Skip to main content

previous disabled Page of 149
and
  1. Article

    Open Access

    PIER: cyber-resilient risk assessment model for connected and autonomous vehicles

    As more vehicles are being connected to the Internet and equipped with autonomous driving features, more robust safety and security measures are required for connected and autonomous vehicles (CAVs). Therefore...

    Seunghyun Park, Hyunhee Park in Wireless Networks (2024)

  2. No Access

    Article

    Fusion-attention network using dense scale-invariant feature transform flow image and point cloud for 3D pedestrian detection

    In this paper, we introduce a fusion-attention network for three-dimensional (3D) pedestrian detection using the fusion of dense scale-invariant feature transform (SIFT) flow image and point cloud data. Becaus...

    Sang Kyoo Park, Jun Ho Chung, Dong Sung Pae in Multimedia Tools and Applications (2024)

  3. No Access

    Article

    I/O-signature-based feature analysis and classification of high-performance computing applications

    The demand for high-performance computing (HPC) resources in computing fields such as machine learning has increased significantly in recent years. Computing power has been growing exponentially to keep up wit...

    Ju-Won Park, **n Huang, Jae-Kook Lee, Taeyoung Hong in Cluster Computing (2024)

  4. No Access

    Article

    Cancellable biometrics based on the index-of-maximum hashing with random sparse binary encoding

    The wide deployment of biometrics has prompted enormous security and privacy concerns regarding biometric template protection. Cancellable biometrics is one of the most representative countermeasures that maps...

    Jihyeon Kim, Jaewoo Park, Cheng Yaw Low in Multimedia Tools and Applications (2024)

  5. No Access

    Article

    EENet: embedding enhancement network for compositional image-text retrieval using generated text

    In this paper, we consider the compositional image-text retrieval task, which searches for appropriate target images given a reference image with feedback text as a query. For instance, when a user finds a dre...

    Chan Hur, Hyeyoung Park in Multimedia Tools and Applications (2024)

  6. No Access

    Article

    Focal segmentation for robust 6D object pose estimation

    In the field of augmented reality, 6D pose estimation of rigid objects poses limitations and challenges. Most of the previous 6D pose estimation methods have trained deep neural networks to directly regress po...

    Yuning Ye, Hanhoon Park in Multimedia Tools and Applications (2024)

  7. No Access

    Article

    Securing multi-client range queries over encrypted data

    Order-revealing encryption (ORE) allows secure range query processing over encrypted databases through a publicly accessible comparison function, while kee** other details concealed. Since parameter-hiding O...

    Jae Hwan Park, Zeinab Rezaeifar, Changhee Hahn in Cluster Computing (2024)

  8. No Access

    Article

    Human-oriented video retargeting via object detection and patch decision

    In this study, we suggest a novel video retargeting approach by considering the essential factors of a video: main object and movement thereof. Such two factors have been considered including the region of int...

    Dong-Hwi Kim, Su** Lee, Jaehyun Bae, Sukee Cho in Multimedia Tools and Applications (2024)

  9. Article

    Correction: Scalable NUMA-aware persistent B+-tree for non-volatile memory devices

    Safdar Jamil, Abdul Salam, Awais Khan, Bernd Burgstaller in Cluster Computing (2024)

  10. No Access

    Article

    Quantification of tremor dynamics via video-based analysis

    Tremor is a common movement disorder diagnosed employing electrophysiological methods. Today, machine learning (ML) algorithms can efficiently analyze image-based data. Thus, we subjected the dynamics of essen...

    Seung-Hwan Lee, Dongseop Lee, Jihoon Park in Multimedia Tools and Applications (2024)

  11. No Access

    Article

    Fast depth intra mode decision using intra prediction cost and probability in 3D-HEVC

    3D-HEVC, which is a HEVC-compatible 3D video coding standard, was mainly developed to efficiently compress both a texture image and a depth map. Since the characteristics of the depth map are drastically diffe...

    ** Young Lee, Sang-hyo Park in Multimedia Tools and Applications (2024)

  12. No Access

    Article

    Development of an eye-tracking and voice command interface to facilitate GUI operation for people with disabled upper limbs

    Eye-tracking technology can be used for interaction functions involving the manipulation of various types of web content by replacing the functions of conventional input devices, such as mouse and keyboard. Ho...

    Soon-Bum Lim, Joo Hyun Park in Universal Access in the Information Society (2024)

  13. Article

    Open Access

    Movement computation of an articulated body using coordinate transformation

    In this paper, we propose a new formula for calculating the motion of an articulated rigid body using images obtained with a moving camera with an autofocus ability. Each of the input image scenes consists of ...

    Jihun Park in Multimedia Tools and Applications (2024)

  14. No Access

    Article

    What makes consumers trust and adopt fintech? An empirical investigation in China

    Building upon the information systems success model (ISSM) and the theory of reasoned action (TRA), we suggest a set of hypotheses related to fintech services consumer adoption, and we use survey data from a s...

    Taewoo Roh, Young Soo Yang, Shufeng **ao, Byung Il Park in Electronic Commerce Research (2024)

  15. No Access

    Chapter

    AI-Native Network Algorithms and Architectures

    Haemin Lee, Soohyun Park, Hankyul Baek in Fundamentals of 6G Communications and Netw… (2024)

  16. No Access

    Chapter

    Convergence of 6G and Wi-Fi Networks

    Before the 3G era, research on the convergence of cellular networks and WLAN had withered due to the lack of need and slow data rates, but since the advent of LTE, there have been various studies to converge L...

    Hyunsoo Lee, Soohyun Park, Minjae Yoo in Fundamentals of 6G Communications and Netw… (2024)

  17. No Access

    Chapter and Conference Paper

    Evaluating Image Similarity Using Contextual Information of Images with Pre-trained Models

    This study proposes an integrated approach to image similarity measurement by extending traditional methods that concentrate on local features to incorporate global information. Global information, including b...

    Juyeon Kim, Sungwon Park, Byunghoon Park in Mobile, Secure, and Programmable Networking (2024)

  18. No Access

    Chapter

    AI-Native Communications

    The emergence of artificial intelligence (AI)-based methods evolving from 5G to 6G is accelerating. Therefore, to optimize the communication system in the 6G era, it is essential to adapt several AI-based opti...

    Hankyul Baek, Haemin Lee, Soohyun Park in Fundamentals of 6G Communications and Netw… (2024)

  19. No Access

    Book and Conference Proceedings

  20. No Access

    Chapter and Conference Paper

    A Comparative Study on Methods to Interact with Close-Distance Objects in Mixed Reality Environment: Direct Method vs. Raycasting Method

    Mixed Reality (MR) technology allows users to interact with virtual objects generated in the real world intuitively

    Sang Jun Park, Min Joo Kim, Yu Gyeong Son, Donggun Park in HCI International 2024 Posters (2024)

previous disabled Page of 149