Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Data Management Challenges and Opportunities in Cloud Computing

    Analyzing large data is a challenging problem today, as there is an increasing trend of applications being expected to deal with vast amounts of data that usually do not fit in the main memory of a single mach...

    Kyuseok Shim, Sang Kyun Cha, Lei Chen in Database Systems for Advanced Applications (2012)

  2. No Access

    Chapter and Conference Paper

    A Scalable Pipeline Data Processing Framework Using Database and Visualization Techniques

    Intelligent pipeline inspection gauges (PIGs) are inspection vehicles that move along within a gas (or oil) pipeline and acquire signals from their surrounding rings of sensors. By analyzing the signals captur...

    Wook-Shin Han, Soon Ki Jung, Jeyong Shin in Advanced Intelligent Computing Theories an… (2007)

  3. No Access

    Chapter and Conference Paper

    Generating High Dimensional Data and Query Sets

    Previous researches on multidimensional indexes typically have used synthetic data sets distributed uniformly or normally over multidimensional space for performance evaluation. These kinds of data sets hardly...

    Sang-Wook Kim, Seok-Ho Yoon, Sang-Cheol Lee in SOFSEM 2007: Theory and Practice of Comput… (2007)

  4. No Access

    Chapter and Conference Paper

    Enforcement of Integrated Security Policy in Trusted Operating Systems

    The main focus of Trusted Operating System (TOS) research these days is on the enhanced access control of reference monitors which, in turn, control the individual operations on a given access instance. Howeve...

    Hyung Chan Kim, R. S. Ramakrishna, Wook Shin in Advances in Information and Computer Secur… (2007)

  5. No Access

    Chapter and Conference Paper

    CC-GiST: Cache Conscious-Generalized Search Tree for Supporting Various Fast Intelligent Applications

    According to the advance of technologies, the speed gap between CPU and main memory is getting larger every year. Due to the speed gap, it was perceived important to make the most use of the cache residing bet...

    Won-Sik Kim, Woong-Kee Loh, Wook-Shin Han in Intelligence and Security Informatics (2006)

  6. Chapter and Conference Paper

    Performance Analysis of the Cache Conscious-Generalized Search Tree

    Recently, a main memory index structure called the cache conscious-generalized search tree (CC-GiST) was proposed. The CC-GiST is such a novel index structure that it can be used for implementing all the exist...

    Won-Sik Kim, Woong-Kee Loh, Wook-Shin Han in Computational Science – ICCS 2006 (2006)

  7. No Access

    Chapter and Conference Paper

    Type-Level Access Pattern View: A Technique for Enhancing Prefetching Performance

    Navigational applications on Object-Relational DBMSs (ORDBMSs) access objects in the database related to one another via reference and collection attributes. When accessing an object, the applications first lo...

    Wook-Shin Han, Woong-Kee Loh, Kyu-Young Whang in Database Systems for Advanced Applications (2006)

  8. No Access

    Chapter and Conference Paper

    Efficient Evaluation of Partial Match Queries for XML Documents Using Information Retrieval Techniques

    We propose XIR, a novel method for processing partial match queries on heterogeneous XML documents using information retrieval (IR) techniques. A partial match query is defined as the one having the descendent...

    Young-Ho Park, Kyu-Young Whang, Byung Suk Lee in Database Systems for Advanced Applications (2005)

  9. No Access

    Chapter and Conference Paper

    New Mechanisms for End-to-End Security Using IPSec in NAT-Based Private Networks

    While the transition from IPv4 to IPv6 has been considered to extend the IP address space, the NAT protocol is widely used as an interim solution. Using the NAT protocol with the end-to-end IPSec resulting a c...

    Sung Yong Kim, ** Wook Shin, Sun Young Sim in Web and Communication Technologies and Int… (2003)