Skip to content
-
[C73] Se-Han Lee*, Ahn Sung-Kyu*, Ki-Woong Park†,
“Auto-HRS: An Automated System Design for a Secure Home Router Environment”,
The 7th International Conference on Next Generation Computing 2021 (ICNGC 2021), pp. 225-227, Nov 4 – 6, 2021, Jeju, Korea
, supported by [PJ29][PJ30]
-
[C72] Hye Lim Jung*, Ahn Sung-Kyu*, Ki-Woong Park†,
“Time Internal Side-Channel for Authentication in an IoT Environment”,
The 7th International Conference on Next Generation Computing 2021 (ICNGC 2021), pp. 103-104, Nov 4 – 6, 2021, Jeju, Korea
, supported by [PJ29][PJ30]
-
[C71] Ahn Sung-Kyu*, Ji-Won Kang, Ki-Woong Park†,
“POSTER: Toward Hourglass-Concepted Memory Data Leakage protection with Capacitor-Based Timer”,
The 5th International Symposium on Mobile Internet Security 2021 (MobiSec 2021), Oct 7 – 9, 2021, Jeju, Korea
, supported by [PJ29][PJ30]
-
[C70] Hye Lim Jung*, Gi-Choel Choi*, Ki-Woong Park†,
“MemTwin Consecutive Memory-Recording enhanced with FPGA for IoT Memory Inspection”,
The 5th International Symposium on Mobile Internet Security 2021 (MobiSec 2021), Oct 7 – 9, 2021, Jeju, Korea
, supported by [PJ29][PJ30]
-
[C69] Jae-Kyung Ju *, Ki-Woong Park†,
“Deign of Exploit-Helper for Penetrating into a Black-Box System”,
The 22nd World Conference on Information Security Applications 2021 (WISA 2021), pp.30-33, Aug. 11 – 13, 2021, Jeju, Korea
, supported by [PJ29][PJ30]
-
[C68] Hye-Lim Jung *,Sung-Kyu Ahn, Ki-Cheol Choi, Jae-Kyung Ju, Ki-Woong Park†,
“Neutralizing Side-Channel Attacks Through Hardware Uniqueness Derivation
“,
The 6th International Conference on Next Generation Computing 2020 (ICNGC 2020), pp.312-314, Dec. 17 – 19, 2020, Busan, Korea
, supported by [PJ25][PJ30]
-
[C67] Sang-Hoon Choi *, Ki-Woong Park†,
“Timeline-Based Container Restore via a Computationally Efficient Snapshot
“,
The 6th International Conference on Next Generation Computing 2020 (ICNGC 2020), pp.277-279, Dec. 17 – 19, 2020, Busan, Korea
, supported by [PJ25][PJ30]
-
[C66] Namjun Kim*, Chanmo Yang*, Daebeom Cho, Seung Hyeon Geum, Ki-Woong Park†,
“CERT Training Platform over the Event-Recordable Container
“,
2020 ACM International Conference on Intelligent Computing and its Emerging Applications (ACM ICEA 2020), Dec. 12 – 15, 2020, GangWon, Korea
, supported by [PJ25][PJ30]
-
[C65] Ki-Wan Kang*, Ki-Woong Park†,
“Toward Software-Defined Moving Target Defense for Secure Service Deployment Enhanced with a User-Defined Orchestration
“,
2020 ACM International Conference on Intelligent Computing and its Emerging Applications (ACM ICEA 2020), Dec. 12 – 15, 2020, GangWon, Korea
, supported by [PJ25][PJ29][PJ30]
-
[C64] Seong-Jin Kim*, Ki-Woong Park†,
“Blueprint for a secure container to protect data in edge cloud computing environment”,
2020 ACM International Conference on Intelligent Computing and its Emerging Applications (ACM ICEA 2020), Dec. 12 – 15, 2020, GangWon, Korea
, supported by [PJ25][PJ30]
-
[C63] Sung-Kyung Kim*, Eun-Tae Jang, Seung-Ho Lim, Ki-Woong Park†,
“Reduction of Data Leakage Using Software Streaming”,
Mobile Internet Security. MobiSec 2019. Communications in Computer and Information Science Springer(ISBN 978-981-15-9608-7), vol 1121 , Springer Singapore, pp. 99-111, Nov. 02, 2020
, supported by [PJ25][PJ30]
-
[C62] Sung-Kyung Kim*, Eun-Tae Jang, Ki-Woong Park†
“Toward a Fine-Grained Evaluation of The Pwnable CTF: Extracting Common Assessment Points,”
The 21th World Conference on Information Security Applications (WISA 2020), pp.179 – 190, Aug. 26 – 28, 2020, Jeju, Korea
, supported by [PJ25][PJ28]

-
[C61] Sung-Kuy Ahn*, HyeLim Jung, Sung-Kyung Kim, Ki-Woong Park†
“Poster: Self-Destructible Electronic Bracelets for Privacy in Quarantine Monotoring System
,”
The 21th World Conference on Information Security Applications (WISA 2020), pp.59, Aug. 26 – 28, 2020, Jeju, Korea
, “Best Poster Gold Award”

-
[C60] Hyun Kwon*, Hyunsoo Yoon, Jungmin Roh, Ki-Woong Park† “TargetNet Backdoor: Attack on Deep Neural Network with Use of Different Triggers,” 5th International Conference on Intelligent Information Technology (ACM ICIIT 2020), Hanoi, Vietnam, Feb. 19-22, 2020 , supported by [PJ19][PJ25][PJ29]

- [C59] Hyun Kwon*, Hyunsoo Yoon, Ki-Woong Park† “AvoidNet Backdoor: Misclassification with Certain Avoided Classes on Deep Neural Network,” The 5th International Conference on Next Generation Computing 2019 (ICNGC 2019), ISSN 2672-1562, pp.65-68, Dec. 19-21, 2020, Chiang Mai, Thailand , supported by [PJ19][PJ25][PJ29]

- [C58] Byeong-Yong Yi*, Sang-Hoon Choi, Ki-Woong Park† “Resource Usage Monitoring in Cloud Environment: Approach via Linux Kernel Module,” The 5th International Conference on Next Generation Computing 2019 (ICNGC 2019), ISSN 2672-1562, pp.272-274, Dec. 19-21, 2020, Chiang Mai, Thailand , supported by [PJ19][PJ25][PJ28]

- [C57] Ki-Wan Kang*, SungKyung Kim, Ki-Woong Park† “Requirements Derivation of Testbed of UAV Anomaly Detection,” The 5th International Conference on Next Generation Computing 2019 (ICNGC 2019), ISSN 2672-1562, pp.151-153, Dec. 19-21, 2020, Chiang Mai, Thailand , supported by [PJ29]

- [C56] Hyun Kwon*, Hyunsoo Yoon, Ki-Woong Park†“POSTER: Detecting Audio Adversarial Example through Audio Modification,” The 26th ACM Conference on Computer and Communications (ACM CCS 2019), Nov. 11 – 15, 2019, London, United Kingdom, supported by [PJ19][PJ25]

- [C55] Hyun Kwon*, Hyunsoo Yoon, Ki-Woong Park†“FriendNet Backdoor: Indentifying Backdoor Attack that is safe for Friendly Deep Neural Network,” The 3rd ACM International Conference on Software Engineering and Information Management (ACM ICSIM 2020), Jan. 12 – 15, 2020, Sydney, Austrailia, supported by [PJ19][PJ25][PJ29]

- [C54] Hye Lim Jeong*, Sungkyu Ahn, Sung Hoon Baek†, Ki-Woong Park†“Computationless Abnormal Data-Flow Detection based on Microcurrent Measurement,” The 4th International Symposium on Mobile Internet Security (MobiSec 2019), Oct.17 – Oct. 19, 2019, Taichung, Taiwan, pp. 75, supported by [PJ19][PJ25][PJ29]

- [C53] Keon-Ho Park*, Ki-Woong Park†“LEGO-NETBOOT: Scalable TFTP Network-Booting Enhanced with a Deduplication of Boot-Packet,” The 4th International Symposium on Mobile Internet Security (MobiSec 2019), Oct.17 – Oct. 19, 2019, Taichung, Taiwan, pp. 68, supported by [PJ19][PJ29]

- [C52] Sung-Kyung Kim*, Eun-Tae Jang, Seung-Ho Lim, Ki-Woong Park†“Towards Disposable Computing: Could You Throw Away Your Device?,” The 4th International Symposium on Mobile Internet Security (MobiSec 2019), Oct.17 – Oct. 19, 2019, Taichung, Taiwan, pp. 68, supported by [PJ19][PJ29]

- [C51] Hyun Kwon*, Hyunsoo Yoon, Ki-Woong Park†“CAPTCHA Image Generation using Style Transfer Learning in Deep Neural Network,” The 20th World Conference on Information Security Applications (WISA 2019), pp.251-262, Aug. 21 – 24, 2019, Jeju, Korea, supported by [PJ19][PJ25][PJ29]

- [C50] Hyun Kwon*, Hyunsoo Yoon, Ki-Woong Park†“Selective Poisoning Attack on Deep Neural Network to Induce Fine-Grained Recognition Error,” The IEEE International Conference on Artificial Intelligence and Knowledge Engineering (AIKE), pp.136-139, Jun. 5 – 7, 2019, Cagliari, Italy, supported by [PJ19][PJ25][PJ29]

- [C49] Hyun Kwon*, Ohmin Kwon, Hyunsoo Yoon, Ki-Woong Park†“Face Friend-Safe Adversarial Example on Face Recognition System,” The 11st IEEE International Conference on Ubiquitous and Future Networks (ICUFN),pp.547-551, Jul. 2 – 5, 2019, Split, Croatia, supported by [PJ19][PJ25]

- [C48] Seung-Ho Lim*, Ki-Woong Park, Kwangho Cha“Developing an OpenSHMEM model over a Switchless PCIe Non-Transparent Bridge Interface,” The 33rd IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPS-2019),pp.593-602, May. 20 – 24, 2019, Rio de Janeiro, supported by [PJ19]

- [C47] Yangjae Lee*, Keon-Ho Park, Daeseon Choi, Ki-Woong Park†“Sharing Experience and Knowledge: How to verify Secure Boot against Modify Attack,” The 4th International Conference on Next Generation Computing (ICNGC-2018), Dec. 20 – 22, 2018, Vietnam, supported by [PJ19][PJ20]

- [C46] Jun-Gyu Park*, Sang-Hoon Choi, Hyun-il Kim, Dowon Hong, Ki-Woong Park†“Our Experiences on the Design, Build and Run of CTF,” The 4th International Conference on Next Generation Computing (ICNGC-2018), Dec. 20 – 22, 2018, Vietnam, supported by [PJ20][PJ25]

- [C45] Sieun Kim*, Dowon Hong, Ki-Woong Park†“Secure Disposable Computing Technology for Low-end Embedded Devices,” The 4th International Conference on Next Generation Computing (ICNGC-2018), Dec. 20 – 22, 2018, Vietnam, supported by [PJ19][PJ20]

- [C44] Woojin Jeon*, Daeseon Choi, Ki-Woong Park†“Applying Time-Lapse Concepts onto Storage System for Long-Term System Trace Analysis: Technical Challenges and Blueprints,” IEEE AIKE 2018 – AI Bigdata Cloud Technologies Workshop (IEEE Workshop ABC 2018), Sep.26-Sep.28, 2018, Laguna Hills, California, USA, supported by [PJ19][PJ20][PJ25]

- [C43] Sieun Kim*, Taek-Young Youn, Daeseon Choi†, Ki-Woong Park†“Securely Controllable and Trustworthy Remote Erasure on Embedded Computing System for Unmanned Aerial Vehicle,” The 3rd International Symposium on Mobile Internet Security (MobiSec’18), Aug. 29-Sep. 1, 2018, Cebu, Philippines, Article No. 8, pp. 1-9“The Best Paper Award”, , supported by [PJ19][PJ20][PJ25]

- [C42] Taek-Young Youn*, Ki-Woong Park†, and Joongheon Kim,“Dynamic Replication for Secure Mobile Caching: A Control Theoretic Approach,” The 3rd International Symposium on Mobile Internet Security (MobiSec’18), Aug. 29-Sep. 1, 2018, Cebu, Philippines, Article No. 16, pp. 1-9

- [C41] Yangjae Lee*, Dongmin Yang, Taek-Young Youn†, and Ki-Woong Park†,“Authorized Wireless Charging System based on Double-Frequency-Hopping for Mobile Devices,” The 3rd International Symposium on Mobile Internet Security (MobiSec’18), Aug. 29-Sep. 1, 2018, Cebu, Philippines, Article No. 9, pp. 1-12, supported by [PJ19][PJ20][PJ25]

- [C40] Sang-Hoon Choi*, Daeseon Choi†, and Ki-Woong Park†,“Usability of Docker-based Container System Health Monitoring by Memory Dump Visualization,” The 3rd International Conference on Next Generation Computing (ICNGC) 2017b, Dec. 21 – 24, 2017, Kaohsiung, Taiwan, supported by [PJ19][PJ20]

- [C39] Woo-Jin Jeon*, Sang-Hoon Choi, and Ki-Woong Park†,“Detecting Ransomware with File System-Awareness Scheme in Cloud Computing Environment,” The 3rd International Conference on Next Generation Computing (ICNGC) 2017b, Dec. 21 – 24, 2017, Kaohsiung, Taiwan, supported by [PJ19]

- [C38] Keon-Ho Park*, Sang-Hoon Choi, Chul-Woo Kim, and Ki-Woong Park†,“Usability of Software Weakness Discovery based on the Binary File Visualization,” The 3rd International Conference on Next Generation Computing (ICNGC) 2017b, Dec. 21 – 24, 2017, Kaohsiung, Taiwan, supported by [PJ19]

- [C37] Young Jun Lee*, Sang-Hoon Choi, Chul-Woo Kim, Seung-Ho Lim, and Ki-Woong Park†,“Learning Binary Code with Deep Learning to Detect Software Weakness,” KSII The 9th International Conference on Internet (ICONI) 2017 Symposium, Dec. 17 – 20, 2017, Vientiane, Laos, supported by [PJ19][PJ20]

- [C36] Sang-Hoon Choi*, Woomin Hwang, and Ki-Woong Park†,“Towards Software-Defined Malware Analysis with a Deep Introspection,” The 9th International Conference on Future Computational Technologies and Applications, Poster Session, Feb. 19 – 23, 2017, Athens, Greece, supported by [PJ16][PJ20]

- [C35] Hye-Lim Jeong*, Sung-Kyu Ahn, Mun Sung Kim, and Ki-Woong Park†,“Design and Implementation of TPM-Enhanced Privacy Protection System,” 2nd International Conference on Next Generation Computing 2017, Jan. 2017, Excellent Paper Award, supported by [PJ16][PJ20]

- [C34] Yu-Seong Kim*, Sang-Hoon Choi, and Ki-Woong Park†,“Customizing Cuckoo Sandbox for Malware with Tricky Execution Conditions,” 2nd International Conference on Next Generation Computing 2017, Jan. 2017, supported by [PJ16][PJ20]

- [C33] Sang-Hoon Choi*, Sung-Kyu Ahn, Dongmin Yang, and Ki-Woong Park†,“Secret-Stamp: Document Leakage Prevention via Steganographic Marking ,” 2nd International Conference on Next Generation Computing 2017, Jan. 2017, supported by [PJ16]

- [C32] Hye-Lim Jeong*, and Ki-Woong Park†,“A Synchronized Virtual Link File based on User-friendly Interface for Privacy Protection,” 6th International Conference on Convergence Technology(ICCT 2016), Jun. 2016, supported by [PJ16]

- [C31] Sang-Hoon Choi*, Yu-Seong Kim, and Ki-Woong Park†,“Toward Semantic Gap-less Memory Dump for Malware Analysis,” International Conference on Next Generation Computing 2016, Jan. 2016, supported by [PJ16]

- [C30] Hye-Lim Jeong*, Sung-Kyu Ahn, Chang-Hoon Lee, and Ki-Woong Park†,“Data Management System based on Privacy Aware File Virtualization,” International Conference on Next Generation Computing 2016, Jan. 2016, supported by [PJ16]

- [C29] Chulmin Kim*, Ki-Woong Park, Kyu Ho Park†,“GHOST: GPGPU-Offloaded High Performance Storage I/O Deduplication for Primary Storage System,” Proceedings of the 2012 IEEE International Workshop on Programming Models and Applications for Multicores and Manycores, pp.17-26, Feb. 2012, supported by [PJ4]

- [C28] Kyu Ho Park*, Sung-Kyu Park, Hyunchul Seok, Woomin Hwang, Dong-Jae Shin, Jong Hun Choi, and Ki-Woong Park†,“Efficient Memory Management of a Hierarchical and a Hybrid Main Memory for MN-MATE Platform,” Proceedings of the 2012 IEEE International Workshop on Programming Models and Applications for Multicores and Manycores, pp.83-92, Feb. 2012, supported by [PJ4]

- [C27] Woomin Hwang*, Ki-Woong Park, and Kyu Ho Park†,“MN-GEMS: A Timing-aware Simulator for a Cloud Node with Manycore, DRAM, and Non-Volatile Memories,” 4th IEEE International Conference on Cloud Computing, Jul. 2011, supported by [PJ4]

- [C26] Jong Hun Choi*, Ki-Woong Park, Sung-Kyu Park, and Kyu Ho Park†,“Multimedia Matching as a Service: Technical Challenges and Blueprints,” , supported by [PJ4]26th International Technical Conference on Circuits/Systems, Computers and Communications, Jun. 2011

- [C25] Woong Choi*, Ki-Woong Park, and Kyu Ho Park†,“SCOUT: Data Center Monitoring System with Multiple Mobile Robots,” 7th IEEE International Conference on Networked Computing and Advanced Information Management, Jun. 2011, supported by [PJ5]

- [C24] Chulmin Kim*, Ki-Woong Park, KyoungSoo Park, and Kyu Ho Park†,“Rethinking Deduplication in Cloud: From Data Profiling to Blueprint,” 7th IEEE International Conference on Networked Computing and Advanced Information Management, Jun. 2011, supported by [PJ5]

- [C23] Ki-Woong Park*, Chulmin Kim, and Kyu Ho Park†,“BLAST: Applying Streaming Ciphers into Outsourced Cloud Storage,” IEEE International Conference on Parallel and Distributed Systems, Dec. 2010, supported by [PJ5]

- [C22] Ki-Woong Park*, Woomin Hwang, and Kyu Ho Park†,“FalconEye: Data Center Status Extraction using Vision-Transformation Techniques,” IEEE COMPSAC 2010-CloudApp, supported by [PJ5]

- [C21] Ki-Woong Park*, Sung-Kyu Park, and Kyu Ho Park†,“THEMIS: Towards mutual-verifiable billing transaction for cloud computing environment,” IEEE International Conference on CLOUD 2010, supported by [PJ5]

- [C20] Woomin Hwang*, Yangwoo Roh, Youngwoo Park, Ki-Woong Park, and Kyu Ho Park†,“HyperDealer: Reference-pattern-aware instant memory balancing for Consolidated Virtual Machines,” IEEE International Conference on CLOUD 2010 Industry Track, supported by [PJ4]

- [C19] Ki-Woong Park*, Byung-Cheol Kim, Jong-Woon Yoo, and Kyu Ho Park†,“Enabling Sportive Games with a Do-It-Yourself Wearable Computing Platform,” IEEE Game Innovation Conference 2010, supported by [PJ2]

- [C18] Jong-Woon Yoo*, Ki-Woong Park, Sung-Kyu Park, and Kyu Ho Park†,“PokerFace: Game Players Themselves Are Truly Memorable,” IEEE Game Innovation Conference 2010, supported by [PJ2]

- [C17] Ki-Woong Park*, Woong Choi, and Kyu Ho Park†,“SqueezeBall: Enabling Intuitive Copy and Paste using Soft Ball-Type Device as Mobile Clipboard,” IEEE International Symposium on ISWC 2010, Late Breaking Results Session, supported by [PJ2]

- [C16] Ki-Woong Park*, Jong-Woon Yoo, Sung-Kyu Park, Yo-Won Jeong, Woomin Hwang, Kyu Ho Park, Hyunjung Kim, Boram Lee, and Woohun Lee†,“Our Experiences on the Design and Implementation of Wearable Computer: From Body-Storming to Realized Services,” IEEE International Symposium on ISWC 2010, Video Paper Session

- [C15] Hyunchul Seok*, Ki-Woong Park, and Kyu Ho Park†,“Secure Remote Desktop with Necklace-Type Security Device,” IEEE International Symposium on ISWC 2010, Video Paper Session, supported by [PJ2]

- [C14] Ki-Woong Park*, Sung-Kyu Park, Jong-Woon Yoo, and Kyu Ho Park†,“Towards Interactive Museum: Mapping Cultural Contexts to Historical Objects,” ACM Mibile HCI 2009, supported by [PJ2]

- [C13] Jong-Woon Yoo*, Woong Choi,Ki-Woong Park, and Kyu Ho Park†,“An Intuitive Data Transfer Technique using Bartender’s Gesture,” ACM Multimedia 2009, supported by [PJ2]

- [C12] Ki-Woong Park*, and Kyu Ho Park†,“Authentication Latency Reduction Technique for Secure and Seamless Ubiquitous Services,” 2nd International Conference on ICON, Nov. 28-30, 2007, supported by [PJ2]

- [C11] Yo-Won Jeong*, Chul Lee, Ki-Woong Park, and Kyu Ho Park†,“An Application for Efficient Management of User Created Content in Ubiquitous Fashionable Computer,” 2nd International Conference on ICON, Nov. 28-30, 2007, supported by [PJ2]

- [C10] Sung-Kyu Park*, Ki-Woong Park, and Kyu Ho Park†,“Mobile Office Platform, PPP-UFC, providing Mobility and Intuitive Presentation,” 2nd International Conference on ICON, Nov. 28-30, 2007, supported by [PJ2]

- [C9] Ki-Woong Park*, Jupyung Lee, Jong-Woon Yoo, Seung-Ho Lim, Sung-Kyu Park, and Kyu Ho Park,“A Ubiquitous Space User Interface (UUI) of Ubiquitous Fashionable Computer in a Ubiquitous Computing Environment, U-TOPIA,” 2nd International Conference on ICON, Nov. 28-30, 2007, supported by [PJ2]

- [C8] Ki-Woong Park*, Hyunchul Seok, and Kyu Ho Park†, “pKASSO: Towards Seamless Authentication providing Non-Repudiation on Resource-Constrained Devices,” 21st IEEE Conference on Advanced Information Networking and Applications Workshops (AINAW’07), May 2007, supported by [PJ2]

- [C7] Kyu Ho Park, Ki-Woong Park*, Jupyung Lee, Jong-Woon Yoo, Seung-Ho Lim†,“A Ubiquitous Environment with a Wearable Platform, UFC and its Security Infrastructure, pKASSO,” 2nd European Conference on Ambient Intelligence, Nov 2007, supported by [PJ2]

- [C6] Jupyung Lee*, Seung-Ho Lim, Jong-Woon Yoo, Ki-Woong Park, Hyun-Jin Choi, and Kyu Ho Park†,“A Ubiquitous Fashionable Computer with an i-Throw Device,” 21st IEEE Conference on Advanced Information Networking and Applications Workshops (AINAW’07), May 2007, supported by [PJ2]

- [C5] Jong-Woon Yoo*, Yo-Won Jeong, Yong Song, Jupyung Lee, Seung-Ho Lim, Ki-Woong Park, and Kyu Ho Park†,“i-Throw: A New Gesture-based Wearable Input Device with Target Selection Algorithm,” , supported by [PJ2]Proceedings of International Conference on Machine Learning and Cybernetics, September 2007

- [C4] Ki-Woong Park*, Sang Seok Lim, Hosung Song, and Kyu Ho Park†,“A New PKI-based Single Sign-On Protocol for a Diminutive Security Device, PANDA, in a Ubiquitous Security Environment,” 8th IEEE Symposium on Systems & Information Security, November 2006, supported by [PJ2]

- [C3] Jong-Woon Yoo, Ki-Woong Park*, Seung-Ho Lim, Jupyung Lee, Hyun-Jin Choi, and Kyu Ho Park†,“A Ubiquitous Intuitive Interaction with a Wearable Computer,” 4th IEEE International Conference on Pervasive Computer and Communications(PerCom 2006), March 2006, supported by [PJ2]

- [C2] Ki-Woong Park*, Hyun-Jin Choi, and Kyu Ho Park†,“An Interoperable Authentication System using ZigBee-enabled Tiny Portable Device and PKI,” Proceedings of International Conference on ICON, October 2005, pp.63-68, supported by [PJ2]

- [C1] Seung-Ho Lim*, Hyun-Jin Choi, Ki-Woong Park, Jong-Woon Yoo, and Kyu Ho Park†,“Interoperable wearable computer with intuitive device i-Throw,” Proceedings of International Conference on ICON, October 2005, pp.211-218, supported by [PJ2]
