|
Search the dblp DataBase
Hoh Peter In:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Heeseo Chae, Dong-hyun Lee, Jiyong Park, Hoh Peter In
The Partitioning Methodology in Hardware/Software Co-Design Using Extreme Programming: Evaluation through the Lego Robot Project. [Citation Graph (0, 0)][DBLP] CIT, 2006, pp:187- [Conf]
- Hoh Peter In, Konstantinos A. Meintanis, Ming Zhang, Eul-Gyu Im
Kaliphimos: A Community-Based Peer-to-Peer Group Management Scheme. [Citation Graph (0, 0)][DBLP] ADVIS, 2004, pp:533-542 [Conf]
- JungHyun Han, Hoh Peter In, Jong-Sik Woo
Towards Situation-Aware Cross-Platform Ubi-Game Development. [Citation Graph (0, 0)][DBLP] APSEC, 2004, pp:734-735 [Conf]
- Dongwon Jeong, Young-Gab Kim, Hoh Peter In
SA-RFID: Situation-Aware RFID Architecture Analysis in Ubiquitous Computing. [Citation Graph (0, 0)][DBLP] APSEC, 2004, pp:738-739 [Conf]
- Yuan Yang, Dong-hyun Lee, Myong-Soon Park, Hoh Peter In
Dynamic Enclose Cell Routing in Mobile Sensor Networks. [Citation Graph (0, 0)][DBLP] APSEC, 2004, pp:736-737 [Conf]
- Joo Beom Yun, Eung Ki Park, Eul-Gyu Im, Hoh Peter In
A Scalable, Ordered Scenario-Based Network Security Simulator. [Citation Graph (0, 0)][DBLP] AsiaSim, 2004, pp:487-494 [Conf]
- Hoh Peter In, Young-Gab Kim, Taek Lee, Chang-Joo Moon, Yoon-Jung Jung, In-Jung Kim
A Security Risk Analysis Model for Information Systems. [Citation Graph (0, 0)][DBLP] AsiaSim, 2004, pp:505-513 [Conf]
- Samuel S. Lee, Hoh Peter In
Simulating Groundwater Transport Process Using a Vertical Heterogeneity Model: A Case Study. [Citation Graph (0, 0)][DBLP] AsiaSim, 2004, pp:536-544 [Conf]
- Eung Ki Park, Joo Beom Yun, Hoh Peter In
Simulating Cyber-intrusion Using Ordered UML Model-Based Scenarios. [Citation Graph (0, 0)][DBLP] AsiaSim, 2004, pp:643-651 [Conf]
- Jeong-Oog Lee, Myeong-Cheol Ko, Jinsoo Kim, Chang-Joo Moon, Young-Gab Kim, Hoh Peter In
Analyzing Web Interfaces of Databases for Retrieving Web Information. [Citation Graph (0, 0)][DBLP] AWCC, 2004, pp:331-336 [Conf]
- Hoh Peter In, David Olson, Tom Rodgers
Multi-Criteria Preference Analysis for Systematic Requirements Negotiation. [Citation Graph (0, 0)][DBLP] COMPSAC, 2002, pp:887-892 [Conf]
- Shaosong Xu, Hoh Peter In, Martin S. Feather
A Shared Information System Architecture for Integrating Risk Management Tools: A Case Study. [Citation Graph (0, 0)][DBLP] COMPSAC, 2002, pp:785-792 [Conf]
- Heeseo Chae, Do-Hoon Kim, Dongwon Jeong, Hoh Peter In
A Situation Aware Personalization in Ubiquitous Mobile Computing Environments. [Citation Graph (0, 0)][DBLP] EUC Workshops, 2006, pp:213-223 [Conf]
- Hoh Peter In, Changhwa Kim, Stephen S. Yau
Q-MAR: An Adaptive QoS Management Model for Situation-Aware Middleware. [Citation Graph (0, 0)][DBLP] EUC, 2004, pp:972-981 [Conf]
- Fran Jarnjak, Jinhyung Kim, Yixin Jing, Hoh Peter In, Dongwon Jeong, Doo-Kwon Baik
TS-U: Temporal-Spatial Methodology for Application Checking of the Systems in the Ubiquitous Environment. [Citation Graph (0, 0)][DBLP] EUC Workshops, 2005, pp:161-170 [Conf]
- Dongwon Jeong, Heeseo Chae, Hoh Peter In
The Performance Estimation of the Situation Awareness RFID System from Ubiquitous Environment Scenario. [Citation Graph (0, 0)][DBLP] EUC, 2005, pp:987-995 [Conf]
- Hoh Peter In, Changhwa Kim, Unil Yun, Stephen S. Yau
Q-MAR: A QoS Resource Conflict Identification Model for Situation-Aware Middleware. [Citation Graph (0, 0)][DBLP] FTDCS, 2003, pp:212-218 [Conf]
- Stephen S. Yau, Yu Wang, Dazhi Huang, Hoh Peter In
Situation-Aware Contract Specification Language for Middleware for Ubiquitous Computing. [Citation Graph (0, 0)][DBLP] FTDCS, 2003, pp:93-99 [Conf]
- Yoon Jung Chung, In-Jung Kim, Namhoon Lee, Taek Lee, Hoh Peter In
Security Risk Vector for Quantitative Asset Assessment. [Citation Graph (0, 0)][DBLP] ICCSA (2), 2005, pp:274-283 [Conf]
- Young-Gab Kim, Taek Lee, Hoh Peter In, Yoon Jung Chung, In-Jung Kim, Doo-Kwon Baik
A Probabilistic Approach to Estimate the Damage Propagation of Cyber Attacks. [Citation Graph (0, 0)][DBLP] ICISC, 2005, pp:175-185 [Conf]
- Hoh Peter In, Thomas Foster, Jason Surprise, Sung-Oh Jung, Dick B. Simmons, Hiroko Fujihara
Web-Based Feature Reduction System: A Case Study. [Citation Graph (0, 0)][DBLP] SAINT, 2003, pp:406-409 [Conf]
- Hoh Peter In, Dong-hyun Lee
Software Engineering Issues for Ubiquitous Entertainment Service. [Citation Graph (0, 0)][DBLP] SEKE, 2005, pp:790- [Conf]
- Dongwon Jeong, Hoh Peter In, Lee-Sub Lee
A Comparative Evaluation of Query Modeling Cost of SQL/MDR. [Citation Graph (0, 0)][DBLP] SERA, 2005, pp:235-239 [Conf]
- Seong-ryong Kang, Hoh Peter In, Wei Zhao
SmartClick: An Enabler for Human-Centered Wireless Web Service. [Citation Graph (0, 0)][DBLP] WECWIS, 2002, pp:187-194 [Conf]
- Jun (John) Sun, Hoh Peter In, Kuncara Aji Sukasdadi
A Prototype of Information Requirement Elicitation in m-Commerce. [Citation Graph (0, 0)][DBLP] CEC, 2003, pp:53-0 [Conf]
- Chang-Joo Moon, Hoh Peter In
Inconsistency Detection of Authorization Policies in Distributed Component Environment. [Citation Graph (0, 0)][DBLP] WISA, 2004, pp:39-50 [Conf]
- Taek Lee, Hoh Peter In, Eul-Gyu Im, Heejo Lee
Cascade Damage Estimation Model for Internet Attacks. [Citation Graph (0, 0)][DBLP] WISI, 2006, pp:163-164 [Conf]
- Hoh Peter In, Jongmoon Baik, Sangsoo Kim, Ye Yang, Barry W. Boehm
A quality-based cost estimation model for the product line life cycle. [Citation Graph (0, 0)][DBLP] Commun. ACM, 2006, v:49, n:12, pp:85-88 [Journal]
- Rick Kazman, Hoh Peter In, Hong-Mei Chen
From requirements negotiation to software architecture decisions. [Citation Graph (0, 0)][DBLP] Information & Software Technology, 2005, v:47, n:8, pp:511-520 [Journal]
- Hoh Peter In, David Olson
Requirements Negotiation Using Multi-Criteria Preference Analysis. [Citation Graph (0, 0)][DBLP] J. UCS, 2004, v:10, n:4, pp:306-325 [Journal]
- Paul Grünbacher, Norbert Seyff, Robert O. Briggs, Hoh Peter In, Hasan Kitapci, Daniel Port
Making Every Student a Winner: The WinWin Approach in Software Engineering Education. [Citation Graph (0, 0)][DBLP] CSEE&T, 2006, pp:201-208 [Conf]
- Sangsoo Kim, Jiyong Park, Heeseo Chae, Hoh Peter In
Situation-Aware Based Self-adaptive Architecture for Mission Critical Systems. [Citation Graph (0, 0)][DBLP] ICESS, 2007, pp:464-475 [Conf]
- Taek Lee, Jiyong Park, Hoh Peter In
Effective Appliance Selection by Complementary Context Feeding in Smart Home System. [Citation Graph (0, 0)][DBLP] SEUS, 2007, pp:233-242 [Conf]
- Paul Grünbacher, Norbert Seyff, Robert O. Briggs, Hoh Peter In, Hasan Kitapci, Daniel Port
Making every student a winner: The WinWin approach in software engineering education. [Citation Graph (0, 0)][DBLP] Journal of Systems and Software, 2007, v:80, n:8, pp:1191-1200 [Journal]
Effective Service Decision Using Ambient-Based HHMM in Smart Home System. [Citation Graph (, )][DBLP]
The Value Gap Model: Value-Based Requirements Elicitation. [Citation Graph (, )][DBLP]
A Prioritized Multi-queue Method for H.264/AVC Live Streaming in Wireless Networks. [Citation Graph (, )][DBLP]
Defending Battery Exhaustion Attacks on Mobile Systems. [Citation Graph (, )][DBLP]
Customer Value-based HW/SW Partitioning Decision in Embedded Systems. [Citation Graph (, )][DBLP]
Efficient Data Dissemination in Mobile P2P Ad-Hoc Networks for Ubiquitous Computing. [Citation Graph (, )][DBLP]
Cyber Threat Trend Analysis Model Using HMM. [Citation Graph (, )][DBLP]
Effective Security Safeguard Selection Process for Return on Security Investment. [Citation Graph (, )][DBLP]
Search in 0.003secs, Finished in 0.304secs
|