Beongjun Choi

ORCID: 0000-0002-7597-3398
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Data Storage Technologies
  • Caching and Content Delivery
  • Distributed systems and fault tolerance
  • Cooperative Communication and Network Coding
  • Privacy-Preserving Technologies in Data
  • Stochastic Gradient Optimization Techniques
  • Cryptography and Data Security
  • Distributed and Parallel Computing Systems
  • 3D Shape Modeling and Analysis
  • Advanced Numerical Analysis Techniques
  • Advanced Surface Polishing Techniques
  • Scheduling and Optimization Algorithms
  • Manufacturing Process and Optimization
  • Digital Transformation in Industry
  • Collaboration in agile enterprises
  • Induction Heating and Inverter Technology
  • Age of Information Optimization
  • Advanced DC-DC Converters
  • Computer Graphics and Visualization Techniques
  • Advanced Power Amplifier Design
  • Computational Geometry and Mesh Generation

Electronics and Telecommunications Research Institute
2023

Korea Advanced Institute of Science and Technology
2000-2020

Daejeon Institute of Science and Technology
2017

10.1016/s0010-4485(99)00080-9 article EN Computer-Aided Design 2000-01-01

A new system model reflecting the clustered structure of distributed storage is suggested to investigate interplay between overhead and repair bandwidth as node failures occur. Large data centers with multiple racks/disks or local networks devices (e.g., sensor network) are good applications model. In realistic scenarios involving structures, repairing nodes using intact residing in other clusters more consuming than restoring based on information from intra-cluster nodes. Therefore, it...

10.1109/tit.2018.2837860 article EN IEEE Transactions on Information Theory 2018-05-17

We suggest a general framework for network-coded Practical Byzantine Fault Tolerant (PBFT) consensus enabling agreement among distributed nodes under attacks. The suggested protocol generalizes existing replication and sharding schemes which are frequently used in current blockchain systems. Using the proposed algorithm, it is possible to reach when available bandwidth considerably smaller on individual links compared that required conventional schemes. It shown there exists an upper bound...

10.1109/isit.2019.8849573 article EN 2022 IEEE International Symposium on Information Theory (ISIT) 2019-07-01

Recent advances in large-scale distributed learning algorithms have enabled communication-efficient training via SignSGD. Unfortunately, a major issue continues to plague learning: namely, Byzantine failures may incur serious degradation accuracy. This paper proposes Election Coding, coding-theoretic framework guarantee Byzantine-robustness for SignSGD with Majority Vote, which uses minimum worker-master communication both directions. The suggested explores new information-theoretic limits...

10.48550/arxiv.1910.06093 preprint EN other-oa arXiv (Cornell University) 2019-01-01

Clustered distributed storage models real data centers where intra- and cross-cluster repair bandwidths are different. In this paper, exact-repair minimum-storage-regenerating (MSR) codes achieving capacity of clustered designed. Focus is given on two cases: <tex xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">$\epsilon=0$</tex> xmlns:xlink="http://www.w3.org/1999/xlink">$\epsilon=1/(n-k)$</tex> ,...

10.1109/isit.2018.8437458 article EN 2022 IEEE International Symposium on Information Theory (ISIT) 2018-06-01

A new system model reflecting the clustered structure of distributed storage is suggested to investigate bandwidth requirements for repairing failed nodes. Large data centers with multiple racks/disks or local networks devices (e.g. sensor network) are good applications cluster-based model. In realistic scenarios involving structures, nodes using intact residing in other clusters more bandwidth-consuming than restoring based on information from intra-cluster Therefore, it important...

10.1109/icc.2017.7997392 article EN 2017-05-01

Triangular mesh is one of the most popular shape representations in computer graphics and CAD/CAM/ CAE area. In this paper we present a memory time efficient topology construction algorithm from triangle soup, which set triangles without connectivity information. The proposed consists following steps: (1) vertex merging, (2) internal edge linking, (3) multi-disk splitting, (4) boundary gap stitching. Typical soup comes form an STL file, work encounters non-manifold cases for various causes,...

10.1109/gmap.2004.1290060 article EN 2004-06-10

This paper considers the security issue of practical distributed storage systems (DSSs) which consist multiple clusters nodes. Noticing that actual nodes constituting a DSS are in clusters, two novel eavesdropper models - node-restricted model and cluster-restricted suggested reflect clustered nature DSSs. In model, an cannot access individual nodes, but can eavesdrop incoming/outgoing data for L <sub xmlns:mml="http://www.w3.org/1998/Math/MathML"...

10.1109/icc.2017.7997110 article EN 2017-05-01

This paper investigates interplay among storage overhead, bandwidth requirement, and security constraint in distributed storage. In the model used our analysis, nodes are dispersed multiple clusters. When a node fails, necessary content gets restored by downloading data from different that may possibly be other The required for transferring repair is assumed more scarce cluster-to-cluster links than connecting intra-cluster nodes. Eavesdropping takes place on across clusters only, fraction...

10.1109/tit.2019.2924895 article EN IEEE Transactions on Information Theory 2019-06-25

A 300mW single-chip CMOS class-D audio power amplifier employing new control methods is proposed. high frequency modulator that suitable for portable applications adopted in this amplifier. Zero voltage switching (ZVS) and adaptive (APC) are used to minimize the loss. The chip implemented using a standard 0.35μm process, test results shown.

10.1109/pesc.2006.1711756 article EN 2006-06-01

This paper considers capacity-achieving coding for the clustered form of distributed storage that reflects practical networks. To reflect structure with limited cross-cluster communication bandwidths, nodes in same cluster are set to communicate $\beta_I$ symbols, while other clusters can $\beta_c \leq \beta_I$ symbols one another. We provide two types exact regenerating codes which achieve capacity storage: minimum-bandwidth-regenerating (MBR) and minimum-storage-regenerating (MSR) codes....

10.48550/arxiv.1801.02287 preprint EN other-oa arXiv (Cornell University) 2018-01-01

A new system model reflecting the clustered structure of distributed storage is suggested to investigate bandwidth requirements for repairing failed nodes. Large data centers with multiple racks/disks or local networks devices (e.g. sensor network) are good applications model. In realistic scenarios involving structures, nodes using intact residing in other clusters more bandwidth-consuming than restoring based on information from intra-cluster Therefore, it important differentiate between...

10.48550/arxiv.1610.04498 preprint EN other-oa arXiv (Cornell University) 2016-01-01

The data movement in large-scale computing facilities (from compute nodes to nodes) is categorized as one of the major contributors high cost and energy utilization. To tackle it, in-storage processing (ISP) within storage devices, such Solid-State Drives (SSDs), has been explored actively. introduction computational drives (CSDs) enabled ISP same form factor regular SSDs made it easy replace traditional nodes. With CSDs, host systems can offload various operations search, filter, count....

10.48550/arxiv.2306.04323 preprint EN cc-by-nc-nd arXiv (Cornell University) 2023-01-01

The data movement in large-scale computing facilities (from compute nodes to nodes) is categorized as one of the major contributors high cost and energy utilization. To tackle it, in-storage processing (ISP) within storage devices, such Solid-State Drives (SSDs), has been explored actively. introduction computational drives (CSDs) enabled ISP same form factor regular SSDs made it easy replace traditional nodes. With CSDs, host systems can offload various operations search, filter, count....

10.1145/3623677 article EN ACM Transactions on Embedded Computing Systems 2023-09-14

A new system model reflecting the clustered structure of distributed storage is suggested to investigate interplay between overhead and repair bandwidth as node failures occur. Large data centers with multiple racks/disks or local networks devices (e.g. sensor network) are good applications model. In realistic scenarios involving structures, repairing nodes using intact residing in other clusters more bandwidth-consuming than restoring based on information from intra-cluster nodes....

10.48550/arxiv.1710.02821 preprint EN other-oa arXiv (Cornell University) 2017-01-01

This paper considers the security issue of practical distributed storage systems (DSSs) which consist multiple clusters nodes. Noticing that actual nodes constituting a DSS are in clusters, two novel eavesdropper models - node-restricted model and cluster-restricted suggested reflect clustered nature DSSs. In model, an cannot access individual nodes, but can eavesdrop incoming/outgoing data for $L_c$ compromised clusters. total $l$ number accessible is limited to $L_c$. We provide upper...

10.48550/arxiv.1702.07498 preprint EN other-oa arXiv (Cornell University) 2017-01-01

Clustered distributed storage models real data centers where intra- and cross-cluster repair bandwidths are different. In this paper, exact-repair minimum-storage-regenerating (MSR) codes achieving capacity of clustered designed. Focus is given on two cases: $\epsilon=0$ $\epsilon=1/(n-k)$, $\epsilon$ the ratio available cross- intra-cluster bandwidths, $n$ total number nodes $k$ contact in retrieval. The former represents scenario communication not allowed, while latter corresponds to case...

10.48550/arxiv.1801.02014 preprint EN other-oa arXiv (Cornell University) 2018-01-01

Federated learning has been spotlighted as a way to train neural networks using distributed data with no need for individual nodes share data. Unfortunately, it also shown that adversaries may be able extract local contents off model parameters transmitted during federated learning. A recent solution based on the secure aggregation primitive enabled privacy-preserving learning, but at expense of significant extra communication/computational resources. In this paper, we propose low-complexity...

10.48550/arxiv.2012.05433 preprint EN other-oa arXiv (Cornell University) 2020-01-01
Coming Soon ...