Search For:

Displaying 1-17 out of 17 total
pKASSO: Towards Seamless Authentication Providing Non-Repudiation on Resource-Constrained Devices
Found in: Advanced Information Networking and Applications Workshops, International Conference on
By Ki-Woong Park, Hyunchul Seok, Kyu-Ho Park
Issue Date:May 2007
pp. 105-112
PKI is generally considered as the most appropriate solution for e-commerce and mutual authentication, owing to its digital signature and non-repudiation features. Asymmetric key operations of PKI require by far more CPU cycles than a symmetric cryptograph...
 
Resource Management of Manycores with a Hierarchical and a Hybrid Main Memory for MN-MATE Cloud Node
Found in: 2012 IEEE World Congress on Services (SERVICES)
By Kyu Ho Park,Sung Kyu Park,Woomin Hwang,Hyunchul Seok,Dong-Jae Shin,Ki-Woong Park
Issue Date:June 2012
pp. 301-308
The advent of manycore in computing architecture causes severe energy consumption and memory wall problem. Emerging technologies such as on-chip DRAM and nonvolatile memory (NVRAM) receive attention as promising solutions for them. Nonvolatile memory is a ...
 
MN-Mate: Resource Management of Manycores with DRAM and Nonvolatile Memories
Found in: High Performance Computing and Communications, 10th IEEE International Conference on
By Kyu Ho Park, Youngwoo Park, Woomin Hwang, Ki-Woong Park
Issue Date:September 2010
pp. 24-34
The advent of many core era breaks the performance wall but it causes severe energy consumption. NVRAM as a main memory can be a good solution to reduce energy consumption due to large size of DRAM. In this paper, we propose MN-MATE, a novel architecture a...
 
THEMIS: Towards Mutually Verifiable Billing Transactions in the Cloud Computing Environment
Found in: Cloud Computing, IEEE International Conference on
By Ki-Woong Park, Sung Kyu Park, Jaesun Han, Kyu Ho Park
Issue Date:July 2010
pp. 139-147
The ability to record and keep account of the usage of cloud resources in a credible and verifiable way is a precursor to widespread cloud deployment and availability because usage information is potentially sensitive and must be verifiably accurate. In an...
 
HyperDealer: Reference-Pattern-Aware Instant Memory Balancing for Consolidated Virtual Machines
Found in: Cloud Computing, IEEE International Conference on
By Woomin Hwang, Yangwoo Roh, Youngwoo Park, Ki-Woong Park, Kyu Ho Park
Issue Date:July 2010
pp. 426-434
Memory contention among consolidated virtual machines (VMs) creates the need for a memory balancing operation. In an attempt to provide a prompt memory balancing mechanism, we found problems with the retardation of memory transfer by the reclamation delay....
 
THEMIS: A Mutually Verifiable Billing System for the Cloud Computing Environment
Found in: IEEE Transactions on Services Computing
By Ki-Woong Park,Jaesun Han,JaeWoong Chung,Kyu Ho Park
Issue Date:July 2013
pp. 300-313
With the widespread adoption of cloud computing, the ability to record and account for the usage of cloud resources in a credible and verifiable way has become critical for cloud service providers and users alike. The success of such a billing system depen...
 
MN-GEMS: A Timing-Aware Simulator for a Cloud Node with Manycore, DRAM, and Non-volatile Memories
Found in: Cloud Computing, IEEE International Conference on
By Woomin Hwang,Ki-Woong Park,Kyu Ho Park
Issue Date:July 2011
pp. 734-735
In this paper, we describe a part of our on-going research project aimed at the management of many core and Hybrid Main Memory with DRAM and Non-Volatile RAMs (NVRAMs).By the needs of simulation and through investigation of the requirements for the target ...
 
BLAST: Applying Streaming Ciphers Into Outsourced Cloud Storage
Found in: Parallel and Distributed Systems, International Conference on
By Ki-Woong Park, Chulmin Kim, Kyu Ho Park
Issue Date:December 2010
pp. 431-437
Providing secure and efficient outsourced storage is a precursor to widespread cloud deployment and availability. For this purpose, existing designs mainly rely on block ciphers, although stream ciphers are more computationally-efficient than block ciphers...
 
FalconEye: Data Center Status Extraction via Vision Transformation Techniques
Found in: Computer Software and Applications Conference Workshops
By Ki-Woong Park, Woomin Hwang, Kyu Ho Park
Issue Date:July 2010
pp. 388-392
In this study, a vision monitoring system that is applicable to the maintenance of data centers was developed and applied to data center status extraction. The vision monitoring system, which is intended to complement system monitoring tools, such as IPMI ...
 
Computationally Efficient PKI-Based Single Sign-On Protocol, PKASSO for Mobile Devices
Found in: IEEE Transactions on Computers
By Ki-Woong Park, Sang Seok Lim, Kyu Ho Park
Issue Date:June 2008
pp. 821-834
In an attempt to expand Public Key Infrastructure (PKI) usage to a ubiquitous and mobile computing environment, we found that the deployment of the PKI on a resource constrained device leads to user-obstructive latency or an additional circuitry for the op...
 
A Ubiquitous Fashionable Computer with an i-Throw Device on a Location-Based Service Environment
Found in: Advanced Information Networking and Applications Workshops, International Conference on
By Jupyung Lee, Seung-Ho Lim, Jong-Woon Yoo, Ki-Woong Park, Hyun-Jin Choi, Kyu Ho Park
Issue Date:May 2007
pp. 59-65
The ubiquitous fashionable computer(UFC), introduced in this paper, is a wearable computer that allows people to exploit ubiquitous computing environment in a user-friendly manner. We present the design approach and philosophy of the UFC that is wearable, ...
 
Reference Pattern-Aware Instant Memory Balancing for Consolidated Virtual Machines on Manycores
Found in: IEEE Transactions on Parallel and Distributed Systems
By Woomin Hwang,Ki-Woong Park,Kyu Ho Park
Issue Date:August 2014
pp. 1
Memory contention among consolidated VMs on the same hardware has created the need for repetitive memory balancing operations. In an attempt to provide a prompt memory balancing mechanism, we found problems with the retardation of memory reallocation by th...
 
An intuitive data transfer technique using bartender's gestures
Found in: Proceedings of the seventeen ACM international conference on Multimedia (MM '09)
By Jong-Woon Yoo, Ki-Woong Park, Kyu Ho Park, Woong Choi
Issue Date:October 2009
pp. 991-992
This technical demonstration presents Cocktail, a gesture-based mobile interaction system, which is designed for providing a user-friendly way of exchanging multimedia data with intuitive gestures. Our system is motivated by bartenders who make cocktails w...
     
Adaptive wear-leveling algorithm for PRAM main memory with a DRAM buffer
Found in: ACM Transactions on Embedded Computing Systems (TECS)
By Ki-Woong Park, Kyu Ho Park, Min Kyu Maeng, Sung Kyu Park
Issue Date:February 2014
pp. 1-25
Phase Change RAM (PRAM) is a candidate to replace DRAM main memory due to its low idle power consumption and high scalability. However, its latency and endurance have generated problems in fulfilling its main memory role. The latency can be treated with a ...
     
Efficient memory management of a hierarchical and a hybrid main memory for MN-MATE platform
Found in: Proceedings of the 2012 International Workshop on Programming Models and Applications for Multicores and Manycores (PMAM '12)
By Dong-Jae Shin, Jong Hun Choi, Kyu Ho Park, Sung Kyu Park, Hyunchul Seok, Ki-Woong Park, Woomin Hwang
Issue Date:February 2012
pp. 83-92
The advent of manycore in computing architecture causes severe energy consumption and memory wall problem. Thus, emerging technologies such as on-chip memory and nonvolatile memory (NVRAM) have led to a paradigm shift in computing architecture era. For ins...
     
GHOST: GPGPU-offloaded high performance storage I/O deduplication for primary storage system
Found in: Proceedings of the 2012 International Workshop on Programming Models and Applications for Multicores and Manycores (PMAM '12)
By Kyu Ho Park, Chulmin Kim, Ki-Woong Park
Issue Date:February 2012
pp. 17-26
Data deduplication has been an effective way to eliminate redundant data mainly for backup storage systems. Since the recent primary storage systems in cloud services are expected to have the redundancy, the deduplication technique can also bring significa...
     
ACCENT: Cognitive cryptography plugged compression for SSL/TLS-based cloud computing services
Found in: ACM Transactions on Internet Technology (TOIT)
By Ki-Woong Park, Kyu Ho Park
Issue Date:December 2011
pp. 1-31
Emerging cloud services, including mobile offices, Web-based storage services, and content delivery services, run diverse workloads under various device platforms, networks, and cloud service providers. They have been realized on top of SSL/TLS, which is t...
     
 1