Ung-Mo Kim

Orcid: 0000-0001-5464-6358

According to our database1, Ung-Mo Kim authored at least 94 papers between 1999 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
A Study on Traffic Prediction for the Backbone of Korea's Research and Science Network Using Machine Learning.
J. Web Eng., 2022

Vulnerabilities and Secure Coding for Serverless Applications on Cloud Computing.
Proceedings of the Human-Computer Interaction. User Experience and Behavior, 2022

A Survey on Automated Machine Learning: Problems, Methods and Frameworks.
Proceedings of the Human-Computer Interaction. Theoretical Approaches and Design Methods, 2022

OSP-Class: Open Set Pseudo-labeling with Noise Robust Training for Text Classification.
Proceedings of the IEEE International Conference on Big Data, 2022

2021
EnvBERT: Multi-Label Text Classification for Imbalanced, Noisy Environmental News Data.
Proceedings of the 15th International Conference on Ubiquitous Information Management and Communication, 2021

Crowd Worker Selection with Wide Learning and Narrow Evaluation.
Proceedings of the 15th International Conference on Ubiquitous Information Management and Communication, 2021

2018
A Study on Application Method for Automation Solution Using Blockchain dApp Platform.
Proceedings of the Parallel and Distributed Computing, 2018

An efficient processing of range spatial keyword queries over moving objects.
Proceedings of the 2018 International Conference on Information Networking, 2018

Efficient Method for Processing Range Spatial Keyword Queries Over Moving Objects Based on Word2Vec.
Proceedings of the Human Interface and the Management of Information. Information in Applications and Services, 2018

Reducing Power Consumption of Mobile Watermarking Application with Energy Refactoring.
Proceedings of the Human Interface and the Management of Information. Information in Applications and Services, 2018

2017
QR*-Tree: An Adaptive Space-Partitioning Index for Monitoring Moving Objects.
J. Inf. Sci. Eng., 2017

The SSP-Tree: A Method for Distributed Processing of Range Monitoring Queries in Road Networks.
ISPRS Int. J. Geo Inf., 2017

A development of power consumption measurement system for Android smartphones.
Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, 2017

An Efficient Top-K Query Processing Method for Location Based Services.
Proceedings of the International Conference on Advances in Image Processing, 2017

2016
Efficient Evaluation of Maximizing Range Sum Queries in a Road Network.
IEICE Trans. Inf. Syst., 2016

An Efficient Grid Index for Moving Objects in Indoor Environments.
Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication, 2016

An Efficient Method for Monitoring Continuous Top-k Queries.
Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication, 2016

An adaptive space split strategy for distributed processing of region monitoring queries.
Proceedings of the 3rd International Conference on Systems and Informatics, 2016

2015
Evaluation of Content-Matched Range Monitoring Queries over Moving Objects in Mobile Computing Environments.
Sensors, 2015

Efficient batch processing of proximity queries with MapReduce.
Proceedings of the 9th International Conference on Ubiquitous Information Management and Communication, 2015

2014
Association Rule Extraction from XML Stream Data for Wireless Sensor Networks.
Sensors, 2014

A framework of spatial co-location pattern mining for ubiquitous GIS.
Multim. Tools Appl., 2014

Method for Extracting Valuable Common Structures from Heterogeneous Rooted and Labeled Tree Data.
J. Inf. Sci. Eng., 2014

Distributed processing of continuous range queries.
Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication, 2014

A Spanning Tree Based Data Collection for Real-Time Streaming Sensor Data.
Proceedings of the IEEE 12th International Conference on Dependable, 2014

Resource Reallocation of Virtual Machine in Cloud Computing with MCDM Algorithm.
Proceedings of the 2014 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2014

Latent Semantic Analysis for Mining Rules in Big Data Environment.
Proceedings of the 2014 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2014

2013
Processing Continuous Range Queries with Non-spatial Selections.
Proceedings of the Mobile, Ubiquitous, and Intelligent Computing, 2013

DSPI: An Efficient Index for Processing Range Queries on Wireless Broadcast Stream.
Proceedings of the Mobile, Ubiquitous, and Intelligent Computing, 2013

A cooperative method for privacy preservation in real-time location monitoring services.
Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication, 2013

2012
A sliding window-based false-negative approach for ubiquitous data stream analysis.
Int. J. Commun. Syst., 2012

CWFM: Closed Contingency Weighted Frequent Itemsets Mining.
Proceedings of the Advances in Data Mining. Applications and Theoretical Aspects, 2012

Research to recommend influencially product group about interest through the TKMA (Transformed K-Means Algorithm).
Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication, 2012

Integration of opinion mining service flow with anonymous information.
Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication, 2012

2011
Maximal Cliques Generating Algorithm for Spatial Co-location Pattern Mining.
Proceedings of the Secure and Trust Computing, Data Management and Applications, 2011

Using Bloom Filters for Mining Top-k Frequent Itemsets in Data Streams.
Proceedings of the Secure and Trust Computing, Data Management and Applications, 2011

Opinion Mining in MapReduce Framework.
Proceedings of the Secure and Trust Computing, Data Management, and Applications, 2011

Android Platform for English Tutoring.
Proceedings of the 5th FTRA International Conference on Multimedia and Ubiquitous Engineering, 2011

Based on Analyzing Closeness and Authority for Ranking Expert in Social Network.
Proceedings of the Advanced Intelligent Computing Theories and Applications. With Aspects of Artificial Intelligence, 2011

A Fast Lock-Free User Memory Space Allocator for Embedded Systems.
Proceedings of the International Conference on Computational Science and Its Applications, 2011

Mining Information of Anonymous User on a Social Network Service.
Proceedings of the International Conference on Advances in Social Networks Analysis and Mining, 2011

2010
Mining Frequent Itemsets with Normalized Weight in Continuous Data Streams.
J. Inf. Process. Syst., 2010

Using wordmap and score-based weight in opinion mining with mapreduce.
Proceedings of the IEEE International Conference on Service-Oriented Computing and Applications, 2010

RBAC-based access control for privacy preserving in semantic web.
Proceedings of the 4th International Conference on Ubiquitous Information Management and Communication, 2010

Mining Reputation of Person/Product from Comment and Reply on UCC/Internet Article.
Proceedings of the Advanced Intelligent Computing Theories and Applications, 2010

2009
Fast Extraction of Maximal Frequent Subtrees Using Bits Representation.
J. Inf. Sci. Eng., 2009

An off-line dictionary attack on a simple three-party key exchange protocol.
IEEE Commun. Lett., 2009

A study on the web-based intelligent self-diagnosis medical system.
Adv. Eng. Softw., 2009

A Secure Delegation Model Based on Multi-agent in Pervasive Environments.
Proceedings of the Agent and Multi-Agent Systems: Technologies and Applications, 2009

WSFI-Mine: Mining Frequent Patterns in Data Streams.
Proceedings of the Advances in Neural Networks, 2009

Mining opinions from messenger.
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, 2009

Mining association rules in tree structured XML data.
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, 2009

A method for opinion mining of product reviews using association rules.
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, 2009

RBAC-based access control for privacy protection in pervasive environments.
Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication, 2009

FIA: Frequent Itemsets Mining Based on Approximate Counting in Data Streams.
Proceedings of the Neural Information Processing, 16th International Conference, 2009

Enhancing Security of a Group Key Exchange Protocol for Users with Individual Passwords.
Proceedings of the Computational Science and Its Applications, 2009

Mining Approximate Frequent Itemsets over Data Streams Using Window Sliding Techniques.
Proceedings of the Database Theory and Application, 2009

Mining Multilevel Association Rules on RFID Data.
Proceedings of the First Asian Conference on Intelligent Information and Database Systems, 2009

2008
Security enhancement to a password-authenticated group key exchange protocol for mobile Ad-hoc networks.
IEEE Commun. Lett., 2008

Adaptive Neighbor Selection for Service Discovery in Mobile Ad Hoc Networks.
Proceedings of the Network and Parallel Computing, IFIP International Conference, 2008

Extracting Temporal Behavior Patterns of Mobile User.
Proceedings of the NCM 2008, The Fourth International Conference on Networked Computing and Advanced Information Management, Gyeongju, Korea, September 2-4, 2008, 2008

A Data Sanitization Method for Privacy Preserving Data Re-publication.
Proceedings of the NCM 2008, The Fourth International Conference on Networked Computing and Advanced Information Management, Gyeongju, Korea, September 2-4, 2008, 2008

Distributed File Discovery Protocol in Mobile Peer-to-Peer Networks.
Proceedings of the NCM 2008, The Fourth International Conference on Networked Computing and Advanced Information Management, Gyeongju, Korea, September 2-4, 2008, 2008

Mining Based Decision Support Multi-agent System for Personalized e-Healthcare Service.
Proceedings of the Agent and Multi-Agent Systems: Technologies and Applications, 2008

A new agent characterization model and grouping method for multi-agent system.
Proceedings of the IEEE International Conference on Information Reuse and Integration, 2008

DHT-Based Mobile Service Discovery Protocol for Mobile Ad Hoc Networks.
Proceedings of the Advanced Intelligent Computing Theories and Applications. With Aspects of Theoretical and Methodological Issues, 2008

Discovery of Useful Patterns from Tree-Structured Documents with Label-Projected Database.
Proceedings of the Autonomic and Trusted Computing, 5th International Conference, 2008

Mining Maximal Frequent Subtrees with Lists-Based Pattern-Growth Method.
Proceedings of the Progress in WWW Research and Development, 2008

2007
A Delegation Model based on Agent in Distributed Systems.
J. Inf. Process. Syst., 2007

Resource-aware protocols for authenticated group key exchange in integrated wired and wireless networks.
Inf. Sci., 2007

Semantic-based Similarity Computation for XML Document.
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007

Remote Control Multi-Agent System for u-Healthcare Service.
Proceedings of the Agent and Multi-Agent Systems: Technologies and Applications, 2007

Infringing Key Authentication of an ID-Based Group Key Exchange Protocol Using Binary Key Trees.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2007

A Framework for Data Structure-Guided Extraction of XML Association Rules.
Proceedings of the Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27, 2007

Implementation of OSD Security Framework and Credential Cache.
Proceedings of the Advances in Grid and Pervasive Computing, 2007

Context RBAC/MAC Access Control for Ubiquitous Environment.
Proceedings of the Advances in Databases: Concepts, 2007

Mining Maximally Common Substructures from XML Trees with Lists-Based Pattern-Growth Method.
Proceedings of the Computational Intelligence and Security, International Conference, 2007

Constant-Round Authenticated Group Key Exchange with Logarithmic Computation Complexity.
Proceedings of the Applied Cryptography and Network Security, 5th International Conference, 2007

2006
A Simple Yet Efficient Approach for Maximal Frequent Subtrees Extraction from a Collection of XML Documents.
Proceedings of the Web Information Systems - WISE 2006 Workshops, 2006

A New Reflective and Reliable Context-Oriented Event Service Architecture for Pervasive Computing.
Proceedings of the Computational Science and Its Applications, 2006

Extraction of Implicit Context Information in Ubiquitous Computing Environments.
Proceedings of the Computational Science and Its Applications, 2006

A Semantic Context-Aware Access Control in Pervasive Environments.
Proceedings of the Computational Science and Its Applications, 2006

Design and Implementation of a Security Framework Based on the Object-Based Storage Device Standard.
Proceedings of the Computational Science and Its Applications, 2006

Extraction of Interesting Financial Information from Heterogeneous XML-Based Data.
Proceedings of the Computational Science, 2006

2005
Ontology based Service Discovery Middleware for Heterogeneous Agent Platforms.
Proceedings of the First Internaltional Workshop on Personalized Context Modeling and Management for UbiComp Applications, 2005

Interaction of Context Descriptor and Ontology for Semantic Service Discovery in Ubiquitous environment.
Proceedings of OntoLex@IJCNLP 2005 - Ontologies and Lexical Resources, Jeju Island, Korea, 2005

EXiT-B: A New Approach for Extracting Maximal Frequent Subtrees from XML Data.
Proceedings of the Intelligent Data Engineering and Automated Learning, 2005

A New Method for Mining Association Rules from a Collection of XML Documents.
Proceedings of the Computational Science and Its Applications, 2005

EFoX: A Scalable Method for Extracting Frequent Subtrees.
Proceedings of the Computational Science, 2005

Efficient Indexing of Moving Objects Using Time-Based Partitioning with R-Tree.
Proceedings of the Computational Science, 2005

Predictive Model for Protein Function Using Modular Neural Approach.
Proceedings of the Pattern Recognition and Data Mining, 2005

2002
An Efficient Multicasting Scheme Using Prejoin Technology in Mobile Computing Environments.
Proceedings of the Mobile Communications, 7th CDMA International Conference, CIC 2002, Seoul, Korea, October 29, 2002

2001
A Transaction Length-Sensitive Protocol Based on Altruistic Locking for Multilevel Secure Database Systems.
Proceedings of the Information and Communications Security, Third International Conference, 2001

1999
Transaction Length-Sensitive Scheme for Livelock-Thin Scheduling.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 1999


  Loading...