default search action
Hyoung Joong Kim
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c46]Hyoung Joong Kim, Gyu M. Lee, Jongwon Lee, Sora Kang, Seong Wook Chae, Jun-Seok Park:
A Comparison of Impermant Loss for Various CFMMs. Blockchain 2024: 542-548 - 2022
- [j63]Beomjoong Kim, Hyoung Joong Kim, Junghee Lee:
First Smart Contract Allowing Cryptoasset Recovery. KSII Trans. Internet Inf. Syst. 16(3): 861-876 (2022) - 2021
- [j62]Ebroul Izquierdo, Krishna Chandramouli, Anthony T. S. Ho, Hyoung Joong Kim:
Large-scale multimedia signal processing for security and digital forensics [SI 1163]. Multim. Tools Appl. 80(15): 23313-23317 (2021) - [e18]Xianfeng Zhao, Yun-Qing Shi, Alessandro Piva, Hyoung Joong Kim:
Digital Forensics and Watermarking - 19th International Workshop, IWDW 2020, Melbourne, VIC, Australia, November 25-27, 2020, Revised Selected Papers. Lecture Notes in Computer Science 12617, Springer 2021, ISBN 978-3-030-69448-7 [contents] - 2020
- [j61]Keming Dong, Hyoung Joong Kim, Xiaohan Yu, Xiaoqing Feng:
Reversible data hiding for binary images based on adaptive overlapping pattern. EURASIP J. Inf. Secur. 2020: 11 (2020) - [e17]Hongxia Wang, Xianfeng Zhao, Yunqing Shi, Hyoung Joong Kim, Alessandro Piva:
Digital Forensics and Watermarking - 18th International Workshop, IWDW 2019, Chengdu, China, November 2-4, 2019, Revised Selected Papers. Lecture Notes in Computer Science 12022, Springer 2020, ISBN 978-3-030-43574-5 [contents]
2010 – 2019
- 2019
- [j60]Suah Kim, Fangjun Huang, Hyoung Joong Kim:
Reversible Data Hiding in JPEG Images Using Quantized DC. Entropy 21(9): 835 (2019) - [j59]Suah Kim, Rolf Lussi, Xiaochao Qu, Fangjun Huang, Hyoung Joong Kim:
Reversible Data Hiding With Automatic Brightness Preserving Contrast Enhancement. IEEE Trans. Circuits Syst. Video Technol. 29(8): 2271-2284 (2019) - [j58]Suah Kim, Xiaochao Qu, Vasily Sachnev, Hyoung Joong Kim:
Skewed Histogram Shifting for Reversible Data Hiding Using a Pair of Extreme Predictions. IEEE Trans. Circuits Syst. Video Technol. 29(11): 3236-3246 (2019) - [c45]Suah Kim, Hyoung Joong Kim:
JPEG Encryption with File Format Preservation and File Size Reduction. GCCE 2019: 215-216 - [c44]Xing Lu, Fangjun Huang, Hyoung Joong Kim:
Reversible Data Hiding in JPEG Images Based on Multiple Histograms Modification. ICAIS (3) 2019: 442-454 - [e16]Chang D. Yoo, Yun Qing Shi, Hyoung-Joong Kim, Alessandro Piva, Gwangsu Kim:
Digital Forensics and Watermarking - 17th International Workshop, IWDW 2018, Jeju Island, Korea, October 22-24, 2018, Proceedings. Lecture Notes in Computer Science 11378, Springer 2019, ISBN 978-3-030-11388-9 [contents] - [i3]Suah Kim, Vasily Sachnev, Hyoung Joong Kim:
Solving the large syndrome calculation problem in steganography. CoRR abs/1904.05625 (2019) - 2018
- [c43]Suah Kim, Beomjoong Kim, Hyoung Joong Kim:
Intrusion Detection and Mitigation System Using Blockchain Analysis for Bitcoin Exchange. CCIOT 2018: 40-44 - 2017
- [j57]Fisseha Teju Wedaj, Suah Kim, Hyoung Joong Kim, Fangjun Huang:
Improved reversible data hiding in JPEG images based on new coefficient selection strategy. EURASIP J. Image Video Process. 2017: 63 (2017) - [c42]Tekachew Gobena Ejeta, Hyoung Joong Kim:
Website Fingerprinting Attack on Psiphon and Its Forensic Analysis. IWDW 2017: 42-51 - [e15]Yun-Qing Shi, Hyoung-Joong Kim, Fernando Pérez-González, Feng Liu:
Digital Forensics and Watermarking - 15th International Workshop, IWDW 2016, Beijing, China, September 17-19, 2016, Revised Selected Papers. Lecture Notes in Computer Science 10082, 2017, ISBN 978-3-319-53464-0 [contents] - [e14]Christian Kraetzer, Yun-Qing Shi, Jana Dittmann, Hyoung Joong Kim:
Digital Forensics and Watermarking - 16th International Workshop, IWDW 2017, Magdeburg, Germany, August 23-25, 2017, Proceedings. Lecture Notes in Computer Science 10431, Springer 2017, ISBN 978-3-319-64184-3 [contents] - 2016
- [j56]Hee Joon Hwang, Sunghwan Kim, Hyoung Joong Kim:
Reversible data hiding using least square predictor via the LASSO. EURASIP J. Image Video Process. 2016: 42 (2016) - [j55]Jae Hyeon Woo, Hyoung Joong Kim:
Improving JPEG-LS Performance Using Location Information. KSII Trans. Internet Inf. Syst. 10(11): 5547-5562 (2016) - [j54]Kibin Lee, Joshua I. James, Tekachew Gobena Ejeta, Hyoung Joong Kim:
Electronic Voting Service Using Block-Chain. J. Digit. Forensics Secur. Law 11(2): 123-136 (2016) - [j53]Fangjun Huang, Hyoung Joong Kim:
Framework for improving the security performance of ordinary distortion functions of JPEG steganography. Multim. Tools Appl. 75(1): 281-296 (2016) - [j52]Ayalneh Dessalegn Atnafu, Yongsoo Choi, Hyoung Joong Kim:
Early width estimation of fragmented JPEG with corrupted header. Multim. Tools Appl. 75(22): 14669-14684 (2016) - [j51]Fangjun Huang, Xiaochao Qu, Hyoung Joong Kim, Jiwu Huang:
Reversible Data Hiding in JPEG Images. IEEE Trans. Circuits Syst. Video Technol. 26(9): 1610-1621 (2016) - [j50]Yiyu Chen, Ayalneh Dessalegn Atnafu, Isabella Schlattner, Wendimagegn Tariku Weldtsadik, Myung-Cheol Roh, Hyoung Joong Kim, Seong-Whan Lee, Benjamin Blankertz, Siamac Fazli:
A High-Security EEG-Based Login System with RSVP Stimuli and Dry Electrodes. IEEE Trans. Inf. Forensics Secur. 11(12): 2635-2647 (2016) - [e13]Yun-Qing Shi, Hyoung-Joong Kim, Fernando Pérez-González, Isao Echizen:
Digital-Forensics and Watermarking - 14th International Workshop, IWDW 2015, Tokyo, Japan, October 7-10, 2015, Revised Selected Papers. Lecture Notes in Computer Science 9569, Springer 2016, ISBN 978-3-319-31959-9 [contents] - 2015
- [j49]Vasiliy Sachnev, Savitha Ramasamy, Suresh Sundaram, Hyoung Joong Kim, Hee Joon Hwang:
A Cognitive Ensemble of Extreme Learning Machines for Steganalysis Based on Risk-Sensitive Hinge Loss Function. Cogn. Comput. 7(1): 103-110 (2015) - [j48]Fangjun Huang, Xiaochao Qu, Hyoung Joong Kim, Jiwu Huang:
Local pixel patterns. Comput. Vis. Media 1(2): 157-170 (2015) - [j47]Xiaochao Qu, Suah Kim, Run Cui, Hyoung Joong Kim:
Linear collaborative discriminant regression classification for face recognition. J. Vis. Commun. Image Represent. 31: 312-319 (2015) - [j46]Xiaochao Qu, Hyoung Joong Kim:
Pixel-based pixel value ordering predictor for high-fidelity reversible data hiding. Signal Process. 111: 249-260 (2015) - [j45]Suresh Sundaram, Hao Huang, Hyoung Joong Kim:
Scheduling in compute cloud with multiple data banks using divisible load paradigm. IEEE Trans. Aerosp. Electron. Syst. 51(2): 1288-1297 (2015) - [c41]Xiaochao Qu, Suah Kim, Dessalegn Atnafu, Hyoung Joong Kim:
Weighted sparse representation using a learned distance metric for face recognition. ICIP 2015: 4594-4598 - [c40]Jonathan Lepsoy, Suah Kim, Dessalegn Atnafu, Hyoung Joong Kim:
Metadata protection scheme for JPEG privacy & security using hierarchical and group-based models. ICTA 2015: 1-5 - [c39]Suah Kim, Rolf Lussi, Xiaochao Qu, Hyoung Joong Kim:
Automatic contrast enhancement using reversible data hiding. WIFS 2015: 1-5 - [e12]Yun-Qing Shi, Hyoung-Joong Kim, Fernando Pérez-González, Ching-Nung Yang:
Digital-Forensics and Watermarking - 13th International Workshop, IWDW 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papers. Lecture Notes in Computer Science 9023, Springer 2015, ISBN 978-3-319-19320-5 [contents] - [i2]Xiaochao Qu, Suah Kim, Run Cui, Hyoung Joong Kim:
Collaborative Representation Classification Ensemble for Face Recognition. CoRR abs/1507.08064 (2015) - [i1]Xiaochao Qu, Suah Kim, Run Cui, Hyoung Joong Kim:
Low Bit-Rate and High Fidelity Reversible Data Hiding. CoRR abs/1507.08075 (2015) - 2014
- [j44]Suresh Sundaram, Hao Huang, Hyoung Joong Kim:
Hybrid real-coded genetic algorithm for data partitioning in multi-round load distribution and scheduling in heterogeneous systems. Appl. Soft Comput. 24: 500-510 (2014) - [j43]Ramaswamy Savitha, Suresh Sundaram, Hyoung Joong Kim:
A Meta-Cognitive Learning Algorithm for an Extreme Learning Machine Classifier. Cogn. Comput. 6(2): 253-263 (2014) - [j42]Jung Yeon Hwang, Hyoung Joong Kim, Dong Hoon Lee, Boyeon Song:
An enhanced (t, n) threshold directed signature scheme. Inf. Sci. 275: 284-292 (2014) - [c38]Xiaochao Qu, Hyoung Joong Kim:
Enhanced discriminant linear regression classification for face recognition. ISSNIP 2014: 1-5 - [c37]Vasiliy Sachnev, Hyoung Joong Kim:
Parkinson Disease Classification based on binary coded genetic algorithm and Extreme learning machine. ISSNIP 2014: 1-6 - [c36]Vasiliy Sachnev, Hyoung Joong Kim:
Binary Coded Genetic Algorithm with Ensemble Classifier for feature selection in JPEG steganalysis. ISSNIP 2014: 1-6 - [c35]Xiaochao Qu, Suah Kim, Run Cui, Fangjun Huang, Hyoung Joong Kim:
Reversible Data Hiding Based on Combined Predictor and Prediction Error Expansion. IWDW 2014: 254-265 - [e11]Yun-Qing Shi, Hyoung-Joong Kim, Fernando Pérez-González:
Digital-Forensics and Watermarking - 12th International Workshop, IWDW 2013, Auckland, New Zealand, October 1-4, 2013. Revised Selected Papers. Lecture Notes in Computer Science 8389, Springer 2014, ISBN 978-3-662-43885-5 [contents] - 2013
- [c34]Sang-ug Kang, Xiaochao Qu, Hyoung Joong Kim:
Compressing JPEG compressed image using reversible data hiding technique. APSIPA 2013: 1-7 - [e10]Yun Q. Shi, Hyoung-Joong Kim, Fernando Pérez-González:
Digital Forensics and Watermaking - 11th International Workshop, IWDW 2012, Shanghai, China, October 31 - November 3, 2012, Revised Selected Papers. Lecture Notes in Computer Science 7809, Springer 2013, ISBN 978-3-642-40098-8 [contents] - 2012
- [j41]Vasiliy Sachnev, Hyoung Joong Kim:
Modified BCH data hiding scheme for JPEG steganography. EURASIP J. Adv. Signal Process. 2012: 89 (2012) - [j40]Ramaswamy Savitha, Suresh Sundaram, Narasimhan Sundararajan, Hyoung Joong Kim:
A fully complex-valued radial basis function classifier for real-valued classification problems. Neurocomputing 78(1): 104-110 (2012) - [j39]Ki-sung Hong, Sang Soo Yeo, Hyoung Joong Kim, Ek Peng Chew, Chulung Lee:
Integrated inventory and transportation decision for ubiquitous supply chain management. J. Intell. Manuf. 23(4): 977-988 (2012) - [j38]Hyoung Joong Kim, Soomin Lim, Jongsub Moon, Boram Kim, Eui S. Jung:
A photographic forensic case study: Myths, principles and techniques. Math. Comput. Model. 55(1-2): 3-11 (2012) - [j37]Suresh Sundaram, Cui Run, Hyoung Joong Kim, Thomas G. Robertazzi, Young-Il Kim:
Scheduling Second-Order Computational Load in Master-Slave Paradigm. IEEE Trans. Aerosp. Electron. Syst. 48(1): 780-793 (2012) - [j36]Rongyue Zhang, Vasiliy Sachnev, Magnus Bakke Botnan, Hyoung Joong Kim, Jun Heo:
An Efficient Embedder for BCH Coding for Steganography. IEEE Trans. Inf. Theory 58(12): 7272-7279 (2012) - [j35]Suresh Sundaram, Hyoung Joong Kim, Cui Run, Thomas G. Robertazzi:
Scheduling nonlinear divisible loads in a single level tree network. J. Supercomput. 61(3): 1068-1088 (2012) - [c33]G. Sateesh Babu, Suresh Sundaram, K. Uma Sangumathi, Hyoung Joong Kim:
A Projection Based Learning Meta-cognitive RBF Network Classifier for Effective Diagnosis of Parkinson's Disease. ISNN (2) 2012: 611-620 - [c32]Vasiliy Sachnev, Hyoung Joong Kim:
An Attempt to Generalize Distortion Measure for JPEG Steganography. IWDW 2012: 69-82 - [c31]Elena Tsomko, Hyoung Joong Kim:
Recognizing numbers from the low-resolution patterns in digital images. WIAMIS 2012: 1-4 - [e9]Yun-Qing Shi, Hyoung-Joong Kim, Fernando Pérez-González:
Digital Forensics and Watermarking - 10th International Workshop, IWDW 2011, Atlantic City, NJ, USA, October 23-26, 2011, Revised Selected Papers. Lecture Notes in Computer Science 7128, Springer 2012, ISBN 978-3-642-32204-4 [contents] - 2011
- [j34]Suresh Sundaram, François Brémond, Monique Thonnat, Hyoung Joong Kim:
Online learning neural tracker. Neurocomputing 74(10): 1681-1695 (2011) - [j33]Shijun Xiang, Hyoung-Joong Kim:
Histogram-Based Image Hashing for Searching Content-Preserving Copies. Trans. Data Hiding Multim. Secur. 6: 83-108 (2011) - [c30]Ramaswamy Savitha, Suresh Sundaram, N. Sundararajan, Hyoung Joong Kim:
Fast Learning Fully Complex-Valued Classifiers for Real-Valued Classification Problems. ISNN (1) 2011: 602-609 - [c29]Vasiliy Sachnev, Hyoung Joong Kim:
An Improved Matrix Encoding Scheme for JPEG Steganography. IWDW 2011: 3-15 - [e8]Hyoung-Joong Kim, Yun-Qing Shi, Mauro Barni:
Digital Watermarking - 9th International Workshop, IWDW 2010, Seoul, Korea, October 1-3, 2010, Revised Selected Papers. Lecture Notes in Computer Science 6526, Springer 2011, ISBN 978-3-642-18404-8 [contents] - 2010
- [j32]Hyoung Joong Kim, Cheonshik Kim, YongSoo Choi, Shuozhong Wang, X. Zhang:
Improved modification direction methods. Comput. Math. Appl. 60(2): 319-325 (2010) - [j31]Vasiliy Sachnev, Hyoung Joong Kim, Suresh Sundaram, Yun-Qing Shi:
Reversible Watermarking Algorithm with Distortion Compensation. EURASIP J. Adv. Signal Process. 2010 (2010) - [j30]Chulung Lee, Hyoung Joong Kim, Jong Hyuk Park, Sang-Soo Yeo, Jaesoo Yang:
A Pervasive Secret Sharing Scheme For Embedded Visual Communication System. Intell. Autom. Soft Comput. 16(3): 433-447 (2010) - [j29]Suresh Sundaram, Keming Dong, Hyoung Joong Kim:
A sequential learning algorithm for self-adaptive resource allocation network classifier. Neurocomputing 73(16-18): 3012-3019 (2010) - [j28]Huan Xu, Jianjun Wang, Hyoung-Joong Kim:
Near-optimal solution to pair-wise LSB matching via an immune programming strategy. Inf. Sci. 180(8): 1201-1217 (2010) - [j27]Hee Joon Hwang, Hyoung-Joong Kim, Vasiliy Sachnev, Sang-Hyun Joo:
Reversible Watermarking Method Using Optimal Histogram Pair Shifting Based on Prediction and Sorting. KSII Trans. Internet Inf. Syst. 4(4): 655-670 (2010) - [j26]Ebroul Izquierdo, Anthony T. S. Ho, Hyoung Joong Kim, Qianni Zhang:
Guest Editorial. J. Multim. 5(2): 93-94 (2010) - [j25]Hyoung Joong Kim, Yoonsik Tak, Eenjun Hwang:
Shape-based indexing scheme for camera view invariant 3-D object retrieval. Multim. Tools Appl. 47(1): 7-29 (2010) - [j24]Jianjun Wang, Yiting Sun, Huan Xu, Kangkang Chen, Hyoung-Joong Kim, Sang-Hyun Joo:
An improved section-wise exploiting modification direction method. Signal Process. 90(11): 2954-2964 (2010) - [c28]Hyoung Joong Kim:
A Fast Implementation of Arithmetic Coding. APWeb 2010: 419-423 - [c27]Keming Dong, Hyoung-Joong Kim:
An Efficient Pattern Substitution Watermarking Method for Binary Images. IWDW 2010: 181-188 - [c26]Vasiliy Sachnev, Hyoung-Joong Kim:
Ternary Data Hiding Technique for JPEG Steganography. IWDW 2010: 202-210 - [c25]Hyoung Joong Kim, Soomin Lim, Boram Kim, Eui S. Jung:
A new approach to photography forensics using 3d analysis for correcting perception errors: a case study. SMVC@MM 2010: 27-30
2000 – 2009
- 2009
- [j23]Suresh Sundaram, R. Venkatesh Babu, Hyoung Joong Kim:
No-reference image quality assessment using modified extreme learning machine classifier. Appl. Soft Comput. 9(2): 541-552 (2009) - [j22]Jong Hyuk Park, Hyoung Joong Kim, Chulung Lee:
Ubiquitous software controller to prevent deadlocks for automated guided vehicle systems in a container port terminal environment. J. Intell. Manuf. 20(3): 321-325 (2009) - [j21]Suresh Sundaram, V. Mani, S. N. Omkar, Hyoung Joong Kim, Narasimhan Sundararajan:
A new load distribution strategy for linear network with communication delays. Math. Comput. Simul. 79(5): 1488-1501 (2009) - [j20]Vasiliy Sachnev, Hyoung-Joong Kim, Jeho Nam, Suresh Sundaram, Yun-Qing Shi:
Reversible Watermarking Algorithm Using Sorting and Prediction. IEEE Trans. Circuits Syst. Video Technol. 19(7): 989-999 (2009) - [j19]Sanghyun Ahn, Zachary D. Patitz, Noh-Jin Park, Hyoung Joong Kim, Nohpill Park:
A Floorprint-Based Defect Tolerance for Nano-Scale Application-Specific IC. IEEE Trans. Instrum. Meas. 58(5): 1283-1290 (2009) - [c24]Yongsoo Choi, Hyoung Joong Kim:
Improving the Modified Matrix Encoding on Steganography Method. IAS 2009: 205-208 - [c23]Hyoung Joong Kim:
A new lossless data compression method. ICME 2009: 1740-1743 - [c22]Elena Tsomko, Hyoung Joong Kim, Ebroul Izquierdo, Valia Guerra-Ones:
A spectral technique for image clustering. ICUMT 2009: 1-5 - [c21]Rongyue Zhang, Vasiliy Sachnev, Hyoung-Joong Kim:
Fast BCH Syndrome Coding for Steganography. Information Hiding 2009: 48-58 - [c20]Vasiliy Sachnev, Hyoung Joong Kim, Rongyue Zhang:
Less detectable JPEG steganography method based on heuristic optimization and BCH syndrome coding. MM&Sec 2009: 131-140 - [e7]Hyoung-Joong Kim, Stefan Katzenbeisser, Anthony Tung Shuen Ho:
Digital Watermarking, 7th International Workshop, IWDW 2008, Busan, Korea, November 10-12, 2008. Selected Papers. Lecture Notes in Computer Science 5450, Springer 2009, ISBN 978-3-642-04437-3 [contents] - 2008
- [j18]Shijun Xiang, Hyoung-Joong Kim, Jiwu Huang:
Audio watermarking robust against time-scale modification and MP3 compression. Signal Process. 88(10): 2372-2387 (2008) - [j17]Shijun Xiang, Hyoung-Joong Kim, Jiwu Huang:
Invariant Image Watermarking Based on Statistical Features in the Low-Frequency Domain. IEEE Trans. Circuits Syst. Video Technol. 18(6): 777-790 (2008) - [j16]Hyoung-Joong Kim, Vasiliy Sachnev, Yun-Qing Shi, Jeho Nam, Hyon-Gon Choo:
A Novel Difference Expansion Transform for Reversible Data Embedding. IEEE Trans. Inf. Forensics Secur. 3(3): 456-465 (2008) - [c19]Jiangqun Ni, Rongyue Zhang, Chen Fang, Jiwu Huang, Chuntao Wang, Hyoung-Joong Kim:
Watermarking Security Incorporating Natural Scene Statistics. Information Hiding 2008: 132-146 - [c18]Vasiliy Sachnev, Hyoung-Joong Kim, Rongyue Zhang, Yongsoo Choi:
A Novel Approach for JPEG Steganography. IWDW 2008: 209-217 - [c17]Hyoung-Joong Kim, Md. Amiruzzaman:
An Improved Steganographic Method. SIGMAP 2008: 145-150 - [c16]Elena Tsomko, Hyoung Joong Kim:
Efficient Method of Detecting Globally Blurry or Sharp Images. WIAMIS 2008: 171-174 - [e6]Yun Q. Shi, Hyoung-Joong Kim, Stefan Katzenbeisser:
Digital Watermarking, 6th International Workshop, IWDW 2007, Guangzhou, China, December 3-5, 2007, Proceedings. Lecture Notes in Computer Science 5041, Springer 2008, ISBN 978-3-540-92237-7 [contents] - 2007
- [j15]Ebroul Izquierdo, Hyoung Joong Kim, Thomas Sikora:
Knowledge-Assisted Media Analysis for Interactive Multimedia Applications. EURASIP J. Adv. Signal Process. 2007 (2007) - [c15]Ki-sung Hong, Hyoung Joong Kim, Chulung Lee:
Automated Grocery Ordering Systems for Smart Home. FGCN (2) 2007: 87-92 - [c14]Vasiliy Sachnev, Hyoung-Joong Kim, Shijun Xiang, Jeho Nam:
An Improved Reversible Difference Expansion Watermarking Algorithm. IWDW 2007: 254-263 - [c13]Shijun Xiang, Hyoung-Joong Kim, Jiwu Huang:
Histogram-based image hashing scheme robust against geometric deformations. MM&Sec 2007: 121-128 - [c12]Hyoung Joong Kim, Vasiliy Sachnev, Su-Jeong Choi, Shijun Xiang:
An Innocuous Visual Cryptography Scheme. WIAMIS 2007: 65 - [c11]Shijun Xiang, Hyoung-Joong Kim:
Geometrically Invariant Image Watermarking in the DWT Domain. WISA 2007: 76-90 - [e5]Frank Stajano, Hyoung Joong Kim, Jong-Suk Chae, Seong-Dong Kim:
Ubiquitous Convergence Technology, First International Conference, ICUCT 2006, Jeju Island, Korea, December 5-6, 2006, Revised Selected Papers. Lecture Notes in Computer Science 4412, Springer 2007, ISBN 978-3-540-71788-1 [contents] - 2006
- [j14]Suresh Sundaram, V. Mani, S. N. Omkar, Hyoung Joong Kim:
Divisible load scheduling in distributed system with buffer constraints: genetic algorithm and linear programming approach. Int. J. Parallel Emergent Distributed Syst. 21(5): 303-321 (2006) - [c10]Sihyoung Lee, Seungji Yang, Yong Man Ro, Hyoung-Joong Kim:
e-Learning Media Format for Enhanced Consumption on Mobile Application. SEMPS 2006 - 2005
- [j13]Debasish Ghose, Hyoung Joong Kim:
Computing BLAS level-2 operations on workstation clusters using the divisible load paradigm, . Math. Comput. Model. 41(1): 49-70 (2005) - [j12]Debasish Ghose, Hyoung Joong Kim, Tae Hoon Kim:
Adaptive Divisible Load Scheduling Strategies for Workstation Clusters with Unknown Network Resources. IEEE Trans. Parallel Distributed Syst. 16(10): 897-907 (2005) - [c9]Suresh Sundaram, V. Mani, S. N. Omkar, Hyoung Joong Kim:
A Real Coded Genetic Algorithm for Data Partitioning and Scheduling in Networks with Arbitrary Processor Release Time. Asia-Pacific Computer Systems Architecture Conference 2005: 529-539 - [c8]V. Mani, Suresh Sundaram, Hyoung Joong Kim:
Real-Coded Genetic Algorithms for Optimal Static Load Balancing in Distributed Computing System with Communication Delays. ICCSA (4) 2005: 269-279 - [c7]Hyoung-Joong Kim, Yongsoo Choi:
A new visual cryptography using natural images. ISCAS (6) 2005: 5537-5540 - [c6]Tanmoy Kanti Das, Hyoung Joong Kim, Subhamoy Maitra:
Security Evaluation of Generalized Patchwork Algorithm from Cryptanalytic Viewpoint. KES (1) 2005: 1240-1247 - [e4]Mauro Barni, Ingemar J. Cox, Ton Kalker, Hyoung Joong Kim:
Digital Watermarking, 4th International Workshop, IWDW 2005, Siena, Italy, September 15-17, 2005, Proceedings. Lecture Notes in Computer Science 3710, Springer 2005, ISBN 3-540-28768-X [contents] - [e3]Yo-Sung Ho, Hyoung Joong Kim:
Advances in Multimedia Information Processing - PCM 2005, 6th Pacific-Rim Conference on Multimedia, Jeju Island, Korea, November 13-16, 2005, Proceedings, Part I. Lecture Notes in Computer Science 3767, Springer 2005, ISBN 3-540-30027-9 [contents] - [e2]Yo-Sung Ho, Hyoung Joong Kim:
Advances in Multimedia Information Processing - PCM 2005, 6th Pacific-Rim Conference on Multimedia, Jeju Island, Korea, November 13-16, 2005, Proceedings, Part II. Lecture Notes in Computer Science 3768, Springer 2005, ISBN 3-540-30040-6 [contents] - 2004
- [c5]Hyoung Joong Kim, Taehoon Kim, In-Kwon Yeo:
A robust audio watermarking scheme. ISCAS (5) 2004: 696-699 - 2003
- [j11]Hyoung Joong Kim:
A Novel Optimal Load Distribution Algorithm for Divisible Loads. Clust. Comput. 6(1): 41-46 (2003) - [j10]In-Kwon Yeo, Hyoung Joong Kim:
Generalized patchwork algorithm for image watermarking. Multim. Syst. 9(3): 261-265 (2003) - [j9]In-Kwon Yeo, Hyoung Joong Kim:
Modified patchwork algorithm: a novel audio watermarking scheme. IEEE Trans. Speech Audio Process. 11(4): 381-386 (2003) - [j8]Ebroul Izquierdo, Hyoung Joong Kim, Benoît Macq:
Introduction to the special issue on authentication, copyright protection, and information hiding. IEEE Trans. Circuits Syst. Video Technol. 13(8): 729-731 (2003) - [j7]Hyoung Joong Kim, Yong Hee Choi:
A novel echo-hiding scheme with backward and forward kernels. IEEE Trans. Circuits Syst. Video Technol. 13(8): 885-889 (2003) - [c4]Si-Woong Lee, Jae-Gark Choi, Hyun Soo Kang, Jin Woo Hong, Hyoung Joong Kim:
Normalization Domain Watermarking Method Based on Pattern Extraction. IWDW 2003: 390-395 - [e1]Fabien A. P. Petitcolas, Hyoung Joong Kim:
Digital Watermarking, First International Workshop, IWDW 2002, Seoul, Korea, November 21-22, 2002, Revised Papers. Lecture Notes in Computer Science 2613, Springer 2003, ISBN 3-540-01217-6 [contents] - 2002
- [c3]Debasish Ghose, Hyoung Joong Kim:
Large Matrix-vector Product Computations on Multicast Bus-oriented Workstation Clusters. PDPTA 2002: 436-441 - 2001
- [c2]In-Kwon Yeo, Hyoung Joong Kim:
Modified Patchwork Algorithm: A Novel Audio Watermarking Scheme. ITCC 2001: 237-242 - 2000
- [j6]Debasish Ghose, Hyoung Joong Kim:
Scheduling Video Streams in Video-on-Demand Systems: A Survey. Multim. Tools Appl. 11(2): 167-195 (2000)
1990 – 1999
- 1998
- [j5]Debasish Ghose, Hyoung Joong Kim:
Load Partitioning and Trade-Off Study for Large Matrix-Vector Computations in Multicast Bus Networks with Communication Delays. J. Parallel Distributed Comput. 55(1): 32-59 (1998) - 1994
- [j4]Cho-Li Wang, Viktor K. Prasanna, Hyoung Joong Kim, Ashfaq A. Khokhar:
Scalable Data Parallel Implementations of Object Recognition Using Geometric Hashing. J. Parallel Distributed Comput. 21(1): 96-109 (1994) - 1993
- [j3]Heonchul Park, Hyoung Joong Kim, Viktor K. Prasanna:
An O(1) Time Optimal Algorithm for Multiplying Matrices on Reconfigurable Mesh. Inf. Process. Lett. 47(2): 109-113 (1993) - [c1]Ashfaq A. Khokhar, Viktor K. Prasanna, Hyoung Joong Kim:
Scalable geometric hashing on MasPar machines. CVPR 1993: 594-595 - 1990
- [j2]Hyoung Joong Kim, Jang Gyu Lee:
Partial Sum Problem Mapping Into a Hypercube. Inf. Process. Lett. 36(5): 221-224 (1990) - [j1]Hyoung Joong Kim, Jang Gyu Lee:
A parallel algorithm solving a tridiagonal Toeplitz linear system. Parallel Comput. 13(3): 289-294 (1990)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-16 20:34 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint