
Inbok Lee
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2019
- [j14]Joong Chae Na, Inbok Lee, Je-Keun Rhee, Soo-Yong Shin:
Fast single individual haplotyping method using GPGPU. Comput. Biol. Medicine 113 (2019) - [j13]Joong Chae Na, Inbok Lee:
A Simple Heuristic for Order-Preserving Matching. IEICE Trans. Inf. Syst. 102-D(3): 502-504 (2019) - 2018
- [j12]Rack-woo Kim, Inbok Lee, Kyeong-seok Kwon, Uk-hyeon Yeo, Sang-yeon Lee, Min-Hyung Lee:
Design of a windbreak fence to reduce fugitive dust in open areas. Comput. Electron. Agric. 149: 150-165 (2018) - [j11]Inbok Lee, Victor C. Valgenti, Min Sik Kim, Sung-il Oh:
A Heuristic for Constructing Smaller Automata Based on Suffix Sorting and Its Application in Network Security. IEICE Trans. Inf. Syst. 101-D(3): 613-615 (2018) - [j10]Taemin Ahn, Jihoon Seok, Inbok Lee, Junghee Han
:
Reliable Flying IoT Networks for UAV Disaster Rescue Operations. Mob. Inf. Syst. 2018: 2572460:1-2572460:12 (2018) - [j9]Sang Won Bae
, Inbok Lee:
On finding a longest common palindromic subsequence. Theor. Comput. Sci. 710: 29-34 (2018) - 2017
- [j8]Se-Woon Hong
, Vasileios Exadaktylos, Inbok Lee, Thomas Amon
, Ali Youssef
, Tomas Norton
, Daniel Berckmans:
Validation of an open source CFD code to simulate natural ventilation for agricultural buildings. Comput. Electron. Agric. 138: 80-91 (2017) - [c18]Inbok Lee, Sung-il Oh:
Mining intrusion detection rules with longest increasing subsequences of q-grams. RACS 2017: 25-29 - 2016
- [j7]Inbok Lee, Aoqi Zhang, Changgil Lee, Seunghee Park:
A Visualization Method for Corrosion Damage on Aluminum Plates Using an Nd: YAG Pulsed Laser Scanning System. Sensors 16(12): 2150 (2016) - 2015
- [c17]Victor C. Valgenti, Min Sik Kim, Sung-il Oh, Inbok Lee:
REduce: Removing Redundancy from Regular Expression Matching in Network Security. ICCCN 2015: 1-10 - 2014
- [j6]Carl Barton, Costas S. Iliopoulos, Inbok Lee, Laurent Mouchard, Kunsoo Park, Solon P. Pissis
:
Extending alignments with k-mismatches and ℓ-gaps. Theor. Comput. Sci. 525: 80-88 (2014) - [c16]Inbok Lee, Phuong Do, Lan Do, Sung-Ryul Kim:
Measuring similarities among intrusion detection rules on the MapReduce environment. RACS 2014: 58-60 - 2013
- [c15]Juan Mendivelso, Yoan J. Pinzón, Inbok Lee:
Finding overlaps within regular expressions with variable-length gaps. RACS 2013: 16-21 - [c14]Sung-il Oh, Min Sik Kim, Inbok Lee:
An efficient bit-parallel algorithm for IDS. RACS 2013: 43-44 - 2012
- [c13]Sung-il Oh, Inbok Lee, Min Sik Kim:
Fast filtering for intrusion detection systems with the shift-or algorithm. APCC 2012: 869-870 - [c12]Inbok Lee:
A simple pattern matching algorithm for weighted sequences. RACS 2012: 65-67 - [c11]Juan Mendivelso, Inbok Lee, Yoan J. Pinzón:
Approximate Function Matching under δ- and γ- Distances. SPIRE 2012: 348-359
2000 – 2009
- 2008
- [j5]Inbok Lee:
A Simple Algorithm for Transposition-Invariant Amplified (delta, gamma)-Matching. IEICE Trans. Inf. Syst. 91-D(6): 1824-1826 (2008) - [c10]Inbok Lee, Juan Mendivelso, Yoan J. Pinzón:
delta-gamma-Parameterized Matching. SPIRE 2008: 236-248 - 2007
- [j4]Inbok Lee, Yoan J. Pinzón:
A Simple Algorithm for Finding Exact Common Repeats. IEICE Trans. Inf. Syst. 90-D(12): 2096-2099 (2007) - [j3]Inbok Lee, Costas S. Iliopoulos, Kunsoo Park:
Linear time algorithm for the longest common repeat problem. J. Discrete Algorithms 5(2): 243-249 (2007) - [c9]Inbok Lee, Ha Yoon Song:
A Simple and Compact Algorithm for the RMQ and Its Application to the Longest Common Repeat Problem. ICANNGA (1) 2007: 554-561 - [c8]Inbok Lee, Costas S. Iliopoulos, Syng-Yup Ohn:
Transformation of Suffix Arrays into Suffix Trees on the MPI Environment. RSFDGrC 2007: 248-255 - 2006
- [c7]M. Sohel Rahman, Costas S. Iliopoulos, Inbok Lee, Manal Mohamed
, William F. Smyth:
Finding Patterns with Variable Length Gaps or Don't Cares. COCOON 2006: 146-155 - [c6]Inbok Lee, Sung-Ryul Kim:
An Algorithm for the Generalized k-Keyword Proximity Problem and Finding Longest Repetitive Substring in a Set of Strings. International Conference on Computational Science (4) 2006: 289-292 - [c5]Inbok Lee, Raphaël Clifford
, Sung-Ryul Kim:
Algorithms on Extended (delta, gamma)-Matching. ICCSA (3) 2006: 1137-1142 - [c4]Ha-Nam Nguyen, Syng-Yup Ohn, Soo-Hoan Chae, Dong Ho Song, Inbok Lee:
Optimizing Weighted Kernel Function for Support Vector Machine by Genetic Algorithm. MICAI 2006: 583-592 - 2005
- [c3]Inbok Lee, Jeong-Shik Mun, Sung-Ryul Kim:
IP Address Lookup with the Visualizable Biased Segment Tree. FSKD (1) 2005: 1137-1140 - [c2]Inbok Lee, Yoan José Pinzón Ardila:
Linear Time Algorithm for the Generalised Longest Common Repeat Problem. SPIRE 2005: 191-201 - 2004
- [j2]Sung-Ryul Kim, Inbok Lee, Kunsoo Park:
A fast algorithm for the generalized k-keyword proximity problem given keyword offsets. Inf. Process. Lett. 91(3): 115-120 (2004) - [c1]Inbok Lee, Costas S. Iliopoulos, Kunsoo Park:
Linear Time Algorithm for the Longest Common Repeat Problem. SPIRE 2004: 10-17 - 2003
- [j1]Inbok Lee, Kunsoo Park, Yanghee Choi:
A Simple and Scalable Algorithm for the IP Address Lookup Problem. Fundam. Informaticae 56(1-2): 181-190 (2003)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2021-02-18 23:30 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint