Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Early Wildfire Detection Using Convolutional Neural Network

    Wildfires are one of the disasters that are difficult to detect early and cause significant damage to human life, ecological systems, and infrastructure. There have been several research attempts to detect wi...

    Seon Ho Oh, Sang Won Ghyme, Soon Ki Jung, Geon-Woo Kim in Frontiers of Computer Vision (2020)

  2. No Access

    Chapter and Conference Paper

    Design Considerations for an Intelligent Video Surveillance System Using Cloud Computing

    Recently, deep neural network and cloud computing based intelligent video surveillance technology are growing interests in the industrial and academia. The synergy with both technologies emerges as a key role ...

    Kyung-Soo Lim, Seoung-Hyeon Lee in Parallel and Distributed Computing, Applic… (2019)

  3. No Access

    Chapter and Conference Paper

    Prototype System Design for Large-Scale Person Re-identification

    Identifying a person across cameras in disjoint views at different time and location has important applications in visual surveillance. However, it is difficult to apply existing methods to the development of...

    Seon Ho Oh, Seung-Wan Han, Beom-Seok Choi in Advanced Multimedia and Ubiquitous Enginee… (2017)

  4. No Access

    Chapter and Conference Paper

    Face Recognition for Mobile Self-authentication with Online Model Update

    Face recognition system encounters complex change that varies over time, due to a limited control over the environment. So, the facial model of an individual tends to diverse from underlying distribution that ...

    Seon Ho Oh, Geon-Woo Kim in Advanced Multimedia and Ubiquitous Engineering (2017)

  5. No Access

    Chapter and Conference Paper

    ID Globalization Across Multiple Convergence Spaces Using Smart Cameras

    This paper suggests a scheme for ID globalization, wherein the single successful authentication at initial stage requires no further authentication check while traversing multiple convergence spaces. This is d...

    Geon Woo Kim, Jong Wook Han in Ubiquitous Information Technologies and Applications (2013)

  6. Chapter and Conference Paper

    Security Technologies Based on Home Gateway for Making Smart Home Secure

    As home network is expanding into ubiquitous computing environment and lots of private information is accessible, it is required to protect home network system from illegal accesses and security threats in ope...

    Geon Woo Kim, Deok Gyu Lee, Jong Wook Han in Emerging Directions in Embedded and Ubiqui… (2007)

  7. No Access

    Chapter and Conference Paper

    Security Framework for Home Network: Authentication, Authorization, and Security Policy

    As a number of home network services are available and home network is expanding into ubiquitous computing environment, we need to protect home network system from illegal accesses and a variety of threats. Ho...

    Geon Woo Kim, Deok Gyu Lee, Jong Wook Han in Emerging Technologies in Knowledge Discove… (2007)

  8. No Access

    Chapter and Conference Paper

    Security Policy Deployment in IPsec

    Security policy system defines the basic rules and strategies for information security systems, e.g., IPsec, IKE, and Firewalls. But due to the heterogeneous network security systems and the corresponding appl...

    Geon Woo Kim, So Hee Park, Jae Hoon Nah in Information Networking: Wireless Communica… (2002)