Sciweavers

ASIASIM
2004
Springer
14 years 5 months ago
Simulating Cyber-intrusion Using Ordered UML Model-Based Scenarios
Abstract. Network security simulator is required for the study on the cyber intrusion and defense as cyber terrors have been increasingly popular. Until now, network security simul...
Eung Ki Park, Joo Beom Yun, Hoh Peter In
ASIASIM
2004
Springer
14 years 5 months ago
Simulating Groundwater Transport Process Using a Vertical Heterogeneity Model: A Case Study
Abstract. It is important to simulate a groundwater transport process, e.g., pollutant migration, through the vadose zone and subsequent mixing within the saturated zone to assess ...
Samuel S. Lee, Hoh Peter In
ASIASIM
2004
Springer
14 years 5 months ago
A Security Risk Analysis Model for Information Systems
Abstract. Information security is a crucial technique for an organization to survive in these days. However, there is no integrated model to assess the security risk quantitatively...
Hoh Peter In, Young-Gab Kim, Taek Lee, Chang-Joo M...
ASIASIM
2004
Springer
14 years 5 months ago
Intuitive Control of Dynamic Simulation Using Improved Implicit Constraint Enforcement
Geometric constraints are imperative components of many dynamic simulation systems to effectively control the behavior of simulated objects. In this paper we present an improved fi...
Min Hong, Samuel W. J. Welch, Min-Hyung Choi
ASIASIM
2004
Springer
14 years 5 months ago
LSTAFF: System Software for Large Block Flash Memory
Abstract. Recently, flash memory is widely used in embedded applications since it has strong points: non-volatility, fast access speed, shock resistance, and low power consumption...
Tae-Sun Chung, Dong-Joo Park, Yeonseung Ryu, Sugwo...
ASIASIM
2004
Springer
14 years 5 months ago
self-CD: Interactive Self-collision Detection for Deformable Body Simulation Using GPUs
This paper presents an efficient self-collision detection algorithm for deformable body simulation using programmable graphics processing units (GPUs). The proposed approach store...
Yoo-Joo Choi, Young J. Kim, Myoung-Hee Kim
ASIASIM
2004
Springer
14 years 5 months ago
Design and Implementation of an SSL Component Based on CBD
Abstract. SSL is one of the most popular protocols used on the Internet for secure communications. However SSL protocol has several problems. First, SSL protocol brings considerabl...
Eun-Ae Cho, Young-Gab Kim, Chang-Joo Moon, Doo-Kwo...
ASIASIM
2004
Springer
14 years 5 months ago
A Scalable, Ordered Scenario-Based Network Security Simulator
A network security simulator becomes more useful for the study on the cyber incidents and their defense mechanisms, as cyber terrors have been increasingly popular. Until now, netw...
Joo Beom Yun, Eung Ki Park, Eul-Gyu Im, Hoh Peter ...