My Hong - Academia.edu (original) (raw)

Papers by My Hong

Research paper thumbnail of A Variational Level Set Approach to Multiphase Motion

The point at which they meet (the triple junction) has prescribed angles which can be shown [12] ... more The point at which they meet (the triple junction) has prescribed angles which can be shown [12] to be defined by A coupled level set method for the motion of multiple junctions (of, e.g., solid, liquid, and grain boundaries), which follows the gradient flow for an energy functional consisting of surface tension (proportional to length) and bulk energies (proportional to area), is

Research paper thumbnail of Convex hulls of finite sets of points in two and three dimensions

Communications of The ACM, 1977

4. Bobrow, DG, Burchfiel, JD, Murphy, DL, and Tomlinson, RS TENEX, a paged time sharing system fo... more 4. Bobrow, DG, Burchfiel, JD, Murphy, DL, and Tomlinson, RS TENEX, a paged time sharing system for the PDP-10. Comm. ACM15, 3 (March 1972), 135-143. 5. Bobrow, DG, and Murphy, DL The structure of a LISP system using two level storage. Comm. ACM 10, 3 ( ...

Research paper thumbnail of A group mobility model for ad hoc wireless networks

In this paper, we present a survey of various mobility models in both cellular networks and multi... more In this paper, we present a survey of various mobility models in both cellular networks and multi-hop networks. We show that group motion occurs frequently in ad hoc networks, and introduce a novel group mobility model -Reference Point Group Mobility (RPGM) -to represent the relationship among mobile hosts. RPGM can be readily applied to many existing applications. Moreover; by proper choice of parameters, RPMG can be used to model several mobility models which were previously proposed. One of the main themes of this paper is to investigate the impact of the mobility model on the performance of a specijc network protocol or application. To this end, we have applied our RPGM model to two different network protocol scenarios, clustering and routing, and have evaluated network pedormance under dtzerent mobility patterns and for different protocol implementations. As expected, the results indicate that dtfferent mobility patterns affect the various protocols in dtfferent ways. In particular; the ranking of routing algorithms is influenced by the choice of mobility pattern.

Research paper thumbnail of Freenet: A Distributed Anonymous Information Storage and Retrieval System

We describe Freenet, an adaptive peer-to-peer network application that permits the publication, r... more We describe Freenet, an adaptive peer-to-peer network application that permits the publication, replication, and retrieval of data while protecting the anonymity of both authors and readers. Freenet operates as a network of identical nodes that collectively pool their storage space to store data files and cooperate to route requests to the most likely physical location of data. No broadcast search or centralized location index is employed. Files are referred to in a location-independent manner, and are dynamically replicated in locations near requestors and deleted from locations where there is no interest. It is infeasible to discover the true origin or destination of a file passing through the network, and dificult for a node operator to determine or be held responsible for the actual physical contents of her own node.

Research paper thumbnail of Isolation of a Common Receptor for Coxsackie B Viruses and Adenoviruses 2 and 5

Science, 1997

A complementary DNA clone has been isolated that encodes a coxsackievirus and adenovirus receptor... more A complementary DNA clone has been isolated that encodes a coxsackievirus and adenovirus receptor (CAR). When transfected with CAR complementary DNA, nonpermissive hamster cells became susceptible to coxsackie B virus attachment and infection. Furthermore, consistent with previous studies demonstrating that adenovirus infection depends on attachment of a viral fiber to the target cell, CAR-transfected hamster cells bound adenovirus in a fiber-dependent fashion and showed a 100-fold increase in susceptibility to virus-mediated gene transfer. Identification of CAR as a receptor for these two unrelated and structurally distinct viral pathogens is important for understanding viral pathogenesis and has implications for therapeutic gene delivery with adenovirus vectors.

Research paper thumbnail of Invariant Image Recognition by Zernike Moments

IEEE Transactions on Pattern Analysis and Machine Intelligence, 1990

... 2, pp. 29-44, 1987. [IO] H. Freeman, “Shape description via the use of critical poin!s.” Pat-... more ... 2, pp. 29-44, 1987. [IO] H. Freeman, “Shape description via the use of critical poin!s.” Pat-An important problem in pattern analysis is the automatic rec-tern Recogn., vol. ... ALIREZA KHOTANZAD AND YAW HUA HONG features in a number of applications [ 11, 121, [7], [ 151. ...

Research paper thumbnail of Stability analysis of networked control systems

This article proposes a novel approach to assess the stability of linear systems with delayed and... more This article proposes a novel approach to assess the stability of linear systems with delayed and sampled-data inputs. The paper considers both asynchronous sampling and input delay based on an extension of existing results on the stability of sampled-data systems to the case where a delay is introduced in the control loop. The proposed method provides easy tractable sufficient conditions for asymptotic stability of sampled-data systems under asynchronous sampling and transmission delays. The period and delay-dependent conditions are expressed using computable linear matrix inequalities. Several examples show the efficiency of the stability criteria.

Research paper thumbnail of Freenet: A distributed anonymous information storage and retrieval system in designing privacy enhancing technologies

Page 1. Freenet: A Distributed Anonymous Information ... Anonymous point-to-point channels based ... more Page 1. Freenet: A Distributed Anonymous Information ... Anonymous point-to-point channels based on Chaum's mix-net scheme[8] have been imple-mented for email by the Mixmaster remailer[13] and for general TCP/IP traffic by onion routing[19] and Freedom[32]. ...

Research paper thumbnail of The Multi-Purpose Incremental Learning System AQ15 and Its Testing Application to Three Medical Domains

Research paper thumbnail of The design of an acquisitional query processor for sensor networks

We discuss the design of an acquisitional query processor for data collection in sensor networks.... more We discuss the design of an acquisitional query processor for data collection in sensor networks. Acquisitional issues are those that pertain to where, when, and how often data is physically acquired (sampled) and delivered to query processing operators. By focusing on the locations and costs of acquiring data, we are able to significantly reduce power consumption over traditional passive systems that assume the a priori existence of data. We discuss simple extensions to SQL for controlling data acquisition, and show how acquisitional issues influence query optimization, dissemination, and execution. We evaluate these issues in the context of TinyDB, a distributed query processor for smart sensor devices, and show how acquisitional techniques can provide significant reductions in power consumption on our sensor devices.

Research paper thumbnail of Doc1

Research paper thumbnail of A Variational Level Set Approach to Multiphase Motion

The point at which they meet (the triple junction) has prescribed angles which can be shown [12] ... more The point at which they meet (the triple junction) has prescribed angles which can be shown [12] to be defined by A coupled level set method for the motion of multiple junctions (of, e.g., solid, liquid, and grain boundaries), which follows the gradient flow for an energy functional consisting of surface tension (proportional to length) and bulk energies (proportional to area), is

Research paper thumbnail of Convex hulls of finite sets of points in two and three dimensions

Communications of The ACM, 1977

4. Bobrow, DG, Burchfiel, JD, Murphy, DL, and Tomlinson, RS TENEX, a paged time sharing system fo... more 4. Bobrow, DG, Burchfiel, JD, Murphy, DL, and Tomlinson, RS TENEX, a paged time sharing system for the PDP-10. Comm. ACM15, 3 (March 1972), 135-143. 5. Bobrow, DG, and Murphy, DL The structure of a LISP system using two level storage. Comm. ACM 10, 3 ( ...

Research paper thumbnail of A group mobility model for ad hoc wireless networks

In this paper, we present a survey of various mobility models in both cellular networks and multi... more In this paper, we present a survey of various mobility models in both cellular networks and multi-hop networks. We show that group motion occurs frequently in ad hoc networks, and introduce a novel group mobility model -Reference Point Group Mobility (RPGM) -to represent the relationship among mobile hosts. RPGM can be readily applied to many existing applications. Moreover; by proper choice of parameters, RPMG can be used to model several mobility models which were previously proposed. One of the main themes of this paper is to investigate the impact of the mobility model on the performance of a specijc network protocol or application. To this end, we have applied our RPGM model to two different network protocol scenarios, clustering and routing, and have evaluated network pedormance under dtzerent mobility patterns and for different protocol implementations. As expected, the results indicate that dtfferent mobility patterns affect the various protocols in dtfferent ways. In particular; the ranking of routing algorithms is influenced by the choice of mobility pattern.

Research paper thumbnail of Freenet: A Distributed Anonymous Information Storage and Retrieval System

We describe Freenet, an adaptive peer-to-peer network application that permits the publication, r... more We describe Freenet, an adaptive peer-to-peer network application that permits the publication, replication, and retrieval of data while protecting the anonymity of both authors and readers. Freenet operates as a network of identical nodes that collectively pool their storage space to store data files and cooperate to route requests to the most likely physical location of data. No broadcast search or centralized location index is employed. Files are referred to in a location-independent manner, and are dynamically replicated in locations near requestors and deleted from locations where there is no interest. It is infeasible to discover the true origin or destination of a file passing through the network, and dificult for a node operator to determine or be held responsible for the actual physical contents of her own node.

Research paper thumbnail of Isolation of a Common Receptor for Coxsackie B Viruses and Adenoviruses 2 and 5

Science, 1997

A complementary DNA clone has been isolated that encodes a coxsackievirus and adenovirus receptor... more A complementary DNA clone has been isolated that encodes a coxsackievirus and adenovirus receptor (CAR). When transfected with CAR complementary DNA, nonpermissive hamster cells became susceptible to coxsackie B virus attachment and infection. Furthermore, consistent with previous studies demonstrating that adenovirus infection depends on attachment of a viral fiber to the target cell, CAR-transfected hamster cells bound adenovirus in a fiber-dependent fashion and showed a 100-fold increase in susceptibility to virus-mediated gene transfer. Identification of CAR as a receptor for these two unrelated and structurally distinct viral pathogens is important for understanding viral pathogenesis and has implications for therapeutic gene delivery with adenovirus vectors.

Research paper thumbnail of Invariant Image Recognition by Zernike Moments

IEEE Transactions on Pattern Analysis and Machine Intelligence, 1990

... 2, pp. 29-44, 1987. [IO] H. Freeman, “Shape description via the use of critical poin!s.” Pat-... more ... 2, pp. 29-44, 1987. [IO] H. Freeman, “Shape description via the use of critical poin!s.” Pat-An important problem in pattern analysis is the automatic rec-tern Recogn., vol. ... ALIREZA KHOTANZAD AND YAW HUA HONG features in a number of applications [ 11, 121, [7], [ 151. ...

Research paper thumbnail of Stability analysis of networked control systems

This article proposes a novel approach to assess the stability of linear systems with delayed and... more This article proposes a novel approach to assess the stability of linear systems with delayed and sampled-data inputs. The paper considers both asynchronous sampling and input delay based on an extension of existing results on the stability of sampled-data systems to the case where a delay is introduced in the control loop. The proposed method provides easy tractable sufficient conditions for asymptotic stability of sampled-data systems under asynchronous sampling and transmission delays. The period and delay-dependent conditions are expressed using computable linear matrix inequalities. Several examples show the efficiency of the stability criteria.

Research paper thumbnail of Freenet: A distributed anonymous information storage and retrieval system in designing privacy enhancing technologies

Page 1. Freenet: A Distributed Anonymous Information ... Anonymous point-to-point channels based ... more Page 1. Freenet: A Distributed Anonymous Information ... Anonymous point-to-point channels based on Chaum's mix-net scheme[8] have been imple-mented for email by the Mixmaster remailer[13] and for general TCP/IP traffic by onion routing[19] and Freedom[32]. ...

Research paper thumbnail of The Multi-Purpose Incremental Learning System AQ15 and Its Testing Application to Three Medical Domains

Research paper thumbnail of The design of an acquisitional query processor for sensor networks

We discuss the design of an acquisitional query processor for data collection in sensor networks.... more We discuss the design of an acquisitional query processor for data collection in sensor networks. Acquisitional issues are those that pertain to where, when, and how often data is physically acquired (sampled) and delivered to query processing operators. By focusing on the locations and costs of acquiring data, we are able to significantly reduce power consumption over traditional passive systems that assume the a priori existence of data. We discuss simple extensions to SQL for controlling data acquisition, and show how acquisitional issues influence query optimization, dissemination, and execution. We evaluate these issues in the context of TinyDB, a distributed query processor for smart sensor devices, and show how acquisitional techniques can provide significant reductions in power consumption on our sensor devices.

Research paper thumbnail of Doc1