Learning to spot and refactor inconsistent method names K Liu, D Kim, TF Bissyandé, T Kim, K Kim, A Koyuncu, S Kim, Y Le Traon 2019 IEEE/ACM 41st International Conference on Software Engineering (ICSE), 1-12, 2019 | 146 | 2019 |
Quality-driven architecture development using architectural tactics S Kim, DK Kim, L Lu, S Park Journal of Systems and Software 82 (8), 1211-1231, 2009 | 121 | 2009 |
A design quality model for service-oriented architecture B Shim, S Choue, S Kim, S Park 2008 15th Asia-Pacific Software Engineering Conference, 403-410, 2008 | 106 | 2008 |
Real time MODBUS transmissions and cryptography security designs and enhancements of protocol sensitive information A Shahzad, M Lee, YK Lee, S Kim, N Xiong, JY Choi, Y Cho Symmetry 7 (3), 1176-1210, 2015 | 101 | 2015 |
Service robot for the elderly M Kim, S Kim, S Park, MT Choi, M Kim, H Gomaa IEEE robotics & automation magazine 16 (1), 34-45, 2009 | 84 | 2009 |
Service identification using goal and scenario in service oriented architecture S Kim, M Kim, S Park 2008 15th Asia-Pacific Software Engineering Conference, 419-426, 2008 | 54 | 2008 |
Automatic identifier inconsistency detection using code dictionary S Kim, D Kim Empirical Software Engineering 21, 565-604, 2016 | 49 | 2016 |
UML-based service robot software development: a case study M Kim, S Kim, S Park, MT Choi, M Kim, H Gomaa Proceedings of the 28th international conference on software engineering …, 2006 | 47 | 2006 |
Api document quality for resolving deprecated apis D Ko, K Ma, S Park, S Kim, D Kim, Y Le Traon 2014 21st Asia-Pacific Software Engineering Conference 2, 27-30, 2014 | 34 | 2014 |
A feature-based approach for modeling role-based access control systems S Kim, DK Kim, L Lu, S Kim, S Park Journal of Systems and Software, 2011 | 32 | 2011 |
Learning to spot and refactor inconsistent method names. In 2019 IEEE/ACM 41st International Conference on Software Engineering (ICSE) K Liu, D Kim, TF Bissyandé, T Kim, K Kim, A Koyuncu, S Kim, Y Le Traon IEEE, 1ś12, 2019 | 22 | 2019 |
A study of fuzzy membership functions for dependence decision-making in security robot system S Kim, M Lee, J Lee Neural Computing and Applications 28, 155-164, 2017 | 22 | 2017 |
Tool support for quality-driven development of software architectures S Kim, DK Kim, S Park Proceedings of the 25th IEEE/ACM International Conference on Automated …, 2010 | 19 | 2010 |
Intelligent robot software architecture J Kim, MT Choi, M Kim, S Kim, M Kim, S Park, J Lee, BK Kim Recent Progress in Robotics: Viable Robotic Service to Human: An Edition of …, 2008 | 17 | 2008 |
A coordination technique for improving scalability of byzantine fault-tolerant consensus J Seo, D Ko, S Kim, S Park Applied Sciences 10 (21), 7609, 2020 | 16 | 2020 |
The protocol design and New approach for SCADA security enhancement during sensors broadcasting system A Shahzad, M Lee, C Lee, N Xiong, S Kim, YK Lee, K Kim, S Woo, ... Multimedia Tools and Applications 75, 14641-14668, 2016 | 16 | 2016 |
Automatic recommendation to omitted steps in use case specification D Ko, S Kim, S Park Requirements Engineering 24, 431-458, 2019 | 15 | 2019 |
A tactic-based approach to embodying non-functional requirements into software architectures S Kim, DK Kim, L Lu, SY Park 2008 12th International IEEE Enterprise Distributed Object Computing …, 2008 | 14 | 2008 |
The functional requirements of core elements for research data management and service J Kim, S Kim, S Choi Journal of the Korean Society for Library and Information Science 53 (3 …, 2019 | 13 | 2019 |
Building sustainable software by preemptive architectural design using tactic-equipped patterns DK Kim, J Ryoo, S Kim 2014 Ninth International Conference on Availability, Reliability and …, 2014 | 13 | 2014 |