Joonhyouk Jang

  • Citations Per Year
Learn More
As the demand for the high-speed processing of mass data increases, the use of in-memory systems is increasing. In-memory systems enable data to be accessed in memory, thereby allowing for its high-speed processing. However, as the size and volume of the data increases, its recovery speed from a replicated server gets slower. In this paper, we propose a(More)
The portion of HFT in market is growing rapidly. To process hundreds of thousands of orders per second which are requested by algorithms trading, not by humans, trading systems are required to equip high performance computer, network devices, and efficient software solutions. To achieve performance requirements, financial trading software processes data in(More)
Recently, many studies have been conducted on key-value store as a platform for distributed storage services. A key-value store manages data as key-value pairs using hash tables. In this paper, we propose a hybrid hash table management technique to improve the performance of single nodes in a key-value store. The proposed scheme uses cuckoo hashing and(More)
In this paper, we propose a steganography-based software watermarking scheme to protect Android applications from software piracy. Considering the resource limitations in mobile devices, it is difficult to apply previous software watermarking schemes in mobile applications. To decrease the watermarking overhead in a watermarking scheme, such as a slowdown(More)
Today's embedded systems are required to have stronger wired/wireless communication capability. Due to strict limitations on how they utilize resources such as power, address space, and processing ability, network protocols for embedded systems are designed to make the best use of constrained resources. They are developed in a way that allows for support(More)
The traditional TCP/IP protocol stack is associated with shortcomings related to the context-switching overhead and redundant data copying. The software-based TOE (TCP/ IP Offload Engine), also known as lightweight TCP/IP, was developed to optimize the TCP/IP protocol stack to run on an embedded system. In this paper, we propose the design of a lightweight(More)
The proliferation of ubiquitous computing has led to the development of various types of sensor devices for human-computer interaction (HCI). However, the availability of developer tools is lacking in comparison with the development of sensor devices. This shortcoming has been partially addressed by the introduction of open source hardware but it is(More)
A software birthmark is a set of characteristics extracted from an executable program. Software birthmark techniques are used to detect program theft by determining the similarity between two different programs. In this paper, we propose a software birthmark based on a graph-based structure comparison scheme. By enhancing the function level comparison and(More)
In recent times, with the advancing of the graphics processing unit (GPU), parallel computing using general-purpose computing on GPU (GPGPU) is expanding. This is achieved through a processing speed faster than those of traditional computing environments across many fields, such as science, medicine, engineering, and analysis. However, there are many(More)