• Publications
  • Influence
Real-time dynamic voltage scaling for low-power embedded operating systems
This paper presents a class of novel algorithms that modify the OS's real-time scheduler and task management service to provide significant energy savings while maintaining real- time deadline guarantees, and shows that these RT-DVS algorithms closely approach the theoretical lower bound on energy consumption.
Efficient Discovery of Spectrum Opportunities with MAC-Layer Sensing in Cognitive Radio Networks
  • Hyoil Kim, K. Shin
  • Computer Science
    IEEE Transactions on Mobile Computing
  • 1 May 2008
This work develops a sensing-period optimization mechanism and an optimal channel-sequencing algorithm, as well as an environment- adaptive channel-usage pattern estimation method that is shown to track time-varying channel-parameters accurately.
Minimum-time control of robotic manipulators with geometric path constraints
Conventionally, robot control algorithms are divided into two stages, namely, path or trajectory planning and path tracking (or path control). This division has been adopted mainly as a means of
Fingerprinting Electronic Control Units for Vehicle Intrusion Detection
An anomaly-based intrusion detection system (IDS), called Clock-based IDS (CIDS), which measures and then exploits the intervals of periodic in-vehicle messages for fingerprinting ECUs and facilitates a rootcause analysis; identifying which ECU mounted the attack.
The BLUE active queue management algorithms
Stochastic Fair Blue is proposed and evaluated, a queue management algorithm which can identify and rate-limit nonresponsive flows using a very small amount of state information and is shown to perform significantly better than Red, both in terms of packet loss rates and buffer size requirements in the network.
Goodput Analysis and Link Adaptation for IEEE 802.11a Wireless LANs
In-depth simulation shows that the proposed MPDU-based link adaptation scheme outperforms the single-mode schemes and the autorate fallback (ARF) scheme-which is used in Lucent Technologies' WaveLAN-II networking devices-significantly in terms of the average goodput, the frame drop rate, and the average number of transmission attempts per data frame delivery.
A self-configuring RED gateway
This paper shows that the effectiveness of RED depends, to a large extent, on the appropriate parameterization of the RED queue, and proposes and experiments with more adaptive RED gateways which self-parameterize themselves based on the traffic mix.
Automated control of multiple virtualized resources
Experimental evaluation with RUBiS and TPC-W benchmarks along with production-trace-driven workloads indicates that AutoControl can detect and mitigate CPU and disk I/O bottlenecks that occur over time and across multiple nodes by allocating each resource accordingly.
Detecting SYN flooding attacks
A simple and robust mechanism that not only sets alarms upon detection of ongoing SYN flooding attacks, but also reveals the location of the flooding sources without resorting to expensive IP traceback.
Performance Guarantees for Web Server End-Systems: A Control-Theoretical Approach
This paper uses feedback control theory to achieve overload protection, performance guarantees, and service differentiation in the presence of load unpredictability, and shows that control-theoretic techniques offer a sound way of achieving desired performance in performance-critical Internet applications.