Sungmin Lee

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Known people with the same name:

Bibliography

2024
Analysis of the Optimal Feedback Rate for Limited Feedback-Based Block Diagonalization in Cellular MU-MIMO Systems.
IEEE Wirel. Commun. Lett., February, 2024

2023
AttFL: A Personalized Federated Learning Framework for Time-series Mobile and Embedded Sensor Data Processing.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., September, 2023

TiDedup: A New Distributed Deduplication Architecture for Ceph.
Proceedings of the 2023 USENIX Annual Technical Conference, 2023

Heart Sound Analysis for Smart Stethoscope in Mobile Environments.
Proceedings of the 8th IEEE International Conference on Smart Cloud, 2023

PRV-based Stress Analysis on Display Color Temperatur in VR Environments.
Proceedings of the International Conference on Fuzzy Theory and Its Applications, 2023

MAFiD: Moving Average Equipped Fusion-in-Decoder for Question Answering over Tabular and Textual Data.
Proceedings of the Findings of the Association for Computational Linguistics: EACL 2023, 2023

RINK: Reader-Inherited Evidence Reranker for Table-and-Text Open Domain Question Answering.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023

2022
Enhancement of Cooperation and Reentrant Phase of Prisoner's Dilemma Game on Signed Networks.
Entropy, 2022

JBNU-CCLab at SemEval-2022 Task 12: Machine Reading Comprehension and Span Pair Classification for Linking Mathematical Symbols to Their Descriptions.
Proceedings of the 16th International Workshop on Semantic Evaluation, SemEval@NAACL 2022, 2022

JBNU-CCLab at SemEval-2022 Task 7: DeBERTa for Identifying Plausible Clarifications in Instructional Texts.
Proceedings of the 16th International Workshop on Semantic Evaluation, SemEval@NAACL 2022, 2022

2021
Android Remote Unlocking Service using Synthetic Password: A Hardware Security-preserving Approach.
Proceedings of the IEEE Secure Development Conference, 2021

2017
Ranking influential spreaders is an ill-defined problem.
CoRR, 2017

Characterization of a mm-scale swimming microrobot for 3D manipulation.
Proceedings of the 14th International Conference on Ubiquitous Robots and Ambient Intelligence, 2017

Hot-cold data filtering and management for PRAM based memory-storage unified system.
Proceedings of the 2017 IEEE International Conference on Systems, Man, and Cybernetics, 2017

2016
A review on dark channel prior based image dehazing algorithms.
EURASIP J. Image Video Process., 2016

Energy-efficient spread second capacitor capacitive-DAC for SAR ADCs.
Proceedings of the International SoC Design Conference, 2016

Identifying Hearing Loss from Learned Speech Kernels.
Proceedings of the Interspeech 2016, 2016

Inferring Hearing Loss from Learned Speech Kernels.
Proceedings of the 15th IEEE International Conference on Machine Learning and Applications, 2016

Text-aware image dehazing using stroke width transform.
Proceedings of the 2016 IEEE International Conference on Image Processing, 2016

2015
Effective Similarity Measurement for Key-Point Matching in Images.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2015

2013
A study on Low-Voltage DC circuit breakers.
Proceedings of the 22nd IEEE International Symposium on Industrial Electronics, 2013

2012
Dynamic CPU resource allocation for multicore CE devices running multiple operating systems.
Proceedings of the IEEE International Conference on Consumer Electronics, 2012

2008
An Embedded SoC System to Trace Moving Object and Detect Distance.
Proceedings of the Fourth International Conference on Natural Computation, 2008

An Embedded SoC System IP to Trace Object and Distance.
Proceedings of the Advanced Intelligent Computing Theories and Applications. With Aspects of Theoretical and Methodological Issues, 2008

2007
Content-Sharing for Dummies: A Secure and Usable Mechanism in Wi-Fi Infrastructure Home Networks.
Proceedings of the 4th IEEE Consumer Communications and Networking Conference, 2007

2006
Guest access: change even your mother into an effective security technician.
Proceedings of the 3rd IEEE Consumer Communications and Networking Conference, 2006

2003
TY<sub>*</sub>SecureWS: An Integrated Web Service Security Solution Based on Java.
Proceedings of the E-Commerce and Web Technologies, 4th International Conference, 2003


  Loading...