12 results on '"Kisu Kim"'
Search Results
2. DACS
- Author
-
Jiman Hong, Kisu Kim, Myungjoon Shon, Hansol Lee, and Sung Y. Shin
- Subjects
010302 applied physics ,Computer science ,Temporal isolation among virtual machines ,020206 networking & telecommunications ,Hypervisor ,02 engineering and technology ,Load balancing (computing) ,computer.software_genre ,01 natural sciences ,Scheduling (computing) ,Virtual finite-state machine ,Virtual machine ,0103 physical sciences ,0202 electrical engineering, electronic engineering, information engineering ,Operating system ,computer ,Resource utilization - Abstract
Virtual machines are used in various fields to increase the resource utilization. In a virtual machine monitor, I/O requests are the most frequent tasks for virtual machines. However, a virtual machine monitor cannot guarantee I/O responsiveness when multiple tasks are being performed on virtual machines. We propose a scheduling scheme that provides fast I/O responsiveness for virtual machines. The proposed scheme provides high resource utilization by dynamically allocating virtual resources to virtual machines according to the characteristics of their tasks. In experiments with virtual machines containing varying task characteristics, it is shown that the proposed scheme provides improved I/O responsiveness when compared to existing virtual machine schedulers.
- Published
- 2017
- Full Text
- View/download PDF
3. An Empirical Research of Factors Affecting Collaborative Decision Making System
- Author
-
Lingxia Liu, Wei Sun, and Kisu Kim
- Subjects
Knowledge management ,General Computer Science ,Decision engineering ,Computer science ,business.industry ,General Mathematics ,Group decision-making ,Empirical research ,Business decision mapping ,Business intelligence ,Leverage (statistics) ,Social media ,business ,Social network service - Abstract
This paper studies empirically business intelligence and social network service used to leverage the performance of collaborative decision making. A model is developed and tested empirically to find out meaningful relationships among those variables. This paper examines the current trend of social media within business intelligence, the importance of integrating these types of features within a BI solution, and why organizations should consider this type of functionality within their current decision making infrastructures. The result also shows that social media will increase in relation to use and expand within business related BI use, developing solutions that become easy to use is essential to successful collaborative decision making adoption.
- Published
- 2013
- Full Text
- View/download PDF
4. Method of Building a Security Vulnerability Information Collection and Management System for Analyzing the Security Vulnerabilities of IoT Devices
- Author
-
Wonkang Jung, Kisu Kim, and Jongsoo Lee
- Subjects
Cloud computing security ,Security service ,Information security management ,Computer science ,Vulnerability management ,Computer security ,computer.software_genre ,Asset (computer security) ,computer ,Security information and event management ,Threat ,Vulnerability (computing) - Abstract
This paper presents a method of building a security vulnerability information collection and management system in order to promptly identify which types of security vulnerability are included in IoT devices.
- Published
- 2017
- Full Text
- View/download PDF
5. Virtual machine scheduling based on task characteristic
- Author
-
Jiman Hong, Taegyu Hwang, Dongwan Shin, Jeonghwan Lee, and Kisu Kim
- Subjects
business.industry ,Computer science ,Temporal isolation among virtual machines ,020206 networking & telecommunications ,Virtual machine scheduling ,02 engineering and technology ,computer.software_genre ,Scheduling (computing) ,Virtual machine ,020204 information systems ,Embedded system ,0202 electrical engineering, electronic engineering, information engineering ,Operating system ,Central processing unit ,business ,computer - Abstract
Credit scheduler, an original Xen virtual machine scheduler, uses a boost mechanism to improve responsiveness. However, the original boost mechanism is applied only to inactive virtual machines. Because of this, if virtual machine scheduling delay time increases, the I/O performance of an active virtual machine dramatically decreases. However, when the boost mechanism of a previous credit scheduler is applied to an active virtual machine, the allocation equality can become unbalanced. This research study proposes a boost mechanism that can be applied to an active virtual machine. Evaluation of the results showed that, when compared to the previous credit scheduler, the proposed method both did not upset the fairness of the CPU allocation between the virtual machines and improved the I/O performance.
- Published
- 2016
- Full Text
- View/download PDF
6. Synchronization framework for collecting multimodal bio-sensor data in real-time
- Author
-
Daeshin Park, Taegyu Hwang, and Kisu Kim
- Subjects
Biometrics ,User intent ,Computer science ,Order (business) ,Real-time computing ,Synchronization (computer science) ,Process (computing) ,Bio sensor ,Data transmission - Abstract
Through recent developments in hardware, it has become possible to interpret user intent by integrating biological information recorded through various biometric devices. However, because multiple devices that acquire biological information have different OSs, data transmission protocols, and arrival times, it is not easy to collect and analyze biological information in real-time. Our proposed method solves the issue of different OS and data transmission protocols. To realize the same, the proposed synchronization framework implements a biometric information priority and algorithm. The implemented framework is able to analyze and process data in real-time in order to recognize user intention information.
- Published
- 2015
- Full Text
- View/download PDF
7. LACS
- Author
-
Chris Sung, Kisu Kim, and Taegyu Hwang
- Subjects
Fixed-priority pre-emptive scheduling ,Virtual machine ,Computer science ,Deadline scheduler ,Operating system ,Central processing unit ,Proportionally fair ,Latency (engineering) ,computer.software_genre ,Virtualization ,computer ,Scheduling (computing) - Abstract
This paper exposes the original Xen credit scheduler. In some case, the original credit scheduler results in low responsiveness. The credit scheduler is a proportional fair share central processing unit (CPU) scheduler and provides CPU fairness. However, in contrast with fine CPU fairness, the responsiveness is insufficient in the case of CPU intensive workloads. We modify the Xen credit scheduler to obtain an improved response time because VM scheduling significantly affects the responsiveness of virtual machines (VMs) in virtualization environments. The supposed scheduling boosts a VM with a conditional boost mechanism to maintain CPU fairness. The experimental results show that the supposed scheduling technique offers better responsiveness for a VM than the original credit scheduler.
- Published
- 2015
- Full Text
- View/download PDF
8. A 11b 5.1µW multi-slope ADC with a TDC using multi-phase clock signals
- Author
-
Kisu Kim, Masayuki Ikebe, Junichi Motohisa, and Eiichi Sano
- Subjects
Time-to-digital converter ,Effective number of bits ,Spurious-free dynamic range ,CMOS ,Computer science ,Multi phase ,Hardware_INTEGRATEDCIRCUITS ,Electronic engineering ,Successive approximation ADC ,Hardware_ARITHMETICANDLOGICSTRUCTURES ,Cmos process ,Signal - Abstract
We propose a multi-slope ADC with a Time to Digital Converter (TDC). In a single-slope ADC, when using a TDC that has resolution of n bits, the conversion time will be reduced by a factor of 2n. Applying the TDC that uses the multi-phase-clock signal reduced the circuit areas of TDC by half, achieved timing consistency, and realized robust meta-stability. We also apply multi-slope scheme for reducing the ADC-operation cycles. We designed and fabricated an 11-bit ADC, by using a TSMC 0.18-μm CMOS process. The ADC, at 100 kS/s, achieved SNDR of 59.6 dB (9.6 ENOB) and SFDR of 72.7 dB. Its INL and DNL were +1.32/-0.80LSB and +0.48/-0.37LSB, respectively. The entire ADC consumes 5.1μW from a 1-V supply.
- Published
- 2012
- Full Text
- View/download PDF
9. Network Stability Analysis Techniques Using the Virtual Articulation Node
- Author
-
Jinwook Chung, Yonghyoun Kim, Sengjin Ahn, and Kisu Kim
- Subjects
Potential risk ,Computer science ,business.industry ,Server ,Node (computer science) ,Stability (learning theory) ,Articulation (phonetics) ,Network topology ,business ,Computer network - Abstract
This study proposes a method that measures the stability of networks by converting nodes with higher priorities into virtual articulation nodes. Further, although they're not articulation nodes, by considering critical nodes such as routers connected to external networks or servers that assume vital operations to networks, we are able to improve the monitoring of major nodes in networks and reallocate those nodes when designing networks in order to remove potential risk factors. We will elaborate on the method of creating virtual articulation nodes using virtual nodes and apply them to network topologies to perform a stability analysis through simulation.
- Published
- 2008
- Full Text
- View/download PDF
10. Recovery Schemes for Fast Fault Recovery on GMPLS Network
- Author
-
Kisu Kim, Wonhyuk Lee, Ki-Sung Yu, Seongjin Ahn, Jae-Yong Lee, and Jinwook Chung
- Subjects
Transformation (function) ,Computer science ,Order (business) ,Real-time computing ,Data_FILES ,Survivability ,Fault (power engineering) ,Reliability engineering - Abstract
In this research, we proposed two types of fault recovery schemes designed by combining the protection and the restoration methods in order to increase the survivability of GMPLS networks. The first method is a transformation of the 1+1 protection method where it consumes more resources than the 1+1 protection method but has a faster fault recovery speed. The second method is a combination of the 1+1 protection method and the restoration method and can enhance the performance after recoveries. Although the two methods proposed in this paper consume more resources than the ones before, they have outstanding recovery time and performance after recoveries.
- Published
- 2008
- Full Text
- View/download PDF
11. A VDS Based Traffic Accident Prediction Analysis and Future Application
- Author
-
Chungwon Lee, Bong Gyou Lee, Kisu Kim, and Hye Sun Lee
- Subjects
Transport engineering ,Accident (fallacy) ,Empirical research ,Traffic accident ,Computer science ,Future application ,Computer security ,computer.software_genre ,computer ,Intelligent transportation system - Abstract
The purpose of this study is to present the prediction analysis of traffic accident and future applications by calculating accident risks based on ITS (Intelligent Transport Systems) data via VDS (Vehicle Detecting System). Many researches have described various traffic accident predictions and reductions. However, until recently, empirical studies considering real traffic environments are still insufficient. Site selections in this study were made from accident related data and collected data from VDS to calculate traffic accident rates. Results from analysis showed occurrence of traffic accident by time and explore possibilities for its application in future traffic accident management.
- Published
- 2007
- Full Text
- View/download PDF
12. A VDS Based Traffic Accident Prediction Analysis and Future Application.
- Author
-
Carbonell, Jaime G., Siekmann, Jörg, Nguyen, Ngoc Thanh, Grzech, Adam, Howlett, Robert J., Jain, Lakhmi C., Chungwon Lee, Bong Gyou Lee, Kisu Kim, and Hye Sun Lee
- Abstract
The purpose of this study is to present the prediction analysis of traffic accident and future applications by calculating accident risks based on ITS (Intelligent Transport Systems) data via VDS (Vehicle Detecting System). Many researches have described various traffic accident predictions and reductions. However, until recently, empirical studies considering real traffic environments are still insufficient. Site selections in this study were made from accident related data and collected data from VDS to calculate traffic accident rates. Results from analysis showed occurrence of traffic accident by time and explore possibilities for its application in future traffic accident management. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.