Hoh P. In - Publications

Texas A & M University, College Station, TX, United States 
Computer Science

35 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2020 Jeong JW, Kim NH, In HP. Detecting usability problems in mobile applications on the basis of dissimilarity in user behavior International Journal of Human-Computer Studies \/ International Journal of Man-Machine Studies. 139: 102364. DOI: 10.1016/J.Ijhcs.2019.10.001  0.337
2020 Jeong JW, Kim NH, In HP. GUI information-based interaction logging and visualization for asynchronous usability testing Expert Systems With Applications. 151: 113289. DOI: 10.1016/J.Eswa.2020.113289  0.331
2019 Lee J, Lee T, In HP. Automatic stop word generation for mining software artifact using topic model with pointwise mutual information Ieice Transactions On Information and Systems. 1761-1772. DOI: 10.1587/Transinf.2018Edp7390  0.304
2017 Kim N, Park S, Jeong D, Hwang M, Park S, In HP. EURECA: End‐user requirements engineering with collaborative animation Software - Practice and Experience. 47: 1001-1012. DOI: 10.1002/Spe.2471  0.394
2016 Han Y, Lee DH, Choi B, Hinchey M, In HP. Value-driven V-model: From requirements analysis to acceptancetesting Ieice Transactions On Information and Systems. 1776-1785. DOI: 10.1587/Transinf.2015Edp7451  0.326
2016 Lee T, Nam J, Han D, Kim S, In HP. Developer Micro Interaction Metrics for Software Defect Prediction Ieee Transactions On Software Engineering. 42: 1015-1035. DOI: 10.1109/Tse.2016.2550458  0.345
2015 Kim JD, Na HS, Hwang SH, In HP, Baik DK. Life data monitoring and analysis model for personalized healthcare. Technology and Health Care : Official Journal of the European Society For Engineering and Medicine. PMID 26409538 DOI: 10.3233/Thc-151051  0.3
2015 Kim JD, In HP, Hwang SH, Baik DK. Ontology Integration Framework Based on XMDR Applied Mechanics and Materials. 936-940. DOI: 10.4028/Www.Scientific.Net/Amm.764-765.936  0.304
2015 Jeon C, Kim N, In HP. Probabilistic Approach to Predicting Risk in Software Projects Using Software Repository Data International Journal of Software Engineering and Knowledge Engineering. 25: 1017-1032. DOI: 10.1142/S0218194015500151  0.325
2014 Han L, Han ND, Kang SS, In HP. Cross-layer video streaming mechanism over cognitive radio ad hoc information centric networks Ksii Transactions On Internet and Information Systems. 8: 3775-3788. DOI: 10.3837/Tiis.2014.11.007  0.322
2014 Lee T, Kim D, Jeong H, In HP. Risk prediction of malicious code-infected websites by mining vulnerability features International Journal of Security and Its Applications. 8: 291-294. DOI: 10.14257/Ijsia.2014.8.1.27  0.328
2014 Han ND, Han L, Tuan DM, In HP, Jo M. A scheme for data confidentiality in Cloud-assisted Wireless Body Area Networks Information Sciences. 284: 157-166. DOI: 10.1016/J.Ins.2014.03.126  0.315
2014 Kim D, Lee J, Kim YG, Yoon B, In HP. 3G IP Multimedia Subsystem based framework for lawful interception Annales Des Telecommunications/Annals of Telecommunications. 69: 347-361. DOI: 10.1007/S12243-013-0399-Y  0.351
2014 Han L, Kang SS, In HP. An adaptive loss protection for video transmission over content-centric networks Multimedia Tools and Applications. 74: 8279-8292. DOI: 10.1007/S11042-014-1874-9  0.337
2013 Lee DH, In HP, Lee K, Park S, Hinchey M. Sustainable embedded software life-cycle planning Ieee Software. 30: 72-80. DOI: 10.1109/Ms.2012.75  0.327
2013 Han L, Kang SS, Kim H, In HP. Adaptive retransmission scheme for video streaming over content-centric wireless networks Ieee Communications Letters. 17: 1292-1295. DOI: 10.1109/Lcomm.2013.043013.130326  0.303
2012 Jeon CK, Kim NH, Lee DH, Lee T, In HP. Stakeholder conflict resolution model (S-CRM) based on supervised learning Ksii Transactions On Internet and Information Systems. 6: 2813-2826. DOI: 10.3837/Tiis.2012.10.004  0.355
2012 Liu X, Sohn K, Qiu M, Jo M, In HP. Low-Cost H.264/AVC inter frame mode decision algorithm for mobile communication systems Mobile Networks and Applications. 17: 110-118. DOI: 10.1007/S11036-011-0315-5  0.313
2011 Lee YK, Kim NH, Kim D, Lee DH, In HP. Customer requirements elicitation based on social network service Ksii Transactions On Internet and Information Systems. 5: 1733-1750. DOI: 10.3837/Tiis.2011.10.003  0.341
2011 In HP, Lee M, Kim D, Kim N, Yoon B. Seamless lawful interception handover for 3G IP multimedia subsystem (IMS) Ksii Transactions On Internet and Information Systems. 5: 1329-1345. DOI: 10.3837/Tiis.2011.07.007  0.346
2011 Kim D, Kim YG, In HP. Mobile user-preference-based data dissemination on mobile P2P networks Eurasip Journal On Wireless Communications and Networking. 2011. DOI: 10.1186/1687-1499-2011-118  0.353
2010 Han L, Park S, Kanz SS, In HP. An adaptive FEC mechanism using cross-layer approach to enhance quality of video transmission over 802.11 WLANs Ksii Transactions On Internet and Information Systems. 4: 341-357. DOI: 10.3837/Tiis.2010.06.009  0.331
2010 Lee M, Yoon B, Kim H, In HP. A seamless lawful interception triggering architecture for the heterogeneous wireless networks Ieice Transactions On Information and Systems. 473-483. DOI: 10.1587/Transinf.E93.D.473  0.33
2009 Lee M, Lee T, Yoon B, Kim H, In HP. A seamless Lawful interception architecture for mobile users in IEEE 802.16e networks Journal of Communications and Networks. 11: 626-633. DOI: 10.1109/Jcn.2009.6388416  0.338
2008 Kim S, In HP, Baik J, Kazman R, Han K. VIRE: Sailing a blue ocean with value-innovative requirements Ieee Software. 25: 80-87. DOI: 10.1109/Ms.2008.27  0.526
2006 In HP, Baik J, Kim S, Yang Y, Boehm B. A quality-based cost estimation model for the product line life cycle Communications of the Acm. 49. DOI: 10.1145/1183236.1183273  0.576
2005 Jeong D, Kim YG, In HP. Quantitative evaluations on the query modeling and system integrating cost of SQL/MDR Etri Journal. 27: 367-375. DOI: 10.4218/Etrij.05.0104.0144  0.307
2005 Jeong D, Kim Y, In H. New RFID System Architectures Supporting Situation Awareness under Ubiquitous Environments Journal of Computer Science. 1: 114-120. DOI: 10.3844/Jcssp.2005.114.120  0.308
2005 Im EG, In HP, Choi DS, Song YH. Adaptation policies for web server intrusion-tolerant system Ieice Transactions On Communications. 3462-3465. DOI: 10.1093/Ietcom/E88-B.8.3462  0.335
2005 Kazman R, In HP, Chen HM. From requirements negotiation to software architecture decisions Information and Software Technology. 47: 511-520. DOI: 10.1016/J.Infsof.2004.10.001  0.372
2004 Lee J, Ko M, Kim J, Moon C, Kim Y, In HP. Analyzing Web Interfaces of Databases for Retrieving Web Information Lecture Notes in Computer Science. 331-336. DOI: 10.1007/978-3-540-30483-8_40  0.302
2001 In H, Roy S. Issues of visualized conflict resolution Requirements Engineering. 314-315. DOI: 10.1109/Isre.2001.948601  0.338
2001 In H, Olson D, Rodgers T. A requirements negotiation model based on multi-criteria analysis Requirements Engineering. 312-313. DOI: 10.1109/Isre.2001.948600  0.34
2001 In H, Boehm BW. Using WinWin Quality Requirements Management Tools: A Case Study Annals of Software Engineering. 11: 141-174. DOI: 10.1023/A:1012547320602  0.498
1996 Boehm B, In H. Identifying quality-requirement conflicts Ieee Software. 13: 25-36. DOI: 10.1109/52.506460  0.503
Show low-probability matches.