default search action
Jin Young Choi
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. The links to all actual bibliographies of persons of the same or a similar name can be found below. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Other persons with the same name
- Jin Young Choi 0001 — Digital Communications Infra Division, Samsung Networks, Korea
- Jin Young Choi 0002 — Seoul National University, Automation and Systems Research Institute, Department of Electrical and Computer Engineering, South Korea
- Jin Young Choi 0003 — Ajou University, Department of Industrial Engineering, South Korea
- Jin Young Choi 0004 (aka: Jin-Young Choi 0004) — Dong-A University, Department of of Electronics, Busan, Korea
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j62]Hyunjo Kim, Jae-Ho Choi, Jin-Young Choi:
A Novel Scheme for Generating Context-Aware Images Using Generative Artificial Intelligence. IEEE Access 12: 31576-31588 (2024) - [j61]Young-Mi Kim, Jin-Young Choi, Seunghoon Yoo, Myunghwan Park:
Propagation and Masking Characteristics of Errors During Software Testing in Synchronous Programming. IEEE Access 12: 146009-146021 (2024) - [j60]Hyunjo Kim, Jae-Ho Choi, Jin-Young Choi:
A Novel Scheme for Managing Multiple Context Transitions While Ensuring Consistency in Text-to-Image Generative Artificial Intelligence. IEEE Access 12: 150468-150484 (2024) - [j59]Jin-Young Choi, Eunju Ha, Minji Son, Jean-Hong Jeon, Jong-Wook Kim:
Human Joint Angle Estimation Using Deep Learning-Based Three-Dimensional Human Pose Estimation for Application in a Real Environment. Sensors 24(12): 3823 (2024) - [c71]Jin Young Choi, Dong-Goo Kang, Minhye Chang, Kye Young Jeong, Byung Cheol Song:
NIR to LWIR Image Translation for Generating LWIR Image Datasets. ICEIC 2024: 1-2 - 2023
- [c70]Seongho Yoon, Miyoung Kang, Jin-Young Choi:
Security Attacks Against the Availability of Low Earth Orbit Satellite Networks. ICNCC 2023: 64-69 - 2022
- [c69]Woong-Sub Park, Hyuk Lee, Jin-Young Choi:
Formal Modeling of Smart Contract-based Trading System. ICACT 2022: 48-52 - [c68]Hong Jun Choi, Hyuk Lee, Jin-Young Choi:
Is a False Positive really False Positive? ICACT 2022: 145-149 - 2021
- [j58]Kyoung Yeon Kim, Jin-Young Choi, Song Hee Oh, Hyung-Wook Moon, Seong-hun Kim, Hyo-Won Ahn, Kyung A. Kim, Gerald Nelson:
Computerized Assessment of Occlusion and Muscle Activity during Use of a Multilayer Clear Retainer: A Preliminary Study. Sensors 21(2): 541 (2021) - [j57]Song Hee Oh, Sae Rom Lee, Jin-Young Choi, Yong Suk Choi, Seong-hun Kim, Hong Cheol Yoon, Gerald Nelson:
Detection of Dental Caries and Cracks with Quantitative Light-Induced Fluorescence in Comparison to Radiographic and Visual Examination: A Retrospective Case Study. Sensors 21(5): 1741 (2021) - [j56]Jin-Young Choi, Jaehee Cho, Song Hee Oh, Seong-hun Kim, Kyu-Rhim Chung, Gerald Nelson:
Effect of Different Surface Designs on the Rotational Resistance and Stability of Orthodontic Miniscrews: A Three-Dimensional Finite Element Study. Sensors 21(6): 1964 (2021) - [j55]Jin-Young Choi, Min-Jung Kim, Seong-hun Kim, Kyu-Rhim Chung, Gerald Nelson:
Effect of Different Head Hole Position on the Rotational Resistance and Stability of Orthodontic Miniscrews: A Three-Dimensional Finite Element Study. Sensors 21(11): 3798 (2021) - [j54]Song Hee Oh, Jin-Young Choi, Sae Rom Lee, Seong-hun Kim:
Evaluation of Periodontal Risk Factors with Quantitative Light-Induced Fluorescence Based Fluorescent Plaque Index, in Comparison to Radiographic and Oral Health Habit Scoring: A Retrospective Case Study. Sensors 21(17): 5774 (2021) - [j53]Jae-Hyun Park, Jin-Young Choi, Song Hee Oh, Seong-hun Kim:
Three-Dimensional Digital Superimposition of Orthodontic Bracket Position by Using a Computer-Aided Transfer Jig System: An Accuracy Analysis. Sensors 21(17): 5911 (2021) - [c67]Woong-Sub Park, Hyuk Lee, Jin-Young Choi:
Formal Modeling of Smart Contract-based Trading System. ICACT 2021: 48-52 - [c66]Hong Jun Choi, Hyuk Lee, Jin-Young Choi:
Is a False Positive really False Positive? ICACT 2021: 145-149 - 2020
- [j52]Dong-Won Kim, Jin-Young Choi, Keun-Hee Han:
Medical Device Safety Management Using Cybersecurity Risk Analysis. IEEE Access 8: 115370-115382 (2020) - [j51]Hyuk Lee, Jin-Young Choi:
Constraint-Based Schedulability Analysis in Multiprocessor Real-Time Systems. IEEE Access 8: 165168-165177 (2020) - [j50]Sathishkumar Moorthy, Jin Young Choi, Young Hoon Joo:
Gaussian-response correlation filter for robust visual object tracking. Neurocomputing 411: 78-90 (2020) - [j49]Dong-Won Kim, Jin-Young Choi, Keun-Hee Han:
Risk management-based security evaluation model for telemedicine systems. BMC Medical Informatics Decis. Mak. 20(1): 106 (2020) - [j48]Seunghyun Park, Jin-Young Choi:
Hierarchical Anomaly Detection Model for In-Vehicle Networks Using Machine Learning Algorithms. Sensors 20(14): 3934 (2020) - [c65]Minjae Byun, Yongjun Lee, Jin-Young Choi:
Analysis of software weakness detection of CBMC based on CWE. ICACT 2020: 171-175
2010 – 2019
- 2019
- [c64]Minjae Byun, Yongjun Lee, Jin-Young Choi:
Risk and avoidance strategy for blocking mechanism of SDN-based security service. ICACT 2019: 187-190 - [c63]Miyoung Kang, Jin-Young Choi:
Formal Modeling and Verification of Software-Defined Networking with Multiple Controllers. TRIDENTCOM 2019: 81-94 - 2018
- [j47]Hyuk Lee, Jin-Young Choi:
Constraint Solving Approach to Schedulability Analysis in Real-Time Systems. IEEE Access 6: 58418-58426 (2018) - [j46]Reeseo Cha, Wonhong Nam, Jin-Young Choi:
Reliable Approximated Number System with Exact Bounds and Three-Valued Logic. Comput. Syst. Sci. Eng. 33(6): 447-455 (2018) - [j45]Young-Su Jang, Jin-Young Choi:
Automatic Prevention of Buffer Overflow Vulnerability Using Candidate Code Generation. IEICE Trans. Inf. Syst. 101-D(12): 3005-3018 (2018) - [j44]Jin-Young Choi, In-Sun Choi, Geon-Ho Ahn, Dong-Jun Won:
Advanced Power Sharing Method to Improve the Energy Efficiency of Multiple Battery Energy Storages System. IEEE Trans. Smart Grid 9(2): 1292-1300 (2018) - 2017
- [j43]Joon-Ha Jang, Jin-Young Choi:
Formal Specification and Verification of System of Systems Using UPPAAL: A Case Study of a Defensive Missile Systems. J. Commun. 12(8): 482-488 (2017) - [j42]Junkil Park, Insup Lee, Oleg Sokolsky, Dae-Yon Hwang, So Jin Ahn, Jin-Young Choi, Inhye Kang:
A process algebraic approach to the schedulability analysis and workload abstraction of hierarchical real-time systems. J. Log. Algebraic Methods Program. 92: 1-18 (2017) - [c62]Myoung Jin Nam, Wonhong Nam, Jin-Young Choi, Periklis Akritidis:
MemPatrol: Reliable Sideline Integrity Monitoring for High-Performance Systems. DIMVA 2017: 48-69 - 2016
- [j41]Miyoung Kang, Jin-Young Choi, Inhye Kang, Hee-Hwan Kwak, So Jin Ahn, Myung-Ki Shin:
A Verification Method of SDN Firewall Applications. IEICE Trans. Commun. 99-B(7): 1408-1415 (2016) - [j40]So Jin Ahn, Dae-Yon Hwang, Miyoung Kang, Jin-Young Choi:
Hierarchical System Schedulability Analysis Framework Using UPPAAL. IEICE Trans. Inf. Syst. 99-D(8): 2172-2176 (2016) - [j39]Kyounghoon Kim, Helin Lin, Jin Young Choi, Kiyoung Choi:
A design framework for hierarchical ensemble of multiple feature extractors and multiple classifiers. Pattern Recognit. 52: 1-16 (2016) - [j38]Jin Hyun Kim, Axel Legay, Louis-Marie Traonouez, Abdeldjalil Boudjadar, Ulrik Nyman, Kim G. Larsen, Insup Lee, Jin-Young Choi:
Optimizing the resource requirements of hierarchical scheduling systems. SIGBED Rev. 13(3): 41-48 (2016) - 2015
- [j37]Jinhyun Kim, Inhye Kang, Jin-Young Choi, Insup Lee, Sungwon Kang:
Formal synthesis of application and platform behaviors of embedded software systems. Softw. Syst. Model. 14(2): 839-859 (2015) - [c61]Myung-Ki Shin, Yunchul Choi, Hee-Hwan Kwak, Sangheon Pack, Miyoung Kang, Jin-Young Choi:
Verification for NFV-enabled network services. ICTC 2015: 810-815 - 2014
- [j36]Ki-Seok Bang, Il-Gon Kim, Ji-Yeon Lee, Jin-Young Choi:
Using a Process Algebraic Approach of Verifying Access Control in XML-based Healthcare Systems. J. Res. Pract. Inf. Technol. 46(2-3) (2014) - [j35]Young-Su Jang, Jin-Young Choi:
Detecting SQL injection attacks using query result size. Comput. Secur. 44: 104-118 (2014) - [j34]Youngjung Ahn, Yongsuk Lee, Jin-Young Choi, Gyungho Lee, Dongkyun Ahn:
Monitoring Translation Lookahead Buffers to Detect Code Injection Attacks. Computer 47(7): 66-72 (2014) - [j33]Hong-Seok Choi, In-Su Kim, Jin Young Choi:
Combining histogram-wise and pixel-wise matchings for kernel tracking through constrained optimization. Comput. Vis. Image Underst. 118: 61-70 (2014) - [c60]Sung-Hwan Park, Jin-Young Choi, Dong-Jun Won:
Cooperative control between the distributed energy resources in AC/DC hybrid microgrid. ISGT 2014: 1-5 - [c59]Mijeong Park, Miyoung Kang, Jin-Young Choi:
The Research on Vulnerability Analysis in OpenADR for Smart Grid. DARE 2014: 54-60 - 2013
- [j32]Hyun-seok Min, Sang-Mun Chung, Jin-Young Choi:
Deriving System Behavior from UML State Machine Diagram: Applied to Missile Project. J. Univers. Comput. Sci. 19(1): 53-77 (2013) - [c58]Miyoung Kang, Eun-Young Kang, Dae-Yon Hwang, Beom-Jin Kim, Ki-Hyuk Nam, Myung-Ki Shin, Jin-Young Choi:
Formal Modeling and Verification of SDN-OpenFlow. ICST 2013: 481-482 - 2012
- [j31]Song-Hee Lee, Nam-Sup Park, Jin-Young Choi:
Secure communication in IPTV broadcasting. J. Supercomput. 62(1): 42-52 (2012) - [c57]Miyoung Kang, Ki-Hyuk Nam, Junkil Park, Myung-Ki Shin, Jeehoon Shin, Jin-Young Choi:
Formal specifications for software-defined networking. CFI 2012: 51 - [c56]Miyoung Kang, Junkil Park, Jin-Young Choi, Ki-Hyuk Nam, Myung-Ki Shin:
Process Algebraic Specification of Software Defined Networks. CICSyN 2012: 359-363 - 2011
- [j30]Jin Young Choi, Choongkoo Park:
A Thyristor-Only Input ESD Protection Scheme for CMOS RF ICs. Circuits Syst. 2(3): 170-182 (2011) - [j29]Miyoung Kang, Hyun Sook Rhee, Jin-Young Choi:
Improved User Authentication Scheme with User Anonymity for Wireless Communications. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 94-A(2): 860-864 (2011) - [j28]Dong-Young Yoo, Jin Young Choi, Jae Kyu Lee, Seong-Jin Ahn, Jin-Wook Chung:
Spatial Modelling for Mobile Robot's Vision-based Navigation. J. Intell. Robotic Syst. 63(1): 131-147 (2011) - [j27]Jin Hyun Kim, Jin-Young Choi, Inhye Kang, Insup Lee:
Generating composite behavior of embedded software components based on UML behavioral model and process algebra. ACM SIGSOFT Softw. Eng. Notes 36(1): 1-9 (2011) - 2010
- [j26]Jin Young Choi:
A Comparison Study of Input ESD Protection Schemes Utilizing NMOS, Thyristor, and Diode Devices. Commun. Netw. 2(1): 11-25 (2010) - [j25]Jin Hyun Kim, Jin-Young Choi, Inhye Kang, Insup Lee:
UML Behavior Models of Real-Time Embedded Software for Model-Driven Architecture. J. Univers. Comput. Sci. 16(17): 2415-2434 (2010) - [j24]Jin Hyun Kim, Inhye Kang, Jin-Young Choi, Insup Lee:
Timed and Resource-oriented Statecharts for Embedded Software. IEEE Trans. Ind. Informatics 6(4): 568-578 (2010) - [c55]Anna Philippou, Insup Lee, Oleg Sokolsky, Jin-Young Choi:
A Process Algebraic Framework for Modeling Resource Demand and Supply. FORMATS 2010: 183-197 - [c54]Waqas Sultani, Jin Young Choi:
Abnormal Traffic Detection Using Intelligent Driver Model. ICPR 2010: 324-327 - [c53]Jungjae Lee, Reeseo Cha, Younghun Han, Wonhong Nam, Jin-Young Choi, Wontae Kim, Seung-Min Park:
Modeling autonomous military robots using hybrid system framework. ICTC 2010: 429-430 - [c52]Hyun-Seok Kim, Suk Seo, Jin-Young Choi:
Security analysis of smart card based password authentication schemes. ICIS 2010: 352-356
2000 – 2009
- 2009
- [j23]Hyun Seok Kim, Jin-Young Choi:
Enhanced password-based simple three-party key exchange protocol. Comput. Electr. Eng. 35(1): 107-114 (2009) - [j22]Junkil Park, Jungjae Lee, Jin-Young Choi, Insup Lee:
Model Checking of Real-Time Properties of Resource-Bound Process Algebra. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 92-A(11): 2781-2789 (2009) - [j21]Yerang Hur, Jae-Hwan Sim, Jesung Kim, Jin-Young Choi:
Ensuring Sound Numerical Simulation of Hybrid Automata. J. Comput. Sci. Eng. 3(2): 73-87 (2009) - [c51]Min-Woo Park, Jin-Young Choi, Young-Ju Han, Tai-Myoung Chung:
An Energy Efficient Concentric Clustering Scheme in Wireless Sensor Networks. NCM 2009: 58-61 - [c50]Song-Hee Lee, Nam-Sup Park, Soo-Kyun Kim, Jin-Young Choi:
Cryptanalysis of Secure Key Exchange Protocol between STB and Smart Card in IPTV Broadcasting. ISA 2009: 797-803 - 2008
- [j20]Song-Hee Lee, Nam-Sup Park, Jin-Young Choi:
Secure Handover Protocol for Mobile WiMAX Networks. IEICE Trans. Inf. Syst. 91-D(12): 2875-2879 (2008) - [c49]Jin-Young Choi, Sung-Min Jung, Young-Ju Han, Tai-Myoung Chung:
Extended Concentric-Clustering Routing Scheme Adapted to Various Environments of Sensor Networks. APNOMS 2008: 187-196 - [c48]Hyun Seok Kim, Seok Seo, Jin-Young Choi:
Weaknesses Analysis and Countermeasure of a Verifier-Based Key Agreement Protocol. HPCC 2008: 1015-1018 - [c47]Hyun Seok Kim, Jin-Young Choi:
A Lightweight Protocol Analysis and Modification for Secure RFID System. ICCCN 2008: 958-962 - [c46]Jungrhan Choi, Jinho On, Moonkun Lee, Jin-Young Choi:
A Calculus to Reduce Spatial and Temporal Complexity for Specification and Analysis of Complex Real-Time Systems. NCM (1) 2008: 8-13 - [c45]Hyun Seok Kim, Jung-Hyun Oh, Ju-Bae Kim, Yeon-Oh Jeong, Jin-Young Choi:
Formal Verification of Cryptographic Protocol for Secure RFID System. NCM (2) 2008: 470-477 - [e1]Sung Deok Cha, Jin-Young Choi, Moonzoo Kim, Insup Lee, Mahesh Viswanathan:
Automated Technology for Verification and Analysis, 6th International Symposium, ATVA 2008, Seoul, Korea, October 20-23, 2008. Proceedings. Lecture Notes in Computer Science 5311, Springer 2008, ISBN 978-3-540-88386-9 [contents] - 2007
- [c44]Jung-Hyun Oh, Hyun Seok Kim, Jin-Young Choi:
A Secure Communication Protocol for Low-Cost RFID System. CIT 2007: 949-954 - [c43]Hyun Seok Kim, Jin-Young Choi:
The Design and Verification of RFID Authentication Protocol for Ubiquitous Computing. DEXA Workshops 2007: 693-697 - [c42]Jin Hyun Kim, Jin-Young Choi:
Embedded System Modeling Based on Resource-Oriented Model. ECBS 2007: 203-212 - [c41]Hyun Seok Kim, Jin-Young Choi:
Security and Privacy Analysis of RFID Authentication Protocol for Ubiquitous Computing. ICCCN 2007: 1359-1363 - [c40]Jung-Hyun Oh, Hyun Seok Kim, Jin-Young Choi:
A Light-weight Security Protocol for RFID System. PWC 2007: 384-395 - [c39]Hyun Seok Kim, Jung-Hyun Oh, Jin-Young Choi:
RFID Privacy Protection Scheme for Secure Ubiquitous Computing. IWRT 2007: 117-124 - [c38]June-Goo Lee, Se Hyung Kim, Jong Hyo Kim, Namkug Kim, Jin Young Choi, KwangGi Kim, Jong-Mo Seo:
A novel algorithm for polyp detection using Eigen decomposition of Hessian-matrix for CT colonography CAD: validation with physical phantom study. Computer-Aided Diagnosis 2007: 65142K - [c37]Jin Hyun Kim, Jae-Hwan Sim, Chang-Jin Kim, Jin-Young Choi:
Formal Embedded Operating System Model Based on Resource-Based Design Framework. QSIC 2007: 244-249 - [c36]Jin Hyun Kim, Jae-Hwan Sim, Jin-Young Choi:
Resource-Oriented Design Framework for Embedded System Components. FACS 2007: 171-189 - 2006
- [j19]Il-Gon Kim, Miyoung Kang, Jin-Young Choi, Peter D. Zegzhda, Maxim O. Kalinin, Dmitry P. Zegzhda, Inhye Kang:
Formal Verification of Security Model Using SPR Tool. Comput. Artif. Intell. 25(5): 353-368 (2006) - [j18]Keun-Hee Han, Il-Gon Kim, Kang-Won Lee, Jin-Young Choi, Sang-Hun Jeon:
Threat Evaluation Method for Distributed Network Environment. J. Inf. Sci. Eng. 22(4): 889-907 (2006) - [c35]Hyun Seok Kim, Jung-Hyun Oh, Jin-Young Choi, Jin-Woo Kim:
The Vulnerabilities Analysis and Design of the Security Protocol for RFID System. CIT 2006: 152 - [c34]Il-Gon Kim, Hyun Seok Kim, Ji-Yeon Lee, Jin-Young Choi, Inhye Kang:
Secrecy Analysis of Purchase Transaction in Electronic Purses. AINA (1) 2006: 979-984 - [c33]Hyun Seok Kim, Jeong-Hyun Oh, Jin-Young Choi:
Security Analysis of RFID Authentication for Pervasive Systems using Model Checking. COMPSAC (2) 2006: 195-202 - [c32]Hyun Seok Kim, Il-Gon Kim, Keun-Hee Han, Jin-Young Choi:
Security and Privacy Analysis of RFID Systems Using Model Checking. HPCC 2006: 495-504 - [c31]Chang-Jin Kim, Jin-Young Choi:
Transformation of the Ravenscar Profile Based Ada Real-time Application to the Verification-ready Statecharts: Reverse Engineering and Statemate approach. Software Engineering Research and Practice 2006: 405-414 - [c30]Song-Hee Lee, Jin-Young Choi:
A Medium Access Control Scheme for Providing Reliability in Wireless Ad Hoc Networks. WASA 2006: 341-352 - 2005
- [j17]Il-Gon Kim, Jin-Young Choi:
Model Checking of RADIUS Protocol in Wireless Networks. IEICE Trans. Commun. 88-B(1): 397-398 (2005) - [j16]Ki-Seok Bang, Hyun-Wook Jin, Chuck Yoo, Jin-Young Choi:
System Resource Utilization Analysis Based on Model Checking Method. Informatica (Slovenia) 29(2): 219-226 (2005) - [j15]Hyun-Wook Jin, Pavan Balaji, Chuck Yoo, Jin-Young Choi, Dhabaleswar K. Panda:
Exploiting NIC architectural support for enhancing IP-based protocols on high-performance networks. J. Parallel Distributed Comput. 65(11): 1348-1365 (2005) - [j14]Hojung Cha, Jongmin Lee, Jongho Nang, Sungyong Park, Jin-Hwan Jeong, Chuck Yoo, Jin-Young Choi:
A Video Streaming System for Mobile Phones: Practice and Experience. Wirel. Networks 11(3): 265-274 (2005) - [c29]Chul-Wuk Jeon, Il-Gon Kim, Jin-Young Choi:
Automatic Generation of the C# Code for Security Protocols Verified with Casper/FDR. AINA 2005: 507-510 - [c28]Hyun Seok Kim, Il-Gon Kim, Jin-Young Choi:
Analysis of Security Protocols with Certificate over Open Networks: Electronic Payment System. ICDCS Workshops 2005: 217-223 - [c27]Il-Gon Kim, Young-Joo Moon, Inhye Kang, Ji-Yeon Lee, Keun-Hee Han, Jin-Young Choi:
Model-Based Analysis of Money Accountability in Electronic Purses. WINE 2005: 346-355 - 2004
- [j13]Hee-Jun Yoo, Mino Bai, Jin-Young Choi:
Answer Set Semantics for Prioritized Defaults Logic. IEICE Trans. Inf. Syst. 87-D(12): 2883-2884 (2004) - [c26]Il-Gon Kim, Jin-Young Choi:
Formal Verification of PAP and EAP-MD5 Protocols in Wireless Networks: FDR Model Checking. AINA (2) 2004: 264-269 - [c25]Hyun Min Do, Tamer Basar, Jin Young Choi:
An anti-windup design for single input adaptive control systems in strict feedback form. ACC 2004: 2551-2556 - [c24]Jin Hyun Kim, Su-Young Lee, Young Ah Ahn, Jae-Hwan Sim, Jin Seok Yang, Na-Young Lee, Jin-Young Choi:
Development of RTOS for PLC Using Formal Methods. ATVA 2004: 479-482 - [c23]Hee-Jun Yoo, Jin-Young Choi, Mino Bai:
Formal Specification of Business Rules using Z. CCCT (1) 2004: 92-95 - [c22]Yerang Hur, Jesung Kim, Insup Lee, Jin-Young Choi:
Sound Code Generation from Communicating Hybrid Models. HSCC 2004: 432-447 - [c21]Ki-Seok Bang, Jin-Young Choi, Sung-Ho Jang:
Formal Specification and Verification of Embedded System with Shared Resources. IEEE International Workshop on Rapid System Prototyping 2004: 8-14 - [c20]Young Ah Ahn, Jin-Young Choi:
FDR verification of ESANP protocol in Ad hoc Network. SNPD 2004: 141-145 - [c19]Il-Gon Kim, Jin-Young Choi:
New S/Key System against Dictionary Attack: A Case Study in Casper and CSP/FDR. VVEIS 2004: 75-77 - 2003
- [j12]Hyun-Wook Jin, Chuck Yoo, Jin-Young Choi:
Firmware-Level Latency Analysis on a Gigabit Network. J. Supercomput. 26(1): 59-75 (2003) - [c18]Hee-Jun Yoo, Jin-Young Choi:
Process Algebraic Model of Superscalar Processor Programs for Instruction Level Timing Analysis. PaCT 2003: 180-184 - [c17]Sung-Jae Kim, Jin-Young Choi:
Formal Modeling for a Real-Time Scheduler and Schedulability Analysis. PaCT 2003: 253-258 - [c16]Sung-Ho Jang, Ki-Seok Bang, Jin-Young Choi:
SSR : Statechart with shared resources. HCC 2003: 198-200 - 2002
- [j11]Seok Ho Jeon, Kwang-Kyo Oh, Jin Young Choi:
Flux observer with online tuning of stator and rotor resistances for induction motors. IEEE Trans. Ind. Electron. 49(3): 653-664 (2002) - [c15]Hyun-Wook Jin, Ki-Seok Bang, Chuck Yoo, Jin-Young Choi, Hojung Cha:
Bottleneck Analysis of a Gigabit Network Interface Card: Formal Verification Approach. SPIN 2002: 170-186 - 2001
- [j10]Ki-Seok Bang, Jin-Young Choi, Chuck Yoo:
Comments on 'The Model Checker SPIN'. IEEE Trans. Software Eng. 27(6): 573-576 (2001) - [c14]Jin-Young Choi, Hee Yong Youn, Soonuk Seol, Chuck Yoo:
Distributed Test using Logical Clock. FORTE 2001: 69-84 - [c13]Insup Lee, Jin-Young Choi, Hee-Hwan Kwak, Anna Philippou, Oleg Sokolsky:
A Family of Resource-Bound Real-Time Process Algebras. FORTE 2001: 443-458 - [c12]Young-Ho Kim, Jin Hyun Kim, Ji-Young Kim, Jee-In Kim, Jin-Young Choi, Chang Woo Pyo:
A visual component based tool for developing embedded application software. HCI 2001: 180-184 - 2000
- [j9]Jin Young Choi, Hyun Joo Park:
Use of neural networks in iterative learning control systems. Int. J. Syst. Sci. 31(10): 1227-1239 (2000) - [c11]Min Woong Hwang, Mun Hyuk Kim, Jin-Young Choi:
Second-order multilayer perceptrons and its optimization with genetic algorithms. CEC 2000: 652-658 - [c10]Jin-Young Choi, Hee-Hwan Kwak, Insup Lee:
A Framework for Embedded Real-Time System Design. IPDPS Workshops 2000: 738-742 - [c9]Myung-Hwan Park, Ki-Seok Bang, Jin-Young Choi, Inhye Kang:
Equivalence Checking of Two Statechart Specifications. IEEE International Workshop on Rapid System Prototyping 2000: 46-51
1990 – 1999
- 1998
- [j8]Jin Young Choi, Hyun Joo Park:
Neural Iterative Learning Control for Unknown Nonlinear Systems. Neural Parallel Sci. Comput. 6(4): 501-512 (1998) - [j7]Hanêne Ben-Abdallah, Jin-Young Choi, Duncan Clarke, Young-Si Kim, Insup Lee, Hong-liang Xie:
A Process Algebraic Approach to the Schedulability Analysis of Real-Time Systems. Real Time Syst. 15(3): 189-219 (1998) - [c8]Hee-Hwan Kwak, Insup Lee, Anna Philippou, Jin-Young Choi, Oleg Sokolsky:
Symbolic Schedulability Analysis of Real-Time Systems. RTSS 1998: 409-418 - 1997
- [j6]Patrice Brémond-Grégoire, Jin-Young Choi, Insup Lee:
A Complete Axiomatization of Finite-State ACSR Processes. Inf. Comput. 138(2): 124-159 (1997) - [c7]Chul-Jin Ahn, Seong-Uk Choi, Myong-Soon Park, Jin-Young Choi:
The Design and Evaluation of Policy-Controllable Buffer Cache. ICPADS 1997: 764-771 - [c6]Sung-Mook Lim, Jin-Young Choi:
Specification and verification of real-time systems using ACSR-VP. RTCSA 1997: 135-142 - 1996
- [j5]Deock-Gil Oh, Jin Young Choi, Choong Woong Lee:
Computationally Efficient Fuzzy Adaptive Equalizer for Nonlinear Channels. J. Intell. Fuzzy Syst. 4(1): 65-73 (1996) - [c5]Min Woong Hwang, Jin-Young Choi:
Evolutionary Learning Algorithm for Projection Neural Networks. SEAL 1996: 136-145 - 1995
- [j4]Jin-Young Choi, Chong-Ho Choi:
Partially trained neural networks with self-localizing capability for function approximations. Neural Parallel Sci. Comput. 3(1): 35-49 (1995) - [j3]Deock-Gil Oh, Jin Young Choi, Choong Woong Lee:
Adaptive nonlinear equalizer with reduced computational complexity. Signal Process. 47(3): 307-317 (1995) - [c4]Jin Young Choi, Hyun Joo Park:
Adaptive learning control of affine nonlinear systems using piecewise linearly trained networks. ICNN 1995: 2338-2341 - [c3]Jin-Young Choi, Insup Lee, Hong-liang Xie:
The Specification and Schedulability Analysis of Real-Time Systems using ACSR. RTSS 1995: 266-275 - [c2]Hanêne Ben-Abdallah, Insup Lee, Jin-Young Choi:
A Graphical Language with Formal Semantics for the Specification and Analysis of Real-Time Systems. RTSS 1995: 276-286 - 1994
- [j2]Chong-Ho Choi, Jin-Young Choi:
Constructive neural networks with piecewise interpolation capabilities for function approximations. IEEE Trans. Neural Networks 5(6): 936-944 (1994) - 1993
- [c1]Chong-Ho Choi, Jin Young Choi:
Construction of neural networks for piecewise approximation of continuous functions. ICNN 1993: 428-433 - 1992
- [j1]Jin-Young Choi, Chong-Ho Choi:
Sensitivity analysis of multilayer perceptron with differentiable activation functions. IEEE Trans. Neural Networks 3(1): 101-107 (1992)
Coauthor Index
aka: Hyun Seok Kim
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-13 20:08 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint