default search action
Haeng-Kon Kim
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j9]Symphorien Karl Yoki Donzia, Haeng-Kon Kim:
A Study on Autonomous Driving Simulation Using a Deep Learning Process Model. Int. J. Softw. Innov. 10(1): 1-11 (2022) - [c76]Haeng-Kon Kim:
IOT (Internet of Things) Applications and Current Issues in Korea: Keynote Address. SERA 2022: 1 - 2021
- [j8]Symphorien Karl Yoki Donzia, Haeng-Kon Kim, Young Pil Geum:
A Study on Deep Learning Model Autonomous Driving Based on Big Data. Int. J. Softw. Innov. 9(4): 143-157 (2021) - [c75]Symphorien Karl Yoki Donzia, Haeng-Kon Kim, Young Pil Geum:
Implementation of Autoware Application to real-world Services Based Adaptive Big Data Management System for Autonomous Driving. ICCSA (Workshops) 2021: 251-257 - 2020
- [j7]Symphorien Karl Yoki Donzia, Haeng-Kon Kim, Jong-Halk Lee:
A Smart Security Drones for Farms Using Software Architecture. Int. J. Softw. Innov. 8(4): 40-49 (2020)
2010 – 2019
- 2018
- [j6]Matt Sinda, Tyler Danner, Sean O'Neill, Abeer Alqurashi, Haeng-Kon Kim:
Improving the Bluetooth Hopping Sequence for Better Security in IoT Devices. Int. J. Softw. Innov. 6(4): 117-131 (2018) - [c74]Symphorien Karl Yoki Donzia, Haeng-Kon Kim, Ha Jin Hwang:
A Software Model for Precision Agriculture Framework Based on Smart Farming System and Application of IoT Gateway. CSII (selected papers) 2018: 49-58 - [c73]Mechelle Grace Zaragoza, Haeng-Kon Kim, Youn-Ky Chung:
Components of Mobile Integration in Social Business and E-commerce Application. CSII (selected papers) 2018: 59-68 - [c72]Symphorien Karl Yoki Donzia, Haeng-Kon Kim:
Security framework for Mobile App Development in daily life. ICCSA (6) 2018: 1-8 - [c71]Meonghun Lee, Haeng-Kon Kim, Hyun Yoe:
Wireless Sensor Networks Based on Bio-Inspired Algorithms. ICCSA (1) 2018: 719-725 - 2017
- [p13]Carlos Ramos, Diogo Martinho, Goreti Marreiros, Gabriel Villarrubia, Juan F. De Paz, Juan M. Corchado, Hoon Ko, Haeng-Kon Kim, Hyun Yoe:
EKRUCAmI Architecture - Applications in Healthcare Domain. State of the Art in AI Applied to Ambient Intelligence 2017: 140-152 - 2015
- [p12]Haeng-Kon Kim, Roger Y. Lee:
Effective Domain Modeling for Mobile Business AHMS (Adaptive Human Management Systems) Requirements. Computer and Information Science 2015: 153-169 - 2014
- [j5]Haeng-Kon Kim:
Convergence agent model for developing u-healthcare systems. Future Gener. Comput. Syst. 35: 39-48 (2014) - [c70]Haeng-Kon Kim, Tai-Hoon Kim:
SOA Modeling Based on MDA. DCAI 2014: 181-194 - [c69]Haeng-Kon Kim, Hyun Yoe:
Building Scalable View Module of Object-Oriented Database. DCAI 2014: 295-309 - [c68]Haeng-Kon Kim, Hyun Yeo:
Self-Healing Multi Agent Prototyping System for Crop Production. ISAmI 2014: 31-43 - [c67]Haeng-Kon Kim:
Effective Domain Modeling for Mobile Business AHMS (Adaptive Human Management Systems) requirements. SNPD 2014: 1-9 - 2013
- [c66]Haeng-Kon Kim:
Security Certification Model for Mobile-Commerce. SERA (selected papers) 2013: 1-15 - [c65]Haeng-Kon Kim, Roger Y. Lee:
Applying CBD to Build Mobile Service Applications. SERA (selected papers) 2013: 263-277 - 2012
- [c64]Haeng-Kon Kim:
Architecture for Convegence Mobile Cooperation Service Using Components Integration. FGIT 2012: 33-43 - [c63]Haeng-Kon Kim:
Mobile Applications Development with Combine on MDA and SOA. FGIT-EL/DTA/UNESST 2012: 58-71 - [c62]Ji-Uoo Tak, Roger Y. Lee, Haeng-Kon Kim:
Basic Object Distribution for Mobile Environment. SERA (selected papers) 2012: 127-140 - [p11]Eun-Ser Lee, Haeng-Kon Kim:
Evaluation of Risk Items for Open Source Software. Software and Network Engineering 2012: 111-117 - [p10]Ji-Uoo Tak, Roger Y. Lee, Haeng-Kon Kim:
Design of Mobile Software Architecture. Software and Network Engineering 2012: 133-146 - 2011
- [c61]Haeng-Kon Kim, Youn-Ky Chung:
Mobile Specification Retrieval Methods. FGIT-DTA/BSBT 2011: 71-79 - [c60]Haeng-Kon Kim:
Frameworks for Multi-purpose U-Health Care Interface. FGIT 2011: 120-130 - [c59]Haeng-Kon Kim:
Modeling u-Healthcare Frameworks Using Mobile Devices. FGIT-FGCN (1) 2011: 166-178 - [c58]Haeng-Kon Kim:
SOCF: Service Oriented Common Frameworks Design Pattern for Mobile Systems with UML. FGIT-ASEA/DRBC/EL 2011: 200-211 - [c57]Haeng-Kon Kim, Roger Y. Lee:
A Testing Frameworks for Mobile Embedded Systems Using MDA. SERA (selected papers) 2011: 77-94 - [c56]Haeng-Kon Kim:
Modelling for Smart Agents for U-Learning Systems. SERA (selected papers) 2011: 113-128 - [c55]Haeng-Kon Kim:
Mobile Specification Using Semantic Networks. UCMA (2) 2011: 459 - [e6]Tai-Hoon Kim, Hojjat Adeli, Haeng-Kon Kim, Heau-Jo Kang, Kyung Jung Kim, Kiumi Akingbehin, Byeong Ho Kang:
Software Engineering, Business Continuity, and Education - International Conferences ASEA, DRBC and EL 2011, Held as Part of the Future Generation Information Technology Conference, FGIT 2011, in Conjunction with GDC 2011, Jeju Island, Korea, December 8-10, 2011. Proceedings. Communications in Computer and Information Science 257, Springer 2011, ISBN 978-3-642-27206-6 [contents] - 2010
- [c54]Rosslin John Robles, Haeng-Kon Kim, Tai-Hoon Kim:
Internet SCADA Utilizing API's as Data Source. FGIT-SecTech/DRBC 2010: 269-275 - [c53]Haeng-Kon Kim:
Mobile Business Agents Model and Architecture. FGIT 2010: 676-685 - [c52]Haeng-Kon Kim, Roger Y. Lee:
Development of Mobile Location-Based Systems with Component. SERA (selected papers) 2010: 103-113 - [c51]Haeng-Kon Kim, Sun-Myung Hwang:
Development of Mobile Agent on CBD. SERA (selected papers) 2010: 179-195 - [c50]Yongyun Cho, Hyun Yoe, Haeng-Kon Kim:
CAS4UA: A Context-Aware Service System Based on Workflow Model for Ubiquitous Agriculture. AST/UCMA/ISA/ACN 2010: 572-585 - [c49]Ho-chul Lee, Jeong-Hwan Hwang, Meong-hun Lee, Haeng-Kon Kim, Hyun Yoe:
A Power Control Scheme for an Energy-Efficient MAC Protocol. AST/UCMA/ISA/ACN 2010: 586-596 - [c48]Sumana Barman, Debnath Bhattacharyya, Seung-Whan Jeon, Tai-Hoon Kim, Haeng-Kon Kim:
A New Experiment on Bengali Character Recognition. UCMA 2010: 20-28 - [p9]Haeng-Kon Kim, Roger Y. Lee:
Components Based Testing Using Optimization AOP. Computer and Information Science 2010: 207-219 - [e5]Tai-Hoon Kim, Haeng-Kon Kim, Muhammad Khurram Khan, Kiumi Akingbehin, Wai-Chi Fang, Dominik Slezak:
Advances in Software Engineering - International Conference, ASEA 2010, Held as Part of the Future Generation Information Technology Conference, FGIT 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings. Communications in Computer and Information Science 117, Springer 2010, ISBN 978-3-642-17577-0 [contents]
2000 – 2009
- 2009
- [c47]Haeng-Kon Kim, Roger Y. Lee:
Frameworks for Maturity Questionnaire Selection Model. SERA (selected papers) 2009: 135-143 - [p8]Haeng-Kon Kim, Roger Y. Lee:
Frameworks for Web Usage Mining. Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing 2009: 121-134 - [p7]Oliver Strong, Chia-Chu Chiang, Haeng-Kon Kim, Byeongdo Kang, Roger Y. Lee:
Layering MDA: Applying Transparent Layers of Knowledge to Platform Independent Models. Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing 2009: 191-199 - [p6]Haeng-Kon Kim:
Evaluation and Certifications for Component Packages Software. Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing 2009: 209-220 - [p5]Eun-Ju Park, Haeng-Kon Kim, Roger Y. Lee:
Middleware Frameworks for Ubiquitous Computing Environment. Computer and Information Science 2009: 213-228 - [e4]Roger Y. Lee, Wencai Du, Haeng-Kon Kim, Shaochun Xu:
Proceedings of the Seventh ACIS International Conference on Software Engineering Research, Management and Applications, SERA 2009, Haikou, China, 2-4 December 2009. IEEE Computer Society 2009, ISBN 978-0-7695-3903-4 [contents] - [e3]Haeng-Kon Kim, Roger Y. Lee:
10th ACIS International Conference on Software Engineering, Artificial Intelligences, Networking and Parallel/Distributed Computing, SNPD 2009, in conjunction with 3rd International Workshop on e-Activity, IWEA 2009, 1st International Workshop on Enterprise Architecture Challenges and Responses, WEACR 2009, Catholic University of Daegu, Daegu, Korea, 27-29 May 2009. IEEE Computer Society 2009, ISBN 978-0-7695-3642-2 [contents] - 2008
- [j4]Haeng-Kon Kim:
Frameworks of Process Improvement for Mobile Applications. Eng. Lett. 16(4): 550-555 (2008) - [p4]Haeng-Kon Kim:
Aspect Oriented Testing Frameworks for Embedded Software. Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing 2008: 75-88 - [p3]Seung Woo Shin, Haeng-Kon Kim:
A Framework for SOA-Based Application on Agile of Small and Medium Enterprise. Computer and Information Science 2008: 107-120 - [p2]Haeng-Kon Kim, Roger Y. Lee:
MS2Web: Applying MDA and SOA to Web Services. Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing 2008: 163-180 - [p1]Sung-Wook Lee, Haeng-Kon Kim, Roger Y. Lee:
Enterprise Process Model for Extreme Programming with CMMI Framework. Computer and Information Science 2008: 169-180 - [e2]Roger Y. Lee, Haeng-Kon Kim:
Computer and Information Science [outstanding papers from IEEE/ACIS ICIS/IWEA 2008]. Studies in Computational Intelligence 131, Springer 2008, ISBN 978-3-540-79186-7 [contents] - 2007
- [c46]Jinalben Patel, Roger Y. Lee, Haeng-Kon Kim:
Architectural View in Software Development Life-Cycle Practices. ACIS-ICIS 2007: 194-199 - [c45]Eun-Ju Park, Haeng-Kon Kim, Roger Y. Lee:
Frameworks of Integration Repository for Software Process Improvement using SOA. ACIS-ICIS 2007: 200-206 - [c44]Haeng-Kon Kim:
Frameworks of Indexing Mechanism for Mobile Devices. BLISS 2007: 47-50 - [c43]Sun-Myung Hwang, YunKoo Chung, Haeng-Kon Kim:
A Design and Testing Technology for Ubiquitous Robot Companion Software Component. KES (2) 2007: 533-540 - [c42]Eun-Ser Lee, Haeng-Kon Kim, Sang Ho Lee:
Design of the Intelligence User Identification Method for the Improved Password Input Method and the Personality Security. KES (2) 2007: 581-588 - [c41]Haeng-Kon Kim, Sun-myoung Hwang, Eun-Ser Lee:
Design of Intelligence Mobile Agent Lifecycle for the Progress Management and Mobile Computing. KES-AMSTA 2007: 721-727 - [c40]Eun-Ser Lee, Haeng-Kon Kim, Sun-myoung Hwang:
Design Opportunity Tree of Capability Improve for Level-up and Software Process Improvement. SERA 2007: 19-24 - [c39]Eun-Ser Lee, Haeng-Kon Kim, Sun-myoung Hwang:
Analysis the priority of security requirement items for the process improvement by ISO/IEC 15504 and ISO/IEC 15408. SERA 2007: 25-30 - [c38]Eun-Ju Park, Haeng-Kon Kim, Roger Y. Lee:
Web Service Security model Using CBD Architecture. SERA 2007: 346-352 - [c37]David Dupuis, Roger Y. Lee, Haeng-Kon Kim:
Communication of Business's and Software Engineers. SERA 2007: 679-688 - [e1]Marcin S. Szczuka, Daniel Howard, Dominik Slezak, Haeng-Kon Kim, Tai-Hoon Kim, Il Seok Ko, Geuk Lee, Peter M. A. Sloot:
Advances in Hybrid Information Technology, First International Conference, ICHIT 2006, Jeju Island, Korea, November 9-11, 2006, Revised Selected Papers. Lecture Notes in Computer Science 4413, Springer 2007, ISBN 978-3-540-77367-2 [contents] - 2006
- [c36]Haeng-Kon Kim, Sang-Yong Byun:
SDSEM: Software Development Success Evolution Model. ICCSA (3) 2006: 84-92 - [c35]Haeng-Kon Kim:
Applying Product Line to the Embedded Systems. ICCSA (3) 2006: 163-171 - [c34]Haeng-Kon Kim, Youn-Ky Chung:
Transforming a Legacy System into Components. ICCSA (3) 2006: 198-205 - [c33]Haeng-Kon Kim:
Software Architecture Generation on UML. ICCSA (4) 2006: 844-852 - [c32]Ki-Won Song, Haeng-Kon Kim, Kyung-Whan Lee:
Design of Opportunity Tree for Organization's Process Strategy Decision-Making Based on SPICE Assessment Experience. ICCSA (4) 2006: 873-882 - [c31]Haeng-Kon Kim, Eun-Ju Park:
Component Specification Model for the Web Services. ICCSA (4) 2006: 927-936 - [c30]Haeng-Kon Kim, Hae Sool Yang:
Software Process Improvement Environment. ICCSA (4) 2006: 976-984 - [c29]Haeng-Kon Kim:
Intelligent Frameworks for Encoding XML Elements Using Mining Algorithm. KES (2) 2006: 751-759 - [c28]Haeng-Kon Kim:
Graphical Knowledge Template of CBD Meta-model. KES (2) 2006: 760-768 - [c27]Haeng-Kon Kim, Roger Y. Lee, Hae Sool Yang:
Frameworks for Secured Business Process Management Systems. SERA 2006: 57-65 - [c26]Haeng-Kon Kim:
Intelligent Retrieval Agent based on Distributed Environment. SERA 2006: 137-143 - [c25]Poornima Ramachandra, Haeng-Kon Kim, Byeongdo Kang, Yan Ha, Roger Y. Lee:
Risk Management through Architecture Design. SERA 2006: 386-395 - 2005
- [c24]Ashok K. Harikumar, Roger Y. Lee, Hae Sool Yang, Haeng-Kon Kim, Byeongdo Kang:
A Model for Application Integration Using Web Services. ACIS-ICIS 2005: 468-475 - [c23]Hae Sool Yang, Jung-Hun Hong, Seok-Hyung Hwang, Haeng-Kon Kim:
Implementation of Short Message Service System to Be Based Mobile Wireless Internet. ICCSA (2) 2005: 1-9 - [c22]Haeng-Kon Kim, Hae Sool Yang:
Security Framework to Verify the Low Level Implementation Codes. ICCSA (2) 2005: 52-61 - [c21]Haeng-Kon Kim:
A Study on Evaluation of Component Metric Suites. ICCSA (2) 2005: 62-70 - [c20]Haeng-Kon Kim, Oh-Hyun Kwon:
SCTE: Software Component Testing Environments. ICCSA (2) 2005: 137-146 - [c19]Haeng-Kon Kim, Youn-Ky Chung:
Automatic Translation Form Requirements Model into Use Cases Modeling on UML. ICCSA (3) 2005: 769-777 - [c18]Haeng-Kon Kim:
A Study on the Mechanism for Mobile Embedded Agent Development Based on Product Line. ICCSA (3) 2005: 906-915 - [c17]Soung Won Kim, Myoung Soo Kim, Haeng-Kon Kim:
Frameworks for Model-Driven Software Architecture. ICCSA (3) 2005: 916-926 - [c16]Haeng-Kon Kim:
Knowledge Acqusition for Mobile Embedded Software Development Based on Product Line. KES (1) 2005: 1131-1138 - [c15]Ho-jun Shin, Haeng-Kon Kim, Bo-Yeon Shim:
Development of Business Rule Engine and Builder for Manufacture Process Productivity. KES (2) 2005: 1305-1311 - [c14]Haeng-Kon Kim, Deok-Soo Han:
Logic Frameworks for Components Integration Process. KES (2) 2005: 1317-1324 - [c13]Haeng-Kon Kim:
A Component-Based Approach for Integrating Mobile Agents Into the Existing Web Infrastructure. SERA 2005: 75-85 - [c12]Haeng-Kon Kim, Roger Y. Lee, Hae Sool Yang:
Requirements for CBD Products and Process Quality. SERA 2005: 375-382 - [c11]Roger Y. Lee, Ashok K. Harikumar, Chia-Chu Chiang, Hae Sool Yang, Haeng-Kon Kim, Byeongdo Kang:
A Framework for Dynamically Converting Components to Web Services. SERA 2005: 431-437 - 2004
- [c10]Roger Y. Lee, Haeng-Kon Kim, Hae Sool Yang:
An Architecture Model for Dynamically Converting Components into Web Services. APSEC 2004: 648-654 - [c9]Haeng-Kon Kim, Tai-Hoon Kim:
Design on Mobile Secure Electronic Transaction Protocol with Component Based Development. ICCSA (1) 2004: 461-470 - [c8]Tai-Hoon Kim, Haeng-Kon Kim:
A Relationship between Security Engineering and Security Evaluation. ICCSA (4) 2004: 717-724 - [c7]Haeng-Kon Kim, Hae Sool Yang, Roger Y. Lee:
A Study on Frameworks of Component Integration for Web Applications. SERA 2004: 58-70 - [c6]Roger Y. Lee, Gopalakrishnan Ramamurthi, Haeng-Kon Kim, Hae Sool Yang:
A New Approach to Requirements Elicitation Process. SNPD 2004: 226-233 - 2003
- [c5]Haeng-Kon Kim, Tai-Hoon Kim, Jae-Sung Kim:
Reliability Assurance in Development Process for TOE on the Common Criteria. SERA 2003: 364-375 - [c4]Haeng-Kon Kim, Tai-Hoon Kim, Jae-Sung Kim:
ECSSL Protocol Based on 3B Algorithm. SNPD 2003: 166-169 - [c3]Tai-Hoon Kim, Jae-Sung Kim, Eun-Kyoung Yi, Haeng-Kon Kim:
A Study on the Relationship of Assurance Requirements between K Level of KISEC and EAL Level of CC. SNPD 2003: 170-176 - 2001
- [j3]Haeng-Kon Kim:
Framework for network management architectures with distributed software component. ACIS Int. J. Comput. Inf. Sci. 2(2): 59-66 (2001) - [j2]Haeng-Kon Kim, Roger Y. Lee, Tadanori Mizuno, Atsushi Togashi:
A study on component reuse system using reengineering. ACIS Int. J. Comput. Inf. Sci. 2(3): 118-126 (2001) - [j1]Haeng-Kon Kim, Roger Y. Lee:
Management process for supporting the component development. Informatica (Slovenia) 25(4) (2001) - [c2]Haeng-Kon Kim, Roger Y. Lee:
Frameworks for compositional development from components. SMC 2001: 729-734 - [c1]Haeng-Kon Kim, Youn-Ky Chung:
A component based distributed software architecture for multimedia services. SMC 2001: 2383-2388
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:07 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint