Zobrazeno 1 - 10
of 27
pro vyhledávání: '"Chan Yeol Park"'
Publikováno v:
ETRI Journal, Vol 43, Iss 3, Pp 524-537 (2021)
High‐performance Linpack (HPL) is among the most popular benchmarks for evaluating the capabilities of computing systems and has been used as a standard to compare the performance of computing systems since the early 1980s. In the initial system‐
Externí odkaz:
https://doaj.org/article/afc581f3b10c4927aefd2f3ff959f4b4
Publikováno v:
Journal of Applied Mathematics, Vol 2014 (2014)
We propose approximate solutions for pricing zero-coupon defaultable bonds, credit default swap rates, and bond options based on the averaging principle of stochastic differential equations. We consider the intensity-based defaultable bond, where the
Externí odkaz:
https://doaj.org/article/2ae59cf9c2df43c89a2798351a54fa08
Publikováno v:
ETRI Journal, Vol 43, Iss 3, Pp 524-537 (2021)
High‐performance Linpack (HPL) is among the most popular benchmarks for evaluating the capabilities of computing systems and has been used as a standard to compare the performance of computing systems since the early 1980s. In the initial system‐
Publikováno v:
The Journal of Supercomputing. 77:6817-6831
Exascale computing, the next-generation computing environment, is expected to be applied to scientific and engineering applications. Accordingly, high-performance computing (HPC) technology is also being developed to improve the performance and high-
Publikováno v:
Cluster Computing.
High-performance computers are used for computation-intensive tasks. It is essential for these systems to simultaneously execute several computation-intensive tasks for efficient and timely system utilization. Since typical tasks have a longer runtim
Publikováno v:
ACSOS Companion
People use high performance computers (HPCs) for computation-intensive tasks. Often these tasks require a lot of running time of their corresponding softwares. It is important to execute several tasks simultaneously for the system utilization while f
Publikováno v:
Journal of the Korean Physical Society. 69:253-258
Quite a number of cyber-attacks to be place against supercomputers that provide highperformance computing (HPC) services to public researcher. Particularly, although the secure shell protocol (SSH) brute-force attack is one of the traditional attack
Publikováno v:
Chaos, Solitons & Fractals. 85:68-76
Given an intensity-based credit risk model, this paper studies dependence structure between default intensities. To model this structure, we use a multivariate shot noise intensity process, where jumps occur simultaneously and their sizes are correla
Publikováno v:
KIPS Transactions on Computer and Communication Systems. 4:205-212
SSH provides a secure, encrypted communication channel between two end point systems using public key encryption. But SSH brute force attack is one of the most significant attacks. This kind of attack aims to login to the SSH server by continually gu
Publikováno v:
Indian Journal of Science and Technology. 8
High speed and high capacity networks are critical for large scale (big) data services. In addition, security issues are even more important. KISTI (Korea Institute of Science and Technology Information) operates a variety of security facilities to p