JCSE, vol. 5, no. 1, pp.32-32, March, 2011
DOI:
Preface for KOCSEA Special Issue
Kyung Dong Ryu, Kang-Won Lee, Jihie Kim IBM T.J. Watson Research Center, NY, USA
IBM T.J. Watson Research Center, NY, USA
University of South California, LA, USA
Abstract: We are delighted to present this special issue focused on the research activities by the
members of KOCSEA (Korean Computer Scientists and Engineers Association in America).
KOCSEA is a one-of-a-kind organization; no other ethnic group has such a close-knit
organization by such well-recognized researchers in the Computer Science and Information
Technology field. KOCSEA members are top researchers in U.S. academy and industry, and
are dedicated to making a technological impact in both U.S. and Korea. Here is a brief
history. KOCSEA was founded in 1983 by now former POSTECH President Park Chan-Mo,
Professor Kane Kim at UC Irvine, and IBM Research Staff Member Emeritus Hong Sejune.
Since then, it has gradually gathered momentum to become a significant organization. While
KOCSEA has been a virtual organization in the 80s and 90s, it has experienced a radical
transformation in 2006, when the KOCSEA officers started organizing KOCSEA annual
symposia. Since then, several dozen KOCSEA members gather together every year with
invited speakers who are key leaders in select fields and other guest researchers from KSEA
for technical discussions, lasting a day and a half. The research papers presented in this
special issue are a small sample of research efforts by KOCSEA members.
The first paper by J. Ryoo et al. deals with a very important problem related to personallevel
security. With the proliferation of mobile computing devices, such as laptops, tablets,
and smart phones, personal level security can have direct or indirect impact on the
organizational-level security. However, past research has been so far focused on security
issues for large organization, or limited topics for personal security (e.g., threat discovery).
This paper tries to address this important problem with a more systematic framework
considering not just infrastructure and device aspects, but also soft metrics such as usage
models and security literacy.
The second paper by J. Kim et al. proposes a novel solution to another personal security
concern, online credit card transactions. The work provides a new protocol, named NNCC, to
use a symbolic token to make secure online credit card payments without providing credit
card numbers. The proposed solution can be easily applied to the current card paying system
with minor modifications.
The third paper by M. Kim et al. presents an interesting way to automatically identify
unusual mobility patterns of ordinary people from location information supplied by GPS
tracking and wireless connections. The authors show the efficacy of their detection algorithm
using real-life wireless connection traces collected from the Dartmouth University campus.
Finally, the fourth paper by K. Kapitanova et al. solves challenges of processing real-time
stream data with situation awareness by employing formal data stream modeling and
analysis. This formal model provides a framework that can easily and accurately evaluates
performance of different real-time data stream management configurations with various
QoS mechanisms and query models.
Keyword:
No keyword
Full Paper: 134 Downloads, 4247 View
|