Search For:

Displaying 1-13 out of 13 total
Design and Implementation of Certificate Validation Mechanism Using Reduction Signature in Distributed Domain Environment
Found in: Convergence Information Technology, International Conference on
By Hyun-Chul Kim, Young-Gu Lee, Moon-Seog Jun
Issue Date:November 2008
pp. 591-595
Certificate issued from verifying institution can be invalidated by a variety of reasons such as loss of private key, loss of qualification, and change of key. For such reasons, validation mechanism of certificate, which can check status of certificate tha...
 
Face Recognition Using LDA Mixture Model
Found in: Pattern Recognition, International Conference on
By Hyun-Chul Kim, Daijin Kim, Sung Yang Bang
Issue Date:August 2002
pp. 20486
LDA (Linear Discriminant Analysis) provides the projection that discriminates the data well, and shows a very good performance for face recognition. However, since LDA provides only one transformation matrix over whole data, it is not sufficient to discrim...
 
Pattern Classification Using Support Vector Machine Ensemble
Found in: Pattern Recognition, International Conference on
By Hyun-Chul Kim, Shaoning Pang, Hong-Mo Je, Daijin Kim, Sung Yang Bang
Issue Date:August 2002
pp. 20160
While the support vector machine (SVM) can provide a good generalization performance, the classification result of the SVM is often far from the theoretically expected level in practical implementation because they are based on approximated algorithms due ...
 
Analyzing and Modeling Workload Characteristics in a Multiservice IP Network
Found in: IEEE Internet Computing
By Yongmin Choi,John Silvester, Hyun-chul Kim
Issue Date:March 2011
pp. 35-42
As multimedia Internet applications become pervasive, the characteristics of Internet Protocol (IP) traffic are changing. Workload characterization is crucial in IP traffic engineering to deploy an efficient network. However, traffic characteristics in com...
 
OSGi Based Railroad-Crossing Remote Monitoring System
Found in: Semantic Computing and Applications, IEEE International Workshop on
By Hyun-Chul Kim, Yi-Seok Jeong, Dong-Ryeol Shin
Issue Date:July 2008
pp. 150-152
Today, the railway is very important in modern society means of public transport. Many people use the railway each day. On the other hand, with regard to railway accidents every year due to damage caused many casualties. In this paper, we propose railroad ...
 
Bayesian Gaussian Process Classification with the EM-EP Algorithm
Found in: IEEE Transactions on Pattern Analysis and Machine Intelligence
By Hyun-Chul Kim, Zoubin Ghahramani
Issue Date:December 2006
pp. 1948-1959
Gaussian process classifiers (GPCs) are Bayesian probabilistic kernel classifiers. In GPCs, the probability of belonging to a certain class at an input location is monotonically related to the value of some latent function at that location. Starting from a...
 
Design of Certificate Validation Protocol for On-line Financing Transaction using Virtual Identifier Information of Signer
Found in: Hybrid Information Technology, International Conference on
By Hyun-chul Kim, Jun-ho Choun, Moon-seog Jun
Issue Date:November 2006
pp. 615-619
Certificate issued from certification authority can be revoked by a variety of reasons such as loss of private key, loss of qualification, and change of key. For such reasons, validation protocol of certificate, which can check status of certificate that i...
 
A New Scheme for Improving Performance of TCP over Network including Wireless Links
Found in: Parallel and Distributed Systems, International Conference on
By Hyun-Chul Kim, Myong-Soon Park
Issue Date:December 2002
pp. 279
With the proliferation of mobile and wireless computing devices, the demand for continuous network connectivity exists for various wired-and-wireless-integrated networks. Since TCP is the standard net-work protocol stack for communication on the Internet, ...
 
Stitching Reliability for Estimating Camera Focal Length in Panoramic Image Mosaicing
Found in: Pattern Recognition, International Conference on
By Hwa-Sung Kim, Hyun-Chul Kim, Won-Kyu Lee, Chang-Hun Kim
Issue Date:September 2000
pp. 1596
This paper proposes a measurable criterion called “stitching reliability” which reflects the stitching quality of panoramic mosaics. We also show that the accurate focal length from image sequences closely relates to the stitching reliability. However, cur...
 
What can free money tell us on the virtual black market?
Found in: Proceedings of the ACM SIGCOMM 2011 conference on SIGCOMM (SIGCOMM '11)
By Chong-kwon Kim, Huy Kang Kim, Hyukmin Kwon, Hyun-chul Kim, Kyungmoon Woo
Issue Date:August 2011
pp. 392-393
"Real money trading" or "Gold farming" refers to a set of illicit practices for gathering and distributing virtual goods in online games for real money. Unlike previous work, we use network-wide economic interactions among in-game characters as a lens to m...
     
Multi-relational social networks in a large-scale MMORPG
Found in: Proceedings of the ACM SIGCOMM 2011 conference on SIGCOMM (SIGCOMM '11)
By Ah Reum Kang, Huy Kang Kim, Hyun-chul Kim, Juyong Park, Seokshin Son, Ted Taekyoung Kwon
Issue Date:August 2011
pp. 414-415
We analyze multi-relational social interaction networks in a large-scale commercial Massively Multiplayer Online Role-Playing Game(MMORPG). Our work is based on data from AION, currently the world's second most-played MMORPG with 3.4 million subscribers as...
     
How prevalent is content bundling in BitTorrent
Found in: Proceedings of the ACM SIGMETRICS joint international conference on Measurement and modeling of computer systems (SIGMETRICS '11)
By Hyun-chul Kim, Jinyoung Han, Seungbae Kim, Taejoong Chung, Ted Taekyoung Kwon, Yanghee Choi
Issue Date:June 2011
pp. 127-128
Despite the increasing interest in content bundling in BitTorrent systems, there are still few empirical studies on the bundling practice in real BitTorrent communities. In this paper, we conduct comprehensive measurements on one of the largest BitTorrent ...
     
Internet traffic classification demystified: on the sources of the discriminative power
Found in: Proceedings of the 6th International COnference (Co-NEXT '10)
By Chong-kwon Kim, Hyun-chul Kim, Jiwoong Jeong, Ted "Taekyoung" Kwon, Yanghee Choi, Yeon-sup Lim
Issue Date:November 2010
pp. 1-12
Recent research on Internet traffic classification has yield a number of data mining techniques for distinguishing types of traffic, but no systematic analysis on "Why" some algorithms achieve high accuracies. In pursuit of empirically grounded answers to ...
     
 1