This page has only limited features, please log in for full access.

Unclaimed
Im Y. Jung
School of Electronics Engineering, Kyungpook National University, Daehakro 80, Bukgu, 41566, Daegu, South Korea

Basic Info

Basic Info is private.

Honors and Awards

The user has no records in this section


Career Timeline

The user has no records in this section.


Short Biography

The user biography is not available.
Following
Followers
Co Authors
The list of users this user is following is empty.
Following: 0 users

Feed

Journal article
Published: 26 August 2020 in Human-centric Computing and Information Sciences
Reads 0
Downloads 0

Today, many people use dashcams, and videos recorded on dashcams are often used as evidence of accident fault. People can upload videos of dashcam recordings with specific accident clips and share the videos with others who request them, by providing the time or location of an accident. However, dashcam videos are erased when the dashcam memory is full, so periodic backup is necessary for video sharing. It is inconvenient for dashcam owners to search for and transmit a requested video clip from backup videos. In addition, anonymity is not ensured, which may reduce location privacy by exposing the video owner’s location. To solve this problem, we propose a video sharing scheme with accident detection using deep learning coupled with automatic transfer to the cloud; we also propose ensuring data and operational integrity along with location privacy by using blockchain smart contracts. Furthermore, our proposed system uses proxy re-encryption to enhance the confidentiality of a shared video. Our experiments show that our proposed automatic video sharing system is cost-effective enough to be acceptable for deployment.

ACS Style

TaeHyoung Kim; Im Y. Jung; Yih-Chun Hu. Automatic, location-privacy preserving dashcam video sharing using blockchain and deep learning. Human-centric Computing and Information Sciences 2020, 10, 1 -23.

AMA Style

TaeHyoung Kim, Im Y. Jung, Yih-Chun Hu. Automatic, location-privacy preserving dashcam video sharing using blockchain and deep learning. Human-centric Computing and Information Sciences. 2020; 10 (1):1-23.

Chicago/Turabian Style

TaeHyoung Kim; Im Y. Jung; Yih-Chun Hu. 2020. "Automatic, location-privacy preserving dashcam video sharing using blockchain and deep learning." Human-centric Computing and Information Sciences 10, no. 1: 1-23.

Review
Published: 01 January 2020 in International Journal on Smart Sensing and Intelligent Systems
Reads 0
Downloads 0
ACS Style

Im Y. Jung. A review of privacy-preserving human and human activity recognition. International Journal on Smart Sensing and Intelligent Systems 2020, 13, 1 -13.

AMA Style

Im Y. Jung. A review of privacy-preserving human and human activity recognition. International Journal on Smart Sensing and Intelligent Systems. 2020; 13 (1):1-13.

Chicago/Turabian Style

Im Y. Jung. 2020. "A review of privacy-preserving human and human activity recognition." International Journal on Smart Sensing and Intelligent Systems 13, no. 1: 1-13.

Journal article
Published: 01 July 2018 in Applied Soft Computing
Reads 0
Downloads 0
ACS Style

Jaejin Jang; Im.Y Jung; Jong Hyuk Park. An effective handling of secure data stream in IoT. Applied Soft Computing 2018, 68, 811 -820.

AMA Style

Jaejin Jang, Im.Y Jung, Jong Hyuk Park. An effective handling of secure data stream in IoT. Applied Soft Computing. 2018; 68 ():811-820.

Chicago/Turabian Style

Jaejin Jang; Im.Y Jung; Jong Hyuk Park. 2018. "An effective handling of secure data stream in IoT." Applied Soft Computing 68, no. : 811-820.

Journal article
Published: 22 April 2018 in Sustainability
Reads 0
Downloads 0

Android applications store large amounts of sensitive information that may be exposed and exploited. To prevent this security risk, some applications such as Syrup and KakaoTalk use physical device values to authenticate or encrypt application data. However, by manipulating these physical device values, an attacker can circumvent the authentication by executing a Same Identifier Attack and obtain the same application privileges as the user. In our work, WhatsApp, KakaoTalk, Facebook, Amazon, and Syrup were subjected to the Same Identifier Attack, and it was found that an attacker could gain the same privileges as the user, in all five applications. To solve such a problem, we propose a technical scheme—User Authentication using Peripheral Devices. We applied the proposed scheme to a Nexus 5X smartphone running Android version 7.1 and confirmed that the average execution time was 0.005 s, which does not affect the other applications’ execution significantly. We also describe the security aspects of the proposed scheme and its compatibility with the Android platform and other applications. The proposed scheme is practical and efficient in terms of resource usage; therefore, it will be useful for Android users to improve Android application security.

ACS Style

Jinseong Kim; Im Y. Jung. Efficient Protection of Android Applications through User Authentication Using Peripheral Devices. Sustainability 2018, 10, 1290 .

AMA Style

Jinseong Kim, Im Y. Jung. Efficient Protection of Android Applications through User Authentication Using Peripheral Devices. Sustainability. 2018; 10 (4):1290.

Chicago/Turabian Style

Jinseong Kim; Im Y. Jung. 2018. "Efficient Protection of Android Applications through User Authentication Using Peripheral Devices." Sustainability 10, no. 4: 1290.

Journal article
Published: 08 March 2018 in Computers & Electrical Engineering
Reads 0
Downloads 0

The era of the Internet of Things (IoT) has arrived and much information is transmitted through various small IoT devices. Public key cryptography can be used in the present internet environment to avoid eavesdropping. The well-known public key cryptography, Rivest–Shamir–Adleman cryptography and Elliptic Curve Cryptography are apt to be broken when quantum computing is introduced. Therefore, lattice-based cryptography has been proposed as a new public key cryptography to replace them. The Ring-LWE scheme has been proposed to implement lattice-based cryptography. To apply the scheme to IoT devices using 8-bit, 32-bit, or 64-bit microcontrollers, optimization is inevitable. Further, the 8-bit environment is more important for small IoT devices. However, Ring-LWE may be vulnerable to side-channel attacks. This paper analyzes the attack scenario and tenders a countermeasure through bit checking for IoT applications using 8-bit microcontrollers.

ACS Style

Jaegeun Moon; Im Y. Jung; Jong Hyuk Park. IoT application protection against power analysis attack. Computers & Electrical Engineering 2018, 67, 566 -578.

AMA Style

Jaegeun Moon, Im Y. Jung, Jong Hyuk Park. IoT application protection against power analysis attack. Computers & Electrical Engineering. 2018; 67 ():566-578.

Chicago/Turabian Style

Jaegeun Moon; Im Y. Jung; Jong Hyuk Park. 2018. "IoT application protection against power analysis attack." Computers & Electrical Engineering 67, no. : 566-578.

Conference paper
Published: 20 December 2017 in Lecture Notes in Electrical Engineering
Reads 0
Downloads 0

Many Android applications store sensitive information such as account information, debit/credit card details. The exposed information can be accessed by attackers. They can pretend to be the data owners in cyber space with a duplicate of the information. In this study, we propose a new framework to protect Android applications against the data duplication attack. The proposed framework is practical because it can be applied to all of Android applications and has an inconsiderable overhead contributing to security of Android.

ACS Style

Jinseong Kim; Im Y. Jung. Private Data Protection of Android Application. Lecture Notes in Electrical Engineering 2017, 1470 -1475.

AMA Style

Jinseong Kim, Im Y. Jung. Private Data Protection of Android Application. Lecture Notes in Electrical Engineering. 2017; ():1470-1475.

Chicago/Turabian Style

Jinseong Kim; Im Y. Jung. 2017. "Private Data Protection of Android Application." Lecture Notes in Electrical Engineering , no. : 1470-1475.

Journal article
Published: 01 October 2017 in Advanced Science Letters
Reads 0
Downloads 0

Many devices use various Wireless Personal Area Networks (WPANs), and unauthorized users try to disguise as authorized users. To protect against such threats, each WPANs have their own authentication process. Authentication processes can be divided into entity authentication and messageauthentication. Entity authentication is a counterpart to claim someone and prove that. Message authentication is a process to check the integrity of a message. This paper focuses on Bluetooth, Zigbee and Wi-fi among WPANs, which also have authentication processes. This paper examines eachauthentication protocol in Bluetooth, Zigbee and Wi-fi.

ACS Style

Jaegeun Moon; Im Y Jung. Authentication for Wireless Personal Area Network. Advanced Science Letters 2017, 23, 9713 -9717.

AMA Style

Jaegeun Moon, Im Y Jung. Authentication for Wireless Personal Area Network. Advanced Science Letters. 2017; 23 (10):9713-9717.

Chicago/Turabian Style

Jaegeun Moon; Im Y Jung. 2017. "Authentication for Wireless Personal Area Network." Advanced Science Letters 23, no. 10: 9713-9717.

Conference paper
Published: 01 July 2017 in 2017 IEEE International Conference on Intelligence and Security Informatics (ISI)
Reads 0
Downloads 0

Android app is often used at multiple devices of one user. Sometimes, an app recognizes another device to be the same device which it has known, and bypasses its authentication process. As a result, an attacker can get the same privilege as the original device owner has for the app. In this paper, we show how to get the privilege of the device owner in Android app and how to defend against the attack by Same Identifier Attack Defensor.

ACS Style

Jinseong Kim; Im Y. Jung. Android app protection using same identifier attack defensor. 2017 IEEE International Conference on Intelligence and Security Informatics (ISI) 2017, 201 -201.

AMA Style

Jinseong Kim, Im Y. Jung. Android app protection using same identifier attack defensor. 2017 IEEE International Conference on Intelligence and Security Informatics (ISI). 2017; ():201-201.

Chicago/Turabian Style

Jinseong Kim; Im Y. Jung. 2017. "Android app protection using same identifier attack defensor." 2017 IEEE International Conference on Intelligence and Security Informatics (ISI) , no. : 201-201.

Journal article
Published: 02 April 2017 in Sensors
Reads 0
Downloads 0

Various wireless technologies, such as RF, Bluetooth, and Zigbee, have been applied to sensor communications. However, the applications of Bluetooth-based wireless sensor networks (WSN) have a security issue. In one pairing process during Bluetooth communication, which is known as simple secure pairing (SSP), the devices are required to specify I/O capability or user interference to prevent man-in-the-middle (MITM) attacks. This study proposes an enhanced SSP in which a nonce to be transferred is converted to a corresponding signal interval. The quantization level, which is used to interpret physical signal intervals, is renewed at every connection by the transferred nonce and applied to the next nonce exchange so that the same signal intervals can represent different numbers. Even if attackers eavesdrop on the signals, they cannot understand what is being transferred because they cannot determine the quantization level. Furthermore, the proposed model does not require exchanging passkeys as data, and the devices are secure in the case of using a fixed PIN. Subsequently, the new quantization level is calculated automatically whenever the same devices attempt to connect with each other. Therefore, the pairing process can be protected from MITM attacks and be convenient for users.

ACS Style

Jaegeun Moon; Im Y. Jung; Jaesoo Yoo. Security Enhancement of Wireless Sensor Networks Using Signal Intervals. Sensors 2017, 17, 752 .

AMA Style

Jaegeun Moon, Im Y. Jung, Jaesoo Yoo. Security Enhancement of Wireless Sensor Networks Using Signal Intervals. Sensors. 2017; 17 (4):752.

Chicago/Turabian Style

Jaegeun Moon; Im Y. Jung; Jaesoo Yoo. 2017. "Security Enhancement of Wireless Sensor Networks Using Signal Intervals." Sensors 17, no. 4: 752.

Conference paper
Published: 01 November 2016 in 2016 IEEE 2nd International Conference on Collaboration and Internet Computing (CIC)
Reads 0
Downloads 0

Social Safety Guards, which make up the blind spots or situations of social security network, can be designed and implemented using state-of-the-art technology. This paper proposes a type of Social Safety Guards based on Internet of Things, Simple Safety Guard for convenience store. The Simple Safety Guard is easy to apply and adopt, and can lead to quick handling of urgent situations. It can help the people in danger as soon as possible.

ACS Style

Jae-Gun Moon; Jinseong Kim; Im Y. Jung; Su-An Eom. Social Safety Guard Based on Internet of Things. 2016 IEEE 2nd International Conference on Collaboration and Internet Computing (CIC) 2016, 483 -485.

AMA Style

Jae-Gun Moon, Jinseong Kim, Im Y. Jung, Su-An Eom. Social Safety Guard Based on Internet of Things. 2016 IEEE 2nd International Conference on Collaboration and Internet Computing (CIC). 2016; ():483-485.

Chicago/Turabian Style

Jae-Gun Moon; Jinseong Kim; Im Y. Jung; Su-An Eom. 2016. "Social Safety Guard Based on Internet of Things." 2016 IEEE 2nd International Conference on Collaboration and Internet Computing (CIC) , no. : 483-485.

Journal article
Published: 31 August 2016 in Sustainability
Reads 0
Downloads 0

Wireless access points (WAPs) are devices that provide Internet connectivity to devices such as desktops, laptops, smartphones, and tablets. Hence, it is important to provide sufficient availability to devices and security for the traffic that is routed by a WAP. However, attackers can decrease the network bandwidth or obtain the traffic including private data such as search histories, login information, and device usage patterns by exploiting the vulnerabilities in firmware upgrades to install malicious firmware. To address this problem, we propose a sustainable and practical firmware upgrade for a WAP using password-based authentication. The proposed upgrade protocol ensures security by adding freshness to the firmware whenever a firmware upgrade occurs. This freshness is different for each event and each firmware; therefore, even if the freshness of one firmware is exposed, the others are secure. In addition, confidentiality, integrity, and authentication are ensured. Furthermore, the proposed protocol can be easily implemented and adapted to WAPs. Experiments are performed to evaluate the upgrade time, resource usage, and code size in wired and wireless connected environments by implementing a prototype and analyzing the security of the protocol. The results show that the proposed upgrade is secure and practical.

ACS Style

Jaejin Jang; Im Y. Jung. Sustainable and Practical Firmware Upgrade for Wireless Access Point Using Password-Based Authentication. Sustainability 2016, 8, 876 .

AMA Style

Jaejin Jang, Im Y. Jung. Sustainable and Practical Firmware Upgrade for Wireless Access Point Using Password-Based Authentication. Sustainability. 2016; 8 (9):876.

Chicago/Turabian Style

Jaejin Jang; Im Y. Jung. 2016. "Sustainable and Practical Firmware Upgrade for Wireless Access Point Using Password-Based Authentication." Sustainability 8, no. 9: 876.

Book chapter
Published: 30 August 2016 in Lecture Notes in Electrical Engineering
Reads 0
Downloads 0

A technique to communicate with a smart sensor device using the Web is currently being developed. When the user approaches the device, like a beacon, the device sends a URL to the built-in sensor to the user’s smartphone. With this URL, the user can communicate with the smart sensor device through a Web interface. When communicating with a beacon using a Web interface, encryption is required for secure communication between the Web browser and beacon. In this paper, we propose secure communication using a symmetric key distribution. Our method prevents malicious applications from eavesdropping on messages and replaying a message. In addition, we evaluated the execution time.

ACS Style

Jin H. Park; Im Y. Jung; Soon J. Kim. A Secure Communication in Web of Things. Lecture Notes in Electrical Engineering 2016, 197 -202.

AMA Style

Jin H. Park, Im Y. Jung, Soon J. Kim. A Secure Communication in Web of Things. Lecture Notes in Electrical Engineering. 2016; ():197-202.

Chicago/Turabian Style

Jin H. Park; Im Y. Jung; Soon J. Kim. 2016. "A Secure Communication in Web of Things." Lecture Notes in Electrical Engineering , no. : 197-202.

Journal article
Published: 05 February 2016 in Multimedia Tools and Applications
Reads 0
Downloads 0

With the advance of mobile phone cameras and broadband networks, gaining access to digital information and services via logo recognition has become of high industrial interest. The fundamental subsystem for logo recognition must be a logo database, whose images link real-world information to specific corporate entities. However, few attempts have been made to create and update such a logo database, i.e., how to automatically collect the latest logos. Moreover, the few existing methods are limited in their application and unattractive in terms of logo detection accuracy and performance overhead. In this article, we describe a practical system for automatic logo extraction. Websites are an optimal source of a huge number of up-to-date logos, and experts can easily find logos from webpages without rendering. For instance, an expert can locate elements with the term “logo” using the websites’ entity names as attribute values, and then download images connected to them. Our system mimics this human behavior to automate logo extraction. Given a website, it learns its entity name and uses that name to locate elements that lead to the logo. Evaluation tests showed that this contextual reasoning significantly contributes to the performance of the system, which achieved high precision with negligible overhead.

ACS Style

Insoon Jo; Im Y. Jung. Smart learning of logo detection for mobile phone applications. Multimedia Tools and Applications 2016, 75, 13211 -13233.

AMA Style

Insoon Jo, Im Y. Jung. Smart learning of logo detection for mobile phone applications. Multimedia Tools and Applications. 2016; 75 (21):13211-13233.

Chicago/Turabian Style

Insoon Jo; Im Y. Jung. 2016. "Smart learning of logo detection for mobile phone applications." Multimedia Tools and Applications 75, no. 21: 13211-13233.

Journal article
Published: 01 September 2015 in International Journal of Distributed Sensor Networks
Reads 0
Downloads 0

The Internet of Things (IoT) operates solely on local interactions among its components, which include various devices with communications capabilities. Because the IoT is a fully distributed computing network, it is important to mitigate any negative effects resulting from faults occurring in its components and to provide sustainable services. This paper focuses on fault management of IoT services. In particular, it handles a fault management scheme for the self-organizing software platform (SoSp), a platform on which IoT services connected to various IT devices are deployed. The proposed fault management scheme enables SoSp to provide situation aware IoT services without loss of data and state.

ACS Style

Im Y. Jung; Gil-Jin Jang; Jung-Min Yang; Jaesoo Yoo. Design of a Situation Aware Service for Internet of Things. International Journal of Distributed Sensor Networks 2015, 11, 1 .

AMA Style

Im Y. Jung, Gil-Jin Jang, Jung-Min Yang, Jaesoo Yoo. Design of a Situation Aware Service for Internet of Things. International Journal of Distributed Sensor Networks. 2015; 11 (9):1.

Chicago/Turabian Style

Im Y. Jung; Gil-Jin Jang; Jung-Min Yang; Jaesoo Yoo. 2015. "Design of a Situation Aware Service for Internet of Things." International Journal of Distributed Sensor Networks 11, no. 9: 1.

Conference paper
Published: 01 August 2015 in 2015 IEEE 17th International Conference on High Performance Computing and Communications, 2015 IEEE 7th International Symposium on Cyberspace Safety and Security, and 2015 IEEE 12th International Conference on Embedded Software and Systems
Reads 0
Downloads 0

Many users do not realize whether their devices become bots or not. There are many security accidents due to malicious bots. To solve this problem, we propose a monitor system composed of IoT devices to detect bots.

ACS Style

Jae-Geun Moon; Jae J. Jang; Im Y. Jung. Bot Detection via IoT Environment. 2015 IEEE 17th International Conference on High Performance Computing and Communications, 2015 IEEE 7th International Symposium on Cyberspace Safety and Security, and 2015 IEEE 12th International Conference on Embedded Software and Systems 2015, 1691 -1692.

AMA Style

Jae-Geun Moon, Jae J. Jang, Im Y. Jung. Bot Detection via IoT Environment. 2015 IEEE 17th International Conference on High Performance Computing and Communications, 2015 IEEE 7th International Symposium on Cyberspace Safety and Security, and 2015 IEEE 12th International Conference on Embedded Software and Systems. 2015; ():1691-1692.

Chicago/Turabian Style

Jae-Geun Moon; Jae J. Jang; Im Y. Jung. 2015. "Bot Detection via IoT Environment." 2015 IEEE 17th International Conference on High Performance Computing and Communications, 2015 IEEE 7th International Symposium on Cyberspace Safety and Security, and 2015 IEEE 12th International Conference on Embedded Software and Systems , no. : 1691-1692.

Conference paper
Published: 01 July 2015 in 2015 IEEE Conference on Technologies for Sustainability (SusTech)
Reads 0
Downloads 0

This paper proposes a check and alert service based on IoT as personal guard. This personal service can prevent people in trouble because of the omitted things or the skipped tasks unconsciously. Further, it can avoid the probable risks caused by the missed tasks or the omitted things. In addition, we present a security model for personal services based on Bluetooth 4.2 supporting IPSP (Internet Protocol Support Profile). The prototype implemented shows small overhead.

ACS Style

Jae J. Jang; Jinseong Kim; Im Y. Jung. A check and alert service based on IoT. 2015 IEEE Conference on Technologies for Sustainability (SusTech) 2015, 113 -116.

AMA Style

Jae J. Jang, Jinseong Kim, Im Y. Jung. A check and alert service based on IoT. 2015 IEEE Conference on Technologies for Sustainability (SusTech). 2015; ():113-116.

Chicago/Turabian Style

Jae J. Jang; Jinseong Kim; Im Y. Jung. 2015. "A check and alert service based on IoT." 2015 IEEE Conference on Technologies for Sustainability (SusTech) , no. : 113-116.

Journal article
Published: 01 January 2015 in Indian Journal of Science and Technology
Reads 0
Downloads 0

Among primary asynchronous sequential circuits, ring counters are used as an important building block in various spaceborne digital systems. As they are subject to adverse effects of radiation, it is imperative that they be given fault tolerance mechanism for robust operation. This paper presents a corrective control scheme for tolerating state transition faults in ring counters. The considered ring counter has the structure of Double Modular Redundancy (DMR), in which some selected memory bits of each ring counter module can override the counterpart values of the other module. With this structure, we can design a static corrective controller that tolerates any state transition fault occurring to the dual ring counter. Though the state information is unavailable, we can implement a simple fault tolerant control scheme using corrective control. The proposed control scheme is validated in VHDL experiments.

ACS Style

Jung-Min Yang; Im Y. Jung; Seong Woo Kwak. Fault Tolerant Control for Spaceborne Dual Ring Counters with Selective Overriding. Indian Journal of Science and Technology 2015, 8, 1-8 .

AMA Style

Jung-Min Yang, Im Y. Jung, Seong Woo Kwak. Fault Tolerant Control for Spaceborne Dual Ring Counters with Selective Overriding. Indian Journal of Science and Technology. 2015; 8 (S1):1-8.

Chicago/Turabian Style

Jung-Min Yang; Im Y. Jung; Seong Woo Kwak. 2015. "Fault Tolerant Control for Spaceborne Dual Ring Counters with Selective Overriding." Indian Journal of Science and Technology 8, no. S1: 1-8.

Research article
Published: 17 July 2014 in Mathematical Problems in Engineering
Reads 0
Downloads 0

There are several applications connected to IT health devices on the self-organizing software platform (SoSp) that allow patients or elderly users to be cared for remotely by their family doctors under normal circumstances or during emergencies. An evaluation of the SoSp applied through PAAR watch/self-organizing software platform router was conducted targeting a simple user interface for aging users, without the existence of extrasettings based on patient movement. On the other hand, like normal medical records, the access to, and transmission of, health information via PAAR watch/self-organizing software platform requires privacy protection. This paper proposes a security framework for health information management of the SoSp. The proposed framework was designed to ensure easy detection of identification information for typical users. In addition, it provides powerful protection of the user’s health information.

ACS Style

Im Y. Jung; Gil-Jin Jang; Soon-Ju Kang. Secure eHealth-Care Service on Self-Organizing Software Platform. Mathematical Problems in Engineering 2014, 2014, 1 -9.

AMA Style

Im Y. Jung, Gil-Jin Jang, Soon-Ju Kang. Secure eHealth-Care Service on Self-Organizing Software Platform. Mathematical Problems in Engineering. 2014; 2014 ():1-9.

Chicago/Turabian Style

Im Y. Jung; Gil-Jin Jang; Soon-Ju Kang. 2014. "Secure eHealth-Care Service on Self-Organizing Software Platform." Mathematical Problems in Engineering 2014, no. : 1-9.

Journal article
Published: 01 January 2014 in Cluster Computing
Reads 0
Downloads 0

The Electronic Commerce System should provide prompt responses for user requests and continuous services despite partial failures of its sub systems. In addition, scalability and flexibility should be supported as the number of customers increases. Because Electronic Commerce is beyond the national border, the system should be implemented across different subnets for its efficiency and business needs. This paper proposes the design and implementation of a distributed system infrastructure across different subnets for Electronic Commerce. When the Electronic Commerce system is owned and managed by a small enterprise, the cost should be considered as well as fault tolerance, high availability and scalability. The proposed infrastructure was evaluated and discussed in the aspect of economics such as implementation and management cost, performance and overhead.

ACS Style

Im Y. Jung; Wenfeng Cui; Hyeonsang Eom; Heon Y. Yeom. Distributed Electronic Commerce cluster for small enterprise. Cluster Computing 2014, 17, 681 -689.

AMA Style

Im Y. Jung, Wenfeng Cui, Hyeonsang Eom, Heon Y. Yeom. Distributed Electronic Commerce cluster for small enterprise. Cluster Computing. 2014; 17 (3):681-689.

Chicago/Turabian Style

Im Y. Jung; Wenfeng Cui; Hyeonsang Eom; Heon Y. Yeom. 2014. "Distributed Electronic Commerce cluster for small enterprise." Cluster Computing 17, no. 3: 681-689.

Journal article
Published: 29 June 2013 in Journal of Information Processing Systems
Reads 0
Downloads 0
ACS Style

Sehoon Park; Im Y. Jung; Heonsang Eom; Heon Y. Yeom. An Analysis of Replication Enhancement for a High Availability Cluster. Journal of Information Processing Systems 2013, 9, 205 -216.

AMA Style

Sehoon Park, Im Y. Jung, Heonsang Eom, Heon Y. Yeom. An Analysis of Replication Enhancement for a High Availability Cluster. Journal of Information Processing Systems. 2013; 9 (2):205-216.

Chicago/Turabian Style

Sehoon Park; Im Y. Jung; Heonsang Eom; Heon Y. Yeom. 2013. "An Analysis of Replication Enhancement for a High Availability Cluster." Journal of Information Processing Systems 9, no. 2: 205-216.