default search action
Suntae Kim
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j31]Ning Fu, Duksan Ryu, Suntae Kim:
MuSRGM: A Genetic Algorithm-Based Dynamic Combinatorial Deep Learning Model for Software Reliability Engineering. IEICE Trans. Inf. Syst. 107(6): 761-771 (2024) - 2023
- [j30]Taeyoung Kim, Suntae Kim, Duksan Ryu, Jaehyuk Cho:
Deep Tasks Summarization for Comprehending Mixed Tasks in a Commit. Int. J. Softw. Eng. Knowl. Eng. 33(2): 207-229 (2023) - [j29]Mingu Kang, Suntae Kim, Duksan Ryu, Jaehyuk Cho:
Which Exceptions Do We Have to Catch in the Python Code for AI Projects? Int. J. Softw. Eng. Knowl. Eng. 33(3): 375-394 (2023) - [j28]Jiwon Choi, Taeyoung Kim, Duksan Ryu, Jongmoon Baik, Suntae Kim:
Just-in-Time Defect Prediction for Self-driving Software via a Deep Learning Model. J. Web Eng. 22(2): 303-326 (2023) - 2022
- [j27]Jaewook Lee, Jiwon Choi, Duksan Ryu, Suntae Kim:
Holistic Parameter Optimization for Software Defect Prediction. IEEE Access 10: 106781-106797 (2022) - [j26]Tuan Linh Dang, Sy Dat Tran, Thuy Hang Nguyen, Suntae Kim, Nicolas Monet:
An improved hand gesture recognition system using keypoints and hand bounding boxes. Array 16: 100251 (2022) - [j25]Mingu Kang, Taeyoung Kim, Suntae Kim, Duksan Ryu:
Gradle-Autofix: An Automatic Resolution Generator for Gradle Build Error. Int. J. Softw. Eng. Knowl. Eng. 32(4): 583-603 (2022) - [j24]Jae-Young Choi, Jee-Hyong Lee, Younghwa Cho, Suntae Kim, Jeong-Ah Kim, Seang-Yong Lee:
Visualization of knowledge map for monitoring knowledge diagnoses. J. Ambient Intell. Humaniz. Comput. 13(3): 1615-1623 (2022) - [j23]Jiwon Choi, Jaewook Lee, Duksan Ryu, Suntae Kim, Jongmoon Baik:
GAIN-QoS: A Novel QoS Prediction Model for Edge Computing. J. Web Eng. 21(1) (2022) - [j22]Tuan Linh Dang, Huu Thang Nguyen, Duc Manh Dao, Hoang Vu Nguyen, Duc Long Luong, Ba Tuan Nguyen, Suntae Kim, Nicolas Monet:
SHAPE: a dataset for hand gesture recognition. Neural Comput. Appl. 34(24): 21849-21862 (2022) - 2021
- [c29]Taeyoung Kim, Suntae Kim, Duksan Ryu:
Coding™: Development Task Visualization for SW Code Comprehension. VISSOFT 2021: 23-32 - 2020
- [j21]Taeyoung Kim, Suntae Kim, Sooyong Park, YoungBeom Park:
Automatic recommendation to appropriate log levels. Softw. Pract. Exp. 50(3): 189-209 (2020) - [c28]Dong-Hyun Hwang, Suntae Kim, Nicolas Monet, Hideki Koike, Soonmin Bae:
Lightweight 3D Human Pose Estimation Network Training Using Teacher-Student Learning. WACV 2020: 468-477 - [i1]Dong-Hyun Hwang, Suntae Kim, Nicolas Monet, Hideki Koike, Soonmin Bae:
Lightweight 3D Human Pose Estimation Network Training Using Teacher-Student Learning. CoRR abs/2001.05097 (2020)
2010 – 2019
- 2019
- [j20]Sangheon Lee, Noo-Ri Kim, YoungWha Cho, Jae-Young Choi, Suntae Kim, Jeong-Ah Kim, Jee-Hyong Lee:
Adversarial Detection with Gaussian Process Regression-based Detector. KSII Trans. Internet Inf. Syst. 13(8): 4285-4299 (2019) - [j19]Deokyoon Ko, Suntae Kim, Sooyong Park:
Automatic recommendation to omitted steps in use case specification. Requir. Eng. 24(4): 431-458 (2019) - [c27]Sangjin Nam, Suntae Kim, Jung-Hoon Shin, Jeong Ah Kim, Sooyong Park:
Context Data Preprocessing for Context-Aware Smartphone Authentication. ICCSA (5) 2019: 190-202 - [c26]Kui Liu, Dongsun Kim, Tegawendé F. Bissyandé, Tae-young Kim, Kisub Kim, Anil Koyuncu, Suntae Kim, Yves Le Traon:
Learning to spot and refactor inconsistent method names. ICSE 2019: 1-12 - 2018
- [j18]Tae-young Kim, Suntae Kim, Jeong-Ah Kim, Jae-Young Choi, Jee-Huong Lee, YoungWha Cho, Young-Kwang Nam:
Automatic identification of Java Method Naming Patterns Using Cascade K-Medoids. KSII Trans. Internet Inf. Syst. 12(2): 873-891 (2018) - [j17]Noo-Ri Kim, YunSeok Choi, HyunSoo Lee, Jae-Young Choi, Suntae Kim, Jeong-Ah Kim, YoungWha Cho, Jee-Hyong Lee:
Detection of document modification based on deep neural networks. J. Ambient Intell. Humaniz. Comput. 9(4): 1089-1096 (2018) - [c25]Tae-young Kim, Suntae Kim, Cheol-Jung Yoo, Soohwan Cho, Sooyong Park:
An Automatic Approach to Validating Log Levels in Java. APSEC 2018: 623-627 - [c24]Jae-Young Choi, Young-Hwa Cho, Chin-Chol Kim, Yeong-Il Kwon, JeongAh Kim, Suntae Kim, EunSeok Kim:
Study on Process of Data Processing and Analysis Based on Geographic Information. ICCSA (4) 2018: 382-393 - [c23]Sangchul Choi, Suntae Kim, Jeong-Hyu Lee, JeongAh Kim, Jae-Young Choi:
Measuring the Extent of Source Code Readability Using Regression Analysis. ICCSA (4) 2018: 410-421 - [c22]SeungYong Choi, JeongAh Kim, Suntae Kim:
Software R&D Process Framework for Process Tailoring with EPF Cases. ICCSA (4) 2018: 527-538 - [c21]Suntae Kim, Sooyong Park, YoungBeom Park, JeongAh Kim, Young-Hwa Cho, Jae-Young Choi, Chin-Chol Kim:
A Feature based Content Analysis of Blockchain Platforms. ICUFN 2018: 791-793 - 2017
- [j16]Tae-young Kim, Suntae Kim, Sangchul Choi, Jeong-Ah Kim, Jae-Young Choi, Jong-Won Ko, Jee-Huong Lee, YoungWha Cho:
A Machine-Learning Based Approach for Extracting Logical Structure of a Styled Document. KSII Trans. Internet Inf. Syst. 11(2): 1043-1056 (2017) - [j15]Suntae Kim, Malrey Lee, Jongho Lee:
A study of fuzzy membership functions for dependence decision-making in security robot system. Neural Comput. Appl. 28(1): 155-164 (2017) - [c20]Suntae Kim, Joongi Hong, Seounghan Song, Sangchul Choi, JeongAh Kim, Jae-Young Choi, Young-Hwa Cho:
Toward Offline Contents Based Software R&D Support System. CSA/CUTE 2017: 1097-1101 - [c19]Jae-Young Choi, Jong-Won Ko, Suntae Kim, Young-Hwa Cho:
Visualization Approach for R&D Monitoring - A Tracking of Research Contents Changes Perspective. CSA/CUTE 2017: 1108-1113 - 2016
- [j14]Suntae Kim, Dongsun Kim:
Automatic identifier inconsistency detection using code dictionary. Empir. Softw. Eng. 21(2): 565-604 (2016) - [j13]Junha Lee, Dae-Kyoo Kim, Suntae Kim, Sooyong Park:
Decomposing class responsibilities using distance-based method similarity. Frontiers Comput. Sci. 10(4): 612-630 (2016) - [j12]Deokyoon Ko, Sooyong Park, Yourim Kim, Soojin Park, Suntae Kim:
Suggesting Alternative Scenarios Using Use Case Specification Patterns for Requirement Completeness. Int. J. Softw. Eng. Knowl. Eng. 26(6): 927-952 (2016) - [j11]Aamir Shahzad, Malrey Lee, Changhoon Lee, Naixue Xiong, Suntae Kim, Young Keun Lee, Kangmin Kim, Seon-Mi Woo, Gisung Jeong:
The protocol design and New approach for SCADA security enhancement during sensors broadcasting system. Multim. Tools Appl. 75(22): 14641-14668 (2016) - [j10]Aamir Shahzad, Malrey Lee, Suntae Kim, Kangmin Kim, Jae-Young Choi, Younghwa Cho, Keun Kwang Lee:
Design and Development of Layered Security: Future Enhancements and Directions in Transmission. Sensors 16(1): 37 (2016) - [j9]Eunji Hwang, Suntae Kim, Tae-kyung Yoo, Jik-Soo Kim, Soonwook Hwang, Young-ri Choi:
Resource Allocation Policies for Loosely Coupled Applications in Heterogeneous Computing Systems. IEEE Trans. Parallel Distributed Syst. 27(8): 2349-2362 (2016) - [c18]Jung-Hoon Shin, Mesfin Abebe, Cheol-Jung Yoo, Suntae Kim, Jeong-Hyu Lee, Hee-Kyung Yoo:
Evaluating the Effectiveness of the Vector Space Retrieval Model Indexing. CSA/CUTE 2016: 680-685 - [c17]Suntae Kim, Myung-Seok Choi:
Study on data center and data librarian role for reuse of research data. KST 2016: 303-308 - 2015
- [j8]Suntae Kim:
A quantitative and knowledge-based approach to choosing security architectural tactics. Int. J. Ad Hoc Ubiquitous Comput. 18(1/2): 45-53 (2015) - [j7]Aamir Shahzad, Malrey Lee, Young Keun Lee, Suntae Kim, Naixue Xiong, Jae-Young Choi, Young-Hwa Cho:
Real Time MODBUS Transmissions and Cryptography Security Designs and Enhancements of Protocol Sensitive Information. Symmetry 7(3): 1176-1210 (2015) - [c16]Jong-Won Ko, Suntae Kim, Jae-Young Choi, Young-Hwa Cho:
Contents Based Traceability Between Research Artifact and Process for R&D Projects. CSA/CUTE 2015: 891-898 - [c15]JeongAh Kim, Suntae Kim, Jae-Young Choi, Jong-Won Ko, YoungWha Cho:
Do We Need New Management Perspectives for Software Research Projects? ICCSA (4) 2015: 401-410 - 2014
- [j6]Suntae Kim, Wongoo Lee:
Global data repository status and analysis: based on Korea, China and Japan. Libr. Hi Tech 32(4): 706-722 (2014) - [j5]Jungwook Cho, Youngjoo Woo, Suntae Kim, Euiseong Seo:
A battery lifetime guarantee scheme for selective applications in smart mobile devices. IEEE Trans. Consumer Electron. 60(1): 155-163 (2014) - [c14]Dae-Kyoo Kim, Jungwoo Ryoo, Suntae Kim:
Building Sustainable Software by Preemptive Architectural Design Using Tactic-Equipped Patterns. ARES 2014: 484-489 - [c13]Deokyoon Ko, Kyeongwook Ma, Sooyong Park, Suntae Kim, Dongsun Kim, Yves Le Traon:
API Document Quality for Resolving Deprecated APIs. APSEC (2) 2014: 27-30 - 2012
- [j4]Suntae Kim, Jintae Kim, Sooyong Park:
An active learning framework for object-oriented analysis and design. Comput. Appl. Eng. Educ. 20(3): 400-409 (2012) - [c12]Sungnam Lee, Suntae Kim, JeongAh Kim, Sooyong Park:
Detecting Inconsistent Names of Source Code Using NLP. FGIT-EL/DTA/UNESST 2012: 111-115 - 2011
- [j3]Sangsig Kim, Dae-Kyoo Kim, Lunjin Lu, Suntae Kim, Sooyong Park:
A feature-based approach for modeling role-based access control systems. J. Syst. Softw. 84(12): 2035-2052 (2011) - [c11]Sangsig Kim, Dae-Kyoo Kim, Lunjin Lu, Sooyong Park, Suntae Kim:
A Feature-Based Modeling Approach for Building Hybrid Access Control Systems. SSIRI 2011: 88-97 - 2010
- [c10]Suntae Kim, Minseong Kim, Vijayan Sugumaran, Sooyong Park:
A Scenario Based Approach for Service Identification. COMPSAC Workshops 2010: 237-238 - [c9]Suntae Kim, Dae-Kyoo Kim, Sooyong Park:
Tool support for quality-driven development of software architectures. ASE 2010: 127-130 - [c8]Suntae Kim, Bingu Shim, Jeong Ah Kim, InSook Cho:
SW Architecture for Access to Medical Information for Knowledge Execution. SUComS 2010: 574-580
2000 – 2009
- 2009
- [j2]Suntae Kim, Dae-Kyoo Kim, Lunjin Lu, Sooyong Park:
Quality-driven architecture development using architectural tactics. J. Syst. Softw. 82(8): 1211-1231 (2009) - [j1]Minseong Kim, Suntae Kim, Sooyong Park, Mun-Taek Choi, Munsang Kim, Hassan Gomaa:
Service robot for the elderly. IEEE Robotics Autom. Mag. 16(1): 34-45 (2009) - [c7]Suntae Kim, Jintae Kim, Sooyong Park, Dae-Kyoo Kim:
GARDIAN: A Tool for Validating Rule-Based Modeling Methods. QSIC 2009: 161-166 - [c6]Bingu Shim, Beomho Baek, Suntae Kim, Sooyong Park:
A Robot Fault-Tolerance Approach Based on Fault Type. QSIC 2009: 296-304 - 2008
- [c5]Dongsun Kim, Suntae Kim, Seokhwan Kim, Sooyong Park:
Software Engineering Education Toolkit for Embedded Software Architecture Design Methodology Using Robotic Systems. APSEC 2008: 317-324 - [c4]Bingu Shim, Siho Choue, Suntae Kim, Sooyong Park:
A Design Quality Model for Service-Oriented Architecture. APSEC 2008: 403-410 - [c3]Suntae Kim, Minseong Kim, Sooyong Park:
Service Identification Using Goal and Scenario in Service Oriented Architecture. APSEC 2008: 419-426 - [c2]Suntae Kim, Dae-Kyoo Kim, Lunjin Lu, Sooyong Park:
A Tactic-Based Approach to Embodying Non-functional Requirements into Software Architectures. EDOC 2008: 139-148 - 2006
- [c1]Minseong Kim, Suntae Kim, Sooyong Park, Mun-Taek Choi, Munsang Kim, Hassan Gomaa:
UML-based service robot software development: a case study. ICSE 2006: 534-543
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 21:19 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint