Keunhyuk Yeom

Keunhyuk Yeom
Pusan National University | PNU · Division of Computer Science and Engineering

About

62
Publications
4,153
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
594
Citations

Publications

Publications (62)
Article
Full-text available
A cloud-computing company or user must create a virtual machine to build and operate a cloud environment. With the growth of cloud computing, it is necessary to build virtual machines that reflect the needs of both companies and users. In this study, we propose a bespoke virtual machine orchestrator (BVMO) as a method for constructing a virtual mac...
Article
Full-text available
In this paper, we propose a smart contract broker to improve the reusability of smart contracts in a blockchain environment. The current blockchain platform lacks a standard approach to sharing and managing smart contracts, which makes it difficult for developers to reuse them and leads to efficiency issues. The proposed smart contract broker uses...
Preprint
Full-text available
A cloud-computing company or user needs to create a virtual machine to build and operate a cloud environment. With the growth of cloud computing, it is necessary to build virtual machines that reflect the needs of companies and users. In this paper, we propose a Bespoke Virtual Machine Orchestrator (BVMO) as a method of constructing a virtual machi...
Article
Full-text available
Smart environments, such as smart cities and streets, contain various heterogeneous devices and content that provide information to users and interact with each other. In a smart environment, appropriate content should be provided based on the situations of users. Additionally, when a user is in motion, it is necessary to provide content in a seaml...
Article
Full-text available
With the popularization of cloud computing, various cloud services have emerged, and hybrid clouds that can take advantage of combining public and private clouds are attracting attention. However, because of their variety, determining a combination of cloud services suited to the user’s current environment and requirements is expensive when deployi...
Article
Full-text available
Microservices are small-scale services that can operate independently. An application consisting of microservice units can be developed independently as a service unit, and it can handle individual logic without being affected by other services. In addition, it is possible to rapidly distribute the configured microservices by a container, and a con...
Article
Full-text available
The advent of software-defined networking (SDN) has led to the paradigm of programmable network environments. Conceptually, the structure of SDN is divided into three layers: application, control, and infrastructure. The SDN controller in the control layer can configure and execute the routing of applications to the infrastructure layer consisting...
Article
Full-text available
Recent years have seen a paradigm shift from PC-centric computing to cloud computing. The advent of cloud computing has led to the emergence of various cloud services and providers. Cloud service brokers (CSBs) were introduced to serve as intermediaries between cloud service providers and cloud users who wish to select an appropriate cloud service....
Article
Full-text available
A paradigm shift from a PC-centric to a cloud computing environment has occurred because of rapid and continuous improvements in the IT environments. With the expansion of cloud computing, various types of cloud services are emerging, collectively known as XaaS (that is, “everything as a service”), including Infrastructure as a Service, Platform as...
Article
Background/Objectives: When an IoT service failure occurs, it is difficult to identify the source of the problem. In order to ensure stale IoT services, error causes need to be identified and the flow of interconnection services controlled. Methods/Statistical Analysis: Two types of requirements, namely, platform-device direct connections, and plat...
Article
Depending on the increase amongst various cloud services, the technology of the Cloud Service Broker (CSB) to find the most appropriate services to meet the needs of cloud service consumers has emerged. In order to advance for cloud services to be used through the CSB, it is important to ensure the quality level that meets the demands of consumers...
Conference Paper
Full-text available
With the expansion of the cloud computing paradigm, various cloud services are emerging. As a consequence, the utilization of cloud services has increased. However, the complexity of cloud service usage is also increasing, because the cloud providers have different performance levels and prices for cloud services that offer similar functions. There...
Conference Paper
Full-text available
클라우드 서비스가 증가하고 다양해짐에 따라 클라우드 서비스 소비자들의 요구사항을 만족하는 가장 적절한 서비스를 찾아주는 클라우드 서비스 브로커 기술이 나타났다. 클라우드 서비스 브로커를 통해 클라우드 서비스가 사용되는 것을 촉진시키기 위해서는 서비스 수준 협약(SLA) 기반의 협상 과정을 통해 소비자들의 요구사항에 맞는 품질 수준을 보장하는 것이 중요하다. 그러나 클라우드 서비스 유형 별로 품질 수준을 표현하는 측정 기준과 척도, 계산 방식이 상이하다. 따라서 클라우드 서비스의 품질에 대한 가변성을 분석하고, 분석된 품질 수준을 보장 및 개선하기 위한 SLA 모델이 필요하다. 본 논문에서는 cross-cutting 개념...
Article
Advances in mobile technology and significantly increasing utilization of mobile devices such as smartphones and tablets have resulted in a paradigm shift from PC-centric computing to mobile computing. The results of careful analysis conducted of this mobile landscape indicate that there is a growing demand for smart, user-centric, situation-aware...
Conference Paper
Full-text available
클라우드 컴퓨팅 패러다임이 성행하면서 IaaS, PaaS, SaaS 유형의 클라우드 서비스가 나타났다. 제공되는 클라우드 서비스의 다양화로 인해 클라우드 테넌트(사용자)의 요구사항에 적합한 클라우드 서비스를 중개하는 기술인 서비스 브로커 기술이 최근 들어 관심을 받고 있다. 클라우드 서비스를 중개하기 위해서 다양한 클라우드 서비스의 체계적인 등록, 분석, 검색을 지원할 수 있는 클라우드 서비스 명세 모델이 필요하다. 본 논문은 클라우드 서비스가 가질 수 있는 공통성과 가변성을 반영하여 다양한 유형의 클라우드 서비스를 명세하기 위한 가변성 기반의 클라우드 서비스 분석 모델을 제시한다.
Article
Full-text available
As the prevalence of cloud computing increases, various cloud service types have emerged, such as IaaS, PaaS, and SaaS. The growth and diversification of these cloud services has also resulted in the development of technology for cloud service brokers (CSBs), which serve as intermediate cloud services that can assist cloud tenants (users) in deploy...
Article
The high portability and mobility of mobile devices have given rise to critical concerns with regard to mobile situation-aware services that utilize user situation information in the mobile domain. Mobile situation-aware services for mobile devices are provided by collecting and analyzing data, from which the user situation is inferred through an i...
Conference Paper
Recently, the Web Ontology Language (OWL) and Semantic Web Rule Language (SWRL) have been widely used to construct situation-aware environments. However, incorrect situations can be inferred, and these decrease the quality of situation-aware services. SWRL rules are one of the main causes of incorrectly inferred situations. Therefore, in this paper...
Chapter
The RFID systems used in industries have several problems. When a massive number of RFID events are generated, bottlenecks cause data losses, and duplicated event data cause a decrease in reliability. In this paper, we propose a Queuing Buffer Method that can generate efficient and reliable Event Data to solve these problems. This Queuing Buffer Me...
Chapter
Automatic object identification and distributed computing technology have been used to realize a ubiquitous computing environment. Radio Frequency Identification (RFID) technology has been applied to many business areas such as logistics and supply chains. EPCglobal, which is currently focusing on developing a worldwide standard for RFID, has propo...
Article
Software product-line engineering is the successful reuse of technology when applied to component-based software development. The main concept and structure of this technology is developing reusable core assets by applying commonality and variability, and then developing new software reusing these core assets. Recently, the emergence of service-ori...
Conference Paper
With the emergence of SOA (service oriented architecture), a business process can be realized as a Web service. A business process can be viewed as a requirement phase artifact and Web service can be viewed as a development phase artifact. By reducing the gap between a business process and Web service, we can extend the reusability, flexibility, an...
Conference Paper
The business processes of an enterprise are its core asset, enabling a prompt and flexible response to business changes. Recently, business processes have attracted considerable interest with the emergence of service-oriented computing environments. In these environments, the business process acts as a connection point between the business and info...
Conference Paper
Through the introduction of SOA(Service Oriented Architecture), enterprises have recently had the benefit of legacy software reuse, heterogeneous environment integration, and ROI(Return On Investment) maximization. SOA consists of a service client, service provider, and service registry. Within this environment, we proposed a service with variabili...
Article
To cope with requirement changes flexibly and rapidly, the existing component-based paradigm is being evolved into a service-oriented computing paradigm. The main characteristic of the service-oriented computing paradigm is that service-oriented applications are developed as loosely coupled services that reflect business concerns. This paradigm als...
Article
Automatic object identification and distributed computing technology have recently been investigated in order to realize a ubiquitous computing environment. Radio-frequency identification (RFID) technology has been applied to many business areas such as logistics and supply chains. The Electronic Product Code (EPC) Network, an open global standard...
Conference Paper
Today, the software environment paradigm is shifting to service-oriented computing, based on key features that reflect business concerns. The SOMA and SOUP methodologies can be used to develop service-oriented applications. However, these approaches focus on developing monolithic service applications. Therefore, we propose a feature-based reusable...
Conference Paper
Currently, although logistics systems are based mostly on the barcode system and partly on radio frequency identification (RFID) systems, they still depend on humans checking or validating products. Situation-awareness technologies can operate similarly to humans. We suggest a middleware system based on an ontology using situation-awareness technol...
Conference Paper
Service-oriented computing is an emerging environment for business agility in the software industry. Today, there is a focus on developing service-oriented software. In this environment, service is a key feature reflecting business concerns. However, there is still debate about how best to reflect business concerns in services and how to create mor...
Conference Paper
Service-Oriented Architecture (SOA) is a conceptual architecture that was proposed for supporting service-oriented computing. To obtain a successful design and development of service-oriented software, an architectural view model to represent and document various aspects of service-oriented software based on the SOA conceptual template is required....
Conference Paper
Commonality and variability play central roles in all product line development processes. Indeed, at each phase of core assets development, variabilities can exist at different levels of abstraction and in addition can be concretized by different artifacts. In this paper, we suggest a 2-dimensional framework for analyzing variabilities of core asse...
Article
Analysis modeling focuses on functional requirements and postpone implementation specific issues until subsequent design activities are undertaken. Based on the analysis models, the design activities are performed by refining and clarifying the analysis models. Thus, the quality of analysis models has a vast impact on the design models. Therefore,...
Conference Paper
Many of today's businesses have changed from rigid siloed application approaches to more flexible business process focused solutions. Business processes are dynamic entities. At any given time, they must handle a variety of business situations that are changing over time. The business process model must be able to follow these changes, so it is nec...
Conference Paper
Even in traditional single software product development, failure to manage changes in requirements can cause degeneration of the architecture and components. Traceability issues are even more important in the product line because the impact of changes in a product line can involve all the product line-based applications. Variability means the abili...
Conference Paper
Ubiquitous computing (ubicomp) environments provide access to information and computing resources for users at any time and anywhere. In the approaching ubiquitous ear, many self-adaptive applications are emerging. These can be made to adapt to the environment within which the application operates. Context information is the key to producing self-a...
Conference Paper
Radio frequency identification (RFID) technology has been applied to many business areas to simplify complex processes and gain important benefits. To derive real benefit from RFID, the system must rapidly implement functions to process the large quantity of event data generated by RFID operations and should be configured dynamically for changing b...
Conference Paper
Radio Frequency Identification (RFID) is an established technology and has the potential, in a variety of applications, to significantly reduce cost and improve performance. RFID may dramatically change an organization’s capacity to obtain real-time information concerning the location and properties of tagged people or objects. However, simply addi...
Conference Paper
Radio frequency identification (RFID) technology is believed to be the next revolutionary step in supply-chain management. Complex process simplification using RFID technology can offer particularly important benefits to many enterprises. To derive real benefit from RFID, the application must rapidly implement functions to process the large quantit...
Conference Paper
Since the requirements of enterprises are complex and changeable, it is necessary to have solutions that are proactive and flexible. In a service-oriented architecture (SOA), because services are independent, loosely coupled, and reusable, they can be integrated flexibly. Business processes are generally built by integrating services. However, an e...
Conference Paper
The realization of a smart home is accelerating with the approach of the ubiquitous computing era. A smart home should provide proper service as user's preference. In addition, it should guarantee appropriate responses to changes in the external environment. To achieve these objectives, a smart home requires a service definition that is provided by...
Article
Good software architecture is critically important for successful software development. The software architecture can be defined as a set of architectural design decisions. However, the effort for acquiring good software architecture currently lacks of interest and experience in architectural design decisions. For this reason, during acquiring good...
Conference Paper
Architecture-based software development plays an important role in successfully developing and managing large and complex software systems. Recently, there have been a number of studies for designing, evaluating, or transforming architectures. However, there is not much work being done for closely connecting an architectural evaluation with an arch...
Conference Paper
Architecture describes the organizational structure of a system including components, interactions, and constraints. Reusable components, units of software systems, have been considered to support a considerable improvement in reducing development costs and time to market because their interfaces and functionality are explicitly defined. Instead of...
Conference Paper
Radio frequency identification (RFID) technology is considered to be the next step in the revolution of supply-chain management, retail, and beyond. To derive real benefit from RFID, the applications must incorporate functions to process the enormous event data generated quickly by RFID operations. For this reason, many RFID middleware systems have...
Conference Paper
Software product line engineering is a method that prepares for future reuse and supports seamless reuse in the application development process. A domain architecture, sharing a common software architecture across a product line, brings a core set of knowledge and assets to the development process. Domain architectures reduce the complexity and cos...
Conference Paper
Radio Frequency IDentification (RFID) technology is considered to be the next step in the revolution in supply-chain management, retail, and beyond. To derive real benefit from RFID, a RFID application must implement functions to process the enormous event data generated quickly by RFID operations. For this reason, many RFID middleware systems have...
Conference Paper
Ubiquitous systems interact with the environment in which they operate. Many consider that the operating environment's main infrastructure is the sensor system, especially a wireless sensor network. However, older sensor systems do not have wireless sensor network level capabilities. Sensor network nodes have a communication function, computation p...
Article
The methodologies of product line engineering emphasize proactive reuse to construct high-quality products more quickly that are less costly. Requirements engineering for software product families differs significantly from requirements engineering for single software products. The requirements for a product line are written for the group of system...
Conference Paper
The methodologies of product-line engineering emphasize proactive reuse to construct high-quality, less costly products. The requirements for a product line are written for the group of systems as a whole, with requirements for individual systems specified by a delta or an increment to the generic set [1]. Therefore, it is necessary to identify and...
Article
Product line engineering is a framework to support systematic reuse. The methodologies of product line engineering emphasize proactive reuse to construct high-quality, less costly products. Many software development technologies have been used in context of product line. The requirements for a product line are basis of software development as tradi...
Conference Paper
The methodologies of product-line engineering emphasize proactive reuse to construct high-quality, less costly products. To refer software product line engineering, it is important to analyze the commonality and variability of a domain and to develop core assets based on them. But, core assets are in the different levels of abstract because they ar...
Article
Software architecture captures early design decisions, which have a major impact on the quality of the developed software. Thus, we can understand the ability of an architecture with its quality attributes by finding the decisions and reasoning about them in the early life cycle. This paper presents an approach helping us to perform successfully th...
Conference Paper
Architectural evaluation to determine a software architecture's fitness with respect to its desired quality attributes is one of the most important issues in architecture-based software development. However, existing techniques have too many limitations for widespread application, such as the inappropriate representation of architecture and ambigui...
Conference Paper
Full-text available
Developing software for distributed computing systems is challenging, due to lack of good software development methodologies for distributed computing systems. It is very important to develop reliable, adaptable and expandable application software for distributed computing systems. Autonomous decentralized systems (ADS) is a distributed computing s...
Conference Paper
Full-text available
Developing software for distributed computing systems is challenging due to lack of effective software development methodologies and tools. In particular, because many errors in the source code can be traced to the errors in the requirements specification, it is especially important to have effective verification techniques for the requirements spe...

Network

Cited By