default search action
Jong Kim 0001
Person information
- unicode name: 김종
- affiliation: Pohang University of Science and Technology, South Korea
Other persons with the same name
- Jong Kim 0002 — Seon Architects and Engineering Group, Cheongju, Korea
- Jong Kim 0003 — Nazarbayev University, Kazakhstan
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j53]Seungmin Lee, Youngsok Kim, Dukyun Nam, Jong Kim:
Gem5-AVX: Extension of the Gem5 Simulator to Support AVX Instruction Sets. IEEE Access 12: 20767-20778 (2024) - [j52]Namgyu Park, Jong Kim:
Toward Robust ASR System against Audio Adversarial Examples using Agitated Logit. ACM Trans. Priv. Secur. 27(2): 20 (2024) - [e4]Yongdae Kim, Jong Kim, Farinaz Koushanfar, Kasper Rasmussen:
Proceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2024, Seoul, Republic of Korea, May 27-29, 2024. ACM 2024 [contents] - 2023
- [c86]Yonggon Park, Youngjoo Ko, Jong Kim:
Mutation Methods for Structured Input to Enhance Path Coverage of Fuzzers. WISA 2023: 257-268 - 2022
- [j51]Sangwoo Ji, Namgyu Park, Dongbin Na, Bin Zhu, Jong Kim:
Defending against attacks tailored to transfer learning via feature distancing. Comput. Vis. Image Underst. 223: 103533 (2022) - [j50]Youngjoo Ko, Bin Zhu, Jong Kim:
Fuzzing with automatically controlled interleavings to detect concurrency bugs. J. Syst. Softw. 191: 111379 (2022) - [c85]Jungbeom Seo, Jong Kim:
Enhancing Scalability with Payment Requests Aggregation in Lightning Network. Blockchain 2022: 340-347 - [c84]Dongbin Na, Sangwoo Ji, Jong Kim:
Unrestricted Black-Box Adversarial Attack Using GAN with Limited Queries. ECCV Workshops (1) 2022: 467-482 - [c83]Geunwoo Kim, Michael Franz, Jong Kim:
The Ticket Price Matters in Sharding Blockchain. DPM/CBT@ESORICS 2022: 185-202 - [i2]Dongbin Na, Sangwoo Ji, Jong Kim:
Unrestricted Black-box Adversarial Attack Using GAN with Limited Queries. CoRR abs/2208.11613 (2022) - 2021
- [j49]Gyeongmin Lee, Bongjun Kim, Seungbin Song, Changsu Kim, Jong Kim, Hanjun Kim:
Precise Correlation Extraction for IoT Fault Detection With Concurrent Activities. ACM Trans. Embed. Comput. Syst. 20(5s): 94:1-94:21 (2021) - [c82]Namgyu Park, Sangwoo Ji, Jong Kim:
Detecting Audio Adversarial Examples with Logit Noising. ACSAC 2021: 586-595 - [e3]Yongdae Kim, Jong Kim, Giovanni Vigna, Elaine Shi:
CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15 - 19, 2021. ACM 2021, ISBN 978-1-4503-8454-4 [contents] - [i1]Namgyu Park, Sangwoo Ji, Jong Kim:
Detecting Audio Adversarial Examples with Logit Noising. CoRR abs/2112.06443 (2021) - 2020
- [j48]Hayoung Jeong, Taeho Kang, Jiwon Choi, Jong Kim:
A comparative assessment of Wi-Fi and acoustic signal-based HCI methods on the practicality. J. Multimodal User Interfaces 14(1): 123-137 (2020) - [c81]Dongbin Na, Namgyu Park, Sangwoo Ji, Jong Kim:
CAPTCHAs Are Still in Danger: An Efficient Scheme to Bypass Adversarial CAPTCHAs. WISA 2020: 31-44
2010 – 2019
- 2019
- [j47]Taeho Kang, Sangwoo Ji, Hayoung Jeong, Bin Zhu, Jong Kim:
WearAuth: Wristwear-Assisted User Authentication for Smartphones Using Wavelet-Based Multi-Resolution Analysis. IEICE Trans. Inf. Syst. 102-D(10): 1976-1992 (2019) - [c80]Bongjun Kim, Seonyeong Heo, Gyeongmin Lee, Seungbin Song, Jong Kim, Hanjun Kim:
Spinal code: automatic code extraction for near-user computation in fogs. CC 2019: 87-98 - [c79]Sangwoo Ji, Youngjoo Ko, Saeyoung Oh, Jong Kim:
Pinpoint Rowhammer: Suppressing Unwanted Bit Flips on Rowhammer Attacks. AsiaCCS 2019: 549-560 - [c78]Youngjoo Ko, Sangwoo Ji, Jong Kim:
Low-Noise LLC Side-Channel Attack with Perf. WISA 2019: 328-340 - 2018
- [j46]Jihun Kim, Joonsung Kim, Pyeongsu Park, Jong Kim, Jangwoo Kim:
SSD Performance Modeling Using Bottleneck Analysis. IEEE Comput. Archit. Lett. 17(1): 80-83 (2018) - [j45]Beumjin Cho, Sangho Lee, Meng Xu, Sangwoo Ji, Taesoo Kim, Jong Kim:
Prevention of cross-update privacy leaks on android. Comput. Sci. Inf. Syst. 15(1): 111-137 (2018) - [c77]Jiwon Choi, Hayoung Jeoung, Jihun Kim, Youngjoo Ko, Wonup Jung, Hanjun Kim, Jong Kim:
Detecting and Identifying Faulty IoT Devices in Smart Home with Context Extraction. DSN 2018: 610-621 - [c76]Joonsung Kim, Pyeongsu Park, Jaehyung Ahn, Jihun Kim, Jong Kim, Jangwoo Kim:
SSDcheck: Timely and Accurate Prediction of Irregular Behaviors in Black-Box SSDs. MICRO 2018: 455-468 - [c75]Sanghak Lee, Sangwoo Ji, Jong Kim:
Security Analysis of Mobile Web Browser Hardware Accessibility: Study with Ambient Light Sensors. WISA 2018: 3-15 - [c74]Saeyoung Oh, Jong Kim:
Reliable Rowhammer Attack and Mitigation Based on Reverse Engineering Memory Address Mapping Algorithms. WISA 2018: 146-158 - [e2]Jong Kim, Gail-Joon Ahn, Seungjoo Kim, Yongdae Kim, Javier López, Taesoo Kim:
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018. ACM 2018 [contents] - 2017
- [c73]Gyeongmin Lee, Seonyeong Heo, Bongjun Kim, Jong Kim, Hanjun Kim:
Integrated IoT programming with selective abstraction. LCTES 2017: 51-60 - [c72]Gyeongmin Lee, Seonyeong Heo, Bongjun Kim, Jong Kim, Hanjun Kim:
Rapid prototyping of IoT applications with Esperanto compiler. RSP 2017: 85-91 - [c71]Seonyeong Heo, Seungbin Song, Jong Kim, Hanjun Kim:
RT-IFTTT: Real-Time IoT Framework with Trigger Condition-Aware Flexible Polling Intervals. RTSS 2017: 266-276 - [c70]Sanghak Lee, Jiwon Choi, Jihun Kim, Beumjin Cho, Sangho Lee, Hanjun Kim, Jong Kim:
FACT: Functionality-centric Access Control System for IoT Programming Frameworks. SACMAT 2017: 43-54 - [c69]Vanesco A. J. Boehm, Jong Kim, James Won-Ki Hong:
Holistic Tracking of Products on the Blockchain Using NFC and Verified Users. WISA 2017: 184-195 - 2016
- [j44]Sangho Lee, Jong Kim, Yoonho Kim:
Preserving source- and sink-location privacy in sensor networks. Comput. Sci. Inf. Syst. 13(1): 115-130 (2016) - [j43]Bongjun Kim, Seonyeong Heo, Gyeongmin Lee, Soyeon Park, Hanjun Kim, Jong Kim:
Heterogeneous Distributed Shared Memory for Lightweight Internet of Things Devices. IEEE Micro 36(6): 16-24 (2016) - [j42]Jonghyuk Song, Sangho Lee, Jong Kim:
Inference Attack on Browsing History of Twitter Users Using Public Click Analytics and Twitter Metadata. IEEE Trans. Dependable Secur. Comput. 13(3): 340-354 (2016) - [c68]Hyungsub Kim, Sangho Lee, Jong Kim:
Inferring browser activity and status through remote monitoring of storage usage. ACSAC 2016: 410-421 - [c67]Xinyu Liu, Beumjin Cho, Jong Kim:
SD-OVS: SYN Flooding Attack Defending Open vSwitch for SDN. WISA 2016: 29-41 - 2015
- [c66]Jonghyuk Song, Sangho Lee, Jong Kim:
CrowdTarget: Target-based Detection of Crowdturfing in Online Social Networks. CCS 2015: 793-804 - [c65]Hoa Ngo, Jong Kim:
Location Privacy via Differential Private Perturbation of Cloaking Area. CSF 2015: 63-74 - [c64]Sangho Lee, Hyungsub Kim, Jong Kim:
Identifying Cross-origin Resource Status Using Application Cache. NDSS 2015 - [c63]Binh P. Nguyen, Hoa Ngo, Jihun Kim, Jong Kim:
Publishing Graph Data with Subgraph Differential Privacy. WISA 2015: 134-145 - 2014
- [j41]Sangho Lee, Jong Kim:
Early filtering of ephemeral malicious accounts on Twitter. Comput. Commun. 54: 48-57 (2014) - [c62]Hyungsub Kim, Sangho Lee, Jong Kim:
Exploring and mitigating privacy threats of HTML5 geolocation API. ACSAC 2014: 306-315 - [c61]Dongju Chae, Jihun Kim, Jangwoo Kim, Jong Kim, Seungjun Yang, Yeongpil Cho, Yongin Kwon, Yunheung Paek:
CMcloud: Cloud Platform for Cost-Effective Offloading of Mobile Applications. CCGRID 2014: 434-444 - [c60]Sangho Lee, Youngsok Kim, Jangwoo Kim, Jong Kim:
Stealing Webpages Rendered on Your Browser by Exploiting GPU Vulnerabilities. IEEE Symposium on Security and Privacy 2014: 19-33 - [c59]Jaehyeok Song, Jonghyuk Song, Jong Kim:
Detection of Heap-Spraying Attacks Using String Trace Graph. WISA 2014: 17-26 - 2013
- [j40]Sangho Lee, Jong Kim:
Fluxing botnet command and control channels with URL shortening services. Comput. Commun. 36(3): 320-332 (2013) - [j39]Hiep H. Nguyen, Jong Kim, Yoonho Kim:
Differential Privacy in Practice. J. Comput. Sci. Eng. 7(3): 177-186 (2013) - [j38]Taeho Kang, Xiang Li, Chansu Yu, Jong Kim:
A Survey of Security Mechanisms with Direct Sequence Spread Spectrum Signals. J. Comput. Sci. Eng. 7(3): 187-197 (2013) - [j37]Sangho Lee, Jong Kim:
WarningBird: A Near Real-Time Detection System for Suspicious URLs in Twitter Stream. IEEE Trans. Dependable Secur. Comput. 10(3): 183-195 (2013) - [j36]Yuna Kim, Ki-Young Jung, Tae-Hyung Kim, Jong Kim:
A distributed energy-efficient clustering scheme for deploying IDS in MANETs. Telecommun. Syst. 52(1): 85-96 (2013) - [c58]Young-min Park, Jong Kim, Yoonho Kim:
Distributed certificate authority scheme with weighted secret sharing for mobile ad-hoc networks. NOF 2013: 1-6 - [c57]Jihun Kim, Dongju Chae, Jangwoo Kim, Jong Kim:
Guide-copy: fast and silent migration of virtual machine for datacenters. SC 2013: 66:1-66:12 - [c56]Hayoung Lee, Taeho Kang, Sangho Lee, Jong Kim, Yoonho Kim:
Punobot: Mobile Botnet Using Push Notification Service in Android. WISA 2013: 124-137 - [c55]Jonghyuk Song, Sangho Lee, Jong Kim:
I know the shortened URLs you clicked on Twitter: inference attack using public click analytics and Twitter metadata. WWW 2013: 1191-1200 - 2012
- [j35]Sangho Lee, Jin Seok Kim, Sung Je Hong, Jong Kim:
Distance Bounding with Delayed Responses. IEEE Commun. Lett. 16(9): 1478-1481 (2012) - [j34]Jin Seok Kim, Dae Hyun Yum, Sung Je Hong, Jong Kim, Pil Joong Lee:
Security Condition for Exact Localization in Wireless Ad Hoc Networks. IEICE Trans. Commun. 95-B(7): 2459-2462 (2012) - [j33]Sangho Lee, Hay-Rim Lee, Seungkwang Lee, Jong Kim:
DRMFS: A file system layer for transparent access semantics of DRM-protected contents. J. Syst. Softw. 85(5): 1058-1066 (2012) - [j32]Jin Seok Kim, Dae Hyun Yum, Pil Joong Lee, Sung Je Hong, Jong Kim:
A Hybrid Sonar Algorithm for Submersible Cars to Verify the Location of Senders. IEEE Trans. Veh. Technol. 61(6): 2707-2714 (2012) - [c54]Yuseok Jeon, Tae-Hyung Kim, Yuna Kim, Jong Kim:
LT-OLSR: Attack-tolerant OLSR against link spoofing. LCN 2012: 216-219 - [c53]Sangho Lee, Jong Kim:
WarningBird: Detecting Suspicious URLs in Twitter Stream. NDSS 2012 - 2011
- [c52]Sangho Lee, Jong Kim:
A batch rekeying time decision algorithm for IPTV systems. CCNC 2011: 901-905 - [c51]Byoungyoung Lee, Jinoh Oh, Hwanjo Yu, Jong Kim:
Protecting location privacy using location semantics. KDD 2011: 1289-1297 - [c50]Jonghyuk Song, Sangho Lee, Jong Kim:
Spam Filtering in Twitter Using Sender-Receiver Relationship. RAID 2011: 301-317 - 2010
- [j31]Yuna Kim, Wan Yeon Lee, Kyong Hoon Kim, Jong Kim:
AdaFF: Adaptive Failure-Handling Framework for Composite Web Services. IEICE Trans. Inf. Syst. 93-D(4): 834-842 (2010) - [j30]Kyong Hoon Kim, Wan Yeon Lee, Jong Kim, Rajkumar Buyya:
SLA-Based Scheduling of Bag-of-Tasks Applications on Power-Aware Cluster Systems. IEICE Trans. Inf. Syst. 93-D(12): 3194-3201 (2010) - [c49]Byoungyoung Lee, Yuna Kim, Jong Kim:
binOb+: a framework for potent and stealthy binary obfuscation. AsiaCCS 2010: 271-281 - [c48]Sangho Lee, Heejin Park, Jong Kim:
A secure and mutual-profitable DRM interoperability scheme. ISCC 2010: 75-80
2000 – 2009
- 2009
- [j29]Sangho Lee, Jong Kim, Sung Je Hong:
Redistributing time-based rights between consumer devices for content sharing in DRM system. Int. J. Inf. Sec. 8(4): 263-273 (2009) - [j28]Sangho Lee, Jong Kim, Sung Je Hong:
Security weakness of Tseng's fault-tolerant conference-key agreement protocol. J. Syst. Softw. 82(7): 1163-1167 (2009) - [c47]Yuna Kim, Jong Kim, Junghei You, Heejae Park:
Exclusion of Forged Files from Multi-source Downloadable P2P Systems. AINA 2009: 608-615 - 2008
- [j27]Heejae Park, Jong Kim:
Copyright Protection for Modifiable Digital Content Based on Distributed Environment. IEICE Trans. Inf. Syst. 91-D(5): 1390-1397 (2008) - [j26]Kyong Hoon Kim, Wan Yeon Lee, Jong Kim:
Energy-Aware Error Correction for QoS-Provisioning Real-Time Communications in Wireless Networks. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 91-A(7): 1682-1685 (2008) - [j25]Jae Keun Park, Wan Yeon Lee, Sung Je Hong, Jong Kim:
Dynamic Two-Tier Cell Structure for Bandwidth Reservation of Handoffs in Cellular Networks. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 91-A(10): 3003-3005 (2008) - [c46]Tae-Hyung Kim, Young-Sik Choi, Jong Kim, Sung Je Hong:
Annulling SYN Flooding Attacks with Whitelist. AINA Workshops 2008: 371-376 - [c45]Yuna Kim, Jong Kim:
Allowing user-specified failure handling in web services composition. ICUIMC 2008: 452-458 - 2007
- [j24]O-Hoon Kwon, So Young Lee, Jong Kim:
FileTrust: Reputation Management for Reliable Resource Sharing in Structured Peer-to-Peer Networks. IEICE Trans. Commun. 90-B(4): 826-835 (2007) - [c44]Kyong Hoon Kim, Rajkumar Buyya, Jong Kim:
Power Aware Scheduling of Bag-of-Tasks Applications with Deadline Constraints on DVS-enabled Clusters. CCGRID 2007: 541-548 - [c43]Kyong Hoon Kim, Jong Kim:
An Adaptive DVS Checkpointing Scheme for Fixed-Priority Tasks with Reliability Constraints in Dependable Real-Time Embedded Systems. ICESS 2007: 560-571 - [e1]Yann-Hang Lee, Heung-Nam Kim, Jong Kim, Yongwan Park, Laurence Tianruo Yang, Sung Won Kim:
Embedded Software and Systems, [Third] International Conference, ICESS 2007, Daegu, Korea, May 14-16, 2007, Proceedings. Lecture Notes in Computer Science 4523, Springer 2007, ISBN 978-3-540-72684-5 [contents] - 2006
- [j23]Heejo Lee, Jong Kim, Wan Yeon Lee:
Resiliency of Network Topologies under Path-Based Attacks. IEICE Trans. Commun. 89-B(10): 2878-2884 (2006) - [c42]Bong-Soo Roh, O-Hoon Kwon, Sung Je Hong, Jong Kim:
The Exclusion of Malicious Routing Peers in Structured P2P Systems. AP2PC 2006: 43-50 - [c41]So Young Lee, O-Hoon Kwon, Jong Kim, Sung Je Hong:
Mitigating the Impact of Liars by Reflecting Peer's Credibility on P2P File Reputation Systems. AP2PC 2006: 111-122 - [c40]Kyong Hoon Kim, Rajkumar Buyya, Jong Kim:
Imprecise Computation Grid Application Model for Flexible Market-Based Resource Allocation. CCGRID 2006: 654-658 - [c39]Deok Jin Kim, Tae-Hyung Kim, Jong Kim, Sung Je Hong:
Return Address Randomization Scheme for Annuling Data-Injection Buffer Overflow Attacks. Inscrypt 2006: 238-252 - [c38]Kyong Hoon Kim, Jong Kim, Sung Je Hong:
Dual-Mode r-Reliable Task Model for Flexible Scheduling in Reliable Real-Time Systems. EUC 2006: 308-317 - [c37]Kyong Hoon Kim, Jong Kim:
An Energy-Efficient FEC Scheme for Weakly Hard Real-Time Communications in Wireless Networks. RTCSA 2006: 415-419 - [c36]Ki Hun Lee, Yuna Kim, Sung Je Hong, Jong Kim:
PolyI-D: Polymorphic Worm Detection Based on Instruction Distribution. WISA 2006: 45-59 - 2005
- [j22]Kyong Hoon Kim, Jong Kim, Sung Je Hong:
An Adaptive FEC Scheme for Firm Real-Time Multimedia Communications in Wireless Networks. IEICE Trans. Commun. 88-B(7): 2794-2801 (2005) - [c35]So Young Lee, O-Hoon Kwon, Jong Kim, Sung Je Hong:
A Trust Management Scheme in Structured P2P Systems. AP2PC 2005: 30-43 - [c34]Byung Joon Kim, Kyong Hoon Kim, Sung Je Hong, Jong Kim:
Ticket-Based Grid Services Architecture for Dynamic Virtual Organizations. EGC 2005: 394-403 - [c33]Jae Keun Park, Sung Je Hong, Jong Kim:
Mobile Multicast Routing Protocol Using Prediction of Dwelling Time of a Mobile Host. ICN (2) 2005: 884-891 - [c32]O-Hoon Kwon, Seung-Min Lee, Heejo Lee, Jong Kim, Sang Cheon Kim, Gun Woo Nam, Joong Gil Park:
HackSim: An Automation of Penetration Testing for Remote Buffer Overflow Vulnerabilities. ICOIN 2005: 652-661 - [c31]Junyoung Park, Sung Je Hong, Jong Kim:
Energy-saving design technique achieved by latched pass-transistor adiabatic logic. ISCAS (5) 2005: 4693-4696 - [c30]Ju Yeob Kim, Sung Je Hong, Jong Kim:
Parallely testable design for detection of neighborhood pattern sensitive faults in high density DRAMs. ISCAS (6) 2005: 5854-5857 - [c29]Ha Won Kim, Sung Je Hong, Jong Kim:
Adaptive Location Management Scheme for Mobile IP. PerCom Workshops 2005: 263-267 - [c28]So Young Lee, O-Hoon Kwon, Jong Kim, Sung Je Hong:
A Reputation Management System in Structured Peer-to-Peer Networks. WETICE 2005: 362-367 - 2004
- [j21]Seung-Hyun Kim, Kyong Hoon Kim, Jong Kim, Sung Je Hong, Sangwan Kim:
Workflow-Based Authorization Service in the Grid. J. Grid Comput. 2(1): 43-55 (2004) - [c27]Kyong Hoon Kim, Jong Kim, Sung Je Hong:
Best-Effort Scheduling (m, k)-Firm Real-Time Tasks Based on the (m, k)-Firm Constraint Meeting Probability. ESA/VLSI 2004: 240-248 - [c26]Heejae Park, Jong Kim:
Modifiable Digital Content Protection in P2P. ISC 2004: 379-390 - [c25]Heejo Lee, Jong Kim:
Attack Resiliency of Network Topologies. PDCAT 2004: 638-641 - [c24]Byung Joon Kim, Sung Je Hong, Jong Kim:
Ticket-based fine-grained authorization service in the dynamic VO environment. SWS 2004: 29-36 - 2003
- [j20]Wan Yeon Lee, Sung Je Hong, Jong Kim, Sunggu Lee:
Dynamic load balancing for switch-based networks. J. Parallel Distributed Comput. 63(3): 286-298 (2003) - [j19]Wan Yeon Lee, Sung Je Hong, Jong Kim:
On-line scheduling of scalable real-time tasks on multiprocessor systems. J. Parallel Distributed Comput. 63(12): 1315-1324 (2003) - [j18]Hyo-Chang Nam, Jong Kim, Sung Je Hong, Sunggu Lee:
Secure checkpointing. J. Syst. Archit. 48(8-10): 237-254 (2003) - [j17]Heejo Lee, Jong Kim, Sung Je Hong, Sunggu Lee:
Task scheduling using a block dependency DAG for block-oriented sparse Cholesky factorization. Parallel Comput. 29(1): 135-159 (2003) - [j16]Heejo Lee, Jong Kim, Sung Je Hong, Sunggu Lee:
Processor Allocation and Task Scheduling of Matrix Chain Products on Parallel Systems. IEEE Trans. Parallel Distributed Syst. 14(4): 394-407 (2003) - [c23]Seung-Hyun Kim, Jong Kim, Sung Je Hong, Sangwan Kim:
Workflow-based Authorization Service in Grid. GRID 2003: 94-100 - [c22]Heejae Park, Jong Kim:
PCMHoDC. A Scheme to Protect Copyright & Modification History of Digital Contents. SEC 2003: 85-96 - [c21]Yuna Kim, Jong Kim:
Web Prefetching Using Display-Based Prediction. Web Intelligence 2003: 486-489 - 2001
- [c20]Jong Kim, Kang G. Shin:
Performance Evaluation of Dependable Real-Time Communication with Elastic QoS. DSN 2001: 295-303 - [c19]Hyo-Chang Nam, Jong Kim, Sung Je Hong, Sunggu Lee:
A Secure Checkpointing System. PRDC 2001: 49-56 - 2000
- [j15]Wan Yeon Lee, Sung Je Hong, Jong Kim:
On the Configuration of Switch-Based Networks with Wormhole Routing. J. Interconnect. Networks 1(2): 95-114 (2000) - [c18]Heejo Lee, Jong Kim, Sung Je Hong, Sunggu Lee:
Task Scheduling using a Block Dependency DAG for Block-Oriented Sparse Cholesky Factorization. SAC (2) 2000: 641-648
1990 – 1999
- 1999
- [j14]Kyungwan Nam, Sunggu Lee, Jong Kim:
Path Selection for Real-Time Communication in Wormhole Networks. Int. J. High Speed Comput. 10(4): 343-359 (1999) - [j13]Kyungwan Nam, Jaewon Seo, Sunggu Lee, Jong Kim:
Synchronous Load Balancing in Hypercube Multicomputers with Faulty Nodes. J. Parallel Distributed Comput. 58(1): 26-43 (1999) - [j12]SangHo Chae, Jong Kim, Sung Je Hong, Sunggu Lee:
Design and Analysis of the Dual-Torus Network. New Gener. Comput. 17(3): 229-254 (1999) - [c17]Hyo-Chang Nam, Jong Kim, Sung Je Hong, Sunggu Lee:
Reliable Probabilistic Checkpointing. PRDC 1999: 153-160 - 1998
- [j11]Howon Kim, Hyun Suk Lee, Sunggu Lee, Jong Kim:
Adaptive Virtual Cut-Through as a Viable Routing Method. J. Parallel Distributed Comput. 52(1): 82-95 (1998) - [j10]Jeong Beom Kim, Sung Je Hong, Jong Kim:
Design of a built-in current sensor for IDDQ testing. IEEE J. Solid State Circuits 33(8): 1266-1272 (1998) - [c16]Byungjae Kim, Jong Kim, Sung Je Hong, Sunggu Lee:
A Real-Time Communication Method for Wormhole Switching Networks. ICPP 1998: 527-534 - 1997
- [j9]Wan Yeon Lee, Sung Je Hong, Jong Kim:
Dynamic Load Distribution on Meshes with Broadcasting. Int. J. High Speed Comput. 9(4): 337-357 (1997) - [j8]Jong Kim, Heejo Lee, Sunggu Lee:
Replicated Process Allocation for Load Distribution in Fault-Tolerant Multicomputers. IEEE Trans. Computers 46(4): 499-505 (1997) - [c15]Hyo-Chang Nam, Jong Kim, Sung Je Hong, Sunggu Lee:
Probabilistic Checkpointing. FTCS 1997: 48-57 - [c14]Wan Yeon Lee, Sung Je Hong, Jong Kim:
Dynamic Load Distribution on a Mesh with a Single Bus. ICPADS 1997: 368-375 - [c13]Byung S. Yoo, Chita R. Das, Jong Kim:
A Performance Modeling Technique for Mesh-Connected Multicomputers. ICPADS 1997: 408-413 - [c12]Jaewon Seo, Sunggu Lee, Jong Kim:
Synchronous Load Balancing in Hypercube Multicomputers with Faulty Nodes. ICPADS 1997: 414-421 - [c11]O-Hoon Kwon, Jong Kim, Sung Je Hong, Sunggu Lee:
Real-Time Job Scheduling in Hypercube Systems. ICPP 1997: 166-169 - 1996
- [j7]Sunggu Lee, Jong Kim:
Path Selection for Message Passing in a Circuit-Switched Multicomputer. J. Parallel Distributed Comput. 35(2): 211-218 (1996) - [j6]Jong Kim, Kang G. Shin:
Execution Time Analysis of Communicating Tasks in Distributed Systems. IEEE Trans. Computers 45(5): 572-579 (1996) - 1995
- [c10]Jong Kim, Heejo Lee, Sunggu Lee:
Process Allocation for Load Distribution in Fault-Tolerant Multicomputers. FTCS 1995: 174-183 - [c9]Hyun Suk Lee, Howon Kim, Jong Kim, Sunggu Lee:
Adaptive Virutal Cut-through as an Alternative to Wormhole Routing. ICPP (1) 1995: 68-75 - [c8]SangHo Chae, Jong Kim, Dongseung Kim, Sung Je Hong, Sunggu Lee:
DTN: A New Partitionable Torus Topology. ICPP (1) 1995: 84-91 - [c7]Heejo Lee, Kenji Toda, Jong Kim, Kenji Nishida, Eiichi Takahashi, Yoshinori Yamaguchi:
Performance comparison of real-time architectures using simulation. RTCSA 1995: 150- - 1994
- [j5]Jong Kim, Chita R. Das:
Hypercube Communication Delay with Wormhole Routing. IEEE Trans. Computers 43(7): 806-814 (1994) - [j4]Jong Kim, Kang G. Shin:
Operationally Enhanced Folded Hypercubes. IEEE Trans. Parallel Distributed Syst. 5(12): 1310-1316 (1994) - [c6]Sunggu Lee, Jong Kim:
Path Selection for Communicating Tasks in a Wormhole-Routed Multicomputer. ICPP (3) 1994: 172-175 - 1993
- [j3]Jong Kim, Kang G. Shin:
Deadlock-Free Fault-Tolerant Routing in Injured Hypercubes. IEEE Trans. Computers 42(9): 1078-1088 (1993) - [c5]Prasant Mohapatra, Chansu Yu, Chita R. Das, Jong Kim:
A Lazy Scheduling Scheme for Improving Hypercube Performance. ICPP (1) 1993: 110-117 - 1992
- [j2]Chita R. Das, Jong Kim:
A Unified Task-Based Dependability Model for Hypercube Computers. IEEE Trans. Parallel Distributed Syst. 3(3): 312-324 (1992) - 1991
- [j1]Jong Kim, Chita R. Das, Woei Lin:
A Top-Down Processor Allocation Scheme for Hypercube Computers. IEEE Trans. Parallel Distributed Syst. 2(1): 20-30 (1991) - [c4]Jong Kim, Chita R. Das:
Modeling wormhole routing in a hypercube. ICDCS 1991: 386-393 - [c3]Jong Kim, Chita R. Das:
On Subcube Dependability in a Hypercube. SIGMETRICS 1991: 111-119
1980 – 1989
- 1989
- [c2]Chita R. Das, Jong Kim:
An analytical model for computing hypercube availability. FTCS 1989: 530-537 - [c1]Jong Kim, Chita R. Das, Woei Lin:
A Processor Allocation Scheme for Hypercube Computers. ICPP (2) 1989: 231-238
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 21:28 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint