Fasten: An fpga-based secure system for big data processing
In cloud computing framework, the data security and protection is one of the most important
aspects for optimization and concrete implementation. This paper proposes a reliable yet …
aspects for optimization and concrete implementation. This paper proposes a reliable yet …
A secure and flexible FPGA-based blockchain system for the IIoT
Blockchain is a promising solution for Industry 4.0; however, it does not guarantee input data
integrity. We propose a field-programmable gate array (FPGA)-based private blockchain …
integrity. We propose a field-programmable gate array (FPGA)-based private blockchain …
SafeDB: Spark acceleration on FPGA clouds with enclaved data processing and bitstream protection
This paper proposes SafeDB: Spark Acceleration on FPGA Clouds with Enclaved Data
Processing and Bitstream Protection. SafeDB provides a comprehensive and systematic …
Processing and Bitstream Protection. SafeDB provides a comprehensive and systematic …
A study on the regional difference of obesity in the social vulnerabilities-focused on the Suwon city
HY Kim, YJ Kim - The Journal of the Korea Contents Association, 2019 - koreascience.kr
This study aims to spatialize the gap between obesity levels through the body mass index,
an objective indicator of the level of health among vulnerable people. Thus, areas where the …
an objective indicator of the level of health among vulnerable people. Thus, areas where the …
Hub Facilities in Vehicle Movement Network between Livestock Facilities
The purpose of this study was to derive and analyze the hub facilities that occupy major
positions in the vehicle movement networks of livestock facilities. For this purpose, this study …
positions in the vehicle movement networks of livestock facilities. For this purpose, this study …
Hardware-based flush+ reload attack on Armv8 system via ACP
H Lee, S Jang, HY Kim, T Suh - 2021 International Conference …, 2021 - ieeexplore.ieee.org
Cache side-channel attacks have been getting remarked as it threatens the information security
of the multitenant systems. Among them, the FLUSH+RELOAD attack is one of the high-…
of the multitenant systems. Among them, the FLUSH+RELOAD attack is one of the high-…
Relationship between degree centrality of livestock facilities in vehicle movement network and outbreak of animal infectious disease
The national loss caused by the periodic livestock epidemic is very large. In addition, vehicle
movement is the main cause of livestock epidemics in Korea. In this context, this study …
movement is the main cause of livestock epidemics in Korea. In this context, this study …
Performance evaluation of many‐core systems: case study with TILEPro64
This study evaluates the performance of the 64‐core‐based TILEPro64, and compares it
with Core i7 and Atom by executing three benchmark programs: a synthetic bench, SPEC …
with Core i7 and Atom by executing three benchmark programs: a synthetic bench, SPEC …
Job submission and monitoring management in integrated computing environment for finite element analysis
D Jung, M Kim, J Lee, HY Kim, D Lee - The Journal of Supercomputing, 2018 - Springer
Modeling and simulation (M&S) is a promising solution for manufacturers to verify and
resolve errors in advance. Recently, M&S using high-performance computing has attracted …
resolve errors in advance. Recently, M&S using high-performance computing has attracted …
FPGAledger: FPGA based decentralized ledger for enterprise applications
Decentralized ledger has been found in many enterprise applications, such as cross-border
transaction processing and supply chain management that multiple companies involved. …
transaction processing and supply chain management that multiple companies involved. …