Kim, Hyeong-Il
8577  results:
Search for persons X
?
4

Periodontal biotype modification using a volume-stable coll..:

Kim, Hyun Ju ; Chang, Hyeyoon ; Kim, Sungtae..
Journal of Periodontal & Implant Science.  48 (2018)  6 - p. 395 , 2018
 
?
5

A Privacy-Preserving kNN Classification Algorithm Using Yao..:

, In: 2017 IEEE 10th International Conference on Cloud Computing (CLOUD),
 
?
6

Ridge preservation using basic fibroblast growth factor-2 a..:

Sohn, Byungjin ; Hwang, Minkyoon ; Kim, Sungtae..
Journal of Periodontal & Implant Science.  47 (2017)  6 - p. 381 , 2017
 
?
8

Efficient and secure top-k query processing algorithm using..:

, In: Proceedings of the Sixth International Conference on Emerging Databases: Technologies, Applications, and Theory,
 
?
 
?
11

A Signature-Based Data Security Technique for Energy-Effici..:

Yoon, Min ; Jang, Miyoung ; Kim, Hyeong-Il.
International Journal of Distributed Sensor Networks.  10 (2014)  1 - p. 272537 , 2014
 
?
 
?
13

k-Nearest Neighbor Query Processing Algorithms for a Query ..:

Kim, Hyeong-Il ; Chang, Jae-Woo
Journal of Computer Science and Technology.  28 (2013)  4 - p. 585-596 , 2013
 
?
14

Grid-based cloaking area creation scheme supporting continu..:

, In: Proceedings of the 27th Annual ACM Symposium on Applied Computing,
Lee, Hyunjo ; Oh, Byeong-Seok ; Kim, Hyeong-il. - p. 537-543 , 2012
 
?
15

A privacy-aware location cloaking technique reducing bandwi..:

, In: Proceedings of the Third ACM SIGSPATIAL International Workshop on Querying and Mining Uncertain Spatio-Temporal Data,
Jang, Miyoung ; Yoon, Min ; Kim, Hyeong-il. - p. 2-9 , 2012
 
1-15