- Data Visualization and Analytics
- Network Traffic and Congestion Control
- Video Analysis and Summarization
- Caching and Content Delivery
- Image Retrieval and Classification Techniques
- Complex Network Analysis Techniques
- Cloud Computing and Resource Management
- Advanced Data Storage Technologies
- Software-Defined Networks and 5G
- Peer-to-Peer Network Technologies
- Semiconductor materials and devices
- Video Coding and Compression Technologies
- Opinion Dynamics and Social Influence
- Computer Graphics and Visualization Techniques
- Advanced Data Compression Techniques
- Engineering Applied Research
- Social Media and Politics
- Data Management and Algorithms
- Education, Safety, and Science Studies
- Educational Systems and Policies
- Microfinance and Financial Inclusion
- Internet Traffic Analysis and Secure E-voting
- Education and Learning Interventions
- FinTech, Crowdfunding, Digital Finance
- Internet of Things and Social Network Interactions
Electronics and Telecommunications Research Institute
2021-2023
Kyoto University
2022
Jeju National University
2022
SK Group (South Korea)
2019
Google (United States)
2014-2018
Korean Association for Public Security Administration
2016
National Security Research Institute
2016
Applied Radar (United States)
2016
Korea Advanced Institute of Science and Technology
2008-2015
Georgia Institute of Technology
2013-2014
Twitter, a microblogging service less than three years old, commands more 41 million users as of July 2009 and is growing fast. Twitter tweet about any topic within the 140-character limit follow others to receive their tweets. The goal this paper study topological characteristics its power new medium information sharing.
Topic modeling has been widely used for analyzing text document collections. Recently, there have significant advancements in various topic techniques, particularly the form of probabilistic graphical modeling. State-of-the-art techniques such as Latent Dirichlet Allocation (LDA) successfully applied visual analytics. However, most widely-used methods based on drawbacks terms consistency from multiple runs and empirical convergence. Furthermore, due to complicatedness formulation algorithm,...
Twitter offers an explicit mechanism to facilitate information diffusion and has emerged as a new medium for communication. Many approaches find influentials have been proposed, but they do not consider the temporal order of adoption. In this work, we propose novel method by considering both link structure adoption in Twitter. Our finds distinct who are discovered other methods.
Since the advent of datacenter networking, achieving low latency within network has been a primary goal. Many congestion control schemes have proposed in recent years to meet datacenters' unique performance requirement. The nature feedback largely governs behavior control. In networks, where round trip times are hundreds microseconds, accurate is crucial achieve both high utilization and queueing delay. Proposals for predominantly leverage explicit notification (ECN) or even in-network...
A highly manufacturable 32Gb multi-level NAND flash memory with 0.0098 μm <sup xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">2</sup> cell size using 40nm TANOS technologies has been successfully developed for the first time. The main key of are advanced high N.A immersion photolithography off-axis illumination system, blocking oxide cell, and PVD tungsten flowable bit line
Non-profit Micro-finance organizations provide loaning opportunities to eradicate poverty by financially equipping impoverished, yet skilled entrepreneurs who are in desperate need of an institution that lends those have little. Kiva.org, a widely-used crowd-funded micro-financial service, provides researchers with extensive amount publicly available data containing rich set heterogeneous information regarding transactions. Our objective this paper is identify the key factors encourage...
Required system performance for the computing and server, cost power forces DRAM to improve its bandwidth, capacity power. DDR5 SDRAM has been proposed as next memory solution, with various new functions circuit techniques overcome limitation of DDR4. Speed increased 4.4 - 6.4Gb/s from DDR4's 3.2Gb/s. Energy efficiency improved by over 30% using a 1.1V V <sub xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">DD</sub> 1.8V...
We present VisIRR, an interactive visual information retrieval and recommendation system for large-scale document data. Starting with a query, VisIRR visualizes the retrieved documents in scatter plot along their topic summary. Next, based on personalized preference feedback documents, collects potentially relevant out of entire corpus so that integrated analysis both recommended can be performed seamlessly.
Summary Ethereum is arguably the second most popular cryptocurrency‐based network after Bitcoin. Both use distributed ledger technology known as blockchain, which considered secure. However, provided security level proportional to number of connected nodes, influential and supported amount hash power. Thus, knowledge properties nodes' behavior helpful protect from possible attacks such double‐spending attacks, DDoS 51% Sybil attacks. This paper proposes a node discovery mechanism, performs...
An abrupt scene-transition frame is one that hardly correlated with the previous frames. In case, because an intra-coded has less distortion than inter-coded one, almost all macroblocks are encoded in intra mode. This breaks up rate control flow and increases number of bits used. Since reference software for H.264 takes no special action a frame, several studies have been conducted to solve problem using quadratic R-D model. However, since this model more suitable inter frames, they...
With the rapid growth of data centers, minimizing queueing delay at network switches has been one key challenges. In this work, we analyze shortcomings current TCP algorithm when used in center networks, and propose to use latency-based congestion detection rate-based transfer achieve ultra-low centers.
One of the key advantages visual analytics is its capability to leverage both humans's perception and power computing. A big obstacle in integrating machine learning with high computing cost. To tackle this problem, paper presents PIVE (Per-Iteration Visualization Environment) that supports real-time interactive visualization learning. By immediately visualizing intermediate results from algorithm iterations, enables users quickly grasp insights interact output, which then affects subsequent...
Many measurement systems have been proposed in recent years to shed light on the internal performance of Internet. Their common goal is allow distributed applications improve end-user experience. A hurdle they face need deploy yet another infrastructure. In this work, we demonstrate that without any new infrastructure or active probing obtain composite estimates from AS-by-AS segments and are as good (or even better than) those existing estimation methodologies use on-demand, customized...
In this article, we present an interactive visual information retrieval and recommendation system, called VisIRR, for large-scale document discovery. VisIRR effectively combines the paradigms of (1) a passive pull through query processes (2) active push that recommends items potential interest to users based on their preferences. Equipped with efficient dynamic interface against corpus, organizes retrieved documents into high-level topics visualizes them in 2D space, representing...
A main bottleneck in integrating computational methods with visual analytics is their significant cost, which hinders real-time interactive visualization them. To solve this, we present PIVE (Per-Iteration Visualization Environment), visualizes intermediate results from algorithm iterations, thus allowing users to efficiently perform multiple interactions real time.
A new program disturbance phenomenon appeared from sub 40nm-node NAND flash cell is presented firstly which named as BTBT Leakage Burst by Channel Coupling (abbr. "Channel Coupling"). With scaling down, the neighboring channel of 0V grabs strongly boosted at program-inhibited active line not to rise up sidewall and simultaneously, its potential Si surface tried be raised help pass voltage. The competition induces sharp bandbending thereby sudden enhancement leakage, resulting in suppressing...
With the rapid growth of data centers, minimizing queueing delay at network switches has been one key challenges. In this work, we analyze shortcomings current TCP algorithm when used in center networks, and propose to use latency-based congestion detection rate-based transfer achieve ultra-low centers.
A new string structure, having a cell-type select transistor line (CT-SSL) is proposed for NAND flash memories beyond 20nm node device. The boosted potentials at program-inhibited active were measured with the CT-SSL and compared potential conventional SSL 4Xnm, 2Xnm, 1Xnm devices. channel not degraded by drain-induced-barrier-lowering (DIBL) even when using one cell WL as SSL. As-dopant diffused length source/drain N+ implantation (S/D IIP) was simulated to determine minimum required gate...
Abstract In blockchain networks, topology discovery is a prerequisite when investigating the network characteristics (e.g., performance and robustness), which can provide deeper comprehension of behavior nodes dynamicity. this paper, we conduct longitudinal study on Bitcoin by collecting snapshots from 2018 to 2022 with Node‐Probe, our technique that uses recursive scanning find all reachable in network. Using have collected 5‐week‐long (36‐day‐long snapshots) main analyzed properties,...