Zobrazeno 1 - 10
of 62
pro vyhledávání: '"Gihyun Jung"'
Publikováno v:
Journal of the Korea Society of Computer and Information. 18:21-31
ECU(Electric Control Unit) on the important features of the vehicle is equipped, ECU between sending and receiving messages is connected to one of the internal network(CAN BUS), but this network easily accessible from the outside and not intended to
Publikováno v:
Journal of the Korea Society of Computer and Information. 18:111-123
To verify software vulnerability, the method of conjecturing software structure and then testing the software based on the conjectured structure has been highlighted. To utilize the method, an efficient way to conjecture software structure is require
Publikováno v:
Applied Soft Computing. 8:1200-1210
The ability to dynamically collect and analyze network traffic and to accurately report the current network status is critical in the face of large-scale intrusions, and enables networks to continually function despite of traffic fluctuations. The pa
Publikováno v:
Journal of Computer Science. 3:144-148
This research shows a case study of the Black-Box testing for Temperature Controller (TC) which is one of the typical embedded systems. A test automation tool, TEST, was developed and some kinds of TCs were tested using the tool. We presented statist
Publikováno v:
The KIPS Transactions:PartC. :253-262
In this paper, a session allocation algorithm for a switch with multiple shared links is proposed. The algorithm guarantees the reserved bandwidth to each service class and keeps the delay of sessions belonging to a service class as close as possible
Publikováno v:
The KIPS Transactions:PartC. :183-192
As the use of the Internet has explosively increased, it is likely for the Internet to be exposed to various attacks. Modeling the Internet attacks is essential to simulate the attacks. However, the existing studies on attack modeling have mainly foc
Publikováno v:
The KIPS Transactions:PartA. :143-148
The session management overhead on the network systems like firewalls or intrusion detection systems is getting grown as the session table is glowing. In this paper. we propose the event-based timeout management policy to increase packet processing t
Publikováno v:
The KIPS Transactions:PartA. :181-188
We propose a heuristic on-line scheduling algorithm for the IRIS (Increasing Reward with Increasing Service) tasks, which has low computation complexity and produces total reward approximated to that of previous on-line optimal algorithms. The previo
Publikováno v:
IEEE Transactions on Consumer Electronics. 49:80-88
A window based on-line scheduling algorithm to efficiently distribute processor service time to tasks for processing image frames is proposed for the Internet video conferencing system. The algorithm lets the tasks share a limited service time in a m
Publikováno v:
IEEE Transactions on Consumer Electronics. 45:455-464
In this paper, the design issues on a scaleable popularity independent video on demand (VOD) server which has been designed and implemented at Ajou University are discussed. The server with parallel architecture aims to resolve a basic performance bo