A Scrum Development Process using a Concurrent Testing

Sok Kee , Neung-Hoe Kim , Dong-Hyun Lee , Hoh Peter In
Proceedings of the Korean Information Science Society Conference 190 -193

2011
Requirements Trace Table based on Pain Chain for improving Maintainability

Kyung-Hwan Kim , Neung-Hoe Kim , Dong-Hyun Lee , Hoh Peter In
Proceedings of the Korean Information Science Society Conference 206 -209

2011
Prioritizing stakeholders using supervised learning method in the requirements elicitation

Chang-Kyun Jeon , Yoon-Kyu Lee , Dong-Hyun Lee , Hoh Peter In
entropy 1 1 -1

2011
Customer Value-Based ROI Evaluation in Testing

Youngsub Han , Neunghoe Kim , Hoh Peter In

2011
2011
Markov Chain Model-Based Trainee Behavior Pattern Analysis to Evaluate Mission Completion in Security Training System

Taek Lee , Do-Hoon Kim , Myong-Rak Lee , Hoh Peter In
Proceedings of the Korean Information Science Society Conference 152 -153

2010
Quality Evaluation of Architecture Tactics using Bayesian Belief Network

Jung-Been Lee , Dong-Hyun Lee , Neung-Hoe Kim , Hoh Peter In
Proceedings of the Korea Information Processing Society Conference 330 -331

2010
A Study on the Method of Requirements Prioritization by Quantitative of Customer Value-Case Study on Public Services Industry SI Project

Tae-Hyun Kim , Hoh Peter In , Dong-Hyun Lee , Neung-Hoe Kim
Proceedings of the Korea Information Processing Society Conference 326 -329

2010
Study for the IMS/SIP based Lawful Interception Architecture

Tae-hoon Um , Do-Hoon Kim , Jung-Been Lee , Song-In Choi
Proceedings of the Korea Information Processing Society Conference 1130 -1133

2010
SIP-based Lawful Interception Process in IP Multimedia Subsystem

Jung-Been Lee , Do-Hoon Kim , Byungsik Yoon , Suk-jin Lee

2010
HMM-based Gesture Recognition Process on Contact-free Sensors

Jungyeon Kim , Sean Park Do Hoon Kim , Hoh Peter In

2010
Value-based Software Release Planning

Jehun Kim , Nunghoe Kim , Donghyun Lee , Youngsub Han

2010
Performance Bottleneck Detection in Flash Translation Layer

Jin-Young Lee , Neung-Hoe Kim , Dong-Hyun Lee , Hoh Peter In

2010
SI Project Success and Failure in Korea thru Standish CHAOS Report

Hyeong-Seok Yoon , Seouk-Joo Lee , Dong-Hyun Lee , Neung-Hoe Kim
Proceedings of the Korea Information Processing Society Conference 827 -828

2009
Detecting Voice Phishing using Public Key Cryptography in VoIP

Sungyong Shin , Myongrak Lee , Donghyun Lee , Hoh Peter In
Proceedings of the Korea Information Processing Society Conference 647 -648

2009
Value & Risk-based SW Test Prioritization Method

Jung-Woo Lee , Dong-Hyun Lee , Neung-Hoe Kim , Hoh Peter In
Proceedings of the Korea Information Processing Society Conference 837 -838

2009
Threshold estimation methodology for detection of Botnet malicious activity

Do-Hoon Kim , Hoh Peter In , Hyun-Cheol Jeong
Proceedings of the Korea Information Processing Society Conference 607 -608

2009
Kay Factors of SW Development Productivity in a CMMI Level 3 Organization

Su-Hyoung Lee , Dong-Hyun Lee , Neung-Hoe Kim , Hoh Peter In
Proceedings of the Korea Information Processing Society Conference 833 -834

2009
Quality-based Architecture Evaluation Utilizing CBAM

Jung-Been Lee , Dong-Hyun Lee , Neung-Hoe Kim , Hoh Peter In
Proceedings of the Korea Information Processing Society Conference 821 -822

2009
Two-Pass Abstraction Principle for Identifying Reusable Object

Hyung-Ho Ko , Neung-Hoe Kim , Dong-Hyun Lee , Hoh Peter In
Journal of Information Technology Services 8 ( 3) 145 -157

2009