Seok Won Lee

According to our database1, Seok Won Lee authored at least 31 papers between 1997 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2018
Waist-assistive exoskeleton powered by a singular actuation mechanism for prevention of back-injury.
Robotics Auton. Syst., 2018

2017
A Security Analysis and Reinforcement Design Adopting Fingerprints over Drawbacks of Passwords Based Authentication in Remote Home Automation Control System.
Proceedings of the 6th International Conference on Informatics, 2017

2013
UML design pattern metamodel-level constraints for the maintenance of software evolution.
Softw. Pract. Exp., 2013

2011
Discovering Multidimensional Correlations among Regulatory Requirements to Understand Risk.
ACM Trans. Softw. Eng. Methodol., 2011

Complete swept volume generation - Part II: NC simulation of self-penetration via comprehensive analysis of envelope profiles.
Comput. Aided Des., 2011

Complete swept volume generation, Part I: Swept volume of a piecewise C<sup>1</sup>-continuous cutter at five-axis milling via Gauss map.
Comput. Aided Des., 2011

2010
Requirements: Tracing.
Proceedings of the Encyclopedia of Software Engineering, 2010

2009
Ontology Guided Risk Analysis: From Informal Specifications to Formal Metrics.
Proceedings of the Advances in Information and Intelligent Systems, 2009

Ontology-Guided Service-Oriented Architecture Composition to Support Complex and Tailorable Process Definitions.
Int. J. Softw. Eng. Knowl. Eng., 2009

Assurance Case Driven Case Study Design for Requirements Engineering Research.
Proceedings of the Requirements Engineering: Foundation for Software Quality, 2009

2007
Certification process artifacts defined as measurable units for software assurance.
Softw. Process. Improv. Pract., 2007

r-AnalytiCA: Requirements Analytics for Certification & Accreditation.
Proceedings of the 15th IEEE International Requirements Engineering Conference, 2007

Discovering and Understanding Multi-dimensional Correlations among Certification Requirements with application to Risk Assessment.
Proceedings of the 15th IEEE International Requirements Engineering Conference, 2007

Towards a Requirements-Driven Workbench for Supporting Software Certification and Accreditation.
Proceedings of the Third International Workshop on Software Engineering for Secure Systems, 2007

2006
Building Decision Support Problem Domain Ontology from Natural Language Requirements for Software Assurance.
Int. J. Softw. Eng. Knowl. Eng., 2006

Incorporating Multimedia Source Materials into a Traceability Framework.
Proceedings of the 2006 First International Workshop on Multimedia Requirements Engineering, 2006

Building problem domain ontology from security requirements in regulatory documents.
Proceedings of the 2006 international workshop on Software engineering for secure systems, 2006

2005
Establishing trustworthiness in services of the critical infrastructure through certification and accreditation.
ACM SIGSOFT Softw. Eng. Notes, 2005

Active Automation of the DITSCAP.
Proceedings of the Intelligence and Security Informatics, 2005

Ontology-based Active Requirements Engineering Framework.
Proceedings of the 12th Asia-Pacific Software Engineering Conference (APSEC 2005), 2005

Common criteria requirements modeling and its uses for quality of information assurance (QoIA).
Proceedings of the 43nd Annual Southeast Regional Conference, 2005

2004
Missing Requirements and Relationship Discovery through Proxy Viewpoints Model.
Stud. Inform. Univ., 2004

Case Study Methodology Designed Research in Software Engineering Methodology Validation.
Proceedings of the Sixteenth International Conference on Software Engineering & Knowledge Engineering (SEKE'2004), 2004

2002
Proxy Viewpoints Model-based Requirements engineering.
Proceedings of the 2002 ACM Symposium on Applied Computing (SAC), 2002

2000
Significance Tree Image Sequence Coding with DCT-Based Pyramid Structure.
Proceedings of the 2000 International Conference on Image Processing, 2000

1999
Fingerprint recognition using wavelet transform and probabilistic neural network.
Proceedings of the International Joint Conference Neural Networks, 1999

An Integrated Shell and Methodology for Rapid Development of Knowledge-Based Agents.
Proceedings of the Sixteenth National Conference on Artificial Intelligence and Eleventh Conference on Innovative Applications of Artificial Intelligence, 1999

Knowledge Base Revision through Exception-driven Discovery and Learning.
Proceedings of the Sixteenth National Conference on Artificial Intelligence and Eleventh Conference on Innovative Applications of Artificial Intelligence, 1999

The Disciple Integrated Shell and Methodology for Rapid Development of Knowledge-Based Agents.
Proceedings of the Sixteenth National Conference on Artificial Intelligence and Eleventh Conference on Innovative Applications of Artificial Intelligence, 1999

1998
Building Agents from Shared Ontologies Through Apprenticeship Multistrategy Learning.
Proceedings of the Fifteenth National Conference on Artificial Intelligence and Tenth Innovative Applications of Artificial Intelligence Conference, 1998

1997
A neural network for the trajectory control of robotic manipulators with uncertainties.
Proceedings of International Conference on Neural Networks (ICNN'97), 1997


  Loading...