Skip to main content

and
  1. Chapter and Conference Paper

    A Unified Route Optimization Scheme for Network Mobility

    Recently Network Mobility(NEMO) is being concerned as new mobility issue. Lots of NEMO issues are already being touched in IETF NEMO WG but the solution is still premature especially to the Route Optimization ...

    Jongkeun Na, Jaehyuk Choi, Seongho Cho, Chongkwon Kim in Personal Wireless Communications (2004)

  2. No Access

    Chapter and Conference Paper

    Discovering Technology Intelligence from Document Data in an Organisation

    Technology Intelligence (TI) systems provide a mechanism for identifying business opportunities and threats. Until now, despite the increasing interest on TI, little attention has been paid to the analysis tec...

    Sungjoo Lee, Letizia Mortara, Clive Kerr in EKC2008 Proceedings of the EU-Korea Confer… (2008)

  3. No Access

    Chapter and Conference Paper

    Development of Integrated Operation, Low-End Energy Building Engineering Technology in Korea

    The purpose of this project is to improve efficiency through aggressive application of individual new technologies related to building energy savings, and from their cross integration with other technologies. ...

    Soo Cho, ** Sung Lee, Cheol Yong Jang in EKC2008 Proceedings of the EU-Korea Confer… (2008)

  4. No Access

    Chapter and Conference Paper

    Technology Co-evolution Analysis in the Energy Sector

    This paper suggests the method that can describe the co-evolutionary patterns in the energy sectors. Technologies that have facilitated the growth of other technologies should get the priority in the R&D inves...

    Sungjoo Lee, Byungun Yoon in EKC 2009 Proceedings of the EU-Korea Confe… (2010)

  5. No Access

    Chapter and Conference Paper

    Exploitation and Exploration as Links between Psychological Empowerment and Creativity

    This paper examines the mediating effect of ambidexterity (exploitation and exploration) between psychological empowerment and creativity. We found that psychological empowerment had strong influence on exploi...

    Dae Sung Lee, Kun Chang Lee in Embedded and Multimedia Computing Technology and Service (2012)

  6. No Access

    Chapter and Conference Paper

    Practical Firewall Policy Inspection Using Anomaly Detection and Its Visualization

    Due to the increasing cyber threats, firewall has become the one of the core elements in network security. The effectiveness of firewall security is dependent on providing policy management techniques. For thi...

    Ui-Hyong Kim, Jung-Min Kang, Jae-Sung Lee in Proceedings of the International Conferenc… (2012)

  7. No Access

    Chapter and Conference Paper

    An M2M-Based Interface Management Framework for Vehicles with Multiple Network Interfaces

    The Intelligent Transportation System (ITS) can be considered the most representative example of Machine-to-Machine (M2M) applications in a standardization and commercial market. To support the applications, u...

    Hong-Jong Jeong, Sungwon Lee, Dongkyun Kim in IT Convergence and Security 2012 (2013)

  8. No Access

    Chapter and Conference Paper

    Experimental Development and Evaluation of IEEE 802.21 MIH for Enterprise WiMAX/WLAN Environments

    IEEE 802.11 WLAN is being considered to handle rapidly growing mobile data requirements. IEEE 802.11 WLAN providing faster data rates than cellular, but mobility is not considered. In this paper, I propose tha...

    Gyusun Yi, Eunchong Na, Sungwon Lee in Ubiquitous Information Technologies and Applications (2013)

  9. No Access

    Chapter and Conference Paper

    Performance Analysis of SPDY Protocol in Wired and Mobile Networks

    Google proposed the new application-layer protocol named SPDY with the purpose of complementing problems of HTTP/1.1 to improve web speed. In this paper we evaluate the SPDY protocol’s performance in a variety...

    HeeJung Kim, GyuSun Yi, HanNa Lim in Ubiquitous Information Technologies and Ap… (2014)

  10. No Access

    Chapter and Conference Paper

    Development of a PC-Based Code Simulator for Verifying Ubiquitous Embedded Software

    Embedded system is playing a significant role in the ubiquitous computing. Therefore, verification of embedded software is necessary and important. In order to verify embedded software, a software developer ha...

    Sooyong Jeong, Sunghee Lee, Woo ** Lee in Ubiquitous Information Technologies and Ap… (2014)

  11. No Access

    Chapter and Conference Paper

    Quality-Workload Tradeoff in Pig Activity Monitoring Application

    Generally, there is a tradeoff between quality and computational workload required to obtain that quality. In this paper, we focus on practical issues in implementing a pig activity monitoring system. We first...

    Haelyeon Kim, Yeonwoo Chung, Sungju Lee in Mobile, Ubiquitous, and Intelligent Comput… (2014)

  12. No Access

    Chapter and Conference Paper

    Power-Time Tradeoff of Parallel Execution on Multi-core Platforms

    It is anticipated that high-performance handheld multi-core devices will be used as WSN processing nodes in the near future. Reducing execution time by deploying parallel applications on multi-core platforms c...

    Sungju Lee, Heegon Kim, Yongwha Chung in Mobile, Ubiquitous, and Intelligent Computing (2014)

  13. No Access

    Chapter and Conference Paper

    Parallel Processing of Multimedia Data in a Heterogeneous Computing Environment

    Recently, many multimedia applications can be parallelized by using multicore platforms such as CPU and GPU. In this paper, we propose a parallel processing approach for a multimedia application by using both ...

    Heegon Kim, Sungju Lee, Yongwha Chung, Daihee Park in Multimedia and Ubiquitous Engineering (2014)

  14. No Access

    Chapter and Conference Paper

    Profiling-Based Energy-Aware Recommendation System for Cloud Platforms

    With rise in energy costs, operational costs for managing cloud infrastructures are also increasing. This is an opportunity to present an energy-aware recommendation system for cloud platforms. This paper pres...

    Muhammad Bilal Amin, Shujaat Hussain, Manhyung Han in Computer Science and its Applications (2015)

  15. No Access

    Chapter and Conference Paper

    A PSO Based Coverage Hole Patching Scheme for WSNs

    In this paper, a mobile assist node deployment algorithm is proposed to patch coverage holes in wireless sensor network (WSNs). In initial phase, sensor nodes are randomly deployed in target area, they remain...

    ** Wang, Chunwei Ju, Hye-** Kim in Advances in Computer Science and Ubiquitou… (2018)

  16. No Access

    Chapter and Conference Paper

    A Study on Evidences Stored in Android Smartphones

    Smartphones have become a necessity of modern people and have been used for various purposes beyond simple call and text transmission and reception. Therefore, various personal information has been stored in s...

    Moses Kwak, Jisun Kim, Sungwon Lee in Advances in Computer Science and Ubiquitou… (2021)

  17. No Access

    Chapter and Conference Paper

    Static Analysis for Malware Detection with Tensorflow and GPU

    With the advent of malware generation toolkits that automatically generate malware, anyone without a professional skill can easily generate malware. As a result, the number of new/modified malware samples is r...

    Jueun Jeon, Juho Kim, Sunyong Jeon in Advances in Computer Science and Ubiquitou… (2021)