A seamless lawful interception architecture for mobile users in IEEE 802.16e networks

Myoungrak Lee , Taek Lee , Byungsik Yoon , Hyogon Kim
Journal of Communications and Networks 11 ( 6) 626 -633

5
2009
A Quality Attributes Evaluation Method for an Agile Approach

Taehoon Um , Neunghoe Kim , Donghyun Lee , Hoh Peter In
acis/jnu international conference on computers, networks, systems and industrial engineering 460 -461

4
2011
Developer Micro Interaction Metrics for Software Defect Prediction

Taek Lee , Jaechang Nam , Donggyun Han , Sunghun Kim
IEEE Transactions on Software Engineering 42 ( 11) 1015 -1035

29
2016
Making every student a winner: The WinWin approach in software engineering education

Paul Grünbacher , Norbert Seyff , Robert O. Briggs , Hoh Peter In
Journal of Systems and Software 80 ( 8) 1191 -1200

16
2007
Customer Value-based HW/SW Partitioning Decision in Embedded Systems

Neunghoe Kim , Taek Lee , Donghyun Lee , Keun Lee
software engineering, artificial intelligence, networking and parallel/distributed computing 257 -262

1
2008
Defending Battery Exhaustion Attacks on Mobile Systems

Sungyong Shin , Taek Lee , Hoh Peter In
computer software and applications conference 2 347 -352

3
2009
Mobile user-preference-based data dissemination on mobile P2P networks

Dohoon Kim , Young-Gab Kim , Hoh Peter In
Eurasip Journal on Wireless Communications and Networking 2011 ( 1) 118

2011
Topic Modeling Based Warning Prioritization from Change Sets of Software Repository

Hoh Peter In , Jung-Been Lee , Taek Lee
Journal of Computer Science and Technology 35 ( 6) 1461 -1479

2020
An adaptive loss protection for video transmission over content-centric networks

Longzhe Han , Seung-Seok Kang , Hoh Peter In
Multimedia Tools and Applications 74 ( 19) 8279 -8292

2015
Techniques study of IMS/SIP based Lawful Interception in 3G networks

Myoung-rak Lee , Sang-Ho Pyo , Hoh Peter In
Journal of the Korea Institute of Information Security and Cryptology 25 ( 6) 1411 -1420

2015
Effective Appliance Selection by Complementary Context Feeding in Smart Home System

Taek Lee , Jiyong Park , Hoh Peter In
Software Technologies for Embedded and Ubiquitous Systems 233 -242

2007
Micro interaction metrics for defect prediction

Taek Lee , Jaechang Nam , DongGyun Han , Sunghun Kim
foundations of software engineering 311 -321

103
2011
Detecting usability problems in mobile applications on the basis of dissimilarity in user behavior

JongWook Jeong , NeungHoe Kim , Hoh Peter In
International Journal of Human-computer Studies \/ International Journal of Man-machine Studies 139 102364

23
2020
Security risk vector for quantitative asset assessment

Yoon Jung Chung , InJung Kim , NamHoon Lee , Taek Lee
international conference on computational science and its applications 3481 274 -283

6
2005
Cyber Criminal Activity Analysis Models using Markov Chain for Digital Forensics

Do Hoon Kim , Hoh Peter In
international conference on information security 193 -198

3
2008
Maximizing Return on Security Safeguard Investment with Constraint Satisfaction

Taek Lee , Dohoon Kim , Hoh Peter In
international conference on information security 172 -175

2008
A situation aware personalization in ubiquitous mobile computing environments

Heeseo Chae , Do-Hoon Kim , Dongwon Jeong , Hoh Peter In
embedded and ubiquitous computing 213 -223

2
2006
EURECA: End‐user requirements engineering with collaborative animation

Neunghoe Kim , Soojin Park , Dongwon Jeong , Mansoo Hwang
Software - Practice and Experience 47 ( 7) 1001 -1012

1
2017
Low-Cost H.264/AVC Inter Frame Mode Decision Algorithm for Mobile Communication Systems

Xingang Liu , Kwanghoon Sohn , Meikang Qiu , Minho Jo
Mobile Networks and Applications 17 ( 1) 110 -118

4
2012
A scheme for data confidentiality in Cloud-assisted Wireless Body Area Networks

Nguyen Dinh Han , Longzhe Han , Dao Minh Tuan , Hoh Peter In
Information Sciences 284 157 -166

22
2014