default search action
Jiman Hong
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j30]Joonhyouk Jang, Minho Park, Jiman Hong:
Hybrid booting with incremental hibernation for the baseboard management controllers. J. Supercomput. 80(6): 8485-8504 (2024) - [e8]Jiman Hong, Juw Won Park:
Proceedings of the 39th ACM/SIGAPP Symposium on Applied Computing, SAC 2024, Avila, Spain, April 8-12, 2024. ACM 2024 [contents] - 2023
- [j29]Kwang-Woo Jung, Jaeoh Kim, Ho-Jin Jung, Seung-Won Seo, Jiman Hong, Hyoung-Woo Bai, Seongil Jo:
Curve Fitting Algorithm of Functional Radiation-Response Data Using Bayesian Hierarchical Gaussian Process Regression Model. IEEE Access 11: 7109-7116 (2023) - [c104]Minho Park, Daewoong Hwang, Jiman Hong:
Incremental Hibernation for Baseboard Management Controllers. RACS 2023: 4:1-4:7 - [c103]Jaeseop Kim, Juw Won Park, Sung Y. Shin, Austin Hanson, Jae-Hoon An, Younghwan Kim, Jiman Hong:
An Efficient Profiling Tool for Baseboard Management Controllers. SAC 2023: 1318-1324 - [c102]Ajung Kim, Gwangyong Kim, Bongjae Kim, Jiman Hong:
Hibernation Execution Interval based Hybrid Boot for Baseboard Management Controllers. SAC 2023: 1325-1331 - [c101]Sumin Lee, Minho Park, Jiman Hong:
Detecting Suspicious Conditional Statement using App Execution Log. SAC 2023: 1662-1668 - [e7]Jiman Hong, Maart Lanperne, Juw Won Park, Tomás Cerný, Hossain Shahriar:
Proceedings of the 38th ACM/SIGAPP Symposium on Applied Computing, SAC 2023, Tallinn, Estonia, March 27-31, 2023. ACM 2023, ISBN 978-1-4503-9517-5 [contents] - 2022
- [c100]Ajung Kim, Jae-Hoon An, Younghwan Kim, Jiman Hong:
Hibernation Based Hybrid Booting for Baseboard Management Controller. CSCI 2022: 569-571 - [c99]Seungyeon Lee, Jaeseop Kim, Bongjae Kim, Sung Y. Shin, Juw Won Park, Jiman Hong:
Adjusting inference time for power efficiency in neuromorphic architectures. SAC 2022: 1102-1108 - [c98]Jusuk Lee, Ajung Kim, Sumin Lee, Jiman Hong:
R&R tool for Android applications hiding malicious features. SAC 2022: 1190-1196 - [e6]Jiman Hong, Miroslav Bures, Juw Won Park, Tomás Cerný:
SAC '22: The 37th ACM/SIGAPP Symposium on Applied Computing, Virtual Event, April 25 - 29, 2022. ACM 2022, ISBN 978-1-4503-8713-2 [contents] - 2021
- [j28]Vially Kazadi Mutombo, Seungyeon Lee, Jusuk Lee, Jiman Hong:
EER-RL: Energy-Efficient Routing Based on Reinforcement Learning. Mob. Inf. Syst. 2021: 5589145:1-5589145:12 (2021) - [j27]Vially Kazadi Mutombo, Seungyeon Lee, Jusuk Lee, Jiman Hong:
Corrigendum to "EER-RL: Energy-Efficient Routing Based on Reinforcement Learning". Mob. Inf. Syst. 2021: 9817562:1-9817562:1 (2021) - [c97]Vially Kazadi Mutombo, Sung Y. Shin, Jiman Hong:
EBR-RL: energy balancing routing protocol based on reinforcement learning for WSN. SAC 2021: 1915-1920 - [e5]Chih-Cheng Hung, Jiman Hong, Alessio Bechini, Eunjee Song:
SAC '21: The 36th ACM/SIGAPP Symposium on Applied Computing, Virtual Event, Republic of Korea, March 22-26, 2021. ACM 2021, ISBN 978-1-4503-8104-8 [contents] - 2020
- [j26]Joonhyouk Jang, Jinman Jung, Jiman Hong:
An efficient virtual CPU scheduling in cloud computing. Soft Comput. 24(8): 5987-5997 (2020) - [j25]Michal Trnka, Jan Svacina, Tomás Cerný, Eunjee Song, Jiman Hong, Miroslav Bures:
Securing Internet of Things Devices Using The Network Context. IEEE Trans. Ind. Informatics 16(6): 4017-4027 (2020) - [c96]Kicheol Park, Yena Lee, Jiman Hong, Jae-Hoon An, Bongjae Kim:
Selecting a Proper Neuromorphic Platform for the Intelligent IoT. RACS 2020: 255-260 - [c95]Heejin Kim, Kyuho Kim, Jiman Hong, Junyeong Heo, Joongjin Kook:
EDAroid: An Efficient Dynamic Analysis Tool for Android Applications. RACS 2020: 261-266 - [c94]Younggwan Kim, Jusuk Lee, Ajung Kim, Jiman Hong:
Load Balancing for Machine Learning Platform in Heterogeneous Distribute Computing Environment. RACS 2020: 267-270 - [c93]Seungyeon Lee, Jusuk Lee, Yongmin Kim, Kicheol Park, Jiman Hong, Junyoung Heo:
Efficient scheme for compressing and transferring data in hadoop clusters. SAC 2020: 1256-1263 - [c92]Vially Kazadi Mutombo, Yena Lee, Heejin Kim, Younggwan Kim, Natalia Weronika Debska, Jiman Hong:
Smart transportation platform for private transportation. SAC 2020: 1920-1927
2010 – 2019
- 2019
- [j24]Hong Min, Jinman Jung, Bongjae Kim, Jiman Hong, Junyoung Heo:
Dynamic Rendezvous Node Estimation for Reliable Data Collection of a Drone as a Mobile IoT Gateway. IEEE Access 7: 184285-184293 (2019) - [j23]Joonhyouk Jang, Jinman Jung, Jiman Hong:
K-LZF : An efficient and fair scheduling for Edge Computing servers. Future Gener. Comput. Syst. 98: 44-53 (2019) - [j22]Keon Myung Lee, Jaesoo Yoo, Sang-Wook Kim, Jee-Hyong Lee, Jiman Hong:
Autonomic machine learning platform. Int. J. Inf. Manag. 49: 491-501 (2019) - [c91]Lisa Natswi Tafa, Xin Su, Jiman Hong, Chang Choi:
Automatic Maritime Traffic Synthetic Route: A Framework for Route Prediction. I-SPAN 2019: 3-14 - [c90]Eunseok Choi, Jiman Hong:
Design and implementation of virtual machine control and streaming scheme using Linux kernel-based virtual machine hypercall for virtual mobile infrastructure. RACS 2019: 57-60 - [c89]Heejin Kim, Younggwan Kim, Jiman Hong:
Cluster management framework for autonomic machine learning platform. RACS 2019: 128-130 - [c88]Boseon Hong, Jinsung Cho, Bongjae Kim, Hong Min, Jiman Hong, Keon Myung Lee:
A study on supporting spiking neural network models based on multiple neuromorphic processors. RACS 2019: 131-132 - [c87]Seungyeon Lee, Mhanwoo Heo, Kicheol Park, Bongjae Kim, Jiman Hong:
Enhancing the security of IoT gateway based on the classification of user security-sensitive data. RACS 2019: 241-243 - [c86]Yena Lee, Yongmin Kim, Seungyeon Lee, Junyoung Heo, Jiman Hong:
Machine learning based Android malware classification. RACS 2019: 300-302 - [c85]Hansol Lee, Younghwan Kim, Juw Won Park, Sung Y. Shin, Jiman Hong:
An efficient deep learning platform for detecting objects. SAC 2019: 1353-1354 - [c84]Myungjoon Shon, Heejin Kim, Kicheol Park, Juw Won Park, Kwanghee Won, Jiman Hong:
A robust and secure backup system for protecting malware. SAC 2019: 1432-1437 - [c83]Jinwoo Lee, Yena Lee, Ming Jin, John Kim, Jiman Hong:
Analysis of application installation logs on Android systems. SAC 2019: 2140-2145 - [e4]Christian Esposito, Jiman Hong, Kim-Kwang Raymond Choo:
Pervasive Systems, Algorithms and Networks - 16th International Symposium, I-SPAN 2019, Naples, Italy, September 16-20, 2019, Proceedings. Communications in Computer and Information Science 1080, Springer 2019, ISBN 978-3-030-30142-2 [contents] - 2018
- [j21]Jaekyu Lee, Sangyub Lee, Hyeonjoong Cho, Kyung Sun Ham, Jiman Hong:
Supervisory control and data acquisition for Standalone Hybrid Power Generation Systems. Sustain. Comput. Informatics Syst. 20: 141-154 (2018) - [c82]Mohammad Baniata, Hyunho Ji, Yongmin Kim, Jeongwoo Choi, Jiman Hong:
Energy-balancing unequal concentric chain clustering (MIMO-UCC) protocol for IoT system in 5G environment. RACS 2018: 68-74 - [c81]Jeongwoo Choi, Yongmin Kim, Jinwoo Lee, Jiman Hong:
Dynamic code whitelist for efficient analysis of Android code. RACS 2018: 165-166 - [c80]Yongcheon Park, Jeongmin Park, Eunkyong Lee, Kyoungchul Lee, Jiman Hong:
Deep learning based customer product rating prediction model. RACS 2018: 203-204 - [c79]Eunkyong Lee, Yongcheon Park, Heejin Kim, Byeongoh Jung, Jiman Hong:
An efficient method for automatic updating business rules. RACS 2018: 331-332 - [c78]Jeongwoo Choi, Yongmin Kim, Sung Y. Shin, Jiman Hong:
Smart IoT monitoring framework based on oneM2M for fog computing. SAC 2018: 1848-1852 - [c77]Mohammad Baniata, Mhanwoo Heo, Jinwoo Lee, Juw Won Park, Jiman Hong:
Energy-efficient unequal chain length clustering for WSN. SAC 2018: 2125-2131 - 2017
- [j20]Mohammad Baniata, Jiman Hong:
Energy-Efficient Unequal Chain Length Clustering for Wireless Sensor Networks in Smart Cities. Wirel. Commun. Mob. Comput. 2017 (2017) - [c76]Jeonghwan Lee, Jinwoo Lee, Jiman Hong:
How to Make Efficient Decoy Files for Ransomware Detection? RACS 2017: 208-212 - [c75]Kyoungmin Kim, Jeonghwan Lee, Seonguk Lee, Jiman Hong:
Whitelist for Analyzing Android Malware. RACS 2017: 222-227 - [c74]Jinman Jung, Jongho Shin, Jiman Hong, Jinwoo Lee, Tei-Wei Kuo:
A Fair Scheduling Algorithm for Multiprocessor Systems Using a Task Satisfaction Index. RACS 2017: 269-274 - [c73]Jinman Jung, Jisu Park, Seoyeon Kim, Mhanwoo Heo, Jiman Hong:
A Virtual CPU Scheduling Model for I/O Performance in Paravirtualized Environments. RACS 2017: 281-286 - [c72]Gibeom Byeon, Myungjoon Shon, Hansol Lee, Jiman Hong:
MACaaS Platform for Fog Computing. RACS 2017: 287-292 - [c71]Kiwook Kang, Kyoungmin Kim, Jinwoo Lee, Joonhyouk Jang, Jiman Hong:
Security software module update for heterogeneous VoT. SAC 2017: 510-511 - [c70]Myungjoon Shon, Kisu Kim, Hansol Lee, Sung Y. Shin, Jiman Hong:
DACS: dynamic allocation credit scheduler for virtual machines. SAC 2017: 1563-1565 - 2016
- [c69]Kiwook Kang, Gibeom Byeon, Joonhyouk Jang, Jiman Hong:
Framework for assigning multiple resources development environment utilizing various sensor devices. RACS 2016: 121-122 - [c68]Jae-Hoon An, Younghwan Kim, Jae Gi Son, Jiman Hong:
Block I/O Accelerator Technique to Improve Data Access Performance based Linux Multiple Disk. RACS 2016: 219-222 - [c67]Kisu Kim, Myungjoon Shon, Joonhyouk Jang, Jiman Hong:
Task-Based Boost Mechanism in Credit Scheduler. RACS 2016: 243-244 - [c66]Taegyu Hwang, Kisu Kim, Jeonghwan Lee, Jiman Hong, Dongwan Shin:
Virtual machine scheduling based on task characteristic. SAC 2016: 1897-1899 - [c65]Daeshin Park, Kiwook Kang, Jiman Hong, Yookun Cho:
An efficient Hadoop data replication method design for heterogeneous clusters. SAC 2016: 2182-2184 - [c64]Donghee Min, Seonguk Lee, Gibeom Byeon, Jiman Hong:
Delay-based scheduling to enhance fairness in a virtual machine environment. SAC 2016: 2185-2187 - 2015
- [c63]Daeho Kim, Eunseok Choi, Jiman Hong:
System information-based Hadoop load balancing for heterogeneous clusters. RACS 2015: 465-467 - [c62]Kiwook Kang, Jiman Hong:
A framework for computer interface using EEG and EMG. RACS 2015: 472-473 - [c61]Donghee Min, Taegyu Hwang, Joonhyouk Jang, Yookun Cho, Jiman Hong:
An efficient backup-recovery technique to process large data in distributed key-value store. SAC 2015: 2072-2074 - [c60]Abida Shahzad, Hyunho Ji, Pankoo Kim, Hanil Kim, Byeong-Kyu Ko, Jiman Hong:
Application-level task execution issues in mobile cloud computing. SAC 2015: 2285-2287 - [e3]Roger L. Wainwright, Juan Manuel Corchado, Alessio Bechini, Jiman Hong:
Proceedings of the 30th Annual ACM Symposium on Applied Computing, Salamanca, Spain, April 13-17, 2015. ACM 2015, ISBN 978-1-4503-3196-8 [contents] - 2014
- [j19]Bongjae Kim, Yookun Cho, Jiman Hong:
AWNIS: Energy-Efficient Adaptive Wireless Network Interface Selection for Industrial Mobile Devices. IEEE Trans. Ind. Informatics 10(1): 714-729 (2014) - [c59]Dongjin Choi, Jeongin Kim, Eunji Lee, Chang Choi, Jiman Hong, Pankoo Kim:
Research for the Pattern Analysis of Individual Interest Using SNS Data: Focusing on Facebook. IMIS 2014: 36-40 - [c58]Daeho Kim, Taegyu Hwang, Sanghoon Choi, Ikhyun Cho, Jiman Hong:
HILF: hybrid indoor locating framework. RACS 2014: 215-217 - [c57]Daeshin Park, Youngsu Park, John Kim, Jiman Hong:
The optimized grouping value for precise similarity comparison of dynamic birthmark. RACS 2014: 263-265 - [c56]Minwoo Jang, Woochur Kim, Yookun Cho, Jiman Hong:
Impacts of delayed replication on the key-value store. SAC 2014: 1757-1758 - [e2]Yookun Cho, Sung Y. Shin, Sang-Wook Kim, Chih-Cheng Hung, Jiman Hong:
Symposium on Applied Computing, SAC 2014, Gyeongju, Republic of Korea - March 24 - 28, 2014. ACM 2014, ISBN 978-1-4503-2469-4 [contents] - 2013
- [j18]Sheikh Iqbal Ahamed, Wei Wang, Jiman Hong:
Recent Advances in Energy-Efficient Sensor Networks. Int. J. Distributed Sens. Networks 9 (2013) - [j17]Jinman Jung, Yookun Cho, Jiman Hong:
A Mobility-Aware Efficient Routing Scheme for Mobile Sensor Networks. Int. J. Distributed Sens. Networks 9 (2013) - [c55]Junping Sun, Jiman Hong:
Index selection: a query pattern mining based approach. RACS 2013: 100-106 - [c54]Youngsu Park, Jiman Hong:
An effective API extraction scheme for dynamic binary similarity comparison. RACS 2013: 355-356 - [c53]Joonhyouk Jang, Hyunho Ji, Jiman Hong, Jinman Jung, Dongkyun Kim, Soon Ki Jung:
Protecting Android applications with steganography-based software watermarking. SAC 2013: 1657-1658 - [e1]Ching Y. Suen, Amir G. Aghdam, Minyi Guo, Jiman Hong, Esmaeil S. Nadimi:
Research in Adaptive and Convergent Systems, RACS'13, Montreal, QC, Canada, October 1-4, 2013. ACM 2013, ISBN 978-1-4503-2348-2 [contents] - 2012
- [j16]Jiman Hong, Tei-Wei Kuo, Junyoung Heo:
Advanced Issues of Operating Systems for Reliable Distributed Sensor Networks: Aim and Scope. Int. J. Distributed Sens. Networks 8 (2012) - [j15]Jinman Jung, Yookun Cho, Jiman Hong:
Impact of Mobility on Routing Energy Consumption in Mobile Sensor Networks. Int. J. Distributed Sens. Networks 8 (2012) - [j14]Bongjae Kim, Yookun Cho, Jiman Hong:
An Efficient Function Inlining Scheme for Resource-Constrained Embedded Systems. J. Inf. Sci. Eng. 28(5): 859-874 (2012) - [j13]Jinman Jung, Bongjae Kim, Jiman Hong:
Unified Simulation Framework for Protocol Stacks in Sensor Operating Systems. J. Inf. Sci. Eng. 28(6): 1029-1043 (2012) - [c52]Junghoon Shin, Byung-Ju Lim, Eunseok Choi, Youngsu Park, Sangjun Lee, Kyung-Yul Chung, Jiman Hong:
Design and implementation of the fault data providing system using mobile web service. RACS 2012: 114-115 - [c51]Yangkeun Ahn, Jiman Hong:
Application of DIBR algorithm in real-time image. RACS 2012: 169-171 - [c50]Joonhyouk Jang, Sanghoon Choi, Jiman Hong:
A method for resilient graph-based comparison of executable objects. RACS 2012: 288-289 - [c49]Bongjae Kim, Minkyu Park, Cheol Jeon, Chang Oan Sung, Yookun Cho, Jiman Hong:
AAGC: an efficient associativity-aware garbage collection scheme for hybrid FTLs. SAC 2012: 1785-1790 - 2011
- [c48]Yangkeun Ahn, Kwangmo Jung, Jiman Hong:
A Three-Dimensional Fingertip Interface. HCI (23) 2011: 141-145 - [c47]Joongjin Kook, Sanghoon Choi, Kanghee Kim, Jiman Hong:
An efficient checkpoint scheme for the fast mount of flash file system. RACS 2011: 90-92 - [c46]Sukil Hong, Eunseok Choi, Hong Min, Sangho Yi, Junyoung Heo, Jiman Hong:
SPRS: standby power reduction system for efficient power management. RACS 2011: 97-99 - [c45]Seokhyun Kim, Geunyoung Park, Jiman Hong, Yookun Cho:
Adaptive link recovery scheme for structured peer-to-peer networks under churn. SAC 2011: 611-615 - 2010
- [j12]Hong Min, Yookun Cho, Jiman Hong:
Dynamic Memory Allocator for Sensor Operating System Design and Analysis. J. Inf. Sci. Eng. 26(1): 1-14 (2010) - [j11]Laxmisha Rai, Joongjin Kook, Jiman Hong:
Non-Deterministic Behavior Modeling Framework for Embedded Real-Time Systems Operating in Uncertain Environments. J. Inf. Sci. Eng. 26(1): 83-96 (2010) - [j10]Junyoung Heo, Boncheol Gu, Yookun Cho, Jiman Hong:
An Efficient Stack Management for Sensor Operating Systems. J. Inf. Sci. Eng. 26(3): 1137-1150 (2010) - [j9]Hong Min, Jinman Jung, Bongjae Kim, Yookun Cho, Junyoung Heo, Sangho Yi, Jiman Hong:
A Smart Checkpointing Scheme for Improving the Reliability of Clustering Routing Protocols. Sensors 10(10): 8938-8952 (2010) - [c44]Geunyoung Park, Seokhyun Kim, Yookun Cho, Joongjin Kook, Jiman Hong:
Chordet: an efficient and transparent replication for improving availability of peer-to-peer networked systems. SAC 2010: 221-225
2000 – 2009
- 2009
- [j8]Jiman Hong, Joongjin Kook, Sangjun Lee, Dongseop Kwon, Sangho Yi:
T-LEACH: The method of threshold-based cluster head replacement for wireless sensor networks. Inf. Syst. Frontiers 11(5): 513-521 (2009) - [j7]Jiman Hong, Junyoung Heo, Yookun Cho:
EARQ: Energy Aware Routing for Real-Time and Reliable Communication in Wireless Industrial Sensor Networks. IEEE Trans. Ind. Informatics 5(1): 3-11 (2009) - [c43]Sangho Yi, Jaeheung Lee, Hong Min, Yookun Cho, Jiman Hong:
YASIC: Yet-Another Software Integrity Checker for Security-Critical Wireless Sensor Networks. CATA 2009: 117-121 - [c42]Bongjae Kim, Sangho Yi, Yookun Cho, Jiman Hong:
Impact of function inlining on resource-constrained embedded systems. SAC 2009: 287-292 - [c41]Misook Choi, Injoo J. Kim, Jiman Hong, Jung-Yeop Kim:
Component-based metrics applying the strength of dependency between classes. SAC 2009: 530-536 - 2008
- [j6]Sangho Yi, Hong Min, Yookun Cho, Jiman Hong:
Molecule: An adaptive dynamic reconfiguration scheme for sensor operating systems. Comput. Commun. 31(4): 699-707 (2008) - [j5]Sangho Yi, Hong Min, Yookun Cho, Jiman Hong:
Adaptive Multilevel Code Update Protocol for Real-Time Sensor Operating Systems. IEEE Trans. Ind. Informatics 4(4): 250-260 (2008) - [c40]Sangho Yi, Seungwoo Lee, Yookun Cho, Jiman Hong:
SESAME-P: Memory Pool-Based Dynamic Stack Management for Sensor Operating Systems. DCOSS 2008: 544-549 - [c39]H. H. Park, Jiman Hong, S. M. Yang:
Static Worst-Case Execution Time Analysis Tool for Embedded Operating Systems. ICCSA (1) 2008: 790-799 - [c38]Sangho Yi, Hong Min, Yookun Cho, Jiman Hong:
SensorMaker: A Wireless Sensor Network Simulator for Scalable and Fine-Grained Instrumentation. ICCSA (1) 2008: 800-810 - [c37]Hong Min, Sangho Yi, Junyoung Heo, Yookun Cho, Jiman Hong:
Energy-Efficient Data Aggregation Protocol for Location-Aware Wireless Sensor Networks. ISPA 2008: 751-756 - [c36]Tei-Wei Kuo, Jiman Hong:
Special track on Adaptive Techniques in Operating Systems: editorial message. SAC 2008: 1698-1699 - [c35]Jaeheung Lee, Junyoung Heo, Yookun Cho, Jiman Hong, Sung Y. Shin:
Secure deletion for NAND flash file system. SAC 2008: 1710-1714 - 2007
- [j4]Sangho Yi, Junyoung Heo, Yookun Cho, Jiman Hong:
PEACH: Power-efficient and adaptive clustering hierarchy protocol for wireless sensor networks. Comput. Commun. 30(14-15): 2842-2852 (2007) - [j3]Sangho Yi, Junyoung Heo, Yookun Cho, Jiman Hong:
Taking Point Decision Mechanism for Page-level Incremental Checkpointing based on Cost Analysis of Process Execution Time. J. Inf. Sci. Eng. 23(5): 1325-1337 (2007) - [j2]Heejune Ahn, Hyukjun Oh, Jiman Hong:
Towards Reliable OSGi Operating Framework and Applications. J. Inf. Sci. Eng. 23(5): 1379-1390 (2007) - [c34]Jaeheung Lee, Junyoung Heo, Jaemin Park, Yookun Cho, Jiman Hong, Minkyu Park:
Buffer Cache Level Encryption for Embedded Secure Operating System. EUC 2007: 346-355 - [c33]Sangho Yi, Seungwoo Lee, Yookun Cho, Jiman Hong:
OTL: On-Demand Thread Stack Allocation Scheme for Real-Time Sensor Operating Systems. International Conference on Computational Science (4) 2007: 905-912 - [c32]Junghoon Lee, In-Hye Shin, Gyung-Leen Park, Wang-Cheol Song, Jinhwan Kim, Pankoo Kim, Jiman Hong:
An Efficient Bandwidth Reclaim Scheme for the Integrated Transmission of Real-Time and Non-Real-Time Messages on the WLAN. International Conference on Computational Science (4) 2007: 925-932 - [c31]Hyukjun Oh, Jiman Hong, Yongseok Kim:
A Fast Real Time Link Adaptation Scheme for Wireless Communication Systems. International Conference on Computational Science (4) 2007: 933-940 - [c30]Hong Min, Sangho Yi, Yookun Cho, Jiman Hong:
An efficient dynamic memory allocator for sensor operating systems. SAC 2007: 1159-1164 - 2006
- [j1]Junyoung Heo, Sangho Yi, Yookun Cho, Jiman Hong:
Space-Efficient Page-Level Incremental Checkpointing. J. Inf. Sci. Eng. 22(2): 237-246 (2006) - [c29]Junghoon Lee, Mikyung Kang, Gyung-Leen Park, Ikchan Kim, Cheolmin Kim, Jong-Hyun Park, Jiman Hong:
A Real-Time Message Scheduling Scheme Based on Optimal Earliest Deadline First Policy for Dual Channel Wireless Networks. EUC 2006: 264-273 - [c28]Junyoung Heo, Sangho Yi, Geunyoung Park, Yookun Cho, Jiman Hong:
EAR-RT: Energy Aware Routing with Real-Time Guarantee for Wireless Sensor Networks. International Conference on Computational Science (4) 2006: 946-953 - [c27]Mikyung Kang, Junghoon Lee, Jiman Hong, Jinhwan Kim:
Design of a Fast Handoff Scheme for Real-Time Media Application on the IEEE 802.11 Wireless LAN. International Conference on Computational Science (4) 2006: 970-978 - [c26]Hyukjun Oh, Jiman Hong:
A Real Time Radio Link Monitoring Using CSI. International Conference on Computational Science (4) 2006: 991-998 - [c25]Sangho Yi, Hong Min, Junyoung Heo, Boncheol Gu, Yookun Cho, Jiman Hong, Jin Won Kim, Kwangyong Lee, Seungmin Park:
Performance Analysis of Task Schedulers in Operating Systems for Wireless Sensor Networks. ICCSA (4) 2006: 499-508 - [c24]Junghoon Lee, Mikyung Kang, Eui-young Kang, Gyung-Leen Park, Hanil Kim, Cheolmin Kim, Seongbaeg Kim, Jiman Hong:
Design and Performance Analysis of a Message Scheduling Scheme for WLAN-Based Cluster Computing. ICCSA (4) 2006: 558-566 - [c23]Hyukjun Oh, Heejune Ahn, Jiman Hong:
A Power-Efficient Design Employing an Extreme Condition Detector for Embedded Systems. ICCSA (4) 2006: 603-611 - [c22]Sangho Yi, Junyoung Heo, Yookun Cho, Jiman Hong:
Adaptive Mobile Checkpointing Facility for Wireless Sensor Networks. ICCSA (2) 2006: 701-709 - [c21]Sangho Yi, Hong Min, Junyoung Heo, Boncheol Gu, Yookun Cho, Jiman Hong, Hyukjun Oh, Byunghun Song:
XMAS: An eXtraordinary Memory Allocation Scheme for Resource-Constrained Sensor Operating Systems. MSN 2006: 760-769 - [c20]Jiman Hong, Tei-Wei Kuo:
Editorial message: special track on operating systems and adaptive applications. SAC 2006: 1449-1450 - [c19]Sangho Yi, Junyoung Heo, Yookun Cho, Jiman Hong:
Adaptive page-level incremental checkpointing based on expected recovery time. SAC 2006: 1472-1476 - 2005
- [c18]Junyoung Heo, Xuefeng Piao, Sangho Yi, Geunyoung Park, Minkyu Park, Jiman Hong, Yookun Cho:
Impact on the Writing Granularity for Incremental Checkpointing. FSKD (2) 2005: 1154-1157 - [c17]Charlie Y. Shim, Jung-Yeop Kim, Sung Y. Shin, Jiman Hong:
Using Feedback Cycle for Developing an Adjustable Security Design Metric. FSKD (2) 2005: 1158-1161 - [c16]Hyukjun Oh, Jiman Hong, Heejune Ahn:
An Intelligent Power Management Scheme for Wireless Embedded Systems Using Channel State Feedbacks. FSKD (2) 2005: 1170-1173 - [c15]Sangho Yi, Geunyoung Park, Junyoung Heo, Jiman Hong, Gwangil Jeon, Yookun Cho:
Energy Aware Routing Based on Adaptive Clustering Mechanism for Wireless Sensor Networks. ICCNMC 2005: 1115-1124 - [c14]WoongChul Choi, JinWoo Han, Byung Joon Park, Jiman Hong:
BCTMA(Bi-directional Cut-Through Medium Access) Protocol for 802.11-Based Multi-hop Wireless Networks. ISSADS 2005: 377-387 - [c13]Sangjun Lee, Kyoungsu Oh, Dongseop Kwon, Wonik Choi, Jiman Hong, Jongmoo Choi, Donghee Lee:
Efficient Pattern Matching of Multidimensional Sequences. RSFDGrC (2) 2005: 202-210 - [c12]Sung-Ryul Kim, Jiman Hong:
An Efficient and Practical Algorithm for the Many-Keyword Proximity Problem by Offsets. RSFDGrC (2) 2005: 477-483 - [c11]Junyoung Heo, Sangho Yi, Yookun Cho, Jiman Hong, Sung Y. Shin:
Space-efficient page-level incremental checkpointing. SAC 2005: 1558-1562 - 2004
- [c10]Sangho Yi, Junyoung Heo, Yookun Cho, Jiman Hong, Jongmoo Choi, Gwangil Jeon:
Ickpt: An Efficient Incremental Checkpointing Using Page Writing Fault - Focusing on the Implementation in Linux Kernel. CATA 2004: 209-212 - [c9]Junyoung Heo, Sangho Yi, Jiman Hong, Yookun Cho, Jongmoo Choi:
An efficient merging algorithm for recovery and garbage collection in incremental checkpointing. Parallel and Distributed Computing and Networks 2004: 358-368 - 2003
- [c8]Jiman Hong, Sangsu Kim, Yookun Cho:
On the Choice of Checkpoint Interval. Applied Informatics 2003: 670-675 - [c7]Moonju Park, Jiman Hong, Sung Y. Shin:
A Priority Assignment Method for Earliest Deadline Scheduling. CATA 2003: 316-320 - [c6]Sangsu Kim, Jiman Hong, Yookun Cho, Sung Y. Shin:
Memory Profiling Checkpoint. CATA 2003: 325-328 - 2002
- [c5]MoonSang Kwon, Jiman Hong, Yookun Cho, Juw Won Park:
InCore: Accounting and Charging Heterogeneous Unix Systems. CATA 2002: 368-371 - 2001
- [c4]Jiman Hong, Sangsu Kim, Juwon Park, Taesoon Park, Heon Young Yeom, Yookun Cho:
An efficient checkpoint scheme based on memory profile and time series analysis. CATA 2001: 74-77 - [c3]MoonSang Kwon, Jiman Hong, Yookun Cho:
Ethernet Wrapper: Extension of the TCP Wrapper. ICPADS 2001: 573-580 - [c2]Jiman Hong, Sangsu Kim, Yookun Cho, Heon Young Yeom, Taesoon Park:
On the Choice of Checkpoint Interval Using Memory Usage Profile and Adaptive Time Series Analysis. PRDC 2001: 45-48 - 2000
- [c1]Jiman Hong, Heon Young Yeom, Yookun Cho, Taesoon Park:
Kckpt: An efficient checkpoint and recovery facility on unixware kernel. CATA 2000: 303-308
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-28 01:22 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint