default search action
Sehun Kim
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i1]Jinyi Mi, Sehun Kim, Tomoki Toda:
Improved Architecture for High-resolution Piano Transcription to Efficiently Capture Acoustic Characteristics of Music Signals. CoRR abs/2409.19614 (2024) - 2023
- [c16]Sehun Kim, Kazuya Takeda, Tomoki Toda:
Sequence-to-Sequence Network Training Methods for Automatic Guitar Transcription With Tokenized Outputs. ISMIR 2023: 524-531 - 2022
- [j48]Sehun Kim, Jeha Ryu:
Robust interaction control for environments having uncertainties. Robotics Auton. Syst. 151: 104023 (2022) - [c15]Sehun Kim, Tomoki Hayashi, Tomoki Toda:
Note-level Automatic Guitar Transcription Using Attention Mechanism. EUSIPCO 2022: 229-233
2010 – 2019
- 2019
- [j47]Sehun Kim, Wenjun Xu, Hongliang Ren:
Inverse Kinematics with a Geometrical Approximation for Multi-Segment Flexible Curvilinear Robots. Robotics 8(2): 48 (2019) - 2018
- [c14]Wontae Kim, Sehun Kim, Jin-Sung Kim, Hyuk-Jae Lee:
A New Update Strategy for Blocks with Low Correlation in 3-D Recursive Search. VCIP 2018: 1-4 - 2016
- [j46]Eunhye Kim, Roger P. Karrer, Ju-Won Park, Sehun Kim:
A novel fairness-aware parallel download scheme. Peer-to-Peer Netw. Appl. 9(1): 42-53 (2016) - [c13]Sehun Kim, Wenjun Xu, Xiaoyi Gu, Hongliang Ren:
Preliminary design and study of a bio-inspired wire-driven serpentine robotic manipulator with direct drive capability. ICIA 2016: 1409-1413 - 2015
- [c12]Quoc Van Tran, Sehun Kim, Kyunghwan Lee, Sungchul Kang, Jeha Ryu:
Force/torque sensorless impedance control for indirect driven robot-aided gait rehabilitation system. AIM 2015: 652-657 - [c11]Quoc Van Tran, Sehun Kim, Kyunghwan Lee, Jeha Ryu:
Preliminary results of force/torque sensorless impedance control for Walkbot. URAI 2015: 597-602 - 2014
- [j45]Gisung Kim, Seungmin Lee, Sehun Kim:
A novel hybrid intrusion detection method integrating anomaly detection with misuse detection. Expert Syst. Appl. 41(4): 1690-1700 (2014) - 2013
- [j44]Seong-jun Shin, Seungmin Lee, Hyunwoo Kim, Sehun Kim:
Advanced probabilistic approach for network intrusion forecasting and detection. Expert Syst. Appl. 40(1): 315-322 (2013) - [j43]Dong-uk Kim, Hyo-Won Kim, Gisung Kim, Sehun Kim:
A Counterattack-Detection Scheme in Transmission Time-Based Wormhole Detection Methods. Int. J. Distributed Sens. Networks 9 (2013) - [c10]Eunhye Kim, Sehun Kim:
A Novel Anomaly Detection System Based on HFR-MLR Method. MUSIC 2013: 279-286 - 2012
- [j42]Jaeun Choi, Gisung Kim, Sehun Kim:
A Congestion-Aware IDS Node Selection Method for Wireless Sensor Networks. Int. J. Distributed Sens. Networks 8 (2012) - [c9]Jaeun Choi, Gisung Kim, Tae Ghyoon Kim, Sehun Kim:
An Efficient Filtering Method for Detecting Malicous Web Pages. WISA 2012: 241-253 - 2011
- [j41]Seungmin Lee, Gisung Kim, Sehun Kim:
Self-adaptive and dynamic clustering for online anomaly detection. Expert Syst. Appl. 38(12): 14891-14898 (2011) - 2010
- [j40]Woochul Shim, Gisung Kim, Sehun Kim:
A distributed sinkhole detection method using cluster analysis. Expert Syst. Appl. 37(12): 8486-8491 (2010) - [j39]Eunhye Kim, Seungmin Lee, Ki Hoon Kwon, Sehun Kim:
Feature Construction Scheme for Efficient Intrusion Detection System. J. Inf. Sci. Eng. 26(2): 527-547 (2010) - [j38]Woochul Shim, Younggoo Han, Sehun Kim:
Fairness-Aware Resource Allocation in a Cooperative OFDMA Uplink System. IEEE Trans. Veh. Technol. 59(2): 932-939 (2010)
2000 – 2009
- 2009
- [j37]Jaehong Kim, Sangjae Lee, Sehun Kim:
An Adjustable Scheduling Algorithm for Multi-User MIMO Systems. IEICE Trans. Commun. 92-B(2): 527-532 (2009) - [j36]Jongin Kim, Dongwoo Kim, Sehun Kim:
The Capacity of Downlink Multiuser OFDM with Quality Based CSI Feedback. IEICE Trans. Commun. 92-B(4): 1252-1257 (2009) - [j35]Younggoo Han, Woochul Shim, Sehun Kim:
A Goal Programming Approach for Resource Allocation Considering Client Demands in a Multiuser OFDMA Downlink System. IEICE Trans. Commun. 92-B(4): 1376-1379 (2009) - [j34]Seungmin Lee, Tae-Jun Park, Donghyeok Lee, Taekyong Nam, Sehun Kim:
Chaotic Order Preserving Encryption for Efficient and Secure Queries on Databases. IEICE Trans. Inf. Syst. 92-D(11): 2207-2217 (2009) - [j33]Seungmin Lee, Woochul Shim, Sehun Kim:
Hierarchical system for objectionable video detection. IEEE Trans. Consumer Electron. 55(2): 677-684 (2009) - [c8]Jaeun Choi, Myungjong Lee, Gisung Kim, Sehun Kim:
Monitoring Node Selection Algorithm for Intrusion Detection in Congested Sensor Network. SECRYPT 2009: 117-120 - 2008
- [j32]Keunsoo Lee, Juhyun Kim, Ki Hoon Kwon, Younggoo Han, Sehun Kim:
DDoS attack detection method using cluster analysis. Expert Syst. Appl. 34(3): 1659-1665 (2008) - [j31]Sehun Kim, Seong-jun Shin, Hyunwoo Kim, Ki Hoon Kwon, Younggoo Han:
Hybrid Intrusion Forecasting Framework for Early Warning System. IEICE Trans. Inf. Syst. 91-D(5): 1234-1241 (2008) - [e1]Sehun Kim, Moti Yung, Hyung-Woo Lee:
Information Security Applications, 8th International Workshop, WISA 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers. Lecture Notes in Computer Science 4867, Springer 2008, ISBN 978-3-540-77534-8 [contents] - 2007
- [j30]Ki Hoon Kwon, Younggoo Han, Sehun Kim:
Efficient Subcarrier and Power Allocation Algorithm in OFDMA Uplink System. IEICE Trans. Commun. 90-B(2): 368-371 (2007) - [j29]Hyunwoo Kim, Younggoo Han, Myeonggil Choi, Sehun Kim:
Curriculum Design and Evaluation for E-Commerce Security Education Using AHP. IEICE Trans. Inf. Syst. 90-D(3): 668-675 (2007) - [j28]Chan-Ho Min, Sehun Kim:
On-demand utility-based power control routing for energy-aware optimization in mobile ad hoc networks. J. Netw. Comput. Appl. 30(2): 706-727 (2007) - [j27]Chan-Ho Min, Sehun Kim:
On-Demand Utility-Based Power Control Routing for Energy-Aware Optimization in Mobile Ad Hoc Networks. Wirel. Pers. Commun. 41(2): 259-280 (2007) - 2006
- [j26]Insook Kim, Dongwoo Kim, Sehun Kim:
Maximization of Carried Traffic by Prioritizing New Call Attempts in a CDMA Base Station with Finite Receiver Processors. IEICE Trans. Commun. 89-B(6): 1879-1882 (2006) - [j25]Seok Bong Jeong, Hyunwoo Kim, Sehun Kim:
An Effective DDoS Attack Detection and Packet-Filtering Scheme. IEICE Trans. Commun. 89-B(7): 2033-2042 (2006) - [j24]Young-Woo Choi, Seong-Lyun Kim, Sehun Kim:
On the Multihop Packet Scheduling in Uplink DS-CDMA Systems. IEICE Trans. Commun. 89-B(8): 2249-2253 (2006) - [c7]Yeongmi Kim, Sehun Kim, Taejin Ha, Ian Oakley, Woontack Woo, Jeha Ryu:
Air-Jet Button Effects in AR. ICAT 2006: 384-391 - [c6]Eunhye Kim, Sehun Kim:
Anomaly Detection in Network Security Based on Nonparametric Techniques. INFOCOM 2006 - [c5]Youngok Jeong, Younggoo Han, Hyunwoo Kim, Woochul Shim, Jaehong Kim, Sehun Kim:
Cost-Effective IDS Operating Scheme in MANETs. WISA 2006: 198-210 - 2005
- [j23]Seok Bong Jeong, Sehun Kim, Heesoo Lee:
Data traffic scheduling algorithm for multiuser OFDM system with adaptive modulation considering fairness among users. Comput. Oper. Res. 32: 1723-1737 (2005) - [j22]Hyunwoo Kim, Younggoo Han, Sehun Kim, Myeonggil Choi:
A Curriculum Design for E-Commerce Security. J. Inf. Syst. Educ. 16(1): 55-64 (2005) - [j21]Euntaek Lim, Sehun Kim:
Transmission rate scheduling with fairness constraints in downlink of CDMA data networks. IEEE Trans. Veh. Technol. 54(1): 328-337 (2005) - [c4]Myeonggil Choi, Hyunwoo Kim, Eunhye Kim, Sehun Kim:
Decision on Replacing Components of Security Functions in COTS-Based Information Systems. ICCBSS 2005: 11 - 2004
- [j20]Dongwoo Kim, Chan-Ho Min, Sehun Kim:
On-demand SIR and bandwidth-guaranteed routing with transmit power assignment in ad hoc mobile networks. IEEE Trans. Veh. Technol. 53(4): 1215-1223 (2004) - [c3]Seok Bong Jeong, Young-Woo Choi, Sehun Kim:
An Effective Placement of Detection Systems for Distributed Attack Detection in Large Scale Networks. WISA 2004: 204-210 - 2003
- [j19]Koo-Min Ahn, Sehun Kim:
Optimal bandwidth allocation for bandwidth adaptation in wireless multimedia networks. Comput. Oper. Res. 30(13): 1917-1929 (2003) - [j18]Tae-Suk Kim, Sehun Kim:
A fast rerouting scheme using reservation in wireless ATM. IEEE Trans. Veh. Technol. 52(4): 1125-1142 (2003) - 2002
- [j17]Ki-Dong Lee, Sehun Kim:
Modeling variable user mobility with stochastic correlation concept. Comput. Networks 38(5): 603-612 (2002) - [j16]Ki-Dong Lee, Sehun Kim:
Optimization for adaptive bandwidth reservation in wireless multimedia networks. Comput. Networks 38(5): 631-643 (2002) - [j15]Jaehyun Yeo, Heesoo Lee, Sehun Kim:
An efficient broadcast scheduling algorithm for TDMA ad-hoc networks. Comput. Oper. Res. 29(13): 1793-1806 (2002) - [j14]Sehun Kim, Myeonggil Choi:
Educational Requirements Analysis for Information Security Professionals in Korea. J. Inf. Syst. Educ. 13(3): 237-248 (2002) - 2001
- [j13]Hong Suk Choi, Heesoo Lee, Ki-Dong Lee, Sehun Kim, Jong Hyup Lee:
Optimal locations of switches and interconnections for ATM LANs. Comput. Oper. Res. 28(13): 1347-1366 (2001) - [c2]Jongin Kim, Dong-hoi Kim, Pyeong-jung Song, Sehun Kim:
Design of optimum parameters for handover initiation in WCDMA. VTC Fall 2001: 2768-2772 - 2000
- [j12]Sehun Kim, Jae-In Kim:
An adaptive time slot assignment algorithm for variable bandwidth switching systems. Comput. Oper. Res. 27(5): 423-435 (2000) - [j11]Young Joo Lee, Jae Yeol Maeng, Eok-Kyun Lee, Bongsoo Kim, Sehun Kim, Kyu-Kwang Han:
Melting behaviors of icosahedral metal clusters studied by Monte Carlo simulations. J. Comput. Chem. 21(5): 380-387 (2000) - [j10]Soo-Hyun Kim, Kun-Nyeong Chang, Sehun Kim:
A channel allocation for cellular mobile radio systems using simulated annealing. Telecommun. Syst. 14(1-4): 95-106 (2000)
1990 – 1999
- 1998
- [j9]Sehun Kim, Jaehyun Yeo:
Optimal scheduling in cdma packet radio networks. Comput. Oper. Res. 25(3): 219-228 (1998) - 1997
- [j8]Kun-Nyeong Chang, Sehun Kim:
Channel allocation in cellular radio networks. Comput. Oper. Res. 24(9): 849-860 (1997) - [j7]Soo-Hyun Kim, Sehun Kim:
Time slot assignment in a heterogeneous environment of a SS/TDMA system. Int. J. Satell. Commun. Netw. 15(5): 197-203 (1997) - 1996
- [c1]Kun-Nyeong Chang, Sehun Kim:
Call blocking performance of new dynamic channel assignment scheme in microcellular radio networks. PIMRC 1996: 198-202 - 1995
- [j6]Sehun Kim, Kun-Nyeong Chang, Jun-Yeon Lee:
A descent method with linear programming subproblems for nondifferentiable convex optimization. Math. Program. 71: 17-28 (1995) - 1993
- [j5]Sehun Kim, Bong-sik Um:
An improved subgradient method for constrained nondifferentiable optimization. Oper. Res. Lett. 14(1): 61-64 (1993) - 1991
- [j4]Sehun Kim, Hyunsil Ahn, Seong-Cheol Cho:
Variable target value subgradient method. Math. Program. 49: 359-369 (1991) - [j3]Sehun Kim, Hyunsil Ahn:
Convergence of a generalized subgradient method for nondifferentiable convex optimization. Math. Program. 50: 75-80 (1991)
1980 – 1989
- 1986
- [j2]Sehun Kim:
Computation of a large-scale competitive equilibrium through optimization. Comput. Oper. Res. 13(4): 507-515 (1986) - 1984
- [j1]Sehun Kim:
Economic planning with institutional price constraints for a decentralized economy. Math. Program. 29(1): 100-112 (1984)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-18 19:31 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint