Skip to main content

and
  1. No Access

    Article

    gCFS: completely fair scheduling on multiple GPUs for improved multi-DNN execution in terms of performance isolation

    Priority-based performance isolation among DNN tasks in a GPU cluster should be achieved from the perspective of GPUs computing DNNs, rather than the tasks on CPUs that supervise the DNNs. In this paper, we pr...

    Ho** Cho, Myungsun Kim in The Journal of Supercomputing (2023)

  2. No Access

    Article

    OLM: online LLC management for container-based cloud service

    In contrast to the hypervisor-based virtualization method, the container-based scheme does not incur the overhead required by virtual machines since it requires neither a fully abstract hardware stack nor sepa...

    Hanul Sung, Myungsun Kim, Jeesoo Min, Hyeonsang Eom in The Journal of Supercomputing (2018)

  3. No Access

    Chapter and Conference Paper

    Bubble Task: A Dynamic Execution Throttling Method for Multi-core Resource Management

    Memory bandwidth is a major resource which is shared among all CPU cores. The development speed of memory bandwidth cannot catch up with the increasing number of CPU cores. Thus, the contention for occupying m...

    Dongyou Seo, Myungsun Kim, Hyeonsang Eom in Job Scheduling Strategies for Parallel Pro… (2015)

  4. No Access

    Chapter and Conference Paper

    Search-and-Compute on Encrypted Data

    Private query processing on encrypted databases allows users to obtain data from encrypted databases in such a way that the user’s sensitive data will be protected from exposure. Given an encrypted database, t...

    Jung Hee Cheon, Miran Kim, Myungsun Kim in Financial Cryptography and Data Security (2015)

  5. No Access

    Chapter and Conference Paper

    Private Over-Threshold Aggregation Protocols

    In this paper, we revisit the private k  +  data aggregation problem, and formally define the problem’s security requirements as both data and user privacy goals. To achieve both goals, and to str...

    Myungsun Kim, Abedelaziz Mohaisen in Information Security and Cryptology – ICIS… (2013)

  6. No Access

    Chapter and Conference Paper

    Mutual Private Set Intersection with Linear Complexity

    A private set intersection (PSI) protocol allows players to obtain the intersection of their inputs. While in its unilateral version only the client can obtain the intersection, the mutual PSI protocol enables...

    Myungsun Kim, Hyung Tae Lee, Jung Hee Cheon in Information Security Applications (2012)

  7. No Access

    Article

    Risk, Mispricing, and Value Investing

    We evaluate the stock return performance of a modified version of the book-to-market strategy and its implications for market efficiency. If the previously documented superior stock return of the book-to-marke...

    Eli Bartov, Myungsun Kim in Review of Quantitative Finance and Accounting (2004)

  8. No Access

    Chapter and Conference Paper

    Anonymous Fingerprinting as Secure as the Bilinear Diffie-Hellman Assumption

    The illegal copying and redistribution of digitally-stored information is a crucial problem to distributors who electronically sell digital data. Fingerprinting provides a means which a copyright owner can tra...

    Myungsun Kim, Jongseong Kim, Kwangjo Kim in Information and Communications Security (2002)

  9. No Access

    Chapter and Conference Paper

    A New Identification Scheme Based on the Bilinear Diffie-Hellman Problem

    We construct an interactive identification scheme based on the bilinear Diffie-Hellman problem and analyze its security. This scheme is practical in terms of key size, communication complexity, and availabilit...

    Myungsun Kim, Kwangjo Kim in Information Security and Privacy (2002)