CS Store Search
Displaying 1-7 out of 7 total
Workflow-based Authorization Service in Grid
Grid Computing, IEEE/ACM International Workshop on
By Seung-Hyun Kim, Jong Kim, Sung-Je Hong, Sangwan Kim
Issue Date:November 2003
In a distributed environment, specific rights may be required while a task is controlled and processed. A user should delegate enough rights to a task for processing. Tasks cannot work correctly if delegated rights are insufficient, or security threats may...
Fabrication of Nanopatterned Surfaces for Tissue Engineering
Biomedical Engineering and Biotechnology, International Conference on
By Eun Ju Jeong,Jin Wook Lee,Soo-Jeong Yeon,Jae-Won Lee,Young-Je Kwark,Sang-Hoon Rhee,Won Ho Park,Seung Hyun Kim,Kuen Yong Lee
Issue Date:May 2012
The surface nanotopography of polymer substrates is a critical factor to regulate cellular behavior in tissue engineering approaches. In this study, nanopatterned surfaces were generated via self-assembly of polystyrene-b-poly(ethylene oxide)/dodecylbenzen...
Discovery of Association Rules in National Violent Death Data Using Optimization of Number of Attributes
Computer Science and Information Engineering, World Congress on
By Seung-Hyun Kim, Craig Dunham, Suryo Muljono, Albert Lee, Taehyung Wang
Issue Date:April 2009
Over the last several years, data mining has been successfully used in various areas such as finance, security, telecommunication, science, retail industry, marketing, and Web. In this paper, we explain data mining application to crime analysis. Particular...
A comparative study of cyberattacks
Found in: Communications of the ACM
By Johannes B. Ullrich, Qiu-Hong Wang, Qiu-Hong Wang, Seung Hyun Kim, Seung Hyun Kim
Issue Date:March 2012
Attackers base themselves in countries of convenience, virtually.
A Deformation Framework for Focus+Context Flow Visualization
IEEE Transactions on Visualization and Computer Graphics
By Jun Tao, Chaoli Wang, Ching-Kuang Shene, Seung Hyun Kim
Issue Date:January 2014
Striking a careful balance among coverage, occlusion, and complexity is a resounding theme in the visual understanding of large and complex three-dimensional flow fields. In this paper, we present a novel deformation framework for focus+context streamline ...
Geo-location based QR-Code authentication scheme to defeat active real-time phishing attack
Found in: Proceedings of the 2013 ACM workshop on Digital identity management (DIM '13)
By Daeseon Choi, Seung-Hun Jin, Sung-Hoon Lee, Seung-Hyun Kim
Issue Date:November 2013
Internet phishing attacks have been evolving along with the growth of online transactions on the Internet. MITM(Man-In-The-Middle) phishing is an attack that manipulates authentication and transaction information when an attacker is located in between a we...
Gatekeeper: providing secure interoperability between mobile web-browser and local resources
Found in: Proceedings of the 6th ACM workshop on Digital identity management (DIM '10)
By Daeseon Choi, Seung-Hun Jin, Seung-Hyun Kim
Issue Date:October 2010
The most popular platforms being developed currently are those used in mobile devices. In particular, mobile Web-based services have attracted the attention of platform developers. However, mobile Web applications offer limited functionality. Therefore, in...
Original Search Engine
Need a Web Account?
Become a Member
This site and all contents (unless otherwise noted) are Copyright ©2008, IEEE, Inc. All rights reserved.