Time filter

Source Type

Daejeon, South Korea

Oladimeji E.A.,Product Design and Dev. | Chung L.,University of Texas at Dallas | Jung H.T.,Contents Research Division | Kim J.,Sungkyunkwan University
Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2011 | Year: 2011

Ubiquitous computing has the potential to significantly improve the quality of healthcare delivery by making relevant patient health history and vital signs readily available on-demand to caregivers. However, this promise of the ability to track electronic health information signals from distributed ubiquitous devices, conflicts with the security and privacy concerns that most people have regarding their personal information and medical history. While security and privacy concerns have been dealt with extensively in mainstream computing, there is need for new techniques and tools that can enable ubiquitous system designers in healthcare domains to build in appropriate levels of protection. Such techniques can help ensure that patient information is minimally but sufficiently available to different stakeholders in the care giving chain, and are useful in ubiquitous environments where traditional security mechanisms may be either impractical or insufficient. This paper presents a goal-centric and policy-driven framework for deriving security and privacy risk mitigation strategies in ubiquitous health information interchange. Specifically, we use scenario analysis and goal-oriented techniques to model security and privacy objectives, threats, and mitigation strategies in the form of safeguards or countermeasures. We demonstrate that traditional solutions are insufficient, while introducing the notion of purpose-driven security policies based on sensitivity meta-tags. We also show how administrative safeguards (such as those required by HIPAA rules) can be refined into intermediate specifications that can be analyzed more systematically. To validate the utility of our approach, we illustrate our major concepts using examples from ubiquitous emergency response scenarios. Copyright 2011 ACM. Source

Ahn B.R.,Sungkyunkwan University | Kim W.-G.,Copyright Protection Center | Yu W.Y.,Contents Research Division | Kim M.-H.,Sungkyunkwan University
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | Year: 2011

With the development of electronic documents, plagiarism is rapidly increasing and, given the difficulty of manual detection, need for plagiarism detection systems to help protect intellectual property has emerged. Many content-based detection systems have been developed and are actually used in some foreign countries, but they are still insufficient for documents in Korean. In particular, the high variance of Hangul makes the development of detection systems more difficult. This study proposes a Hangul document detection method based on Ferret's trigrams. Ferret only considered the frequency of trigram matches as a way to detect similarity, but in this study the system is developed further by weighting results depending on the degree of trigram match, thereby improving the accuracy of similarity detection. © 2011 Springer-Verlag. Source

Ko D.-H.,Samsung | Lee J.,Chosun University | Lim S.-J.,Contents Research Division | Yoon S.-H.,Dongguk University
ETRI Journal | Year: 2011

We construct surfaces with darts, creases, and corners by blending different types of local geometries. We also render these surfaces efficiently using programmable graphics hardware. Points on the blending surface are evaluated using simplified computation which can easily be performed on a graphics processing unit. Results show an eighteen-fold to twenty-fold increase in rendering speed over a CPU version. We also demonstrate how these surfaces can be trimmed using textures. © 2011 ETRI. Source

Jung H.T.,Contents Research Division | Joo S.H.,Contents Research Division
Proceedings of the 2nd International Conference on Trendz in Information Sciences and Computing, TISC-2010 | Year: 2010

As the Unified Modeling Language (UML) becomes an industrial standard for object-oriented software development, many system models have been specified in UML notation. A system can be described in terms of the functional view through the use case model, the static view through the class model, and the dynamic view through activity or sequence model. In particular, activity model has more to do with the subject of the modeling and the experience of the modeler; for business modeling, for modeling the logic captured by a single use case or for modeling the detailed logic of a business rule. In this paper we propose mapping rules and a transformation algorithm to translate a UML activity diagram into a Colored Petri Nets (CPNs). ©2010 IEEE. Source

Jang E.S.,Hanyang University | Lee S.,Contents Research Division | Koo B.,Contents Research Division | Kim D.,Hanyang University | Son K.,Hanyang University
ETRI Journal | Year: 2010

A trend in 3D mesh compression is codec design with low computational complexity which preserves the input vertex and face order. However, this added information increases the complexity. We present a fast 3D mesh compression method that compresses the redundant shared vertex information between neighboring faces using simple first-order differential coding followed by fast entropy coding with a fixed length prefix. Our algorithm is feasible for low complexity designs and maintains the order, which is now part of the MPEG-4 scalable complexity 3D mesh compression standard. The proposed algorithm is 30 times faster than MPEG-4 3D mesh coding extension. © 2010 ETRI. Source

Discover hidden collaborations