Seunghyun Im

According to our database1, Seunghyun Im authored at least 18 papers between 2005 and 2014.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2014
A versatile biopotential acquisition analog front end IC with effective DC offset and ripple rejection.
Proceedings of the 2014 International Symposium on Integrated Circuits (ISIC), 2014

2012
Framework to Build an Intelligent RFID System for Use in the Healthcare Industry.
Proceedings of the Conference on Technologies and Applications of Artificial Intelligence, 2012

2011
Action Reducts.
Proceedings of the Foundations of Intelligent Systems - 19th International Symposium, 2011

2010
Action rule discovery from incomplete data.
Knowl. Inf. Syst., 2010

A visual way to talk to strangers: authentication in wireless pervasive computing.
Int. J. Ad Hoc Ubiquitous Comput., 2010

2009
Data Confidentiality and Chase-Based Knowledge Discovery.
Proceedings of the Encyclopedia of Data Warehousing and Mining, Second Edition (4 Volumes), 2009

Mining Generalized Actionable Rules Using Concept Hierarchies.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2009

Mining Non-redundant Reclassification Rules.
Proceedings of the Next-Generation Applied Intelligence, 2009

2008
Multi-granularity Classification Rule Discovery Using ERID.
Proceedings of the Rough Sets and Knowledge Technology, Third International Conference, 2008

Validating Secure Connections between Wireless Devices in Pervasive Computing Using Data Matrix.
Proceedings of the 2008 International Conference on Multimedia and Ubiquitous Engineering (MUE 2008), 2008

Action Rule Extraction from a Decision Table: ARED.
Proceedings of the Foundations of Intelligent Systems, 17th International Symposium, 2008

Reclassification Rules.
Proceedings of the Workshops Proceedings of the 8th IEEE International Conference on Data Mining (ICDM 2008), 2008

2007
Data Security and Chase.
Proceedings of the Encyclopedia of Information Ethics and Security, 2007

Privacy Aware Data Management and Chase.
Fundam. Informaticae, 2007

Data Confidentiality Versus Chase.
Proceedings of the Rough Sets, 2007

Protection of Sensitive Data based on Reducts in a Distributed Knowledge Discovery System.
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007

2005
Ensuring Data Security Against Knowledge Discovery in Distributed Information Systems.
Proceedings of the Rough Sets, 2005

Visual Device identification for Security Services in Ad-Hoc Wireless Networks.
Proceedings of the New Trends in Computer Networks, 2005


  Loading...