Changhyun Lee

ORCID: 0000-0002-3367-6045
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Data Visualization and Analytics
  • Network Traffic and Congestion Control
  • Video Analysis and Summarization
  • Caching and Content Delivery
  • Image Retrieval and Classification Techniques
  • Complex Network Analysis Techniques
  • Cloud Computing and Resource Management
  • Advanced Data Storage Technologies
  • Software-Defined Networks and 5G
  • Peer-to-Peer Network Technologies
  • Semiconductor materials and devices
  • Video Coding and Compression Technologies
  • Opinion Dynamics and Social Influence
  • Computer Graphics and Visualization Techniques
  • Advanced Data Compression Techniques
  • Engineering Applied Research
  • Social Media and Politics
  • Data Management and Algorithms
  • Education, Safety, and Science Studies
  • Educational Systems and Policies
  • Microfinance and Financial Inclusion
  • Internet Traffic Analysis and Secure E-voting
  • Education and Learning Interventions
  • FinTech, Crowdfunding, Digital Finance
  • Internet of Things and Social Network Interactions

Electronics and Telecommunications Research Institute
2021-2023

Kyoto University
2022

Jeju National University
2022

SK Group (South Korea)
2019

Google (United States)
2014-2018

Korean Association for Public Security Administration
2016

National Security Research Institute
2016

Applied Radar (United States)
2016

Korea Advanced Institute of Science and Technology
2008-2015

Georgia Institute of Technology
2013-2014

Twitter, a microblogging service less than three years old, commands more 41 million users as of July 2009 and is growing fast. Twitter tweet about any topic within the 140-character limit follow others to receive their tweets. The goal this paper study topological characteristics its power new medium information sharing.

10.1145/1772690.1772751 article EN 2010-04-26

Topic modeling has been widely used for analyzing text document collections. Recently, there have significant advancements in various topic techniques, particularly the form of probabilistic graphical modeling. State-of-the-art techniques such as Latent Dirichlet Allocation (LDA) successfully applied visual analytics. However, most widely-used methods based on drawbacks terms consistency from multiple runs and empirical convergence. Furthermore, due to complicatedness formulation algorithm,...

10.1109/tvcg.2013.212 article EN IEEE Transactions on Visualization and Computer Graphics 2013-10-16

Twitter offers an explicit mechanism to facilitate information diffusion and has emerged as a new medium for communication. Many approaches find influentials have been proposed, but they do not consider the temporal order of adoption. In this work, we propose novel method by considering both link structure adoption in Twitter. Our finds distinct who are discovered other methods.

10.1145/1772690.1772842 article EN 2010-04-26

Since the advent of datacenter networking, achieving low latency within network has been a primary goal. Many congestion control schemes have proposed in recent years to meet datacenters' unique performance requirement. The nature feedback largely governs behavior control. In networks, where round trip times are hundreds microseconds, accurate is crucial achieve both high utilization and queueing delay. Proposals for predominantly leverage explicit notification (ECN) or even in-network...

10.1109/tnet.2016.2587286 article EN IEEE/ACM Transactions on Networking 2016-08-16

A highly manufacturable 32Gb multi-level NAND flash memory with 0.0098 μm <sup xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">2</sup> cell size using 40nm TANOS technologies has been successfully developed for the first time. The main key of are advanced high N.A immersion photolithography off-axis illumination system, blocking oxide cell, and PVD tungsten flowable bit line

10.1109/iedm.2006.346900 article EN International Electron Devices Meeting 2006-01-01

Non-profit Micro-finance organizations provide loaning opportunities to eradicate poverty by financially equipping impoverished, yet skilled entrepreneurs who are in desperate need of an institution that lends those have little. Kiva.org, a widely-used crowd-funded micro-financial service, provides researchers with extensive amount publicly available data containing rich set heterogeneous information regarding transactions. Our objective this paper is identify the key factors encourage...

10.1145/2556195.2556253 article EN 2014-02-18

Required system performance for the computing and server, cost power forces DRAM to improve its bandwidth, capacity power. DDR5 SDRAM has been proposed as next memory solution, with various new functions circuit techniques overcome limitation of DDR4. Speed increased 4.4 - 6.4Gb/s from DDR4's 3.2Gb/s. Energy efficiency improved by over 30% using a 1.1V V <sub xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">DD</sub> 1.8V...

10.1109/isscc.2019.8662320 article EN 2022 IEEE International Solid- State Circuits Conference (ISSCC) 2019-02-01

We present VisIRR, an interactive visual information retrieval and recommendation system for large-scale document data. Starting with a query, VisIRR visualizes the retrieved documents in scatter plot along their topic summary. Next, based on personalized preference feedback documents, collects potentially relevant out of entire corpus so that integrated analysis both recommended can be performed seamlessly.

10.1109/vast.2014.7042511 article EN 2014-10-01

Summary Ethereum is arguably the second most popular cryptocurrency‐based network after Bitcoin. Both use distributed ledger technology known as blockchain, which considered secure. However, provided security level proportional to number of connected nodes, influential and supported amount hash power. Thus, knowledge properties nodes' behavior helpful protect from possible attacks such double‐spending attacks, DDoS 51% Sybil attacks. This paper proposes a node discovery mechanism, performs...

10.1002/nem.2175 article EN International Journal of Network Management 2021-07-05

An abrupt scene-transition frame is one that hardly correlated with the previous frames. In case, because an intra-coded has less distortion than inter-coded one, almost all macroblocks are encoded in intra mode. This breaks up rate control flow and increases number of bits used. Since reference software for H.264 takes no special action a frame, several studies have been conducted to solve problem using quadratic R-D model. However, since this model more suitable inter frames, they...

10.1109/tce.2007.4341589 article EN IEEE Transactions on Consumer Electronics 2007-08-01

With the rapid growth of data centers, minimizing queueing delay at network switches has been one key challenges. In this work, we analyze shortcomings current TCP algorithm when used in center networks, and propose to use latency-based congestion detection rate-based transfer achieve ultra-low centers.

10.1145/2342356.2342385 article EN 2012-08-13

One of the key advantages visual analytics is its capability to leverage both humans's perception and power computing. A big obstacle in integrating machine learning with high computing cost. To tackle this problem, paper presents PIVE (Per-Iteration Visualization Environment) that supports real-time interactive visualization learning. By immediately visualizing intermediate results from algorithm iterations, enables users quickly grasp insights interact output, which then affects subsequent...

10.1609/aaai.v31i1.10628 article EN Proceedings of the AAAI Conference on Artificial Intelligence 2017-02-12

Many measurement systems have been proposed in recent years to shed light on the internal performance of Internet. Their common goal is allow distributed applications improve end-user experience. A hurdle they face need deploy yet another infrastructure. In this work, we demonstrate that without any new infrastructure or active probing obtain composite estimates from AS-by-AS segments and are as good (or even better than) those existing estimation methodologies use on-demand, customized...

10.1109/infcom.2010.5462243 article EN 2010-03-01

In this article, we present an interactive visual information retrieval and recommendation system, called VisIRR, for large-scale document discovery. VisIRR effectively combines the paradigms of (1) a passive pull through query processes (2) active push that recommends items potential interest to users based on their preferences. Equipped with efficient dynamic interface against corpus, organizes retrieved documents into high-level topics visualizes them in 2D space, representing...

10.1145/3070616 article EN ACM Transactions on Knowledge Discovery from Data 2018-01-31

A main bottleneck in integrating computational methods with visual analytics is their significant cost, which hinders real-time interactive visualization them. To solve this, we present PIVE (Per-Iteration Visualization Environment), visualizes intermediate results from algorithm iterations, thus allowing users to efficiently perform multiple interactions real time.

10.1109/vast.2014.7042510 article EN 2014-10-01

A new program disturbance phenomenon appeared from sub 40nm-node NAND flash cell is presented firstly which named as BTBT Leakage Burst by Channel Coupling (abbr. "Channel Coupling"). With scaling down, the neighboring channel of 0V grabs strongly boosted at program-inhibited active line not to rise up sidewall and simultaneously, its potential Si surface tried be raised help pass voltage. The competition induces sharp bandbending thereby sudden enhancement leakage, resulting in suppressing...

10.1109/imw.2013.6582101 article EN 2013-05-01

With the rapid growth of data centers, minimizing queueing delay at network switches has been one key challenges. In this work, we analyze shortcomings current TCP algorithm when used in center networks, and propose to use latency-based congestion detection rate-based transfer achieve ultra-low centers.

10.1145/2377677.2377706 article EN ACM SIGCOMM Computer Communication Review 2012-08-13

A new string structure, having a cell-type select transistor line (CT-SSL) is proposed for NAND flash memories beyond 20nm node device. The boosted potentials at program-inhibited active were measured with the CT-SSL and compared potential conventional SSL 4Xnm, 2Xnm, 1Xnm devices. channel not degraded by drain-induced-barrier-lowering (DIBL) even when using one cell WL as SSL. As-dopant diffused length source/drain N+ implantation (S/D IIP) was simulated to determine minimum required gate...

10.1109/imw.2012.6213657 article EN 2012-05-01

Abstract In blockchain networks, topology discovery is a prerequisite when investigating the network characteristics (e.g., performance and robustness), which can provide deeper comprehension of behavior nodes dynamicity. this paper, we conduct longitudinal study on Bitcoin by collecting snapshots from 2018 to 2022 with Node‐Probe, our technique that uses recursive scanning find all reachable in network. Using have collected 5‐week‐long (36‐day‐long snapshots) main analyzed properties,...

10.1002/nem.2230 article EN International Journal of Network Management 2023-04-24
Coming Soon ...