Skip to main content

previous disabled Page of 2
and
  1. No Access

    Chapter and Conference Paper

    Estimation of Greenhouse Gas Emissions in Cement Manufacturing Process Through Blockchain and SSL Based IoT Data Analysis

    Recently, the Internet of Things (IoT) system, which supports human activities based on various types of real data, has attracted attention in various fields. However, the behavior of the system is determined ...

    Byeongseop Kim, Myungsoo Kim, Jongpil Jeong in Computational Science and Its Applications… (2020)

  2. No Access

    Chapter and Conference Paper

    Design and Mobile Tracking Performance of a Retro-Directive Array (RDA) Antenna System

    Beamforming is one of the most important technologies for wireless communication systems. A beamforming antenna system can control the radiation beam pattern and thus can reduce power consumption, compared wi...

    Myunggi Kim, Taebum Gu, Heung-Gyoon Ryu in Ad Hoc Networks (2019)

  3. No Access

    Chapter and Conference Paper

    Open Source Based Industrial IoT Platforms for Smart Factory: Concept, Comparison and Challenges

    As Internet of Things (IoT) and Services are applied to manufacturing industries, Industry 4.0 is evolving. For Industry 4.0 to be realized in the factory, it is essential to implement horizontal integration o...

    Myungsoo Kim, Jaehyeong Lee, Jongpil Jeong in Computational Science and Its Applications… (2019)

  4. No Access

    Chapter and Conference Paper

    User Targeting SaaS Application Interworking Service Framework Using Complex Context and Rule-Matrix

    This paper presents complex contexts, rule-matrix and SaaS application inter-working service framework for user targeting service. They are key components in order to decide what SaaS service are needed and ho...

    Jong-** Jung, Yun Cui, Myung** Kim in Advances in Computer Science and Ubiquitou… (2018)

  5. No Access

    Chapter and Conference Paper

    Proposal of a Resource-Monitoring Improvement System Using Amazon Web Service API

    Cloud computing uses virtualization technology to segment mass computing resources into various service types, such as Infrastructure as a Service, Platform as a Service, and Software as a Service. The system ...

    Kyu Ik Kim, Musa Ibrahim M. Ishag in Advances in Computer Science and Ubiquitou… (2017)

  6. No Access

    Chapter and Conference Paper

    Real-Time Dynamic Motion Capture Using Multiple Kinects

    The present paper proposes a method of capturing real-time motions without any inconvenient suit by using several inexpensive sensors vulnerable to joint occlusion and body rotation. Depth data and ICP algori...

    Seongmin Baek, Myunggyu Kim in Advances in Computer Science and Ubiquitous Computing (2017)

  7. No Access

    Chapter and Conference Paper

    Bubble Task: A Dynamic Execution Throttling Method for Multi-core Resource Management

    Memory bandwidth is a major resource which is shared among all CPU cores. The development speed of memory bandwidth cannot catch up with the increasing number of CPU cores. Thus, the contention for occupying m...

    Dongyou Seo, Myungsun Kim, Hyeonsang Eom in Job Scheduling Strategies for Parallel Pro… (2015)

  8. No Access

    Chapter and Conference Paper

    Run Away If You Can: Persistent Jamming Attacks against Channel Hop** Wi-Fi Devices in Dense Networks

    Wireless local area networks (WLANs) can adopt channel hop** technologies in order to avoid unintentional interferences such as radars or microwaves, which function as proactive jamming signals. Even though ...

    Il-Gu Lee, Hyunwoo Choi, Yongdae Kim in Research in Attacks, Intrusions and Defens… (2014)

  9. No Access

    Chapter and Conference Paper

    Mutual Private Set Intersection with Linear Complexity

    A private set intersection (PSI) protocol allows players to obtain the intersection of their inputs. While in its unilateral version only the client can obtain the intersection, the mutual PSI protocol enables...

    Myungsun Kim, Hyung Tae Lee, Jung Hee Cheon in Information Security Applications (2012)

  10. No Access

    Chapter and Conference Paper

    Data Dissemination Protocol Based on Home Agent and Access Node for Mobile Sink in Mobile Wireless Sensor Networks

    Achieving efficient data dissemination to a mobile sink moving is one of the main challenges in wireless sensor networks. In this paper, we describe DHA, a data Dissemination protocol based on Home agent and A...

    Joa Hyoung Lee, Jae Myung Kim in Convergence and Hybrid Information Technol… (2011)

  11. No Access

    Chapter and Conference Paper

    The DecoyPort: Redirecting Hackers to Honeypots

    Most of computer security systems use the signatures of well-known attacks to detect hackers’ attacks. For these systems, it is very important to get the accurate signatures of new attacks as soon as possible....

    Iksu Kim, Myungho Kim in Network-Based Information Systems (2007)

  12. No Access

    Chapter and Conference Paper

    Consolidating with Media Streaming Server and Network Storage Card

    Recently there have been a large number of multimedia demands of IP-based applications in tremendous Internet world. However, Internet-based multimedia services typically do not offer any quality of service be...

    YongJu Lee, SongWoo Sok, HagYoung Kim, MyungJoon Kim in Network-Based Information Systems (2007)

  13. No Access

    Chapter and Conference Paper

    An Enterprise Security Management System as a Web-Based Application Service for Small/Medium Businesses

    Enterprises use security equipments in order to protect their information assets from various attacks such as viruses and hacking. However, such individual equipments hardly provide enterprise level integrated...

    Yoonsun Lim, Myung Kim, Kwang Hee Seo, Ho Kun Moon in Information Security and Cryptology (2006)

  14. No Access

    Chapter and Conference Paper

    Multi-level Independent Component Analysis

    This paper presents a new method which uses multi-level density estimation technique to generate score function in ICA (independent Component Analysis). Score function is very closely related with density func...

    Woong Myung Kim, Chan Ho Park, Hyon Soo Lee in Advances in Neural Networks - ISNN 2006 (2006)

  15. No Access

    Chapter and Conference Paper

    Collaborative Filtering Based on Neural Networks Using Similarity

    Recommendation is to offer information which fits user’s interests and tastes to provide better services and to reduce information overload. It recently draws attention upon Internet users and information prov...

    Eunju Kim, Myungwon Kim, Joungwoo Ryu in Advances in Neural Networks – ISNN 2005 (2005)

  16. No Access

    Chapter and Conference Paper

    Internet at a Crossroads of Education

    The Internet has grown rapidly in the past few years to impact all aspects of modern life. While many areas of the Internet such as commerce has shown tremendous improvements in providing convenient and comple...

    Myung Kim, Sunsook Noh, Seongmin Cho in Web and Communication Technologies and Int… (2005)

  17. No Access

    Chapter and Conference Paper

    Link Layer Assisted Multicast-Based Mobile RSVP (LM-MRSVP)

    Even though several RSVP extensions have been proposed to support QoS guarantee in mobile Internet, they still suffer from issues such as excessive advanced reservations or a nonoptimal path generated by Mobil...

    Hongseock Jeon, Myungchul Kim, Kyunghee Lee in Information Networking. Convergence in Bro… (2005)

  18. Chapter and Conference Paper

    Interoperability Testing Based on a Fault Model for a System of Communicating FSMs

    This paper presents a fault model for interoperability testing of communication protocols that are modeled by communicating finite state machines, and proposes a technique that extends an initial interoperabil...

    Vadim Trenkaev, Myungchul Kim, Soonuk Seol in Testing of Communicating Systems (2003)

  19. No Access

    Chapter and Conference Paper

    An XPATH Query Processor for a Decomposition Storage Scheme

    XML is a markup language that is widely accepted as a standard way of information sharing and exchange, especially on the Web. One of the recent database research issues is to devise ways of storing XML docume...

    Young-Ki Ko, Eui-Kyeong Hong, Myung Kim in Web and Communication Technologies and Int… (2003)

  20. No Access

    Chapter and Conference Paper

    Anonymous Fingerprinting as Secure as the Bilinear Diffie-Hellman Assumption

    The illegal copying and redistribution of digitally-stored information is a crucial problem to distributors who electronically sell digital data. Fingerprinting provides a means which a copyright owner can tra...

    Myungsun Kim, Jongseong Kim, Kwangjo Kim in Information and Communications Security (2002)

previous disabled Page of 2