
Sung Y. Shin
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [c61]Bada Kim, Doohyuk Chang, Junyoung Heo, Sung Y. Shin:
Time series analysis for enhancing the recognition of license plate number in video stream of IOT camera. SAC 2020: 1901-1905
2010 – 2019
- 2019
- [c60]Sangwon Shin, Soohyeon Choi, Kwanghee Won, Sung Y. Shin:
Preprocessed symmetric RSA authentication for wireless body area networks in space. RACS 2019: 230-235 - [c59]Hansol Lee, Younghwan Kim, Juw Won Park, Sung Y. Shin, Jiman Hong:
An efficient deep learning platform for detecting objects. SAC 2019: 1353-1354 - 2018
- [j8]Jun Huang, Cong-Cong Xing
, Sung Y. Shin, Fen Hou, Ching-Hsien Hsu
:
Optimizing M2M Communications and Quality of Services in the IoT for Sustainable Smart Cities. IEEE Trans. Sustain. Comput. 3(1): 4-15 (2018) - [c58]Sae-Han Suh, Ji-Eun Jhang, Kwanghee Won, Sung Y. Shin, Chang Oan Sung:
Development of vegetation mapping with deep convolutional neural network. RACS 2018: 53-58 - [c57]Jeongwoo Choi, Yongmin Kim, Sung Y. Shin, Jiman Hong:
Smart IoT monitoring framework based on oneM2M for fog computing. SAC 2018: 1848-1852 - 2017
- [j7]Samaneh Aminikhanghahi
, Sung Y. Shin, Wei Wang, Soon-Ik Jeon, Seong-Ho Son
:
A new fuzzy Gaussian mixture model (FGMM) based algorithm for mammography tumor image classification. Multim. Tools Appl. 76(7): 10191-10205 (2017) - [c56]Mohammad Taheri, Dheeman Saha, Gary Hatfield, Emmanuel Byamukama, Sung Y. Shin:
Applied Statistical Model and Remote Sensing for Decision Management System for Soybean. RACS 2017: 11-14 - [c55]Sae-Han Suh, Dong-youn Kim, Ji-Eun Jhang, Emmanuel Byamukama, Gary Hatfield, Sung Y. Shin:
Identification of the White-Mold affected Soybean fields by using Multispectral Imageries, Spatial Autocorrelation and Support Vector Machine. RACS 2017: 104-109 - [c54]Ji Young Lee, Jin Yeong Mun, Mohammad Taheri, Seong-Ho Son
, Sung Y. Shin:
Vessel Segmentation Model using Automated Threshold Algorithm from Lower Leg MRI. RACS 2017: 120-125 - [c53]Myungjoon Shon, Kisu Kim, Hansol Lee, Sung Y. Shin, Jiman Hong:
DACS: dynamic allocation credit scheduler for virtual machines. SAC 2017: 1563-1565 - 2016
- [c52]Mohammad Taheri, George Hamer, Seong-Ho Son
, Sung Y. Shin:
Enhanced Breast Cancer Classification with Automatic Thresholding Using SVM and Harris Corner Detection. RACS 2016: 56-60 - [c51]Mohammad Taheri, George Hamer, Seong-Ho Son
, Sung Y. Shin:
Automated Single and Multi-Breast Tumor Segmentation Using Improved Watershed Technique in 2D MRI Images. RACS 2016: 61-66 - [c50]Dheeman Saha, Austin Hanson, Sung Y. Shin:
Development of Enhanced Weed Detection System with Adaptive Thresholding and Support Vector Machine. RACS 2016: 85-88 - [c49]Chulwoo Pack, Sung Y. Shin, Hyung Do Choi, Soon-Ik Jeon, John Kim:
Optimized multilayer perceptron using dynamic learning rate based microwave tomography breast cancer screening. SAC 2016: 2171-2175 - [c48]Ravi Kasaudhan, Sung Y. Shin, Soon-Ik Jeon, Seong-Ho Son
:
Similarity measurement with combination of mesh distance fourier transform and global features in 2D binary image. SAC 2016: 2176-2181 - 2015
- [j6]Gensheng Zhang, Wei Wang, Sung Y. Shin, Carrie B. Hruska, Seong-Ho Son
:
Fourier irregularity index: A new approach to measure tumor mass irregularity in breast mammogram images. Multim. Tools Appl. 74(11): 3783-3798 (2015) - [c47]Austin Hanson, George Hamer, Sung Y. Shin:
Hybrid model for object orientation classification. RACS 2015: 164-171 - [c46]Chulwoo Pack, Sung Y. Shin, Seong-Ho Son
, Soon-Ik Jeon:
Computer aided breast cancer diagnosis system with fuzzy multiple-parameter support vector machine. RACS 2015: 172-176 - [c45]G. C. Sailesh, Chulwoo Pack, Sung Y. Shin, Hyung D. Choi:
Breast cancer classification of mammographic masses using improved shape features. RACS 2015: 188-194 - [c44]Samaneh Aminikhanghahi
, Sung Y. Shin, Wei Wang, Soon-Ik Jeon, Seong-Ho Son
, Chulwoo Pack:
Study of wireless mammography image transmission impacts on robust cyber-aided diagnosis systems. SAC 2015: 2252-2256 - 2014
- [j5]Runan Yao, Wei Wang
, Sung Y. Shin, Seong-Ho Son
, Soon-Ik Jeon:
Competition-Based Device-to-Device Transmission Scheduling to Support Wireless Cloud Multimedia Communications. Int. J. Distributed Sens. Networks 10 (2014) - [c43]Samaneh Aminikhanghahi
, Sung Y. Shin, Wei Wang, Seong-Ho Son
, Soon-Ik Jeon:
An optimized support vector machine classifier to extract abnormal features from breast microwave tomography data. RACS 2014: 111-115 - [c42]Byung K. Jung, Sung Y. Shin, Seong-Ho Son
, Jeong K. Pack:
Shape based medical image retrieval method using irregularity chain code similarity. RACS 2014: 121-125 - [c41]Chunqiu Wang, Wei Wang, Sung Y. Shin, Soon-Ik Jeon:
Comparative study of microwave tomography segmentation techniques based on GMM and KNN in breast cancer detection. RACS 2014: 303-308 - [c40]Byung K. Jung, Sung Y. Shin, Wei Wang, Hyung Do Choi, Jeong K. Pack:
Similar MRI object retrieval based on modified contour to centroid triangulation with arc difference rate. SAC 2014: 31-32 - [c39]Samaneh Aminikhanghahi
, Wei Wang, Sung Y. Shin, Seong-Ho Son
, Soon-Ik Jeon:
Effective tumor feature extraction for smart phone based microwave tomography breast cancer screening. SAC 2014: 674-679 - [e7]Yookun Cho, Sung Y. Shin, Sang-Wook Kim, Chih-Cheng Hung, Jiman Hong:
Symposium on Applied Computing, SAC 2014, Gyeongju, Republic of Korea - March 24 - 28, 2014. ACM 2014, ISBN 978-1-4503-2469-4 [contents] - 2013
- [c38]Zhe Li, Wei Wang, Sung Y. Shin, Hyung Do Choi:
Enhanced roughness index for breast cancer benign/malignant measurement using Gaussian mixture model. RACS 2013: 177-181 - [c37]Hyun I. Kim, Sung Y. Shin, Wei Wang, Soon-Ik Jeon:
SVM-based Harris corner detection for breast mammogram image normal/abnormal classification. RACS 2013: 187-191 - [c36]Wei Wang, Sung Y. Shin:
A distributed source rate control optimization approach in energy harvesting wireless sensor networks. WOCC 2013: 410-414 - [e6]Sung Y. Shin, José Carlos Maldonado:
Proceedings of the 28th Annual ACM Symposium on Applied Computing, SAC '13, Coimbra, Portugal, March 18-22, 2013. ACM 2013, ISBN 978-1-4503-1656-9 [contents] - 2012
- [j4]Joonhyouk Jang, Jinman Jung, Yookun Cho, Sanghoon Choi, Sung Y. Shin:
Design of a Lightweight TCP/IP Protocol Stack with an Event-Driven Scheduler. J. Inf. Sci. Eng. 28(6): 1059-1071 (2012) - [c35]Zhe Li, Sung Y. Shin, Soon-Ik Jeon, Seong-Ho Son
, Jeong K. Pack:
A new histogram-based breast cancer image classifier using Gaussian mixture model. RACS 2012: 143-147 - [c34]Gensheng Zhang, Sung Y. Shin, Wei Wang, Carrie B. Hruska, Hyung Do Choi:
A new Fourier-based approach to measure irregularity of breast masses in mammograms. RACS 2012: 153-157 - [c33]Eungyu Lee, Joonwoo Lee, Hyeongseok Kang, Kanghee Kim, Sung-Ryul Kim, Sung Y. Shin:
An implementation study of a ghost drive: hidden file store in a filesystem. SAC 2012: 1796-1798 - 2011
- [c32]Jucheol Moon, Sung Y. Shin, Donghoon Kang, Soon-Ik Jeon, Hyung Do Choi, Jung Y. Kim:
Agglomerated feature extractionin medical images for breast cancer and its characteristic pattern generation. RACS 2011: 220-225 - [c31]Donghoon Kang, Sung Y. Shin, Chang Oan Sung, Jung Y. Kim, Jeong-Ki Pack, Hyung Do Choi:
An improved method of breast MRI segmentation with simplified K-means clustered images. RACS 2011: 226-231 - [c30]Heejune Ahn, Sang Chul Ahn, Junyoung Heo
, Sung Y. Shin:
Fault tolerant framework and techniques for component-based autonomous robot systems. SAC 2011: 566-572 - 2010
- [j3]Manki Min, Austin F. O'Brien, Sung Y. Shin:
Improved PSOR algorithm for minimum power multicast tree problem in wireless ad hoc networks. Int. J. Sens. Networks 8(3/4): 193-201 (2010) - [j2]Jaeheung Lee, Sangho Yi, Junyoung Heo, Hyungbae Park, Sung Y. Shin, Yookun Cho:
An Efficient Secure Deletion Scheme for Flash File Systems. J. Inf. Sci. Eng. 26(1): 27-38 (2010) - [c29]Junghoon Lee, Gyung-Leen Park, Sang-Wook Kim, Hye-Jin Kim, Sung Y. Shin:
A hybrid prefetch policy for the retrieval of link-associated information on vehicular networks. SAC 2010: 189-193 - [e5]Sung Y. Shin, Sascha Ossowski, Michael Schumacher, Mathew J. Palakal, Chih-Cheng Hung:
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), Sierre, Switzerland, March 22-26, 2010. ACM 2010, ISBN 978-1-60558-639-7 [contents]
2000 – 2009
- 2009
- [c28]Manki Min, Austin F. O'Brien, Sung Y. Shin:
Partitioning-Based SOR for Minimum Energy Multicast Tree Problem in Wireless Ad Hoc Networks. ICCCN 2009: 1-6 - [c27]Haklin Kimm, Sung Y. Shin, Ho-sang Ham, Chang Oan Sung:
Failure management development for integrated automotive safety-critical software systems. SAC 2009: 517-521 - [e4]Sung Y. Shin, Sascha Ossowski:
Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), Honolulu, Hawaii, USA, March 9-12, 2009. ACM 2009, ISBN 978-1-60558-166-8 [contents] - 2008
- [c26]Manki Min, Austin F. O'Brien, Sung Y. Shin:
SOR Revisited: Partitioning and Recovering after Shrinking. ICCCN 2008: 783-788 - [c25]W. Eric Wong, Chang Oan Sung, Sung Y. Shin:
Message from the software engineering track chairs: editorial. SAC 2008: 660 - [c24]Jaeheung Lee, Junyoung Heo
, Yookun Cho, Jiman Hong, Sung Y. Shin:
Secure deletion for NAND flash file system. SAC 2008: 1710-1714 - 2007
- [j1]Junghoon Lee, Mikyung Kang, Gyung-Leen Park, Sung Y. Shin:
Design of a Reliable Real-Time Scheduling Policy for Dual-Channel Networks. J. Inf. Sci. Eng. 23(5): 1407-1419 (2007) - [c23]Haklin Kimm, Sung Y. Shin, Chang Oan Sung:
Evaluation of interval-based dynamic voltage scaling algorithms on mobile Linux system. SAC 2007: 1141-1145 - [e3]Yookun Cho, Roger L. Wainwright, Hisham Haddad, Sung Y. Shin, Yong Wan Koo:
Proceedings of the 2007 ACM Symposium on Applied Computing (SAC), Seoul, Korea, March 11-15, 2007. ACM 2007, ISBN 1-59593-480-4 [contents] - 2006
- [c22]Jongmoo Choi, Seungjae Baek, Sung Y. Shin:
Design and implementation of a kernel resource protector for robustness of Linux module programming. SAC 2006: 1477-1481 - 2005
- [c21]Charlie Y. Shim, Jung-Yeop Kim, Sung Y. Shin, Jiman Hong:
Using Feedback Cycle for Developing an Adjustable Security Design Metric. FSKD (2) 2005: 1158-1161 - [c20]Yoojin Chung, Sang-Young Cho, Sung Y. Shin:
Parallel Prediction of Protein-Protein Interactions Using Proximal SVM. RSFDGrC (2) 2005: 430-437 - [c19]Dongseob Jang, Sung Y. Shin, Charlie Y. Shim, C. C. Hung:
A comparison on information fusion methods for air target identification. SAC 2005: 45-46 - [c18]Junyoung Heo
, Sangho Yi, Yookun Cho, Jiman Hong, Sung Y. Shin:
Space-efficient page-level incremental checkpointing. SAC 2005: 1558-1562 - 2004
- [c17]Sung Y. Shin, ChanGon Yoo, Chih-Cheng Hung:
Reliable High-Speed Communication Module for Linux Cluster File System Using M-VIA. Computers and Their Applications 2004: 205-208 - 2003
- [c16]Sung Y. Shin, Charlie Y. Shim, Xiaohng Chen, Chang Oan Sung:
A Web-Based Approach for Myofascial Pain Syndrome Monitoring System in the Home. CAINE 2003: 246-249 - [c15]Sung Y. Shin, Chan G. Yoo, Kwan-Jong Yoo:
Design and Performance Analysis of Communication Module for Linux Clustering VOD Server. CAINE 2003: 254-257 - [c14]Moonju Park, Jiman Hong, Sung Y. Shin:
A Priority Assignment Method for Earliest Deadline Scheduling. Computers and Their Applications 2003: 316-320 - [c13]Sangsu Kim, Jiman Hong, Yookun Cho, Sung Y. Shin:
Memory Profiling Checkpoint. Computers and Their Applications 2003: 325-328 - 2002
- [c12]Sung Y. Shin, Charlie Yong-Sang Shim, Su Jung Byun:
Bird Species Identification System Using Kernel based PCA. CAINE 2002: 142-145 - [c11]Charlie Y. Shim, Alireza Salehnia, Sung Y. Shin:
An Approach from Software Reliability Modeling to Security Modeling. CATA 2002: 63-66 - [c10]Sung Y. Shin, Su Jeong Byun, Won Don Lee:
User Verification System on Telebanking Using Kernel based PCA. Computers and Their Applications 2002: 102-105 - [e2]Rex E. Gantenbein, Sung Y. Shin:
Proceedings of the ISCA 17th International Conference Computers and Their Applications, April 4-6, 2002, Canterbury Hotel, San Francisco, California, USA. ISCA 2002, ISBN 1-880843-42-0 [contents] - 2001
- [c9]Sung Y. Shin, Jung-Yeop Kim, Rex E. Gantenbein, Charles M. Lundquist:
Design A Working Model of Secure Data Transfer Using a Data Mart. CAINE 2001: 66-69 - [c8]Su Jeong Byun, Won Don Lee, Sung Y. Shin, Chih-Cheng Hung:
The performance comparison between backpropagation and extended incremental network model on speaker verification. Computers and Their Applications 2001: 256-259 - 2000
- [c7]Rex E. Gantenbein, Thomas L. James, Garrace DeGroot, Harshi L. Allen, Sung Y. Shin:
Analyzing security in distributed collaborative systems. Computers and Their Applications 2000: 72-75 - [c6]Dong Chun Lee, Sung Y. Shin:
Radiance simulation of multispectral remote sensor data for water resource applications. Computers and Their Applications 2000: 400-403 - [c5]Dong Chun Lee, Jay H. Kwon, Keehwan Hong, Sung Y. Shin:
A conceptual framework for GIS-based vehicle monitoring system. Computers and Their Applications 2000: 404-407 - [e1]Sung Y. Shin:
Proceedings of the ISCA 15th International Conference Computers and Their Applications, March 29-31, 2000, New Orleans, Louisiana, USA. ISCA 2000, ISBN 1-880843-32-3 [contents]
1990 – 1999
- 1999
- [c4]Sung Y. Shin, Chang Oan Sung:
Heuristic rules for data warehouse developments. Computers and Their Applications 1999: 10-13 - [c3]Sung Y. Shin, Ming Y. Wang:
Design and implementation of window NT real time email "talk". Computers and Their Applications 1999: 214-217 - 1998
- [c2]Chae-Gon Yoo, Sung Y. Shin, Chi-Jung Hwang:
Coarse matching method on aerial city image using distance weighted intensity transformation. Computers and Their Applications 1998: 295-298 - [c1]Sung Y. Shin, Charlie Yong-Sang Shim, Rex E. Gantenbein:
The optimal data interval for message passing to update checkpointed states in a fault-tolerant distributed systems. Computers and Their Applications 1998: 376-379
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2020-08-07 23:25 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint