Yookun Cho

According to our database1, Yookun Cho authored at least 142 papers between 1979 and 2016.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2016
An efficient Hadoop data replication method design for heterogeneous clusters.
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016

2015
An efficient backup-recovery technique to process large data in distributed key-value store.
Proceedings of the 30th Annual ACM Symposium on Applied Computing, 2015

Analysis of expected processing time for multiple memory backup servers.
Proceedings of the 2015 Conference on research in adaptive and convergent systems, 2015

2014
AWNIS: Energy-Efficient Adaptive Wireless Network Interface Selection for Industrial Mobile Devices.
IEEE Trans. Ind. Informatics, 2014

Impacts of delayed replication on the key-value store.
Proceedings of the Symposium on Applied Computing, 2014

Concurrency control scheme for key-value stores based on InfiniBand.
Proceedings of the 2014 Conference on Research in Adaptive and Convergent Systems, 2014

2013
An optimal distributed trigger counting algorithm for large-scale networked systems.
Simul., 2013

A Mobility-Aware Efficient Routing Scheme for Mobile Sensor Networks.
Int. J. Distributed Sens. Networks, 2013

Enhancing security enforcement on unmodified Android.
Proceedings of the 28th Annual ACM Symposium on Applied Computing, 2013

A worm-containing strategy using a social network and PageRank.
Proceedings of the Research in Adaptive and Convergent Systems, 2013

Impact of software watermarking on smart devices.
Proceedings of the Research in Adaptive and Convergent Systems, 2013

Enhancing lookup performance of key-value stores using cuckoo hashing.
Proceedings of the Research in Adaptive and Convergent Systems, 2013

2012
Enhancing the Reliability of Head Nodes in Underwater Sensor Networks.
Sensors, 2012

An Efficient Function Inlining Scheme for Resource-Constrained Embedded Systems.
J. Inf. Sci. Eng., 2012

Design of a Lightweight TCP/IP Protocol Stack with an Event-Driven Scheduler.
J. Inf. Sci. Eng., 2012

HORSIC: An efficient one-time signature scheme for wireless sensor networks.
Inf. Process. Lett., 2012

Impact of Mobility on Routing Energy Consumption in Mobile Sensor Networks.
Int. J. Distributed Sens. Networks, 2012

AAGC: an efficient associativity-aware garbage collection scheme for hybrid FTLs.
Proceedings of the ACM Symposium on Applied Computing, 2012

A fast mount mechanism for YAFFS2.
Proceedings of the ACM Symposium on Applied Computing, 2012

A DCH starvation DoS attack in UMTS.
Proceedings of the Research in Applied Computation Symposium, 2012

A robust steganography-based software watermarking.
Proceedings of the Research in Applied Computation Symposium, 2012

2011
A new fair scheduling algorithm for periodic tasks on multiprocessors.
Inf. Process. Lett., 2011

Adaptive link recovery scheme for structured peer-to-peer networks under churn.
Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21, 2011

Performance analysis of security enforcement on Android operating system.
Proceedings of the Research in Applied Computation Symposium, 2011

An internet protocol stack for high-speed transmission in a non-OS environment.
Proceedings of the Research in Applied Computation Symposium, 2011

2010
SWICOM: An SDR-Based Wireless Communication Gateway for Vehicles.
IEEE Trans. Veh. Technol., 2010

Hydra: A Block-Mapped Parallel Flash Memory Solid-State Disk Architecture.
IEEE Trans. Computers, 2010

A Smart Checkpointing Scheme for Improving the Reliability of Clustering Routing Protocols.
Sensors, 2010

Dynamic Memory Allocator for Sensor Operating System Design and Analysis.
J. Inf. Sci. Eng., 2010

An Efficient Secure Deletion Scheme for Flash File Systems.
J. Inf. Sci. Eng., 2010

An Efficient Stack Management for Sensor Operating Systems.
J. Inf. Sci. Eng., 2010

Improving responsiveness of soft aperiodic tasks using proportional slack time.
Comput. Electr. Eng., 2010

<i>Chordet</i>: an efficient and transparent replication for improving availability of peer-to-peer networked systems.
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010

<i>ASTRAL</i>: an adaptive, efficient, and reliable flooding mechanism for MANET.
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010

Virtual protocol stack interface for multiple wireless sensor network simulators.
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010

Using replication and checkpointing for reliable task management in computational Grids.
Proceedings of the 2010 International Conference on High Performance Computing & Simulation, 2010

2009
EARQ: Energy Aware Routing for Real-Time and Reliable Communication in Wireless Industrial Sensor Networks.
IEEE Trans. Ind. Informatics, 2009

<i>Arbiter-Recall</i>: a new function update scheme by arbitration between a remote call and a dynamic update for wireless sensor networks.
Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), 2009

Impact of function inlining on resource-constrained embedded systems.
Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), 2009

Energy Consumption Optimization of Real-Time Embedded Systems.
Proceedings of the International Conference on Embedded Software and Systems, 2009

YASIC: Yet-Another Software Integrity Checker for Security-Critical Wireless Sensor Networks.
Proceedings of the ISCA 24th International Conference on Computers and Their Applications, 2009

2008
Adaptive Multilevel Code Update Protocol for Real-Time Sensor Operating Systems.
IEEE Trans. Ind. Informatics, 2008

Molecule: An adaptive dynamic reconfiguration scheme for sensor operating systems.
Comput. Commun., 2008

Chameleon: A High Performance Flash/FRAM Hybrid Solid State Disk Architecture.
IEEE Comput. Archit. Lett., 2008

Implementation of an Obfuscation Tool for C/C++ Source Code Protection on the XScale Architecture.
Proceedings of the Software Technologies for Embedded and Ubiquitous Systems, 2008

PreeMe: preemptive real-time task management for event-driven sensor operating systems.
Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), 2008

Secure deletion for NAND flash file system.
Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), 2008

Energy-Efficient Data Aggregation Protocol for Location-Aware Wireless Sensor Networks.
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2008

SensorMaker: A Wireless Sensor Network Simulator for Scalable and Fine-Grained Instrumentation.
Proceedings of the Computational Science and Its Applications - ICCSA 2008, International Conference, Perugia, Italy, June 30, 2008

A Module Management Scheme for Dynamic Reconfiguration.
Proceedings of the Computational Science and Its Applications - ICCSA 2008, International Conference, Perugia, Italy, June 30, 2008

Linked Stack Buffer Management for Shared-Stacks.
Proceedings of the Computational Science and Its Applications - ICCSA 2008, International Conference, Perugia, Italy, June 30, 2008

SESAME-P: Memory Pool-Based Dynamic Stack Management for Sensor Operating Systems.
Proceedings of the Distributed Computing in Sensor Systems, 2008

An SDR-Based Wireless Communication Gateway for Vehicle Networks.
Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, 2008

2007
Taking Point Decision Mechanism for Page-level Incremental Checkpointing based on Cost Analysis of Process Execution Time.
J. Inf. Sci. Eng., 2007

Design, Implementation, and Performance Evaluation of Flash Memory-based File System on Chip.
J. Inf. Sci. Eng., 2007

PEACH: Power-efficient and adaptive clustering hierarchy protocol for wireless sensor networks.
Comput. Commun., 2007

Flash memory-based storage device for mobile embedded applications.
Proceedings of the IEEE International Conference on Systems, 2007

An efficient dynamic memory allocator for sensor operating systems.
Proceedings of the 2007 ACM Symposium on Applied Computing (SAC), 2007

Shared-stack cooperative threads.
Proceedings of the 2007 ACM Symposium on Applied Computing (SAC), 2007

OTL: On-Demand Thread Stack Allocation Scheme for Real-Time Sensor Operating Systems.
Proceedings of the Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27, 2007

Buffer Cache Level Encryption for Embedded Secure Operating System.
Proceedings of the Embedded and Ubiquitous Computing, International Conference, 2007

2006
Efficient One-time Signature Schemes for Stream Authentication.
J. Inf. Sci. Eng., 2006

Space-Efficient Page-Level Incremental Checkpointing.
J. Inf. Sci. Eng., 2006

Efficient Identification of Bad Signatures in RSA-Type Batch Signature.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006

Finish Time Predictability of Earliest Deadline Zero Laxity Algorithm for Multiprocessor Real-Time Systems.
IEICE Trans. Inf. Syst., 2006

Adaptive page-level incremental checkpointing based on expected recovery time.
Proceedings of the 2006 ACM Symposium on Applied Computing (SAC), 2006

The overhead model of word-level and page-level incremental checkpointing.
Proceedings of the 2006 ACM Symposium on Applied Computing (SAC), 2006

<i>XMAS</i>: An eXtraordinary Memory Allocation Scheme for Resource-Constrained Sensor Operating Systems.
Proceedings of the Mobile Ad-hoc and Sensor Networks, Second International Conference, 2006

Predictability of Earliest Deadline Zero Laxity Algorithm for Multiprocessor Real-Time Systems.
Proceedings of the Ninth IEEE International Symposium on Object-Oriented Real-Time Distributed Computing (ISORC 2006), 2006

Performance Analysis of Task Schedulers in Operating Systems for Wireless Sensor Networks.
Proceedings of the Computational Science and Its Applications, 2006

Adaptive Mobile Checkpointing Facility for Wireless Sensor Networks.
Proceedings of the Computational Science and Its Applications, 2006

Adaptive Load Balancing Mechanism for Server Cluster.
Proceedings of the Computational Science and Its Applications, 2006

EAR-RT: Energy Aware Routing with Real-Time Guarantee for Wireless Sensor Networks.
Proceedings of the Computational Science, 2006

Efficient Batch Verification for RSA-Type Digital Signatures in a Ubiquitous Environment.
Proceedings of the Embedded and Ubiquitous Computing, International Conference, 2006

2005
Efficient parallel exponentiation in GF(qn) using normal basis representations.
J. Algorithms, 2005

Comparison of Deadline-Based Scheduling Algorithms for Periodic Real-Time Tasks on Multiprocessor.
IEICE Trans. Inf. Syst., 2005

An Efficient Mobile Code Authentication Scheme that Permits Overlapping of Execution and Downloading.
IEICE Trans. Inf. Syst., 2005

Fast Real-Time Job Selection with Resource Constraints Under Earliest Deadline First.
Proceedings of the Embedded Computer Systems: Architectures, 2005

Space-efficient page-level incremental checkpointing.
Proceedings of the 2005 ACM Symposium on Applied Computing (SAC), 2005

Energy Aware Routing with Dynamic Probability Scaling.
Proceedings of the Rough Sets, 2005

Efficient DoS Resistant Multicast Authentication Schemes.
Proceedings of the Computational Science and Its Applications, 2005

Energy Aware Routing Based on Adaptive Clustering Mechanism for Wireless Sensor Networks.
Proceedings of the Networking and Mobile Computing, Third International Conference, 2005

Impact on the Writing Granularity for Incremental Checkpointing.
Proceedings of the Fuzzy Systems and Knowledge Discovery, Second International Conference, 2005

Batch Verification with DSA-Type Digital Signatures for Ubiquitous Computing.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

2004
Feasibility analysis of hard real-time periodic tasks.
J. Syst. Softw., 2004

Deleting keys of B-trees in parallel.
J. Parallel Distributed Comput., 2004

An efficient merging algorithm for recovery and garbage collection in incremental checkpointing.
Proceedings of the IASTED International Conference on Parallel and Distributed Computing and Networks, 2004

On Minimizing Distortion in Secure Data-Hiding for Binary Images.
Proceedings of the Advances in Multimedia Information Processing - PCM 2004, 5th Pacific Rim Conference on Multimedia, Tokyo, Japan, November 30, 2004

An Efficient Pointer Protection Scheme to Defend Buffer Overflow Attacks.
Proceedings of the Applied Parallel Computing, 2004

Intrusion Detection Using Noisy Training Data.
Proceedings of the Computational Science and Its Applications, 2004

The eSAIDA Stream Authentication Scheme.
Proceedings of the Computational Science and Its Applications, 2004

Fair Certified E-mail Protocols with Delivery Deadline Agreement.
Proceedings of the Computational Science and Its Applications, 2004

Comparison of Tie-Breaking Policies for Real-Time Scheduling on Multiprocessor.
Proceedings of the Embedded and Ubiquitous Computing, 2004

Ickpt: An Efficient Incremental Checkpointing Using Page Writing Fault - Focusing on the Implementation in Linux Kernel.
Proceedings of the 19th International Conference on Computers and Their Applications, 2004

2003
An efficient stream authentication scheme using tree chaining.
Inf. Process. Lett., 2003

An accurate and practical buffer allocation model for the buffer cache based on marginal gains.
Inf. Process. Lett., 2003

Randomization Enhanced Blind Signature Schemes Based on RSA.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2003

An Efficient Job Selection Scheme in Real-Time Scheduling under the Stack Resource Policy.
Proceedings of the 17th International Parallel and Distributed Processing Symposium (IPDPS 2003), 2003

Protecting Secret Keys with Blind Computation Service Based on Discrete Logarithm.
Proceedings of the ISCA 18th International Conference Computers and Their Applications, 2003

Memory Profiling Checkpoint.
Proceedings of the ISCA 18th International Conference Computers and Their Applications, 2003

On the Real-Time Job Management in Dynamic Priority Scheduling under the Stack Resource Policy.
Proceedings of the ISCA 18th International Conference Computers and Their Applications, 2003

On the Choice of Checkpoint Interval.
Proceedings of the 21st IASTED International Multi-Conference on Applied Informatics (AI 2003), 2003

2002
A space-efficient flash translation layer for CompactFlash systems.
IEEE Trans. Consumer Electron., 2002

Design, Implementation, and Performance Evaluation of a Detection-Based Adaptive Block Replacement Scheme.
IEEE Trans. Computers, 2002

A partitioning method for efficient system-level diagnosis.
J. Syst. Softw., 2002

Buffer Cache Management: Predicting the Future from the Past.
Proceedings of the International Symposium on Parallel Architectures, 2002

InCore: Accounting and Charging Heterogeneous Unix Systems.
Proceedings of the ISCA 17th International Conference Computers and Their Applications, 2002

2001
LRFU: A Spectrum of Policies that Subsumes the Least Recently Used and Least Frequently Used Policies.
IEEE Trans. Computers, 2001

Efficient parallel exponentiation in GF(2<sup>n</sup>) using normal basis representations.
Proceedings of the Thirteenth Annual ACM Symposium on Parallel Algorithms and Architectures, 2001

On the Choice of Checkpoint Interval Using Memory Usage Profile and Adaptive Time Series Analysis.
Proceedings of the 8th Pacific Rim International Symposium on Dependable Computing (PRDC 2001), 2001

Ethernet Wrapper: Extension of the TCP Wrapper.
Proceedings of the Eigth International Conference on Parallel and Distributed Systems, 2001

A new kernel-level key management system for non-interactive processes.
Proceedings of the ISCA 16th International Conference Computers and Their Applications, 2001

An efficient checkpoint scheme based on memory profile and time series analysis.
Proceedings of the ISCA 16th International Conference Computers and Their Applications, 2001

2000
On the construction of a powerful distributed authentication server without additional key management.
Comput. Commun., 2000

Towards application/file-level characterization of block references: a case for fine-grained buffer management.
Proceedings of the 2000 ACM SIGMETRICS international conference on Measurement and modeling of computer systems, 2000

An Efficient Feasibility Test Method for Hard Real-Time Periodic Tasks.
Proceedings of the 21st IEEE Real-Time Systems Symposium (RTSS 2000), 2000

An On-Line Optimal Algorithm for Scheduling Soft Aperiodic Tasks in Hard Real-Time Systems.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2000

A Low-Overhead, High-Performance Unified Buffer Management Scheme That Exploits Sequential and Looping References.
Proceedings of the 4th Symposium on Operating System Design and Implementation (OSDI 2000), 2000

Kckpt: An efficient checkpoint and recovery facility on unixware kernel.
Proceedings of the ISCA 15th International Conference Computers and Their Applications, 2000

1999
Efficient Algorithms for Approximate String Matching with Swaps.
J. Complex., 1999

An Implementation Study of a Detection-Based Adaptive Block Replacement Scheme.
Proceedings of the 1999 USENIX Annual Technical Conference, 1999

On the Existence of a Spectrum of Policies that Subsumes the Least Recently Used (LRU) and Least Frequently Used (LFU) Policies.
Proceedings of the 1999 ACM SIGMETRICS international conference on Measurement and modeling of computer systems, 1999

Accelerating Key Establishment Protocols for Mobile Communication.
Proceedings of the Information Security and Privacy, 4th Australasian Conference, 1999

1998
An Efficient Algorithm for Causal Message Logging.
Proceedings of the Seventeenth Symposium on Reliable Distributed Systems, 1998

An Adaptive Block Management Scheme Using On-Line Detection of Block Reference Patterns.
Proceedings of the International Workshop on Multi-Media Database Management Systems, 1998

1997
Fast networking based on the STREAMS mechanism with fast module scheduling.
J. Syst. Archit., 1997

The Working Set Algorithm has Competitive Ratio Less Than Two.
Inf. Process. Lett., 1997

Parallel Maximum Matching Algorithms in Interval Graphs.
Proceedings of the 1997 International Conference on Parallel and Distributed Systems (ICPADS '97), 1997

Efficient Algorithms for Approximate String Matching with Swaps (Extended Abstract).
Proceedings of the Combinatorial Pattern Matching, 8th Annual Symposium, 1997

1996
Connection caching technique with host grouping.
Proceedings of the 3rd International Conference on High Performance Computing, 1996

1995
Translation, scale and rotation invariant pattern recognition using Principal Component Analysis (PCA) and reduced second-order neural network.
Neural Parallel Sci. Comput., 1995

Using Adjustable DELAY Counter for Page Replication in NUMA Multiprocessors.
Proceedings of the Seventh IASTED/ISMM International Conference on Parallel and Distributed Computing and Systems, 1995

New invariant pattern recognition system based on preprocessing and reduced second-order neural network.
Proceedings of International Conference on Neural Networks (ICNN'95), Perth, WA, Australia, November 27, 1995

1994
An O(log N log log N) time RMESH algorithm for the simple polygon visibility problem.
Proceedings of the International Symposium on Parallel Architectures, 1994

Interprocessor-blocking independent static task allocation for shared-bus real-time multiprocessors.
Proceedings of the Sixth Euromicro Workshop on Real-Time Systems, 1994

1993
Point Visibility of a Simple Polygon on Reconfigurable Mesh.
Proceedings of the Fifth IEEE Symposium on Parallel and Distributed Processing, 1993

Page Prefetching Based on Fault History.
Proceedings of the USENIX MACH III Symposium, Santa Fe, New Mexico, USA, April 19-21, 1993, 1993

1981
Preemptive Scheduling of Independent Jobs with Release and Due Times on Open, Flow and Job Shops.
Oper. Res., 1981

1980
Bounds for List Schedules on Uniform Processors.
SIAM J. Comput., 1980

Scheduling Independent Tasks with Due Times on a Uniform Processor System.
J. ACM, 1980

1979
Nearly On Line Scheduling of a Uniform Processor System with Release Times.
SIAM J. Comput., 1979

Complexity of Scheduling Shops with No Wait in Process.
Math. Oper. Res., 1979


  Loading...