Follow
Jong Kim
Jong Kim
Professor of Computer Science, POSTECH
Verified email at postech.ac.kr - Homepage
Title
Cited by
Cited by
Year
Power aware scheduling of bag-of-tasks applications with deadline constraints on DVS-enabled clusters
KH Kim, R Buyya, J Kim
Seventh IEEE International Symposium on Cluster Computing and the Grid …, 2007
4372007
Spam filtering in twitter using sender-receiver relationship
J Song, S Lee, J Kim
International workshop on recent advances in intrusion detection, 301-317, 2011
2962011
WARNINGBIRD: Detecting Suspicious URLs in Twitter Stream
S Lee, J Kim
NDSS, 2012
2482012
Warningbird: A near real-time detection system for suspicious urls in twitter stream
S Lee, J Kim
IEEE transactions on dependable and secure computing 10 (3), 183-195, 2013
2172013
Hypercube communication delay with wormhole routing
J Kim, CR Das
IEEE Transactions on Computers 43 (7), 806-814, 1994
1621994
Protecting location privacy using location semantics
B Lee, J Oh, H Yu, J Kim
Proceedings of the 17th ACM SIGKDD international conference on Knowledge …, 2011
1402011
A top-down processor allocation scheme for hypercube computers
J Kim, CR Das, W Lin
IEEE Transactions on Parallel & Distributed Systems 2 (01), 20-30, 1991
1311991
Stealing Webpages rendered on your browser by exploiting GPU vulnerabilities
S Lee, Y Kim, J Kim, J Kim
IEEE Symposium on Security and Privacy, 2014
1092014
Early filtering of ephemeral malicious accounts on Twitter
S Lee, J Kim
Computer Communications 54 (1), 48-57, 2014
892014
Crowdtarget: Target-based detection of crowdturfing in online social networks
J Song, S Lee, J Kim
Proceedings of the 22nd ACM SIGSAC conference on computer and communications …, 2015
722015
A real-time communication method for wormhole switching networks
B Kim, J Kim, S Hong, S Lee
Proceedings. 1998 International Conference on Parallel Processing (Cat. No …, 1998
711998
Reducing IPTV channel zapping time based on viewer’s surfing behavior and preference
Y Kim, JK Park, HJ Choi, S Lee, H Park, J Kim, Z Lee, K Ko
2008 IEEE International Symposium on Broadband Multimedia Systems and …, 2008
662008
Probabilistic checkpointing
H Nam, J Kim, SJ Hong, S Lee
IEICE TRANSACTIONS on Information and Systems 85 (7), 1093-1104, 2002
66*2002
Design of a built-in current sensor for I/sub DDQ/testing
JB Kim, SJ Hong, J Kim
IEEE Journal of Solid-State Circuits 33 (8), 1266-1272, 1998
601998
Reliability evaluation of hypercube multicomputers
J Kim, CR Das, W Lin, TY Feng
IEEE Transactions on Reliability 38 (1), 121-129, 1989
601989
Detecting and identifying faulty IoT devices in smart home with context extraction
J Choi, H Jeoung, J Kim, Y Ko, W Jung, H Kim, J Kim
2018 48th Annual IEEE/IFIP International Conference on Dependable Systems …, 2018
562018
Processor allocation scheme for hypercube computers
J Kim, CR Das, W Lin
Proceedings of the International Conference on Parallel Processing 2, 231-238, 1989
531989
On-line scheduling of scalable real-time tasks on multiprocessor systems
WY Lee, SJ Hong, J Kim
Journal of Parallel and Distributed Computing 63 (12), 1315-1324, 2003
512003
Deadlock-free fault-tolerant routing in injured hypercubes
J Kim, KG Shin
IEEE transactions on computers 42 (9), 1078-1088, 1993
501993
FACT: Functionality-centric Access Control System for IoT Programming Frameworks
S Lee, J Choi, J Kim, B Cho, S Lee, H Kim, J Kim
SACMAT 2017, 43-54, 2017
482017
The system can't perform the operation now. Try again later.
Articles 1–20