default search action
Chulyun Kim
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j14]Youngmi Park, Ahjeong Park, Chulyun Kim:
ALSI-Transformer: Transformer-Based Code Comment Generation With Aligned Lexical and Syntactic Information. IEEE Access 11: 39037-39047 (2023) - 2020
- [c9]Jiyun Chun, Chulyun Kim:
Event Detection on Literature by Utilizing Word Embedding. DASFAA (Workshops) 2020: 258-266 - [e1]Yunmook Nah, Chulyun Kim, Seon Ho Kim, Yang-Sae Moon, Steven Euijong Whang:
Database Systems for Advanced Applications. DASFAA 2020 International Workshops - BDMS, SeCoP, BDQM, GDMA, and AIDE, Jeju, South Korea, September 24-27, 2020, Proceedings. Lecture Notes in Computer Science 12115, Springer 2020, ISBN 978-3-030-59412-1 [contents]
2010 – 2019
- 2019
- [c8]Jungeun Park, Chaewon Shin, Chulyun Kim:
PESSN: Precision Enhancement Method for Semantic Segmentation Network. BigComp 2019: 1-4 - 2018
- [j13]Gyoung-Don Joo, Chulyun Kim:
MIDAS: Model-Independent Training Data Selection Under Cost Constraints. IEEE Access 6: 74462-74474 (2018) - 2016
- [c7]Jae-Ho Shin, Gyoung-Don Joo, Chulyun Kim:
XPath based crawling method with crowdsourcing for targeted online market places. BigComp 2016: 395-397 - 2015
- [j12]Won Kim, Jaehyuk Choi, Ok-Ran Jeong, Woo-Jin Han, Chulyun Kim, Woong-Kee Loh, Joon Yoo:
On the Internet of Things. Int. J. Web Grid Serv. 11(4): 410-426 (2015) - [j11]Chulyun Kim, Kyuseok Shim:
Supporting set-valued joins in NoSQL using MapReduce. Inf. Syst. 49: 52-64 (2015) - [j10]Chulyun Kim:
Theoretical analysis of constructing wavelet synopsis on partitioned data sets. Multim. Tools Appl. 74(7): 2417-2432 (2015) - 2014
- [j9]Won Kim, Ok-Ran Jeong, Chulyun Kim:
A Holistic View of Big Data. Int. J. Data Warehous. Min. 10(3): 59-69 (2014) - 2013
- [j8]Jaehyuk Choi, Ok-Ran Jeong, Woojin Han, Chulyun Kim, Won Kim:
On cyberattack mechanisms. Int. J. Web Grid Serv. 9(4): 351-368 (2013) - [j7]Chulyun Kim, Ok-Ran Jeong, Jaehyuk Choi, Won Kim:
E-books on the mobile e-reader. Mob. Inf. Syst. 9(1): 55-68 (2013) - [c6]Chulyun Kim:
Theoretical Analysis of Wavelet Synopsis on Partitioned Data Sets. ICISA 2013: 1-2 - [c5]Taewoo Kim, Suna Kim, Yoonkyung Kim, Chulyun Kim:
Implementation of General Motion Recognition Library for Smart Devices. ICISA 2013: 1-2 - [c4]Jaehyun Lee, Junhyung Ahn, Yoonji Lee, Chulyun Kim:
Implementation of Semantic Directory Service on Image Gallery Application of Mobile Devices. ICISA 2013: 1-2 - 2011
- [j6]Ok-Ran Jeong, Chulyun Kim, Won Kim, Jungmin So:
Botnets: threats and responses. Int. J. Web Inf. Syst. 7(1): 6-17 (2011) - [j5]Won Kim, Ok-Ran Jeong, Chulyun Kim, Jungmin So:
The dark side of the Internet: Attacks, costs and responses. Inf. Syst. 36(3): 675-705 (2011) - [j4]Chulyun Kim, Hui Miao, Kyuseok Shim:
CATCH: A detecting algorithm for coalition attacks of hit inflation in internet advertising. Inf. Syst. 36(8): 1105-1123 (2011) - [j3]Chulyun Kim, Kyuseok Shim:
TEXT: Automatic Template Extraction from Heterogeneous Web Pages. IEEE Trans. Knowl. Data Eng. 23(4): 612-626 (2011) - 2010
- [c3]Won Kim, Ok-Ran Jeong, Chulyun Kim, Jungmin So:
On botnets. iiWAS 2010: 5-10
2000 – 2009
- 2007
- [j2]Chulyun Kim, Sangkyum Kim, Russell Dorer, Dan Xie, Jiawei Han, Sheng Zhong:
TagSmart: analysis and visualization for yeast mutant fitness data measured by tag microarrays. BMC Bioinform. 8 (2007) - [j1]Chulyun Kim, Jong-Hwa Lim, Raymond T. Ng, Kyuseok Shim:
SQUIRE: Sequential pattern mining with quantities. J. Syst. Softw. 80(10): 1726-1745 (2007) - 2004
- [c2]Chulyun Kim, Jong-Hwa Lim, Raymond T. Ng, Kyuseok Shim:
SQUIRE: Sequential Pattern Mining with Quantities. ICDE 2004: 827 - [c1]Sudipto Guha, Chulyun Kim, Kyuseok Shim:
XWAVE: Approximate Extended Wavelets for Streaming Data. VLDB 2004: 288-299
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:41 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint