Hyunsoo Yoon

According to our database1, Hyunsoo Yoon authored at least 239 papers between 1987 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A Novel Semi-Supervised Learning Model for Smartphone-Based Health Telemonitoring.
IEEE Trans Autom. Sci. Eng., January, 2024

2023
A framework for generalizing critical heat flux detection models using unsupervised image-to-image translation.
Expert Syst. Appl., October, 2023

Eigen-Entropy: A metric for multivariate sampling decisions.
Inf. Sci., 2023

SelFormaly: Towards Task-Agnostic Unified Anomaly Detection.
CoRR, 2023

LEAT: Towards Robust Deepfake Disruption in Real-World Scenarios via Latent Ensemble Attack.
CoRR, 2023

AVATAR: Adversarial self-superVised domain Adaptation network for TARget domain.
CoRR, 2023

2022
Compliance-Driven Cybersecurity Planning Based on Formalized Attack Patterns for Instrumentation and Control Systems of Nuclear Power Plants.
Secur. Commun. Networks, 2022

A Generalized Framework for Critical Heat Flux Detection Using Unsupervised Image-to-Image Translation.
CoRR, 2022

2021
ZeroKernel: Secure Context-Isolated Execution on Commodity GPUs.
IEEE Trans. Dependable Secur. Comput., 2021

Classification score approach for detecting adversarial example in deep neural network.
Multim. Tools Appl., 2021

Data Correction For Enhancing Classification Accuracy By Unknown Deep Neural Network Classifiers.
KSII Trans. Internet Inf. Syst., 2021

A novel multi-task linear mixed model for smartphone-based telemonitoring.
Expert Syst. Appl., 2021

Mind control attack: Undermining deep learning with GPU memory exploitation.
Comput. Secur., 2021

An intelligent recommendation algorithm for red team strategy in edge computing powered massive Cyber Defense Exercise.
Comput. Commun., 2021

2020
Deep Residual Inception Encoder-Decoder Network for Medical Imaging Synthesis.
IEEE J. Biomed. Health Informatics, 2020

Selective Audio Adversarial Example in Evasion Attack on Speech Recognition System.
IEEE Trans. Inf. Forensics Secur., 2020

CAPTCHA Image Generation: Two-Step Style-Transfer Learning in Deep Neural Networks.
Sensors, 2020

Acoustic-decoy: Detection of adversarial examples through audio modification on speech recognition system.
Neurocomputing, 2020

Multipath transmission control protocol-based multi-access traffic steering solution for 5G multimedia-centric network: Design and testbed system implementation.
Int. J. Distributed Sens. Networks, 2020

Multi-Targeted Backdoor: Indentifying Backdoor Attack for Multiple Deep Neural Networks.
IEICE Trans. Inf. Syst., 2020

Robust CAPTCHA Image Generation Enhanced with Adversarial Example Methods.
IEICE Trans. Inf. Syst., 2020

A feature transfer enabled multi-task deep learning model on medical imaging.
Expert Syst. Appl., 2020

FriendNet Backdoor: Indentifying Backdoor Attack that is safe for Friendly Deep Neural Network.
Proceedings of the ICSIM '20: The 3rd International Conference on Software Engineering and Information Management, 2020

TargetNet Backdoor: Attack on Deep Neural Network with Use of Different Triggers.
Proceedings of the ICIIT 2020: 5th International Conference on Intelligent Information Technology, 2020

2019
An efficient multi-path pipeline transmission for a bulk data transfer in IEEE 802.15.4 multi-hop networks.
Wirel. Networks, 2019

Hybrid approach of parallel implementation on CPU-GPU for high-speed ECDSA verification.
J. Supercomput., 2019

A Novel Positive Transfer Learning Approach for Telemonitoring of Parkinson's Disease.
IEEE Trans Autom. Sci. Eng., 2019

Selective Poisoning Attack on Deep Neural Networks <sup>†</sup>.
Symmetry, 2019

Rootkit inside GPU Kernel Execution.
IEICE Trans. Inf. Syst., 2019

New Complementary Points of Cyber Security Schemes for Critical Digital Assets at Nuclear Power Plants.
IEEE Access, 2019

Restricted Evasion Attack: Generation of Restricted-Area Adversarial Example.
IEEE Access, 2019

Selective Untargeted Evasion Attack: An Adversarial Example That Will Not Be Classified as Certain Avoided Classes.
IEEE Access, 2019

CAPTCHA Image Generation Using Style Transfer Learning in Deep Neural Network.
Proceedings of the Information Security Applications - 20th International Conference, 2019

Face Friend-Safe Adversarial Example on Face Recognition System.
Proceedings of the Eleventh International Conference on Ubiquitous and Future Networks, 2019

Priority Adversarial Example in Evasion Attack on Multiple Deep Neural Networks.
Proceedings of the International Conference on Artificial Intelligence in Information and Communication, 2019

POSTER: Detecting Audio Adversarial Example through Audio Modification.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

Selective Poisoning Attack on Deep Neural Network to Induce Fine-Grained Recognition Error.
Proceedings of the 2nd IEEE International Conference on Artificial Intelligence and Knowledge Engineering, 2019

2018
New Statistical Transfer Learning Models for Health Care Applications.
PhD thesis, 2018

A Simple and Enriched Closed-Form Formula for Cell Residence Time in 5G Heterogeneous Networks.
Wirel. Pers. Commun., 2018

Secure mobile device structure for trust IoT.
J. Supercomput., 2018

Efficient Privacy-Preserving Matrix Factorization for Recommendation via Fully Homomorphic Encryption.
ACM Trans. Priv. Secur., 2018

Random Untargeted Adversarial Example on Deep Neural Network.
Symmetry, 2018

Duo: Software Defined Intrusion Tolerant System Using Dual Cluster.
Secur. Commun. Networks, 2018

Efficient Approach for Mitigating Mobile Phishing Attacks.
IEICE Trans. Commun., 2018

CAPTCHA Image Generation Systems Using Generative Adversarial Networks.
IEICE Trans. Inf. Syst., 2018

Advanced Ensemble Adversarial Example on Unknown Deep Neural Network Classifiers.
IEICE Trans. Inf. Syst., 2018

Friend-safe evasion attack: An adversarial example that is correctly recognized by a friendly classifier.
Comput. Secur., 2018

Multi-Targeted Adversarial Example in Evasion Attack on Deep Neural Network.
IEEE Access, 2018

One-Pixel Adversarial Example that Is Safe for Friendly Deep Neural Networks.
Proceedings of the Information Security Applications - 19th International Conference, 2018

OpenCL Based Implementation of ECDSA Signature Verification for V2X Communication.
Proceedings of the Advanced Multimedia and Ubiquitous Engineering, 2018

Fooling a Neural Network in Military Environments: Random Untargeted Adversarial Example.
Proceedings of the 2018 IEEE Military Communications Conference, 2018

POSTER: Zero-Day Evasion Attack Analysis on Race between Attack and Defense.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

2017
Designing and Implementing a Diversity Policy for Intrusion-Tolerant Systems.
IEICE Trans. Inf. Syst., 2017

Detecting Online Game Chargeback Fraud Based on Transaction Sequence Modeling Using Recurrent Neural Network.
Proceedings of the Information Security Applications - 18th International Conference, 2017

Friend-Safe Adversarial Examples in an Evasion Attack on a Deep Neural Network.
Proceedings of the Information Security and Cryptology - ICISC 2017 - 20th International Conference, Seoul, South Korea, November 29, 2017

2016
RM-MAC: a reservation based multi-channel MAC protocol for wireless sensor networks.
Wirel. Networks, 2016

Channel-quality-aware multihop broadcast for asynchronous multi-channel wireless sensor networks.
Wirel. Networks, 2016

Motion-MiX DHT for Wireless Mobile Networks.
IEEE Trans. Mob. Comput., 2016

Protecting secret keys in networked devices with table encoding against power analysis attacks.
J. High Speed Networks, 2016

Sorting Method for Fully Homomorphic Encrypted Data Using the Cryptographic Single-Instruction Multiple-Data Operation.
IEICE Trans. Commun., 2016

Hybrid Recovery-Based Intrusion Tolerant System for Practical Cyber-Defense.
IEICE Trans. Inf. Syst., 2016

Preemptive Real-Time Scheduling Incorporating Security Constraint for Cyber Physical Systems.
IEICE Trans. Inf. Syst., 2016

Analysis of Cell Sojourn Time in Heterogeneous Networks With Small Cells.
IEEE Commun. Lett., 2016

Efficient Privacy-Preserving Matrix Factorization via Fully Homomorphic Encryption.
IACR Cryptol. ePrint Arch., 2016

On-demand bootstrapping mechanism for isolated cryptographic operations on commodity accelerators.
Comput. Secur., 2016

Efficient Privacy-Preserving Matrix Factorization via Fully Homomorphic Encryption: Extended Abstract.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

2015
Efficient Packet Routing in Highly Mobile Wireless Networks.
Wirel. Pers. Commun., 2015

Peer-assisted multimedia delivery using periodic multicast.
Inf. Sci., 2015

End-to-end mobility support in content centric networks.
Int. J. Commun. Syst., 2015

Customer Data Scanner for Hands-Free Mobile Payment.
IEICE Trans. Commun., 2015

Fully Batch Processing Enabled Memory Integrity Verification Algorithm Based on Merkle Tree.
Proceedings of the Information Security Applications - 16th International Workshop, 2015

2014
Partition and Cooperation for Crowded Multi-rate WLANs.
Wirel. Pers. Commun., 2014

Design of a Secure System Considering Quality of Service.
Symmetry, 2014

On the Design of Delay based Admission Control in Hierarchical Networks.
KSII Trans. Internet Inf. Syst., 2014

A Novel Routing Protocol for Cognitive Radio Networks with Cooperation Process.
KSII Trans. Internet Inf. Syst., 2014

A Novel Intrusion Tolerant System Using Live Migration.
IEICE Trans. Inf. Syst., 2014

First Experimental Result of Power Analysis Attacks on a FPGA Implementation of LEA.
IACR Cryptol. ePrint Arch., 2014

An Efficient Audit Scheme for Cloud Storage.
Proceedings of the Frontier and Innovation in Future Computing and Communications, 2014

Secure and Efficient Deduplication over Encrypted Data with Dynamic Updates in Cloud Storage.
Proceedings of the Frontier and Innovation in Future Computing and Communications, 2014

2013
Base station association schemes to reduce unnecessary handovers using location awareness in femtocell networks.
Wirel. Networks, 2013

EMBA: An Efficient Multihop Broadcast Protocol for Asynchronous Duty-Cycled Wireless Sensor Networks.
IEEE Trans. Wirel. Commun., 2013

A novel Adaptive Cluster Transformation (ACT)-based intrusion tolerant architecture for hybrid information technology.
J. Supercomput., 2013

A Survey on Communication Protocols for Wireless Sensor Networks.
J. Comput. Sci. Eng., 2013

A Survey on Intrusion-Tolerant System.
J. Comput. Sci. Eng., 2013

Algorithm learning based neural network integrating feature selection and classification.
Expert Syst. Appl., 2013

Enhanced cooperative communication MAC for mobile wireless networks.
Comput. Networks, 2013

Secure and efficient data retrieval over encrypted data using attribute-based encryption in cloud storage.
Comput. Electr. Eng., 2013

The Design of a Robust Intrusion Tolerance System through Advanced Adaptive Cluster Transformation and Vulnerability-Based VM Selection.
Proceedings of the 32th IEEE Military Communications Conference, 2013

The Design of a Policy-based Attack-Resilient Intrusion Tolerant System.
Proceedings of the Information Technology Convergence, 2013

2012
Authenticated public key broadcast encryption scheme secure against insiders' attack.
Math. Comput. Model., 2012

Congestion control for sudden bandwidth changes in TCP.
Int. J. Commun. Syst., 2012

The design of adaptive intrusion tolerant system(ITS) based on historical data.
Proceedings of the 7th International Conference for Internet Technology and Secured Transactions, 2012

A Secure Self-Encryption Scheme for Resource Limited Mobile Devices.
Proceedings of the International Conference on IT Convergence and Security, 2012

A Novel Intrusion Tolerant System Based on Adaptive Recovery Scheme (ARS).
Proceedings of the International Conference on IT Convergence and Security, 2012

Mobility support in content centric networks.
Proceedings of the ICN'12, 2012

2011
Active Queue Management for Flow Fairness and Stable Queue Length.
IEEE Trans. Parallel Distributed Syst., 2011

Sensor Node Localization by Three Mobile Anchors in the Wireless Sensor Networks.
IEICE Trans. Inf. Syst., 2011

MiGuard : Detecting and Guarding against Malicious Iframe through API Hooking.
IEICE Electron. Express, 2011

AQM for Weighted Fairness in Wireless LANs.
IEEE Commun. Lett., 2011

A Smart Handover Decision Algorithm Using Location Prediction for Hierarchical Macro/Femto-Cell Networks.
Proceedings of the 74th IEEE Vehicular Technology Conference, 2011

Multi-rate aware partition and cooperation in WLANs.
Proceedings of The ACM CoNEXT Student Workshop, 2011

2010
Distributed Fair Scheduling for Wireless Mesh Networks Using IEEE 802.11.
IEEE Trans. Veh. Technol., 2010

A Multi-service Group Key Management Scheme for Stateless Receivers in Wireless Mesh Networks.
Mob. Networks Appl., 2010

A Retransmission-Enhanced Duty-Cycle MAC Protocol Based on the Channel Quality for Wireless Sensor Networks.
IEICE Trans. Commun., 2010

VAMSD: Voronoi Diagram Based Autonomous Mobile Sensor Deployment for Maximizing Coverage.
IEICE Trans. Commun., 2010

Self-healing key distribution scheme with long service time.
IEICE Electron. Express, 2010

Customized Forwarding in application layer multicast for real-time services.
IEICE Electron. Express, 2010

An energy-efficient dispersion method for deployment of mobile sensor networks.
IEICE Electron. Express, 2010

A pseudo-random asynchronous duty cycle MAC protocol in wireless sensor networks.
IEEE Commun. Lett., 2010

MRMAC: Medium Reservation MAC Protocol for Reducing End-to-End Delay and Energy Consumption in Wireless Sensor Networks.
IEEE Commun. Lett., 2010

Providing forwarding assurance in multi-hop wireless networks.
Comput. Commun., 2010

Chosen ciphertext secure authenticated group communication using identity-based signcryption.
Comput. Math. Appl., 2010

An efficient identity-based proxy signcryption for secure broadcast.
Proceedings of the 5th International Conference for Internet Technology and Secured Transactions, 2010

2009
Improved batch exponentiation.
Inf. Process. Lett., 2009

Autonomous broadcast pruning in wireless ad hoc networks using coverage estimation.
Int. J. Pervasive Comput. Commun., 2009

A Resilient and Efficient Replication Attack Detection Scheme for Wireless Sensor Networks.
IEICE Trans. Inf. Syst., 2009

A Velocity-Based Bicasting Handover Scheme for 4G Mobile Systems.
IEICE Trans. Commun., 2009

A Decentralized Multi-Group Key Management Scheme.
IEICE Trans. Commun., 2009

Preamble allocation scheme using trajectory information for mobile relay stations.
IEEE Commun. Lett., 2009

Long-term flow fairness with fixed memory space.
IEEE Commun. Lett., 2009

Bandwidth efficient key distribution for secure multicast in dynamic wireless mesh networks.
Proceedings of the 2009 IEEE Wireless Communications and Networking Conference, 2009

A Distributed Deterministic and Resilient Replication Attack Detection Protocol in Wireless Sensor Networks.
Proceedings of the Communication and Networking, 2009

2008
Optimal modulation and coding scheme selection in cellular networks with hybrid-ARQ error control.
IEEE Trans. Wirel. Commun., 2008

An efficient delegation protocol with delegation traceability in the X.509 proxy certificate environment for computational grids.
Inf. Sci., 2008

Improving Handover Quality in 4G Mobile Systems.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008

An Efficient TDMA Scheduling Scheme for Wireless Sensor and Actor Networks.
IEICE Trans. Commun., 2008

Efficient and Secure Self-Organized Public Key Management for Mobile Ad Hoc Networks.
IEICE Trans. Commun., 2008

Reliability measure for sound source localization.
IEICE Electron. Express, 2008

Adaptive Hysteresis Using Mobility Correlation for Fast Handover.
IEEE Commun. Lett., 2008

Efficient service discovery mechanism for wireless sensor networks.
Comput. Commun., 2008

Security Considerations for Handover Schemes in Mobile WiMAX Networks.
Proceedings of the WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008, 2008

2007
A practical approach of ID-based cryptosystem in ad hoc networks.
Wirel. Commun. Mob. Comput., 2007

A robotic service framework supporting automated integration of ubiquitous sensors and devices.
Inf. Sci., 2007

Parallelized Scalar Multiplication on Elliptic Curves Defined over Optimal Extension Field.
Int. J. Netw. Secur., 2007

An effective traffic management scheme using adaptive handover time in next-generation cellular networks.
Int. J. Netw. Manag., 2007

Improved base-φ expansion method for Koblitz curves over optimal extension fields.
IET Inf. Secur., 2007

A Proximity-Based Self-Organizing Hierarchical Overlay Framework for Distributed Hash Tables.
IEICE Trans. Commun., 2007

A New Binary Image Authentication Scheme with Small Distortion and Low False Negative Rates.
IEICE Trans. Commun., 2007

Reactive Key Management Scheme for Access Control in Group Communications.
IEICE Trans. Commun., 2007

Weakness of the Synchro-Difference LKH Scheme for Secure Multicast.
IEEE Commun. Lett., 2007

Adaptive Resource Reservation for Efficient Resource Utilization in the Wireless Multimedia Network.
Proceedings of the Next Generation Teletraffic and Wired/Wireless Advanced Networking, 2007

Decentralized group key management for dynamic networks using proxy cryptography.
Proceedings of the Q2SWinet'07, 2007

An Efficient Pre-authentication Scheme for IEEE 802.11-Based Vehicular Networks.
Proceedings of the Advances in Information and Computer Security, 2007

An Efficient Proactive Key Distribution Scheme for Fast Handoff in IEEE 802.11 Wireless Networks.
Proceedings of the Information Networking. Towards Ubiquitous Networking and Services, 2007

Performance of MCS Selection for Collaborative Hybrid-ARQ Protocol.
Proceedings of the Euro-Par 2007, 2007

2006
Expansion of Sliding Window Method for Finding Shorter Addition/Subtraction-Chains.
Int. J. Netw. Secur., 2006

Active Trial-and-error Attack on SASC Protocols.
Int. J. Netw. Secur., 2006

Rogue Public Key Registration Attack and the Importance of 'Proof of Possession' in the PKI Environment.
IEICE Trans. Inf. Syst., 2006

User-Perceived QoS in a Wireless Packet Network with Multiple Channel Conditions.
IEICE Trans. Commun., 2006

Real-time analysis of intrusion detection alerts via correlation.
Comput. Secur., 2006

Pre-authentication for Fast Handoff in Wireless Mesh Networks with Mobile APs.
Proceedings of the Information Security Applications, 7th International Workshop, 2006

A New Proxy Signature Scheme Providing Self-delegation.
Proceedings of the Information Security and Cryptology - ICISC 2006, 9th International Conference, Busan, Korea, November 30, 2006

Digital Rights Management with Right Delegation for Home Networks.
Proceedings of the Information Security and Cryptology - ICISC 2006, 9th International Conference, Busan, Korea, November 30, 2006

2005
Securing Mobile Agents by Integrity-Based Encryption.
IEICE Trans. Inf. Syst., 2005

Handoff Procedure for Seamless Service in IP and OFDM Based 4G Mobile Systems.
IEICE Trans. Electron., 2005

Autonomous Clustering Scheme for Wireless Sensor Networks Using Coverage Estimation-Based Self-Pruning.
IEICE Trans. Commun., 2005

Wireless packet fair queueing algorithms with link level retransmission.
Comput. Commun., 2005

Secure Group Communication with Multiplicative One-way Functions.
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005

Automated Teleoperation of Web-Based Devices Using Semantic Web Services.
Proceedings of the Innovations in Applied Artificial Intelligence, 2005

IEEE 802.11b WLAN Performance with Variable Transmission Rates: In View of High Level Throughput.
Proceedings of the Networking, 2005

Trust Management for Resilient Wireless Sensor Networks.
Proceedings of the Information Security and Cryptology, 2005

2004
Tamper Resistant Software by Integrity-Based Encryption.
Proceedings of the Parallel and Distributed Computing: Applications and Technologies, 2004

Secure Group Communication with Low Communication Complexity.
Proceedings of the Parallel and Distributed Computing: Applications and Technologies, 2004

A Smart Handoff Procedure in 4G Networks.
Proceedings of the ICETE 2004, 2004

Packet fair queueing algorithms for wireless networks with link level retransmission.
Proceedings of the 1st IEEE Consumer Communications and Networking Conference, 2004

2002
Grapes: Topology-Based Hierarchical Virtual Network for Peer-to-Peer Lookup Services.
Proceedings of the 31st International Conference on Parallel Processing Workshops (ICPP 2002 Workshops), 2002

Link Stability and Route Lifetime in Ad-hoc Wireless Networks.
Proceedings of the 31st International Conference on Parallel Processing Workshops (ICPP 2002 Workshops), 2002

A Fast Handoff Scheme For IP over Bluetooth.
Proceedings of the 31st International Conference on Parallel Processing Workshops (ICPP 2002 Workshops), 2002

2001
A design of macro-micro CDMA cellular overlays in the existing big urban areas.
IEEE J. Sel. Areas Commun., 2001

A new call admission control scheme using the user conformity for non-uniform wireless systems.
Proceedings of the 54th IEEE Vehicular Technology Conference, 2001

2000
An output queueing analysis of multipath ATM switches.
J. Syst. Archit., 2000

Punctuated Equilibria in Simple Genetic Algorithms for Functions of Unitation.
Complex Syst., 2000

On the construction of a powerful distributed authentication server without additional key management.
Comput. Commun., 2000

Movement-based Location Tracking with Extended Spatial Localities.
Proceedings of the 2000 ICDCS Workshops, April 10, 2000, Taipei, Taiwan, ROC, 2000

Handling Camera Anchors in Distributed Surveillance Systems.
Proceedings of the 2000 ICDCS Workshops, April 10, 2000, Taipei, Taiwan, ROC, 2000

1999
The deflection self-routing Banyan network: a large-scale ATM switch using the fully adaptive self-routing and its performance analyses.
IEEE/ACM Trans. Netw., 1999

Throttle and preempt: A flow control policy for real-time traffic in wormhole networks.
J. Syst. Archit., 1999

Novel recursive multicast algorithms in multistage interconnection networks for ATM switches.
J. High Speed Networks, 1999

Design and analysis of the virtual-time-based round robin fair scheduling algorithm for QoS guarantees.
Comput. Commun., 1999

Design and Implementation of a Multi-Threaded TMN Agent System.
Proceedings of the 1999 International Conference on Parallel Processing Workshops, 1999

Accelerating Key Establishment Protocols for Mobile Communication.
Proceedings of the Information Security and Privacy, 4th Australasian Conference, 1999

1998
On Submesh Allocation for Mesh Multicomputers: A Best-Fit Allocation and a Virtual Submesh Allocation for Faulty Meshes.
IEEE Trans. Parallel Distributed Syst., 1998

Fault-tolerant multicasting in MINs for ATM switches.
IEEE Commun. Lett., 1998

Cost-effective algorithms for multicast connection in ATM switches based on self-routing multistage networks.
Comput. Commun., 1998

Two-phase Multicast in Wormhole-Switched Bidirectional Multistage Banyan Networks.
Proceedings of the 1998 International Conference on Parallel Processing (ICPP '98), 1998

Fault-Tolerant Multicasting in Multistage Interconnection Networks.
Proceedings of the 1998 International Conference on Parallel Processing (ICPP '98), 1998

A new appraoch to server-aided secret computation.
Proceedings of the 1st International Conference on Information Security and Cryptology, 1998

Design and analysis of a fair scheduling algorithm for QoS guarantees in high-speed packet-switched networks.
Proceedings of the 1998 IEEE International Conference on Communications, 1998

1997
On the Correctness of Inside-Out Routing Algorithm.
IEEE Trans. Computers, 1997

Ring Embedding in Hypercubes with Faculty Nodes.
Parallel Process. Lett., 1997

Embedding of rings in 2-D meshes and tori with faulty nodes.
J. Syst. Archit., 1997

Two Real-Time Flow Controls in Wormhole Networks.
Int. J. High Speed Comput., 1997

Virtual-Time-Based Round Robin: A Hardware-Eflicient Fair Scheduling Algorithm for High-Speed Networks.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 1997

Performance Analysis of a Multicast Switch Based on Multistage Interconnection Networks.
Proceedings of the Proceedings IEEE INFOCOM '97, 1997

An adaptive sequential prefetching scheme in shared-memory multiprocessors.
Proceedings of the 1997 International Conference on Parallel Processing (ICPP '97), 1997

Throttle and Preempt: A New Flow Control for Real-Time Communications in Wormhole Networks.
Proceedings of the 1997 International Conference on Parallel Processing (ICPP '97), 1997

An Efficient Causal Order Algorithm for Message Delivery in Distributed System.
Proceedings of the 6th IEEE Workshop on Future Trends of Distributed Computer Systems (FTDCS '97), 1997

An Analysis of Punctuated Equilibria in Simple Genetic Algorithms.
Proceedings of the Artificial Evolution, Third European Conference, 1997

1996
Free Submesh List Strategy: a Best Fit Submesh Allocation in Mesh Connected Multicomputers.
Parallel Process. Lett., 1996

Drop-and-reroute: A new flow control policy for adaptive wormhole routing.
J. Syst. Archit., 1996

Design and Performance Analysis of Multistage Interconnection Networks Using a Recursive Multicast Algorithm.
Int. J. High Speed Comput., 1996

On the Best Fit Submesh Allocation Strategy in Mesh-Connected Multicomputers.
Int. J. High Speed Comput., 1996

Performance Analysis of Multipath Multistage Interconnection Networks with Nonuniform Output Traffic Distribution.
Proceedings of the 4th Euromicro Workshop on Parallel and Distributed Processing (PDP '96), 1996

A New Efficient Submesh Allocation Strategy for Mesh Multicomputers.
Proceedings of the 4th Euromicro Workshop on Parallel and Distributed Processing (PDP '96), 1996

Novel algorithms for multicast communication in self-routing MIN-based ATM switches.
Proceedings of the 1996 International Conference on Network Protocols, 1996

A Necessary and Sufficient Condition for Proper Routing in Omega-Omega Network.
Proceedings of the Euro-Par '96 Parallel Processing, 1996

New Modular Multiplication Algorithms for Fast Modular Exponentiation.
Proceedings of the Advances in Cryptology, 1996

1995
The knockout switch under nonuniform traffic.
IEEE Trans. Commun., 1995

Bit-permute multistage interconnection networks.
Microprocess. Microprogramming, 1995

Restriction-Free Adaptive Wormhole Routing in Multicomputer Networks.
Int. J. High Speed Comput., 1995

The cyclic banyan network: a fault tolerant multistage interconnection network with the fully-adaptive self-routing.
Proceedings of the Seventh IEEE Symposium on Parallel and Distributed Processing, 1995

Performance analysis of output buffers in multistage interconnection networks with multiple paths.
Proceedings of the Seventh IEEE Symposium on Parallel and Distributed Processing, 1995

Performance analysis of an ATM switch with multiple paths.
Proceedings of the 1995 International Conference on Network Protocols, 1995

Nonpreemptive scheduling algorithms for multimedia communication in local area networks.
Proceedings of the 1995 International Conference on Network Protocols, 1995

1994
Eventor: An Authoring System for Interactive Multimedia Applications.
Multim. Syst., 1994

A new deadlock prevention scheme for nonminimal adaptive wormhole routing.
Microprocess. Microprogramming, 1994

The Ring-Banyan Network: a Fault Tolerant Multistage Interconnection Network for Multiprocessor Systems.
Int. J. High Speed Comput., 1994

1993
An improved algorithm for protocol validation by extended circular exploration.
Microprocess. Microprogramming, 1993

Performance Evaluation of a Class of Multipath Packet Switching Interconnection Networks.
J. Parallel Distributed Comput., 1993

A Processor Allocation Strategy Using Cube Coalescing in Hypercube Multicomputers.
Proceedings of the Fifth IEEE Symposium on Parallel and Distributed Processing, 1993

Mode Based Type Inference for Prolog Programs.
Proceedings of the SEKE'93, 1993

Specification of Multimedia Composition and a Visual Programming Environment.
Proceedings of the First ACM International Conference on Multimedia '93, 1993

1992
An efficient mapping of Boltzmann machine computations onto distributed-memory multiprocessors.
Microprocess. Microprogramming, 1992

A systolic array exploiting the inherent parallelisms of artificial neural networks.
Microprocess. Microprogramming, 1992

Heuristic Subcube Allocation with Task Migration in Hypercube Systems.
Int. J. High Speed Comput., 1992

1991
Indirect Star-Type Networks for Large Multiprocessor Systems.
IEEE Trans. Computers, 1991

A heuristic processor allocation strategy in hypercube systems.
Proceedings of the Third IEEE Symposium on Parallel and Distributed Processing, 1991

Application of fully recurrent neural networks for speech recognition.
Proceedings of the 1991 International Conference on Acoustics, 1991

1990
Performance Analysis of Multibuffered Packet-Switching Networks in Multiprocessor Systems.
IEEE Trans. Computers, 1990

The B-Network: A Multistage Interconnection Network with Backward Links.
IEEE Trans. Computers, 1990

Parallel simulation of multilayered neural networks on distributed-memory multiprocessors.
Microprocessing and Microprogramming, 1990

On the Modulo M Translators for the Prime Memory System.
J. Parallel Distributed Comput., 1990

Enhanced parametric representation using binarized spectrum.
Proceedings of the First International Conference on Spoken Language Processing, 1990

Extended elman's recurrent neural network for syllable recognition.
Proceedings of the First International Conference on Spoken Language Processing, 1990

1989
The PM22I Interconnection Network.
IEEE Trans. Computers, 1989

B-Banyan and B-Delta Networks for Multiprocessor Systems.
J. Parallel Distributed Comput., 1989

1987
Performance Analysis of Multi-Buffered Packet-Switching Networks in Multiprocessor Systems.
Proceedings of the Supercomputing, 1987

Performance Analysis and Comparison of Packet Switching Interconnection Networks.
Proceedings of the International Conference on Parallel Processing, 1987

A New Approach to Internetworking of Integrated Services Local Networks.
Proceedings of the 7th International Conference on Distributed Computing Systems, 1987


  Loading...