Sungsoo Kim

Orcid: 0009-0004-9441-0672

According to our database1, Sungsoo Kim authored at least 83 papers between 1994 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
An LMI-Based Risk Assessment of Leader-Follower Multi-Agent System Under Stealthy Cyberattacks.
IEEE Control. Syst. Lett., 2023

Machine Learning-Aided Dual CSI Feedback in Next Generation WLANs.
Proceedings of the 97th IEEE Vehicular Technology Conference, 2023

Performance Evaluation of Data Imputation Methods for Graph Deep Learning-Based Traffic Prediction.
Proceedings of the IEEE International Conference on Big Data, 2023

Fast Graph Learning for Traffic Prediction.
Proceedings of the IEEE International Conference on Big Data, 2023

Improved Dynamic Coupled Graph Convolutional Recurrent Networks for Traffic Forecasting.
Proceedings of the IEEE International Conference on Big Data, 2023

2022
Weigh-in-Motion: Lightweight Real-Time Identification of Gbps Wireless Traffic.
Sensors, 2022

Ultra-lightweight face activation for dynamic vision sensor with convolutional filter-level fusion using facial landmarks.
Expert Syst. Appl., 2022

Conformer-Based on-Device Streaming Speech Recognition with KD Compression and Two-Pass Architecture.
Proceedings of the IEEE Spoken Language Technology Workshop, 2022

2021
Sequential routing framework: Fully capsule network-based speech recognition.
Comput. Speech Lang., 2021

A New Stream Power Allocation Method for SU Beamforming in BICM MIMO-OFDM Systems for IEEE WLAN.
Proceedings of the 93rd IEEE Vehicular Technology Conference, 2021

Two-Pass End-to-End ASR Model Compression.
Proceedings of the IEEE Automatic Speech Recognition and Understanding Workshop, 2021

2020
Joint Beamformer and Beamformee Design for Channel Smoothing in WLAN Systems.
Proceedings of the 92nd IEEE Vehicular Technology Conference, 2020

Locality-Improved Repairable Fountain Codes for Distributed Storage Systems.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

Adversarial Video Compression Guided by Soft Edge Detection.
Proceedings of the 2020 IEEE International Conference on Acoustics, 2020

A Review of On-Device Fully Neural End-to-End Automatic Speech Recognition Algorithms.
Proceedings of the 54th Asilomar Conference on Signals, Systems, and Computers, 2020

2019
Adaptive Feedback of the Channel Information for Beamforming in IEEE 802.11ax WLANs.
Proceedings of the 90th IEEE Vehicular Technology Conference, 2019

A New Divide and Conquer Based SVD Algorithm for Beamforming Matrix for MIMO Systems.
Proceedings of the 90th IEEE Vehicular Technology Conference, 2019

Possibility of HPC Application on Cloud Infrastructure by Container Cluster.
Proceedings of the 2019 IEEE International Conference on Computational Science and Engineering, 2019

End-to-End Training of a Large Vocabulary End-to-End Speech Recognition System.
Proceedings of the IEEE Automatic Speech Recognition and Understanding Workshop, 2019

Attention Based On-Device Streaming Speech Recognition with Large Speech Corpus.
Proceedings of the IEEE Automatic Speech Recognition and Understanding Workshop, 2019

2017
Towards the Performance Limit of Data-Aided Channel Estimation for 5G.
Proceedings of the 2017 IEEE Wireless Communications and Networking Conference, 2017

2016
New Approach to Continuous k-Nearest Neighbor Monitoring in a Directed Road Network.
Ad Hoc Sens. Wirel. Networks, 2016

Multiuser Superposition Transmission (MUST) for LTE-A systems.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

Dependability Analysis of Digital Library Cloud Services with Load Sharing.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2016

2015
Near-Optimal Contraction of Voronoi Regions for Pruning of Blind Decoding Results.
IEEE Trans. Commun., 2015

Robust visual voice activity detection using local variance histogram in vehicular environments.
Proceedings of the IEEE International Conference on Consumer Electronics, 2015

Interference cancellation based on blindly-detected interference parameters for LTE-advanced UE.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Dual RAID technique for ensuring high reliability and performance in SSD.
Proceedings of the 14th IEEE/ACIS International Conference on Computer and Information Science, 2015

2014
Study on watermarking scheme using threshold value and S-Box.
Int. J. Intell. Inf. Database Syst., 2014

PLGC: Partial Linked GC for Datacenter.
Proceedings of the 2014 International Conference on IT Convergence and Security, 2014

2013
Random data-aware flash translation layer for NAND flash-based smart devices.
J. Supercomput., 2013

2012
Codebook-Based Lattice-Reduction-Aided Precoding for Limited-Feedback Coded MIMO Systems.
IEEE Trans. Commun., 2012

A tag prediction anti-collision algorithm using extra bits for RFID tag identification.
Int. J. Ad Hoc Ubiquitous Comput., 2012

Near ML Modulation Classification.
Proceedings of the 76th IEEE Vehicular Technology Conference, 2012

A simple slicer for soft detection in Gray-coded QAM-modulated MIMO OFDM systems.
Proceedings of the 35th IEEE Sarnoff Symposium 2012, Newark, NJ, USA, May 21-22, 2012, 2012

Advanced downlink MU-MIMO receiver for 3GPP LTE-A.
Proceedings of IEEE International Conference on Communications, 2012

Systematic pruning of blind decoding results.
Proceedings of the Conference Record of the Forty Sixth Asilomar Conference on Signals, 2012

2011
The gaussian two-way relay channel with wiretapper.
Proceedings of the Conference Record of the Forty Fifth Asilomar Conference on Signals, 2011

2010
An Inference Algorithm with Efficient Slot Allocation for RFID Tag Identification.
IEICE Trans. Commun., 2010

PUF-based Encryption Processor for the RFID Systems.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

2009
An Enhanced Slotted Binary Tree Algorithm with Intelligent Separation in RFID systems.
Proceedings of the 14th IEEE Symposium on Computers and Communications (ISCC 2009), 2009

An anti-collision algorithm without idle cycle using 4-ary tree in RFID system.
Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication, 2009

A Symmetric Key Based RFID Authentication Protocol Using Encrypted Tag ID.
Proceedings of the Eighth IEEE International Conference on Dependable, 2009

A Short Distance Data Dissemination Protocol for Wireless Sensor Networks.
Proceedings of the Eighth IEEE International Conference on Dependable, 2009

Improved 4-ary Query Tree Algorithm for Anti-Collision in RFID System.
Proceedings of the IEEE 23rd International Conference on Advanced Information Networking and Applications, 2009

2008
Capacity and performance of lattice reduction aided linear processing with lattice encoding and decoding in limited feedback systems.
IEEE J. Sel. Areas Commun., 2008

Network Coding with Linear MIMO Pre-Equalizer Using Modulo in Two-Way Channel.
Proceedings of the WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008, 2008

2007
Impact of simulation tool on TCP performance results: a case study with ns-2 and Opnet.
Proceedings of the 2007 Spring Simulation Multiconference, 2007

A Mechanism for Improving Web Server Performance Using Fuzzy Concept.
Proceedings of the Seventh International Conference on Computer and Information Technology (CIT 2007), 2007

2006
A bias reducing technique in kernel distribution function estimation.
Comput. Stat., 2006

A differentiated service mechanism considering SLA for heterogeneous cluster Web systems.
Proceedings of the Fourth IEEE Workshop on Software Technologies for Future Embedded and Ubiquitous Systems and the Second International Workshop on Collaborative Computing, 2006

Low Energy Consumption Security Method for Protecting Information of Wireless Sensor Network.
Proceedings of the Advanced Web and Network Technologies, and Applications, 2006

2005
A Self-healing Mechanism for an Intrusion Tolerance System.
Proceedings of the Trust, 2005

A Dependability Analysis of an Intrusion Tolerance System.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2005

A Performance Isolation Technique Ensuring SLA of Web Systems Having Primary-backup Web Switch.
Proceedings of the Ninth IASTED International Conference on Internet and Multimedia Systems and Applications (IMSA 2005), 2005

Energy Efficient Security Method for Wireless Sensor Network with Hiding Location Information.
Proceedings of the Ninth IASTED International Conference on Internet and Multimedia Systems and Applications (IMSA 2005), 2005

A Dependability Management Mechanism for Ubiquitous Computing Systems.
Proceedings of the Embedded and Ubiquitous Computing - EUC 2005 Workshops, 2005

Privacy Management Mechanism for Location based Application with High Performance.
Proceedings of the IASTED International Conference on Communication Systems and Applications, 2005

Autonomic Location Detection Strategies for Ubiquitous Environment.
Proceedings of the IASTED International Conference on Communication Systems and Applications, 2005

2004
Survivality Modeling for Quantitative Security Assessment in Ubiquitous Computing Systems.
Proceedings of the Computational Science and Its Applications, 2004

Content-Based Distribution for Load Sharing in Locally Clustered Web Servers.
Proceedings of the Advances in Information Systems, Third International Conference, 2004

2003
Efficient Dynamic Resource Reallocation Scheme Using Time-Slot Connection Pattern.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2003

Improving Cache Hit Rate Through Cooperative Caching in Cluster-Based Web Server.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2003

Adaptive Server Partition for Service Level Agreements in Cluster-Based Web Server.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2003

A New Availability Concept for (n, k)-way Cluster Systems Regarding Waiting Time.
Proceedings of the Computational Science and Its Applications, 2003

Self-configuring Algorithm for Software Fault Tolerance in (n, k)-way Cluster Systems.
Proceedings of the Computational Science and Its Applications, 2003

Robust OFDM in fast fading channels.
Proceedings of the Global Telecommunications Conference, 2003

2002
A capacity planning model of unreliable multimedia service systems.
J. Syst. Softw., 2002

Availability analysis and improvement of Active/Standby cluster systems using software rejuvenation.
J. Syst. Softw., 2002

Determining Optimal Redundancy Levels for Highly Available (n, k) Cluster Systems Based on Waiting Time Deadline.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2002

Adaptive Data Reorganization for Shared Storage Cluster Systems.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2002

Combining and Scheduling of Pool Web Service for Master-worker-style Application on Grid Computing.
Proceedings of the Internet and Multimedia Systems and Applications, 2002

A Resource Manager for Shared Storage Cluster System in Grid Computing.
Proceedings of the Internet and Multimedia Systems and Applications, 2002

Efficient Memory Page Replacement on Web Server Clusters.
Proceedings of the Computational Science - ICCS 2002, 2002

Saboteur Analysis and Scheduling Schemes on Work Pool Based Grid Computing with XML Web Services.
Proceedings of the International Conference on Internet Computing, 2002

2000
Efficient data broadcast scheme on wireless link errors.
IEEE Trans. Consumer Electron., 2000

A fault-tolerant continuous media disk array under arbitrary-rate search.
IEEE Trans. Consumer Electron., 2000

Providing Arbitrary-Rate Search in a Fault-Tolerant Continuous Media Disk Array.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2000

Failure Recovery of Mobile Host in Mobile Environments.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2000

1999
Fault-tolerant rank order filtering for image enhancement.
IEEE Trans. Consumer Electron., 1999

1996
Modeling Quality Reduction of Multichip Module Systems due to Uneven Fault-Coverage and Imperfect Diagnosis.
Proceedings of the 1996 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems, 1996

1995
Repair algorithms for mirrored disk systems.
Proceedings of the 1995 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems, 1995

1994
Scheduling Policies for Fault Tolerance in a VLSI Processor.
Proceedings of the IEEE International Workshop on Defect and Fault Tolerance in VLSI Systems, 1994


  Loading...