Author image not provided
 Jongyoul Choi

Authors:
Add personal information
  Affiliation history
Bibliometrics: publication history
Average citations per article5.47
Citation Count82
Publication count15
Publication years2005-2012
Available for download6
Average downloads per article528.50
Downloads (cumulative)3,171
Downloads (12 Months)66
Downloads (6 Weeks)9
SEARCH
ROLE
Arrow RightAuthor only


AUTHOR'S COLLEAGUES
See all colleagues of this author

SUBJECT AREAS
See all subject areas




BOOKMARK & SHARE


15 results found Export Results: bibtexendnoteacmrefcsv

Result 1 – 15 of 15
Sort by:

1
January 2012
Bibliometrics:
Citation Count: 0

The finite mixture model, one of the most fundamental foundations in the fields of data mining and machine learning areas to access the essential structures of observed random sample data, aims at building a probabilistic model in which random sample data is described as a probabilistic distribution represented by mixtures ...

2
December 2011 Concurrency and Computation: Practice & Experience: Volume 23 Issue 17, December 2011
Publisher: John Wiley and Sons Ltd.
Bibliometrics:
Citation Count: 0

Visualization of large-scale high dimensional data is highly valuable for data analysis facilitating scientific discovery in many fields. We present PubChemBrowse, a customized visualization tool for cheminformatics research. It provides a novel 3D data point browser that displays complex properties of massive data on commodity clients. As in Geographic Information ...
Keywords: MDS, interpolation, visualization, semantic web, GTM

3
December 2011 Concurrency and Computation: Practice & Experience: Volume 23 Issue 17, December 2011
Publisher: John Wiley and Sons Ltd.
Bibliometrics:
Citation Count: 5

Cloud computing offers exciting new approaches for scientific computing that leverage major commercial players’ hardware and software investments in large-scale data centers. Loosely coupled problems are very important in many scientific fields, and with the ongoing move towards data-intensive computing, they are on the rise. There exist several different approaches ...
Keywords: bioinformatics, cloud technology, map reduce

4 published by ACM
June 2010 HPDC '10: Proceedings of the 19th ACM International Symposium on High Performance Distributed Computing
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 0,   Downloads (12 Months): 8,   Downloads (Overall): 153

Full text available: PDFPDF
Visualization of large-scale high dimensional data tool is highly valuable for scientific discovery in many fields. We present Pub Chem Browse, a customized visualization tool for cheminformatics research. It provides a novel 3D data point browser that displays complex properties of massive data on commodity clients. As in GIS browsers ...
Keywords: GTM, MDS, interpolation, visualization, semantic web

5 published by ACM
June 2010 HPDC '10: Proceedings of the 19th ACM International Symposium on High Performance Distributed Computing
Publisher: ACM
Bibliometrics:
Citation Count: 16
Downloads (6 Weeks): 4,   Downloads (12 Months): 21,   Downloads (Overall): 398

Full text available: PDFPDF
The recent explosion of publicly available biology gene sequences and chemical compounds offers an unprecedented opportunity for data mining. To make data analysis feasible for such vast volume and high-dimensional scientific data, we apply high performance dimension reduction algorithms. It facilitates the investigation of unknown structures in a three dimensional ...
Keywords: MDS, interpolation, GTM

6
May 2010 CCGRID '10: Proceedings of the 2010 10th IEEE/ACM International Conference on Cluster, Cloud and Grid Computing
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 5
Downloads (6 Weeks): 0,   Downloads (12 Months): 0,   Downloads (Overall): 28

Full text available: PdfPdf
Large high dimension datasets are of growing importance in many fields and it is important to be able to visualize them for understanding the results of data mining approaches or just for browsing them in a way that distance between points in visualization (2D or 3D) space tracks that in ...

7
April 2009 Concurrency and Computation: Practice & Experience - Web 2.0, Semantics, Knowledge and Grid: Volume 21 Issue 5, April 2009
Publisher: John Wiley and Sons Ltd.
Bibliometrics:
Citation Count: 2

Web 2.0 approaches are revolutionizing the Internet, blurring lines between developers and users and enabling collaboration and social networks that scale into the millions of users. As discussed in our previous work, the core technologies of Web 2.0 effectively define a comprehensive distributed computing environment that parallels many of the ...
Keywords: e-science, Web 2.0, cyberinfrastructure

8
December 2008 ESCIENCE '08: Proceedings of the 2008 Fourth IEEE International Conference on eScience
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 0

The multicore revolution promises potentially hundreds of cores in desktop computers. The ever increasing number of cores per chip will be accompanied by a pervasive data deluge whose size will probably increase even faster than CPU core count over the next few years. This suggests the importance of parallel data ...
Keywords: Multicore, Parallel, Data Mining, Application, Benchmark

9 published by ACM
December 2008 ACM Transactions on Information and System Security (TISSEC): Volume 12 Issue 2, December 2008
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 1,   Downloads (12 Months): 7,   Downloads (Overall): 752

Full text available: PDFPDF
In biology, a vaccine is a weakened strain of a virus or bacterium that is intentionally injected into the body for the purpose of stimulating antibody production. Inspired by this idea, we propose a packet vaccine mechanism that randomizes address-like strings in packet payloads to carry out fast exploit detection ...
Keywords: worm, black-box defense, exploit detection, signature generation, vaccine injection

10
September 2007 RAID'07: Proceedings of the 10th international conference on Recent advances in intrusion detection
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 5

Spyware infections are becoming extremely pervasive, posing a grave threat to Internet users' privacy. Control of such an epidemic is increasingly difficult for the existing defense mechanisms, which in many cases rely on detection alone. In this paper, we propose SpyShield, a new containment technique, to add another layer of ...

11 published by ACM
October 2006 CCS '06: Proceedings of the 13th ACM conference on Computer and communications security
Publisher: ACM
Bibliometrics:
Citation Count: 18
Downloads (6 Weeks): 2,   Downloads (12 Months): 8,   Downloads (Overall): 833

Full text available: PDFPDF
In biology,a vaccine is a weakened strain of a virus or bacterium that is intentionally injected into the body for the purpose of stimulating antibody production.Inspired by this idea, we propose a packet vaccine mechanism that randomizes address-like strings in packet payloads to carry out fast exploit detection, vulnerability diagnosis ...
Keywords: vaccine injection, worm, black-box defense, exploit detection, signature generation

12
September 2006 DASC '06: Proceedings of the 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 5

We introduce the notion of tamper-evidence for digital signature generation in order to defend against attacks aimed at covertly leaking secret information held by corrupted signing nodes. This is achieved by letting observers (which need not be trusted) verify the absence of covert channels by means of techniques we introduce ...

13
February 2006 FC'06: Proceedings of the 10th international conference on Financial Cryptography and Data Security
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 5

We introduce the notion of tamper-evidence for mix networks in order to defend against attacks aimed at covertly leaking secret information held by corrupted mix servers. This is achieved by letting observers (which need not be trusted) verify the absence of covert channels by means of techniques we introduce herein. ...
Keywords: malware, covert channel, mix network, observer, subliminal channel, tamper-evident

14
November 2005 NPSEC'05: Proceedings of the First international conference on Secure network protocols
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 4

Internet Protocol Security (IPSec) is a widely deployed mechanism for implementing Virtual Private Networks (VPNs). This paper evaluates the performance overheads associated with IPSec. We use Openswan, an open source implementation of IPSec, and measure the running times of individual security operations and also the speedup gained by replacing various ...

15 published by ACM
October 2005 Q2SWinet '05: Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks
Publisher: ACM
Bibliometrics:
Citation Count: 16
Downloads (6 Weeks): 2,   Downloads (12 Months): 22,   Downloads (Overall): 1,007

Full text available: PDFPDF
We investigate how to obtain a balance between privacy and audit requirements in vehicular networks. Challenging the current trend of relying on asymmetric primitives within VANETs, our investigation is a feasibility study of the use of symmetric primitives, resulting in some efficiency improvements of potential value. More specifically, we develop ...
Keywords: incentive, privacy, audit, light-weight, symmetric



The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2018 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us