Skip to main content

previous disabled Page of 2
and
  1. No Access

    Chapter and Conference Paper

    In-Vehicle Information Design to Enhance the Experience of Passengers in Autonomous Public Buses

    The purpose of this study is to propose a concept design for an In-Vehicle Information System (IVIS) of an autonomous bus that provides an Autonomous Mobility on Demand (AMoD) service. First, we conducted a li...

    Myunglee Kim, Jeongyun Heo in HCI in Mobility, Transport, and Automotive Systems (2021)

  2. No Access

    Chapter and Conference Paper

    Estimation of Greenhouse Gas Emissions in Cement Manufacturing Process Through Blockchain and SSL Based IoT Data Analysis

    Recently, the Internet of Things (IoT) system, which supports human activities based on various types of real data, has attracted attention in various fields. However, the behavior of the system is determined ...

    Byeongseop Kim, Myungsoo Kim, Jongpil Jeong in Computational Science and Its Applications… (2020)

  3. No Access

    Chapter and Conference Paper

    Design and Mobile Tracking Performance of a Retro-Directive Array (RDA) Antenna System

    Beamforming is one of the most important technologies for wireless communication systems. A beamforming antenna system can control the radiation beam pattern and thus can reduce power consumption, compared wi...

    Myunggi Kim, Taebum Gu, Heung-Gyoon Ryu in Ad Hoc Networks (2019)

  4. No Access

    Chapter and Conference Paper

    Open Source Based Industrial IoT Platforms for Smart Factory: Concept, Comparison and Challenges

    As Internet of Things (IoT) and Services are applied to manufacturing industries, Industry 4.0 is evolving. For Industry 4.0 to be realized in the factory, it is essential to implement horizontal integration o...

    Myungsoo Kim, Jaehyeong Lee, Jongpil Jeong in Computational Science and Its Applications… (2019)

  5. No Access

    Chapter and Conference Paper

    Search-and-Compute on Encrypted Data

    Private query processing on encrypted databases allows users to obtain data from encrypted databases in such a way that the user’s sensitive data will be protected from exposure. Given an encrypted database, t...

    Jung Hee Cheon, Miran Kim, Myungsun Kim in Financial Cryptography and Data Security (2015)

  6. No Access

    Chapter and Conference Paper

    Bubble Task: A Dynamic Execution Throttling Method for Multi-core Resource Management

    Memory bandwidth is a major resource which is shared among all CPU cores. The development speed of memory bandwidth cannot catch up with the increasing number of CPU cores. Thus, the contention for occupying m...

    Dongyou Seo, Myungsun Kim, Hyeonsang Eom in Job Scheduling Strategies for Parallel Pro… (2015)

  7. No Access

    Chapter and Conference Paper

    Run Away If You Can: Persistent Jamming Attacks against Channel Hop** Wi-Fi Devices in Dense Networks

    Wireless local area networks (WLANs) can adopt channel hop** technologies in order to avoid unintentional interferences such as radars or microwaves, which function as proactive jamming signals. Even though ...

    Il-Gu Lee, Hyunwoo Choi, Yongdae Kim in Research in Attacks, Intrusions and Defens… (2014)

  8. No Access

    Chapter and Conference Paper

    Private Over-Threshold Aggregation Protocols

    In this paper, we revisit the private k  +  data aggregation problem, and formally define the problem’s security requirements as both data and user privacy goals. To achieve both goals, and to str...

    Myungsun Kim, Abedelaziz Mohaisen in Information Security and Cryptology – ICIS… (2013)

  9. No Access

    Chapter and Conference Paper

    Main Content Extraction from Web Documents Using Text Block Context

    Due to various Web authoring tools, the new web standards, and improved web accessibility, a wide variety of Web contents are being produced very quickly. In such an environment, in order to provide appropriat...

    Myungwon Kim, Young** Kim, Wonmoon Song in Database and Expert Systems Applications (2013)

  10. No Access

    Chapter and Conference Paper

    Mutual Private Set Intersection with Linear Complexity

    A private set intersection (PSI) protocol allows players to obtain the intersection of their inputs. While in its unilateral version only the client can obtain the intersection, the mutual PSI protocol enables...

    Myungsun Kim, Hyung Tae Lee, Jung Hee Cheon in Information Security Applications (2012)

  11. No Access

    Chapter and Conference Paper

    Data Dissemination Protocol Based on Home Agent and Access Node for Mobile Sink in Mobile Wireless Sensor Networks

    Achieving efficient data dissemination to a mobile sink moving is one of the main challenges in wireless sensor networks. In this paper, we describe DHA, a data Dissemination protocol based on Home agent and A...

    Joa Hyoung Lee, Jae Myung Kim in Convergence and Hybrid Information Technol… (2011)

  12. No Access

    Chapter and Conference Paper

    Multiplicative Attribute Graph Model of Real-World Networks

    Large scale real-world network data such as social and information networks are ubiquitous. The study of such networks seeks to find patterns and explain their emergence through tractable models. In most netwo...

    Myunghwan Kim, Jure Leskovec in Algorithms and Models for the Web-Graph (2010)

  13. No Access

    Chapter and Conference Paper

    Active Binding Technology: A Reuse-Enabling Component Model

    One of the primary obstacles to the reuse of independently-developed binary components on the industrial level lies in that the existing component technologies do not clearly separate component assembly from c...

    Anmo Jeong, Seungnam Jeong, Yoonsun Lim in High Confidence Software Reuse in Large Sy… (2008)

  14. No Access

    Chapter and Conference Paper

    The DecoyPort: Redirecting Hackers to Honeypots

    Most of computer security systems use the signatures of well-known attacks to detect hackers’ attacks. For these systems, it is very important to get the accurate signatures of new attacks as soon as possible....

    Iksu Kim, Myungho Kim in Network-Based Information Systems (2007)

  15. No Access

    Chapter and Conference Paper

    Consolidating with Media Streaming Server and Network Storage Card

    Recently there have been a large number of multimedia demands of IP-based applications in tremendous Internet world. However, Internet-based multimedia services typically do not offer any quality of service be...

    YongJu Lee, SongWoo Sok, HagYoung Kim, MyungJoon Kim in Network-Based Information Systems (2007)

  16. Chapter and Conference Paper

    Reliable and Scalable State Management Using Migration of State Information in Web Services

    The WS-Resource framework (WSRF) was proposed as a reengineering and evolution of OGSI to be compatible with the current Web services conventions and specifications. Although WSRF separates state management fr...

    Jongbae Moon, Hyungil Park, Myungho Kim in Computational Science – ICCS 2007 (2007)

  17. Chapter and Conference Paper

    Design and Implementation of a Resource Management System Using On-Demand Software Streaming on Distributed Computing Environment

    As distributed computing has become a large-scale environment such as grid computing, software resource management is rising as the key issue. In this paper, we propose a new resource management system, which ...

    Jongbae Moon, Sangkeon Lee, Jaeyoung Choi, Myungho Kim in Computational Science – ICCS 2006 (2006)

  18. No Access

    Chapter and Conference Paper

    An Enterprise Security Management System as a Web-Based Application Service for Small/Medium Businesses

    Enterprises use security equipments in order to protect their information assets from various attacks such as viruses and hacking. However, such individual equipments hardly provide enterprise level integrated...

    Yoonsun Lim, Myung Kim, Kwang Hee Seo, Ho Kun Moon in Information Security and Cryptology (2006)

  19. No Access

    Chapter and Conference Paper

    Multi-level Independent Component Analysis

    This paper presents a new method which uses multi-level density estimation technique to generate score function in ICA (independent Component Analysis). Score function is very closely related with density func...

    Woong Myung Kim, Chan Ho Park, Hyon Soo Lee in Advances in Neural Networks - ISNN 2006 (2006)

  20. No Access

    Chapter and Conference Paper

    Collaborative Filtering Based on Neural Networks Using Similarity

    Recommendation is to offer information which fits user’s interests and tastes to provide better services and to reduce information overload. It recently draws attention upon Internet users and information prov...

    Eunju Kim, Myungwon Kim, Joungwoo Ryu in Advances in Neural Networks – ISNN 2005 (2005)

previous disabled Page of 2