default search action
Hoh Peter In
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j51]Nday Kabulo Sinai, Hoh Peter In:
Q-RTOP: Quantum-Secure Random Transaction Ordering Protocol for Mitigating Maximal Extractable Value Attacks in Blockchains With a Priority Gas-Fee Policy. IEEE Access 12: 10036-10046 (2024) - [j50]Mpyana Mwamba Merlec, Hoh Peter In:
SC-CAAC: A Smart-Contract-Based Context-Aware Access Control Scheme for Blockchain-Enabled IoT Systems. IEEE Internet Things J. 11(11): 19866-19881 (2024) - [j49]Nday Kabulo Sinai, Hoh Peter In:
Performance evaluation of a quantum-resistant Blockchain: a comparative study with Secp256k1 and Schnorr. Quantum Inf. Process. 23(3): 99 (2024) - [j48]Mpyana Mwamba Merlec, Hoh Peter In:
DataMesh+: A Blockchain-Powered Peer-to-Peer Data Exchange Model for Self-Sovereign Data Marketplaces. Sensors 24(6): 1896 (2024) - 2023
- [j47]Md. Mainul Islam, Hoh Peter In:
Decentralized Global Copyright System Based on Consortium Blockchain With Proof of Authority. IEEE Access 11: 43101-43115 (2023) - [j46]Sundeuk Kim, Jong Seon Kim, Hoh Peter In:
Multitier Web System Reliability: Identifying Causative Metrics and Analyzing Performance Anomaly Using a Regression Model. Sensors 23(4): 1919 (2023) - [j45]Md. Mainul Islam, Hoh Peter In:
A Privacy-Preserving Transparent Central Bank Digital Currency System Based on Consortium Blockchain and Unspent Transaction Outputs. IEEE Trans. Serv. Comput. 16(4): 2372-2386 (2023) - [c62]Mpyana Mwamba Merlec, Nday Kabulo Sinai, Hoh Peter In:
A Blockchain-based Trustworthy and Secure Review System for Decentralized e-Portfolio Platforms. ICTC 2023: 675-680 - 2022
- [j44]Seunghyeon Lee, Hong-Woo Seok, Kirim Lee, Hoh Peter In:
B-GPS: Blockchain-Based Global Positioning System for Improved Data Integrity and Reliability. ISPRS Int. J. Geo Inf. 11(3): 186 (2022) - [j43]Mpyana Mwamba Merlec, Md. Mainul Islam, Youn Kyu Lee, Hoh Peter In:
A Consortium Blockchain-Based Secure and Trusted Electronic Portfolio Management Scheme. Sensors 22(3): 1271 (2022) - [c61]Md. Mainul Islam, Mpyana Mwamba Merlec, Hoh Peter In:
A Comparative Analysis of Proof-of-Authority Consensus Algorithms: Aura vs Clique. SCC 2022: 327-332 - 2021
- [j42]Mpyana Mwamba Merlec, Youn Kyu Lee, Seng-Phil Hong, Hoh Peter In:
A Smart Contract-Based Dynamic Consent Management System for Personal Data Usage under GDPR. Sensors 21(23): 7994 (2021) - [c60]Mpyana Mwamba Merlec, Youn Kyu Lee, Hoh Peter In:
SmartBuilder: A Block-based Visual Programming Framework for Smart Contract Development. Blockchain 2021: 90-94 - [c59]Lovemore Ngwira, Mpyana Mwamba Merlec, Youn Kyu Lee, Hoh Peter In:
Towards Context-Aware Smart Contracts for Blockchain IoT Systems. ICTC 2021: 82-87 - 2020
- [j41]Jongwook Jeong, Neunghoe Kim, Hoh Peter In:
GUI information-based interaction logging and visualization for asynchronous usability testing. Expert Syst. Appl. 151: 113289 (2020) - [j40]Mingwan Kim, Jongwook Jeong, Neunghoe Kim, Hoh Peter In:
Overlap-aware rapid type analysis for constructing one-to-one matched call graphs in regression test selection. IET Softw. 14(4): 423-432 (2020) - [j39]Jongwook Jeong, Neunghoe Kim, Hoh Peter In:
Detecting usability problems in mobile applications on the basis of dissimilarity in user behavior. Int. J. Hum. Comput. Stud. 139: 102364 (2020) - [j38]Mingwan Kim, Neunghoe Kim, Hoh Peter In:
Investigating the Relationship Between Mutants and Real Faults with Respect to Mutated Code. Int. J. Softw. Eng. Knowl. Eng. 30(8): 1119-1137 (2020) - [j37]Jung-Been Lee, Taek Lee, Hoh Peter In:
Topic Modeling Based Warning Prioritization from Change Sets of Software Repository. J. Comput. Sci. Technol. 35(6): 1461-1479 (2020) - [c58]Hoh In, Hong-Mei Chen:
Introduction to the Minitrack on Blockchain Engineering. HICSS 2020: 1
2010 – 2019
- 2019
- [j36]Jung-Been Lee, Taek Lee, Hoh Peter In:
Automatic Stop Word Generation for Mining Software Artifact Using Topic Model with Pointwise Mutual Information. IEICE Trans. Inf. Syst. 102-D(9): 1761-1772 (2019) - [c57]Hoh Peter In, Hong-Mei Chen:
Introduction to the Minitrack on Blockchain Engineering. HICSS 2019: 1-2 - 2018
- [j35]Nam-Ho Keum, Taek Lee, Jung-Been Lee, Hoh Peter In:
Measuring the Degree of Content Immersion in a Non-experimental Environment Using a Portable EEG Device. J. Inf. Process. Syst. 14(4): 1049-1061 (2018) - 2017
- [j34]Chang-Kyun Jeon, Neunghoe Kim, Hoh In:
A probabilistic approach to building defect prediction model for platform-based product lines. Int. Arab J. Inf. Technol. 14(4): 413-422 (2017) - [j33]Neunghoe Kim, Soojin Park, Dongwon Jeong, ManSoo Hwang, Sooyong Park, Hoh Peter In:
EURECA: End-user requirements engineering with collaborative animation. Softw. Pract. Exp. 47(7): 1001-1012 (2017) - 2016
- [j32]Youngsub Han, Dong-hyun Lee, Byoungju Choi, Mike Hinchey, Hoh Peter In:
Value-Driven V-Model: From Requirements Analysis to Acceptance Testing. IEICE Trans. Inf. Syst. 99-D(7): 1776-1785 (2016) - [j31]Taek Lee, Jaechang Nam, DongGyun Han, Sunghun Kim, Hoh Peter In:
Developer Micro Interaction Metrics for Software Defect Prediction. IEEE Trans. Software Eng. 42(11): 1015-1035 (2016) - 2015
- [j30]Taek Lee, Jung-Been Lee, Hoh Peter In:
Effect Analysis of Coding Convention Violations on Readability of Post-Delivered Code. IEICE Trans. Inf. Syst. 98-D(7): 1286-1296 (2015) - [j29]Chang-Kyun Jeon, Neunghoe Kim, Hoh Peter In:
Probabilistic Approach to Predicting Risk in Software Projects Using Software Repository Data. Int. J. Softw. Eng. Knowl. Eng. 25(6): 1017-1032 (2015) - [j28]Longzhe Han, Seung-Seok Kang, Hoh Peter In:
An adaptive loss protection for video transmission over content-centric networks. Multim. Tools Appl. 74(19): 8279-8292 (2015) - [j27]Minho Jo, Longzhe Han, Nguyen Duy Tan, Hoh Peter In:
A survey: energy exhausting attacks in MAC protocols in WBANs. Telecommun. Syst. 58(2): 153-164 (2015) - [c56]Chang-Kyun Jeon, Neunghoe Kim, Hoh Peter In:
Situation-awareness overheating protection solution for mobile devices. ICCE 2015: 618-619 - 2014
- [j26]Do-Hoon Kim, Jungbean Lee, Young-Gab Kim, Byungsik Yoon, Hoh Peter In:
3G IP Multimedia Subsystem based framework for lawful interception. Ann. des Télécommunications 69(7-8): 347-361 (2014) - [j25]Nguyen Dinh Han, Longzhe Han, Dao Minh Tuan, Hoh Peter In, Minho Jo:
A scheme for data confidentiality in Cloud-assisted Wireless Body Area Networks. Inf. Sci. 284: 157-166 (2014) - [j24]Chul-Hoon Byun, Chang-Kyun Jeon, Taek Lee, Hoh Peter In:
Self-adaptive testing to determine sample size for flash memory solutions. KSII Trans. Internet Inf. Syst. 8(6): 2139-2151 (2014) - [j23]Longzhe Han, Nguyen Dinh Han, Seung-Seok Kang, Hoh Peter In:
Cross-layer Video Streaming Mechanism over Cognitive Radio Ad hoc Information Centric Networks. KSII Trans. Internet Inf. Syst. 8(11): 3775-3788 (2014) - [c55]Youn Kyu Lee, Hoh Peter In, Rick Kazman:
Customer Requirements Validation Method Based on Mental Models. APSEC (1) 2014: 199-206 - [c54]Sooyong Park, Mike Hinchey, Hoh Peter In, Klaus Schmid:
8th International Workshop on Dynamic Software Product Lines (DSPL 2014). SPLC 2014: 355 - 2013
- [j22]Longzhe Han, Seung-Seok Kang, Hyogon Kim, Hoh Peter In:
Adaptive Retransmission Scheme for Video Streaming over Content-Centric Wireless Networks. IEEE Commun. Lett. 17(6): 1292-1295 (2013) - [j21]Minho Jo, Longzhe Han, Do-Hoon Kim, Hoh Peter In:
Selfish attacks and detection in cognitive radio Ad-Hoc networks. IEEE Netw. 27(3): 46-50 (2013) - [j20]Dong-hyun Lee, Hoh Peter In, Keun Lee, Sooyong Park, Mike Hinchey:
Sustainable Embedded Software Life-Cycle Planning. IEEE Softw. 30(4): 72-80 (2013) - [c53]Svein O. Hallsteinsen, Sooyong Park, Mike Hinchey, Hoh Peter In, Klaus Schmid:
7th International Workshop on Dynamic Software Product Lines (DSPL 2013). SPLC 2013: 271 - 2012
- [j19]Chang-Kyun Jeon, Neunghoe Kim, Dong-hyun Lee, Taek Lee, Hoh Peter In:
Stakeholder Conflict Resolution Model (S-CRM) Based On Supervised Learning. KSII Trans. Internet Inf. Syst. 6(11): 2813-2826 (2012) - [j18]Xingang Liu, Kwanghoon Sohn, Meikang Qiu, Minho Jo, Hoh Peter In:
Low-Cost H.264/AVC Inter Frame Mode Decision Algorithm for Mobile Communication Systems. Mob. Networks Appl. 17(1): 110-118 (2012) - [j17]Do-Hoon Kim, Taek Lee, Jaewoo Kang, Hyunchoel Jeong, Hoh Peter In:
Adaptive pattern mining model for early detection of botnet-propagation scale. Secur. Commun. Networks 5(8): 917-927 (2012) - [c52]Hyundo Park, Sung-Oh David Jung, Heejo Lee, Hoh Peter In:
Cyber Weather Forecasting: Forecasting Unknown Internet Worms Using Randomness Analysis. SEC 2012: 376-387 - 2011
- [j16]Do-Hoon Kim, Young-Gab Kim, Hoh Peter In:
Mobile user-preference-based data dissemination on mobile P2P networks. EURASIP J. Wirel. Commun. Netw. 2011: 118 (2011) - [j15]Hoh Peter In, Myoung Rak Lee, Do-Hoon Kim, Nunghoe Kim, Byungsik Yoon:
Seamless Lawful Interception Handover for 3G IP Multimedia Subsystem (IMS). KSII Trans. Internet Inf. Syst. 5(7): 1329-1345 (2011) - [j14]Yoon-kyu Lee, Neunghoe Kim, Do-Hoon Kim, Dong-hyun Lee, Hoh Peter In:
Customer Requirements Elicitation based on Social Network Service. KSII Trans. Internet Inf. Syst. 5(10): 1733-1750 (2011) - [c51]Taek Lee, Jaechang Nam, DongGyun Han, Sunghun Kim, Hoh Peter In:
Micro interaction metrics for defect prediction. SIGSOFT FSE 2011: 311-321 - 2010
- [j13]Myoung Rak Lee, Byungsik Yoon, Hyogon Kim, Hoh Peter In:
A Seamless Lawful Interception Triggering Architecture for the Heterogeneous Wireless Networks. IEICE Trans. Inf. Syst. 93-D(3): 473-483 (2010) - [j12]Longzhe Han, Sungjun Park, Seung-Seok Kang, Hoh Peter In:
An Adaptive FEC Mechanism Using Cross-layer Approach to Enhance Quality of Video Transmission over 802.11 WLANs. KSII Trans. Internet Inf. Syst. 4(3): 341-357 (2010) - [c50]Do-Hoon Kim, Hoh Peter In, Hyun-Cheol Jeong:
Learning-based Threshold Estimation Model for Detection of Botnet Malicious Activities. Security and Management 2010: 454-458
2000 – 2009
- 2009
- [j11]JungHyun Han, Dong-hyun Lee, Hyunwoo Kim, Hoh Peter In, Hee-Seo Chae, Young Ik Eom:
A situation-aware cross-platform architecture for ubiquitous game. Comput. Informatics 28(5): 619-633 (2009) - [j10]Myoung Rak Lee, Taek Lee, Byungsik Yoon, Hyogon Kim, Hoh Peter In:
A seamless lawful interception architecture for mobile users in IEEE 802.16e networks. J. Commun. Networks 11(6): 626-633 (2009) - [c49]Sungjun Park, Longzhe Han, Hoh Peter In, Eun-Seok Ryu:
A Prioritized Multi-queue Method for H.264/AVC Live Streaming in Wireless Networks. CIT (2) 2009: 331-336 - [c48]Sungyong Shin, Taek Lee, Hoh Peter In:
Defending Battery Exhaustion Attacks on Mobile Systems. COMPSAC (2) 2009: 347-352 - [c47]Jehyun Lee, Heejo Lee, Hoh Peter In:
Scalable attack graph for risk assessment. ICOIN 2009: 1-5 - 2008
- [j9]Sangsoo Kim, Hoh Peter In, Jongmoon Baik, Rick Kazman, Kwangsin Han:
VIRE: Sailing a Blue Ocean with Value-Innovative Requirements. IEEE Softw. 25(1): 80-87 (2008) - [c46]Do-Hoon Kim, Taek Lee, Hoh Peter In:
Effective Security Safeguard Selection Process for Return on Security Investment. APSCC 2008: 668-673 - [c45]Do-Hoon Kim, Myoung Rak Lee, Longzhe Han, Hoh Peter In:
Efficient Data Dissemination in Mobile P2P Ad-Hoc Networks for Ubiquitous Computing. MUE 2008: 384-389 - [c44]Neunghoe Kim, Taek Lee, Dong-hyun Lee, Keun Lee, Hoh Peter In:
Customer Value-based HW/SW Partitioning Decision in Embedded Systems. SNPD 2008: 257-262 - 2007
- [j8]Paul Grünbacher, Norbert Seyff, Robert O. Briggs, Hoh Peter In, Hasan Kitapci, Daniel Port:
Making every student a winner: The WinWin approach in software engineering education. J. Syst. Softw. 80(8): 1191-1200 (2007) - [c43]Sang Won Lim, Taek Lee, Sangsoo Kim, Hoh Peter In:
The Value Gap Model: Value-Based Requirements Elicitation. CIT 2007: 885-890 - [c42]Jiyong Park, Do-Hoon Kim, Taek Lee, Hoh Peter In:
Effective Service Decision Using Ambient-Based HHMM in Smart Home System. CIT 2007: 979-984 - [c41]Do-Hoon Kim, Taek Lee, Sung-Oh David Jung, Hoh Peter In, Heejo Lee:
Cyber Threat Trend Analysis Model Using HMM. IAS 2007: 177-182 - [c40]Heeseo Chae, TaeYon Kim, Dong-hyun Lee, Hoh Peter In:
Conflict Resolution Model Based on Weight in Situation Aware Collaboration System. FTDCS 2007: 99-106 - [c39]Sangsoo Kim, Jiyong Park, Heeseo Chae, Hoh Peter In:
Situation-Aware Based Self-adaptive Architecture for Mission Critical Systems. ICESS 2007: 464-475 - [c38]Taek Lee, Jiyong Park, Hoh Peter In:
Effective Appliance Selection by Complementary Context Feeding in Smart Home System. SEUS 2007: 233-242 - 2006
- [j7]Hoh Peter In, Jongmoon Baik, Sangsoo Kim, Ye Yang, Barry W. Boehm:
A quality-based cost estimation model for the product line life cycle. Commun. ACM 49(12): 85-88 (2006) - [c37]Heeseo Chae, Dong-hyun Lee, Jiyong Park, Hoh Peter In:
The Partitioning Methodology in Hardware/Software Co-Design Using Extreme Programming: Evaluation through the Lego Robot Project. CIT 2006: 187 - [c36]Paul Grünbacher, Norbert Seyff, Robert O. Briggs, Hoh Peter In, Hasan Kitapci, Daniel Port:
Making Every Student a Winner: The WinWin Approach in Software Engineering Education. CSEE&T 2006: 201-208 - [c35]Heeseo Chae, Do-Hoon Kim, Dongwon Jeong, Hoh Peter In:
A Situation Aware Personalization in Ubiquitous Mobile Computing Environments. EUC Workshops 2006: 213-223 - [c34]Heeseo Chae, Taek Lee, Hoh Peter In:
Situation aware RFID system: evaluating abnormal behavior detecting approach. SEUS/WCCIA 2006: 115-120 - [c33]Taek Lee, Hoh Peter In, Eul-Gyu Im, Heejo Lee:
Cascade Damage Estimation Model for Internet Attacks. WISI 2006: 163-164 - 2005
- [j6]Eul-Gyu Im, Hoh Peter In, Dae-Sik Choi, Yong Ho Song:
Adaptation Policies for Web Server Intrusion-Tolerant System. IEICE Trans. Commun. 88-B(8): 3462-3465 (2005) - [j5]Rick Kazman, Hoh Peter In, Hong-Mei Chen:
From requirements negotiation to software architecture decisions. Inf. Softw. Technol. 47(8): 511-520 (2005) - [j4]Dongwon Jeong, Hoh Peter In, Fran Jarnjak, Young-Gab Kim, Doo-Kwon Baik:
A message conversion system, XML-based metadata semantics description language and metadata repository. J. Inf. Sci. 31(5): 394-406 (2005) - [c32]Fran Jarnjak, Jinhyung Kim, Yixin Jing, Hoh Peter In, Dongwon Jeong, Doo-Kwon Baik:
TS-U: Temporal-Spatial Methodology for Application Checking of the Systems in the Ubiquitous Environment. EUC Workshops 2005: 161-170 - [c31]Dongwon Jeong, Heeseo Chae, Hoh Peter In:
The Performance Estimation of the Situation Awareness RFID System from Ubiquitous Environment Scenario. EUC 2005: 987-995 - [c30]Yoon Jung Chung, InJung Kim, Namhoon Lee, Taek Lee, Hoh Peter In:
Security Risk Vector for Quantitative Asset Assessment. ICCSA (2) 2005: 274-283 - [c29]Young-Gab Kim, Taek Lee, Hoh Peter In, Yoon Jung Chung, InJung Kim, Doo-Kwon Baik:
A Probabilistic Approach to Estimate the Damage Propagation of Cyber Attacks. ICISC 2005: 175-185 - [c28]Hoh Peter In, Dong-hyun Lee:
Software Engineering Issues for Ubiquitous Entertainment Service. SEKE 2005: 790 - [c27]Dongwon Jeong, Hoh Peter In, Lee-Sub Lee:
A Comparative Evaluation of Query Modeling Cost of SQL/MDR. SERA 2005: 235-239 - 2004
- [j3]Hoh Peter In, David L. Olson:
Requirements Negotiation Using Multi-Criteria Preference Analysis. J. Univers. Comput. Sci. 10(4): 306-325 (2004) - [c26]Hoh Peter In, Konstantinos A. Meintanis, Ming Zhang, Eul-Gyu Im:
Kaliphimos: A Community-Based Peer-to-Peer Group Management Scheme. ADVIS 2004: 533-542 - [c25]JungHyun Han, Hoh Peter In, Jong-Sik Woo:
Towards Situation-Aware Cross-Platform Ubi-Game Development. APSEC 2004: 734-735 - [c24]Yuan Yang, Dong-hyun Lee, Myong-Soon Park, Hoh Peter In:
Dynamic Enclose Cell Routing in Mobile Sensor Networks. APSEC 2004: 736-737 - [c23]Dongwon Jeong, Young-Gab Kim, Hoh Peter In:
SA-RFID: Situation-Aware RFID Architecture Analysis in Ubiquitous Computing. APSEC 2004: 738-739 - [c22]Joo Beom Yun, Eung Ki Park, Eul-Gyu Im, Hoh Peter In:
A Scalable, Ordered Scenario-Based Network Security Simulator. AsiaSim 2004: 487-494 - [c21]Hoh Peter In, Young-Gab Kim, Taek Lee, Chang-Joo Moon, Yoon-Jung Jung, InJung Kim:
A Security Risk Analysis Model for Information Systems. AsiaSim 2004: 505-513 - [c20]Samuel S. Lee, Hoh Peter In:
Simulating Groundwater Transport Process Using a Vertical Heterogeneity Model: A Case Study. AsiaSim 2004: 536-544 - [c19]Eung Ki Park, Joo Beom Yun, Hoh Peter In:
Simulating Cyber-intrusion Using Ordered UML Model-Based Scenarios. AsiaSim 2004: 643-651 - [c18]Jeong-Oog Lee, Myeong-Cheol Ko, Jinsoo Kim, Chang-Joo Moon, Young-Gab Kim, Hoh Peter In:
Analyzing Web Interfaces of Databases for Retrieving Web Information. AWCC 2004: 331-336 - [c17]Hoh Peter In, ChangHwa Kim, Stephen S. Yau:
Q-MAR: An Adaptive QoS Management Model for Situation-Aware Middleware. EUC 2004: 972-981 - [c16]Chang-Joo Moon, Hoh Peter In:
Inconsistency Detection of Authorization Policies in Distributed Component Environment. WISA 2004: 39-50 - 2003
- [c15]Stephen S. Yau, Yu Wang, Dazhi Huang, Hoh Peter In:
Situation-Aware Contract Specification Language for Middleware for Ubiquitous Computing. FTDCS 2003: 93-99 - [c14]Hoh Peter In, ChangHwa Kim, Unil Yun, Stephen S. Yau:
Q-MAR: A QoS Resource Conflict Identification Model for Situation-Aware Middleware. FTDCS 2003: 212-218 - [c13]Hoh Peter In, Thomas Foster, Jason Surprise, Sung-Oh David Jung, Dick B. Simmons, Hiroko Fujihara:
Web-Based Feature Reduction System: A Case Study. SAINT 2003: 406-409 - [c12]Jun (John) Sun, Hoh Peter In, Kuncara Aji Sukasdadi:
A Prototype of Information Requirement Elicitation in m-Commerce. CEC 2003: 53- - 2002
- [c11]Shaosong Xu, Hoh Peter In, Martin S. Feather:
A Shared Information System Architecture for Integrating Risk Management Tools: A Case Study. COMPSAC 2002: 785-792 - [c10]Hoh Peter In, David L. Olson, Tom Rodgers:
Multi-Criteria Preference Analysis for Systematic Requirements Negotiation. COMPSAC 2002: 887-892 - [c9]Seong-ryong Kang, Hoh Peter In, Wei Zhao:
SmartClick: An Enabler for Human-Centered Wireless Web Service. WECWIS 2002: 187-194 - 2001
- [j2]Hoh In, Barry W. Boehm:
Using WinWin Quality Requirements Management Tools: A Case Study. Ann. Softw. Eng. 11(1): 141-174 (2001) - [c8]Hoh In, Siddhartha Roy:
Visualization Issues for Software Requirements Negotiation. COMPSAC 2001: 10- - [c7]Hoh In, Barry W. Boehm, Thomas Lee Rodgers, Michael Deutsch:
Applying WinWin to Quality Requirements: A Case Study. ICSE 2001: 555-564 - [c6]Hoh In, David L. Olson, Tom Rodgers:
A Requirements Negotiation Model Based on Multi-Criteria Analysis. RE 2001: 312-313 - [c5]Hoh In, Siddhartha Roy:
Issues of Visualized Conflict Resolution. RE 2001: 314-315 - 2000
- [c4]Qing Zhao, Hoh In, Xiaowei Wu, Garng M. Huang:
Transforming Legacy Energy Management System (EMS) Modules into Reusable Components: A Case Study. COMPSAC 2000: 105-110
1990 – 1999
- 1999
- [c3]Hoh In, Ana Erendira Flores-Mendoza:
Initial Design of the "Plug-n-Analyze" Framework for Architecture Tradeoff Analysis. COMPSAC 1999: 318-319 - 1996
- [j1]Barry W. Boehm, Hoh In:
Identifying Quality-Requirement Conflicts. IEEE Softw. 13(2): 25-35 (1996) - [c2]Barry W. Boehm, Hoh In:
Software Cost Option Strategy Tool (S-COST). COMPSAC 1996: 15-20 - [c1]Barry W. Boehm, Hoh In:
Identifying Quality-Requirement Conflicts. ICRE 1996: 218
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-04 00:31 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint