Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

k-Nearest neighbor query processing method based on distance relation pattern., , , and . CIKM, page 2413-2416. ACM, (2011)PS-MCL: parallel shotgun coarsened Markov clustering of protein interaction networks., , , , and . BMC Bioinform., 20-S (13): 381:1-381:12 (2019)Efficient Finding Relationship between Individuals in a Mass Ontology Database., , , , , and . FGIT-UNESST, volume 264 of Communications in Computer and Information Science, page 281-286. Springer, (2011)An efficient data-centric storage scheme considering storage and query hot-spots in sensor networks., , , , and . CIKM, page 1325-1328. ACM, (2010)Multi-faceted Navigation of Legal Documents., , , , , , and . iThings/CPSCom, page 537-540. IEEE Computer Society, (2011)Towards Discovering Emerging Technologies Based on Decision Tree., , , , , and . iThings/CPSCom, page 529-532. IEEE Computer Society, (2011)Decision-Making Support Service Based on Technology Opportunity Discovery Model., , , , , , , , , and . FGIT-UNESST, volume 264 of Communications in Computer and Information Science, page 263-268. Springer, (2011)Branch-and-Bound Search and Machine Learning-Based Transmit Antenna Selection in MIMOME Channels., and . IEEE Access, (2022)Development of Korean spine database and ontology for realizing e-Spine., , , , and . Clust. Comput., 17 (3): 1069-1080 (2014)Methods of state estimation resilient against sensor attacks and robust against exogenous disturbances., , and . CCTA, page 1300-1305. IEEE, (2017)