Sachoun Park

According to our database1, Sachoun Park authored at least 11 papers between 2005 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
A 1/1.57-inch 50Mpixel CMOS Image Sensor With 1.0μm All-Directional Dual Pixel by 0.5μm-Pitch Full-Depth Deep-Trench Isolation Technology.
Proceedings of the IEEE International Solid-State Circuits Conference, 2022

2014
Formal Verification for Inter-Partitions Communication of RTOS Supporting IMA.
Proceedings of the Frontier and Innovation in Future Computing and Communications, 2014

2011
Applying Lightweight Formal Approach to Automatic Configuration Inspection.
Proceedings of the 23rd International Conference on Software Engineering & Knowledge Engineering (SEKE'2011), 2011

2010
OCL Evaluation on AUTOSAR Model.
Proceedings of the 22nd International Conference on Software Engineering & Knowledge Engineering (SEKE'2010), Redwood City, San Francisco Bay, CA, USA, July 1, 2010

Formal Verification of UML 2.0 Sequence Diagram.
Proceedings of the 22nd International Conference on Software Engineering & Knowledge Engineering (SEKE'2010), Redwood City, San Francisco Bay, CA, USA, July 1, 2010

2008
Japanese Puzzle as a SAT Problem.
Proceedings of the Twentieth International Conference on Software Engineering & Knowledge Engineering (SEKE'2008), 2008

Using Boolean Cardinality Constraint for LTS Bounded Model Checking.
Proceedings of the Twentieth International Conference on Software Engineering & Knowledge Engineering (SEKE'2008), 2008

2007
SAT based Verification Tool for Labeled Transition System.
Proceedings of the 5th ACIS International Conference on Software Engineering Research, 2007

2006
Avoidance of State Explosion Using Dependency Analysis in Model Checking Control Flow Model.
Proceedings of the Computational Science and Its Applications, 2006

2005
Formalization of <i>f</i>FSM Model and Its Verification.
Proceedings of the Embedded Software and Systems, Second International Conference, 2005

Verification of UML-Based Security Policy Model.
Proceedings of the Computational Science and Its Applications, 2005


  Loading...