全部文献期刊学位论文会议报纸专利标准年鉴图书|学者科研项目
中外文文献  中文文献  外文文献
作者:... Seungjun Yang , Yunheung Paek , Kwangman Ko
来源:[J].Multimedia Tools and Applications(IF 1.014), 2017, Vol.76 (9), pp.11347-11360Springer
摘要:Nowadays, mobile devices are becoming the most popular computing device as their computing capabilities increase rapidly. However, it is still challenging to execute highly sophisticated applications such as 3D video games on mobile devices due to its constrained key computationa...
作者:... MoonKwon Kim , Yunheung Paek , Kwangman Ko
来源:[J].Multimedia Tools and Applications(IF 1.014), 2018, Vol.77 (22), pp.30051-30065Springer
摘要:Abstract(#br)As the computing power of modern devices become greater, computer vision is increasingly adopted as the means of human-computer interaction. The industry is struggling hard to bring computer vision into the mobile domain, but there are some difficulties mainly d...
作者:... Minsu Kim , Yunheung Paek , Brent Byunghoon Kang
来源:[J].Computers & Security(IF 1.158), 2018Elsevier
摘要:Abstract(#br)The introduction of Address Translation Redirection Attack (ATRA) has revealed a critical weakness in all existing hardware-based external kernel integrity monitors. The attack redefines system's memory mappings in favor of the attacker so that the monitored ker...
作者:... Yeongpil Cho , Yunheung Paek , Kwangman Ko
来源:[J].The Journal of Supercomputing(IF 0.917), 2019, Vol.75 (8), pp.4575-4600Springer
摘要:Abstract(#br)In computer systems, ensuring the integrity of the kernel assumes importance as attacks against the kernel allow an adversary to obtain the highest privilege within a compromised system. For this task, typically, an external monitor would perform memory introspection...
作者:... Minsu Kim , Yunheung Paek , Brent Byunghoon Kang
来源:[J].Computers & Security(IF 1.158), 2018, Vol.77, pp.824-837Elsevier
摘要:Abstract(#br)The introduction of Address Translation Redirection Attack (ATRA) has revealed a critical weakness in all existing hardware-based external kernel integrity monitors. The attack redefines system's memory mappings in favor of the attacker so that the monitored ker...
作者:... Seungjun Yang , Yeongpil Cho , Yunheung Paek
来源:[J].Pervasive and Mobile Computing(IF 1.629), 2016, Vol.27, pp.58-74Elsevier
摘要:Abstract(#br)In order to accommodate the high demand for performance in smartphones, mobile cloud computing techniques, which aim to enhance a smartphone’s performance through utilizing powerful cloud servers, were suggested. Among such techniques, execution offloading, whic...
作者:Jay P. Hoeflinger , Yunheung Paek , Kwang Yi
来源:[J].International Journal of Parallel Programming(IF 0.404), 2001, Vol.29 (2), pp.185-215Springer
摘要:Abstract(#br)In this paper, we outline a new way of detecting parallelism interprocedurally within a program. Our method goes beyond mere dependence testing, to embrace methods of removing dependences as well, namely privatization, induction recognition and reduction recogni...
作者:Yunheung Paek , Jongwung Kim
来源:[J].Journal of Systems Architecture(IF 0.724), 2010, Vol.56 (8), pp.368-383Elsevier
摘要:Abstract(#br)The complexity of today’s embedded applications increases with various requirements such as execution time, code size or power consumption. To satisfy these requirements for performance, efficient instruction set design is one of the important issues because an ...

我们正在为您处理中,这可能需要一些时间,请稍等。

资源合作:cnki.scholar@cnki.net, +86-10-82896619   意见反馈:scholar@cnki.net

×