The SCEAS System
Navigation Menu

Search the dblp DataBase


Jin-Young Choi: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Hyun Seok Kim, Jung-Hyun Oh, Jin-Young Choi, Jin-Woo Kim
    The Vulnerabilities Analysis and Design of the Security Protocol for RFID System. [Citation Graph (0, 0)][DBLP]
    CIT, 2006, pp:152- [Conf]
  2. Chul-Wuk Jeon, Il-Gon Kim, Jin-Young Choi
    Automatic Generation of the C# Code for Security Protocols Verified with Casper/FDR. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:507-510 [Conf]
  3. Il-Gon Kim, Jin-Young Choi
    Formal Verification of PAP and EAP-MD5 Protocols in Wireless Networks: FDR Model Checking. [Citation Graph (0, 0)][DBLP]
    AINA (2), 2004, pp:264-269 [Conf]
  4. Il-Gon Kim, Hyun Seok Kim, Ji-Yeon Lee, Jin-Young Choi, Inhye Kang
    Secrecy Analysis of Purchase Transaction in Electronic Purses. [Citation Graph (0, 0)][DBLP]
    AINA (1), 2006, pp:979-984 [Conf]
  5. Spyros A. Reveliotis, Jin-Young Choi
    Designing Reversibility-Enforcing Supervisors of Polynomial Complexity for Bounded Petri Nets Through the Theory of Regions. [Citation Graph (0, 0)][DBLP]
    ICATPN, 2006, pp:322-341 [Conf]
  6. Jin Hyun Kim, Su-Young Lee, Young Ah Ahn, Jae-Hwan Sim, Jin Seok Yang, Na-Young Lee, Jin-Young Choi
    Development of RTOS for PLC Using Formal Methods. [Citation Graph (0, 0)][DBLP]
    ATVA, 2004, pp:479-482 [Conf]
  7. Hyun Seok Kim, Jeong-Hyun Oh, Jin-Young Choi
    Security Analysis of RFID Authentication for Pervasive Systems using Model Checking. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2006, pp:195-202 [Conf]
  8. Jin-Young Choi, Hee Yong Youn, Soonuk Seol, Chuck Yoo
    Distributed Test using Logical Clock. [Citation Graph (0, 0)][DBLP]
    FORTE, 2001, pp:69-84 [Conf]
  9. Insup Lee, Jin-Young Choi, Hee-Hwan Kwak, Anna Philippou, Oleg Sokolsky
    A Family of Resource-Bound Real-Time Process Algebras. [Citation Graph (0, 0)][DBLP]
    FORTE, 2001, pp:443-458 [Conf]
  10. Young-Ho Kim, Jin Hyun Kim, Ji-Young Kim, Jee-In Kim, Jin-Young Choi, Chang Woo Pyo
    A visual component based tool for developing embedded application software. [Citation Graph (0, 0)][DBLP]
    HCI, 2001, pp:180-184 [Conf]
  11. Hyun Seok Kim, Il-Gon Kim, Keun-Hee Han, Jin-Young Choi
    Security and Privacy Analysis of RFID Systems Using Model Checking. [Citation Graph (0, 0)][DBLP]
    HPCC, 2006, pp:495-504 [Conf]
  12. Yerang Hur, Jesung Kim, Insup Lee, Jin-Young Choi
    Sound Code Generation from Communicating Hybrid Models. [Citation Graph (0, 0)][DBLP]
    HSCC, 2004, pp:432-447 [Conf]
  13. Nojun Kwak, Chong-Ho Choi, Jin-Young Choi
    Feature Extraction Using ICA. [Citation Graph (0, 0)][DBLP]
    ICANN, 2001, pp:568-576 [Conf]
  14. Hyun Seok Kim, Il-Gon Kim, Jin-Young Choi
    Analysis of Security Protocols with Certificate over Open Networks: Electronic Payment System. [Citation Graph (0, 0)][DBLP]
    ICDCS Workshops, 2005, pp:217-223 [Conf]
  15. Chul-Jin Ahn, Seong-Uk Choi, Myong-Soon Park, Jin-Young Choi
    The Design and Evaluation of Policy-Controllable Buffer Cache. [Citation Graph (0, 0)][DBLP]
    ICPADS, 1997, pp:764-771 [Conf]
  16. Jin-Young Choi, Spyros A. Reveliotis
    An Analytical Investigation of the Scheduling Problem for Capacitated Re-Entrant Lines. [Citation Graph (0, 0)][DBLP]
    ICRA, 2002, pp:3193-3198 [Conf]
  17. Jin-Young Choi, Hee-Hwan Kwak, Insup Lee
    A Framework for Embedded Real-Time System Design. [Citation Graph (0, 0)][DBLP]
    IPDPS Workshops, 2000, pp:738-742 [Conf]
  18. Sung-Jae Kim, Jin-Young Choi
    Formal Modeling for a Real-Time Scheduler and Schedulability Analysis. [Citation Graph (0, 0)][DBLP]
    PaCT, 2003, pp:253-258 [Conf]
  19. Hee-Jun Yoo, Jin-Young Choi
    Process Algebraic Model of Superscalar Processor Programs for Instruction Level Timing Analysis. [Citation Graph (0, 0)][DBLP]
    PaCT, 2003, pp:180-184 [Conf]
  20. Ki-Seok Bang, Jin-Young Choi, Sung-Ho Jang
    Formal Specification and Verification of Embedded System with Shared Resources. [Citation Graph (0, 0)][DBLP]
    IEEE International Workshop on Rapid System Prototyping, 2004, pp:8-14 [Conf]
  21. Myung-Hwan Park, Ki-Seok Bang, Jin-Young Choi, Inhye Kang
    Equivalence Checking of Two Statechart Specifications. [Citation Graph (0, 0)][DBLP]
    IEEE International Workshop on Rapid System Prototyping, 2000, pp:46-51 [Conf]
  22. Sung-Mook Lim, Jin-Young Choi
    Specification and verification of real-time systems using ACSR-VP. [Citation Graph (0, 0)][DBLP]
    RTCSA, 1997, pp:135-142 [Conf]
  23. Jin-Young Choi, Insup Lee, Hong-liang Xie
    The Specification and Schedulability Analysis of Real-Time Systems using ACSR. [Citation Graph (0, 0)][DBLP]
    IEEE Real-Time Systems Symposium, 1995, pp:266-275 [Conf]
  24. Hanêne Ben-Abdallah, Insup Lee, Jin-Young Choi
    A Graphical Language with Formal Semantics for the Specification and Analysis of Real-Time Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Real-Time Systems Symposium, 1995, pp:276-287 [Conf]
  25. Hee-Hwan Kwak, Insup Lee, Anna Philippou, Jin-Young Choi, Oleg Sokolsky
    Symbolic Schedulability Analysis of Real-Time Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Real-Time Systems Symposium, 1998, pp:409-0 [Conf]
  26. Min Woong Hwang, Jin-Young Choi
    Evolutionary Learning Algorithm for Projection Neural Networks. [Citation Graph (0, 0)][DBLP]
    SEAL, 1996, pp:136-145 [Conf]
  27. Chang Jin Kim, Jin-Young Choi
    Transformation of the Ravenscar Profile Based Ada Real-time Application to the Verification-ready Statecharts: Reverse Engineering and Statemate approach. [Citation Graph (0, 0)][DBLP]
    Software Engineering Research and Practice, 2006, pp:405-414 [Conf]
  28. Young Ah Ahn, Jin-Young Choi
    FDR verification of ESANP protocol in Ad hoc Network. [Citation Graph (0, 0)][DBLP]
    SNPD, 2004, pp:141-145 [Conf]
  29. Hyun-Wook Jin, Ki-Seok Bang, Chuck Yoo, Jin-Young Choi, Hojung Cha
    Bottleneck Analysis of a Gigabit Network Interface Card: Formal Verification Approach. [Citation Graph (0, 0)][DBLP]
    SPIN, 2002, pp:170-186 [Conf]
  30. Sung-Ho Jang, Ki-Seok Bang, Jin-Young Choi
    SSR : Statechart with shared resources. [Citation Graph (0, 0)][DBLP]
    HCC, 2003, pp:198-200 [Conf]
  31. Il-Gon Kim, Jin-Young Choi
    New S/Key System against Dictionary Attack: A Case Study in Casper and CSP/FDR. [Citation Graph (0, 0)][DBLP]
    VVEIS, 2004, pp:75-77 [Conf]
  32. Il-Gon Kim, Young-Joo Moon, Inhye Kang, Ji-Yeon Lee, Keun-Hee Han, Jin-Young Choi
    Model-Based Analysis of Money Accountability in Electronic Purses. [Citation Graph (0, 0)][DBLP]
    WINE, 2005, pp:346-355 [Conf]
  33. Song-Hee Lee, Jin-Young Choi
    A Medium Access Control Scheme for Providing Reliability in Wireless Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    WASA, 2006, pp:341-352 [Conf]
  34. Il-Gon Kim, Miyoung Kang, Jin-Young Choi, Peter D. Zegzhda, Maxim O. Kalinin, Dmitry P. Zegzhda, Inhye Kang
    Formal Verification of Security Model Using SPR Tool. [Citation Graph (0, 0)][DBLP]
    Computers and Artificial Intelligence, 2006, v:25, n:5, pp:- [Journal]
  35. Patrice Brémond-Grégoire, Jin-Young Choi, Insup Lee
    A Complete Axiomatization of Finite-State ACSR Processes. [Citation Graph (0, 0)][DBLP]
    Inf. Comput., 1997, v:138, n:2, pp:124-159 [Journal]
  36. Ki-Seok Bang, Hyun-Wook Jin, Chuck Yoo, Jin-Young Choi
    System Resource Utilization Analysis Based on Model Checking Method. [Citation Graph (0, 0)][DBLP]
    Informatica (Slovenia), 2005, v:29, n:2, pp:219-226 [Journal]
  37. Keun-Hee Han, Il-Gon Kim, Kang-Won Lee, Jin-Young Choi, Sang-Hun Jeon
    Threat Evaluation Method for Distributed Network Environment. [Citation Graph (0, 0)][DBLP]
    J. Inf. Sci. Eng., 2006, v:22, n:4, pp:889-907 [Journal]
  38. Hyun-Wook Jin, Pavan Balaji, Chuck Yoo, Jin-Young Choi, Dhabaleswar K. Panda
    Exploiting NIC architectural support for enhancing IP-based protocols on high-performance networks. [Citation Graph (0, 0)][DBLP]
    J. Parallel Distrib. Comput., 2005, v:65, n:11, pp:1348-1365 [Journal]
  39. Hanêne Ben-Abdallah, Jin-Young Choi, Duncan Clarke, Young-Si Kim, Insup Lee, Hong-liang Xie
    A Process Algebraic Approach to the Schedulability Analysis of Real-Time Systems. [Citation Graph (0, 0)][DBLP]
    Real-Time Systems, 1998, v:15, n:3, pp:189-219 [Journal]
  40. Hyun-Wook Jin, Chuck Yoo, Jin-Young Choi
    Firmware-Level Latency Analysis on a Gigabit Network. [Citation Graph (0, 0)][DBLP]
    The Journal of Supercomputing, 2003, v:26, n:1, pp:59-75 [Journal]
  41. Ki-Seok Bang, Jin-Young Choi, Chuck Yoo
    Comments on 'The Model Checker SPIN'. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 2001, v:27, n:6, pp:573-576 [Journal]
  42. Hojung Cha, JongMin Lee, Jongho Nang, Sungyong Park, Jin-Hwan Jeong, Chuck Yoo, Jin-Young Choi
    A Video Streaming System for Mobile Phones: Practice and Experience. [Citation Graph (0, 0)][DBLP]
    Wireless Networks, 2005, v:11, n:3, pp:265-274 [Journal]
  43. Hyun Seok Kim, Jin-Young Choi
    The Design and Verification of RFID Authentication Protocol for Ubiquitous Computing. [Citation Graph (0, 0)][DBLP]
    DEXA Workshops, 2007, pp:693-697 [Conf]
  44. Spyros A. Reveliotis, Elzbieta Roszkowska, Jin-Young Choi
    Generalized Algebraic Deadlock Avoidance Policies for Sequential Resource Allocation Systems. [Citation Graph (0, 0)][DBLP]
    ICRA, 2007, pp:991-996 [Conf]

  45. A Secure Communication Protocol for Low-Cost RFID System. [Citation Graph (, )][DBLP]

  46. Extended Concentric-Clustering Routing Scheme Adapted to Various Environments of Sensor Networks. [Citation Graph (, )][DBLP]

  47. Embedded System Modeling Based on Resource-Oriented Model. [Citation Graph (, )][DBLP]

  48. Weaknesses Analysis and Countermeasure of a Verifier-Based Key Agreement Protocol. [Citation Graph (, )][DBLP]

  49. Security and Privacy Analysis of RFID Authentication Protocol for Ubiquitous Computing. [Citation Graph (, )][DBLP]

  50. A Lightweight Protocol Analysis and Modification for Secure RFID System. [Citation Graph (, )][DBLP]

  51. A Light-weight Security Protocol for RFID System. [Citation Graph (, )][DBLP]

  52. Formal Embedded Operating System Model Based on Resource-Based Design Framework. [Citation Graph (, )][DBLP]

  53. RFID Privacy Protection Scheme for Secure Ubiquitous Computing. [Citation Graph (, )][DBLP]

  54. Cryptanalysis of Secure Key Exchange Protocol between STB and Smart Card in IPTV Broadcasting. [Citation Graph (, )][DBLP]

  55. An Energy Efficient Concentric Clustering Scheme in Wireless Sensor Networks. [Citation Graph (, )][DBLP]

  56. A Calculus to Reduce Spatial and Temporal Complexity for Specification and Analysis of Complex Real-Time Systems. [Citation Graph (, )][DBLP]

  57. Formal Verification of Cryptographic Protocol for Secure RFID System. [Citation Graph (, )][DBLP]

  58. Resource-Oriented Design Framework for Embedded System Components. [Citation Graph (, )][DBLP]

Search in 0.005secs, Finished in 0.008secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002