default search action
Keun Soo Yim
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i3]Keun Soo Yim:
Predicting Likely-Vulnerable Code Changes: Machine Learning-based Vulnerability Protections for Android Open Source Project. CoRR abs/2405.16655 (2024) - [i2]Keun Soo Yim:
The Task-oriented Queries Benchmark (ToQB). CoRR abs/2406.02943 (2024) - [i1]Keun Soo Yim, Iliyan Malchev, Andrew Hsieh, Dave Burke:
TREBLE: Fast Software Updates by Creating an Equilibrium in an Active Software Ecosystem of Globally Distributed Stakeholders. CoRR abs/2410.02809 (2024) - 2022
- [c21]Uttam Thakore, Muntasir Rahman, Xin Xia, Keun Soo Yim:
Message from the ISSRE 2022 Industry Track Committee Chairs. ISSRE Workshops 2022: xv
2010 – 2019
- 2019
- [j2]Keun Soo Yim, Iliyan Malchev, Andrew Hsieh, Dave Burke:
Treble: Fast Software Updates by Creating an Equilibrium in an Active Software Ecosystem of Globally Distributed Stakeholders. ACM Trans. Embed. Comput. Syst. 18(5s): 104:1-104:23 (2019) - 2016
- [c20]Keun Soo Yim:
Evaluation Metrics of Service-Level Reliability Monitoring Rules of a Big Data Service. ISSRE 2016: 376-387 - [c19]Keun Soo Yim:
The Rowhammer Attack Injection Methodology. SRDS 2016: 1-10 - 2014
- [c18]Keun Soo Yim:
Characterization of Impact of Transient Faults and Detection of Data Corruption Errors in Large-Scale N-Body Programs Using Graphics Processing Units. IPDPS 2014: 458-467 - [c17]Keun Soo Yim:
Norming to Performing: Failure Analysis and Deployment Automation of Big Data Software Developed by Highly Iterative Models. ISSRE 2014: 144-155 - 2013
- [b1]Keun Soo Yim:
From experiment to design - fault characterization and detection in parallel computer systems using computational accelerators. University of Illinois Urbana-Champaign, USA, 2013 - [c16]Keun Soo Yim, Zbigniew Kalbarczyk, Ravishankar K. Iyer:
Pluggable Watchdog: Transparent Failure Detection for MPI Programs. IPDPS 2013: 489-500 - 2011
- [c15]Keun Soo Yim, David Hreczany, Ravishankar K. Iyer:
HTAF: Hybrid Testing Automation Framework to Leverage Local and Global Computing Resources. ICCSA (3) 2011: 479-494 - [c14]Keun Soo Yim, Cuong Manh Pham, Mushfiq Saleheen, Zbigniew Kalbarczyk, Ravishankar K. Iyer:
Hauberk: Lightweight Silent Data Corruption Error Detector for GPGPU. IPDPS 2011: 287-300 - [c13]Keun Soo Yim, Ravishankar K. Iyer:
A Codesigned Fault Tolerance System for Heterogeneous Many-Core Processors. IPDPS Workshops 2011: 2053-2056 - 2010
- [c12]Keun Soo Yim, Zbigniew Kalbarczyk, Ravishankar K. Iyer:
Measurement-based analysis of fault and error sensitivities of dynamic memory. DSN 2010: 431-436
2000 – 2009
- 2009
- [c11]Keun Soo Yim, Zbigniew Kalbarczyk, Ravishankar K. Iyer:
Quantitative Analysis of Long-Latency Failures in System Software. PRDC 2009: 23-30 - 2006
- [c10]Keun Soo Yim, Jae Don Lee, Jungkeun Park, Jeong-Joon Yoo, Chaeseok Im, Yeonseung Ryu:
A Software Reproduction of Virtual Memory for Deeply Embedded Systems. ICCSA (1) 2006: 1000-1009 - [c9]Keun Soo Yim, Jeong-Joon Yoo, Jae Don Lee, Jihong Kim:
Operating System Support for Procedural Abstraction in Embedded Systems. RTCSA 2006: 378-384 - [c8]Long-zhe Han, Yeonseung Ryu, Keun Soo Yim:
CATA: A Garbage Collection Scheme for Flash Memory File Systems. UIC 2006: 103-112 - 2005
- [c7]Keun Soo Yim, Jihong Kim, Kern Koh:
A fast start-up technique for flash memory based computing systems. SAC 2005: 843-849 - 2004
- [j1]Keun Soo Yim, Hyokyung Bahn, Kern Koh:
A flash compression layer for SmartMedia card systems. IEEE Trans. Consumer Electron. 50(1): 192-197 (2004) - [c6]Keun Soo Yim, Jihong Kim, Kern Koh:
An Energy-Efficient Routing and Reporting Scheme to Exploit Data Similarities in Wireless Sensor Networks. EUC 2004: 515-527 - [c5]Keun Soo Yim, Jihong Kim, Kern Koh:
An Energy-Efficient Reliable Transport for Wireless Sensor Networks. ICOIN 2004: 54-64 - [c4]Keun Soo Yim, Jang-Soo Lee, Jihong Kim, Shin-Dug Kim, Kern Koh:
A Space-Efficient On-Chip Compressed Cache Organization for High Performance Computing. ISPA 2004: 952-964 - [c3]Keun Soo Yim, Hojung Cha, Kern Koh:
NIC-NET: A Host-Independent Network Solution for High-End Network Servers. PDCAT 2004: 401-405 - [c2]Keun Soo Yim, Jihong Kim, Kern Koh:
Performance Analysis of On-Chip Cache and Main Memory Compression Systems for High-End Parallel Computers. PDPTA 2004: 469-475 - 2003
- [c1]Keun Soo Yim, Kern Koh, Hyokyung Bahn:
A Compressed Page Management Scheme for NAND-Type Flash Memory. VLSI 2003: 266-271
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-08 20:29 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint