Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
VeriRT: An End-to-End Verification Framework for Real-Time Distributed Systems
Proceedings of the ACM on Programming Languages (PACMPL), Volume 9, Issue POPLArticle No.: 61, Pages 1812–1839https://doi.org/10.1145/3704897Safety-critical systems are often designed as real-time distributed systems. Despite the need for strong guarantees of safety and reliability in these systems, applying formal verification methods to real-time distributed systems at the implementation ...
Archmage and CompCertCast: End-to-End Verification Supporting Integer-Pointer Casting
Proceedings of the ACM on Programming Languages (PACMPL), Volume 9, Issue POPLArticle No.: 45, Pages 1326–1354https://doi.org/10.1145/3704881Although there have been many approaches for developing formal memory models that support integer-pointer casts, previous approaches share the drawback that they are not designed for end-to-end verification, failing to support some important source-level ...
- research-articleSeptember 2024
Development of a low-cost automated greenhouse imaging system with machine learning-based processing for evaluating genetic performance of drought tolerance in a bentgrass hybrid population
Computers and Electronics in Agriculture (COEA), Volume 224, Issue Chttps://doi.org/10.1016/j.compag.2024.108896Highlights- Development of a low-cost automated greenhouse RGB image system.
- Development of a time- and labor-efficient image processing platform using machine learning.
- Assessment of genetic performance of drought tolerance in a bentgrass ...
Extreme weather events due to climate change threaten sustainable crop production and quality, and developing crop varieties with resilient yield and quality traits through breeding is needed. One of the major issues for turfgrass management is ...
- research-articleOctober 2023
A Comprehensive Dataset Towards Hands-on Experience Enhancement in a Research-Involved Cybersecurity Program
SIGITE '23: Proceedings of the 24th Annual Conference on Information Technology EducationPages 118–124https://doi.org/10.1145/3585059.3611416Undergraduate research activities have demonstrated their ability to enhance learning outcomes, improve student retention, and foster critical thinking. In particular, cybersecurity is a highly practical discipline, and relying solely on passive ...
- extended-abstractApril 2023
Bean Academy: A Music Composition Game for Beginners with Vocal Query Transcription
CHI EA '23: Extended Abstracts of the 2023 CHI Conference on Human Factors in Computing SystemsArticle No.: 591, Pages 1–6https://doi.org/10.1145/3544549.3583824Bean Academy is a music composition game designed for musically-unskilled learners to lower entry barriers to music composition learning such as music theory comprehension, literacy and proficiency in utilizing music composition software. As a solution, ...
-
- ArticleAugust 2020
BroadFace: Looking at Tens of Thousands of People at once for Face Recognition
AbstractThe datasets of face recognition contain an enormous number of identities and instances. However, conventional methods have difficulty in reflecting the entire distribution of the datasets because a mini-batch of small size contains only a small ...
CompCertM: CompCert with C-assembly linking and lightweight modular verification
Proceedings of the ACM on Programming Languages (PACMPL), Volume 4, Issue POPLArticle No.: 23, Pages 1–31https://doi.org/10.1145/3371091Supporting multi-language linking such as linking C and handwritten assembly modules in the verified compiler CompCert requires a more compositional verification technique than that used in CompCert just supporting separate compilation. The two ...
- research-articleFebruary 2019
Attack Detection Application with Attack Tree for Mobile System using Log Analysis
Mobile Networks and Applications (MNET), Volume 24, Issue 1Pages 184–192https://doi.org/10.1007/s11036-018-1012-4AbstractRecently, the use of smart phones has greatly increased because of the development of cheap high-performance hardware. The biggest threat to a smart phone user is the loss of his/her personal information by an attacker. To protect a user’s ...
- research-articleJanuary 2019
Fast attack detection system using log analysis and attack tree generation
Cluster Computing (KLU-CLUS), Volume 22, Issue 1Pages 1827–1835https://doi.org/10.1007/s10586-018-2269-xAbstractMany government branches report that internal networks are managed safely by separating them from the outside, but there is often a vulnerability that allows malicious codes to attack an internal network. Recently, the Ministry of National Defense ...
- ArticleSeptember 2018
SAN: Learning Relationship Between Convolutional Features for Multi-scale Object Detection
AbstractMost of the recent successful methods in accurate object detection build on the convolutional neural networks (CNN). However, due to the lack of scale normalization in CNN-based detection methods, the activated channels in the feature space can be ...
- ArticleSeptember 2018
Pairwise Relational Networks for Face Recognition
AbstractExisting face recognition using deep neural networks is difficult to know what kind of features are used to discriminate the identities of face images clearly. To investigate the effective features for face recognition, we propose a novel face ...
Crellvm: verified credible compilation for LLVM
- Jeehoon Kang,
- Yoonseung Kim,
- Youngju Song,
- Juneyoung Lee,
- Sanghoon Park,
- Mark Dongyeon Shin,
- Yonghyun Kim,
- Sungkeun Cho,
- Joonwon Choi,
- Chung-Kil Hur,
- Kwangkeun Yi
PLDI 2018: Proceedings of the 39th ACM SIGPLAN Conference on Programming Language Design and ImplementationPages 631–645https://doi.org/10.1145/3192366.3192377Production compilers such as GCC and LLVM are large complex software systems, for which achieving a high level of reliability is hard. Although testing is an effective method for finding bugs, it alone cannot guarantee a high level of reliability. To ...
Also Published in:
ACM SIGPLAN Notices: Volume 53 Issue 4- research-articleSeptember 2017
Detector with focus: Normalizing gradient in image pyramid
2017 IEEE International Conference on Image Processing (ICIP)Pages 420–424https://doi.org/10.1109/ICIP.2017.8296315An image pyramid can extend many object detection algorithms to solve detection on multiple scales. However, interpolation during the resampling process of an image pyramid causes gradient variation, which is the difference of the gradients between the ...
- research-articleOctober 2016
Deep convolution neural network with stacks of multi-scale convolutional layer block using triplet of faces for face recognition in the wild
2016 IEEE International Conference on Systems, Man, and Cybernetics (SMC)Pages 004460–004465https://doi.org/10.1109/SMC.2016.7844934Recently, deep convolutional neural networks have set a new trend in fields of face recognition by improving the state-of-the-art performance. By using deep neural networks, much more sophisticated and high level abstracted features can be learned ...
- research-articleOctober 2016
Detecting Korean characters in natural scenes by alphabet detection and agglomerative character construction
2016 IEEE International Conference on Systems, Man, and Cybernetics (SMC)Pages 003812–003817https://doi.org/10.1109/SMC.2016.7844828This paper considers the Korean character detection problem. Unlike English where an alphabet constitutes a character, the Korean character is composed of more than two Korean alphabets, where they could be either connected or separated, relying on the ...
- posterJune 2016
Poster: Worm Propagation Model for Cyber Warfare Modeling and Simulation in Tactical Networks
MobiSys '16 Companion: Proceedings of the 14th Annual International Conference on Mobile Systems, Applications, and Services CompanionPage 49https://doi.org/10.1145/2938559.2948858Recently, with the development and diffusion of internet, it has also increased the damage from malicious attacks. Worm attack refers to one of the malicious attack that replicates and spreads itself to the network. Especially, it is expected that the ...
- ArticleAugust 2015
Survey of BigData-as-a-Service Type
HPCC-CSS-ICESS '15: Proceedings of the 2015 IEEE 17th International Conference on High Performance Computing and Communications, 2015 IEEE 7th International Symposium on Cyberspace Safety and Security, and 2015 IEEE 12th International Conf on Embedded Software and SystemsPages 1573–1578https://doi.org/10.1109/HPCC-CSS-ICESS.2015.279Big Data is used to find new value and brings us several benefits, which we didn't know before. Various analytics has been studied in Big Data area for benefits. Moreover, to reduce analysis time and to support real-time service to user, distributed ...
- ArticleJanuary 2015
Adaptive Deformation Handling for Pedestrian Detection
WACV '15: Proceedings of the 2015 IEEE Winter Conference on Applications of Computer VisionPages 156–161https://doi.org/10.1109/WACV.2015.28Despite the abundance of successful models for pedestrian detection, many are limited in their ability to handle deformations, such as large appearance variations. In view of insufficient number of models with the ability to handle deformations, we ...
- research-articleDecember 2013
Reliability study of methods to suppress boron transient enhanced diffusion in high-k/metal gate Si/SiGe channel pMOSFETs
- Min Sang Park,
- Yonghyun Kim,
- Kyong Taek Lee,
- Chang Yong Kang,
- Byoung-Gi Min,
- Jungwoo Oh,
- Prashant Majhi,
- Hsing-Huang Tseng,
- Jack C. Lee,
- Sanjay K. Banerjee,
- Jeong-Soo Lee,
- Raj Jammy,
- Yoon-Ha Jeong
The effects of extension profile engineering to suppress boron transient enhanced diffusion (TED) are investigated in Si/SiGe channel metal-oxide-semiconductor field-effect transistor (MOSFET). In performance, Ge pre-amorphization implantation (PAI) ...
- ArticleNovember 2007
A Buffer-Controlled Adaptive Video Streaming for Mobile Devices
ICCIT '07: Proceedings of the 2007 International Conference on Convergence Information TechnologyPages 30–35https://doi.org/10.1109/ICCIT.2007.11In a recent VoD application, a stationary VoD server delivers video stream to a mobile device, particularly PDA, over wireless. Our objective is to develop a simple cost effective scheme which offers an acceptable video quality over a noisy wireless ...