A Probabilistic Model of Damage Propagation based on the Markov Process

Baik Doo-Kwon , Kim Young-Gab , In Hoh-Peter , Baek Young-Kyo
Journal of KIISE:Computer Systems and Theory 33 ( 8) 524 -535

7
2006
PA-DHK: Polarity analysis for discovering hidden knowledge

S. H. Hwang , H. Lee , J. D. Kim , J. Son
Scientia Iranica 22 ( 6) 2198 -2208

2015
Web-based feature reduction system: a case study

Hoh Peter In , T. Foster , J. Surprise , S.-O. Jung
symposium on applications and the internet 406 -407

2003
SmartClick: An enabler for human-centered wireless Web service

Seong-ryong Kang , Hoh Peter In , Wei Zhao
international workshop on advanced issues of e commerce and web based information systems wecwis 187 -194

1
2002
Situation-awareness overheating protection solution for mobile devices

ChangKyun Jeon , NeungHoe Kim , Hoh Peter In
international conference on consumer electronics 618 -619

2015
Situation aware RFID system: evaluating abnormal behavior detecting approach

Heeseo Chae , Taek Lee , Hoh Peter In
collaborative computing 115 -120

4
2006
A shared information system architecture for integrating risk management tools: a case study

Hoh Peter In , M.S. Feather , Shaosong Xu
computer software and applications conference 785 -792

2002
Situation-aware contract specification language for middleware for ubiquitous computing

Stephen S. Yau , Yu Wang , Dazhi Huang , Hoh P. In
ieee computer society workshop on future trends of distributed computing systems 93 -99

37
2003
Issues of visualized conflict resolution

Hoh In , S. Roy
international conference on requirements engineering 314 -315

3
2001
A requirements negotiation model based on multi-criteria analysis

Hoh In , D. Olson , T. Rodgers
Requirements Engineering 312 -313

19
2001
Software Cost Option Strategy Tool (S-COST)

Barry Boehm , Hoh In ,
computer software and applications conference 15 -20

10
1996
Transforming legacy energy management system (EMS) modules into reusable components: a case study

Qing Zhao , Hoh In , Xiaowei Wu , Garng Huang
computer software and applications conference 105 -110

4
2000
An Adaptive FEC Mechanism Using Cross-layer Approach to Enhance Quality of Video Transmission over 802.11 WLANs

Long-Zhe Han , Sung-Jun Park , Seung-Seok Kang , Hoh-Peter In
Ksii Transactions on Internet and Information Systems 4 ( 3) 341 -357

17
2010
Detecting Abnomal Behaviors Using The Situation-aware RFID System

Hee-Seo Chae , Hoh-Peter In
Proceedings of the Korean Information Science Society Conference 832 -834

2005
A Probabilistic Approach to Estimate the Damage Propagation of Cyber Attacks

Taek Lee' Young-Gab Kim , Hoh Peter In¹ , Yoon-Jung Chung , InJung Kim
Information Security and Cryptology 175 -175

2005
Software engineering issues for ubiquitous entertainment service

Hoh Peter In , Dong Hyun Lee
software engineering and knowledge engineering 790

2005
A situation-aware cross-platform architecture for ubiquitous game

Young Ik Eom , Hoh Peter In , Jung Hyun Han , Hee Seo Chae
Computing and Informatics \/ Computers and Artificial Intelligence 28 ( 5) 619 -633

3
2009
Scalable attack graph for risk assessment

Heejo Lee , Hoh Peter In , Jehyun Lee
international conference on information networking 78 -82

14
2009
A multi-view API impact analysis for open SPL platform

Kangtae Kim , Hoh Peter In , Eunyoung Kim
international conference on advanced communication technology 1 686 -691

2010
Requirements Negotiation Using Multi-Criteria Preference Analysis

Hoh Peter In , David Olson
Journal of Universal Computer Science 10 ( 4) 306 -325

18
2004