Search Results - "In, Hoh Peter"

Refine Results
  1. 1

    Developer Micro Interaction Metrics for Software Defect Prediction by Lee, Taek, Nam, Jaechang, Han, Donggyun, Kim, Sunghun, Peter In, Hoh

    Published in IEEE transactions on software engineering (01-11-2016)
    “…To facilitate software quality assurance, defect prediction metrics, such as source code metrics, change churns, and the number of previous defects, have been…”
    Get full text
    Journal Article
  2. 2

    DataMesh+: A Blockchain-Powered Peer-to-Peer Data Exchange Model for Self-Sovereign Data Marketplaces by Merlec, Mpyana Mwamba, In, Hoh Peter

    Published in Sensors (Basel, Switzerland) (15-03-2024)
    “…In contemporary data-driven economies, data has become a valuable digital asset that is eligible for trading and monetization. Peer-to-peer (P2P) marketplaces…”
    Get full text
    Journal Article
  3. 3

    SC-CAAC: A Smart-Contract-Based Context-Aware Access Control Scheme for Blockchain-Enabled IoT Systems by Merlec, Mpyana Mwamba, In, Hoh Peter

    Published in IEEE internet of things journal (01-06-2024)
    “…Integrating blockchain technology with the Internet of Things (IoT) facilitates seamless interaction between IoT devices and systems to securely share, access,…”
    Get full text
    Journal Article
  4. 4

    Multitier Web System Reliability: Identifying Causative Metrics and Analyzing Performance Anomaly Using a Regression Model by Kim, Sundeuk, Kim, Jong Seon, In, Hoh Peter

    Published in Sensors (Basel, Switzerland) (08-02-2023)
    “…With the development of the Internet and communication technologies, the types of services provided by multitier Web systems are becoming more diverse and…”
    Get full text
    Journal Article
  5. 5

    A Smart Contract-Based Dynamic Consent Management System for Personal Data Usage under GDPR by Merlec, Mpyana Mwamba, Lee, Youn Kyu, Hong, Seng-Phil, In, Hoh Peter

    Published in Sensors (Basel, Switzerland) (30-11-2021)
    “…A massive amount of sensitive personal data is being collected and used by scientists, businesses, and governments. This has led to unprecedented threats to…”
    Get full text
    Journal Article
  6. 6

    A Consortium Blockchain-Based Secure and Trusted Electronic Portfolio Management Scheme by Merlec, Mpyana Mwamba, Islam, Md Mainul, Lee, Youn Kyu, In, Hoh Peter

    Published in Sensors (Basel, Switzerland) (08-02-2022)
    “…In recent times, electronic portfolios (e-portfolios) are being increasingly used by students and lifelong learners as digital online multimedia résumés that…”
    Get full text
    Journal Article
  7. 7

    Q-RTOP: Quantum-Secure Random Transaction Ordering Protocol for Mitigating Maximal Extractable Value Attacks in Blockchains With a Priority Gas-Fee Policy by Sinai, Nday Kabulo, In, Hoh Peter

    Published in IEEE access (2024)
    “…Public blockchains, such as Ethereum, rely on decentralized networks of peer-to-peer nodes known as validators or miners to verify all transactions and create…”
    Get full text
    Journal Article
  8. 8

    Decentralized Global Copyright System Based on Consortium Blockchain with Proof of Authority by Islam, Md. Mainul, In, Hoh Peter

    Published in IEEE access (01-01-2023)
    “…Conventional copyright systems are governed nationally, and there is no global ledger for storing copyright data. Due to the lack of a global copyright…”
    Get full text
    Journal Article
  9. 9

    Topic Modeling Based Warning Prioritization from Change Sets of Software Repository by Lee, Jung-Been, Lee, Taek, In, Hoh Peter

    Published in Journal of computer science and technology (01-11-2020)
    “…Many existing warning prioritization techniques seek to reorder the static analysis warnings such that true positives are provided first. However, excessive…”
    Get full text
    Journal Article
  10. 10

    B-GPS: Blockchain-Based Global Positioning System for Improved Data Integrity and Reliability by Lee, Seunghyeon, Seok, Hong-Woo, Lee, Ki-rim, In, Hoh Peter

    “…When surveying national reference points using a global positioning system (GPS), appropriate work regulations pertaining to the surveying time must be…”
    Get full text
    Journal Article
  11. 11

    A Privacy-Preserving Transparent Central Bank Digital Currency System Based on Consortium Blockchain and Unspent Transaction Outputs by Islam, Md. Mainul, IN, Hoh Peter

    Published in IEEE transactions on services computing (01-07-2023)
    “…There is rising global demand for the deployment of a central bank digital currency (CBDC) system to achieve financial stability. However, striking a balance…”
    Get full text
    Journal Article
  12. 12

    Adaptive Kinetic Scrolling: Kinetic Scrolling for Large Datasets on Mobile Devices by Jeong, Jongwook, Kim, Neunghoe, In, Hoh

    Published in Applied sciences (01-11-2018)
    “…Scrolling is a frequently used Graphical User Interface widget that enables users to interact with a large amount of data using a limited viewport. However, if…”
    Get full text
    Journal Article
  13. 13

    Adaptive Retransmission Scheme for Video Streaming over Content-Centric Wireless Networks by Longzhe Han, Seung-Seok Kang, Hyogon Kim, In, H. P.

    Published in IEEE communications letters (01-06-2013)
    “…This paper presents an adaptive retransmission scheme to overcome video packet losses in content-centric wireless networks. Because of in-network caching, the…”
    Get full text
    Journal Article
  14. 14
  15. 15

    An Auditable, Privacy-Preserving, Transparent Unspent Transaction Output Model for Blockchain-Based Central Bank Digital Currency by Islam, Md. Mainul, IN, Hoh Peter

    “…Auditability, privacy, transparency, and resiliency are four essential properties of a central bank digital currency (CBDC) system. However, it is difficult to…”
    Get full text
    Journal Article
  16. 16

    A Seamless Lawful Interception Architecture for Mobile Users in IEEE 802.16e Networks by Lee, Myoung-Rak, Lee, Taek, Yoon, Byung-Sik, Kim, Hyo-Gon, In, Hoh Peter

    “…Lawful interception (LI) involves legally accessing private communication such as telephone calls or email messages. Numerous countries have been drafting and…”
    Get full text
    Journal Article
  17. 17

    Mobile user-preference-based data dissemination on mobile P2P networks by Kim, Dohoon, Kim, Young-Gab, In, Hoh Peter

    “…A considerable number of studies have been performed recently on mobile peer-to-peer networks (MOPNETs), as the number of services based on mobile devices has…”
    Get full text
    Journal Article
  18. 18

    Making every student a winner: The WinWin approach in software engineering education by Grünbacher, Paul, Seyff, Norbert, Briggs, Robert O., In, Hoh Peter, Kitapci, Hasan, Port, Daniel

    Published in The Journal of systems and software (01-08-2007)
    “…This paper shows how Theory-W and the WinWin requirements negotiation approach are used in software engineering education at several universities in the US,…”
    Get full text
    Journal Article
  19. 19

    Detecting usability problems in mobile applications on the basis of dissimilarity in user behavior by Jeong, JongWook, Kim, NeungHoe, In, Hoh Peter

    “…•This paper presents a technique for detect usability problems effectively via usability testing in mobile application.•Users interact with mobile applications…”
    Get full text
    Journal Article
  20. 20

    From requirements negotiation to software architecture decisions by Kazman, Rick, In, Hoh Peter, Chen, Hong-Mei

    Published in Information and software technology (01-06-2005)
    “…Architecture design and requirements negotiations are conceptually tightly related but often performed separately in real-world software development projects…”
    Get full text
    Journal Article