2008 | ||
---|---|---|
56 | Sung Deok Cha, Jin-Young Choi, Moonzoo Kim, Insup Lee, Mahesh Viswanathan: Automated Technology for Verification and Analysis, 6th International Symposium, ATVA 2008, Seoul, Korea, October 20-23, 2008. Proceedings Springer 2008 | |
55 | EE | Jin-Young Choi, Sung-Min Jung, Young-Ju Han, Tai-Myoung Chung: Extended Concentric-Clustering Routing Scheme Adapted to Various Environments of Sensor Networks. APNOMS 2008: 187-196 |
54 | EE | Hyun Seok Kim, Seok Seo, Jin-Young Choi: Weaknesses Analysis and Countermeasure of a Verifier-Based Key Agreement Protocol. HPCC 2008: 1015-1018 |
53 | EE | Jin Hyun Kim, Jae-Hwan Sim, Jin-Young Choi: Resource-Oriented Design Framework for Embedded System Components. Electr. Notes Theor. Comput. Sci. 215: 171-189 (2008) |
2007 | ||
52 | EE | Jung-Hyun Oh, Hyun Seok Kim, Jin-Young Choi: A Secure Communication Protocol for Low-Cost RFID System. CIT 2007: 949-954 |
51 | EE | Hyun Seok Kim, Jin-Young Choi: The Design and Verification of RFID Authentication Protocol for Ubiquitous Computing. DEXA Workshops 2007: 693-697 |
50 | EE | Jin Hyun Kim, Jin-Young Choi: Embedded System Modeling Based on Resource-Oriented Model. ECBS 2007: 203-212 |
49 | EE | Hyun Seok Kim, Jin-Young Choi: Security and Privacy Analysis of RFID Authentication Protocol for Ubiquitous Computing. ICCCN 2007: 1359-1363 |
48 | EE | Spyros A. Reveliotis, Elzbieta Roszkowska, Jin-Young Choi: Generalized Algebraic Deadlock Avoidance Policies for Sequential Resource Allocation Systems. ICRA 2007: 991-996 |
47 | Hyun Seok Kim, Jung-Hyun Oh, Jin-Young Choi: RFID Privacy Protection Scheme for Secure Ubiquitous Computing. IWRT 2007: 117-124 | |
46 | EE | Jung-Hyun Oh, Hyun Seok Kim, Jin-Young Choi: A Light-weight Security Protocol for RFID System. PWC 2007: 384-395 |
45 | EE | Jin Hyun Kim, Jae-Hwan Sim, Chang Jin Kim, Jin-Young Choi: Formal Embedded Operating System Model Based on Resource-Based Design Framework. QSIC 2007: 244-249 |
2006 | ||
44 | EE | Il-Gon Kim, Hyun Seok Kim, Ji-Yeon Lee, Jin-Young Choi, Inhye Kang: Secrecy Analysis of Purchase Transaction in Electronic Purses. AINA (1) 2006: 979-984 |
43 | EE | Hyun Seok Kim, Jung-Hyun Oh, Jin-Young Choi, Jin-Woo Kim: The Vulnerabilities Analysis and Design of the Security Protocol for RFID System. CIT 2006: 152 |
42 | EE | Hyun Seok Kim, Jeong-Hyun Oh, Jin-Young Choi: Security Analysis of RFID Authentication for Pervasive Systems using Model Checking. COMPSAC (2) 2006: 195-202 |
41 | EE | Hyun Seok Kim, Il-Gon Kim, Keun-Hee Han, Jin-Young Choi: Security and Privacy Analysis of RFID Systems Using Model Checking. HPCC 2006: 495-504 |
40 | EE | Spyros A. Reveliotis, Jin-Young Choi: Designing Reversibility-Enforcing Supervisors of Polynomial Complexity for Bounded Petri Nets Through the Theory of Regions. ICATPN 2006: 322-341 |
39 | Chang Jin Kim, Jin-Young Choi: Transformation of the Ravenscar Profile Based Ada Real-time Application to the Verification-ready Statecharts: Reverse Engineering and Statemate approach. Software Engineering Research and Practice 2006: 405-414 | |
38 | EE | Song-Hee Lee, Jin-Young Choi: A Medium Access Control Scheme for Providing Reliability in Wireless Ad Hoc Networks. WASA 2006: 341-352 |
37 | Il-Gon Kim, Miyoung Kang, Jin-Young Choi, Peter D. Zegzhda, Maxim O. Kalinin, Dmitry P. Zegzhda, Inhye Kang: Formal Verification of Security Model Using SPR Tool. Computers and Artificial Intelligence 25(5): (2006) | |
36 | EE | Keun-Hee Han, Il-Gon Kim, Kang-Won Lee, Jin-Young Choi, Sang-Hun Jeon: Threat Evaluation Method for Distributed Network Environment. J. Inf. Sci. Eng. 22(4): 889-907 (2006) |
2005 | ||
35 | EE | Chul-Wuk Jeon, Il-Gon Kim, Jin-Young Choi: Automatic Generation of the C# Code for Security Protocols Verified with Casper/FDR. AINA 2005: 507-510 |
34 | EE | Hyun Seok Kim, Il-Gon Kim, Jin-Young Choi: Analysis of Security Protocols with Certificate over Open Networks: Electronic Payment System. ICDCS Workshops 2005: 217-223 |
33 | EE | Il-Gon Kim, Young-Joo Moon, Inhye Kang, Ji-Yeon Lee, Keun-Hee Han, Jin-Young Choi: Model-Based Analysis of Money Accountability in Electronic Purses. WINE 2005: 346-355 |
32 | EE | Il-Gon Kim, Jin-Young Choi: Model Checking of RADIUS Protocol in Wireless Networks. IEICE Transactions 88-B(1): 397-398 (2005) |
31 | EE | Ki-Seok Bang, Hyun-Wook Jin, Chuck Yoo, Jin-Young Choi: System Resource Utilization Analysis Based on Model Checking Method. Informatica (Slovenia) 29(2): 219-226 (2005) |
30 | EE | Hyun-Wook Jin, Pavan Balaji, Chuck Yoo, Jin-Young Choi, Dhabaleswar K. Panda: Exploiting NIC architectural support for enhancing IP-based protocols on high-performance networks. J. Parallel Distrib. Comput. 65(11): 1348-1365 (2005) |
29 | EE | Hojung Cha, Jongmin Lee, Jongho Nang, Sungyong Park, Jin-Hwan Jeong, Chuck Yoo, Jin-Young Choi: A Video Streaming System for Mobile Phones: Practice and Experience. Wireless Networks 11(3): 265-274 (2005) |
2004 | ||
28 | EE | Il-Gon Kim, Jin-Young Choi: Formal Verification of PAP and EAP-MD5 Protocols in Wireless Networks: FDR Model Checking. AINA (2) 2004: 264-269 |
27 | EE | Jin Hyun Kim, Su-Young Lee, Young Ah Ahn, Jae-Hwan Sim, Jin Seok Yang, Na-Young Lee, Jin-Young Choi: Development of RTOS for PLC Using Formal Methods. ATVA 2004: 479-482 |
26 | EE | Yerang Hur, Jesung Kim, Insup Lee, Jin-Young Choi: Sound Code Generation from Communicating Hybrid Models. HSCC 2004: 432-447 |
25 | EE | Ki-Seok Bang, Jin-Young Choi, Sung-Ho Jang: Formal Specification and Verification of Embedded System with Shared Resources. IEEE International Workshop on Rapid System Prototyping 2004: 8-14 |
24 | Young Ah Ahn, Jin-Young Choi: FDR verification of ESANP protocol in Ad hoc Network. SNPD 2004: 141-145 | |
23 | Il-Gon Kim, Jin-Young Choi: New S/Key System against Dictionary Attack: A Case Study in Casper and CSP/FDR. VVEIS 2004: 75-77 | |
2003 | ||
22 | Sung-Ho Jang, Ki-Seok Bang, Jin-Young Choi: SSR : Statechart with shared resources. HCC 2003: 198-200 | |
21 | EE | Hee-Jun Yoo, Jin-Young Choi: Process Algebraic Model of Superscalar Processor Programs for Instruction Level Timing Analysis. PaCT 2003: 180-184 |
20 | EE | Sung-Jae Kim, Jin-Young Choi: Formal Modeling for a Real-Time Scheduler and Schedulability Analysis. PaCT 2003: 253-258 |
19 | EE | Spyros A. Reveliotis, Jin-Young Choi: On the Optimality of Randomized Deadlock Avoidance Policies. Discrete Event Dynamic Systems 13(4): 303-320 (2003) |
18 | EE | Hyun-Wook Jin, Chuck Yoo, Jin-Young Choi: Firmware-Level Latency Analysis on a Gigabit Network. The Journal of Supercomputing 26(1): 59-75 (2003) |
2002 | ||
17 | Jin-Young Choi, Spyros A. Reveliotis: An Analytical Investigation of the Scheduling Problem for Capacitated Re-Entrant Lines. ICRA 2002: 3193-3198 | |
16 | EE | Hyun-Wook Jin, Ki-Seok Bang, Chuck Yoo, Jin-Young Choi, Hojung Cha: Bottleneck Analysis of a Gigabit Network Interface Card: Formal Verification Approach. SPIN 2002: 170-186 |
2001 | ||
15 | Insup Lee, Jin-Young Choi, Hee-Hwan Kwak, Anna Philippou, Oleg Sokolsky: A Family of Resource-Bound Real-Time Process Algebras. FORTE 2001: 443-458 | |
14 | Jin-Young Choi, Hee Yong Youn, Soonuk Seol, Chuck Yoo: Distributed Test using Logical Clock. FORTE 2001: 69-84 | |
13 | Young-Ho Kim, Jin Hyun Kim, Ji-Young Kim, Jee-In Kim, Jin-Young Choi, Chang Woo Pyo: A visual component based tool for developing embedded application software. HCI 2001: 180-184 | |
12 | EE | Nojun Kwak, Chong-Ho Choi, Jin-Young Choi: Feature Extraction Using ICA. ICANN 2001: 568-576 |
11 | EE | Ki-Seok Bang, Jin-Young Choi, Chuck Yoo: Comments on 'The Model Checker SPIN'. IEEE Trans. Software Eng. 27(6): 573-576 (2001) |
2000 | ||
10 | EE | Myung-Hwan Park, Ki-Seok Bang, Jin-Young Choi, Inhye Kang: Equivalence Checking of Two Statechart Specifications. IEEE International Workshop on Rapid System Prototyping 2000: 46-51 |
9 | EE | Jin-Young Choi, Hee-Hwan Kwak, Insup Lee: A Framework for Embedded Real-Time System Design. IPDPS Workshops 2000: 738-742 |
1998 | ||
8 | EE | Hee-Hwan Kwak, Insup Lee, Anna Philippou, Jin-Young Choi, Oleg Sokolsky: Symbolic Schedulability Analysis of Real-Time Systems. IEEE Real-Time Systems Symposium 1998: 409- |
7 | Hanêne Ben-Abdallah, Jin-Young Choi, Duncan Clarke, Young-Si Kim, Insup Lee, Hong-liang Xie: A Process Algebraic Approach to the Schedulability Analysis of Real-Time Systems. Real-Time Systems 15(3): 189-219 (1998) | |
1997 | ||
6 | EE | Chul-Jin Ahn, Seong-Uk Choi, Myong-Soon Park, Jin-Young Choi: The Design and Evaluation of Policy-Controllable Buffer Cache. ICPADS 1997: 764-771 |
5 | EE | Sung-Mook Lim, Jin-Young Choi: Specification and verification of real-time systems using ACSR-VP. RTCSA 1997: 135-142 |
4 | Patrice Brémond-Grégoire, Jin-Young Choi, Insup Lee: A Complete Axiomatization of Finite-State ACSR Processes. Inf. Comput. 138(2): 124-159 (1997) | |
1996 | ||
3 | Min Woong Hwang, Jin-Young Choi: Evolutionary Learning Algorithm for Projection Neural Networks. SEAL 1996: 136-145 | |
1995 | ||
2 | Jin-Young Choi, Insup Lee, Hong-liang Xie: The Specification and Schedulability Analysis of Real-Time Systems using ACSR. IEEE Real-Time Systems Symposium 1995: 266-275 | |
1 | Hanêne Ben-Abdallah, Insup Lee, Jin-Young Choi: A Graphical Language with Formal Semantics for the Specification and Analysis of Real-Time Systems. IEEE Real-Time Systems Symposium 1995: 276-287 |