourth International Conference on Software Engineering, 2006

Heterogeneous Clustering Ensemble Method for Combining Different Cluster Results.
Proceedings of the Data Mining for Biomedical Applications, PAKDD 2006 Workshop, 2006

Integration Analysis of Diverse Genomic Data Using Multi-clustering Results.
Proceedings of the Biological and Medical Data Analysis, 7th International Symposium, 2006

A Reliable Multicast Routing Scheme in Mobile IP Networks.
Proceedings of the Information Networking, 2006

Design Progress Management for Security Requirements in Ubiquitous Computing Using COQUALMO.
Proceedings of the Computational Science and Its Applications, 2006

Design Opportunity Tree for Schedule Management and Evaluation by COQUALMO.
Proceedings of the Computational Science and Its Applications, 2006

A Novel Framework for Discovering Robust Cluster Results.
Proceedings of the Discovery Science, 9th International Conference, 2006

2005
A Mediated Proxy Signature Scheme with Fast Revocation for Electronic Transactions.
Proceedings of the Trust, 2005

An Integrated Database Benchmark Suite.
Proceedings of the 2005 International Conference on Semantics, 2005

A Hybrid Approach to Combine HMM and SVM Methods for the Prediction of the Transmembrane Spanning Region.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005

An Efficient Fingerprinting Scheme with Symmetric and Commutative Encryption.
Proceedings of the Digital Watermarking, 4th International Workshop, 2005

A Workload Generator for Database System Benchmarks.
Proceedings of the iiWAS'2005, 2005

A Domain-Specific Sentence Generation System for Augmentative and Alternative Communication.
Proceedings of the iiWAS'2005, 2005

A Secure Mobile Agent Protocol for AMR Systems in Home Network Environments.
Proceedings of the Information Networking, 2005

Handover Mechanism for Differentiated QoS in High-Speed Portable Internet.
Proceedings of the Information Networking, 2005

Application of Emerging Patterns for Multi-source Bio-Data Classification and Analysis.
Proceedings of the Advances in Natural Computation, First International Conference, 2005

Resource Selection for Autonomic Database Tuning.
Proceedings of the 21st International Conference on Data Engineering Workshops, 2005

Multi-proxy Signatures Based on Diffie-Hellman Problems Allowing Repeated Delegations.
Proceedings of the Web and Communication Technologies and Internet-Related Social Issues, 2005

The Wearable Computer as a Personal Station.
Proceedings of the Embedded and Ubiquitous Computing, 2005

ID-Based Access Control and Authority Delegations.
Proceedings of the Embedded and Ubiquitous Computing - EUC 2005 Workshops, 2005

An Efficient Fingerprinting Scheme with Secret Sharing.
Proceedings of the Digital Rights Management: Technologies, 2005

2004
Efficient structural joins with clustered extents.
Inf. Process. Lett., 2004

A Group Key Management Scheme Using Core Based Tree and Height Balanced Tree.
IEICE Trans. Inf. Syst., 2004

Weighted Fair Scheduling Algorithm for QoS of Input-Queued Switches.
Proceedings of the Network and Parallel Computing, IFIP International Conference, 2004

A Secure and Flexible Multi-signcryption Scheme.
Proceedings of the Computational Science and Its Applications, 2004

2003
Dynamic Buffer Allocation in Video-on-Demand Systems.
IEEE Trans. Knowl. Data Eng., 2003

Positioning performance and straightness error compensation of the magnetic levitation stage supported by the linear magnetic bearing.
IEEE Trans. Ind. Electron., 2003

Frequency domain control-relevant identification of MIMO AMB rigid rotor.
Autom., 2003

Design and performance analysis of a noncoherent code tracking loop with variable loop bandwidth.
Proceedings of the IEEE 14th International Symposium on Personal, 2003

Performance analysis of an adaptive hybrid search code acquisition technique in the case of multiple pilot signals.
Proceedings of the IEEE 14th International Symposium on Personal, 2003

A Simple Pipelined Scheduling for Input-Queued Switches.
Proceedings of the Computer and Information Sciences, 2003

Pipelined Scheduling Algorithm for an Input Buffered Switch.
Proceedings of the International Conference on Wireless Networks, 2003

Network-Based Real-Time Connection Traceback System (NRCTS) with Packet Marking Technology.
Proceedings of the Computational Science and Its Applications, 2003

A Secure Mobile Agent System Using Multi-signature Scheme in Electronic Commerce.
Proceedings of the Web Communication Technologies and Internet-Related Social Issues, 2003

A Key Recovery Mechanism for Reliable Group Key Management.
Proceedings of the Applied Cryptography and Network Security, 2003

2002
Hybrid Control Scheme for Robust Tracking of Two-Link Flexible Manipulator.
J. Intell. Robotic Syst., 2002

An Integrated Benchmark Suite for Database Systems.
Proceedings of the Information Systems and Databases (ISDB 2002), 2002

Design of a New Feature Based on Direction Angel Histogram and its Application to Recognition of Handwritten Numerals.
Proceedings of the International Conference on Artificial Intelligence, 2002

2001
Intelligent performance management of networks for advanced manufacturing systems.
IEEE Trans. Ind. Electron., 2001

DyBASe: A buffer allocation scheme for reducing average initial latency in video-on-demand systems.
Inf. Sci., 2001

Dynamic Buffer Allocation in Video-on-Demand Systems.
Proceedings of the 2001 ACM SIGMOD international conference on Management of data, 2001

Bandwidth Management for QoS Support in Mobile Networks.
Proceedings of the Networking, 2001

A Popularity-Driven Caching Scheme for Meta-search Engines: An Empirical Study.
Proceedings of the Database and Expert Systems Applications, 12th International Conference, 2001

2000
Drawing series parallel digraphs symmetrically.
Comput. Geom., 2000

How To Exchange Secrets By OT.
Proceedings of the International Conference on Internet Computing, 2000

A Contract Signing Protocol in the Internet.
Proceedings of the International Conference on Internet Computing, 2000

1999
New out-of-plane angle and bond angle internal coordinates and related potential energy functions for molecular mechanics and dynamics simulations.
J. Comput. Chem., 1999

Interoperability of Event Service in Java ORB Environment.
Proceedings of the 10th International Workshop on Database & Expert Systems Applications, 1999

1998
Finding Planar Geometric Automorphisms in Planar Graphs.
Proceedings of the Algorithms and Computation, 9th International Symposium, 1998

Call connection control in CDMA-based mobile networks with Multiple frequency assignments.
Proceedings of the Performance of Information and Communication Systems, 1998

Design of 622 Mbps ATM OAM functions for the integrated service access network.
Proceedings of the 1998 IEEE International Conference on Communications, 1998

Drawing Algorithms for Series-Parallel Digraphs in Two and Three Dimensions.
Proceedings of the Graph Drawing, 6th International Symposium, 1998

1996
A Logic Database System with Extended Functionality.
Proceedings of the COMPSAC '96, 1996

1995
Evaluation of Recursive Queries with Extended Rules in Deductive Databases.
IEEE Trans. Knowl. Data Eng., 1995

1994
Vibration Control of A Time-Varying Flexible Beam Using a Piezoelectric Servo-Damper.
J. Robotics Mechatronics, 1994

1993
Semantics and Properties of Existential Quantifiers in Deductive Databases.
Inf. Process. Lett., 1993

1992
A Periodic Deadlock Detection and Resolution Algorithm with a New Graph Model for Sequential Transaction Processing.
Proceedings of the Eighth International Conference on Data Engineering, 1992

A New Algorithm for Subsumption Test.
Proceedings of the International Conference on Fifth Generation Computer Systems. FGCS 1992, 1992

Enforcement of integrity constraints against transactions with transition axioms.
Proceedings of the Sixteenth Annual International Computer Software and Applications Conference, 1992

1991
Evaluation of Extended Recursive Queries in Deductive Databases.
Proceedings of the Database Systems for Advanced Applications '91, 1991

1990
Some Chain Visibility Problems in a Simple Polygon.
Algorithmica, 1990

Substitution-based Compilation of Extended Rules in Deductive Databases.
Proceedings of the 10th International Conference on Automated Deduction, 1990


  Loading...