Young-Joo Kim

Young-Joo Kim
Electronics and Telecommunications Research Institute | ETRI · SW-SoC Convergence Research Division

PhD

About

28
Publications
4,131
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
210
Citations
Citations since 2017
2 Research Items
71 Citations
2017201820192020202120222023051015
2017201820192020202120222023051015
2017201820192020202120222023051015
2017201820192020202120222023051015

Publications

Publications (28)
Article
Full-text available
The Internet of Things will enable objects to be identified, sensed, and controlled remotely across the existing Internet infrastructure. Even though interacting with sensor nodes requires a priori knowledge about the application profile implemented on the desired nodes, it is infeasible for user applications to have any information in advance or t...
Article
Debugging in distributed environments, such as wireless sensor networks (WSNs), which consist of sensor nodes with limited resources, is an iterative and occasionally laborious process for programmers. In sensor networks, it is not easy to find unintended bugs that arise during development and deployment, and that are due to a lack of visibility in...
Conference Paper
Modern smart devices that are increasing in number and complexity of applications, have a high demand for achieving all of the desired performance requirements within a reasonable cost and time range during operation. Self-adaptive computing that enables automatic adaption of system behavior and resources in order to match the goal of application p...
Article
Full-text available
Today, various Internet of Things (IoT) devices and applications are being developed. Such IoT devices have different hardware (HW) and software (SW) capabilities; therefore, most applications require customization when IoT devices are changed or new applications are created. However, the applications executed on these devices are not optimized for...
Conference Paper
This paper proposes a design of a self-adaptive system observation. The observation considers an optimal environment for guaranteeing low-power and high-performance regarding systems and applications. The component of the optimal environment consists of two parts: a monitoring part and a controlling part. The monitoring part provides static and dyn...
Article
Shared-memory based parallel programming with OpenMP and Posix-thread APIs becomes more common to fully take advantage of multiprocessor computing environments. One of the critical risks in multithreaded programming is data races that are hard to debug and greatly damaging to parallel applications if they are uncaught. Although ample effort has bee...
Article
Full-text available
Owing to the acceleration of IoT- (Internet of Things-) based wireless sensor networks, cloud-computing services using Big Data are rapidly growing. In order to manage and analyze Big Data efficiently, Hadoop frameworks have been used in a variety of fields. Hadoop processes Big Data as record values by using MapReduce programming in a distributed...
Article
Full-text available
Since wireless sensor networks (WSNs) have a lot of potential capability to provide diverse services to human by monitoring things scattered in real world, they are envisioned as one of the core enabling technologies for ubiquitous computing which organizes and mediates both physical and social interactions anytime and anywhere. WSNs are being adop...
Conference Paper
Since Wireless Sensor Networks (WSNs) have a lot of potential capability to provide diverse services to human by monitoring things scattered in real world, they are envisioned one of the core enabling technologies for ubiquitous computing. However, existing sensor network systems are designed for observing special zones or regional things by using...
Conference Paper
Shared-memory based parallel programming with OpenMP and Posix-thread APIs is becoming more common to fully take advantage of multiprocessor computing environments. One of the critical risks in the multithreaded programming is data races which are hard to debug and greatly damaging to parallel applications if they are uncaughted. Although ample eff...
Conference Paper
Wireless Sensor Networks have much vulnerability in the aspect of security because sensor nodes are limited in power, computational capabilities, and memory, and they even use a shared medium. For this reason, wireless sensor networks can be attacked easily by adversary and their attacks are mainly accomplished through channels or frequencies being...
Conference Paper
Full-text available
Artificial Potential Field (APF) is widely used for an autonomous robot path planning and navigation because of light complexity and elegance of results. Although it is useful in single robot path planning, appropriate algorithm for multi-robot path planning has not been proposed. Existing APFs which can apply to multi-robot only regard robots as o...
Article
Full-text available
Races that occur in shared-memory parallel programs such as OpenMP programs must be detected for debugging because of causing unintended non-deterministic results. Previous works which verify the existence of these races on-the-fly are limited to the programs without internal non-determinism. But in the programs with internal non-determinism, such...
Article
In this paper, we present a UPnP-ZigBee internetworking architecture. Different from traditional internetworking architectures which focus on integrating either wired networks or single-hop wireless networks into UPnP networks, integrating ZigBee with UPnP is more difficult because ZigBee nodes communicate over multi-hop wireless network, and furth...
Conference Paper
Full-text available
IP-based wireless sensor networks (IP-WSN) are popularly recognized as a global sensor networks infrastructure by combining IPv6 technology with wireless sensor networks (WSN). However, IP-WSN, currently, does not provide security because it is commonly recognized that it is a big burden for IP-WSN to adapt Internet's dominant security protocol. We...
Article
Full-text available
Race conditions in current Java programs must be detected because it may cause unexpected result by non-deterministic executions. For detecting such races during program execution, execution flows of all threads and all access events can be monitored. It is difficult for previous race detection techniques to monitor all threads and access events in...
Conference Paper
Full-text available
Metadata, self-describing data about sensor nodes and sensing data, is needed to understand different capabilities provided by heterogeneous sensor networks. However, storing metadata in resource constrained sensor nodes is infeasible in terms of increased memory costs and multi-hop communication overheads. More than this, sensor networks have diff...
Chapter
Data races or races which occur in parallel programs such as OpenMP programs must be detected, because they may lead to unpredictable results of program executions. There are three representative tools which detect races which can occur in OpenMP programs: Thread Analyzer of Sun Inc., Thread Checker of Intel Corporation, and RaceStand of GNU. Two o...
Conference Paper
Established service discovery protocols such as UPnP allow control points to find devices and services and to retrieve descriptions about them in order to learn all about the device and services. However, general device-control point approaches are not suitable for wireless sensor networks due to severe resource constraints and gateway architecture...
Conference Paper
Full-text available
Races in OpenMP programs must be detected because they may cause unintended nondeterministic results of programs. The Intel thread checker can detect the races occurred in an execution of OpenMP program, but it has not been analyzed on the limitation of its power for race detection in OpenMP programs. This paper empirically analyzes the functionali...
Conference Paper
Races must be detected for debugging parallel programs with OpenMP directives because they may cause unintended nondeterministic results of programs. The previous tool that detects races does not verify the existence of races in programs with no internal nondeterminism because the tool regards nested sibling threads as ordered threads and has the p...
Conference Paper
It is important to debug unintended data races in OpenMP programs efficiently, because such programs are often complex and long-running. Previous tools for detecting the races does not provide any effective facility for understanding the complexity of threads involved in the reported races. This paper presents a thread visualization tool to present...
Conference Paper
Since embedded systems based on System-on-a-Chip(SoC) have limited resources, debugging programs in such systems requires a remote debugging system that has enough resources. However, existing JTAG based remote debugging system that uses GDB in Linux environment does not provide tracing function, so it is hard to monitor the executions of SoC progr...
Article
Full-text available
To develop SoC program for embedded systems, a tool that can remotely debug from host system is needed. Because the existing remote debugging systems using GDB don't offer information of the SoC program execution in real-time, it is difficult to observe condition of the program execution, and also they have limited characteristics to tools and use...
Conference Paper
Detecting data races or just races is important for debugging OpenMP programs, because races result in unintended nondeterministic executions of the program. The previous tool to detect the races in OpenMP programs monitors a serial execution of the program, but unfortunately cannot guarantee to verify the existence of races even in the programs on...

Network

Cited By