Search Results - "In, Hoh Peter"
-
1
Developer Micro Interaction Metrics for Software Defect Prediction
Published in IEEE transactions on software engineering (01-11-2016)“…To facilitate software quality assurance, defect prediction metrics, such as source code metrics, change churns, and the number of previous defects, have been…”
Get full text
Journal Article -
2
DataMesh+: A Blockchain-Powered Peer-to-Peer Data Exchange Model for Self-Sovereign Data Marketplaces
Published in Sensors (Basel, Switzerland) (15-03-2024)“…In contemporary data-driven economies, data has become a valuable digital asset that is eligible for trading and monetization. Peer-to-peer (P2P) marketplaces…”
Get full text
Journal Article -
3
SC-CAAC: A Smart-Contract-Based Context-Aware Access Control Scheme for Blockchain-Enabled IoT Systems
Published in IEEE internet of things journal (01-06-2024)“…Integrating blockchain technology with the Internet of Things (IoT) facilitates seamless interaction between IoT devices and systems to securely share, access,…”
Get full text
Journal Article -
4
Multitier Web System Reliability: Identifying Causative Metrics and Analyzing Performance Anomaly Using a Regression Model
Published in Sensors (Basel, Switzerland) (08-02-2023)“…With the development of the Internet and communication technologies, the types of services provided by multitier Web systems are becoming more diverse and…”
Get full text
Journal Article -
5
A Smart Contract-Based Dynamic Consent Management System for Personal Data Usage under GDPR
Published in Sensors (Basel, Switzerland) (30-11-2021)“…A massive amount of sensitive personal data is being collected and used by scientists, businesses, and governments. This has led to unprecedented threats to…”
Get full text
Journal Article -
6
A Consortium Blockchain-Based Secure and Trusted Electronic Portfolio Management Scheme
Published in Sensors (Basel, Switzerland) (08-02-2022)“…In recent times, electronic portfolios (e-portfolios) are being increasingly used by students and lifelong learners as digital online multimedia résumés that…”
Get full text
Journal Article -
7
Q-RTOP: Quantum-Secure Random Transaction Ordering Protocol for Mitigating Maximal Extractable Value Attacks in Blockchains With a Priority Gas-Fee Policy
Published in IEEE access (2024)“…Public blockchains, such as Ethereum, rely on decentralized networks of peer-to-peer nodes known as validators or miners to verify all transactions and create…”
Get full text
Journal Article -
8
Decentralized Global Copyright System Based on Consortium Blockchain with Proof of Authority
Published in IEEE access (01-01-2023)“…Conventional copyright systems are governed nationally, and there is no global ledger for storing copyright data. Due to the lack of a global copyright…”
Get full text
Journal Article -
9
Topic Modeling Based Warning Prioritization from Change Sets of Software Repository
Published in Journal of computer science and technology (01-11-2020)“…Many existing warning prioritization techniques seek to reorder the static analysis warnings such that true positives are provided first. However, excessive…”
Get full text
Journal Article -
10
B-GPS: Blockchain-Based Global Positioning System for Improved Data Integrity and Reliability
Published in ISPRS international journal of geo-information (01-03-2022)“…When surveying national reference points using a global positioning system (GPS), appropriate work regulations pertaining to the surveying time must be…”
Get full text
Journal Article -
11
A Privacy-Preserving Transparent Central Bank Digital Currency System Based on Consortium Blockchain and Unspent Transaction Outputs
Published in IEEE transactions on services computing (01-07-2023)“…There is rising global demand for the deployment of a central bank digital currency (CBDC) system to achieve financial stability. However, striking a balance…”
Get full text
Journal Article -
12
Adaptive Kinetic Scrolling: Kinetic Scrolling for Large Datasets on Mobile Devices
Published in Applied sciences (01-11-2018)“…Scrolling is a frequently used Graphical User Interface widget that enables users to interact with a large amount of data using a limited viewport. However, if…”
Get full text
Journal Article -
13
Adaptive Retransmission Scheme for Video Streaming over Content-Centric Wireless Networks
Published in IEEE communications letters (01-06-2013)“…This paper presents an adaptive retransmission scheme to overcome video packet losses in content-centric wireless networks. Because of in-network caching, the…”
Get full text
Journal Article -
14
Addendum to the Acknowledgements: Mood Prediction of Patients With Mood Disorders by Machine Learning Using Passive Digital Phenotypes Based on the Circadian Rhythm: Prospective Observational Cohort Study
Published in Journal of medical Internet research (03-10-2019)“…Related Article Correction of: https://www.jmir.org/2019/4/e11029/…”
Get full text
Journal Article -
15
An Auditable, Privacy-Preserving, Transparent Unspent Transaction Output Model for Blockchain-Based Central Bank Digital Currency
Published in IEEE open journal of the Computer Society (2024)“…Auditability, privacy, transparency, and resiliency are four essential properties of a central bank digital currency (CBDC) system. However, it is difficult to…”
Get full text
Journal Article -
16
A Seamless Lawful Interception Architecture for Mobile Users in IEEE 802.16e Networks
Published in Journal of communications and networks (2009)“…Lawful interception (LI) involves legally accessing private communication such as telephone calls or email messages. Numerous countries have been drafting and…”
Get full text
Journal Article -
17
Mobile user-preference-based data dissemination on mobile P2P networks
Published in EURASIP journal on wireless communications and networking (04-10-2011)“…A considerable number of studies have been performed recently on mobile peer-to-peer networks (MOPNETs), as the number of services based on mobile devices has…”
Get full text
Journal Article -
18
Making every student a winner: The WinWin approach in software engineering education
Published in The Journal of systems and software (01-08-2007)“…This paper shows how Theory-W and the WinWin requirements negotiation approach are used in software engineering education at several universities in the US,…”
Get full text
Journal Article -
19
Detecting usability problems in mobile applications on the basis of dissimilarity in user behavior
Published in International journal of human-computer studies (01-07-2020)“…•This paper presents a technique for detect usability problems effectively via usability testing in mobile application.•Users interact with mobile applications…”
Get full text
Journal Article -
20
From requirements negotiation to software architecture decisions
Published in Information and software technology (01-06-2005)“…Architecture design and requirements negotiations are conceptually tightly related but often performed separately in real-world software development projects…”
Get full text
Journal Article