Follow
Seung Yeob Shin
Seung Yeob Shin
Verified email at uni.lu - Homepage
Title
Cited by
Cited by
Year
Test case prioritization for acceptance testing of cyber physical systems: a multi-objective search-based approach
SY Shin, S Nejati, M Sabetzadeh, LC Briand, F Zimmer
Proceedings of the 27th acm sigsoft international symposium on software …, 2018
342018
Discrete-event simulation and integer linear programming for constraint-aware resource scheduling
SY Shin, Y Brun, H Balasubramanian, PL Henneman, LJ Osterweil
IEEE Transactions on Systems, Man, and Cybernetics: Systems 48 (9), 1578-1593, 2017
142017
Display apparatus and control method thereof
S Cho, S Shin
US Patent 8,046,690, 2011
142011
Method for providing broadcast program and broadcast receiving apparatus using the same
S Shin, J Koo, Y Kim
US Patent App. 12/605,410, 2010
132010
Using computer simulation to study nurse-to-patient ratios in an emergency department
PL Henneman, SY Shin, Y Brun, H Balasubramanian, F Blank, ...
The Journal of nursing administration 45 (11), 551-556, 2015
112015
Uncertainty-aware specification and analysis for hardware-in-the-loop testing of cyber-physical systems
SY Shin, K Chaouch, S Nejati, M Sabetzadeh, LC Briand, F Zimmer
Journal of Systems and Software 171, 110813, 2021
102021
Resource scheduling through resource-aware simulation of emergency departments
SY Shin, H Balasubramanian, Y Brun, PL Henneman, LJ Osterweil
2013 5th International Workshop on Software Engineering in Health Care (SEHC …, 2013
102013
Dynamic adaptation of software-defined networks for IoT systems: A search-based approach
SY Shin, S Nejati, M Sabetzadeh, LC Briand, C Arora, F Zimmer
Proceedings of the IEEE/ACM 15th International Symposium on Software …, 2020
92020
Decision support for security-control identification using machine learning
S Bettaieb, SY Shin, M Sabetzadeh, L Briand, G Nou, M Garceau
International Working Conference on Requirements Engineering: Foundation for …, 2019
82019
Using machine learning to assist with the selection of security controls during security assessment
S Bettaieb, SY Shin, M Sabetzadeh, LC Briand, M Garceau, A Meyers
Empirical Software Engineering 25 (4), 2550-2582, 2020
62020
Resource specification for prototyping human-intensive systems
SY Shin, Y Brun, LJ Osterweil, H Balasubramanian, PL Henneman
International Conference on Fundamental Approaches to Software Engineering …, 2015
62015
HITECS: a UML profile and analysis framework for hardware-in-the-loop testing of cyber physical systems
SY Shin, K Chaouch, S Nejati, M Sabetzadeh, LC Briand, F Zimmer
Proceedings of the 21th ACM/IEEE International Conference on Model Driven …, 2018
52018
Schedulability analysis of real-time systems with uncertain worst-case execution times
J Lee, SY Shin, S Nejati, LC Briand, YI Parache
arXiv preprint arXiv:2007.10490, 2020
42020
Specification and analysis of human-intensive system resource-utilization policies
SY Shin, Y Brun, LJ Osterweil
2016 IEEE/ACM International Workshop on Software Engineering in Healthcare …, 2016
32016
Broadcast receiving apparatus and method thereof
S Shin, S Cho, K Kim, JH Choi
US Patent App. 11/774,680, 2008
32008
Dynamic adaptive network configuration for IoT systems: a search-based approach
SY Shin, S Nejati, M Sabetzadeh, LC Briand, C Arora, F Zimmer
arXiv preprint arXiv 1905, 12763, 2019
22019
Estimating Probabilistic Safe WCET Ranges of Real-Time Systems at Design Stages
J Lee, SY Shin, S Nejati, LC Briand, YI Parache
ACM Transactions on Software Engineering and Methodology, 2022
2022
Optimal Priority Assignment for Real-Time Systems: A Coevolution-Based Approach
J Lee, SY Shin, S Nejati, LC Briand
arXiv preprint arXiv:2102.07694, 2021
2021
Specification and Analysis of Resource Utilization Policies for Human-Intensive Systems
SY Shin
Proceedings of the BPM Demo Track and BPM Dissertation Award co-located with …, 2017
2017
Specification and Analysis of Resource Utilization Policies for Human-Intensive Systems
SY Shin
University of Massachusetts Amherst, 2016
2016
The system can't perform the operation now. Try again later.
Articles 1–20