The SCEAS System
Navigation Menu

Search the dblp DataBase


Hoh Peter In: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Heeseo Chae, Dong-hyun Lee, Jiyong Park, Hoh Peter In
    The Partitioning Methodology in Hardware/Software Co-Design Using Extreme Programming: Evaluation through the Lego Robot Project. [Citation Graph (0, 0)][DBLP]
    CIT, 2006, pp:187- [Conf]
  2. Hoh Peter In, Konstantinos A. Meintanis, Ming Zhang, Eul-Gyu Im
    Kaliphimos: A Community-Based Peer-to-Peer Group Management Scheme. [Citation Graph (0, 0)][DBLP]
    ADVIS, 2004, pp:533-542 [Conf]
  3. JungHyun Han, Hoh Peter In, Jong-Sik Woo
    Towards Situation-Aware Cross-Platform Ubi-Game Development. [Citation Graph (0, 0)][DBLP]
    APSEC, 2004, pp:734-735 [Conf]
  4. Dongwon Jeong, Young-Gab Kim, Hoh Peter In
    SA-RFID: Situation-Aware RFID Architecture Analysis in Ubiquitous Computing. [Citation Graph (0, 0)][DBLP]
    APSEC, 2004, pp:738-739 [Conf]
  5. Yuan Yang, Dong-hyun Lee, Myong-Soon Park, Hoh Peter In
    Dynamic Enclose Cell Routing in Mobile Sensor Networks. [Citation Graph (0, 0)][DBLP]
    APSEC, 2004, pp:736-737 [Conf]
  6. Joo Beom Yun, Eung Ki Park, Eul-Gyu Im, Hoh Peter In
    A Scalable, Ordered Scenario-Based Network Security Simulator. [Citation Graph (0, 0)][DBLP]
    AsiaSim, 2004, pp:487-494 [Conf]
  7. Hoh Peter In, Young-Gab Kim, Taek Lee, Chang-Joo Moon, Yoon-Jung Jung, In-Jung Kim
    A Security Risk Analysis Model for Information Systems. [Citation Graph (0, 0)][DBLP]
    AsiaSim, 2004, pp:505-513 [Conf]
  8. Samuel S. Lee, Hoh Peter In
    Simulating Groundwater Transport Process Using a Vertical Heterogeneity Model: A Case Study. [Citation Graph (0, 0)][DBLP]
    AsiaSim, 2004, pp:536-544 [Conf]
  9. Eung Ki Park, Joo Beom Yun, Hoh Peter In
    Simulating Cyber-intrusion Using Ordered UML Model-Based Scenarios. [Citation Graph (0, 0)][DBLP]
    AsiaSim, 2004, pp:643-651 [Conf]
  10. Jeong-Oog Lee, Myeong-Cheol Ko, Jinsoo Kim, Chang-Joo Moon, Young-Gab Kim, Hoh Peter In
    Analyzing Web Interfaces of Databases for Retrieving Web Information. [Citation Graph (0, 0)][DBLP]
    AWCC, 2004, pp:331-336 [Conf]
  11. Hoh Peter In, David Olson, Tom Rodgers
    Multi-Criteria Preference Analysis for Systematic Requirements Negotiation. [Citation Graph (0, 0)][DBLP]
    COMPSAC, 2002, pp:887-892 [Conf]
  12. Shaosong Xu, Hoh Peter In, Martin S. Feather
    A Shared Information System Architecture for Integrating Risk Management Tools: A Case Study. [Citation Graph (0, 0)][DBLP]
    COMPSAC, 2002, pp:785-792 [Conf]
  13. Heeseo Chae, Do-Hoon Kim, Dongwon Jeong, Hoh Peter In
    A Situation Aware Personalization in Ubiquitous Mobile Computing Environments. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2006, pp:213-223 [Conf]
  14. Hoh Peter In, Changhwa Kim, Stephen S. Yau
    Q-MAR: An Adaptive QoS Management Model for Situation-Aware Middleware. [Citation Graph (0, 0)][DBLP]
    EUC, 2004, pp:972-981 [Conf]
  15. Fran Jarnjak, Jinhyung Kim, Yixin Jing, Hoh Peter In, Dongwon Jeong, Doo-Kwon Baik
    TS-U: Temporal-Spatial Methodology for Application Checking of the Systems in the Ubiquitous Environment. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:161-170 [Conf]
  16. Dongwon Jeong, Heeseo Chae, Hoh Peter In
    The Performance Estimation of the Situation Awareness RFID System from Ubiquitous Environment Scenario. [Citation Graph (0, 0)][DBLP]
    EUC, 2005, pp:987-995 [Conf]
  17. Hoh Peter In, Changhwa Kim, Unil Yun, Stephen S. Yau
    Q-MAR: A QoS Resource Conflict Identification Model for Situation-Aware Middleware. [Citation Graph (0, 0)][DBLP]
    FTDCS, 2003, pp:212-218 [Conf]
  18. Stephen S. Yau, Yu Wang, Dazhi Huang, Hoh Peter In
    Situation-Aware Contract Specification Language for Middleware for Ubiquitous Computing. [Citation Graph (0, 0)][DBLP]
    FTDCS, 2003, pp:93-99 [Conf]
  19. Yoon Jung Chung, In-Jung Kim, Namhoon Lee, Taek Lee, Hoh Peter In
    Security Risk Vector for Quantitative Asset Assessment. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:274-283 [Conf]
  20. Young-Gab Kim, Taek Lee, Hoh Peter In, Yoon Jung Chung, In-Jung Kim, Doo-Kwon Baik
    A Probabilistic Approach to Estimate the Damage Propagation of Cyber Attacks. [Citation Graph (0, 0)][DBLP]
    ICISC, 2005, pp:175-185 [Conf]
  21. Hoh Peter In, Thomas Foster, Jason Surprise, Sung-Oh Jung, Dick B. Simmons, Hiroko Fujihara
    Web-Based Feature Reduction System: A Case Study. [Citation Graph (0, 0)][DBLP]
    SAINT, 2003, pp:406-409 [Conf]
  22. Hoh Peter In, Dong-hyun Lee
    Software Engineering Issues for Ubiquitous Entertainment Service. [Citation Graph (0, 0)][DBLP]
    SEKE, 2005, pp:790- [Conf]
  23. Dongwon Jeong, Hoh Peter In, Lee-Sub Lee
    A Comparative Evaluation of Query Modeling Cost of SQL/MDR. [Citation Graph (0, 0)][DBLP]
    SERA, 2005, pp:235-239 [Conf]
  24. Seong-ryong Kang, Hoh Peter In, Wei Zhao
    SmartClick: An Enabler for Human-Centered Wireless Web Service. [Citation Graph (0, 0)][DBLP]
    WECWIS, 2002, pp:187-194 [Conf]
  25. Jun (John) Sun, Hoh Peter In, Kuncara Aji Sukasdadi
    A Prototype of Information Requirement Elicitation in m-Commerce. [Citation Graph (0, 0)][DBLP]
    CEC, 2003, pp:53-0 [Conf]
  26. Chang-Joo Moon, Hoh Peter In
    Inconsistency Detection of Authorization Policies in Distributed Component Environment. [Citation Graph (0, 0)][DBLP]
    WISA, 2004, pp:39-50 [Conf]
  27. Taek Lee, Hoh Peter In, Eul-Gyu Im, Heejo Lee
    Cascade Damage Estimation Model for Internet Attacks. [Citation Graph (0, 0)][DBLP]
    WISI, 2006, pp:163-164 [Conf]
  28. Hoh Peter In, Jongmoon Baik, Sangsoo Kim, Ye Yang, Barry W. Boehm
    A quality-based cost estimation model for the product line life cycle. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2006, v:49, n:12, pp:85-88 [Journal]
  29. Rick Kazman, Hoh Peter In, Hong-Mei Chen
    From requirements negotiation to software architecture decisions. [Citation Graph (0, 0)][DBLP]
    Information & Software Technology, 2005, v:47, n:8, pp:511-520 [Journal]
  30. Hoh Peter In, David Olson
    Requirements Negotiation Using Multi-Criteria Preference Analysis. [Citation Graph (0, 0)][DBLP]
    J. UCS, 2004, v:10, n:4, pp:306-325 [Journal]
  31. Paul Grünbacher, Norbert Seyff, Robert O. Briggs, Hoh Peter In, Hasan Kitapci, Daniel Port
    Making Every Student a Winner: The WinWin Approach in Software Engineering Education. [Citation Graph (0, 0)][DBLP]
    CSEE&T, 2006, pp:201-208 [Conf]
  32. Sangsoo Kim, Jiyong Park, Heeseo Chae, Hoh Peter In
    Situation-Aware Based Self-adaptive Architecture for Mission Critical Systems. [Citation Graph (0, 0)][DBLP]
    ICESS, 2007, pp:464-475 [Conf]
  33. Taek Lee, Jiyong Park, Hoh Peter In
    Effective Appliance Selection by Complementary Context Feeding in Smart Home System. [Citation Graph (0, 0)][DBLP]
    SEUS, 2007, pp:233-242 [Conf]
  34. Paul Grünbacher, Norbert Seyff, Robert O. Briggs, Hoh Peter In, Hasan Kitapci, Daniel Port
    Making every student a winner: The WinWin approach in software engineering education. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2007, v:80, n:8, pp:1191-1200 [Journal]

  35. Effective Service Decision Using Ambient-Based HHMM in Smart Home System. [Citation Graph (, )][DBLP]

  36. The Value Gap Model: Value-Based Requirements Elicitation. [Citation Graph (, )][DBLP]

  37. A Prioritized Multi-queue Method for H.264/AVC Live Streaming in Wireless Networks. [Citation Graph (, )][DBLP]

  38. Defending Battery Exhaustion Attacks on Mobile Systems. [Citation Graph (, )][DBLP]

  39. Customer Value-based HW/SW Partitioning Decision in Embedded Systems. [Citation Graph (, )][DBLP]

  40. Efficient Data Dissemination in Mobile P2P Ad-Hoc Networks for Ubiquitous Computing. [Citation Graph (, )][DBLP]

  41. Cyber Threat Trend Analysis Model Using HMM. [Citation Graph (, )][DBLP]

  42. Effective Security Safeguard Selection Process for Return on Security Investment. [Citation Graph (, )][DBLP]

Search in 0.004secs, Finished in 0.006secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002