Skip to main content

previous disabled Page of 2
and
  1. No Access

    Book and Conference Proceedings

    Database Systems for Advanced Applications

    18th International Conference, DASFAA 2013, International Workshops: BDMA, SNSM, SeCoP, Wuhan, China, April 22-25, 2013. Proceedings

    Bonghee Hong, **aofeng Meng, Lei Chen in Lecture Notes in Computer Science (2013)

  2. No Access

    Chapter and Conference Paper

    A Study on MapReduce Processing for Multi-dimensional Continuous Query

    A huge volume of sensor stream data can be efficiently handle with the MapReduce framework for processing multi-dimensional continuous queries. The MapReduce originally has been used for batch processing, not ...

    Doseong Jeong, Seungwoo Jeon, Bonghee Hong in Database Systems for Advanced Applications (2013)

  3. No Access

    Book and Conference Proceedings

    The Impact of Virtual, Remote, and Real Logistics Labs

    First International Conference, ImViReLL 2012 Bremen, Germany, February 28 – March 1, 2012 Proceedings

    Dieter Uckelmann, Bernd Scholz-Reiter in Communications in Computer and Information Science (2012)

  4. No Access

    Chapter and Conference Paper

    A Scalable Object Based Discovery Service for Global Tracing of RFID Products

    Radio-Frequency Identification (RFID) technology can provide global visibility for each product by the Discovery Service (DS) of EPCglobal, the de facto international standard for RFID. Only the role of a DS h...

    Gihong Kim, Bonghee Hong, Joonho Kwon in Database Systems for Advanced Applications (2012)

  5. No Access

    Article

    A Reprocessing Model for Complete Execution of RFID Access Operations on Tag Memory

    This paper investigates the problem of inconsistent states of radio frequency identification (RFID) tag data caused by incomplete execution of read/write operations during access to RFID tag memory. Passive RF...

    Wooseok Ryu, Bonghee Hong, Joonho Kwon, Ge Yu in Journal of Computer Science and Technology (2012)

  6. No Access

    Article

    Aggressive Complex Event Processing with Confidence over Out-of-Order Streams

    In recent years, there has been a growing need for complex event processing (CEP), ranging from supply chain management to security monitoring. In many scenarios events are generated in different sources but a...

    Chuan-Wen Li, Yu Gu, Ge Yu, Bonghee Hong in Journal of Computer Science and Technology (2011)

  7. No Access

    Chapter and Conference Paper

    Smart Warehouse Modeling Using Re-recording Methodology with Sensor Tag

    As the recent growth of RFID technologies, a goal of productivity has been achieved in various industry areas where the technologies are used. With this change, a number of RFID logistics systems have been stu...

    Gwangsoo Lee, Wooseok Ryu, Bonghee Hong in Secure and Trust Computing, Data Managemen… (2011)

  8. No Access

    Chapter and Conference Paper

    Integration Retrieval of History Data and Sensing Information Using SGLN Code in Extended RFID Application

    The current logistics system is constructed considering only one environment. For example, if the tag is attached to the item, the user can manage only historical data of the item. However, the user demands va...

    Seungwoo Jeon, Gihong Kim, Bonghee Hong in Secure and Trust Computing, Data Managemen… (2011)

  9. No Access

    Chapter and Conference Paper

    Design and Implementation of a Virtual Reader for Emulation of RFID Physical Reader

    Recently, RFID technology has become one of essential technologies, which applies to a wide area of applications such as logistic, manufacture and pharmacy. Testing of RFID middleware is a critical process to ...

    Jiwan Lee, Jekwan Park, Wooseok Ryu in Secure and Trust Computing, Data Managemen… (2011)

  10. No Access

    Chapter and Conference Paper

    A Graph Model Based Simulation Tool for Generating RFID Streaming Data

    Since raw RFID streaming data is continuous, voluminous, incomplete, temporal and spatial, RFID applications cannot directly make use of it. As a key component of RFID systems, an RFID middleware needs to clea...

    Haipeng Zhang, Joonho Kwon, Bonghee Hong in Web Technologies and Applications (2011)

  11. No Access

    Chapter and Conference Paper

    An Efficient Processing Scheme for Continuous Queries Involving RFID and Sensor Data Streams

    RFID technology is being applied to the wide field of distributions and logistics for item-level tracking of tagged goods. Recently, spoilage and abnormalities of product in Blood Supply Chain (BSC), Cold Chai...

    Jeongwoo Park, Kwangjae Lee, Wooseok Ryu in Secure and Trust Computing, Data Managemen… (2011)

  12. No Access

    Chapter and Conference Paper

    Real-Time Quantity Inspection Method for Moving Tags in RFID Middleware

    Huge amount of goods passes to the customers, which are produced in factories or packaged by the box in wholesalers. At this time, if does not inspect the exactly number of products in the box while packaging,...

    Goo Kim, Wooseok Ryu, Bonghee Hong in Secure and Trust Computing, Data Managemen… (2011)

  13. No Access

    Chapter and Conference Paper

    An RSN Tool : A Test Dataset Generator for Evaluating RFID Middleware

    Evaluation of RFID middleware is a complex process due to its cost for constructing a test bed involving RFID readers and tags. An input dataset of the RFID middleware is a tag event stream from connected read...

    Wooseok Ryu, Joonho Kwon, Bonghee Hong in Secure and Trust Computing, Data Managemen… (2011)

  14. No Access

    Chapter and Conference Paper

    A Reprocessing Model Based on Continuous Queries for Writing Data to RFID Tag Memory

    This paper investigates the problem of writing data to passive RFID tag memory and proposes a reprocessing model for assuring the atomicity and durability of writing transactions in volatile RF communications....

    Wooseok Ryu, Bonghee Hong in Database Systems for Advanced Applications (2009)

  15. No Access

    Chapter and Conference Paper

    Reordering of Location Identifiers for Indexing an RFID Tag Object Database

    The query performance for tracing tags depends upon the distribution of tag trajectories in the data space. We examine a more efficient representation of tag trajectories by means of ordering the set of domain...

    Sungwoo Ahn, Bonghee Hong in Database and Expert Systems Applications (2008)

  16. No Access

    Chapter and Conference Paper

    The Self-relocating Index Scheme for Telematics GIS

    The history management of vehicles is important in telematics applications. To process queries for history data, trajectories, we generally use trajectory-preserving index schemes based on the trajectory prese...

    Duksung Lim, Bonghee Hong, Daesoo Cho in Web and Wireless Geographical Information Systems (2005)

  17. No Access

    Chapter and Conference Paper

    Time Parameterized Interval R-Tree for Tracing Tags in RFID Systems

    For tracing tag locations, the trajectories should be modeled and indexed in a radio frequency identification (RFID) system. The trajectory of a tag is represented as a line that connects two spatiotemporal lo...

    ChaeHoon Ban, BongHee Hong, DongHyun Kim in Database and Expert Systems Applications (2005)

  18. No Access

    Chapter and Conference Paper

    A Progressive Reprocessing Transaction Model for Updating Spatial Data in Mobile Computing Environments

    Mobile transactions for updating spatial data are long-lived transactions that update local copies of the mobile platforms on disconnection. Since a mobile transaction is physically separated from its global t...

    Donghyun Kim, Bonghee Hong in Web and Wireless Geographical Information Systems (2005)

  19. No Access

    Chapter and Conference Paper

    Concurrent Updating of Large Spatial Objects

    The update transactions to be executed in spatial databases have been usually known as interactive and long duration works. When a spatial object has a very large geometry of which size is larger than the scre...

    Youngduk Seo, Donghyun Kim, Bonghee Hong in Database Systems for Advanced Applications (2004)

  20. No Access

    Chapter and Conference Paper

    Growing Node Policies of a Main Memory Index Structure for Moving Objects Databases

    Recent studies on main memory index structures focus mainly on cache-conscious structures to minimize L2 cache misses; for example, in one dimensional data, CSB+-tree eliminated pointers to pack more entries i...

    Kyounghwan An, Bonghee Hong in Database and Expert Systems Applications (2004)

previous disabled Page of 2