Call for Papers
About the Journal
Editorial Board
Publication Ethics
Instructions for Authors
Current Issue
Back Issues
Search for Articles

JCSE, vol. 5, no. 1, pp.32-32, March, 2011


Preface for KOCSEA Special Issue

Kyung Dong Ryu, Kang-Won Lee, Jihie Kim
IBM T.J. Watson Research Center, NY, USA IBM T.J. Watson Research Center, NY, USA University of South California, LA, USA

Abstract: We are delighted to present this special issue focused on the research activities by the members of KOCSEA (Korean Computer Scientists and Engineers Association in America). KOCSEA is a one-of-a-kind organization; no other ethnic group has such a close-knit organization by such well-recognized researchers in the Computer Science and Information Technology field. KOCSEA members are top researchers in U.S. academy and industry, and are dedicated to making a technological impact in both U.S. and Korea. Here is a brief history. KOCSEA was founded in 1983 by now former POSTECH President Park Chan-Mo, Professor Kane Kim at UC Irvine, and IBM Research Staff Member Emeritus Hong Sejune. Since then, it has gradually gathered momentum to become a significant organization. While KOCSEA has been a virtual organization in the 80s and 90s, it has experienced a radical transformation in 2006, when the KOCSEA officers started organizing KOCSEA annual symposia. Since then, several dozen KOCSEA members gather together every year with invited speakers who are key leaders in select fields and other guest researchers from KSEA for technical discussions, lasting a day and a half. The research papers presented in this special issue are a small sample of research efforts by KOCSEA members. The first paper by J. Ryoo et al. deals with a very important problem related to personallevel security. With the proliferation of mobile computing devices, such as laptops, tablets, and smart phones, personal level security can have direct or indirect impact on the organizational-level security. However, past research has been so far focused on security issues for large organization, or limited topics for personal security (e.g., threat discovery). This paper tries to address this important problem with a more systematic framework considering not just infrastructure and device aspects, but also soft metrics such as usage models and security literacy. The second paper by J. Kim et al. proposes a novel solution to another personal security concern, online credit card transactions. The work provides a new protocol, named NNCC, to use a symbolic token to make secure online credit card payments without providing credit card numbers. The proposed solution can be easily applied to the current card paying system with minor modifications. The third paper by M. Kim et al. presents an interesting way to automatically identify unusual mobility patterns of ordinary people from location information supplied by GPS tracking and wireless connections. The authors show the efficacy of their detection algorithm using real-life wireless connection traces collected from the Dartmouth University campus. Finally, the fourth paper by K. Kapitanova et al. solves challenges of processing real-time stream data with situation awareness by employing formal data stream modeling and analysis. This formal model provides a framework that can easily and accurately evaluates performance of different real-time data stream management configurations with various QoS mechanisms and query models.

Keyword: No keyword

Full Paper:   95 Downloads, 3099 View

ⓒ Copyright 2010 KIISE – All Rights Reserved.    
Korean Institute of Information Scientists and Engineers (KIISE)   #401 Meorijae Bldg., 984-1 Bangbae 3-dong, Seo-cho-gu, Seoul 137-849, Korea
Phone: +82-2-588-9240    Fax: +82-2-521-1352    Homepage:    Email: