• Source: Scopus
  • Calculated based on no. of publications stored in Pure and citations from Scopus
1996 …2022

Research activity per year

If you made any changes in Pure these will be visible here soon.
Filter
Conference contribution

Search results

  • 2021

    SmartBuilder: A Block-based Visual Programming Framework for Smart Contract Development

    Merlec, M. M., Lee, Y. K. & In, H. P., 2021, Proceedings - 2021 IEEE International Conference on Blockchain, Blockchain 2021. Xiang, Y., Wang, Z., Wang, H. & Niemi, V. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 90-94 5 p. (Proceedings - 2021 IEEE International Conference on Blockchain, Blockchain 2021).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Towards Context-Aware Smart Contracts for Blockchain IoT Systems

    Ngwira, L., Merlec, M. M., Lee, Y. K. & In, H. P., 2021, ICTC 2021 - 12th International Conference on ICT Convergence: Beyond the Pandemic Era with ICT Convergence Innovation. IEEE Computer Society, p. 82-87 6 p. (International Conference on ICT Convergence; vol. 2021-October).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • 2015

    Situation-awareness overheating protection solution for mobile devices

    Jeon, C., Kim, N. & In, H., 2015 Mar 23, 2015 IEEE International Conference on Consumer Electronics, ICCE 2015. Institute of Electrical and Electronics Engineers Inc., p. 618-619 2 p. 7066552

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • 2014

    8thinternational workshop on Dynamic Software Product Lines (DSPL 2014)

    Park, S., Hinchey, M., In, H. P. & Schmid, K., 2014 Sep 15, Proceedings of the 18th International Software Product Line Conference: Companion Volume for Workshops, Demonstrations and Tools. Gnesi, S., Fantechi, A., Heymans, P., Rubin, J., Czarnecki, K. & Dhungana, D. (eds.). Association for Computing Machinery, Vol. 1. p. 355 1 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Customer requirements validation method based on mental models

    Lee, Y. K., In, H. & Kazman, R., 2014, Proceedings - Asia-Pacific Software Engineering Conference, APSEC. IEEE Computer Society, Vol. 1. p. 199-206 8 p. 7091311

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Citations (Scopus)
  • 2013

    7th international workshop on Dynamic Software Product Lines (DSPL 2013)

    Hallsteinsen, S., Park, S., Hinchey, M., In, H. P. & Schmid, K., 2013, Proceedings of the 17th International Software Product Line Conference, SPLC 2013. 1 p. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2012

    Cyber weather forecasting: Forecasting unknown Internet worms using randomness analysis

    Park, H., Jung, S. O. D., Lee, H. & In, H. P., 2012, Information Security and Privacy Research - 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Proceedings. p. 376-387 12 p. (IFIP Advances in Information and Communication Technology; vol. 376 AICT).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    9 Citations (Scopus)
  • 2011

    An adaptive scheduling algorithm for scalable peer-to-peer streaming

    Han, L. & In, H. P., 2011, Computers,Networks, Systems, and Industrial Engineering 2011. Lee, R., Byun, Y-C. & Akingbehin, K. (eds.). p. 193-200 8 p. (Studies in Computational Intelligence; vol. 365).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • A quality attributes evaluation method for an agile approach

    Um, T., Kim, N., Lee, D. & In, H. P., 2011, Proceedings - 1st ACIS/JNU International Conference on Computers, Networks, Systems, and Industrial Engineering, CNSI 2011. p. 460-461 2 p. 5954362. (Proceedings - 1st ACIS/JNU International Conference on Computers, Networks, Systems, and Industrial Engineering, CNSI 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)
  • Micro interaction metrics for defect prediction

    Lee, T., Han, D. G., Kim, S. & In, H. P., 2011, SIGSOFT/FSE'11 - Proceedings of the 19th ACM SIGSOFT Symposium on Foundations of Software Engineering. p. 311-321 11 p. (SIGSOFT/FSE 2011 - Proceedings of the 19th ACM SIGSOFT Symposium on Foundations of Software Engineering).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    96 Citations (Scopus)
  • 2010

    A multi-view API impact analysis for open SPL platform

    Kim, E., Kim, K. & In, H. P., 2010, 12th International Conference on Advanced Communication Technology: ICT for Green Growth and Sustainable Development, ICACT 2010 - Proceedings. p. 686-691 6 p. 5440373. (International Conference on Advanced Communication Technology, ICACT; vol. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • 2009

    A prioritized multi-queue method for H.264/AVC live streaming in wireless networks

    Park, S., Han, L., In, H. P. & Ryu, E. S., 2009, Proceedings - IEEE 9th International Conference on Computer and Information Technology, CIT 2009. p. 331-336 6 p. 5329071. (Proceedings - IEEE 9th International Conference on Computer and Information Technology, CIT 2009; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Defending battery exhaustion attacks on mobile systems

    Shin, S., Lee, T. & In, H. P., 2009, Proceedings - 2009 33rd Annual IEEE International Computer Software and Applications Conference, COMPSAC 2009. p. 347-352 6 p. 5254050. (Proceedings - International Computer Software and Applications Conference; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • Scalable attack graph for risk assessment

    Lee, J., Leet, H. & In, H. P., 2009, 2009 International Conference on Information Networking, ICOIN 2009. 4897263. (2009 International Conference on Information Networking, ICOIN 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    11 Citations (Scopus)
  • 2008

    Cost benefit analysis of personal software process training program

    Taek, L., Dookwon, B. & Hoh, P. I., 2008, Proceedings - 8th IEEE International Conference on Computer and Information Technology Workshops, CIT Workshops 2008. p. 631-636 6 p. 4568574. (Proceedings - 8th IEEE International Conference on Computer and Information Technology Workshops, CIT Workshops 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • Customer value-based HW/SW partitioning decision in embedded systems

    Kim, N., Lee, T., Lee, D., Lee, K. & In, H. P., 2008, Proc. 9th ACIS Int. Conf. Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD 2008 and 2nd Int. Workshop on Advanced Internet Technology and Applications. p. 257-262 6 p. 4617380. (Proc. 9th ACIS Int. Conf. Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD 2008 and 2nd Int. Workshop on Advanced Internet Technology and Applications).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Cyber criminal activity analysis models using Markov Chain for digital forensics

    Kim, D. H. & In, H. P., 2008, Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008. p. 193-198 6 p. 4511561. (Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Citations (Scopus)
  • Effective security safeguard selection process for return on security investment

    Do, H. K., Taek, L. & Hoh, P. I., 2008, Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, APSCC 2008. IEEE Computer Society, p. 668-673 6 p. 4780750. (Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, APSCC 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Efficient data dissemination in mobile P2P ad-hoc networks for ubiquitous computing

    Do, H. K., Myoung, R. L., Longzhe, H. & Hoh, P. I., 2008, Proceedings - 2008 International Conference on Multimedia and Ubiquitous Engineering, MUE 2008. p. 384-389 6 p. 4505754. (Proceedings - 2008 International Conference on Multimedia and Ubiquitous Engineering, MUE 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • IP traceback methodology using Markov Chain and Bloom filter in 802.16e

    Kim, D. H., In, H. P. & Yoon, B., 2008, Proceedings - 3rd International Conference on Convergence and Hybrid Information Technology, ICCIT 2008. p. 454-459 6 p. 4682283. (Proceedings - 3rd International Conference on Convergence and Hybrid Information Technology, ICCIT 2008; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Maximizing return on security safeguard investment with constraint satisfaction

    Lee, T., Kim, D. & In, H. P., 2008, Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008. p. 172-175 4 p. 4511557. (Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2007

    Conflict resolution model based on weight in situation aware collaboration system

    Chae, H., Kim, T., Lee, D. H. & In, H. P., 2007, Proceedings - FTDCS 2007: 11th IEEE International Workshop on Future Trends of Distributed Computing Systems. p. 99-106 8 p. 4144619. (Proceedings of the IEEE Computer Society Workshop on Future Trends of Distributed Computing Systems).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • Cyber threat trend analysis model using HMM

    Kim, D. H., Lee, T., Jung, S. O. D., In, H. P. & Lee, H. J., 2007, Proceedings - IAS 2007 3rd Internationl Symposium on Information Assurance and Security. p. 177-182 6 p. 4299771. (Proceedings - IAS 2007 3rd Internationl Symposium on Information Assurance and Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    23 Citations (Scopus)
  • Effective appliance selection by complementary context feeding in smart home system

    Lee, T., Park, J. & In, H. P., 2007, Software Technologies for Embedded and Ubiquitous Systems - 5th IFIP WG 10.2 International Workshop, SEUS 2007, Revised Papers. Obermaisser, R., Puschner, P., Nah, Y. & Rammig, P. (eds.). Springer Verlag, p. 233-242 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4761 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • Effective service decision using ambient-based HHMM in smart home system

    Park, J., Kim, D., Lee, T. & In, H. P., 2007, CIT 2007: 7th IEEE International Conference on Computer and Information Technology. p. 979-984 6 p. 4385212. (CIT 2007: 7th IEEE International Conference on Computer and Information Technology).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Situation-aware based self-adaptive architecture for mission critical systems

    Kim, S., Park, J., Chae, H. & In, H. P., 2007, Embedded Software and Systems - Third International Conference, ICESS 2007, Proceedings. Springer Verlag, p. 464-475 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4523 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • The value gap model: Value-based requirements elicitation

    Lim, S. W., Lee, T., Kim, S. & In, H. P., 2007, CIT 2007: 7th IEEE International Conference on Computer and Information Technology. p. 885-890 6 p. 4385197. (CIT 2007: 7th IEEE International Conference on Computer and Information Technology).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    8 Citations (Scopus)
  • 2006

    A probabilistic approach to estimate the damage propagation of cyber attacks

    Kim, Y. G., Lee, T., In, H. P., Chung, Y. J., Kim, I. J. & Baik, D. K., 2006, Information Security and Cryptology, ICISC 2005 - 8th International Conference, Revised Selected Papers. Springer Verlag, p. 175-185 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3935 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    8 Citations (Scopus)
  • A situation aware personalization in ubiquitous mobile computing environments

    Chae, H., Kim, D. H., Jeong, D. & In, H. P., 2006, Emerging Directions in Embedded and Ubiquitous Computing - EUC 2006 Workshops: NCUS, SecUbiq, USN, TRUST, ESO, and MSA, Proceedings. Zhou, X., Sokolsky, O., Yan, L., Yan, L., Jung, E-S., Shao, Z., Mu, Y., Lee, D-C., Kim, D., Jeong, Y-S. & Xu, C-Z. (eds.). Springer Verlag, p. 213-223 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4097 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    2 Citations (Scopus)
  • Cascade damage estimation model for internet attacks

    Lee, T., In, H. P., Im, E. G. & Lee, H., 2006, Intelligence and Security Informatics - International Workshop, WISI 2006, Proceedings. Springer Verlag, p. 163-164 2 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3917 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Making every student a winner: The winwin approach in software engineering education

    Grünbacher, P., Seyff, N., Kepler, J., Briggs, R. O., Peter, H., Kitapci, H. & Port, D., 2006, Proceedings - 19th Conference on Software Engineering Education and Training, CSEE and T 2006. p. 201-208 8 p. 1617348. (Software Engineering Education Conference, Proceedings; vol. 2006).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Situation Aware RFID system: Evaluating abnormal behavior detecting approach

    Chae, H., Lee, T. & In, H. P., 2006, Proc. - The Fourth IEEE Workshop on Software Technol. for Future Embedded and Ubiquitous Systems, SEUS 2006 andthe Second Int. Workshop on Collaborative Computing, Integr., and Assurance, WCCIA 2006. p. 115-120 6 p. 1611723. (Proc. - The Fourth IEEE Workshop on Software Technol. for Future Embedded and Ubiquitous Syst., SEUS 2006 andthe Second Int. Workshop on Collaborative Comput., Integr., and Assur., WCCIA 2006; vol. 2006).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • The partitioning methodology in hardware/software co-design using extreme programming: Evaluation through the lego robot project

    Chae, H., Lee, D. H., Park, J. & In, H. P., 2006, Proceedings - Sixth IEEE International Conference on Computer and Information Technology, CIT 2006. 4019966. (Proceedings - Sixth IEEE International Conference on Computer and Information Technology, CIT 2006).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • 2005

    A comparative evaluation of query modeling cost of SQL/MDR

    Jeong, D., In, H. P. & Lee, L. S., 2005, Proceedings - Third ACIS International Conference on Software Engineering Research, Management and Applications, SERA 2005. p. 235-239 5 p. 1563167. (Proceedings - Third ACIS International Conference on Software Engineering Research, Management and Applications, SERA 2005; vol. 2005).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Software engineering issues for ubiquitous entertainment service

    In, H. P. & Lee, D. H., 2005, 17th International Conference on Software Engineering and Knowledge Engineering, SEKE 2005. 1 p. (17th International Conference on Software Engineering and Knowledge Engineering, SEKE 2005).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • The performance estimation of the situation awareness RFID system from ubiquitous environment scenario

    Jeong, D., Chae, H. & In, H. P., 2005, Embedded and Ubiquitous Computing - International Conference EUC 2005, Proceedings. p. 987-995 9 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3824 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • TS-U: Temporal-spatial methodology for application checking of the systems in the ubiquitous environment

    Jarnjak, F., Kim, J., Jing, Y., In, H. P., Jeong, D. & Baik, D. K., 2005, Embedded and Ubiquitous Computing - EUC 2005 Workshops: UISW, NCUS, SecUbiq, USN, and TAUES, Proceedings. p. 161-170 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3823 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2004

    Dynamic enclose cell routing in mobile sensor networks

    Yang, Y., Lee, D. H., Park, M. S. & In, H. P., 2004, Proceedings - 11th Asia-Pacific Software Engineering Conference, APSEC 2004. p. 736-737 2 p. (Proceedings - Asia-Pacific Software Engineering Conference, APSEC).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • SA-RFID: Situation-aware RFID architecture analysis in ubiquitous computing

    Jeong, D., Kim, Y. G. & In, H. P., 2004, Proceedings - 11th Asia-Pacific Software Engineering Conference, APSEC 2004. p. 738-739 2 p. (Proceedings - Asia-Pacific Software Engineering Conference, APSEC).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Towards situation-aware cross-platform ubi-game development

    Han, J. H., In, H. P. & Woo, J. S., 2004, Proceedings - 11th Asia-Pacific Software Engineering Conference, APSEC 2004. p. 734-735 2 p. (Proceedings - Asia-Pacific Software Engineering Conference, APSEC).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)
  • 2003

    A prototype of information requirement elicitation in m-commerce

    Sun, J., In, H. P. & Sukasdadi, K. A., 2003, Proceedings - IEEE International Conference on E-Commerce, CEC 2003. Zhang, L-J. & Chung, J-Y. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 53-56 4 p. 1210233. (Proceedings - IEEE International Conference on E-Commerce, CEC 2003).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Citations (Scopus)
  • Q-MAR: A QoS resource conflict identification model for situation-aware middleware

    In, H., Kim, C., Yun, U. & Yau, S. S., 2003, Proceedings of the IEEE Computer Society Workshop on Future Trends of Distributed Computing Systems. IEEE Computer Society, Vol. 2003-January. p. 212-218 7 p. 1204335

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Citations (Scopus)
  • Situation-aware contract specification language for middleware for ubiquitous computing

    Yau, S. S., Wang, Y., Huang, D. & In, H. P., 2003, Proceedings - 9th IEEE Workshop on Future Trends of Distributed Computing Systems, FTDCS 2003. IEEE Computer Society, p. 93-99 7 p. 1204315. (Proceedings of the IEEE Computer Society Workshop on Future Trends of Distributed Computing Systems; vol. 2003-January).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    27 Citations (Scopus)
  • Web-based feature reduction system: A case study

    In, H., Foster, T., Surprise, J., Jung, S. O., Simmons, D. & Fujihara, H., 2003, Proceedings - 2003 Symposium on Applications and the Internet, SAINT 2003. Institute of Electrical and Electronics Engineers Inc., p. 406-407 2 p. 1183085

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2002

    Multi-criteria preference analysis for systematic requirements negotiation

    In, H. P., Olson, D. & Rodgers, T., 2002, Proceedings - IEEE Computer Society's International Computer Software and Applications Conference. p. 887-892 6 p. (Proceedings - IEEE Computer Society's International Computer Software and Applications Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    44 Citations (Scopus)
  • SmartClick: An enabler for human-centered wireless Web service

    Kang, S. R., In, H. P. & Zhao, W., 2002, Proceedings - 4th IEEE International Workshop on Advanced Issues of E-Commerce and Web-Based Information Systems, WECWIS 2002. Institute of Electrical and Electronics Engineers Inc., p. 187-194 8 p. 1021258. (Proceedings - 4th IEEE International Workshop on Advanced Issues of E-Commerce and Web-Based Information Systems, WECWIS 2002).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)