Skip to main content

and
  1. No Access

    Article

    VoIP encryption module for securing privacy

    A VoIP encryption module was designed to prevent eavesdrop** on Internet telephones communications and involved encoding/decoding the output data at the transmitter and receiver of the Internet telephone. To...

    Byounghee Son, Euiseok Nahm, Hagbae Kim in Multimedia Tools and Applications (2013)

  2. No Access

    Article

    A design of RFTOG model for distributed real-time applications

    In this paper, we design the Real-Time Fault-Tolerant Object Group (RFTOG) model that supports the grou** of distributed objects that are required for distributed application. The proposed model basically pr...

    Myungseok Kang, Hagbae Kim in Journal of Intelligent Manufacturing (2009)

  3. No Access

    Chapter and Conference Paper

    Facial Expression Recognition Using Active Appearance Model

    This paper describes a facial expression recognition system based upon Active Appearance Model (AAM), which has been typically used for the face recognition task. Given that AAM has been also used in tracking ...

    Taehwa Hong, Yang-Bok Lee, Yong-Guk Kim in Advances in Neural Networks - ISNN 2006 (2006)

  4. Chapter and Conference Paper

    Face Representation Method Using Pixel-to-Vertex Map (PVM) for 3D Model Based Face Recognition

    3D model based approach for face recognition has been spotlighted as a robust solution under variant conditions of pose and illumination. Since a generative 3D face model consists of a large number of vertices...

    Taehwa Hong, Hagbae Kim, Hyeonjoon Moon in Computer Vision in Human-Computer Interact… (2006)

  5. No Access

    Chapter and Conference Paper

    Grid Access Middleware for Handheld Devices

    Grid technology attempts to support flexible, secure, coordinated information sharing among dynamic collections of individuals, institutions, and resources. The use of Grid services requires a resourceful work...

    Saad Liaquat Kiani, Maria Riaz, Sungyoung Lee in Advances in Grid Computing - EGC 2005 (2005)

  6. No Access

    Chapter and Conference Paper

    Development of a Residential Gateway and a Service Server for Home Automation

    We have developed a residential gateway that centralizes device interfacing between the external Internet and internal devices as well as appliance networks. We have also proposed the concept of a service serv...

    Jongkyu Park, Ilseok Han, **hyuck Kwon in Advanced Internet Services and Applications (2002)

  7. No Access

    Chapter and Conference Paper

    A Personal Internet Live-Broadcasting System

    In the paper, we present an internet personal-live broadcasting server system. Our solution enables amateur users to broadcast with basic multimedia equipments. For the scalable system architecture, the broadc...

    Sangmoon Lee, Sinjun Kang, Byungseok Min in Advanced Internet Services and Applications (2002)

  8. Chapter and Conference Paper

    A Dual- LAN Topology with the Dual- Path Ethernet Module

    A Dual-Path Ethernet Module (DPEM) is developed to improve Local Area Network (LAN)’s performance and High Availability (HA). Since a DPEM simply locates at the front end of any network device as a transparent...

    Jihoon Park, Jonggyu Park, Ilsuk Han, Hagbae Kim in Euro-Par 2002 Parallel Processing (2002)

  9. No Access

    Chapter and Conference Paper

    A Genetic Routing Algorithm for a 2D—Meshed Fault—Tolerant Network System

    Unreliable data delivery due to network instability leads general network systems to serious situations. Especially in case of reliability-critical applications, a fault-tolerant routing is gaining more attent...

    Sangmoon Lee, Daekeun Moon, Hagbae Kim in Advanced Internet Services and Applications (2002)

  10. No Access

    Chapter

    Derivation and Use of Deadline Information in Real-Time Control Systems

    This section presents a method for deriving the hard deadline of a real-time control system, which captures the interplay between a controlled process and its controller computer by formally specifying the nee...

    Kang G. Shin, Hagbae Kim in Foundations of Dependable Computing (1994)