Search For:

Displaying 1-50 out of 298 total
A Neurostimulator Design for Long-term Animal Experiments
Found in: Frontiers in the Convergence of Bioscience and Information Technologies
By Jingai Zhou, Se Joon Woo, Se Ik Park, Seung Woo Lee, Hum Chung, Sung June Kim
Issue Date:October 2007
pp. 453-457
This article reports on a neural prosthesis stimulation system for long-term use in animal electrical stimulation experiments. The presented system consists of an implantable stimulator which provides continuous electrical stimulation, and an external comp...
 
Co-channel Interference Mitigation Based on Location Information in LTE Femtocell Systems
Found in: 2014 28th International Conference on Advanced Information Networking and Applications Workshops (WAINA)
By Sok Chhorn,Si-o Seo,Mustafa Habibu Mohsini,Hyong-woo Lee,Choong-ho Cho,Se-jin Kim,Seung-wan Ryu
Issue Date:May 2014
pp. 322-327
Macrocell base stations are mainly aiming to serve outdoor mobile users thus indoor mobile users may suffer from weak signals because of the outdoor-to-indoor wall penetration loss and indoor obstacles. Recently, in order to improve indoor performance, fem...
 
Review on Sensor Cloud and Its Integration with Arduino Based Sensor Network
Found in: 2013 International Conference on IT Convergence and Security (ICITCS)
By Abel Avitesh Chandra,Yeonwoo Lee,Beom Mu Kim,Se Yeong Maeng,Sang Hyeok Park,Seong Ro Lee
Issue Date:December 2013
pp. 1-4
The expansion of embedded ICT infrastructure has resulted in the deployment of a wide range of embedded systems in our environment which indicate the need for reusable, manageable and flexible Wireless Sensor Network. Integration of WSN infrastructure with...
   
Hybrid Associative Flash Translation Layer for the Performance Optimization of Chip-Level Parallel Flash Memory
Found in: ACM Transactions on Storage (TOS)
By Hyung-Ju Cho, Se Jin Kwon, Tae-Sun Chung
Issue Date:November 2013
pp. 1-24
Flash memory is used widely in the data storage market, particularly low-price MultiLevel Cell (MLC) flash memory, which has been adopted by large-scale storage systems despite its low performance. To overcome the poor performance of MLC flash memory, a sy...
     
Hierarchical subtopic mining for topic annotation
Found in: Proceedings of the sixth international workshop on Exploiting semantic annotations in information retrieval (ESAIR '13)
By Jong-Hyeok Lee, Ki-Young Shin, Se-Jong Kim
Issue Date:October 2013
pp. 49-52
Some authors of web documents attached keywords as metadata to the documents. These keywords reflected authors' intents for the main topics. To automatically acquire topic-related keywords, this paper proposes a method that mines subtopics as topic-related...
     
Comparative performance analysis of high-speed transfer protocols for big data
Found in: 2013 IEEE 38th Conference on Local Computer Networks (LCN 2013)
By Se-young Yu,Nevil Brownlee,Aniket Mahanti
Issue Date:October 2013
pp. 292-295
Researchers working in diverse fields such as astronomy, experimental physics, genomics, and meteorology have to frequently deal with analyzing voluminous amounts of complex data. Such data is often referred to as big data. These researchers work in teams ...
   
Oncilla: A GAS runtime for efficient resource allocation and data movement in accelerated clusters
Found in: 2013 IEEE International Conference on Cluster Computing (CLUSTER)
By Jeff Young,Se Hoon Shon,Sudhakar Yalamanchili,Alex Merritt,Karsten Schwan,Holger Froning
Issue Date:September 2013
pp. 1-8
Accelerated and in-core implementations of Big Data applications typically require large amounts of host and accelerator memory as well as efficient mechanisms for transferring data to and from accelerators in heterogeneous clusters. Scheduling for heterog...
   
Smart Icebreaker: A Workflow for Serious Game That Promotes Intimacy among Group Members
Found in: 2013 International Conference on Culture and Computing (Culture Computing)
By Jiwon Moon, Je-Ho Oh, Se Beom Oh, Jea In Kim, Young Yim Doh, Chung-Kon Shi
Issue Date:September 2013
pp. 145-146
The purpose of this research is to design the workflow of a serious game that promotes intimacy among the members of a group from the moment of group formation. We plan to design our game based on an interdisciplinary approach that applies users' psycholog...
 
CSMA over time-varying channels: optimality, uniqueness and limited backoff rate
Found in: Proceedings of the fourteenth ACM international symposium on Mobile ad hoc networking and computing (MobiHoc '13)
By Jinwoo Shin, Se-Young Yun, Yung Yi
Issue Date:July 2013
pp. 137-146
Recent studies on MAC scheduling have shown that carrier sense multiple access (CSMA) algorithms can be throughput optimal for arbitrary wireless network topology. However, these results are highly sensitive to the underlying assumption on `static' or `fix...
     
Answering natural language queries over linked data graphs: a distributional semantics approach
Found in: Proceedings of the 36th international ACM SIGIR conference on Research and development in information retrieval (SIGIR '13)
By André Freitas, Edward Curry, Fabrício F. de Faria, Seán O'Riain
Issue Date:July 2013
pp. 1107-1108
This paper demonstrates Treo, a natural language query mechanism for Linked Data graphs. The approach uses a distributional semantic vector space model to semantically match user query terms with data, supporting vocabulary-independent (or schema-agnostic)...
     
On the differences between correct student solutions
Found in: Proceedings of the 18th ACM conference on Innovation and technology in computer science education (ITiCSE '13)
By Andrew Luxton-Reilly, Diana Kirk, Ewan Tempero, Paul Denny, Se-Young Yu
Issue Date:July 2013
pp. 177-182
We know that students solve problems in different ways, but we know little about the kinds of variation, or the degree of variation between these student generated solutions. In this paper, we propose a taxonomy that classifies the variation between correc...
     
A Chinese Restaurant Recommendation System Based on Mobile Context-Aware Services
Found in: 2013 14th IEEE International Conference on Mobile Data Management (MDM)
By Chung-Hua Chu,Se-Hsien Wu
Issue Date:June 2013
pp. 116-118
Context information, such as user location, time, and user profile, has been popularly applied to analyze user behavior for many societies . In this paper, we develop a restaurant recommendation system based on mobile context-aware services to provide cust...
 
Multi-sensor Appearance-Based Place Recognition
Found in: 2013 International Conference on Computer and Robot Vision (CRV)
By Jack Collier,Stephen Se,Vinay Kotamraju
Issue Date:May 2013
pp. 128-135
This paper describes a multi-sensor appearance-based place recognition system suitable for robotic mapping. Unlike systems that extract features from visual imagery only, here we apply the well known Bag-of-Words approach to features extracted from both vi...
 
Personal Health Records: New Means to Safely Handle Health Data?
Found in: Computer
By Inmaculada Carrión Señor,José Luis Fernández Alemán,Ambrosio Toval
Issue Date:November 2012
pp. 27-33
Personal health records offer a way to manage health data while lessening healthcare costs, improving patient data quality, and fostering healthcare efficiency, but privacy and security issues are particularly important considerations for PHR designers.
 
Multi-periodic Data Aggregation Scheme Based on Interest for Energy Efficiency in Wireless Sensor Network
Found in: 2012 IEEE 9th Int'l Conference on Ubiquitous Intelligence & Computing / 9th Int'l Conference on Autonomic & Trusted Computing (UIC/ATC)
By A-Jeong Jeong,Se-Mi Kim,Chae-Seok Lee,Jong-Deok Kim
Issue Date:September 2012
pp. 918-923
In the wireless sensor network, there are cluster based routing protocols for the network monitoring like LEACH. In earlier works, the data aggregation periods of these protocols are the same, although each cluster can have different environments or situat...
 
Interest Point Selection with Spatio-temporal Context for Realistic Action Recognition
Found in: 2012 9th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS)
By Yanhu Shan,Zhang Zhang,Junge Zhang,Kaiqi Huang,Na Wu,Oh Se Hyun
Issue Date:September 2012
pp. 94-99
Spatio-Temporal Interest Point (STIP) has been widely used for human action recognition. However, the performance of the STIP based methods are still limited in realistic datasets which often include large variations in illuminations, viewpoints and camera...
 
Reflectance model for diffraction
Found in: ACM Transactions on Graphics (TOG)
By Philippe Bekaert, Ramesh Raskar, Se Baek Oh, Tom Cuypers, Tom Haber
Issue Date:August 2012
pp. 1-11
We present a novel method of simulating wave effects in graphics using ray-based renderers with a new function: the Wave BSDF (Bidirectional Scattering Distribution Function). Reflections from neighboring surface patches represented by local BSDFs are mutu...
     
Video Copy Detection Using Inclined Video Tomography and Bag-of-Visual-Words
Found in: 2012 IEEE International Conference on Multimedia and Expo (ICME)
By Hyun-seok Min,Se Min Kim,Wesley De Neve,Yong Man Ro
Issue Date:July 2012
pp. 562-567
Techniques for video fingerprinting are helpful in managing vast libraries of video clips. Recent advances have shown that video tomography and Bag-of-Visual-Words (BoVW) can be successfully used for the purpose of video fingerprinting. In this paper, we i...
 
Smart cooperative relay schemes in LTE-advanced system
Found in: Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication (ICUIMC '12)
By Bora Kim, Intae Hwang, Sangmi Moon, Dae Jin Kim, Dahee No, Jin Lee, Saransh Malik, Se Young Kim
Issue Date:February 2012
pp. 1-7
Cooperative relaying is considered as the most cost-efficient method in 3GPP LTE-Advanced in terms of coverage prolongation and transmission efficiency. In this paper, we analyze the best performing cooperative relaying scheme between the Amplify-- and--Fo...
     
Novel Biosensor Based on MOSFET-BJT Hybrid Mode of Gated Lateral Bipolar Junction Transistor for C-reactive Protein Detection
Found in: Intelligent Systems, Modelling and Simulation, International Conference on
By Heng Yuan,Bo Wang,Se-Hyuk Yeom,Byoung-Ho Kang,Kyu-Jin Kim,Jung-Hee Lee,Shin-Won Kang,Dae-Hyuk Kwon
Issue Date:February 2012
pp. 756-759
In this paper, a biosensor based on a gated lateral bipolar junction transistor (BJT) was proposed. The gated lateral BJT can function as both a metal-oxide-semiconductor field-effect transistor (MOSFET) and a BJT. By using selfassembled monolayer (SAM) me...
 
The User-Group Based Recommendation for the Diverse Multimedia Contents in the Social Network Environments
Found in: Dependable, Autonomic and Secure Computing, IEEE International Symposium on
By Saim Shin,Se-Jin Jang,Seok-Pil Lee
Issue Date:December 2011
pp. 202-206
It has become general that consumers freely create contents and spend them for themselves on Web services in Web 2.0 environments. This research introduces the personalized contents recommendation system that answers the recent propensity trends about the ...
 
Lifeline: Emergency Ad Hoc Network
Found in: Computational Intelligence and Security, International Conference on
By Se-Hang Cheong,Kai-Ip Lee,Yain-Whar Si,Leong Hou U
Issue Date:December 2011
pp. 283-289
Lifeline is a group of systems designed for mobile phones and battery powered wireless routers for forming emergency Ad hoc networks. Devices installed with Lifeline program can automatically form Ad hoc networks when cellular signal is unavailable or disr...
 
Constructing seminal paper genealogy
Found in: Proceedings of the 20th ACM international conference on Information and knowledge management (CIKM '11)
By Christos Faloutsos, Duck-Ho Bae, Sang-Wook Kim, Se-Mi Hwang
Issue Date:October 2011
pp. 2101-2104
When a researcher starts with a new topic, it would be very useful if seminal papers in the topic and their relationships are provided in advance. We propose an approach to construct seminal paper genealogy and show the effectiveness and efficiency of our ...
     
TDM: Time-Driven Mesh Overlay Network for Peer-to-Peer Video-on-Demand Services
Found in: Cyber-Enabled Distributed Computing and Knowledge Discovery, International Conference on
By Hwang Kyu Choi,Yi-Qi Gui,Se-Hyun Seo,Choong-Hyo Ko,Ju-Ha Seo
Issue Date:October 2011
pp. 100-106
In this paper, we propose a new Time-Driven Mesh (TDM) overlay network for peer-to-peer video-on-demand systems. In our TDM, all of the peers construct a mesh network connected among them in chronological order of their playback starting times. In order to...
 
Design and Implementation of a Smartphone-Based Reliable Real-Time Wi-Fi Broadcast System
Found in: Computer and Information Technology, International Conference on
By Se-Mi Kim,Seung-Chur Yang,Jong-Deok Kim
Issue Date:September 2011
pp. 513-517
In recent years, the demand for real-time multi-media service in WLAN environment rapidly increases due to the Wi-Fi smart phone user growth. In order to transmit real-time multimedia to many users, broadcast transmission is more efficient than unicast tra...
 
An experimental research project: wearable technology for embodiment of emotions
Found in: Proceedings of the 2011 Conference on Designing Pleasurable Products and Interfaces (DPPI '11)
By I. Laura Duncker, Marina Carulli, Monica Bordegoni, Raffaella Mangiarotti, S. A. G. Wensveen, Seçil Uğur
Issue Date:June 2011
pp. 1-8
Clothing is the most intimate artefact that interacts with both body and society. Over the past quarter century, with the introduction of new technologies, people are experiencing unprevented changes in their behaviours and way of living. Technology is bec...
     
Business Model Design Methodology for Innovative Product-Service Systems: A Strategic and Structured Approach
Found in: Annual SRII Global Conference
By Ji Hwan Lee, Dong Ik Shin, Yoo S. Hong, Yong Se Kim
Issue Date:April 2011
pp. 663-673
The business model is receiving considerable attention these days as companies achieve great success, or suffer damaging failure, by changing their way of doing business. Most of the literature on this subject has looked to establish the taxonomy, architec...
 
A Study on the Underwater Acoustic Communication with Direct Sequence Spread Spectrum
Found in: Embedded and Ubiquitous Computing, IEEE/IFIP International Conference on
By Se-young Kim, Ki-man Kim, Won-seok Choi, Min-jae Kim, Seung-yong Chun, Kwon Son
Issue Date:December 2010
pp. 337-340
Spread spectrum techniques are used in communication systems to provide low probability of intercept and jamming, to overcome the channel where the transmitted signal is distorted by multipath propagation. In this paper, we consider spread spectrum modulat...
 
Experimental Results of Single Carrier Digital Modulation for Underwater Sensor Networks
Found in: Embedded and Ubiquitous Computing, IEEE/IFIP International Conference on
By Se-young Kim, Jeong-woo Han, Ki-man Kim, Sang-hoon Baek, Hyung-chul Kim, Chang-hwa Kim
Issue Date:December 2010
pp. 326-330
This paper presents the experimental results of single carrier digital modulation schemes for underwater sensor networks. To obtain a real sea data of acoustic communications, an experiment was performed at the shallow water environments. ASK and FSK were ...
 
i-SEE: integrated stream execution environment over on-line data streams
Found in: Proceedings of the 19th ACM international conference on Information and knowledge management (CIKM '10)
By Ho Jin Woo, Hong Kyu Park, Se Jung Shin, Won Suk Lee
Issue Date:October 2010
pp. 1959-1960
The primary objective of various data stream applications is to monitor the on-going variations of data elements newly generated in data streams, so that appropriate services can be delivered to users timely. Basically, such monitoring activities can be di...
     
WBSDF for simulating wave effects of light and audio
Found in: ACM SIGGRAPH 2010 Posters (SIGGRAPH '10)
By Philippe Bekaert, Ramesh Raskar, Se Baek Oh, Tom Cuypers, Tom Haber
Issue Date:July 2010
pp. 1-1
Diffraction is a common phenomenon in nature when dealing with small scale occluders. It can be observed on biological surfaces, such as feathers and butterfly wings, and man--made objects like rainbow holograms. In acoustics, the effect of diffraction is ...
     
User analysis and visualization from a semantic blog system
Found in: Proceedings of the first international workshop on Intelligent visual interfaces for text analysis (IVITA '10)
By Jeong-Woo Son, Se-Young Park, Seong-Bae Park, Tae-Gil Noh, Yong-Jin Han
Issue Date:February 2010
pp. 13-16
This paper describes a blog system which analyzes its users by extracting information from blog posts and visualizes the analyzed results. In this system, the events appeared in the blog posts are regarded as the information on bloggers and are stored in t...
     
A natural language interface of thorough coverage by concordance with knowledge bases
Found in: Proceeding of the 14th international conference on Intelligent user interfaces (IUI '10)
By Sang-Jo Lee, Se Young Park, Seong-Bae Park, Tae-Gil Noh, Yong-Jin Han
Issue Date:February 2010
pp. 325-328
One of the critical problems in natural language interfaces is the discordance between the expressions covered by the interface and those by the knowledge base. In the graph-based knowledge base such as an ontology, all possible queries can be prepared in ...
     
Using new media to create integrating art therapy: animation therapy
Found in: ACM SIGGRAPH ASIA 2009 Educators Program (SIGGRAPH ASIA '09)
By Jinny Hye-Jin Choo, Jun-sang Kang, Se-Hyung Park, So-Young Kim, Won-jae Lee
Issue Date:December 2009
pp. 1-5
This project aims to adopt the successive approximation method of art therapy and to develop a therapeutic method in order to reduce the broad spectrum of problems among children and adolescents caused by the excessive use of video games and mass media. Th...
     
DS-Cuber: an integrated OLAP environment for data streams
Found in: Proceeding of the 18th ACM conference on Information and knowledge management (CIKM '09)
By Ho Jin Woo, Se Jung Shin, Won Suk Lee, Woo Sock Yang
Issue Date:November 2009
pp. 2067-2068
Most of emerging applications deal with an infinite data stream in an incessant, immense and volatile manner. Consequently, it is very important to analyze not only the varying characteristics of a source data stream in a short-term period but also those i...
     
M-COPE: a multiple continuous query processing engine
Found in: Proceeding of the 18th ACM conference on Information and knowledge management (CIKM '09)
By Hong Kyu Park, Sang Hyuck Na, Se Jung Shin, Won Suk Lee
Issue Date:November 2009
pp. 2065-2066
A data stream management system (DSMS) should support an efficient evaluation scheme for long-running continuous queries over infinite data streams. This demonstration presents a scalable query processing engine, M-COPE (Multiple Continuous Query Processin...
     
Efficient execution of application applets based on persistent object caching in Java card system
Found in: Proceedings of the 2009 International Conference on Hybrid Information Technology (ICHIT '09)
By Gwang Jung, Min-Soo Jung, Se-Won Oh, Won-Ho Choi
Issue Date:August 2009
pp. 268-272
Atomic transactions involving persistent objects in Java Card System environment often creates performance bottleneck due to access speed gap between RAM and Flash memory. This paper proposes simple yet efficient way of handling persistent objects for atom...
     
A multi-level elaborate least frequently/recently used buffer cache for flash storage systems
Found in: Proceedings of the 2009 International Conference on Hybrid Information Technology (ICHIT '09)
By Hyun-Yong Noh, Se-Won Oh, Shin-Dug Kim
Issue Date:August 2009
pp. 34-41
This research is to design a new buffer cache for flash memory storage systems. Specifically, flash memory based storage systems are compact and fast, compared with the traditional hard disks. Eventually, flash memory based solid state disks (SSDs) became ...
     
Experimental analysis of sequence dependence on energy saving for error tolerant image processing
Found in: Proceedings of the 14th ACM/IEEE international symposium on Low power electronics and design (ISLPED '09)
By Saibal Mukohopadhyay, Se Hun Kim, Wayne Wolf
Issue Date:August 2009
pp. 1-2
We present experimental analysis to exploit the sequence dependence on energy saving in error tolerant image processing. Our analysis shows that the error distributions depend not only on combinational inputs but also on the previous state of the logic. We...
     
Experience Search: Accessing the Emergent Knowledge from Annotated Blog Postings
Found in: Computational Science and Engineering, IEEE International Conference on
By Tae-Gil Noh, Yong-Jin Han, Jeong-Woo Son, Hyun-Jae Song, Hee-Geun Yoon, Jae-Ahn Lee, Sang-Do Lee, Kye-Sung Kim, Young-Hwa Lee, Seong-Bae Park, Se-Young Park, Sang-Jo Lee
Issue Date:August 2009
pp. 639-644
Emergent knowledge does not come from a particular document or a particular knowledge source, but comes from a collection of documents or knowledge sources. This paper proposes a system which combines the social web contents and the semantic web technology...
 
Design of OFDM System for High Speed Underwater Communication
Found in: Computational Science and Engineering, IEEE International Conference on
By Jeong-woo Han, Se-young Kim, Ki-man Kim, Seung-yong Chun, Kwon Son
Issue Date:August 2009
pp. 988-992
The performance of underwater acoustic communication system is influenced on channel characteristic. Especially, an important feature of the underwater acoustic communication is multipath propagation and Doppler spread cause by the surface and bottom refle...
 
Experimental analysis of sequence dependence on energy saving for error tolerant image processing
Found in: Low Power Electronics and Design, International Symposium on
By Se Hun Kim, Saibal Mukohopadhyay, Wayne Wolf
Issue Date:August 2009
pp. 347-350
We present experimental analysis to exploit the sequence dependence on energy saving in error tolerant image processing. Our analysis shows that the error distributions depend not only on combinational inputs but also on the previous state of the logic. We...
 
Moving Image Frame with Moble
Found in: Networked Computing and Advanced Information Management, International Conference on
By Dal-Hwan Yoon, Yong-Jin Park, Keun-Seong Choi, Se-Min Park, Jong-Hwa Yoon, Jong-Uk Yoon
Issue Date:August 2009
pp. 1462-1464
We have developed the multimedia player based on the internet. This player can display an image received from the mobile phone or the Web. Also, it can play a received MP3 file. In top face, we can control a volume, shift key for image presentation, displa...
 
An automatic translation of tags for multimedia contents using folksonomy networks
Found in: Proceedings of the 32nd international ACM SIGIR conference on Research and development in information retrieval (SIGIR '09)
By Hee-Geun Yoon, Sang-Jo Lee, Se-Young Park, Seong-Bae Park, Tae-Gil Noh
Issue Date:July 2009
pp. 435-435
This paper proposes a novel method to translate tags attached to multimedia contents for cross-language retrieval. The main issue in this problem is the sense disambiguation of tags given with few textual contexts. In order to solve this problem, the propo...
     
Issues of Fail-Over Switching for Fault-Tolerant Ethernet Implementation
Found in: New Trends in Information and Service Science, International Conference on
By Jong Myung Rhee, Hoang-Anh Pham, Se Mog Kim, Yun Min Ko, Dong Ho Lee
Issue Date:July 2009
pp. 711-714
Fail-over switching is a key factor in approaches to fault-tolerant Ethernet (FTE) implementation. This paper presents some key points in the fail-over switching process of popular two-port FTE. A new algorithm of fail-over switching for multi-ports is the...
 
Sonar based Simultaneous Localization and Mapping using a Neuro Evolutionary Optimization
Found in: Neural Networks, IEEE - INNS - ENNS International Joint Conference on
By Jeong-Gwan Kang, Su-Yong An, Sunhyo Kim, Se-Young Oh
Issue Date:June 2009
pp. 1516-1523
This paper addresses a solution of Simultaneous Localization and Mapping (SLAM) using a Neuro Evolutionary Optimization algorithm. The proposed algorithm solves the global optimization problem of the SLAM using the cost function which represents the qualit...
 
An overlap save algorithm for block convolution with reduced complexity
Found in: Acoustics, Speech, and Signal Processing, IEEE International Conference on
By Jung Gap Kuk, Se Yoon Kim, Nam Ik Cho
Issue Date:April 2009
pp. 605-608
We propose a block convolution algorithm that requires shorter length FFT than the conventional overlap save algorithm (OSA). It is shown that the OSA can be split into two separate processes related to the previous and current data blocks. Hence, only cur...
 
A New Steganography Scheme Based on an Index-Color Image
Found in: Information Technology: New Generations, Third International Conference on
By Se-Min Kim, Ziqiang Cheng, Kee-Young Yoo
Issue Date:April 2009
pp. 376-381
In this paper, we propose a new more efficient steganography technique that can be applied in Internet environment. The new efficient technique can hide from 1 to 8 bits secret data per pixel, and has no distortion if the number of colors does not exceed 1...
 
TMO-eCos2.0 and its Development Environment for Timeliness Guaranteed Computing
Found in: Future Dependable Distributed Systems, Software Technologies for
By Jung Guk Kim, Hyun Ju Kim, Jeong Hwa Park, Hyun Tae Ju, Bo Eun Lee, Se Gi Kim, Shin Heu
Issue Date:March 2009
pp. 164-168
To achieve a timeliness guaranteed computing in real-time embedded systems, an appropriate task model with timing constraints, environment tools such as an schedulability analyzer and a monitoring tool for verification are required as well as a real-time k...
 
A Novel Scheme for Efficient Installation of Applets for Advanced Java Card System
Found in: Computer Science and Information Engineering, World Congress on
By Won-Ho Choi, Se-Won Oh, Gwang Jung, Min-Soo Jung
Issue Date:April 2009
pp. 60-66
A novel scheme for installing an application applet efficiently in the Java Card platform is investigated. The proposed scheme could improve applet installation time significantly compared to the conventional scheme by fully utilizing available RAM space a...
 
 1  2 Next >>