• 943 Citations
  • 16 h-Index
19962020

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Output

Filter
Article
2020

Detecting usability problems in mobile applications on the basis of dissimilarity in user behavior

Jeong, J. W., Kim, N. H. & In, H. P., 2020 Jul, In : International Journal of Human Computer Studies. 139, 102364.

Research output: Contribution to journalArticle

1 Citation (Scopus)

GUI information-based interaction logging and visualization for asynchronous usability testing

Jeong, J. W., Kim, N. H. & In, H. P., 2020 Aug 1, In : Expert Systems With Applications. 151, 113289.

Research output: Contribution to journalArticle

2019

Automatic stop word generation for mining software artifact using topic model with pointwise mutual information

Lee, J. B., Lee, T. & In, H., 2019 Jan 1, In : IEICE Transactions on Information and Systems. E102D, 9, p. 1761-1772 12 p.

Research output: Contribution to journalArticle

Open Access
1 Citation (Scopus)
Open Access
9 Citations (Scopus)
2018

Adaptive kinetic scrolling: Kinetic scrolling for large datasets on mobile devices

Jeong, J., Kim, N. & In, H., 2018 Oct 23, In : Applied Sciences (Switzerland). 8, 11, 2015.

Research output: Contribution to journalArticle

2 Citations (Scopus)

Measuring the degree of content immersion in a nonexperimental environment using a portable EEG device

Keum, N. H., Lee, T., Lee, J. B. & In, H., 2018 Jan 1, In : Journal of Information Processing Systems. 14, 4, p. 1049-1061 13 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)
2017

A probabilistic approach to building defect prediction model for platform-based product lines

Jeon, C. K., Kim, N. H. & In, H., 2017, In : International Arab Journal of Information Technology. 14, 4, p. 413-422 10 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)

Comparison of wearable activity tracker with actigraphy for sleep evaluation and circadian rest-activity rhythm measurement in healthy young adults

Lee, H. A., Lee, H-J., Moon, J. H., Lee, T., Kim, M. G., In, H., Cho, C. H. & Kim, L., 2017 Mar 1, In : Psychiatry Investigation. 14, 2, p. 179-185 7 p.

Research output: Contribution to journalArticle

25 Citations (Scopus)

EURECA: End-user requirements engineering with collaborative animation

Kim, N., Park, S., Jeong, D., Hwang, M., Park, S. & In, H., 2017 Jul 1, In : Software - Practice and Experience. 47, 7, p. 1001-1012 12 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)

Levenshtein distance-based regularity measurement of circadian rhythm patterns

Lee, T. & In, H., 2017 Sep 30, In : Journal of Theoretical and Applied Information Technology. 95, 18, p. 4358-4366 9 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)

Saving deployment costs of smart contracts by eliminating gas-wasteful patterns

Park, J., Lee, D. & In, H., 2017 Jan 1, In : International Journal of Grid and Distributed Computing. 10, 12, p. 53-64 12 p.

Research output: Contribution to journalArticle

2016

Developer Micro Interaction Metrics for Software Defect Prediction

Lee, T., Nam, J., Han, D., Kim, S. & In, H., 2016 Nov 1, In : IEEE Transactions on Software Engineering. 42, 11, p. 1015-1035 21 p., 7447797.

Research output: Contribution to journalArticle

24 Citations (Scopus)

Value-driven V-model: From requirements analysis to acceptancetesting

Han, Y., Lee, D. H., Choi, B., Hinchey, M. & In, H., 2016 Jul 1, In : IEICE Transactions on Information and Systems. E99D, 7, p. 1776-1785 10 p.

Research output: Contribution to journalArticle

2015

Effect analysis of coding convention violations on readability of post-delivered code

Lee, T., Lee, J. B. & In, H., 2015 Jul 1, In : IEICE Transactions on Information and Systems. E98D, 7, p. 1286-1296 11 p.

Research output: Contribution to journalArticle

2 Citations (Scopus)

Life data monitoring and analysis model for personalized healthcare

Kim, J. D., Na, H. S., Hwang, S. H., In, H. & Baik, D. K., 2015 Dec 8, In : Technology and Health Care. 24, s1, p. S49-S57

Research output: Contribution to journalArticle

PA-DHK: Polarity analysis for discovering hidden knowledge

Kim, J. D., Son, J., In, H., Hwang, S. H., Lee, H. & Baik, D. K., 2015, In : Scientia Iranica. 22, 6, p. 2198-2208 11 p.

Research output: Contribution to journalArticle

Probabilistic Approach to Predicting Risk in Software Projects Using Software Repository Data

Jeon, C., Kim, N. & In, H., 2015 Aug 1, In : International Journal of Software Engineering and Knowledge Engineering. 25, 6, p. 1017-1032 16 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)

Situation-aware money for IoT payment using Bitcoin

Mohammed, A. S., Lee, T., Jung, J. & In, H., 2015, In : International Journal of Applied Engineering Research. 10, 21, p. 41757-41760 4 p.

Research output: Contribution to journalArticle

2014

3G IP Multimedia Subsystem based framework for lawful interception

Kim, D., Lee, J., Kim, Y. G., Yoon, B. & In, H., 2014 Jan 1, In : Annales des Telecommunications/Annals of Telecommunications. 69, 7-8, p. 347-361 15 p.

Research output: Contribution to journalArticle

Adaptive time-to-trigger scheme for optimizing LTE handover

Kim, J., Lee, G. & In, H., 2014 Jan 1, In : International Journal of Control and Automation. 7, 4, p. 35-44 10 p.

Research output: Contribution to journalArticle

Adaptive Time-to-Trigger Scheme for Optimizing LTE Handover

Kim, J., Lee, G. & In, H., 2014, In : International Journal of Control and Automation. 7, 4, p. 35-44 10 p.

Research output: Contribution to journalArticle

A method for risk measurement of botnet's malicious activities

Kim, D., Kim, Y. G., In, H. & Jeong, H. C., 2014 Jan 1, In : Information (Japan). 17, 1, p. 165-180 16 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)

An adaptive loss protection for video transmission over content-centric networks

Han, L., Kang, S. S. & In, H., 2014 Feb 16, In : Multimedia Tools and Applications. 74, 19, p. 8279-8292 14 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)

An entropy based method for defect prediction in software product lines

Jeon, C. K., Byun, C., Kim, N. H. & In, H., 2014 Jan 1, In : International Journal of Multimedia and Ubiquitous Engineering. 9, 3, p. 375-377 3 p.

Research output: Contribution to journalArticle

3 Citations (Scopus)

A scheme for data confidentiality in Cloud-assisted Wireless Body Area Networks

Han, N. D., Han, L., Tuan, D. M., In, H. & Jo, M., 2014 Nov 10, In : Information Sciences. 284, p. 157-166 10 p.

Research output: Contribution to journalArticle

28 Citations (Scopus)

A survey: energy exhausting attacks in MAC protocols in WBANs

Jo, M., Han, L., Tan, N. D. & In, H., 2014, In : Telecommunication Systems. 58, 2, p. 153-164 12 p.

Research output: Contribution to journalArticle

22 Citations (Scopus)

Cross-layer video streaming mechanism over cognitive radio ad hoc information centric networks

Han, L., Han, N. D., Kang, S. S. & In, H., 2014 Jan 1, In : KSII Transactions on Internet and Information Systems. 8, 11, p. 3775-3788 14 p.

Research output: Contribution to journalArticle

GRAS: Non-programming approach to generate an adaptation strategy in runtime

Kim, D. & In, H., 2014 Jan 1, In : Contemporary Engineering Sciences. 7, 13-16, p. 617-628 12 p.

Research output: Contribution to journalArticle

Measuring usability of requirements using social network service in product line engineering

Park, S. E., Kim, N., Lee, J. B., Lee, G. & In, H. P., 2014, In : International Journal of Multimedia and Ubiquitous Engineering. 9, 3, p. 213-218 6 p.

Research output: Contribution to journalArticle

Risk prediction of malicious code-infected websites by mining vulnerability features

Lee, T., Kim, D., Jeong, H. & In, H., 2014 Feb 20, In : International Journal of Security and its Applications. 8, 1, p. 291-294 4 p.

Research output: Contribution to journalArticle

2 Citations (Scopus)

Self-adaptive testing to determine sample size for flash memory solutions

Byun, C. H., Jeon, C. K., Lee, T. & In, H., 2014 Jun 27, In : KSII Transactions on Internet and Information Systems. 8, 6, p. 2139-2151 13 p.

Research output: Contribution to journalArticle

Swarm collaborative filtering through fish school search

Rozie, A. F. & In, H. P., 2014, In : International Journal of Software Engineering and its Applications. 8, 3, p. 251-254 4 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)
2013

Adaptive retransmission scheme for video streaming over content-centric wireless networks

Han, L., Kang, S. S., Kim, H. & In, H., 2013 May 15, In : IEEE Communications Letters. 17, 6, p. 1292-1295 4 p., 6515205.

Research output: Contribution to journalArticle

19 Citations (Scopus)

An adaptive algorithm to recommend favorable digital music

Lee, T. & In, H., 2013 Dec 12, In : International Journal of Multimedia and Ubiquitous Engineering. 8, 6, p. 87-96 10 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)

An energy-efficient routing protocol for CCN-based MANETs

Lee, G., Han, L., Park, Y., Lee, J. B., Kim, J. & In, H., 2013 Apr 16, In : International Journal of Smart Home. 7, 1, p. 143-152 10 p.

Research output: Contribution to journalArticle

16 Citations (Scopus)

A study of different coding styles affecting code readability

Lee, T., Lee, J. B. & In, H. P., 2013 Oct 30, In : International Journal of Software Engineering and its Applications. 7, 5, p. 413-422 10 p.

Research output: Contribution to journalArticle

10 Citations (Scopus)

Selfish attacks and detection in cognitive radio Ad-Hoc networks

Jo, M., Han, L., Kim, D. & In, H. P., 2013 Jun 24, In : IEEE Network. 27, 3, p. 46-50 5 p., 6523808.

Research output: Contribution to journalArticle

78 Citations (Scopus)

Sustainable embedded software life-cycle planning

Lee, D. H., In, H., Lee, K., Park, S. & Hinchey, M., 2013 Jul 22, In : IEEE Software. 30, 4, p. 72-80 9 p., 6226340.

Research output: Contribution to journalArticle

2 Citations (Scopus)
2012

Adaptive pattern mining model for early detection of botnet-propagation scale

Kim, D. H., Lee, T., Kang, J., Jeong, H. & In, H. P., 2012 Aug, In : Security and Communication Networks. 5, 8, p. 917-927 11 p.

Research output: Contribution to journalArticle

4 Citations (Scopus)

Low-Cost H.264/AVC inter frame mode decision algorithm for mobile communication systems

Liu, X., Sohn, K., Qiu, M., Jo, M. & In, H., 2012 Feb 1, In : Mobile Networks and Applications. 17, 1, p. 110-118 9 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)

Stakeholder conflict resolution model (S-CRM) based on supervised learning

Jeon, C. K., Kim, N. H., Lee, D. H., Lee, T. & In, H. P., 2012 Nov 30, In : KSII Transactions on Internet and Information Systems. 6, 11, p. 2813-2826 14 p.

Research output: Contribution to journalArticle

The research on social influence-based cache replacement policy over wireless Information-Centric Network

Park, Y., Han, L., Lee, G., Seo, D. M. & In, H. P., 2012 Dec 1, In : International Journal of Software Engineering and its Applications. 6, 4, p. 273-280 8 p.

Research output: Contribution to journalArticle

2011

Customer requirements elicitation based on social network service

Lee, Y. K., Kim, N. H., Kim, D., Lee, D. H. & In, H., 2011 Oct 31, In : KSII Transactions on Internet and Information Systems. 5, 10, p. 1733-1750 18 p.

Research output: Contribution to journalArticle

11 Citations (Scopus)

Mobile user-preference-based data dissemination on mobile P2P networks

Kim, D., Kim, Y. G. & In, H., 2011 Dec 1, In : Eurasip Journal on Wireless Communications and Networking. 2011, 1, 118.

Research output: Contribution to journalArticle

1 Citation (Scopus)

Seamless lawful interception handover for 3G IP multimedia subsystem (IMS)

In, H. P., Lee, M., Kim, D., Kim, N. & Yoon, B., 2011 Jul 28, In : KSII Transactions on Internet and Information Systems. 5, 7, p. 1329-1345 17 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)
2010

An adaptive FEC mechanism using cross-layer approach to enhance quality of video transmission over 802.11 WLANs

Han, L., Park, S., Kanz, S. S. & In, H. P., 2010 Jun 30, In : KSII Transactions on Internet and Information Systems. 4, 3, p. 341-357 17 p.

Research output: Contribution to journalArticle

14 Citations (Scopus)

A seamless lawful interception triggering architecture for the heterogeneous wireless networks

Lee, M., Yoon, B., Kim, H. & In, H., 2010 Apr 6, In : IEICE Transactions on Information and Systems. E93-D, 3, p. 473-483 11 p.

Research output: Contribution to journalArticle

2 Citations (Scopus)
2009

A seamless Lawful interception architecture for mobile users in IEEE 802.16e networks

Lee, M., Lee, T., Yoon, B., Kim, H. & In, H., 2009 Dec 1, In : Journal of Communications and Networks. 11, 6, p. 626-633 8 p.

Research output: Contribution to journalArticle

2 Citations (Scopus)

A situation-aware cross-platform architecture for ubiquitous game

Han, J., Lee, D. H., Kim, H., In, H., Chae, H. S., Hwang, E. J. & Ik Eom, Y., 2009 Dec 1, In : Computing and Informatics. 28, 5, p. 619-633 15 p.

Research output: Contribution to journalArticle

2 Citations (Scopus)

A survival kit: Adaptive hardware/software codesign life-cycle model

Lee, D. H., In, H. P., Lee, K., Park, S. & Hinchey, M., 2009 Mar 9, Computer, 42, 2, p. 100-102 3 p.

Research output: Contribution to specialist publicationArticle

4 Citations (Scopus)