Search For:

Displaying 1-43 out of 43 total
mRT-PLRU: A General Framework for Real-Time Multitask Executions on NAND Flash Memory
Found in: IEEE Transactions on Computers
By Duhee Lee, Jong-Chan Kim, Chang-Gun Lee, Kanghee Kim
Issue Date:April 2013
pp. 758-771
This paper proposes a novel technique called mRT-PLRU (Multitasking Real-Time constrained combination of Pinning and LRU), which forms a generic framework to use inexpensive nonvolatile NAND flash memory for storing and executing real-time programs in mult...
 
Experimental Results of Single Carrier Digital Modulation for Underwater Sensor Networks
Found in: Embedded and Ubiquitous Computing, IEEE/IFIP International Conference on
By Se-young Kim, Jeong-woo Han, Ki-man Kim, Sang-hoon Baek, Hyung-chul Kim, Chang-hwa Kim
Issue Date:December 2010
pp. 326-330
This paper presents the experimental results of single carrier digital modulation schemes for underwater sensor networks. To obtain a real sea data of acoustic communications, an experiment was performed at the shallow water environments. ASK and FSK were ...
 
On-line cursive Korean character recognition by using curvature models
Found in: Document Analysis and Recognition, International Conference on
By Byung Hwan Jun, Moo Young Kim, Chang Soo Kim, Woo Seong Kim, Jaihie Kim
Issue Date:August 1995
pp. 1051
A cursive Korean character consists of several Korean alphabets where connection is present within and among the alphabets. Recognition of Korean characters can be carried out by splitting each character into smaller primitives. Small line segments can be ...
 
Adaptive image and video retargeting technique based on Fourier analysis
Found in: Computer Vision and Pattern Recognition, IEEE Computer Society Conference on
By Jun-Seong Kim, Jin-Hwan Kim, Chang-Su Kim
Issue Date:June 2009
pp. 1730-1737
An adaptive image and video retargeting algorithm based on Fourier analysis is proposed in this work. We first divide an input image into several strips using the gradient information so that each strip consists of textures of similar complexities. Then, w...
 
Multi-Player Virtual Ping-Pong Game
Found in: International Conference on Artificial Reality and Telexistence
By Young-Bum Kim, Seung-Hoon Han, Sun-Jeong Kim, Eun-Ju Kim, Chang-Geun Song
Issue Date:November 2007
pp. 269-273
In this paper we show how a motion capture system and feedback mechanism can be integrated into a virtual pingpong game to create a multi-player platform. To trace the motion of each player, optical markers are attached to different places on each player?s...
 
Development of a High-performance Domain-wise Parallel Direct Solver for Large-scale Structural Analysis
Found in: High Performance Computing and Grid in Asia Pacific Region, International Conference on
By Jeong Ho Kim, Chang Sung Lee, Seung Jo Kim
Issue Date:July 2004
pp. 267-274
Most of researches for large-scale parallel structural analysis using finite element method have focused on iterative solution methods since direct solution methods generally have many difficulties and disadvantages for large-scale problems. However, due t...
 
Discrete Differential Error Metric for Surface Simplification
Found in: Computer Graphics and Applications, Pacific Conference on
By Sun-Jeong Kim, Soo-Kyun Kim, Chang-Hun Kim
Issue Date:October 2002
pp. 276
<p>In this paper we propose a new discrete differential error metric for surface simplification. Many surface simplification algorithms have been developed in order to produce rapidly high quality approximations of polygonal models, and the quadric e...
 
Adaptive Synthesis of Distance Fields
Found in: IEEE Transactions on Visualization and Computer Graphics
By Sung-Ho Lee,Taejung Park,Jong-Hyeon Kim,Chang-Hun Kim
Issue Date:July 2012
pp. 1135-1145
We address the computational resource requirements of 3D example-based synthesis with an adaptive synthesis technique that uses a tree-based synthesis map. A signed-distance field (SDF) is determined for the 3D exemplars, and then new models can be synthes...
 
IPSAP : A High-performance Parallel Finite Element Code for Large-scale Structural Analysis Based on Domain-wise Multifrontal Technique
Found in: SC Conference
By Seung Jo Kim, Chang Sung Lee, Jeong Ho Kim, Minsu Joh, Sangsan Lee
Issue Date:November 2003
pp. 32
Most of researches for large-scale parallel structural analysis have focused on iterative solution methods since direct solution methods generally have many difficulties and disadvantages for large-scale problems. However, due to the numerical robustness o...
 
Application of VR Technology Linked with 4D CAD System for Construction Project
Found in: New Trends in Information and Service Science, International Conference on
By Leen-Seok Kang, Hyoun-Seok Moon, Seo-Young Park, Hyoun-Seong Kim, Chang-Hak Kim
Issue Date:July 2009
pp. 1058-1062
4D CAD system is a simulation tool for visualizing the finished appearance of construction facility by construction schedule. That is, project manager can continuously simulate the changed appearance of the facility with 3D type by each construction time s...
 
Scalable Montgomery Multiplier for Finite Fields GF(p) and GF(2^m)
Found in: Electronic Design, Test and Applications, IEEE International Workshop on
By Tae Ho Kim, Sang Chul Kim, Chang Hoon Kim, Chun Pyo Hong
Issue Date:January 2008
pp. 458-461
This paper presents a scalable dual-field Montgomery multiplier based on a new multi-precision carry save adder (MP-CSA), which operates in both types of finite fields GF(p) and GF(2^m). We also design a word-level adder for cryptographic applications by r...
 
Efficient Malicious Code Detection Using N-Gram Analysis and SVM
Found in: Network-Based Information Systems, International Conference on
By Junho Choi,Hayoung Kim,Chang Choi,Pankoo Kim
Issue Date:September 2011
pp. 618-621
-- As the use of the internet increases, the distribution of web based malicious code has also vastly increased. By inputting malicious code that can attack vulnerabilities, it enables one to perform various illegal acts, such as SQL Injection and Cross Si...
 
Mobile Robot Exploration via Pseudo Range Model
Found in: Computers, Networks, Systems and Industrial Engineering, ACIS/JNU International Conference on
By Ryun Seok Kim, Hyukdoo Choi, Euntai Kim, Chang-Woo Park
Issue Date:May 2011
pp. 108-110
This paper presents an autonomous exploration system using a robot equipped with a vision sensor but no range sensor. The fully automatic exploration system operating on a mobile robot determines the next motion in the environment. We extract ceiling bound...
 
CUDA-based Signed Distance Field Calculation for Adaptive Grids
Found in: Computer and Information Technology, International Conference on
By Taejung Park, Sung-Ho Lee, Jong-Hyun Kim, Chang-Hun Kim
Issue Date:July 2010
pp. 1202-1206
We present a simple yet robust signed distance field (SDF) generator based on recent GPU architectures. In our approach, the squared Euclidean distance is calculated for each triangle face in parallel, and then an optimized stream reduction process is used...
 
Effects of Retinoic Acid-induced PKC-d on the Insulin Like Growth Factor-I (IGF-I)System is Involved in Reactive Oxygen Species (ROS) in MCF-7 Cells
Found in: BioMedical Engineering and Informatics, International Conference on
By Young-Il Oh, Sang-Hoon Kim, Jong-Hoon Kim, Chang-Won Kang
Issue Date:May 2008
pp. 863-866
All-trans retinoic acid (RA) as a useful therapeutic anti-cancer agent is known to induce apoptosis and growth inhibition of human breast cancer cells (MCF-7 cells). Whereas insulin like growth factor-I (IGF-I) plays an important role in proliferation of c...
 
Grid Resource Management System and Semantic Information System
Found in: Advanced Information Networking and Applications Workshops, International Conference on
By Hyung-Lae Kim, Tae-Nyun Kim, Chang-Sung Jeong
Issue Date:March 2008
pp. 1666-1671
In this paper, we present semantic Grid management system (SGMS) and semantic information system (SIS) for efficient Grid application execution services. SGMS is a centralized Grid service middleware for executing resource allocation, data distribution, jo...
 
An Efficient Workcase Classification Method and Tool in Workflow Mining
Found in: Computer and Information Science, ACIS International Conference on
By Min-Jae Park, Kwang-Hoon Kim, Chang-Min Kim
Issue Date:July 2005
pp. 80-85
<p>This paper conceives a workcase classification method and implements it as a tool so as to be used in workflow mining systems. The method is for resolving the workcase classification problem issued for mining an activity firing or execution sequen...
 
A digital chip for robust speech recognition in noisy environment
Found in: Acoustics, Speech, and Signal Processing, IEEE International Conference on
By Chang-Min Kim, Chang-Min Kim
Issue Date:May 2001
pp. 1089-1092
A digital chip has been developed for isolated word recognition in real-world noisy environments. By carefully comparing recognition performance and hardware implementability a modified-ZCPA model and RBF neural network model are selected for the feature e...
 
A Safe Stochastic Analysis with Relaxed Limitations on the Periodic Task Model
Found in: IEEE Transactions on Computers
By Kanghee Kim, Chang-Gun Lee
Issue Date:May 2009
pp. 634-647
This paper proposes a safe stochastic analysis for fixed-priority scheduling, which is applicable to a broader spectrum of periodic tasks than the ones analyzable by any of the existing techniques. The proposed analysis can find a safe upper-bound of deadl...
 
Stochastic Analysis of Periodic Real-Time Systems
Found in: Real-Time Systems Symposium, IEEE International
By José Luis Díaz, Daniel F. García, Kanghee Kim, Chang-Gun Lee, Lucia Lo Bello, José María López, Sang Lyul Min, Orazio Mirabella
Issue Date:December 2002
pp. 289
This paper describes a stochastic analysis method for general periodic real-time systems. The proposed method accurately computes the response time distribution of each task in the system, thus making it possible to determine the deadline miss probability ...
 
Design and Development of Multimedia Cultural Contents for Virtual Reality - Gogurye Ancient Tomb Mural
Found in: 2014 International Conference on Information Science and Applications (ICISA)
By YuKyong Lee,Yong-Hwan Lee,Sung-Ho Hong,Youngseop Kim,Chang-June Kim
Issue Date:May 2014
pp. 1-2
In this paper, we design and develop an educational virtual system which can experience Goguryeo tomb murals in the virtual world. Goguryeo tomb murals are well known in the world, and they are registered as a UNESCO World Heritage site by the value Acknow...
   
Experimental feasibility study on using ultrasonic reflections for indoor human movement tracking
Found in: Service-Oriented Computing and Applications, IEEE International Conference on
By Kang Wook Kim,Chang Gun Lee
Issue Date:December 2011
pp. 1-3
The localization systems using Time Difference of Arrival (TDoA) of ultrasonic and RF signals are hard to be used in practical settings because of line-of-sight limitation of the ultrasonic signal. Overcoming this limitation, novel multi-lateration method ...
 
A Memory-Efficient Unified Early Z-Test
Found in: IEEE Transactions on Visualization and Computer Graphics
By Hong-Yun Kim, Chang-Hyo Yu, Lee-Sup Kim
Issue Date:September 2011
pp. 1286-1294
The Unified Early Z-Test (U-EZT) is proposed to examine the visibility of pixels during tile-based rasterization in a mobile 3D graphics processor. U-EZT combines the advantages of the Z-max and Z-min EZT algorithms: the Z-max algorithm is improved by the ...
 
Tree-Based Clustering(TBC) for Energy Efficient Wireless Sensor Networks
Found in: Advanced Information Networking and Applications Workshops, International Conference on
By Kyung Tae Kim, Chang Hoon Lyu, Sung Soo Moon, Hee Yong Youn
Issue Date:April 2010
pp. 680-685
Wireless sensor networks are widely used for gathering data in an autonomous fashion. Since sensors are power constrained devices, it is quite important for them to minimize the energy consumption. In this paper we propose a novel tree-based clustering (TB...
 
Analyzing Decision-Making Patterns Based on Uncertain Information in a Supply Chain Environment
Found in: Convergence Information Technology, International Conference on
By Ki-Kwang Lee, In-Gyum Kim, Chang-Hee Han
Issue Date:November 2008
pp. 177-183
With the corporate environment nowadays being surrounded by plenty of information, the sharing of information among businesses through mutual cooperation tops the list of hot issues. Predictions of demands from the customer, business, or consumer by sharin...
 
An optimal parallel matching algorithm for a convex bipartite graph on a mesh-connected computer
Found in: Parallel Processing Symposium, International
By Myung-Ho Kim, Chang-Sung Jeong, Myung-Soo Kim
Issue Date:April 1994
pp. 229-233
We address the problem of finding a maximum matching for a convex bipartite graph on a mesh-connected computer (MCC). We show that this can be done in optimal time on MCC by designing the efficient merge and division schemes in bottom-up and top-down appro...
 
A novel simulation framework for supporting real-time cyber-physical interactions
Found in: Service-Oriented Computing and Applications, IEEE International Conference on
By Kyoung-Soo We,Jong-Chan Kim,Chang-Gun Lee
Issue Date:December 2011
pp. 1-3
Simulation methods are widely used when designing complex systems to reduce the development effort and cost. Especially when designing cyber-physical systems (CPSs), the importance of the simulation grows bigger and bigger. To simulate CPSs precisely, a ho...
 
Holistic Optimization of Real-Time IEEE 802.15.4/ZigBee Networks
Found in: Advanced Information Networking and Applications, International Conference on
By Myung-Gon Park, Kang-Wook Kim, Chang-Gun Lee
Issue Date:March 2011
pp. 443-450
IEEE 802.15.4 is a global standard designed for emerging applications in low-rate wireless personal area networks (LR-WPANs). The standard provides nice features such as a beacon-enabled mode and guaranteed time slots for real-time data delivery. However, ...
 
Global Wireless Machine-to-Machine Standardization
Found in: IEEE Internet Computing
By Kim Chang,A Soong,M Tseng, Zhixian Xiang
Issue Date:March 2011
pp. 64-69
Machine-to-machine (M2M) communications are gaining more prominence in wireless communication. However, the current systems are optimized more for human-to-human (H2H) than M2M communications. Therefore it's important that wireless technologies evolve and ...
 
Policy-based hybrid workflow management system for advanced heart disease identification
Found in: Computer-Based Medical Systems, IEEE Symposium on
By Woo-Ram Jung, Chan-Hyun Youn, Hoeyoung Kim, Chang Hee Han
Issue Date:August 2009
pp. 1-6
As computer and network technology grows, medical application is become more complex to solve the physiological problems within expected time. Workflow management systems (WMS) in Grid computing are becoming more important to solve the sophisticated proble...
 
Design of RFID-Based Profiling Agent for Recommendation System in Smart Home
Found in: Networked Computing and Advanced Information Management, International Conference on
By Jong-Hun Kim, Chang-Woo Song, Jung-Hyun Lee, Kee-Wook Rim
Issue Date:August 2009
pp. 1223-1226
Research on ubiquitous environment has been being conducted actively until now. In particular, a user positioning system provides user location data, which is the most important context information in applications based on context information. Despite thei...
 
Humming-based human verification and identification
Found in: Acoustics, Speech, and Signal Processing, IEEE International Conference on
By Minho Jin, Jaewook Kim, Chang D. Yoo
Issue Date:April 2009
pp. 1453-1456
This paper considers humming-based systems for human verification and identification. Humming of a target person is modeled as a Gaussian mixture model, and the matching score between a target model and humming is computed as the likelihood of humming give...
 
Real-Time Monitoring of Multi Mobile Objects with USN and GML
Found in: Future Generation Communication and Networking
By Sung-Won Kim, Chang-Wu Lee, Won-Hee Han, Sung-Jin Baek, Eun-Ha Song, Young-Sik Jeong
Issue Date:December 2008
pp. 110-115
As Services utilizing USN increases, various simulators that virtually enables sensor network have been developed. This paper suggests MOUL framework – a framework that provides status information of sensor network with mobile object – which is different f...
 
A Phylogenetic Analysis for Stock Market Indices Using Time-Series String Alignments
Found in: Convergence Information Technology, International Conference on
By Hyong-Jun Kim, Chang-Keon Ryu, Dong-Sung Ryu, Hwan-Gue Cho
Issue Date:November 2008
pp. 487-492
Predicting stock is very difficult and complex since there are lots of variables we should consider. Most of stock system usually deals with the stock indices and their properties. But recent stock system can not provide clearly the classification accordin...
 
Tracking 3D Human Body using Particle Filter in Moving Monocular Camera
Found in: Pattern Recognition, International Conference on
By Sungmin Kim, Chang-Beom Park, Seong-Whan Lee
Issue Date:August 2006
pp. 805-808
In this paper, we propose a method for human tracking using 3D human body model in a video sequence with a monocular moving camera. Tracking a human with unconstrained movement in moving monocular camera image sequence is extremely challenging. Our 3D huma...
 
Bundle Authentication and Authorization Using XML Security in the OSGi Service Platform
Found in: Computer and Information Science, ACIS International Conference on
By Hee-Young Lim, Young-Gab Kim, Chang-Joo Moon, Doo-Kwan Baik
Issue Date:July 2005
pp. 502-507
<p>OSGi service platform is the core platform of a gateway in the home network. One of the most important issues is security in the home network because the usage scope of the home network is related to a personal living space. However, the solutions...
 
Measuring Software Product Quality: A Survey of ISO/IEC 9126
Found in: IEEE Software
By Ho-Won Jung, Seung-Gweon Kim, Chang-Shin Chung
Issue Date:September 2004
pp. 88-92
The international standard ISO/IEC 9126 defines a quality model for software products. The model categorizes software product attributes into six characteristics, which are further subdivided into 27 subcharacteristics. Based on a user survey, this explora...
 
A Service Bundle Authentication Mechanism in the OSGi Service Platform
Found in: Advanced Information Networking and Applications, International Conference on
By Young-Gab Kim, Chang-Joo Moon, Dae-Ha Park, Doo-Kwon Baik
Issue Date:March 2004
pp. 420
The services in the OSGi framework environment are deployed dynamically according to the service gateway and the life-cycle of a service bundle. Services also have interactions with other services. In this paper, we propose a bundle authentication mechanis...
 
Word Segmentation of Printed Text Lines Based on Gap Clustering and Special Symbol Detection
Found in: Pattern Recognition, International Conference on
By Soo H. Kim, Chang B. Jeong, Hee K. Kwag, Ching Y. Suen
Issue Date:August 2002
pp. 20320
This paper proposes a word segmentation method for machine-printed text lines. It utilizes gaps and special symbols as delimiters between words. A gap clustering technique is used to identify the gaps between words regardless of the gap-size variations amo...
 
CrownFS: a clustered continuous media server
Found in: Parallel and Distributed Systems, International Conference on
By Young-Sung Son, Yu-Seok Bae, Oh-Young Kwon, Tae-Geun Kim, Chang-Soon Park
Issue Date:December 1997
pp. 498
CrownFS is a file system for continuous media server in the CROWN (Clustering Resources On Workstations' Network) system. Because of the high I/O bandwidth rate and strict real-time constraints, the design issues of CrownFS are that of efficiently balancin...
 
Image Segmentation UsingHigher-Order Correlation Clustering
Found in: IEEE Transactions on Pattern Analysis and Machine Intelligence
By Sungwoong Kim,Chang D. Yoo,Sebastian Nowozin,Pushmeet Kohli
Issue Date:September 2014
pp. 1761-1774
In this paper, a hypergraph-based image segmentation framework is formulated in a supervised manner for many high-level computer vision tasks. To consider short- and long-range dependency among various regions of an image and also to incorporate wider sele...
 
Real-Time Disk Scheduling Algorithms Based on the Two-Way SCAN Technique
Found in: Scalable Computing and Communications; International Conference on Embedded Computing, International Conference on
By Myung-Sub Lee, Kwang-Jung Kim, Chang-Hyeon Park
Issue Date:September 2009
pp. 137-142
Recently various real-time scheduling algorithms are being studied in order to maximize throughput per unit time in real-time disk scheduling. Particularly in many algorithms, SCAN technique is applied to EDF(Earliest Deadline First), which represents real...
 
A study on success factors of logistics IT companies
Found in: Proceedings of the 8th international conference on Electronic commerce: The new e-commerce: innovations for conquering current barriers, obstacles and limitations to conducting successful business on the internet (ICEC '06)
By Chan Woo Kim, Chang Sup Lee, Gye Eui Song, Hyung Rim Choi, Joong Jo Shin, Nam Kyu Park
Issue Date:August 2006
pp. 364-370
Under this economic circumstance, the logistics firms located in port take better advantages than those in other areas. This study observed those firms with consciousness to which matters were affected a growth of the logistics IT firms. This study conside...
     
 1