Suntae Kim

Orcid: 0000-0002-4228-3059

According to our database1, Suntae Kim authored at least 59 papers between 2006 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Which Exceptions Do We Have to Catch in the Python Code for AI Projects?
Int. J. Softw. Eng. Knowl. Eng., March, 2023

Deep Tasks Summarization for Comprehending Mixed Tasks in a Commit.
Int. J. Softw. Eng. Knowl. Eng., February, 2023

Just-in-Time Defect Prediction for Self-driving Software via a Deep Learning Model.
J. Web Eng., 2023

2022
SHAPE: a dataset for hand gesture recognition.
Neural Comput. Appl., 2022

GAIN-QoS: A Novel QoS Prediction Model for Edge Computing.
J. Web Eng., 2022

Visualization of knowledge map for monitoring knowledge diagnoses.
J. Ambient Intell. Humaniz. Comput., 2022

Gradle-Autofix: An Automatic Resolution Generator for Gradle Build Error.
Int. J. Softw. Eng. Knowl. Eng., 2022

An improved hand gesture recognition system using keypoints and hand bounding boxes.
Array, 2022

Holistic Parameter Optimization for Software Defect Prediction.
IEEE Access, 2022

2021
Coding™: Development Task Visualization for SW Code Comprehension.
Proceedings of the Working Conference on Software Visualization, 2021

2020
Automatic recommendation to appropriate log levels.
Softw. Pract. Exp., 2020

Lightweight 3D Human Pose Estimation Network Training Using Teacher-Student Learning.
Proceedings of the IEEE Winter Conference on Applications of Computer Vision, 2020

2019
Automatic recommendation to omitted steps in use case specification.
Requir. Eng., 2019

Adversarial Detection with Gaussian Process Regression-based Detector.
KSII Trans. Internet Inf. Syst., 2019

Learning to spot and refactor inconsistent method names.
Proceedings of the 41st International Conference on Software Engineering, 2019

Context Data Preprocessing for Context-Aware Smartphone Authentication.
Proceedings of the Computational Science and Its Applications - ICCSA 2019, 2019

2018
Detection of document modification based on deep neural networks.
J. Ambient Intell. Humaniz. Comput., 2018

Automatic identification of Java Method Naming Patterns Using Cascade K-Medoids.
KSII Trans. Internet Inf. Syst., 2018

A Feature based Content Analysis of Blockchain Platforms.
Proceedings of the Tenth International Conference on Ubiquitous and Future Networks, 2018

Measuring the Extent of Source Code Readability Using Regression Analysis.
Proceedings of the Computational Science and Its Applications - ICCSA 2018, 2018

Software R&D Process Framework for Process Tailoring with EPF Cases.
Proceedings of the Computational Science and Its Applications - ICCSA 2018, 2018

Study on Process of Data Processing and Analysis Based on Geographic Information.
Proceedings of the Computational Science and Its Applications - ICCSA 2018, 2018

An Automatic Approach to Validating Log Levels in Java.
Proceedings of the 25th Asia-Pacific Software Engineering Conference, 2018

2017
A study of fuzzy membership functions for dependence decision-making in security robot system.
Neural Comput. Appl., 2017

A Machine-Learning Based Approach for Extracting Logical Structure of a Styled Document.
KSII Trans. Internet Inf. Syst., 2017

Toward Offline Contents Based Software R&D Support System.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2017

Visualization Approach for R&D Monitoring - A Tracking of Research Contents Changes Perspective.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2017

2016
Resource Allocation Policies for Loosely Coupled Applications in Heterogeneous Computing Systems.
IEEE Trans. Parallel Distributed Syst., 2016

Design and Development of Layered Security: Future Enhancements and Directions in Transmission.
Sensors, 2016

The protocol design and New approach for SCADA security enhancement during sensors broadcasting system.
Multim. Tools Appl., 2016

Suggesting Alternative Scenarios Using Use Case Specification Patterns for Requirement Completeness.
Int. J. Softw. Eng. Knowl. Eng., 2016

Decomposing class responsibilities using distance-based method similarity.
Frontiers Comput. Sci., 2016

Automatic identifier inconsistency detection using code dictionary.
Empir. Softw. Eng., 2016

Study on data center and data librarian role for reuse of research data.
Proceedings of the 8th International Conference on Knowledge and Smart Technology, 2016

Evaluating the Effectiveness of the Vector Space Retrieval Model Indexing.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2016

2015
Real Time MODBUS Transmissions and Cryptography Security Designs and Enhancements of Protocol Sensitive Information.
Symmetry, 2015

A quantitative and knowledge-based approach to choosing security architectural tactics.
Int. J. Ad Hoc Ubiquitous Comput., 2015

Do We Need New Management Perspectives for Software Research Projects?
Proceedings of the Computational Science and Its Applications - ICCSA 2015, 2015

Contents Based Traceability Between Research Artifact and Process for R&D Projects.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2015

2014
A battery lifetime guarantee scheme for selective applications in smart mobile devices.
IEEE Trans. Consumer Electron., 2014

Global data repository status and analysis: based on Korea, China and Japan.
Libr. Hi Tech, 2014

API Document Quality for Resolving Deprecated APIs.
Proceedings of the 21st Asia-Pacific Software Engineering Conference, 2014

Building Sustainable Software by Preemptive Architectural Design Using Tactic-Equipped Patterns.
Proceedings of the Ninth International Conference on Availability, 2014

2012
An active learning framework for object-oriented analysis and design.
Comput. Appl. Eng. Educ., 2012

Detecting Inconsistent Names of Source Code Using NLP.
Proceedings of the Computer Applications for Database, Education, and Ubiquitous Computing, 2012

2011
A feature-based approach for modeling role-based access control systems.
J. Syst. Softw., 2011

A Feature-Based Modeling Approach for Building Hybrid Access Control Systems.
Proceedings of the Fifth International Conference on Secure Software Integration and Reliability Improvement, 2011

2010
SW Architecture for Access to Medical Information for Knowledge Execution.
Proceedings of the Security-Enriched Urban Computing and Smart Grid, 2010

Tool support for quality-driven development of software architectures.
Proceedings of the ASE 2010, 2010

A Scenario Based Approach for Service Identification.
Proceedings of the Workshop Proceedings of the 34th Annual IEEE International Computer Software and Applications Conference, 2010

2009
Service robot for the elderly.
IEEE Robotics Autom. Mag., 2009

Quality-driven architecture development using architectural tactics.
J. Syst. Softw., 2009

A Robot Fault-Tolerance Approach Based on Fault Type.
Proceedings of the Ninth International Conference on Quality Software, 2009

GARDIAN: A Tool for Validating Rule-Based Modeling Methods.
Proceedings of the Ninth International Conference on Quality Software, 2009

2008
A Tactic-Based Approach to Embodying Non-functional Requirements into Software Architectures.
Proceedings of the 12th International IEEE Enterprise Distributed Object Computing Conference, 2008

A Design Quality Model for Service-Oriented Architecture.
Proceedings of the 15th Asia-Pacific Software Engineering Conference (APSEC 2008), 2008

Service Identification Using Goal and Scenario in Service Oriented Architecture.
Proceedings of the 15th Asia-Pacific Software Engineering Conference (APSEC 2008), 2008

Software Engineering Education Toolkit for Embedded Software Architecture Design Methodology Using Robotic Systems.
Proceedings of the 15th Asia-Pacific Software Engineering Conference (APSEC 2008), 2008

2006
UML-based service robot software development: a case study.
Proceedings of the 28th International Conference on Software Engineering (ICSE 2006), 2006


  Loading...