Year |
Citation |
Score |
2020 |
Jeong JW, Kim NH, In HP. Detecting usability problems in mobile applications on the basis of dissimilarity in user behavior International Journal of Human-Computer Studies \/ International Journal of Man-Machine Studies. 139: 102364. DOI: 10.1016/J.Ijhcs.2019.10.001 |
0.337 |
|
2020 |
Jeong JW, Kim NH, In HP. GUI information-based interaction logging and visualization for asynchronous usability testing Expert Systems With Applications. 151: 113289. DOI: 10.1016/J.Eswa.2020.113289 |
0.331 |
|
2019 |
Lee J, Lee T, In HP. Automatic stop word generation for mining software artifact using topic model with pointwise mutual information Ieice Transactions On Information and Systems. 1761-1772. DOI: 10.1587/Transinf.2018Edp7390 |
0.304 |
|
2017 |
Kim N, Park S, Jeong D, Hwang M, Park S, In HP. EURECA: End‐user requirements engineering with collaborative animation Software - Practice and Experience. 47: 1001-1012. DOI: 10.1002/Spe.2471 |
0.394 |
|
2016 |
Han Y, Lee DH, Choi B, Hinchey M, In HP. Value-driven V-model: From requirements analysis to acceptancetesting Ieice Transactions On Information and Systems. 1776-1785. DOI: 10.1587/Transinf.2015Edp7451 |
0.326 |
|
2016 |
Lee T, Nam J, Han D, Kim S, In HP. Developer Micro Interaction Metrics for Software Defect Prediction Ieee Transactions On Software Engineering. 42: 1015-1035. DOI: 10.1109/Tse.2016.2550458 |
0.345 |
|
2015 |
Kim JD, Na HS, Hwang SH, In HP, Baik DK. Life data monitoring and analysis model for personalized healthcare. Technology and Health Care : Official Journal of the European Society For Engineering and Medicine. PMID 26409538 DOI: 10.3233/Thc-151051 |
0.3 |
|
2015 |
Kim JD, In HP, Hwang SH, Baik DK. Ontology Integration Framework Based on XMDR Applied Mechanics and Materials. 936-940. DOI: 10.4028/Www.Scientific.Net/Amm.764-765.936 |
0.304 |
|
2015 |
Jeon C, Kim N, In HP. Probabilistic Approach to Predicting Risk in Software Projects Using Software Repository Data International Journal of Software Engineering and Knowledge Engineering. 25: 1017-1032. DOI: 10.1142/S0218194015500151 |
0.325 |
|
2014 |
Han L, Han ND, Kang SS, In HP. Cross-layer video streaming mechanism over cognitive radio ad hoc information centric networks Ksii Transactions On Internet and Information Systems. 8: 3775-3788. DOI: 10.3837/Tiis.2014.11.007 |
0.322 |
|
2014 |
Lee T, Kim D, Jeong H, In HP. Risk prediction of malicious code-infected websites by mining vulnerability features International Journal of Security and Its Applications. 8: 291-294. DOI: 10.14257/Ijsia.2014.8.1.27 |
0.328 |
|
2014 |
Han ND, Han L, Tuan DM, In HP, Jo M. A scheme for data confidentiality in Cloud-assisted Wireless Body Area Networks Information Sciences. 284: 157-166. DOI: 10.1016/J.Ins.2014.03.126 |
0.315 |
|
2014 |
Kim D, Lee J, Kim YG, Yoon B, In HP. 3G IP Multimedia Subsystem based framework for lawful interception Annales Des Telecommunications/Annals of Telecommunications. 69: 347-361. DOI: 10.1007/S12243-013-0399-Y |
0.351 |
|
2014 |
Han L, Kang SS, In HP. An adaptive loss protection for video transmission over content-centric networks Multimedia Tools and Applications. 74: 8279-8292. DOI: 10.1007/S11042-014-1874-9 |
0.337 |
|
2013 |
Lee DH, In HP, Lee K, Park S, Hinchey M. Sustainable embedded software life-cycle planning Ieee Software. 30: 72-80. DOI: 10.1109/Ms.2012.75 |
0.327 |
|
2013 |
Han L, Kang SS, Kim H, In HP. Adaptive retransmission scheme for video streaming over content-centric wireless networks Ieee Communications Letters. 17: 1292-1295. DOI: 10.1109/Lcomm.2013.043013.130326 |
0.303 |
|
2012 |
Jeon CK, Kim NH, Lee DH, Lee T, In HP. Stakeholder conflict resolution model (S-CRM) based on supervised learning Ksii Transactions On Internet and Information Systems. 6: 2813-2826. DOI: 10.3837/Tiis.2012.10.004 |
0.355 |
|
2012 |
Liu X, Sohn K, Qiu M, Jo M, In HP. Low-Cost H.264/AVC inter frame mode decision algorithm for mobile communication systems Mobile Networks and Applications. 17: 110-118. DOI: 10.1007/S11036-011-0315-5 |
0.313 |
|
2011 |
Lee YK, Kim NH, Kim D, Lee DH, In HP. Customer requirements elicitation based on social network service Ksii Transactions On Internet and Information Systems. 5: 1733-1750. DOI: 10.3837/Tiis.2011.10.003 |
0.341 |
|
2011 |
In HP, Lee M, Kim D, Kim N, Yoon B. Seamless lawful interception handover for 3G IP multimedia subsystem (IMS) Ksii Transactions On Internet and Information Systems. 5: 1329-1345. DOI: 10.3837/Tiis.2011.07.007 |
0.346 |
|
2011 |
Kim D, Kim YG, In HP. Mobile user-preference-based data dissemination on mobile P2P networks Eurasip Journal On Wireless Communications and Networking. 2011. DOI: 10.1186/1687-1499-2011-118 |
0.353 |
|
2010 |
Han L, Park S, Kanz SS, In HP. An adaptive FEC mechanism using cross-layer approach to enhance quality of video transmission over 802.11 WLANs Ksii Transactions On Internet and Information Systems. 4: 341-357. DOI: 10.3837/Tiis.2010.06.009 |
0.331 |
|
2010 |
Lee M, Yoon B, Kim H, In HP. A seamless lawful interception triggering architecture for the heterogeneous wireless networks Ieice Transactions On Information and Systems. 473-483. DOI: 10.1587/Transinf.E93.D.473 |
0.33 |
|
2009 |
Lee M, Lee T, Yoon B, Kim H, In HP. A seamless Lawful interception architecture for mobile users in IEEE 802.16e networks Journal of Communications and Networks. 11: 626-633. DOI: 10.1109/Jcn.2009.6388416 |
0.338 |
|
2008 |
Kim S, In HP, Baik J, Kazman R, Han K. VIRE: Sailing a blue ocean with value-innovative requirements Ieee Software. 25: 80-87. DOI: 10.1109/Ms.2008.27 |
0.526 |
|
2006 |
In HP, Baik J, Kim S, Yang Y, Boehm B. A quality-based cost estimation model for the product line life cycle Communications of the Acm. 49. DOI: 10.1145/1183236.1183273 |
0.576 |
|
2005 |
Jeong D, Kim YG, In HP. Quantitative evaluations on the query modeling and system integrating cost of SQL/MDR Etri Journal. 27: 367-375. DOI: 10.4218/Etrij.05.0104.0144 |
0.307 |
|
2005 |
Jeong D, Kim Y, In H. New RFID System Architectures Supporting Situation Awareness under Ubiquitous Environments Journal of Computer Science. 1: 114-120. DOI: 10.3844/Jcssp.2005.114.120 |
0.308 |
|
2005 |
Im EG, In HP, Choi DS, Song YH. Adaptation policies for web server intrusion-tolerant system Ieice Transactions On Communications. 3462-3465. DOI: 10.1093/Ietcom/E88-B.8.3462 |
0.335 |
|
2005 |
Kazman R, In HP, Chen HM. From requirements negotiation to software architecture decisions Information and Software Technology. 47: 511-520. DOI: 10.1016/J.Infsof.2004.10.001 |
0.372 |
|
2004 |
Lee J, Ko M, Kim J, Moon C, Kim Y, In HP. Analyzing Web Interfaces of Databases for Retrieving Web Information Lecture Notes in Computer Science. 331-336. DOI: 10.1007/978-3-540-30483-8_40 |
0.302 |
|
2001 |
In H, Roy S. Issues of visualized conflict resolution Requirements Engineering. 314-315. DOI: 10.1109/Isre.2001.948601 |
0.338 |
|
2001 |
In H, Olson D, Rodgers T. A requirements negotiation model based on multi-criteria analysis Requirements Engineering. 312-313. DOI: 10.1109/Isre.2001.948600 |
0.34 |
|
2001 |
In H, Boehm BW. Using WinWin Quality Requirements Management Tools: A Case Study Annals of Software Engineering. 11: 141-174. DOI: 10.1023/A:1012547320602 |
0.498 |
|
1996 |
Boehm B, In H. Identifying quality-requirement conflicts Ieee Software. 13: 25-36. DOI: 10.1109/52.506460 |
0.503 |
|
Show low-probability matches. |