• 963 Citations
  • 16 h-Index
19962020

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Output

Filter
Conference contribution
2015

Situation-awareness overheating protection solution for mobile devices

Jeon, C., Kim, N. & In, H., 2015 Mar 23, 2015 IEEE International Conference on Consumer Electronics, ICCE 2015. Institute of Electrical and Electronics Engineers Inc., p. 618-619 2 p. 7066552

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)
2014

8thinternational workshop on Dynamic Software Product Lines (DSPL 2014)

Park, S., Hinchey, M., In, H. & Schmid, K., 2014 Jan 1, ACM International Conference Proceeding Series. Association for Computing Machinery, Vol. 1.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Customer requirements validation method based on mental models

Lee, Y. K., In, H. & Kazman, R., 2014, Proceedings - Asia-Pacific Software Engineering Conference, APSEC. IEEE Computer Society, Vol. 1. p. 199-206 8 p. 7091311

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Citations (Scopus)
2013

7th international workshop on Dynamic Software Product Lines (DSPL 2013)

Hallsteinsen, S., Park, S., Hinchey, M., In, H. P. & Schmid, K., 2013, Proceedings of the 17th International Software Product Line Conference, SPLC 2013. 1 p. (ACM International Conference Proceeding Series).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2012

Cyber weather forecasting: Forecasting unknown Internet worms using randomness analysis

Park, H., Jung, S. O. D., Lee, H. & In, H. P., 2012, Information Security and Privacy Research - 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Proceedings. p. 376-387 12 p. (IFIP Advances in Information and Communication Technology; vol. 376 AICT).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Citations (Scopus)
2011

An adaptive scheduling algorithm for scalable peer-to-peer streaming

Han, L. & In, H. P., 2011, Computers,Networks, Systems, and Industrial Engineering 2011. Lee, R., Byun, Y-C. & Akingbehin, K. (eds.). p. 193-200 8 p. (Studies in Computational Intelligence; vol. 365).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

A quality attributes evaluation method for an agile approach

Um, T., Kim, N., Lee, D. & In, H. P., 2011, Proceedings - 1st ACIS/JNU International Conference on Computers, Networks, Systems, and Industrial Engineering, CNSI 2011. p. 460-461 2 p. 5954362. (Proceedings - 1st ACIS/JNU International Conference on Computers, Networks, Systems, and Industrial Engineering, CNSI 2011).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Citations (Scopus)

Micro interaction metrics for defect prediction

Lee, T., Han, D. G., Kim, S. & In, H. P., 2011, SIGSOFT/FSE'11 - Proceedings of the 19th ACM SIGSOFT Symposium on Foundations of Software Engineering. p. 311-321 11 p. (SIGSOFT/FSE 2011 - Proceedings of the 19th ACM SIGSOFT Symposium on Foundations of Software Engineering).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

70 Citations (Scopus)
2010

A multi-view API impact analysis for open SPL platform

Kim, E., Kim, K. & In, H. P., 2010, 12th International Conference on Advanced Communication Technology: ICT for Green Growth and Sustainable Development, ICACT 2010 - Proceedings. p. 686-691 6 p. 5440373. (International Conference on Advanced Communication Technology, ICACT; vol. 1).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Citations (Scopus)
2009

A prioritized multi-queue method for H.264/AVC live streaming in wireless networks

Park, S., Han, L., In, H. P. & Ryu, E. S., 2009, Proceedings - IEEE 9th International Conference on Computer and Information Technology, CIT 2009. p. 331-336 6 p. 5329071. (Proceedings - IEEE 9th International Conference on Computer and Information Technology, CIT 2009; vol. 2).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Defending battery exhaustion attacks on mobile systems

Shin, S., Lee, T. & In, H. P., 2009, Proceedings - 2009 33rd Annual IEEE International Computer Software and Applications Conference, COMPSAC 2009. p. 347-352 6 p. 5254050. (Proceedings - International Computer Software and Applications Conference; vol. 2).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

Scalable attack graph for risk assessment

Lee, J., Leet, H. & In, H. P., 2009, 2009 International Conference on Information Networking, ICOIN 2009. 4897263. (2009 International Conference on Information Networking, ICOIN 2009).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

8 Citations (Scopus)
2008

Cost benefit analysis of personal software process training program

Taek, L., Dookwon, B. & Hoh, P. I., 2008, Proceedings - 8th IEEE International Conference on Computer and Information Technology Workshops, CIT Workshops 2008. p. 631-636 6 p. 4568574. (Proceedings - 8th IEEE International Conference on Computer and Information Technology Workshops, CIT Workshops 2008).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

Customer value-based HW/SW partitioning decision in embedded systems

Kim, N., Lee, T., Lee, D., Lee, K. & In, H. P., 2008, Proc. 9th ACIS Int. Conf. Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD 2008 and 2nd Int. Workshop on Advanced Internet Technology and Applications. p. 257-262 6 p. 4617380. (Proc. 9th ACIS Int. Conf. Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD 2008 and 2nd Int. Workshop on Advanced Internet Technology and Applications).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Cyber criminal activity analysis models using Markov Chain for digital forensics

Kim, D. H. & In, H. P., 2008, Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008. p. 193-198 6 p. 4511561. (Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Citations (Scopus)

Effective security safeguard selection process for return on security investment

Do, H. K., Taek, L. & Hoh, P. I., 2008, Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, APSCC 2008. IEEE Computer Society, p. 668-673 6 p. 4780750. (Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, APSCC 2008).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Efficient data dissemination in mobile P2P ad-hoc networks for ubiquitous computing

Do, H. K., Myoung, R. L., Longzhe, H. & Hoh, P. I., 2008, Proceedings - 2008 International Conference on Multimedia and Ubiquitous Engineering, MUE 2008. p. 384-389 6 p. 4505754. (Proceedings - 2008 International Conference on Multimedia and Ubiquitous Engineering, MUE 2008).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

IP traceback methodology using Markov Chain and Bloom filter in 802.16e

Kim, D. H., In, H. P. & Yoon, B., 2008, Proceedings - 3rd International Conference on Convergence and Hybrid Information Technology, ICCIT 2008. p. 454-459 6 p. 4682283. (Proceedings - 3rd International Conference on Convergence and Hybrid Information Technology, ICCIT 2008; vol. 2).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Maximizing return on security safeguard investment with constraint satisfaction

Lee, T., Kim, D. & In, H. P., 2008, Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008. p. 172-175 4 p. 4511557. (Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2007

Conflict resolution model based on weight in situation aware collaboration system

Chae, H., Kim, T., Lee, D. H. & In, H. P., 2007, Proceedings - FTDCS 2007: 11th IEEE International Workshop on Future Trends of Distributed Computing Systems. p. 99-106 8 p. 4144619. (Proceedings of the IEEE Computer Society Workshop on Future Trends of Distributed Computing Systems).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Citations (Scopus)

Cyber threat trend analysis model using HMM

Kim, D. H., Lee, T., Jung, S. O. D., In, H. P. & Lee, H. J., 2007, Proceedings - IAS 2007 3rd Internationl Symposium on Information Assurance and Security. p. 177-182 6 p. 4299771. (Proceedings - IAS 2007 3rd Internationl Symposium on Information Assurance and Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

20 Citations (Scopus)

Effective appliance selection by complementary context feeding in smart home system

Lee, T., Park, J. & In, H. P., 2007, Software Technologies for Embedded and Ubiquitous Systems - 5th IFIP WG 10.2 International Workshop, SEUS 2007, Revised Papers. Obermaisser, R., Puschner, P., Nah, Y. & Rammig, P. (eds.). Springer Verlag, p. 233-242 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4761 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access

Effective service decision using ambient-based HHMM in smart home system

Park, J., Kim, D., Lee, T. & In, H. P., 2007, CIT 2007: 7th IEEE International Conference on Computer and Information Technology. p. 979-984 6 p. 4385212. (CIT 2007: 7th IEEE International Conference on Computer and Information Technology).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Situation-aware based self-adaptive architecture for mission critical systems

Kim, S., Park, J., Chae, H. & In, H. P., 2007, Embedded Software and Systems - Third International Conference, ICESS 2007, Proceedings. p. 464-475 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4523 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

The value gap model: Value-based requirements elicitation

Lim, S. W., Lee, T., Kim, S. & In, H. P., 2007, CIT 2007: 7th IEEE International Conference on Computer and Information Technology. p. 885-890 6 p. 4385197. (CIT 2007: 7th IEEE International Conference on Computer and Information Technology).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

7 Citations (Scopus)
2006

A probabilistic approach to estimate the damage propagation of cyber attacks

Kim, Y. G., Lee, T., In, H. P., Chung, Y. J., Kim, I. J. & Baik, D. K., 2006, Information Security and Cryptology, ICISC 2005 - 8th International Conference, Revised Selected Papers. Springer Verlag, p. 175-185 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3935 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Citations (Scopus)

A situation aware personalization in ubiquitous mobile computing environments

Chae, H., Kim, D. H., Jeong, D. & In, H. P., 2006, Emerging Directions in Embedded and Ubiquitous Computing - EUC 2006 Workshops: NCUS, SecUbiq, USN, TRUST, ESO, and MSA, Proceedings. Zhou, X., Sokolsky, O., Yan, L., Yan, L., Jung, E-S., Shao, Z., Mu, Y., Lee, D-C., Kim, D., Jeong, Y-S. & Xu, C-Z. (eds.). Springer Verlag, p. 213-223 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4097 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Cascade damage estimation model for internet attacks

Lee, T., In, H. P., Im, E. G. & Lee, H., 2006, Intelligence and Security Informatics - International Workshop, WISI 2006, Proceedings. Springer Verlag, p. 163-164 2 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3917 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Making every student a winner: The winwin approach in software engineering education

Grünbacher, P., Seyff, N., Kepler, J., Briggs, R. O., Peter, H., Kitapci, H. & Port, D., 2006, Proceedings - 19th Conference on Software Engineering Education and Training, CSEE and T 2006. p. 201-208 8 p. 1617348. (Software Engineering Education Conference, Proceedings; vol. 2006).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Situation Aware RFID system: Evaluating abnormal behavior detecting approach

Chae, H., Lee, T. & In, H. P., 2006, Proc. - The Fourth IEEE Workshop on Software Technol. for Future Embedded and Ubiquitous Systems, SEUS 2006 andthe Second Int. Workshop on Collaborative Computing, Integr., and Assurance, WCCIA 2006. p. 115-120 6 p. 1611723. (Proc. - The Fourth IEEE Workshop on Software Technol. for Future Embedded and Ubiquitous Syst., SEUS 2006 andthe Second Int. Workshop on Collaborative Comput., Integr., and Assur., WCCIA 2006; vol. 2006).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

The partitioning methodology in hardware/software co-design using extreme programming: Evaluation through the lego robot project

Chae, H., Lee, D. H., Park, J. & In, H. P., 2006, Proceedings - Sixth IEEE International Conference on Computer and Information Technology, CIT 2006. 4019966. (Proceedings - Sixth IEEE International Conference on Computer and Information Technology, CIT 2006).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)
2005

A comparative evaluation of query modeling cost of SQL/MDR

Jeong, D., In, H. P. & Lee, L. S., 2005, Proceedings - Third ACIS International Conference on Software Engineering Research, Management and Applications, SERA 2005. p. 235-239 5 p. 1563167. (Proceedings - Third ACIS International Conference on Software Engineering Research, Management and Applications, SERA 2005; vol. 2005).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Software engineering issues for ubiquitous entertainment service

In, H. P. & Lee, D. H., 2005, 17th International Conference on Software Engineering and Knowledge Engineering, SEKE 2005. 1 p. (17th International Conference on Software Engineering and Knowledge Engineering, SEKE 2005).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

The performance estimation of the situation awareness RFID system from ubiquitous environment scenario

Jeong, D., Chae, H. & In, H. P., 2005, Embedded and Ubiquitous Computing - International Conference EUC 2005, Proceedings. p. 987-995 9 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3824 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

TS-U: Temporal-spatial methodology for application checking of the systems in the ubiquitous environment

Jarnjak, F., Kim, J., Jing, Y., In, H. P., Jeong, D. & Baik, D. K., 2005, Embedded and Ubiquitous Computing - EUC 2005 Workshops: UISW, NCUS, SecUbiq, USN, and TAUES, Proceedings. p. 161-170 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3823 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2004

Dynamic enclose cell routing in mobile sensor networks

Yang, Y., Lee, D. H., Park, M. S. & In, H. P., 2004, Proceedings - 11th Asia-Pacific Software Engineering Conference, APSEC 2004. p. 736-737 2 p. (Proceedings - Asia-Pacific Software Engineering Conference, APSEC).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

SA-RFID: Situation-aware RFID architecture analysis in ubiquitous computing

Jeong, D., Kim, Y. G. & In, H. P., 2004, Proceedings - 11th Asia-Pacific Software Engineering Conference, APSEC 2004. p. 738-739 2 p. (Proceedings - Asia-Pacific Software Engineering Conference, APSEC).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Towards situation-aware cross-platform ubi-game development

Han, J. H., In, H. P. & Woo, J. S., 2004, Proceedings - 11th Asia-Pacific Software Engineering Conference, APSEC 2004. p. 734-735 2 p. (Proceedings - Asia-Pacific Software Engineering Conference, APSEC).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Citations (Scopus)
2003

A prototype of information requirement elicitation in m-commerce

Sun, J., In, H. P. & Sukasdadi, K. A., 2003, Proceedings - IEEE International Conference on E-Commerce, CEC 2003. Zhang, L-J. & Chung, J-Y. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 53-56 4 p. 1210233. (Proceedings - IEEE International Conference on E-Commerce, CEC 2003).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

7 Citations (Scopus)

Q-MAR: A QoS resource conflict identification model for situation-aware middleware

In, H., Kim, C., Yun, U. & Yau, S. S., 2003, Proceedings of the IEEE Computer Society Workshop on Future Trends of Distributed Computing Systems. IEEE Computer Society, Vol. 2003-January. p. 212-218 7 p. 1204335

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

Situation-aware contract specification language for middleware for ubiquitous computing

Yau, S. S., Wang, Y., Huang, D. & In, H., 2003, Proceedings of the IEEE Computer Society Workshop on Future Trends of Distributed Computing Systems. IEEE Computer Society, Vol. 2003-January. p. 93-99 7 p. 1204315

Research output: Chapter in Book/Report/Conference proceedingConference contribution

17 Citations (Scopus)

Web-based feature reduction system: A case study

In, H., Foster, T., Surprise, J., Jung, S. O., Simmons, D. & Fujihara, H., 2003, Proceedings - 2003 Symposium on Applications and the Internet, SAINT 2003. Institute of Electrical and Electronics Engineers Inc., p. 406-407 2 p. 1183085

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2002

Multi-criteria preference analysis for systematic requirements negotiation

In, H. P., Olson, D. & Rodgers, T., 2002, Proceedings - IEEE Computer Society's International Computer Software and Applications Conference. p. 887-892 6 p. (Proceedings - IEEE Computer Society's International Computer Software and Applications Conference).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

39 Citations (Scopus)

SmartClick: An enabler for human-centered wireless Web service

Kang, S. R., In, H. & Zhao, W., 2002, Proceedings - 4th IEEE International Workshop on Advanced Issues of E-Commerce and Web-Based Information Systems, WECWIS 2002. Institute of Electrical and Electronics Engineers Inc., p. 187-194 8 p. 1021258

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)