Search For:

Displaying 1-50 out of 418 total
Further Comments on 'Detection of Faults in Programmable Logic Arrays' by J.E. Smith
Found in: IEEE Transactions on Computers
By J. Jacob, N.N. Biswas, J.E. Smith
Issue Date:January 1990
pp. 155-156
<p>In recent correspondence, L. Ye-Wei and J. Wei have shown two counterexamples that contradict theorems four and five of a paper by J.E. Smith. In his reply, Smith stated an additional condition under which the theorems hold good. The commenters pr...
 
Metadata Schema for Augmented Reality
Found in: 2014 International Conference on Information Science and Applications (ICISA)
By Takaaki Ishikawa,Je-Ho Park
Issue Date:May 2014
pp. 1-2
In this paper, we present a metadata schema design for augmented reality based on workflow. Utilizing the schema, the necessary information for processing of augmented reality service can be utilized for efficient system configuration.
   
Performance Evaluation of Point-Based Image Descriptors
Found in: 2014 International Conference on Information Science and Applications (ICISA)
By Suresh Sundaram,Yong-Hwan Lee,Youngseop Kim,Je-Ho Park,Han-Sang Cho
Issue Date:May 2014
pp. 1-2
Since feature extraction not only plays a key role, but also have a great effect on image analysis and registration. In this paper, we evaluate a comparative performance of three point feature extraction algorithm such as SIFT, SURF and BRISK. The experime...
   
Dynamic Configuration of SSD File Management
Found in: 2014 International Conference on Information Science and Applications (ICISA)
By Hyuk-Kyu Lim,Je-Ho Park
Issue Date:May 2014
pp. 1-3
In this paper, we present dynamic configuration of SSD file system in order to enhance the demanded processing cost for reconfigure the memory management system. The reconfiguration of the system is achieve by observing the usage pattern of memory space. W...
   
Utilization of Luminance and Location for Image Identifier
Found in: 2014 International Conference on Information Science and Applications (ICISA)
By Je-Ho Park,Han Auk Kim
Issue Date:May 2014
pp. 1-3
When an image identifier is generated by using luminance based method and variance in luminance domain does not exist, the generation of identifier might be failed in terms of satisfied requirements. In this paper, we present a noble identifier generation ...
   
Design of System Framework for Searching Medical Information
Found in: 2014 International Conference on Information Science and Applications (ICISA)
By Sung-Ho Hong,Youngseop Kim,Yong-Hwan Lee,Je-Ho Park
Issue Date:May 2014
pp. 1-2
This work aims to find the medical information suited to the conditions, by analyzing the keywords provided from an user. With the given information, this model can be used to provide a flexible, compatible and effective searching paper for medical informa...
   
Efficient Rekeying Framework for SecureMulticast with Diverse-Subscription-Period Mobile Users
Found in: IEEE Transactions on Mobile Computing
By Young-Hoon Park,Dong-Hyun Je,Min-Ho Park,Seung-Woo Seo
Issue Date:April 2014
pp. 783-796
Group key management (GKM) in mobile communication is important to enable access control for a group of users. A major issue in GKM is how to minimize the communication cost for group rekeying. To design the optimal GKM, researchers have assumed that all g...
 
An online simulator for thermoelectric cooling and power generation
Found in: 2013 IEEE Frontiers in Education Conference (FIE)
By Je-Hyeong Bahk,Megan Youngs,Kazuaki Yazawa,Ali Shakouri,Oxana Pantchenko
Issue Date:October 2013
pp. 1757-1759
We present an online simulator that can be used to teach the principles of thermoelectric energy conversion, and analyze the detailed performance of Peltier coolers or thermoelectric power generators with simple user interfaces [1]. The simulation tool is ...
   
JPEG's JPSearch Standard: Harmonizing Image Management and Search
Found in: IEEE MultiMedia
By Mario Doller,Ruben Tous,Frederik Temmermans,Kyoungro Yoon,Je-Ho Park,Youngseop Kim,Florian Stegmaier,Jaime Delgado
Issue Date:October 2013
pp. 38-48
Triggered by the rise of social networks, community-based image sharing platforms are emerging at an increasing rate. Currently, almost every repository offers a different interaction interface and metadata description format. Unfortunately, this prevents ...
 
Interactive Human: Seen through Digital Art
Found in: 2013 International Conference on Culture and Computing (Culture Computing)
By Je-Ho Oh, Chung-Kon Shi
Issue Date:September 2013
pp. 188-189
This research aims to study interactive human seen through digital art. In the progressive digital age, what features exhibit human characteristics? This research applied theoretical categories to artworks exhibited by the 7th Seoul International Media Art...
 
Smart Icebreaker: A Workflow for Serious Game That Promotes Intimacy among Group Members
Found in: 2013 International Conference on Culture and Computing (Culture Computing)
By Jiwon Moon, Je-Ho Oh, Se Beom Oh, Jea In Kim, Young Yim Doh, Chung-Kon Shi
Issue Date:September 2013
pp. 145-146
The purpose of this research is to design the workflow of a serious game that promotes intimacy among the members of a group from the moment of group formation. We plan to design our game based on an interdisciplinary approach that applies users' psycholog...
 
Texture Synthesis Approach Using Cooperative Features
Found in: 2013 10th International Conference Computer Graphics, Imaging and Visualization (CGIV)
By Chin-Chen Chang,Bing-Ruei Wu,Hao-Jen Hsu,Je-Wei Liang,Yuan-Ching Peng,Wen-Kai Tai
Issue Date:August 2013
pp. 50-51
In recent years, a lot of 2D textures have been synthesized from input 2D textures. However, the quality problems still exist for many textures. Further improvements are required to extract more reliable texture features. In this paper, we present a textur...
 
A spatial-temporal method to refine a depth image
Found in: ACM SIGGRAPH 2013 Posters (SIGGRAPH '13)
By In Yeop Jang, Kwan H. Lee, Kyu Je Lim, Min Ki Park, Seung Joo Lee, Sun Jong Jeong, Yong Hwi Kim
Issue Date:July 2013
pp. 1-1
In this poster, a spatial-temporal depth image refinement is proposed. First, we perform a spatial denoising by applying Joint Bilateral Filter(JBF) to an image pyramid iteratively. Second, we employ a signed distance function(SDF) [Curless 1996] to obtain...
     
Categorisation of Audience Relationship between Action and Visualisation in Interactive Art Installations
Found in: 2013 17th International Conference on Information Visualisation
By Je-Ho Oh,Chung-Kon Shi
Issue Date:July 2013
pp. 555-560
The aim of this paper is to categorise audience participation in interactive art according to a visualisation method. The research studied categories of audience in interactivities and applied artworks at the 7th Seoul Media Art Biennale. To establish the ...
 
Fragmentation Problem in Android
Found in: 2013 International Conference on Information Science and Applications (ICISA)
By Je-Ho Park,Young Bom Park,Hyung Kil Ham
Issue Date:June 2013
pp. 1-2
Due to the nature of an open operating system, Android framework cannot avoid the fragmentation problem. To address this, cost of time and efforts to devise application tests in mobile environment is unavoidable. In this paper, we propose two methods that ...
   
Emotional Recognition System Using Curve Fitting with Bezier Cubics
Found in: 2013 International Conference on Information Science and Applications (ICISA)
By Yong-Hwan Lee,Yukong Lee,Je-Ho Park,Woori Han,Youngseop Kim
Issue Date:June 2013
pp. 1-2
Recognizing and understanding of human emotion is a strongly reasonable method for the interaction among human and machine communication system. The most expressive way to extract and recognize the humane emotion is through facial expression analysis. This...
   
Facial Feature Extraction Using Enhanced Active Shape Model
Found in: 2013 International Conference on Information Science and Applications (ICISA)
By Yong-Hwan Lee,Yukong Lee,Dong-Seok Yang,Je-Ho Park,Youngseop Kim
Issue Date:June 2013
pp. 1-2
Active shape model (ASM) is one of the most popular local texture models for face detection. This paper addresses issues related to face detection and implements an efficient extraction of facial point features which is more suitable for using on mobile de...
   
Decent Partition Based Wear Leveling Method
Found in: 2013 International Conference on Information Science and Applications (ICISA)
By Je-Ho Park
Issue Date:June 2013
pp. 1-2
Flash memory based storage system needs to resolve the performance bottleneck for writing in perspective of speed and lifetime according to its disadvantageous physical property. To overcome the hardware drawbacks, flash memory requires non-in-place update...
   
Efficient Luminance Area Based Image Indexing
Found in: 2013 International Conference on Information Science and Applications (ICISA)
By Je-Ho Park
Issue Date:June 2013
pp. 1-2
As the amount of images produced in diverse applications is enormous, associating an image with an effective identifier needs to be considered in the perspective of cost and efficiency as well. In this paper, we present novel approaches for composition of ...
   
Implementation of Image Descriptor Based on SURF and DCD
Found in: 2013 International Conference on Information Science and Applications (ICISA)
By Yong-Hwan Lee,Yukong Lee,Hyochang Ahn,Je-Ho Park,Youngseop Kim
Issue Date:June 2013
pp. 1-2
Image retrieval is one of the most exciting and fastest growing research areas in the field of multimedia technology. In this paper, we present and implement an image descriptor that extracts the feature of image using combination of SURF (Speed Up Robust ...
   
Maximizing availability of content in disruptive environments by cross-layer optimization
Found in: Proceedings of the 28th Annual ACM Symposium on Applied Computing (SAC '13)
By Ashish Gehani, Dawood Tariq, Je-Min Kim, Jin-soo Kim, Mark-Oliver Stehr, Minyoung Kim
Issue Date:March 2013
pp. 447-454
Emerging applications such as search-and-rescue operations, CNS (communication, navigation, surveillance), smart spaces, vehicular networks, mission-critical infrastructure, and disaster control require reliable content distribution under harsh network con...
     
Online scheduling of packets with agreeable deadlines
Found in: ACM Transactions on Algorithms (TALG)
By Łukasz Jeż, Clifford Stein, Fei Li, Jay Sethuraman
Issue Date:December 2012
pp. 1-11
This article concerns an online packet scheduling problem that arises as a natural model for buffer management at a network router. Packets arrive at a router at integer time steps, and are buffered upon arrival. Packets have non-negative weights and integ...
     
Location Comparison through Geographical Topics
Found in: 2012 IEEE/WIC/ACM International Joint Conferences on Web Intelligence (WI) and Intelligent Agent Technologies (IAT)
By Jeong-Woo Son,Yun-Seok Noh,Hyun-Je Song,Seong-Bae Park
Issue Date:December 2012
pp. 311-318
With the increasing interest in location-based services, location comparison gains more and more attentions. One of the best ways to represent a location is to use topics that are generated near the location. In order to compare locations through such geog...
 
Advil: A Pain Reliever for the Storage Performance of Mobile Devices
Found in: 2012 IEEE 15th International Conference on Computational Science and Engineering (CSE)
By Je-Min Kim,Jin-Soo Kim
Issue Date:December 2012
pp. 429-436
Recently, mobile devices are demanding more performance in computing power, network, and storage. Among these components, storage is one of the most important components which directly influence end-user experience. The poor random write performance is par...
 
Intra-relation Reconstruction from Inter-relation: miRNA to Gene Expression
Found in: 2012 IEEE Second International Conference on Healthcare Informatics, Imaging and Systems Biology (HISB)
By Dokyoon Kim,Hyunjung Shin,Je-Gun Joung,Su-Yeon Lee,Ju Han Kim
Issue Date:September 2012
pp. 141
Gene expression profiling has been used to molecularly characterize various tumors and tissues. However, regulation of gene expression by microRNAs (miRNAs) has attracted much attention recently. In computational biology, a novel knowledge has been obtaine...
 
Fabrication of Nanopatterned Surfaces for Tissue Engineering
Found in: Biomedical Engineering and Biotechnology, International Conference on
By Eun Ju Jeong,Jin Wook Lee,Soo-Jeong Yeon,Jae-Won Lee,Young-Je Kwark,Sang-Hoon Rhee,Won Ho Park,Seung Hyun Kim,Kuen Yong Lee
Issue Date:May 2012
pp. 1030-1033
The surface nanotopography of polymer substrates is a critical factor to regulate cellular behavior in tissue engineering approaches. In this study, nanopatterned surfaces were generated via self-assembly of polystyrene-b-poly(ethylene oxide)/dodecylbenzen...
 
Anti-allergic Effects of the Rhizomes of Atractylodes japonica and the Main Constituents
Found in: Biomedical Engineering and Biotechnology, International Conference on
By Je Hyeong Lee,Hun Jae Im,Hyun Lim,Hyun Pyo Kim,Jinwoong Kim,Yeong Shik Kim
Issue Date:May 2012
pp. 57-59
Some anti-allergic activities of the rhizome of Atractylodes japonica have been reported previously. But, the active principle(s) for anti-allergic action is not fully elucidated. In the present study, the 70% ethanol extract of the rhizome of A. japonica ...
 
A Reversible Secret Sharing Scheme Based on GF(2^8)
Found in: Information Technology: New Generations, Third International Conference on
By Dong-Hyun Kim,Gil-Je Lee,Min-Ho Park,Kee-Young Yoo
Issue Date:April 2012
pp. 425-430
Lin and Chan proposed reversible secret sharing scheme in 2010. The advantages of this scheme are as follows: a low distortion, high capacity of shadow images and usage of the reversible method. However, this scheme has some problems. First, the number of ...
 
PolyDepth: Real-time penetration depth computation using iterative contact-space projection
Found in: ACM Transactions on Graphics (TOG)
By Changsoo Je, Min Tang, Young J. Kim, Youngeun Lee, Minkyoung Lee
Issue Date:January 2012
pp. 1-14
We present a real-time algorithm that finds the Penetration Depth (PD) between general polygonal models based on iterative and local optimization techniques. Given an in-collision configuration of an object in configuration space, we find an initial collis...
     
People Tracking in the Multi-camera Surveillance System
Found in: Innovations in Bio-inspired Computing and Applications, International Conference on
By Chao-Ho Chen,Tsong-Yi Chen,Je-Ching Lin,Da-Jinn Wang
Issue Date:December 2011
pp. 1-4
This paper is dedicated to people tracking and identification in the multi-camera surveillance system. In the proposed method, each people-image is extracted among each camera and then is labeled with its color vector. Color vector provides a similar proba...
 
64 Channel Digital Hearing Aid Emdedded Firmware
Found in: Asia-Pacific Conference on Services Computing. 2006 IEEE
By Soon-Suck Jarng,Mano Samuel,Je-Hyung Lee
Issue Date:December 2011
pp. 395-401
This paper presents some results of a 64 channel digital hearing aid firmware development. Along with nonlinear voice compression, we present noise reduction, microphone & receiver calibration and in-situ algorithms with some results. The FFT-iFFT base...
 
A Study of Interactive Art in the Narrative Form of
Found in: Computer Graphics, Imaging and Visualization, International Conference on
By Je-ho Oh,So-young Kim,Seung-hun Kim,Chung-kon Shi
Issue Date:August 2011
pp. 39-46
The aim of this research is to create a production model for interactive art in a narrative form. We establish a conceptual framework for the development of a narrative in terms of its interactive scenario, graphic design, and technical design. Based on th...
 
DDoS Attacks Detection Using GA Based Optimized Traffic Matrix
Found in: Innovative Mobile and Internet Services in Ubiquitous Computing, International Conference on
By Je Hak Lee, Dong Seong Kim, Sang Min Lee, Jong Sou Park
Issue Date:July 2011
pp. 216-220
Threat of Distributed Denial of Service (DDoS) attacks has been increasing with growth of computer and network infrastructures. DDoS attacks generating mass traffics make network bandwidth and/or system resources depleted. Therefore, it is significant to d...
 
TUIC: enabling tangible interaction on capacitive multi-touch displays
Found in: Proceedings of the 2011 annual conference on Human factors in computing systems (CHI '11)
By Dian-Je Tsai, Fang-I Hsiao, I-Chun Hsiao, Li-Wei Chan, Lung-Pan Cheng, Mike Chen, Neng-Hao Yu, Polly Huang, Seng Yong Lau, Sung-Sheng Tsai, Yi-Ping Hung
Issue Date:May 2011
pp. 2995-3004
We present TUIC, a technology that enables tangible interaction on capacitive multi-touch devices, such as iPad, iPhone, and 3M's multi-touch displays, without requiring any hardware modifications. TUIC simulates finger touches on capacitive displays using...
     
Two-Step Sentence Extraction for Summarization of Meeting Minutes
Found in: Information Technology: New Generations, Third International Conference on
By Jae-Kul Lee, Hyun-Je Song, Seong-Bae Park
Issue Date:April 2011
pp. 614-619
These days a number of meeting minutes of various organizations are publicly available and the interest in these documents by people is increasing. However it is time-consuming and tedious to read and understand whole documents even if the documents can be...
 
Learning naïve bayes transfer classifier throughclass-wise test distribution estimation
Found in: Proceedings of the 19th ACM international conference on Information and knowledge management (CIKM '10)
By Hyun-Je Song, Jeong-Woo Son, Seong-Bae Park
Issue Date:October 2010
pp. 1729-1732
Text classification is a well-known problem for various applications. For last decades, it is beleived that a large corpus is one of the most important aspects for better classification. However, even though a great number of documents is available for tra...
     
Implementation of a Smart Traffic Prediction and Flow Control Mechanism for Video Streaming
Found in: Intelligent Information Hiding and Multimedia Signal Processing, International Conference on
By Yue-Ru Chuang, Chia-Sheng Hsu, Je-Wei Chen
Issue Date:October 2010
pp. 240-243
Recently, all-IP intelligent video surveillance/door system is one of the attractive and important applications in the world. However, because the current Internet architecture cannot provide sufficient QoS for such kind of real-time applications, the perf...
 
Analysis of Power Consumption and Efficient Power Saving Techniques for MIMO-OFDM-Based Wireless LAN Receivers
Found in: Sensor Technologies and Applications, International Conference on
By Il-Gu Lee, Jung-Bo Son, Eun-Young Choi, Je-Hun Lee, Sok-Kyu Lee
Issue Date:July 2010
pp. 597-601
In this paper, we express the power consumption for the wireless receiver employing multiple antenna technique as a closed form function of the number of antennas, time duration, power dissipation for carrier sensing and data decoding, and the probability ...
 
A Study on the PV System for Simulation Representing Characteristics of DSSC
Found in: Computer Research and Development, International Conference on
By Won-Yong Chae, Kyoung-Jun Lee, Ho-Sung Kim, Dong-Gil Lee, Hee-Je Kim
Issue Date:May 2010
pp. 854-858
The DSSC (Dye-Sensitized Solar Cell) is more economical than the conventional silicon solar cell that's why the DSSC is recently focused on as the next generation solar cell. Although researches on the simulation programming for the silicon solar cell whic...
 
A Study on Optimization of the Wireless Power Transfer Using the Half-Bridge Flyback Converter
Found in: Computer Research and Development, International Conference on
By Jin-Ju Jang, Won-Yong Chae, Ho-Sung Kim, Dong-Gil Lee, Hee-Je Kim
Issue Date:May 2010
pp. 717-719
We considered about a wireless power transfer for breaking inconvenience of wiring power sources. The best way how to supply electric power through wireless system is using the electromagnetic coupled resonance phenomena. It can be supplied the electric po...
 
A Multi-polarized Antenna System for Combating Multipath Fading in UHF/RFID Frequency Band in Moving Vehicles
Found in: Communications and Mobile Computing, International Conference on
By Deock Ho Ha, Je-Sung Ahn, Yeon-Wook Choe
Issue Date:April 2010
pp. 63-67
This paper proposes a multi-polarized antenna system with UHF/RFID frequency band for combating multi-path fading in short-range radio propagation environments. The multi-polarized antenna system of the UHF/RFID for using moving vehicles is composed of mul...
 
Comparison of Bank Change Mechanisms for Banked Reduced Encoding Architectures
Found in: Computational Science and Engineering, IEEE International Conference on
By Je-Hyung Lee, Soo-Mook Moon, Hyung-Kyu Choi
Issue Date:August 2009
pp. 334-341
Embedded systems often require small code size due to their tight memory constraints. Although the reduced encoding architectures such as the ARM THUMB or the MIPS-16 can successfully reduce the code size due to its half-sized instructions, they suffer fro...
 
Research on the parallel algorithm for self-similar network traffic simulation
Found in: Computer Science and Information Technology, International Conference on
By Huachuan Zhang,Jing Xu,Je Tian
Issue Date:August 2009
pp. 355-359
As the web application is world wide used, system' s performance, especially reliability, becomes more significant. Traditional performance testing tools such as QA Load and LoadRunner will generate the stress data with the fixed scale. But in the real tim...
 
AESNB: Active Example Selection with Naïve Bayes Classifier for Learning from Imbalanced Biomedical Data
Found in: Bioinformatic and Bioengineering, IEEE International Symposium on
By Min Su Lee, Je-Keun Rhee, Byoung-Hee Kim, Byoung-Tak Zhang
Issue Date:June 2009
pp. 15-21
Various real-world biomedical classification tasks suffer from the imbalanced data problem which tends to make the prediction performance of some classes significantly decrease. In this paper, we present an active example selection method with naïve Bayes ...
 
A Varietal Genetic Algorithm by External Self-Evolving Multiple-Archives for Combinatorial Optimization Problems
Found in: High Performance Computing and Communications, 10th IEEE International Conference on
By Pei-Chann Chang, Wei-Hsiu Huang, Ching-Jung Ting, Wei-Je Chang
Issue Date:June 2009
pp. 609-614
In this paper, a bionic algorithm based on Genetic Algorithms is proposed as a varietal GA, named External Self-evolving Multiple-archives (ESMA). ESMA focuses on improving the efficiency of applying diversity for enhancing the solution quality. This paper...
 
A Method for Dynamic NCW Service Selection Based on EA Ontology
Found in: Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, ACIS International Conference on
By Sang-Kyu Huang, Kwang-Je Lee, Young-Tae Byun
Issue Date:May 2009
pp. 300-305
Service-Oriented Computing(SOC) becomes nowadays the core computing paradigm that utilizes services as fundamental elements for executing Information Warfare. In the Depart of Defense(DoD), the main goal of SOC is that all available information resources c...
 
Automatic prosodic events detection using syllable-based acoustic and syntactic features
Found in: Acoustics, Speech, and Signal Processing, IEEE International Conference on
By Je Hun Jeon, Yang Liu
Issue Date:April 2009
pp. 4565-4568
Automatic prosodic event detection is important for both speech understanding and natural speech synthesis since prosody provides additional information over the short-term segmental features and lexical representation of an utterance. Similar to previous ...
 
Impact of NVRAM write cache for file system metadata on I/O performance in embedded systems
Found in: Proceedings of the 2009 ACM symposium on Applied Computing (SAC '09)
By Donghee Lee, Eunsam Kim, Hyo J. Lee, In Hwan Doh, Jongmoo Choi, Sam H. Noh, Young Je Moon
Issue Date:March 2009
pp. 1-5
File systems make use of part of DRAM as the buffer cache to enhance its performance in traditional systems. In this paper, we consider the use of Non-Volatile RAM (NVRAM) as a write cache for metadata of the file system in embedded systems. NVRAM is a sta...
     
An m-EVBT algorithm for energy efficient routing in wireless sensor networks
Found in: Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication (ICUIMC '09)
By Jaekwang Kim, Je-hee Jung, Jee-Hyong Lee, KwangHo Yoon, Seunghoon Lee
Issue Date:January 2009
pp. 1-24
The virtual backbone concept is a method of efficient communication in wireless sensor networks. A recent variant is the energy-aware virtual backbone tree (EVBT) algorithm which applies a tree structure to the backbone. This algorithm can minimize the ene...
     
Push-to-Talk Service Investigation and Improvement
Found in: Communications and Mobile Computing, International Conference on
By Jae-Hyung Cho, Je-Hyun Lee, Bi-Feng Yu, Jae-Oh Lee
Issue Date:January 2009
pp. 167-171
As we all know Push-to-talk service implemented in the Cellular network has deeply enhanced the advantages of traditional Walkie-Talkie service without the limitation of distance. In order to enrich the Multimedia network communication, we have tried to de...
 
 1  2 Next >>