关注
Hoh Peter In
Hoh Peter In
Professor of Computer Science, Korea University
在 korea.ac.kr 的电子邮件经过验证
标题
引用次数
引用次数
年份
Identifying quality-requirement conflicts
B Boehm, H In
IEEE software 13 (2), 25-35, 1996
5741996
Micro interaction metrics for defect prediction
T Lee, J Nam, DG Han, S Kim, HP In
Proceedings of the 19th ACM SIGSOFT symposium and the 13th European …, 2011
1952011
Selfish attacks and detection in cognitive radio ad-hoc networks
M Jo, L Han, D Kim, HP In
IEEE network 27 (3), 46-50, 2013
1282013
Mood prediction of patients with mood disorders by machine learning using passive digital phenotypes based on the circadian rhythm: prospective observational cohort study
CH Cho, T Lee, MG Kim, HP In, L Kim, HJ Lee
Journal of medical Internet research 21 (4), e11029, 2019
1242019
Applying WinWin to quality requirements: a case study
H In, B Boehm, T Rodger, M Deutsch
Proceedings of the 23rd International Conference on Software Engineering …, 2001
1012001
From requirements negotiation to software architectural decisions
H In, R Kazman, D Olson
Proc. From Software Requ. to Architectures Workshop STRAW, 2001
87*2001
Developer micro interaction metrics for software defect prediction
T Lee, J Nam, D Han, S Kim, HP In
IEEE Transactions on Software Engineering 42 (11), 1015-1035, 2016
862016
Multi-criteria preference analysis for systematic requirements negotiation
HP In, D Olson, T Rodgers
Proceedings 26th Annual International Computer Software and Applications …, 2002
782002
A quality-based cost estimation model for the product line life cycle
HP In, J Baik, S Kim, Y Yang, B Boehm
Communications of the ACM 49 (12), 85-88, 2006
582006
A security risk analysis model for information systems
HP In, YG Kim, T Lee, CJ Moon, Y Jung, I Kim
Systems Modeling and Simulation: Theory and Applications: Third Asian …, 2005
502005
Aids for identifying conflicts among quality requirements
B Boehm, H In
IEEE Software 13 (2), 25-35, 1996
491996
A scheme for data confidentiality in cloud-assisted wireless body area networks
ND Han, L Han, DM Tuan, HP In, M Jo
Information sciences 284, 157-166, 2014
482014
VIRE: Sailing a blue ocean with value-innovative requirements
S Kim, HP In, J Baik, R Kazman, K Han
IEEE software 25 (1), 80-87, 2008
472008
A survey: energy exhausting attacks in MAC protocols in WBANs
M Jo, L Han, ND Tan, HP In
Telecommunication Systems 58 (2), 153-164, 2015
422015
Requirements Negotiation Using Multi-Criteria Preference Analysis.
HP In, DL Olson
J. Univers. Comput. Sci. 10 (4), 306-325, 2004
412004
A requirements negotiation model based on multi-criteria analysis
H In, D Olson, T Rodgers
Proceedings Fifth IEEE International Symposium on Requirements Engineering …, 2001
412001
A study of different coding styles affecting code readability
T Lee, JB Lee, HP In
International Journal of Software Engineering and Its Applications 7 (5 …, 2013
382013
A smart contract-based dynamic consent management system for personal data usage under GDPR
MM Merlec, YK Lee, SP Hong, HP In
Sensors 21 (23), 7994, 2021
372021
Detecting usability problems in mobile applications on the basis of dissimilarity in user behavior
JW Jeong, NH Kim, HP In
International Journal of Human-Computer Studies 139, 102364, 2020
342020
Cyber threat trend analysis model using HMM
DH Kim, T Lee, SOD Jung, HP In, HJ Lee
Third International Symposium on Information Assurance and Security, 177-182, 2007
332007
系统目前无法执行此操作,请稍后再试。
文章 1–20