Sijung Kim

According to our database1, Sijung Kim authored at least 14 papers between 2004 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Encoding-Aware Deep Video Super-Resolution Framework.
Proceedings of the IEEE International Conference on Image Processing, 2023

2022
A-mash: providing single-app illusion for multi-app use through user-centric UI mashup.
Proceedings of the ACM MobiCom '22: The 28th Annual International Conference on Mobile Computing and Networking, Sydney, NSW, Australia, October 17, 2022

2021
NTIRE 2021 Challenge on Quality Enhancement of Compressed Video: Methods and Results.
CoRR, 2021

2020
Edge-aware image filtering using a structure-guided CNN.
IET Image Process., 2020

2018
Estimating pig weights from images without constraint on posture and illumination.
Comput. Electron. Agric., 2018

Technology trend in 38 live entertainment shows on the Las Vegas Strip.
Proceedings of the IEEE International Conference on Consumer Electronics, 2018

The AR Strip: A City Incorporated Augmented Reality Educational Curriculum.
Proceedings of the Distributed, Ambient and Pervasive Interactions: Understanding Humans, 2018

2017
The Mail Art Box: An analog to digital postal service.
Proceedings of the IEEE International Conference on Consumer Electronics, 2017

2016
Feature Coverage Indexes for Dual Homography Estimation in Constructing Panorama Image.
J. Sensors, 2016

2007
The Effect of Gaps Between Displays on Spatial Perception and Cognition Tasks in Virtual Environments.
Int. J. Virtual Real., 2007

The Design and Testing of Automated Signature Generation Engine for Worms Detection.
Proceedings of the Agent and Multi-Agent Systems: Technologies and Applications, 2007

2006
Evaluating the effects of real world distraction on user performance in virtual environments.
Proceedings of the ACM Symposium on Virtual Reality Software and Technology, 2006

Response Against Hacking and Malicious Code in P2P.
Proceedings of the Computational Science and Its Applications, 2006

2004
Network Intrusion Protection System Using Rule-Based DB and RBAC Policy.
Proceedings of the Network and Parallel Computing, IFIP International Conference, 2004


  Loading...