Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Bum-Joo Park is active.

Publication


Featured researches published by Bum-Joo Park.


Computer-aided Design | 1995

Representing the Voronoi diagram of a simple polygon using rational quadratic Bézier curves

Deok-Soo Kim; Il-Kyu Hwang; Bum-Joo Park

Abstract The Voronoi diagram of a set of geometric entities on a plane, such as points, line segments, or arcs, is a collection of Voronoi polygons associated with each entity, where the Voronoi polygon of an entity is a set of points which are closer to the associated entity than any other entity. A Voronoi diagram is one of the most fundamental geometrical constructs, and it is well known for its theoretical elegance and the wealth of applications. Various geometric problems can be solved with the aid of Voronoi diagrams. The paper discusses an algorithm to construct the Voronoi diagram of the interior of a simple polygon which consists of simple curves such as line segments as well as arcs in a plane with O(N log N) time complexity by the use of a divide-and-conquer scheme. Particular emphasis is placed on the parameterization of bisectors using a rational quadratic Bezier curve representation which unifies four different bisector cases.


trust and privacy in digital business | 2005

A self-healing mechanism for an intrusion tolerance system

Bum-Joo Park; Kiejin Park; Sung-Soo Kim

The dependability analysis of an ITS (Intrusion Tolerance System – a system that performs continuously minimal essential services even when the computer system is partially compromised because of intrusions) is essential for the design of the ITS. In this paper, we applied self-healing mechanism, the core technology of autonomic computing to analyze the dependability of the ITS. In other words, we described the state transition of the ITS composed of a primary server and a backup server utilizing two factors of self-healing mechanism (fault model and system response) and analyzed it using M/G/1 queuing technique. We also evaluated the availability of the ITS through simulation experiments.


computer and information technology | 2007

A Mechanism for Improving Web Server Performance Using Fuzzy Concept

Bum-Joo Park; Kiejin Park; Dongmin Shin; Sung-Soo Kim

This paper presents a mechanism to improve Web server performance with fuzzy-based techniques. A load balancing mechanism based on the fuzzy control technique is developed in such a way that ambiguous situations caused by workload estimation of cluster- based Web servers, client request rates, and dynamic request rates can be represented in an effective way. Extensive experiments show that the fuzzy-based performance isolation technique improves the performance of Web servers in terms of the 95- percentile response times.


The Kips Transactions:parta | 2005

A Survivability Model of an Intrusion Tolerance System

Bum-Joo Park; Kiejin Park; Sungsoo Kim

There have been large concerns about survivability defined as the capability of a system to perform a mission-critical role, in a timely manner, in the presence of attacks, failures. In particular, One of the most important core technologies required for the design of the ITS(Intrusion Tolerance System) that performs continuously minimal essential services even when the computer system is partially compromised because of intrusions is the survivability one of In included the dependability analysis of a reliability and availability etc. quantitative dependability analysis of the In. In this Paper, we applied self-healing mechanism utilizing two factors of self-healing mechanism (fault model and system response), the core technology of autonomic computing to secure the protection power of the ITS and consisted of a state transition diagram of the ITS composed of a primary server and a backup server. We also defined the survivability, availability, and downtime cost of the ITS, and then performed studies on simulation experiments and two cases of vulnerability attack. Simulation results show that intrusion tolerance capability at the initial state is more important than coping capability at the attack state in terms of the dependability enhancement.


IEICE Transactions on Communications | 2009

A Performance Isolation Mechanism Based on Fuzzy Technique for Web Server Load Balancing

Bum-Joo Park; Kiejin Park; Bongjun Kim


Journal of KIISE:Computer Systems and Theory | 2008

A Fuzzy Technique-based Web Server Performance Improvement Using a Load Balancing Mechanism

Bum-Joo Park; Kiejin Park; Myeong-Koo Kang; Sungsoo Kim


parallel and distributed processing techniques and applications | 2005

A Dependability Analysis of an Intrusion Tolerance System.

Bum-Joo Park; Kiejin Park; Sungsoo Kim


Journal of KIISE:Computer Systems and Theory | 2005

A Vulnerability Analysis of Intrusion Tolerance System using Self-healing Mechanism

Bum-Joo Park; Kiejin Park; Sungsoo Kim


대한산업공학회 춘계공동학술대회 논문집 | 1994

Divide and Conquer Algorithm for a Voronol Diagram of Simple Curves

Deok-Soo Kim; Il-Kyu Hwang; Bum-Joo Park; Hyo-Dae Park


대한산업공학회 춘계공동학술대회 논문집 | 1994

C++ for CAD/CAM Applications

Il-Kyu Hwang; Bum-Joo Park; Deok-Soo Kim

Collaboration


Dive into the Bum-Joo Park's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge