About
62
Publications
4,153
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
594
Citations
Publications
Publications (62)
A cloud-computing company or user must create a virtual machine to build and operate a cloud environment. With the growth of cloud computing, it is necessary to build virtual machines that reflect the needs of both companies and users. In this study, we propose a bespoke virtual machine orchestrator (BVMO) as a method for constructing a virtual mac...
In this paper, we propose a smart contract broker to improve the reusability of smart contracts in a blockchain environment. The current blockchain platform lacks a standard approach to sharing and managing smart contracts, which makes it difficult for developers to reuse them and leads to efficiency issues. The proposed smart contract broker uses...
A cloud-computing company or user needs to create a virtual machine to build and operate a cloud environment. With the growth of cloud computing, it is necessary to build virtual machines that reflect the needs of companies and users. In this paper, we propose a Bespoke Virtual Machine Orchestrator (BVMO) as a method of constructing a virtual machi...
Smart environments, such as smart cities and streets, contain various heterogeneous devices and content that provide information to users and interact with each other. In a smart environment, appropriate content should be provided based on the situations of users. Additionally, when a user is in motion, it is necessary to provide content in a seaml...
With the popularization of cloud computing, various cloud services have emerged, and hybrid clouds that can take advantage of combining public and private clouds are attracting attention. However, because of their variety, determining a combination of cloud services suited to the user’s current environment and requirements is expensive when deployi...
Microservices are small-scale services that can operate independently. An application consisting of microservice units can be developed independently as a service unit, and it can handle individual logic without being affected by other services. In addition, it is possible to rapidly distribute the configured microservices by a container, and a con...
The advent of software-defined networking (SDN) has led to the paradigm of programmable network environments. Conceptually, the structure of SDN is divided into three layers: application, control, and infrastructure. The SDN controller in the control layer can configure and execute the routing of applications to the infrastructure layer consisting...
Recent years have seen a paradigm shift from PC-centric computing to cloud computing. The advent of cloud computing has led to the emergence of various cloud services and providers. Cloud service brokers (CSBs) were introduced to serve as intermediaries between cloud service providers and cloud users who wish to select an appropriate cloud service....
A paradigm shift from a PC-centric to a cloud computing environment has occurred because of rapid and continuous improvements in the IT environments. With the expansion of cloud computing, various types of cloud services are emerging, collectively known as XaaS (that is, “everything as a service”), including Infrastructure as a Service, Platform as...
Background/Objectives: When an IoT service failure occurs, it is difficult to identify the source of the problem. In order to ensure stale IoT services, error causes need to be identified and the flow of interconnection services controlled. Methods/Statistical Analysis: Two types of requirements, namely, platform-device direct connections, and plat...
Depending on the increase amongst various cloud services, the technology of the Cloud Service Broker (CSB) to find the most appropriate services to meet the needs of cloud service consumers has emerged. In order to advance for cloud services to be used through the CSB, it is important to ensure the quality level that meets the demands of consumers...
With the expansion of the cloud computing paradigm, various cloud services are emerging. As a consequence, the utilization of cloud services has increased. However, the complexity of cloud service usage is also increasing, because the cloud providers have different performance levels and prices for cloud services that offer similar functions. There...
클라우드 서비스가 증가하고 다양해짐에 따라 클라우드 서비스 소비자들의 요구사항을 만족하는 가장 적절한 서비스를 찾아주는 클라우드 서비스 브로커 기술이 나타났다. 클라우드 서비스 브로커를 통해 클라우드 서비스가 사용되는 것을 촉진시키기 위해서는 서비스 수준 협약(SLA) 기반의 협상 과정을 통해 소비자들의 요구사항에 맞는 품질 수준을 보장하는 것이 중요하다. 그러나 클라우드 서비스 유형 별로 품질 수준을 표현하는 측정 기준과 척도, 계산 방식이 상이하다. 따라서 클라우드 서비스의 품질에 대한 가변성을 분석하고, 분석된 품질 수준을 보장 및 개선하기 위한 SLA 모델이 필요하다. 본 논문에서는 cross-cutting 개념...
Advances in mobile technology and significantly increasing utilization of mobile devices such as smartphones and tablets have resulted in a paradigm shift from PC-centric computing to mobile computing. The results of careful analysis conducted of this mobile landscape indicate that there is a growing demand for smart, user-centric, situation-aware...
클라우드 컴퓨팅 패러다임이 성행하면서 IaaS, PaaS, SaaS 유형의 클라우드 서비스가 나타났다. 제공되는 클라우드 서비스의 다양화로 인해 클라우드 테넌트(사용자)의 요구사항에 적합한 클라우드 서비스를 중개하는 기술인 서비스 브로커 기술이 최근 들어 관심을 받고 있다. 클라우드 서비스를 중개하기 위해서 다양한 클라우드 서비스의 체계적인 등록, 분석, 검색을 지원할 수 있는 클라우드 서비스 명세 모델이 필요하다. 본 논문은 클라우드 서비스가 가질 수 있는 공통성과 가변성을 반영하여 다양한 유형의 클라우드 서비스를 명세하기 위한 가변성 기반의 클라우드 서비스 분석 모델을 제시한다.
As the prevalence of cloud computing increases, various cloud service types have emerged, such as IaaS, PaaS, and SaaS. The growth and diversification of these cloud services has also resulted in the development of technology for cloud service brokers (CSBs), which serve as intermediate cloud services that can assist cloud tenants (users) in deploy...
The high portability and mobility of mobile devices have given rise to critical concerns with regard to mobile situation-aware services that utilize user situation information in the mobile domain. Mobile situation-aware services for mobile devices are provided by collecting and analyzing data, from which the user situation is inferred through an i...
Recently, the Web Ontology Language (OWL) and Semantic Web Rule Language (SWRL) have been widely used to construct situation-aware environments. However, incorrect situations can be inferred, and these decrease the quality of situation-aware services. SWRL rules are one of the main causes of incorrectly inferred situations. Therefore, in this paper...
The RFID systems used in industries have several problems. When a massive number of RFID events are generated, bottlenecks cause data losses, and duplicated event data cause a decrease in reliability. In this paper, we propose a Queuing Buffer Method that can generate efficient and reliable Event Data to solve these problems. This Queuing Buffer Me...
Automatic object identification and distributed computing technology have been used to realize a ubiquitous computing environment. Radio Frequency Identification (RFID) technology has been applied to many business areas such as logistics and supply chains. EPCglobal, which is currently focusing on developing a worldwide standard for RFID, has propo...
Software product-line engineering is the successful reuse of technology when applied to component-based software development. The main concept and structure of this technology is developing reusable core assets by applying commonality and variability, and then developing new software reusing these core assets. Recently, the emergence of service-ori...
With the emergence of SOA (service oriented architecture), a business process can be realized as a Web service. A business process can be viewed as a requirement phase artifact and Web service can be viewed as a development phase artifact. By reducing the gap between a business process and Web service, we can extend the reusability, flexibility, an...
The business processes of an enterprise are its core asset, enabling a prompt and flexible response to business changes. Recently, business processes have attracted considerable interest with the emergence of service-oriented computing environments. In these environments, the business process acts as a connection point between the business and info...
Through the introduction of SOA(Service Oriented Architecture), enterprises have recently had the benefit of legacy software reuse, heterogeneous environment integration, and ROI(Return On Investment) maximization. SOA consists of a service client, service provider, and service registry. Within this environment, we proposed a service with variabili...
To cope with requirement changes flexibly and rapidly, the existing component-based paradigm is being evolved into a service-oriented
computing paradigm. The main characteristic of the service-oriented computing paradigm is that service-oriented applications
are developed as loosely coupled services that reflect business concerns. This paradigm als...
Automatic object identification and distributed computing technology have recently been investigated in order to realize a ubiquitous computing environment. Radio-frequency identification (RFID) technology has been applied to many business areas such as logistics and supply chains. The Electronic Product Code (EPC) Network, an open global standard...
Today, the software environment paradigm is shifting to service-oriented computing, based on key features that reflect business concerns. The SOMA and SOUP methodologies can be used to develop service-oriented applications. However, these approaches focus on developing monolithic service applications. Therefore, we propose a feature-based reusable...
Currently, although logistics systems are based mostly on the barcode system and partly on radio frequency identification (RFID) systems, they still depend on humans checking or validating products. Situation-awareness technologies can operate similarly to humans. We suggest a middleware system based on an ontology using situation-awareness technol...
Service-oriented computing is an emerging environment for business agility in the software industry. Today, there is a focus on developing service-oriented software. In this environment, service is a key feature reflecting business concerns. However, there is still debate about how best to reflect business concerns in services and how to create mor...
Service-Oriented Architecture (SOA) is a conceptual architecture that was proposed for supporting service-oriented computing. To obtain a successful design and development of service-oriented software, an architectural view model to represent and document various aspects of service-oriented software based on the SOA conceptual template is required....
Commonality and variability play central roles in all product line development processes. Indeed, at each phase of core assets development, variabilities can exist at different levels of abstraction and in addition can be concretized by different artifacts. In this paper, we suggest a 2-dimensional framework for analyzing variabilities of core asse...
Analysis modeling focuses on functional requirements and postpone implementation specific issues until subsequent design activities are undertaken. Based on the analysis models, the design activities are performed by refining and clarifying the analysis models. Thus, the quality of analysis models has a vast impact on the design models. Therefore,...
Many of today's businesses have changed from rigid siloed application approaches to more flexible business process focused solutions. Business processes are dynamic entities. At any given time, they must handle a variety of business situations that are changing over time. The business process model must be able to follow these changes, so it is nec...
Even in traditional single software product development, failure to manage changes in requirements can cause degeneration of the architecture and components. Traceability issues are even more important in the product line because the impact of changes in a product line can involve all the product line-based applications. Variability means the abili...
Ubiquitous computing (ubicomp) environments provide access to information and computing resources for users at any time and anywhere. In the approaching ubiquitous ear, many self-adaptive applications are emerging. These can be made to adapt to the environment within which the application operates. Context information is the key to producing self-a...
Radio frequency identification (RFID) technology has been applied to many business areas to simplify complex processes and gain important benefits. To derive real benefit from RFID, the system must rapidly implement functions to process the large quantity of event data generated by RFID operations and should be configured dynamically for changing b...
Radio Frequency Identification (RFID) is an established technology and has the potential, in a variety of applications, to
significantly reduce cost and improve performance. RFID may dramatically change an organization’s capacity to obtain real-time
information concerning the location and properties of tagged people or objects. However, simply addi...
Radio frequency identification (RFID) technology is believed to be the next revolutionary step in supply-chain management.
Complex process simplification using RFID technology can offer particularly important benefits to many enterprises. To derive
real benefit from RFID, the application must rapidly implement functions to process the large quantit...
Since the requirements of enterprises are complex and changeable, it is necessary to have solutions that are proactive and flexible. In a service-oriented architecture (SOA), because services are independent, loosely coupled, and reusable, they can be integrated flexibly. Business processes are generally built by integrating services. However, an e...
The realization of a smart home is accelerating with the approach of the ubiquitous computing era. A smart home should provide proper service as user's preference. In addition, it should guarantee appropriate responses to changes in the external environment. To achieve these objectives, a smart home requires a service definition that is provided by...
Good software architecture is critically important for successful software development. The software architecture can be defined as a set of architectural design decisions. However, the effort for acquiring good software architecture currently lacks of interest and experience in architectural design decisions. For this reason, during acquiring good...
Architecture-based software development plays an important role in successfully developing and managing large and complex
software systems. Recently, there have been a number of studies for designing, evaluating, or transforming architectures.
However, there is not much work being done for closely connecting an architectural evaluation with an arch...
Architecture describes the organizational structure of a system including components, interactions, and constraints. Reusable
components, units of software systems, have been considered to support a considerable improvement in reducing development
costs and time to market because their interfaces and functionality are explicitly defined. Instead of...
Radio frequency identification (RFID) technology is considered to be the next step in the revolution of supply-chain management, retail, and beyond. To derive real benefit from RFID, the applications must incorporate functions to process the enormous event data generated quickly by RFID operations. For this reason, many RFID middleware systems have...
Software product line engineering is a method that prepares for future reuse and supports seamless reuse in the application
development process. A domain architecture, sharing a common software architecture across a product line, brings a core set
of knowledge and assets to the development process. Domain architectures reduce the complexity and cos...
Radio Frequency IDentification (RFID) technology is considered to be the next step in the revolution in supply-chain management,
retail, and beyond. To derive real benefit from RFID, a RFID application must implement functions to process the enormous
event data generated quickly by RFID operations. For this reason, many RFID middleware systems have...
Ubiquitous systems interact with the environment in which they operate. Many consider that the operating environment's main infrastructure is the sensor system, especially a wireless sensor network. However, older sensor systems do not have wireless sensor network level capabilities. Sensor network nodes have a communication function, computation p...
The methodologies of product line engineering emphasize proactive reuse to construct high-quality products more quickly that are less costly. Requirements engineering for software product families differs significantly from requirements engineering for single software products. The requirements for a product line are written for the group of system...
The methodologies of product-line engineering emphasize proactive reuse to construct high-quality, less costly products. The
requirements for a product line are written for the group of systems as a whole, with requirements for individual systems
specified by a delta or an increment to the generic set [1]. Therefore, it is necessary to identify and...
Product line engineering is a framework to support systematic reuse. The methodologies of product line engineering emphasize proactive reuse to construct high-quality, less costly products. Many software development technologies have been used in context of product line. The requirements for a product line are basis of software development as tradi...
The methodologies of product-line engineering emphasize proactive reuse to construct high-quality, less costly products. To refer software product line engineering, it is important to analyze the commonality and variability of a domain and to develop core assets based on them. But, core assets are in the different levels of abstract because they ar...
Software architecture captures early design decisions, which have a major impact on the quality of the developed software. Thus, we can understand the ability of an architecture with its quality attributes by finding the decisions and reasoning about them in the early life cycle. This paper presents an approach helping us to perform successfully th...
Architectural evaluation to determine a software architecture's fitness with respect to its desired quality attributes is one of the most important issues in architecture-based software development. However, existing techniques have too many limitations for widespread application, such as the inappropriate representation of architecture and ambigui...
Developing software for distributed computing systems is challenging, due to lack of good software development methodologies for distributed computing systems. It is very important to develop reliable, adaptable and expandable application software for distributed computing systems. Autonomous decentralized systems (ADS) is a distributed computing s...
Developing software for distributed computing systems is
challenging due to lack of effective software development methodologies
and tools. In particular, because many errors in the source code can be
traced to the errors in the requirements specification, it is especially
important to have effective verification techniques for the requirements
spe...