A Survival Kit: Adaptive Hardware/Software Codesign Life-Cycle Model

Dong-hyun Lee , Hoh Peter In , Keun Lee , Sooyong Park
IEEE Computer 42 ( 2) 100 -102

5
2009
Adaptive pattern mining model for early detection of botnet-propagation scale

Do Hoon Kim , Taek Lee , Jaewoo Kang , Hyunchoel Jeong
Security and Communication Networks 5 ( 8) 917 -927

4
2012
Ontology Integration Framework Based on XMDR

Jeong Dong Kim , Hoh Peter In , Suk Hyung Hwang , Doo Kwon Baik
Applied Mechanics and Materials 936 -940

2015
Overlap‐aware rapid type analysis for constructing one‐to‐one matched call graphs in regression test selection

Mingwan Kim , Jongwook Jeong , Neunghoe Kim , Hoh Peter In
IET Software 14 ( 4) 423 -432

2020
Efficient Data Dissemination in Mobile P2P Ad-Hoc Networks for Ubiquitous Computing

Do Hoon Kim , Myoung Rak Lee , Longzhe Han , Hoh Peter In
multimedia and ubiquitous engineering 384 -389

5
2008
Effective Service Decision Using Ambient-Based HHMM in Smart Home System

Jiyong Park , Dohoon Kim , Taek Lee , Hoh Peter In
computer and information technology 979 -984

2007
The Value Gap Model: Value-Based Requirements Elicitation

Sang Won Lim , Taek Lee , Sangsoo Kim , Hoh Peter In
computer and information technology 885 -890

9
2007
A Prioritized Multi-queue Method for H.264/AVC Live Streaming in Wireless Networks

Sungjun Park , Longzhe Han , Hoh Peter In , Eun-Seok Ryu
computer and information technology 2 331 -336

2
2009
A quality-based cost estimation model for the product line life cycle

Hoh Peter In , Jongmoon Baik , Sangsoo Kim , Ye Yang
Communications of the ACM 49 ( 12) 85 -88

41
2006
Cyber Weather Forecasting: Forecasting Unknown Internet Worms Using Randomness Analysis

Hyundo Park , Sung-Oh David Jung , Heejo Lee , Hoh Peter In
information security conference 376 -387

8
2012
Q-MAR: An Adaptive QoS Management Model for Situation-Aware Middleware

Hoh Peter In , ChangHwa Kim , Stephen S. Yau
embedded and ubiquitous computing 972 -981

5
2004
Customer Requirements Validation Method Based on Mental Models

Youn Kyu Lee , Hoh Peter In , Rick Kazman
asia-pacific software engineering conference 199 -206

2
2014
Cascade damage estimation model for internet attacks

Taek Lee , Hoh Peter In , Eul-Gyu Im , Heejo Lee
intelligence and security informatics 163 -164

2006
A Probabilistic Approach to Estimate the Damage Propagation of Cyber Attacks

Young-Gab Kim , Taek Lee , Hoh Peter In , Yoon-Jung Chung
Information Security and Cryptology - ICISC 2005 175 -185

6
2006
An Adaptive Algorithm to Recommend Favorable Digital Music

Taek Lee , Hoh Peter In
multimedia and ubiquitous engineering 8 ( 6) 87 -96

1
2013
Saving Deployment Costs of Smart Contracts by Eliminating Gas-wasteful Patterns

JaeYong Park , Daegeon Lee , Hoh Peter In
International Journal of Grid and Distributed Computing 10 ( 12) 53 -64

2017
Seamless Lawful Interception Handover for 3G IP Multimedia Subsystem (IMS)

Hoh Peter In , Myoung-Rak Lee , Do-Hoon Kim , Nung-Hoe Kim
Ksii Transactions on Internet and Information Systems 5 ( 7) 1329 -1345

8
2011
Quantitative Evaluations on the Query Modeling and System Integrating Cost of SQL/MDR

Dongwon Jeong , Young-Gab Kim , Hoh Peter In
Etri Journal 27 ( 4) 367 -376

4
2005
Priority Determination to Apply Artificial Intelligence Technology in Military Intelligence Areas

Sungrim Cho , Woochang Shin , Neunghoe Kim , Jongwook Jeong
Electronics 9 ( 12) 2187

6
2020