- Advanced Data Storage Technologies
- Caching and Content Delivery
- Distributed systems and fault tolerance
- Cooperative Communication and Network Coding
- Privacy-Preserving Technologies in Data
- Stochastic Gradient Optimization Techniques
- Cryptography and Data Security
- Distributed and Parallel Computing Systems
- 3D Shape Modeling and Analysis
- Advanced Numerical Analysis Techniques
- Advanced Surface Polishing Techniques
- Scheduling and Optimization Algorithms
- Manufacturing Process and Optimization
- Digital Transformation in Industry
- Collaboration in agile enterprises
- Induction Heating and Inverter Technology
- Age of Information Optimization
- Advanced DC-DC Converters
- Computer Graphics and Visualization Techniques
- Advanced Power Amplifier Design
- Computational Geometry and Mesh Generation
Electronics and Telecommunications Research Institute
2023
Korea Advanced Institute of Science and Technology
2000-2020
Daejeon Institute of Science and Technology
2017
A new system model reflecting the clustered structure of distributed storage is suggested to investigate interplay between overhead and repair bandwidth as node failures occur. Large data centers with multiple racks/disks or local networks devices (e.g., sensor network) are good applications model. In realistic scenarios involving structures, repairing nodes using intact residing in other clusters more consuming than restoring based on information from intra-cluster nodes. Therefore, it...
We suggest a general framework for network-coded Practical Byzantine Fault Tolerant (PBFT) consensus enabling agreement among distributed nodes under attacks. The suggested protocol generalizes existing replication and sharding schemes which are frequently used in current blockchain systems. Using the proposed algorithm, it is possible to reach when available bandwidth considerably smaller on individual links compared that required conventional schemes. It shown there exists an upper bound...
Recent advances in large-scale distributed learning algorithms have enabled communication-efficient training via SignSGD. Unfortunately, a major issue continues to plague learning: namely, Byzantine failures may incur serious degradation accuracy. This paper proposes Election Coding, coding-theoretic framework guarantee Byzantine-robustness for SignSGD with Majority Vote, which uses minimum worker-master communication both directions. The suggested explores new information-theoretic limits...
Clustered distributed storage models real data centers where intra- and cross-cluster repair bandwidths are different. In this paper, exact-repair minimum-storage-regenerating (MSR) codes achieving capacity of clustered designed. Focus is given on two cases: <tex xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">$\epsilon=0$</tex> xmlns:xlink="http://www.w3.org/1999/xlink">$\epsilon=1/(n-k)$</tex> ,...
A new system model reflecting the clustered structure of distributed storage is suggested to investigate bandwidth requirements for repairing failed nodes. Large data centers with multiple racks/disks or local networks devices (e.g. sensor network) are good applications cluster-based model. In realistic scenarios involving structures, nodes using intact residing in other clusters more bandwidth-consuming than restoring based on information from intra-cluster Therefore, it important...
Triangular mesh is one of the most popular shape representations in computer graphics and CAD/CAM/ CAE area. In this paper we present a memory time efficient topology construction algorithm from triangle soup, which set triangles without connectivity information. The proposed consists following steps: (1) vertex merging, (2) internal edge linking, (3) multi-disk splitting, (4) boundary gap stitching. Typical soup comes form an STL file, work encounters non-manifold cases for various causes,...
This paper considers the security issue of practical distributed storage systems (DSSs) which consist multiple clusters nodes. Noticing that actual nodes constituting a DSS are in clusters, two novel eavesdropper models - node-restricted model and cluster-restricted suggested reflect clustered nature DSSs. In model, an cannot access individual nodes, but can eavesdrop incoming/outgoing data for L <sub xmlns:mml="http://www.w3.org/1998/Math/MathML"...
This paper investigates interplay among storage overhead, bandwidth requirement, and security constraint in distributed storage. In the model used our analysis, nodes are dispersed multiple clusters. When a node fails, necessary content gets restored by downloading data from different that may possibly be other The required for transferring repair is assumed more scarce cluster-to-cluster links than connecting intra-cluster nodes. Eavesdropping takes place on across clusters only, fraction...
A 300mW single-chip CMOS class-D audio power amplifier employing new control methods is proposed. high frequency modulator that suitable for portable applications adopted in this amplifier. Zero voltage switching (ZVS) and adaptive (APC) are used to minimize the loss. The chip implemented using a standard 0.35μm process, test results shown.
This paper considers capacity-achieving coding for the clustered form of distributed storage that reflects practical networks. To reflect structure with limited cross-cluster communication bandwidths, nodes in same cluster are set to communicate $\beta_I$ symbols, while other clusters can $\beta_c \leq \beta_I$ symbols one another. We provide two types exact regenerating codes which achieve capacity storage: minimum-bandwidth-regenerating (MBR) and minimum-storage-regenerating (MSR) codes....
A new system model reflecting the clustered structure of distributed storage is suggested to investigate bandwidth requirements for repairing failed nodes. Large data centers with multiple racks/disks or local networks devices (e.g. sensor network) are good applications model. In realistic scenarios involving structures, nodes using intact residing in other clusters more bandwidth-consuming than restoring based on information from intra-cluster Therefore, it important differentiate between...
The data movement in large-scale computing facilities (from compute nodes to nodes) is categorized as one of the major contributors high cost and energy utilization. To tackle it, in-storage processing (ISP) within storage devices, such Solid-State Drives (SSDs), has been explored actively. introduction computational drives (CSDs) enabled ISP same form factor regular SSDs made it easy replace traditional nodes. With CSDs, host systems can offload various operations search, filter, count....
The data movement in large-scale computing facilities (from compute nodes to nodes) is categorized as one of the major contributors high cost and energy utilization. To tackle it, in-storage processing (ISP) within storage devices, such Solid-State Drives (SSDs), has been explored actively. introduction computational drives (CSDs) enabled ISP same form factor regular SSDs made it easy replace traditional nodes. With CSDs, host systems can offload various operations search, filter, count....
A new system model reflecting the clustered structure of distributed storage is suggested to investigate interplay between overhead and repair bandwidth as node failures occur. Large data centers with multiple racks/disks or local networks devices (e.g. sensor network) are good applications model. In realistic scenarios involving structures, repairing nodes using intact residing in other clusters more bandwidth-consuming than restoring based on information from intra-cluster nodes....
This paper considers the security issue of practical distributed storage systems (DSSs) which consist multiple clusters nodes. Noticing that actual nodes constituting a DSS are in clusters, two novel eavesdropper models - node-restricted model and cluster-restricted suggested reflect clustered nature DSSs. In model, an cannot access individual nodes, but can eavesdrop incoming/outgoing data for $L_c$ compromised clusters. total $l$ number accessible is limited to $L_c$. We provide upper...
Clustered distributed storage models real data centers where intra- and cross-cluster repair bandwidths are different. In this paper, exact-repair minimum-storage-regenerating (MSR) codes achieving capacity of clustered designed. Focus is given on two cases: $\epsilon=0$ $\epsilon=1/(n-k)$, $\epsilon$ the ratio available cross- intra-cluster bandwidths, $n$ total number nodes $k$ contact in retrieval. The former represents scenario communication not allowed, while latter corresponds to case...
Federated learning has been spotlighted as a way to train neural networks using distributed data with no need for individual nodes share data. Unfortunately, it also shown that adversaries may be able extract local contents off model parameters transmitted during federated learning. A recent solution based on the secure aggregation primitive enabled privacy-preserving learning, but at expense of significant extra communication/computational resources. In this paper, we propose low-complexity...