default search action
Seong-Whan Kim
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [c31]Seong-Whan Kim, Hyun-Chul Lee:
Statistically Secure and Massively Scalable Fingerprinting Scheme for Mobile Game Broadcasting Content. ICTC 2020: 1726-1731
2010 – 2019
- 2019
- [j9]Jung-Yoon Kim, Seong-Whan Kim:
Virtually Zero Delay Interaction Between Online Game Players Using Kalman Filter-Based Dead Reckoning with Density and Distance Gain Control Adaptation. Int. J. Softw. Eng. Knowl. Eng. 29(8): 1091-1101 (2019) - 2018
- [j8]Hwan-Soo Yoo, Seong-Whan Kim:
Game operation query language for facilitating game server's FCAPS operation. Int. J. Inf. Technol. Manag. 17(1/2): 113-128 (2018) - 2016
- [j7]Jae Youn Shim, Seong-Whan Kim:
Using circular dot pattern code tag for medical information on the round type medical package. Int. J. Adv. Media Commun. 6(1): 48-56 (2016) - [j6]Jae Youn Shim, Seong-Whan Kim:
LaserShoot: a natural shooting interface for FPS gaming using laser recognizable display. Multim. Tools Appl. 75(6): 3409-3423 (2016) - [j5]Hwan-Soo Yoo, Seong-Whan Kim:
ESOTAG: E-book evolution using collaborative social tagging by readers. Multim. Tools Appl. 75(20): 12795-12813 (2016) - 2014
- [j4]Jae Youn Shim, Seong-Whan Kim:
Design of circular dot pattern code (CDPC) for maximum information capacity and robustness on geometric distortion/noise. Multim. Tools Appl. 70(3): 1941-1955 (2014) - 2013
- [c30]Wai-Tat Fu, John Gasper, Seong-Whan Kim:
Effects of an in-car augmented reality system on improving safety of younger and older drivers. ISMAR 2013: 59-66 - 2011
- [c29]Jun Hee Cho, Seong-Whan Kim:
Laser Pointer Based Constrained Input Scheme for Educational Game Software Framework. ICHIT (2) 2011: 537-544 - [c28]Jae Youn Shim, Seong-Whan Kim:
Topological Graph Matching Based Dot Pattern Recognition Scheme for Smart Book. ICHIT (1) 2011: 598-605 - [c27]Liu Feng, Seong-Whan Kim:
Comparison of Scalable ACC and MC-CDMA for Practical Video Fingerprinting Scheme. ICIC (2) 2011: 461-468 - 2010
- [c26]Hwan-Soo Yoo, Seong-Whan Kim:
Agritainment: 3D collaborative space for training agricultural experience with entertainment elements. SIGGRAPH Posters 2010: 46:1 - [c25]Hwan-Soo Yoo, Seong-Whan Kim, Ok-Hue Cho:
EDGE: an easy design tool of game event for rapid game development. SIGGRAPH ASIA (Sketches) 2010: 4:1-4:2 - [c24]Jae Youn Shim, Hyun-Seong Sung, Seong-Whan Kim:
Cognitive laser: new gaming device for first person shooter games using laser shooter and laser-cognizable big screen. SIGGRAPH ASIA (Posters) 2010: 26:1
2000 – 2009
- 2007
- [c23]Jae-Min Seol, Seong-Whan Kim:
Scalable and Statistically Secure Fingerprinting Scheme for Mobile Game Content Distribution. CIT 2007: 441-446 - [c22]Jae-Min Seol, Seong-Whan Kim:
Collision-Resilient Symbol Based Extension of Query Tree Protocol for Fast RFID Tag Identification. ICOIN 2007: 513-522 - 2006
- [c21]Ki-Hong Ko, Seong-Whan Kim:
Efficient Inpainting of Old Film Scratch using Sobel Edge Operator based Isophote Computation. CIT 2006: 124 - [c20]Jae-Min Seol, Seong-Whan Kim:
Efficient Collision-Resilient RFID Tag Identification using Balanced Incomplete Block Design Code. CIT 2006: 220 - [c19]Jae-Min Seol, Seong-Whan Kim:
Collision-Resilient Multi-state Query Tree Protocol for Fast RFID Tag Identification. CIS 2006: 733-742 - [c18]Ki-Hong Ko, Seong-Whan Kim:
Improvement of Film Scratch Inpainting Algorithm Using Sobel Based Isophote Computation over Hilbert Scan Line. CIS 2006: 924-934 - [c17]Seong-Whan Kim, Ki-Hong Ko:
Kalman Filter Based Dead Reckoning Algorithm for Minimizing Network Traffic Between Mobile Nodes in Wireless GRID. EUC 2006: 162-170 - [c16]Jae-Min Seol, Seong-Whan Kim:
Scalable Fingerprinting Scheme Using Statistically Secure Anti-collusion Code for Large Scale Contents Distribution. EUC 2006: 560-569 - [c15]Ki-Hong Ko, Seong-Whan Kim:
Kalman Filter Based H.264 Motion Vector Recovery for Error Resilient Video Service over Mobile GRID. ICDCIT 2006: 168-179 - [c14]Jae-Min Seol, Seong-Whan Kim:
Statistically Secure Anti-Collusion Code Design for Median Attack Robustness for Practical Fingerprinting. Information Hiding 2006: 328-342 - [c13]Seong-Whan Kim, Ki-Hong Ko:
Kalman Filter Based Dead Reckoning Algorithm for Minimizing Network Traffic Between Mobile Game Users in Wireless GRID. PRICAI 2006: 61-70 - [c12]Seong-Whan Kim, Ki-Hong Ko:
Efficient Optimization of Inpainting Scheme and Line Scratch Detection for Old Film Restoration. PRICAI 2006: 623-631 - 2005
- [c11]Seong-Whan Kim, HyunSung Sung:
An Improvement of Auto-correlation Based Video Watermarking Scheme Using Independent Component Analysis. CIS (2) 2005: 643-648 - [c10]Jae-Min Seol, Seong-Whan Kim:
Scalable and Robust Fingerprinting Scheme Using Statistically Secure Extension of Anti-collusion Code. CIS (2) 2005: 1086-1091 - [c9]Jae-Min Seol, Seong-Whan Kim:
Statistically Secure Extension of Anti-collusion Code Fingerprinting. ICDCIT 2005: 404-409 - [c8]Hyun-Seong Sung, Seong-Whan Kim:
An Improvement of Auto-Correlation Based Video Watermarking Scheme Using Perceptual Masking for Motion. ICDCIT 2005: 410-419 - [c7]Seong-Whan Kim, Hyun-Jin Park, Hyun-Seong Sung:
A Natural Modification of Autocorrelation Based Video Watermarking Scheme Using ICA for Better Geometric Attack Robustness. ICNC (2) 2005: 451-460 - [c6]Jae-Min Seol, Seong-Whan Kim:
A Scalable Fingerprinting Scheme for Tracing Traitors/Colluders in Large Scale Contents Distribution Environments. ISDA 2005: 228-233 - [c5]Seong-Whan Kim, HyunSung Sung:
Perceptually Tuned Auto-correlation Based Video Watermarking Using Independent Component Analysis. PCM (2) 2005: 360-370 - [c4]Ki-Hong Ko, Seong-Whan Kim:
Kalman Filter Based Error Resilience for H.264 Motion Vector Recovery. PCM (1) 2005: 664-674 - [c3]Hyon-Gook Kim, Seong-Whan Kim:
An Improvement of Dead Reckoning Algorithm Using Kalman Filter for Minimizing Network Traffic of 3D On-Line Games. PCM (2) 2005: 676-687 - 2004
- [c2]Seong-Whan Kim, Shan Suthaharan:
Perceptually Tuned Packet Scheduler for Video Streaming for DAB Based Access GRID. GCC 2004: 967-970 - [c1]Seong-Whan Kim, Shan Suthaharan:
An Entropy Masking Model for Multimedia Content Watermarking. HICSS 2004 - 2001
- [j3]Seong-Whan Kim, Shan Suthaharan, Heung-Kyu Lee, K. R. Rao:
MPEG-compliant joint source/channel coding using discrete cosine transform and substream scheduling for visual communication over packet networks. J. Electronic Imaging 10(1): 329-338 (2001) - 2000
- [j2]Shan Suthaharan, Seong-Whan Kim, Heung-Kyu Lee, Sivapragasam Sathananthan:
Perceptually tuned robust watermarking scheme for digital images. Pattern Recognit. Lett. 21(2): 145-149 (2000)
1990 – 1999
- 1999
- [j1]Seong-Whan Kim, Shan Suthaharan, Geun-Ho Lee, Heung-Kyu Lee, K. R. Rao:
Joint Source/Channel Coding to Maximize Perceptual Video Quality on Packet Networks. Real Time Imaging 5(5): 329-339 (1999)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 22:57 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint