Digital Library


Search: "[ author: Jun Kim ]" (15)
    An Improved Estimation Model of Server Power Consumptionfor Saving Energy in a Server Cluster Environment
    Dong Jun Kim , Hu Keun Kwak , Hui Ung Kwon , Young Jong Kim , Kyu Sik Chung KIPS Transactions on Computer and Communication Systems, Vol. 19, No. 3, pp. 139-146, Mar. 2012
    10.3745/KIPSTA.2012.19.3.139

    A Behavior Conformance Checker for Component Interfaces using UML State Machine Diagram
    Ho Jun Kim , Woo Jin Lee KIPS Transactions on Computer and Communication Systems, Vol. 16, No. 1, pp. 65-72, Jan. 2009
    10.3745/KIPSTD.2009.16.1.65

    Framework for Developing RFID Applications Based on Product Line Architecture
    Mi Kyeong Moon , Han Jun Kim , Keun Hyuk Yeom KIPS Transactions on Computer and Communication Systems, Vol. 14, No. 7, pp. 773-782, Jul. 2007
    10.3745/KIPSTD.2007.14.7.773

    Computer Graphics & A Scalable Semi-Implicit Method for Realtime Cloth Simulation
    Myoung Jun Kim KIPS Transactions on Computer and Communication Systems, Vol. 13, No. 2, pp. 177-184, Feb. 2006
    10.3745/KIPSTA.2006.13.2.177

    LD based tagSNP Selection System for Large-scale SNP Haplotype Dataset
    Sang Jun Kim , Sang Soo Yeo , Sung Kwon Kim KIPS Transactions on Computer and Communication Systems, Vol. 13, No. 1, pp. 79-86, Jan. 2006
    10.3745/KIPSTA.2006.13.1.79

    Building B2B system using timestamp tree for data change detection in Low speed network environment
    Sei Il Son , Heung Jun Kim KIPS Transactions on Computer and Communication Systems, Vol. 12, No. 6, pp. 915-920, Jun. 2005
    10.3745/KIPSTD.2005.12.6.915

    Internet Multicast Routing Protocol Model using MPLS Networks
    Young Jun Kim KIPS Transactions on Computer and Communication Systems, Vol. 10, No. 1, pp. 77-86, Jan. 2003
    10.3745/KIPSTC.2003.10.1.77

    Analysis of Traffic and Attack Frequency in the NURION Supercomputing Service Network
    Jae-Kook Lee, Sung-Jun Kim, Taeyoung Hong KIPS Transactions on Computer and Communication Systems, Vol. 9, No. 5, pp. 113-120, May. 2020
    https://doi.org/10.3745/KTCCS.2020.9.5.113
    Keywords: NURION Supercomputer, Network traffic, Frequency Analysis, Correlation Analysis, time series analysis

    Suggestion of CPA Attack and Countermeasure for Super-Light Block Cryptographic CHAM
    Hyun-Jun Kim, Kyung-Ho Kim, Hyeok-Dong Kwon, Hwa-Jeong Seo KIPS Transactions on Computer and Communication Systems, Vol. 9, No. 5, pp. 107-112, May. 2020
    https://doi.org/10.3745/KTCCS.2020.9.5.107
    Keywords: Side Channel Attack, CHAM, CPA Attack, Masking, AVR

    Transformation from Legacy Application Class to JavaBeans for Component Based Development
    Byung Jun Kim, Ji Young Kim, Haeng Kon Kim KIPS Transactions on Computer and Communication Systems, Vol. 9, No. 4, pp. 619-628, Apr. 2002
    10.3745/KIPSTD.2002.9.4.619