Search the dblp DataBase
Jin-Young Choi :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Hyun Seok Kim , Jung-Hyun Oh , Jin-Young Choi , Jin-Woo Kim The Vulnerabilities Analysis and Design of the Security Protocol for RFID System. [Citation Graph (0, 0)][DBLP ] CIT, 2006, pp:152- [Conf ] Chul-Wuk Jeon , Il-Gon Kim , Jin-Young Choi Automatic Generation of the C# Code for Security Protocols Verified with Casper/FDR. [Citation Graph (0, 0)][DBLP ] AINA, 2005, pp:507-510 [Conf ] Il-Gon Kim , Jin-Young Choi Formal Verification of PAP and EAP-MD5 Protocols in Wireless Networks: FDR Model Checking. [Citation Graph (0, 0)][DBLP ] AINA (2), 2004, pp:264-269 [Conf ] Il-Gon Kim , Hyun Seok Kim , Ji-Yeon Lee , Jin-Young Choi , Inhye Kang Secrecy Analysis of Purchase Transaction in Electronic Purses. [Citation Graph (0, 0)][DBLP ] AINA (1), 2006, pp:979-984 [Conf ] Spyros A. Reveliotis , Jin-Young Choi Designing Reversibility-Enforcing Supervisors of Polynomial Complexity for Bounded Petri Nets Through the Theory of Regions. [Citation Graph (0, 0)][DBLP ] ICATPN, 2006, pp:322-341 [Conf ] Jin Hyun Kim , Su-Young Lee , Young Ah Ahn , Jae-Hwan Sim , Jin Seok Yang , Na-Young Lee , Jin-Young Choi Development of RTOS for PLC Using Formal Methods. [Citation Graph (0, 0)][DBLP ] ATVA, 2004, pp:479-482 [Conf ] Hyun Seok Kim , Jeong-Hyun Oh , Jin-Young Choi Security Analysis of RFID Authentication for Pervasive Systems using Model Checking. [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2006, pp:195-202 [Conf ] Jin-Young Choi , Hee Yong Youn , Soonuk Seol , Chuck Yoo Distributed Test using Logical Clock. [Citation Graph (0, 0)][DBLP ] FORTE, 2001, pp:69-84 [Conf ] Insup Lee , Jin-Young Choi , Hee-Hwan Kwak , Anna Philippou , Oleg Sokolsky A Family of Resource-Bound Real-Time Process Algebras. [Citation Graph (0, 0)][DBLP ] FORTE, 2001, pp:443-458 [Conf ] Young-Ho Kim , Jin Hyun Kim , Ji-Young Kim , Jee-In Kim , Jin-Young Choi , Chang Woo Pyo A visual component based tool for developing embedded application software. [Citation Graph (0, 0)][DBLP ] HCI, 2001, pp:180-184 [Conf ] Hyun Seok Kim , Il-Gon Kim , Keun-Hee Han , Jin-Young Choi Security and Privacy Analysis of RFID Systems Using Model Checking. [Citation Graph (0, 0)][DBLP ] HPCC, 2006, pp:495-504 [Conf ] Yerang Hur , Jesung Kim , Insup Lee , Jin-Young Choi Sound Code Generation from Communicating Hybrid Models. [Citation Graph (0, 0)][DBLP ] HSCC, 2004, pp:432-447 [Conf ] Nojun Kwak , Chong-Ho Choi , Jin-Young Choi Feature Extraction Using ICA. [Citation Graph (0, 0)][DBLP ] ICANN, 2001, pp:568-576 [Conf ] Hyun Seok Kim , Il-Gon Kim , Jin-Young Choi Analysis of Security Protocols with Certificate over Open Networks: Electronic Payment System. [Citation Graph (0, 0)][DBLP ] ICDCS Workshops, 2005, pp:217-223 [Conf ] Chul-Jin Ahn , Seong-Uk Choi , Myong-Soon Park , Jin-Young Choi The Design and Evaluation of Policy-Controllable Buffer Cache. [Citation Graph (0, 0)][DBLP ] ICPADS, 1997, pp:764-771 [Conf ] Jin-Young Choi , Spyros A. Reveliotis An Analytical Investigation of the Scheduling Problem for Capacitated Re-Entrant Lines. [Citation Graph (0, 0)][DBLP ] ICRA, 2002, pp:3193-3198 [Conf ] Jin-Young Choi , Hee-Hwan Kwak , Insup Lee A Framework for Embedded Real-Time System Design. [Citation Graph (0, 0)][DBLP ] IPDPS Workshops, 2000, pp:738-742 [Conf ] Sung-Jae Kim , Jin-Young Choi Formal Modeling for a Real-Time Scheduler and Schedulability Analysis. [Citation Graph (0, 0)][DBLP ] PaCT, 2003, pp:253-258 [Conf ] Hee-Jun Yoo , Jin-Young Choi Process Algebraic Model of Superscalar Processor Programs for Instruction Level Timing Analysis. [Citation Graph (0, 0)][DBLP ] PaCT, 2003, pp:180-184 [Conf ] Ki-Seok Bang , Jin-Young Choi , Sung-Ho Jang Formal Specification and Verification of Embedded System with Shared Resources. [Citation Graph (0, 0)][DBLP ] IEEE International Workshop on Rapid System Prototyping, 2004, pp:8-14 [Conf ] Myung-Hwan Park , Ki-Seok Bang , Jin-Young Choi , Inhye Kang Equivalence Checking of Two Statechart Specifications. [Citation Graph (0, 0)][DBLP ] IEEE International Workshop on Rapid System Prototyping, 2000, pp:46-51 [Conf ] Sung-Mook Lim , Jin-Young Choi Specification and verification of real-time systems using ACSR-VP. [Citation Graph (0, 0)][DBLP ] RTCSA, 1997, pp:135-142 [Conf ] Jin-Young Choi , Insup Lee , Hong-liang Xie The Specification and Schedulability Analysis of Real-Time Systems using ACSR. [Citation Graph (0, 0)][DBLP ] IEEE Real-Time Systems Symposium, 1995, pp:266-275 [Conf ] Hanêne Ben-Abdallah , Insup Lee , Jin-Young Choi A Graphical Language with Formal Semantics for the Specification and Analysis of Real-Time Systems. [Citation Graph (0, 0)][DBLP ] IEEE Real-Time Systems Symposium, 1995, pp:276-287 [Conf ] Hee-Hwan Kwak , Insup Lee , Anna Philippou , Jin-Young Choi , Oleg Sokolsky Symbolic Schedulability Analysis of Real-Time Systems. [Citation Graph (0, 0)][DBLP ] IEEE Real-Time Systems Symposium, 1998, pp:409-0 [Conf ] Min Woong Hwang , Jin-Young Choi Evolutionary Learning Algorithm for Projection Neural Networks. [Citation Graph (0, 0)][DBLP ] SEAL, 1996, pp:136-145 [Conf ] Chang Jin Kim , Jin-Young Choi Transformation of the Ravenscar Profile Based Ada Real-time Application to the Verification-ready Statecharts: Reverse Engineering and Statemate approach. [Citation Graph (0, 0)][DBLP ] Software Engineering Research and Practice, 2006, pp:405-414 [Conf ] Young Ah Ahn , Jin-Young Choi FDR verification of ESANP protocol in Ad hoc Network. [Citation Graph (0, 0)][DBLP ] SNPD, 2004, pp:141-145 [Conf ] Hyun-Wook Jin , Ki-Seok Bang , Chuck Yoo , Jin-Young Choi , Hojung Cha Bottleneck Analysis of a Gigabit Network Interface Card: Formal Verification Approach. [Citation Graph (0, 0)][DBLP ] SPIN, 2002, pp:170-186 [Conf ] Sung-Ho Jang , Ki-Seok Bang , Jin-Young Choi SSR : Statechart with shared resources. [Citation Graph (0, 0)][DBLP ] HCC, 2003, pp:198-200 [Conf ] Il-Gon Kim , Jin-Young Choi New S/Key System against Dictionary Attack: A Case Study in Casper and CSP/FDR. [Citation Graph (0, 0)][DBLP ] VVEIS, 2004, pp:75-77 [Conf ] Il-Gon Kim , Young-Joo Moon , Inhye Kang , Ji-Yeon Lee , Keun-Hee Han , Jin-Young Choi Model-Based Analysis of Money Accountability in Electronic Purses. [Citation Graph (0, 0)][DBLP ] WINE, 2005, pp:346-355 [Conf ] Song-Hee Lee , Jin-Young Choi A Medium Access Control Scheme for Providing Reliability in Wireless Ad Hoc Networks. [Citation Graph (0, 0)][DBLP ] WASA, 2006, pp:341-352 [Conf ] Il-Gon Kim , Miyoung Kang , Jin-Young Choi , Peter D. Zegzhda , Maxim O. Kalinin , Dmitry P. Zegzhda , Inhye Kang Formal Verification of Security Model Using SPR Tool. [Citation Graph (0, 0)][DBLP ] Computers and Artificial Intelligence, 2006, v:25, n:5, pp:- [Journal ] Patrice Brémond-Grégoire , Jin-Young Choi , Insup Lee A Complete Axiomatization of Finite-State ACSR Processes. [Citation Graph (0, 0)][DBLP ] Inf. Comput., 1997, v:138, n:2, pp:124-159 [Journal ] Ki-Seok Bang , Hyun-Wook Jin , Chuck Yoo , Jin-Young Choi System Resource Utilization Analysis Based on Model Checking Method. [Citation Graph (0, 0)][DBLP ] Informatica (Slovenia), 2005, v:29, n:2, pp:219-226 [Journal ] Keun-Hee Han , Il-Gon Kim , Kang-Won Lee , Jin-Young Choi , Sang-Hun Jeon Threat Evaluation Method for Distributed Network Environment. [Citation Graph (0, 0)][DBLP ] J. Inf. Sci. Eng., 2006, v:22, n:4, pp:889-907 [Journal ] Hyun-Wook Jin , Pavan Balaji , Chuck Yoo , Jin-Young Choi , Dhabaleswar K. Panda Exploiting NIC architectural support for enhancing IP-based protocols on high-performance networks. [Citation Graph (0, 0)][DBLP ] J. Parallel Distrib. Comput., 2005, v:65, n:11, pp:1348-1365 [Journal ] Hanêne Ben-Abdallah , Jin-Young Choi , Duncan Clarke , Young-Si Kim , Insup Lee , Hong-liang Xie A Process Algebraic Approach to the Schedulability Analysis of Real-Time Systems. [Citation Graph (0, 0)][DBLP ] Real-Time Systems, 1998, v:15, n:3, pp:189-219 [Journal ] Hyun-Wook Jin , Chuck Yoo , Jin-Young Choi Firmware-Level Latency Analysis on a Gigabit Network. [Citation Graph (0, 0)][DBLP ] The Journal of Supercomputing, 2003, v:26, n:1, pp:59-75 [Journal ] Ki-Seok Bang , Jin-Young Choi , Chuck Yoo Comments on 'The Model Checker SPIN'. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Software Eng., 2001, v:27, n:6, pp:573-576 [Journal ] Hojung Cha , JongMin Lee , Jongho Nang , Sungyong Park , Jin-Hwan Jeong , Chuck Yoo , Jin-Young Choi A Video Streaming System for Mobile Phones: Practice and Experience. [Citation Graph (0, 0)][DBLP ] Wireless Networks, 2005, v:11, n:3, pp:265-274 [Journal ] Hyun Seok Kim , Jin-Young Choi The Design and Verification of RFID Authentication Protocol for Ubiquitous Computing. [Citation Graph (0, 0)][DBLP ] DEXA Workshops, 2007, pp:693-697 [Conf ] Spyros A. Reveliotis , Elzbieta Roszkowska , Jin-Young Choi Generalized Algebraic Deadlock Avoidance Policies for Sequential Resource Allocation Systems. [Citation Graph (0, 0)][DBLP ] ICRA, 2007, pp:991-996 [Conf ] A Secure Communication Protocol for Low-Cost RFID System. [Citation Graph (, )][DBLP ] Extended Concentric-Clustering Routing Scheme Adapted to Various Environments of Sensor Networks. [Citation Graph (, )][DBLP ] Embedded System Modeling Based on Resource-Oriented Model. [Citation Graph (, )][DBLP ] Weaknesses Analysis and Countermeasure of a Verifier-Based Key Agreement Protocol. [Citation Graph (, )][DBLP ] Security and Privacy Analysis of RFID Authentication Protocol for Ubiquitous Computing. [Citation Graph (, )][DBLP ] A Lightweight Protocol Analysis and Modification for Secure RFID System. [Citation Graph (, )][DBLP ] A Light-weight Security Protocol for RFID System. [Citation Graph (, )][DBLP ] Formal Embedded Operating System Model Based on Resource-Based Design Framework. [Citation Graph (, )][DBLP ] RFID Privacy Protection Scheme for Secure Ubiquitous Computing. [Citation Graph (, )][DBLP ] Cryptanalysis of Secure Key Exchange Protocol between STB and Smart Card in IPTV Broadcasting. [Citation Graph (, )][DBLP ] An Energy Efficient Concentric Clustering Scheme in Wireless Sensor Networks. [Citation Graph (, )][DBLP ] A Calculus to Reduce Spatial and Temporal Complexity for Specification and Analysis of Complex Real-Time Systems. [Citation Graph (, )][DBLP ] Formal Verification of Cryptographic Protocol for Secure RFID System. [Citation Graph (, )][DBLP ] Resource-Oriented Design Framework for Embedded System Components. [Citation Graph (, )][DBLP ] Search in 0.005secs, Finished in 0.008secs