default search action
Jong Kim 0001
김종
Person information
- unicode name: 김종
- affiliation: Pohang University of Science and Technology, South Korea
Other persons with the same name
- Jong Kim 0002 — Seon Architects and Engineering Group, Cheongju, Korea
- Jong Kim 0003 — Nazarbayev University, Kazakhstan
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j53]Seungmin Lee, Youngsok Kim, Dukyun Nam, Jong Kim:
Gem5-AVX: Extension of the Gem5 Simulator to Support AVX Instruction Sets. IEEE Access 12: 20767-20778 (2024) - [j52]Namgyu Park, Jong Kim:
Toward Robust ASR System against Audio Adversarial Examples using Agitated Logit. ACM Trans. Priv. Secur. 27(2): 20 (2024) - [e4]Yongdae Kim, Jong Kim, Farinaz Koushanfar, Kasper Rasmussen:
Proceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2024, Seoul, Republic of Korea, May 27-29, 2024. ACM 2024 [contents] - 2023
- [c86]Yonggon Park, Youngjoo Ko, Jong Kim:
Mutation Methods for Structured Input to Enhance Path Coverage of Fuzzers. WISA 2023: 257-268 - 2022
- [j51]Sangwoo Ji, Namgyu Park, Dongbin Na, Bin Zhu, Jong Kim:
Defending against attacks tailored to transfer learning via feature distancing. Comput. Vis. Image Underst. 223: 103533 (2022) - [j50]Youngjoo Ko, Bin Zhu, Jong Kim:
Fuzzing with automatically controlled interleavings to detect concurrency bugs. J. Syst. Softw. 191: 111379 (2022) - [c85]Jungbeom Seo, Jong Kim:
Enhancing Scalability with Payment Requests Aggregation in Lightning Network. Blockchain 2022: 340-347 - [c84]Dongbin Na, Sangwoo Ji, Jong Kim:
Unrestricted Black-Box Adversarial Attack Using GAN with Limited Queries. ECCV Workshops (1) 2022: 467-482 - [c83]Geunwoo Kim, Michael Franz, Jong Kim:
The Ticket Price Matters in Sharding Blockchain. DPM/CBT@ESORICS 2022: 185-202 - [i2]Dongbin Na, Sangwoo Ji, Jong Kim:
Unrestricted Black-box Adversarial Attack Using GAN with Limited Queries. CoRR abs/2208.11613 (2022) - 2021
- [j49]Gyeongmin Lee, Bongjun Kim, Seungbin Song, Changsu Kim, Jong Kim, Hanjun Kim:
Precise Correlation Extraction for IoT Fault Detection With Concurrent Activities. ACM Trans. Embed. Comput. Syst. 20(5s): 94:1-94:21 (2021) - [c82]Namgyu Park, Sangwoo Ji, Jong Kim:
Detecting Audio Adversarial Examples with Logit Noising. ACSAC 2021: 586-595 - [e3]Yongdae Kim, Jong Kim, Giovanni Vigna, Elaine Shi:
CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15 - 19, 2021. ACM 2021, ISBN 978-1-4503-8454-4 [contents] - [i1]Namgyu Park, Sangwoo Ji, Jong Kim:
Detecting Audio Adversarial Examples with Logit Noising. CoRR abs/2112.06443 (2021) - 2020
- [j48]Hayoung Jeong, Taeho Kang, Jiwon Choi, Jong Kim:
A comparative assessment of Wi-Fi and acoustic signal-based HCI methods on the practicality. J. Multimodal User Interfaces 14(1): 123-137 (2020) - [c81]Dongbin Na, Namgyu Park, Sangwoo Ji, Jong Kim:
CAPTCHAs Are Still in Danger: An Efficient Scheme to Bypass Adversarial CAPTCHAs. WISA 2020: 31-44
2010 – 2019
- 2019
- [j47]Taeho Kang, Sangwoo Ji, Hayoung Jeong, Bin Zhu, Jong Kim:
WearAuth: Wristwear-Assisted User Authentication for Smartphones Using Wavelet-Based Multi-Resolution Analysis. IEICE Trans. Inf. Syst. 102-D(10): 1976-1992 (2019) - [c80]Bongjun Kim, Seonyeong Heo, Gyeongmin Lee, Seungbin Song, Jong Kim, Hanjun Kim:
Spinal code: automatic code extraction for near-user computation in fogs. CC 2019: 87-98 - [c79]Sangwoo Ji, Youngjoo Ko, Saeyoung Oh, Jong Kim:
Pinpoint Rowhammer: Suppressing Unwanted Bit Flips on Rowhammer Attacks. AsiaCCS 2019: 549-560 - [c78]Youngjoo Ko, Sangwoo Ji, Jong Kim:
Low-Noise LLC Side-Channel Attack with Perf. WISA 2019: 328-340 - 2018
- [j46]Jihun Kim, Joonsung Kim, Pyeongsu Park, Jong Kim, Jangwoo Kim:
SSD Performance Modeling Using Bottleneck Analysis. IEEE Comput. Archit. Lett. 17(1): 80-83 (2018) - [j45]Beumjin Cho, Sangho Lee, Meng Xu, Sangwoo Ji, Taesoo Kim, Jong Kim:
Prevention of cross-update privacy leaks on android. Comput. Sci. Inf. Syst. 15(1): 111-137 (2018) - [c77]Jiwon Choi, Hayoung Jeoung, Jihun Kim, Youngjoo Ko, Wonup Jung, Hanjun Kim, Jong Kim:
Detecting and Identifying Faulty IoT Devices in Smart Home with Context Extraction. DSN 2018: 610-621 - [c76]Joonsung Kim, Pyeongsu Park, Jaehyung Ahn, Jihun Kim, Jong Kim, Jangwoo Kim:
SSDcheck: Timely and Accurate Prediction of Irregular Behaviors in Black-Box SSDs. MICRO 2018: 455-468 - [c75]Sanghak Lee, Sangwoo Ji, Jong Kim:
Security Analysis of Mobile Web Browser Hardware Accessibility: Study with Ambient Light Sensors. WISA 2018: 3-15 - [c74]Saeyoung Oh, Jong Kim:
Reliable Rowhammer Attack and Mitigation Based on Reverse Engineering Memory Address Mapping Algorithms. WISA 2018: 146-158 - [e2]Jong Kim, Gail-Joon Ahn, Seungjoo Kim, Yongdae Kim, Javier López, Taesoo Kim:
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018. ACM 2018 [contents] - 2017
- [c73]Gyeongmin Lee, Seonyeong Heo, Bongjun Kim, Jong Kim, Hanjun Kim:
Integrated IoT programming with selective abstraction. LCTES 2017: 51-60 - [c72]Gyeongmin Lee, Seonyeong Heo, Bongjun Kim, Jong Kim, Hanjun Kim:
Rapid prototyping of IoT applications with Esperanto compiler. RSP 2017: 85-91 - [c71]Seonyeong Heo, Seungbin Song, Jong Kim, Hanjun Kim:
RT-IFTTT: Real-Time IoT Framework with Trigger Condition-Aware Flexible Polling Intervals. RTSS 2017: 266-276 - [c70]Sanghak Lee, Jiwon Choi, Jihun Kim, Beumjin Cho, Sangho Lee, Hanjun Kim, Jong Kim:
FACT: Functionality-centric Access Control System for IoT Programming Frameworks. SACMAT 2017: 43-54 - [c69]Vanesco A. J. Boehm, Jong Kim, James Won-Ki Hong:
Holistic Tracking of Products on the Blockchain Using NFC and Verified Users. WISA 2017: 184-195 - 2016
- [j44]Sangho Lee, Jong Kim, Yoonho Kim:
Preserving source- and sink-location privacy in sensor networks. Comput. Sci. Inf. Syst. 13(1): 115-130 (2016) - [j43]Bongjun Kim, Seonyeong Heo, Gyeongmin Lee, Soyeon Park, Hanjun Kim, Jong Kim:
Heterogeneous Distributed Shared Memory for Lightweight Internet of Things Devices. IEEE Micro 36(6): 16-24 (2016) - [j42]Jonghyuk Song, Sangho Lee, Jong Kim:
Inference Attack on Browsing History of Twitter Users Using Public Click Analytics and Twitter Metadata. IEEE Trans. Dependable Secur. Comput. 13(3): 340-354 (2016) - [c68]Hyungsub Kim, Sangho Lee, Jong Kim:
Inferring browser activity and status through remote monitoring of storage usage. ACSAC 2016: 410-421 - [c67]Xinyu Liu, Beumjin Cho, Jong Kim:
SD-OVS: SYN Flooding Attack Defending Open vSwitch for SDN. WISA 2016: 29-41 - 2015
- [c66]Jonghyuk Song, Sangho Lee, Jong Kim:
CrowdTarget: Target-based Detection of Crowdturfing in Online Social Networks. CCS 2015: 793-804 - [c65]Hoa Ngo, Jong Kim:
Location Privacy via Differential Private Perturbation of Cloaking Area. CSF 2015: 63-74 - [c64]Sangho Lee, Hyungsub Kim, Jong Kim:
Identifying Cross-origin Resource Status Using Application Cache. NDSS 2015 - [c63]Binh P. Nguyen, Hoa Ngo, Jihun Kim, Jong Kim:
Publishing Graph Data with Subgraph Differential Privacy. WISA 2015: 134-145 - 2014
- [j41]Sangho Lee, Jong Kim:
Early filtering of ephemeral malicious accounts on Twitter. Comput. Commun. 54: 48-57 (2014) - [c62]Hyungsub Kim, Sangho Lee, Jong Kim:
Exploring and mitigating privacy threats of HTML5 geolocation API. ACSAC 2014: 306-315 - [c61]Dongju Chae, Jihun Kim, Jangwoo Kim, Jong Kim, Seungjun Yang, Yeongpil Cho, Yongin Kwon, Yunheung Paek:
CMcloud: Cloud Platform for Cost-Effective Offloading of Mobile Applications. CCGRID 2014: 434-444 - [c60]Sangho Lee, Youngsok Kim, Jangwoo Kim, Jong Kim:
Stealing Webpages Rendered on Your Browser by Exploiting GPU Vulnerabilities. IEEE Symposium on Security and Privacy 2014: 19-33 - [c59]Jaehyeok Song, Jonghyuk Song, Jong Kim:
Detection of Heap-Spraying Attacks Using String Trace Graph. WISA 2014: 17-26 - 2013
- [j40]Sangho Lee, Jong Kim:
Fluxing botnet command and control channels with URL shortening services. Comput. Commun. 36(3): 320-332 (2013) - [j39]Hiep H. Nguyen, Jong Kim, Yoonho Kim:
Differential Privacy in Practice. J. Comput. Sci. Eng. 7(3): 177-186 (2013) - [j38]Taeho Kang, Xiang Li, Chansu Yu, Jong Kim:
A Survey of Security Mechanisms with Direct Sequence Spread Spectrum Signals. J. Comput. Sci. Eng. 7(3): 187-197 (2013) - [j37]Sangho Lee, Jong Kim:
WarningBird: A Near Real-Time Detection System for Suspicious URLs in Twitter Stream. IEEE Trans. Dependable Secur. Comput. 10(3): 183-195 (2013) - [j36]Yuna Kim, Ki-Young Jung, Tae-Hyung Kim, Jong Kim:
A distributed energy-efficient clustering scheme for deploying IDS in MANETs. Telecommun. Syst. 52(1): 85-96 (2013) - [c58]Young-min Park, Jong Kim, Yoonho Kim:
Distributed certificate authority scheme with weighted secret sharing for mobile ad-hoc networks. NOF 2013: 1-6 - [c57]Jihun Kim, Dongju Chae, Jangwoo Kim, Jong Kim:
Guide-copy: fast and silent migration of virtual machine for datacenters. SC 2013: 66:1-66:12 - [c56]Hayoung Lee, Taeho Kang, Sangho Lee, Jong Kim, Yoonho Kim:
Punobot: Mobile Botnet Using Push Notification Service in Android. WISA 2013: 124-137 - [c55]Jonghyuk Song, Sangho Lee, Jong Kim:
I know the shortened URLs you clicked on Twitter: inference attack using public click analytics and Twitter metadata. WWW 2013: 1191-1200 - 2012
- [j35]Sangho Lee, Jin Seok Kim, Sung Je Hong, Jong Kim:
Distance Bounding with Delayed Responses. IEEE Commun. Lett. 16(9): 1478-1481 (2012) - [j34]Jin Seok Kim, Dae Hyun Yum, Sung Je Hong, Jong Kim, Pil Joong Lee:
Security Condition for Exact Localization in Wireless Ad Hoc Networks. IEICE Trans. Commun. 95-B(7): 2459-2462 (2012) - [j33]Sangho Lee, Hay-Rim Lee, Seungkwang Lee, Jong Kim:
DRMFS: A file system layer for transparent access semantics of DRM-protected contents. J. Syst. Softw. 85(5): 1058-1066 (2012) - [j32]Jin Seok Kim, Dae Hyun Yum, Pil Joong Lee, Sung Je Hong, Jong Kim:
A Hybrid Sonar Algorithm for Submersible Cars to Verify the Location of Senders. IEEE Trans. Veh. Technol. 61(6): 2707-2714 (2012) - [c54]Yuseok Jeon, Tae-Hyung Kim, Yuna Kim, Jong Kim:
LT-OLSR: Attack-tolerant OLSR against link spoofing. LCN 2012: 216-219 - [c53]Sangho Lee, Jong Kim:
WarningBird: Detecting Suspicious URLs in Twitter Stream. NDSS 2012 - 2011
- [c52]Sangho Lee, Jong Kim:
A batch rekeying time decision algorithm for IPTV systems. CCNC 2011: 901-905 - [c51]Byoungyoung Lee, Jinoh Oh, Hwanjo Yu, Jong Kim:
Protecting location privacy using location semantics. KDD 2011: 1289-1297 - [c50]Jonghyuk Song, Sangho Lee, Jong Kim:
Spam Filtering in Twitter Using Sender-Receiver Relationship. RAID 2011: 301-317 - 2010
- [j31]Yuna Kim, Wan Yeon Lee, Kyong Hoon Kim, Jong Kim:
AdaFF: Adaptive Failure-Handling Framework for Composite Web Services. IEICE Trans. Inf. Syst. 93-D(4): 834-842 (2010) - [j30]Kyong Hoon Kim, Wan Yeon Lee, Jong Kim, Rajkumar Buyya:
SLA-Based Scheduling of Bag-of-Tasks Applications on Power-Aware Cluster Systems. IEICE Trans. Inf. Syst. 93-D(12): 3194-3201 (2010) - [c49]Byoungyoung Lee, Yuna Kim, Jong Kim:
binOb+: a framework for potent and stealthy binary obfuscation. AsiaCCS 2010: 271-281 - [c48]Sangho Lee, Heejin Park, Jong Kim:
A secure and mutual-profitable DRM interoperability scheme. ISCC 2010: 75-80
2000 – 2009
- 2009
- [j29]Sangho Lee, Jong Kim, Sung Je Hong:
Redistributing time-based rights between consumer devices for content sharing in DRM system. Int. J. Inf. Sec. 8(4): 263-273 (2009) - [j28]Sangho Lee, Jong Kim, Sung Je Hong:
Security weakness of Tseng's fault-tolerant conference-key agreement protocol. J. Syst. Softw. 82(7): 1163-1167 (2009) - [c47]Yuna Kim, Jong Kim, Junghei You, Heejae Park:
Exclusion of Forged Files from Multi-source Downloadable P2P Systems. AINA 2009: 608-615 - 2008
- [j27]Heejae Park, Jong Kim:
Copyright Protection for Modifiable Digital Content Based on Distributed Environment. IEICE Trans. Inf. Syst. 91-D(5): 1390-1397 (2008) - [j26]Kyong Hoon Kim, Wan Yeon Lee, Jong Kim:
Energy-Aware Error Correction for QoS-Provisioning Real-Time Communications in Wireless Networks. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 91-A(7): 1682-1685 (2008) - [j25]Jae Keun Park, Wan Yeon Lee, Sung Je Hong, Jong Kim:
Dynamic Two-Tier Cell Structure for Bandwidth Reservation of Handoffs in Cellular Networks. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 91-A(10): 3003-3005 (2008) - [c46]Tae-Hyung Kim, Young-Sik Choi, Jong Kim, Sung Je Hong:
Annulling SYN Flooding Attacks with Whitelist. AINA Workshops 2008: 371-376 - [c45]Yuna Kim, Jong Kim:
Allowing user-specified failure handling in web services composition. ICUIMC 2008: 452-458 - 2007
- [j24]O-Hoon Kwon, So Young Lee, Jong Kim:
FileTrust: Reputation Management for Reliable Resource Sharing in Structured Peer-to-Peer Networks. IEICE Trans. Commun. 90-B(4): 826-835 (2007) - [c44]Kyong Hoon Kim, Rajkumar Buyya, Jong Kim:
Power Aware Scheduling of Bag-of-Tasks Applications with Deadline Constraints on DVS-enabled Clusters. CCGRID 2007: 541-548 - [c43]Kyong Hoon Kim, Jong Kim:
An Adaptive DVS Checkpointing Scheme for Fixed-Priority Tasks with Reliability Constraints in Dependable Real-Time Embedded Systems. ICESS 2007: 560-571 - [e1]Yann-Hang Lee, Heung-Nam Kim, Jong Kim, Yongwan Park, Laurence Tianruo Yang, Sung Won Kim:
Embedded Software and Systems, [Third] International Conference, ICESS 2007, Daegu, Korea, May 14-16, 2007, Proceedings. Lecture Notes in Computer Science 4523, Springer 2007, ISBN 978-3-540-72684-5 [contents] - 2006
- [j23]Heejo Lee, Jong Kim, Wan Yeon Lee:
Resiliency of Network Topologies under Path-Based Attacks. IEICE Trans. Commun. 89-B(10): 2878-2884 (2006) - [c42]Bong-Soo Roh, O-Hoon Kwon, Sung Je Hong, Jong Kim:
The Exclusion of Malicious Routing Peers in Structured P2P Systems. AP2PC 2006: 43-50 - [c41]So Young Lee, O-Hoon Kwon, Jong Kim, Sung Je Hong:
Mitigating the Impact of Liars by Reflecting Peer's Credibility on P2P File Reputation Systems. AP2PC 2006: 111-122 - [c40]Kyong Hoon Kim, Rajkumar Buyya, Jong Kim:
Imprecise Computation Grid Application Model for Flexible Market-Based Resource Allocation. CCGRID 2006: 654-658 - [c39]Deok Jin Kim, Tae-Hyung Kim, Jong Kim, Sung Je Hong:
Return Address Randomization Scheme for Annuling Data-Injection Buffer Overflow Attacks. Inscrypt 2006: 238-252 - [c38]Kyong Hoon Kim, Jong Kim, Sung Je Hong:
Dual-Mode r-Reliable Task Model for Flexible Scheduling in Reliable Real-Time Systems. EUC 2006: 308-317 - [c37]Kyong Hoon Kim, Jong Kim:
An Energy-Efficient FEC Scheme for Weakly Hard Real-Time Communications in Wireless Networks. RTCSA 2006: 415-419 - [c36]Ki Hun Lee, Yuna Kim, Sung Je Hong, Jong Kim:
PolyI-D: Polymorphic Worm Detection Based on Instruction Distribution. WISA 2006: 45-59 - 2005
- [j22]Kyong Hoon Kim, Jong Kim, Sung Je Hong:
An Adaptive FEC Scheme for Firm Real-Time Multimedia Communications in Wireless Networks. IEICE Trans. Commun. 88-B(7): 2794-2801 (2005) - [c35]So Young Lee, O-Hoon Kwon, Jong Kim, Sung Je Hong:
A Trust Management Scheme in Structured P2P Systems. AP2PC 2005: 30-43 - [c34]Byung Joon Kim, Kyong Hoon Kim, Sung Je Hong, Jong Kim:
Ticket-Based Grid Services Architecture for Dynamic Virtual Organizations. EGC 2005: 394-403 - [c33]Jae Keun Park, Sung Je Hong, Jong Kim:
Mobile Multicast Routing Protocol Using Prediction of Dwelling Time of a Mobile Host. ICN (2) 2005: 884-891 - [c32]O-Hoon Kwon, Seung-Min Lee, Heejo Lee, Jong Kim, Sang Cheon Kim, Gun Woo Nam, Joong Gil Park:
HackSim: An Automation of Penetration Testing for Remote Buffer Overflow Vulnerabilities. ICOIN 2005: 652-661 - [c31]Junyoung Park, Sung Je Hong, Jong Kim:
Energy-saving design technique achieved by latched pass-transistor adiabatic logic. ISCAS (5) 2005: 4693-4696 - [c30]Ju Yeob Kim, Sung Je Hong, Jong Kim:
Parallely testable design for detection of neighborhood pattern sensitive faults in high density DRAMs. ISCAS (6) 2005: 5854-5857 - [c29]Ha Won Kim, Sung Je Hong, Jong Kim:
Adaptive Location Management Scheme for Mobile IP. PerCom Workshops 2005: 263-267 - [c28]So Young Lee, O-Hoon Kwon, Jong Kim, Sung Je Hong:
A Reputation Management System in Structured Peer-to-Peer Networks. WETICE 2005: 362-367 - 2004
- [j21]Seung-Hyun Kim, Kyong Hoon Kim, Jong Kim, Sung Je Hong, Sangwan Kim:
Workflow-Based Authorization Service in the Grid. J. Grid Comput. 2(1): 43-55 (2004) - [c27]Kyong Hoon Kim, Jong Kim, Sung Je Hong:
Best-Effort Scheduling (m, k)-Firm Real-Time Tasks Based on the (m, k)-Firm Constraint Meeting Probability. ESA/VLSI 2004: 240-248 - [c26]Heejae Park, Jong Kim:
Modifiable Digital Content Protection in P2P. ISC 2004: 379-390 - [c25]Heejo Lee, Jong Kim:
Attack Resiliency of Network Topologies. PDCAT 2004: 638-641 - [c24]Byung Joon Kim, Sung Je Hong, Jong Kim:
Ticket-based fine-grained authorization service in the dynamic VO environment. SWS 2004: 29-36 - 2003
- [j20]Wan Yeon Lee, Sung Je Hong, Jong Kim, Sunggu Lee:
Dynamic load balancing for switch-based networks. J. Parallel Distributed Comput. 63(3): 286-298 (2003) - [j19]Wan Yeon Lee, Sung Je Hong, Jong Kim:
On-line scheduling of scalable real-time tasks on multiprocessor systems. J. Parallel Distributed Comput. 63(12): 1315-1324 (2003) - [j18]Hyo-Chang Nam, Jong Kim, Sung Je Hong, Sunggu Lee:
Secure checkpointing. J. Syst. Archit. 48(8-10): 237-254 (2003) - [j17]Heejo Lee, Jong Kim, Sung Je Hong, Sunggu Lee:
Task scheduling using a block dependency DAG for block-oriented sparse Cholesky factorization. Parallel Comput. 29(1): 135-159 (2003) - [j16]Heejo Lee, Jong Kim, Sung Je Hong, Sunggu Lee:
Processor Allocation and Task Scheduling of Matrix Chain Products on Parallel Systems. IEEE Trans. Parallel Distributed Syst. 14(4): 394-407 (2003) - [c23]Seung-Hyun Kim, Jong Kim, Sung Je Hong, Sangwan Kim:
Workflow-based Authorization Service in Grid. GRID 2003: 94-100 - [c22]Heejae Park, Jong Kim:
PCMHoDC. A Scheme to Protect Copyright & Modification History of Digital Contents. SEC 2003: 85-96 - [c21]Yuna Kim, Jong Kim:
Web Prefetching Using Display-Based Prediction. Web Intelligence 2003: 486-489 - 2001
- [c20]Jong Kim, Kang G. Shin:
Performance Evaluation of Dependable Real-Time Communication with Elastic QoS. DSN 2001: 295-303 - [c19]Hyo-Chang Nam, Jong Kim, Sung Je Hong, Sunggu Lee:
A Secure Checkpointing System. PRDC 2001: 49-56 - 2000
- [j15]Wan Yeon Lee, Sung Je Hong, Jong Kim:
On the Configuration of Switch-Based Networks with Wormhole Routing. J. Interconnect. Networks 1(2): 95-114 (2000) - [c18]Heejo Lee, Jong Kim, Sung Je Hong, Sunggu Lee:
Task Scheduling using a Block Dependency DAG for Block-Oriented Sparse Cholesky Factorization. SAC (2) 2000: 641-648
1990 – 1999
- 1999
- [j14]