Jing Dong

According to our database1, Jing Dong authored at least 209 papers between 1998 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Image Forensics Based on Planar Contact Constraints of 3D Objects.
IEEE Trans. Information Forensics and Security, 2018

Low rank matrix completion using truncated nuclear norm and sparse regularizer.
Sig. Proc.: Image Comm., 2018

Polynomial dictionary learning algorithms in sparse representations.
Signal Processing, 2018

Perfect sampling of GI/GI/c queues.
Queueing Syst., 2018

Feature learning for steganalysis using convolutional neural networks.
Multimedia Tools Appl., 2018

Deep-MATEM: TEM query image based cross-modal retrieval for material science literature.
Multimedia Tools Appl., 2018

Reversible data hiding in encrypted image with separable capability and high embedding capacity.
Inf. Sci., 2018

Learning to Align Images using Weak Geometric Supervision.
CoRR, 2018

STEAP: simultaneous trajectory estimation and planning.
CoRR, 2018

Deep Steganalysis: End-to-End Learning with Supervisory Information beyond Class Labels.
CoRR, 2018

DeepFirearm: Learning Discriminative Feature Representation for Fine-grained Firearm Retrieval.
CoRR, 2018

The Cut and Dominating Set Problem in A Steganographer Network.
CoRR, 2018

Reversible Embedding to Covers Full of Boundaries.
CoRR, 2018

Ensemble Reversible Data Hiding.
CoRR, 2018

SAR: A Social-Aware Route Recommendation System for Intelligent Transportation.
Comput. J., 2018

Identifying and Modeling Information Resumption Behaviors in Cross-Device Search.
Proceedings of the 41st International ACM SIGIR Conference on Research & Development in Information Retrieval, 2018

Sparse Gaussian Processes on Matrix Lie Groups: A Unified Framework for Optimizing Continuous-Time Trajectories.
Proceedings of the 2018 IEEE International Conference on Robotics and Automation, 2018

Reversible Embedding to Covers Full of Boundaries.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

Modeling and Analyzing Information Preparation Behaviors in Cross-Device Search.
Proceedings of the Cross-Cultural Design. Methods, Tools, and Users, 2018

Learning to Align Images Using Weak Geometric Supervision.
Proceedings of the 2018 International Conference on 3D Vision, 2018

2017
Optimized 3D Lighting Environment Estimation for Image Forgery Detection.
IEEE Trans. Information Forensics and Security, 2017

Video Stabilization for Strict Real-Time Applications.
IEEE Trans. Circuits Syst. Video Techn., 2017

Fragile image watermarking with pixel-wise recovery based on overlapping embedding strategy.
Signal Processing, 2017

Sparse analysis model based multiplicative noise removal with enhanced regularization.
Signal Processing, 2017

Queues with Time-Varying Arrivals and Inspections with Applications to Hospital Discharge Policies.
Operations Research, 2017

Grid workflow validation using ontology-based tacit knowledge: A case study for quantitative remote sensing applications.
Computers & Geosciences, 2017

SSGAN: Secure Steganography Based on Generative Adversarial Networks.
CoRR, 2017

Continuous-Time Gaussian Process Motion Planning via Probabilistic Inference.
CoRR, 2017

Matrix of Polynomials Model based Polynomial Dictionary Learning Method for Acoustic Impulse Response Modeling.
CoRR, 2017

Sparse Gaussian Processes for Continuous-Time Trajectory Estimation on Matrix Lie Groups.
CoRR, 2017

A Novel Architecture for Information Sharing & Exchange between IoT Systems.
Proceedings of the 86th IEEE Vehicular Technology Conference, 2017

Simultaneous Trajectory Estimation and Planning via Probabilistic Inference.
Proceedings of the Robotics: Science and Systems XIII, 2017

SSGAN: Secure Steganography Based on Generative Adversarial Networks.
Proceedings of the Advances in Multimedia Information Processing - PCM 2017, 2017

Blind Speech Deconvolution via Pretrained Polynomial Dictionary and Sparse Representation.
Proceedings of the Advances in Multimedia Information Processing - PCM 2017, 2017

Matrix of Polynomials Model Based Polynomial Dictionary Learning Method for Acoustic Impulse Response Modeling.
Proceedings of the Interspeech 2017, 2017

Global Perception Feedback Convolutional Neural Networks.
Proceedings of the Advances in Image and Graphics Technologies - 12th Chinese conference, 2017

4D crop monitoring: Spatio-temporal reconstruction for agriculture.
Proceedings of the 2017 IEEE International Conference on Robotics and Automation, 2017

MFC: A multi-scale fully convolutional approach for visual instance retrieval.
Proceedings of the 2017 IEEE International Conference on Multimedia & Expo Workshops, 2017

Improving spatial image adaptive steganalysis incorporating the embedding impactont he feature.
Proceedings of the 2017 IEEE International Conference on Image Processing, 2017

Position Determines Perspective: Investigating Perspective Distortion for Image Forensics of Faces.
Proceedings of the 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2017

Influence Evaluation for Image Tampering Using Saliency Mechanism.
Proceedings of the Computer Vision - Second CCF Chinese Conference, 2017

Image Forgery Detection Based on Semantic Image Understanding.
Proceedings of the Computer Vision - Second CCF Chinese Conference, 2017

High Capacity Reversible Data Hiding with Contrast Enhancement.
Proceedings of the Computer Vision - Second CCF Chinese Conference, 2017

2016
Sparse analysis model based dictionary learning and signal reconstruction.
PhD thesis, 2016

Analysis SimCO Algorithms for Sparse Analysis Model Based Dictionary Learning.
IEEE Trans. Signal Processing, 2016

Semi-real-time algorithm for fast pattern matching.
IET Image Processing, 2016

Perceptual image hashing with selective sampling for salient structure features.
Displays, 2016

What Is the Best Practice for CNNs Applied to Visual Instance Retrieval?
CoRR, 2016

4D Crop Monitoring: Spatio-Temporal Reconstruction for Agriculture.
CoRR, 2016

Three asymptotic regimes for ranking and selection with general sample distributions.
Proceedings of the Winter Simulation Conference, WSC 2016, 2016

Motion Planning as Probabilistic Inference using Gaussian Processes and Factor Graphs.
Proceedings of the Robotics: Science and Systems XII, University of Michigan, Ann Arbor, Michigan, USA, June 18, 2016

Learning and transferring representations for image steganalysis using convolutional neural network.
Proceedings of the 2016 IEEE International Conference on Image Processing, 2016

Automatic detection of 3D lighting inconsistencies via a facial landmark based morphable model.
Proceedings of the 2016 IEEE International Conference on Image Processing, 2016

Convex optimization for energy-efficient traffic control.
Proceedings of the 55th IEEE Conference on Decision and Control, 2016

2015
Travel Time Reliability Versus Safety: A Stochastic Hazard-Based Modeling Approach.
IEEE Trans. Intelligent Transportation Systems, 2015

Service Systems with Slowdowns: Potential Failures and Proposed Solutions.
Operations Research, 2015

Improved 3D lighting environment estimation for image forgery detection.
Proceedings of the 2015 IEEE International Workshop on Information Forensics and Security, 2015

Efficient virtual machine scheduling for downlink joint transmission of CoMP in C-RAN.
Proceedings of the International Conference on Wireless Communications & Signal Processing, 2015

Segmentation of Motion Capture Data Based on Measured MDS and Improved Oblique Space Distance.
Proceedings of the Multi-disciplinary Trends in Artificial Intelligence, 2015

Robust Feature Extraction Based on Teager-Entropy and Half Power Spectrum Estimation for Speech Recognition.
Proceedings of the Multi-disciplinary Trends in Artificial Intelligence, 2015

Deep learning for steganalysis via convolutional neural networks.
Proceedings of the Media Watermarking, 2015

Measurement and Analysis of Heterogenous Vehicle Following Behavior on Urban Freeways: Time Headways and Standstill Distances.
Proceedings of the IEEE 18th International Conference on Intelligent Transportation Systems, 2015

Study of Spatio-temporal Variation of Soil Nutrients in Paddy Rice Planting Farm.
Proceedings of the Computer and Computing Technologies in Agriculture IX, 2015

Application and Implementation of Private Cloud in Agriculture Sensory Data Platform.
Proceedings of the Computer and Computing Technologies in Agriculture IX, 2015

Distributed real-time cooperative localization and mapping using an uncertainty-aware expectation maximization approach.
Proceedings of the IEEE International Conference on Robotics and Automation, 2015

Robust steganalysis based on training set construction and ensemble classifiers weighting.
Proceedings of the 2015 IEEE International Conference on Image Processing, 2015

A Method of Facial Animation Retargeting Based on Motion Capture.
Proceedings of the Image and Graphics - 8th International Conference, 2015

Audio super-resolution using analysis dictionary learning.
Proceedings of the 2015 IEEE International Conference on Digital Signal Processing, 2015

A Polynomial Dictionary Learning Method for Acoustic Impulse Response Modeling.
Proceedings of the Latent Variable Analysis and Signal Separation, 2015

Distributed traffic control for reduced fuel consumption and travel time in transportation networks.
Proceedings of the European Control Conference, 2015

Local correlation pattern for image steganalysis.
Proceedings of the IEEE China Summit and International Conference on Signal and Information Processing, 2015

Detection of computer generated faces in videos based on pulse signal.
Proceedings of the IEEE China Summit and International Conference on Signal and Information Processing, 2015

2014
Exploring DCT Coefficient Quantization Effects for Local Tampering Detection.
IEEE Trans. Information Forensics and Security, 2014

Instantaneous video stabilization for unmanned aerial vehicles.
J. Electronic Imaging, 2014

Effects of Fragile and Semi-fragile Watermarking on Iris Recognition System.
Proceedings of the Digital-Forensics and Watermarking - 13th International Workshop, 2014

Analysis dictionary learning based on Nesterov's gradient with application to SAR image despeckling.
Proceedings of the 6th International Symposium on Communications, 2014

Improved Robust Watermarking Based on Rational Dither Modulation.
Proceedings of the Advances in Image and Graphics Technologies - Chinese Conference, 2014

Knowledge representation of remote sensing quantitative retrieval models.
Proceedings of the 2014 IEEE Geoscience and Remote Sensing Symposium, 2014

An effective watermarking method against valumetric distortions.
Proceedings of the 2014 IEEE International Conference on Image Processing, 2014

Analysis SimCO: A new algorithm for analysis dictionary learning.
Proceedings of the IEEE International Conference on Acoustics, 2014

Low-cost structured-light based 3D capture system design.
Proceedings of the Three-Dimensional Image Processing, 2014

2013
Oroxylin A Inhibits Hemolysis via Hindering the Self-Assembly of α-Hemolysin Heptameric Transmembrane Pore.
PLoS Computational Biology, 2013

On the practicality of cryptographic defences against pollution attacks in wireless network coding.
ACM Comput. Surv., 2013

A Fuzzy Logic-Based Approach to Uncertainty Treatment in the Rule Interchange Format: From Encoding to Extension.
Proceedings of the Uncertainty Reasoning for the Semantic Web II, 2013

Travel time reliability versus safety: A stochastic risk-based acceleration modeling approach.
Proceedings of the 16th International IEEE Conference on Intelligent Transportation Systems, 2013

Research of the Early Warning Analysis of Crop Diseases and Insect Pests.
Proceedings of the Computer and Computing Technologies in Agriculture VII, 2013

Applications and Implementation of Decomposition Storage Model (DSM) in Paas of Agricultural.
Proceedings of the Computer and Computing Technologies in Agriculture VII, 2013

Video steganalysis based on the constraints of motion vectors.
Proceedings of the IEEE International Conference on Image Processing, 2013

Two Notes from Experimental Study on Image Steganalysis.
Proceedings of the Intelligent Computing Theories - 9th International Conference, 2013

CASIA Image Tampering Detection Evaluation Database.
Proceedings of the 2013 IEEE China Summit and International Conference on Signal and Information Processing, 2013

2012
Stochastic Modeling of Traffic Flow Breakdown Phenomenon: Application to Predicting Travel Time Reliability.
IEEE Trans. Intelligent Transportation Systems, 2012

Pollution Attacks and Defenses in Wireless Interflow Network Coding Systems.
IEEE Trans. Dependable Sec. Comput., 2012

Rare-event simulation for multi-server queues in the Halfin-Whitt regime.
SIGMETRICS Performance Evaluation Review, 2012

Undecidability of infinite post correspondence problem for instances of size 8.
RAIRO - Theor. Inf. and Applic., 2012

Sampling point processes on stable unbounded regions and exact simulation of queues.
Proceedings of the Winter Simulation Conference, 2012

Uncertainty from Lambertian surface assumption in satellite aerosol retrieval.
Proceedings of the 2012 IEEE International Geoscience and Remote Sensing Symposium, 2012

A semi-empirical optical data fusion technique for merging aerosol optical depth over China.
Proceedings of the 2012 IEEE International Geoscience and Remote Sensing Symposium, 2012

Aerosol retrival of North China using NOAA AVHRR data.
Proceedings of the 2012 IEEE International Geoscience and Remote Sensing Symposium, 2012

A study of grid workflow dynamic customization for remote sensing quantitative retrieval.
Proceedings of the 2012 IEEE International Geoscience and Remote Sensing Symposium, 2012

The task scheduling for Remote Sensing Quantitative Retrieval based on hierarchical grid computing platform.
Proceedings of the 2012 IEEE International Geoscience and Remote Sensing Symposium, 2012

Universal spatial feature set for video steganalysis.
Proceedings of the 19th IEEE International Conference on Image Processing, 2012

2011
Secure Routing in Wireless Mesh Networks.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Security of Group Communication in Wireless Mesh Networks.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Security of Wireless Mesh Networks (General Overview).
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Secure High-Throughput Multicast Routing in Wireless Mesh Networks.
IEEE Trans. Mob. Comput., 2011

Practical defenses against pollution attacks in wireless network coding.
ACM Trans. Inf. Syst. Secur., 2011

On Instantiation and Integration Commutability of Design Pattern.
Comput. J., 2011

Exploring DCT coefficient quantization effect for image tampering localization.
Proceedings of the 2011 IEEE International Workshop on Information Forensics and Security, 2011

Stochastic modeling of traffic flow breakdown phenomenon: Application to predicting travel time reliability.
Proceedings of the 14th International IEEE Conference on Intelligent Transportation Systems, 2011

Prior information supported aerosol optical depth retrieval using FY2D data.
Proceedings of the 2011 IEEE International Geoscience and Remote Sensing Symposium, 2011

Analysis of remote sensing quantitative inversion in cloud computing.
Proceedings of the 2011 IEEE International Geoscience and Remote Sensing Symposium, 2011

An effective image steganalysis method based on neighborhood information of pixels.
Proceedings of the 18th IEEE International Conference on Image Processing, 2011

Research on Power-Aware Scheduling for High-Performance Computing System.
Proceedings of the 2011 IEEE/ACM International Conference on Green Computing and Communications (GreenCom), 2011

The Study of Hierarchical Branch Prediction Architecture.
Proceedings of the 14th IEEE International Conference on Computational Science and Engineering, 2011

3D Human Motion Retrieval Based on ISOMAP Dimension Reduction.
Proceedings of the Artificial Intelligence and Computational Intelligence, 2011

The design of on-line item bank system based on cloud computing platform GAE.
Proceedings of the 2011 International Conference on Innovative Computing and Cloud Computing, 2011

2010
Secure and robust virtual coordinate system in wireless sensor networks.
TOSN, 2010

Design pattern evolutions in QVT.
Software Quality Journal, 2010

Modeling enterprise service-oriented architectural styles.
Service Oriented Computing and Applications, 2010

Automated verification of security pattern compositions.
Information & Software Technology, 2010

Automated Sleep Staging Technique Based on the Empirical Mode Decomposition Algorithm: a Preliminary Study.
Advances in Adaptive Data Analysis, 2010

Tradeoffs between security and communication performance in wireless mesh networks.
Proceedings of the 11th IEEE International Symposium on a World of Wireless, 2010

A Classification of Enterprise Service-Oriented Architecture.
Proceedings of the Fifth IEEE International Symposium on Service-Oriented System Engineering, 2010

Real-Time Service-Oriented Distributed Governance.
Proceedings of the 6th World Congress on Services, 2010

Tampered Region Localization of Digital Color Images Based on JPEG Compression Noise.
Proceedings of the Digital Watermarking - 9th International Workshop, 2010

Blind Quantitative Steganalysis Based on Feature Fusion and Gradient Boosting.
Proceedings of the Digital Watermarking - 9th International Workshop, 2010

New developments in color image tampering detection.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2010), May 30, 2010

Spatial Statistical Analysis in Cow Disease Monitoring Based on GIS.
Proceedings of the Computer and Computing Technologies in Agriculture IV, 2010

A Digital Management System of Cow Diseases on Dairy Farm.
Proceedings of the Computer and Computing Technologies in Agriculture IV, 2010

Image tampering detection based on stationary distribution of Markov chain.
Proceedings of the International Conference on Image Processing, 2010

Building fuzzy hybrid Horn logic rules on top of ontologies.
Proceedings of the Seventh International Conference on Fuzzy Systems and Knowledge Discovery, 2010

Enterprise Cloud Service Architecture.
Proceedings of the IEEE International Conference on Cloud Computing, 2010

2009
A Matrix-Based Approach to Recovering Design Patterns.
IEEE Trans. Systems, Man, and Cybernetics, Part A, 2009

Ontology Classification for Semantic-Web-Based Software Engineering.
IEEE Trans. Services Computing, 2009

XSLT-based evolutions and analyses of design patterns.
Softw., Pract. Exper., 2009

Robust pitch estimation using a wavelet variance analysis model.
Signal Processing, 2009

Managing Complexity and Unforeseeable Uncertainty in Startup Companies: An Empirical Study.
Organization Science, 2009

Specifying behavioral semantics of UML diagrams through graph transformations.
Journal of Systems and Software, 2009

A Review of Design Pattern Mining Techniques.
International Journal of Software Engineering and Knowledge Engineering, 2009

Secure network coding for wireless mesh networks: Threats, challenges, and directions.
Computer Communications, 2009

Secure group communication in wireless mesh networks.
Ad Hoc Networks, 2009

Practical defenses against pollution attacks in intra-flow network coding for wireless mesh networks.
Proceedings of the Second ACM Conference on Wireless Network Security, 2009

Extending service model to build an effective service composition framework for cyber-physical systems.
Proceedings of the IEEE International Conference on Service-Oriented Computing and Applications, 2009

A Survey of Passive Image Tampering Detection.
Proceedings of the Digital Watermarking, 8th International Workshop, 2009

Multi-class Blind Steganalysis Based on Image Run-Length Analysis.
Proceedings of the Digital Watermarking, 8th International Workshop, 2009

Research of Animal Disease Information System Based on GIS Technology.
Proceedings of the Computer and Computing Technologies in Agriculture III, 2009

Monitoring Method of Cow Anthrax Based on Gis and Spatial Statistical Analysis.
Proceedings of the Computer and Computing Technologies in Agriculture III, 2009

Effective image splicing detection based on image chroma.
Proceedings of the International Conference on Image Processing, 2009

2008
Class and Object.
Proceedings of the Wiley Encyclopedia of Computer Science and Engineering, 2008

High-Assurance Service-Oriented Architectures.
IEEE Computer, 2008

Secure group communication in wireless mesh networks.
Proceedings of the 9th IEEE International Symposium on a World of Wireless, 2008

Mitigating attacks against virtual coordinate based routing in wireless sensor networks.
Proceedings of the First ACM Conference on Wireless Network Security, 2008

A Generic Model of Enterprise Service-Oriented Architecture.
Proceedings of the Fourth IEEE International Symposium on Service-Oriented System Engineering, 2008

Adaptation in a Pervasive Computing Environment.
Proceedings of the International Conference on Software Engineering Theory and Practice, 2008

An Adaptive User Interface Generation Framework for Web Services.
Proceedings of the 2008 IEEE World Congress on Services, 2008

Hierarchical Composition of OWL-S Web Services.
Proceedings of the 6th ACIS International Conference on Software Engineering Research, 2008

An Ontology-Based Integrated Assessment Framework for High-Assurance Systems.
Proceedings of the 2th IEEE International Conference on Semantic Computing (ICSC 2008), 2008

Verifying Behavioral Correctness of Design Pattern Implementation.
Proceedings of the Twentieth International Conference on Software Engineering & Knowledge Engineering (SEKE'2008), 2008

On the Pitfalls of High-Throughput Multicast Metrics in Adversarial Wireless Mesh Networks.
Proceedings of the Fifth Annual IEEE Communications Society Conference on Sensor, 2008

Design pattern detection by template matching.
Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), 2008

Run-Length and Edge Statistics Based Approach for Image Splicing Detection.
Proceedings of the Digital Watermarking, 7th International Workshop, 2008

Compound record clustering algorithm for design pattern detection by decision tree learning.
Proceedings of the IEEE International Conference on Information Reuse and Integration, 2008

The Relationship between Monthdisease incidence Rate and climatic factor of Classical Swine Fever.
Proceedings of the Computer and Computing Technologies in Agriculture II, Volume 2, 2008

Blind image steganalysis based on run-length histogram analysis.
Proceedings of the International Conference on Image Processing, 2008

Effects of watermarking on iris recognition performance.
Proceedings of the 10th International Conference on Control, 2008

2007
Pattern-based design evolution using graph transformation.
J. Vis. Lang. Comput., 2007

Visualizing Design Patterns in Their Applications and Compositions.
IEEE Trans. Software Eng., 2007

Composing pattern-based components and verifying correctness.
Journal of Systems and Software, 2007

A Classification of Design Pattern Evolutions.
Journal of Object Technology, 2007

Commutability of Design Pattern Instantiation and Integration.
Proceedings of the First Joint IEEE/IFIP Symposium on Theoretical Aspects of Software Engineering, 2007

A Survey of Formal Methods for Software Architecture.
Proceedings of the International Conference on Software Engineering Theory and Practice, 2007

Architecture and Design Pattern Discovery Techniques - A Review.
Proceedings of the 2007 International Conference on Software Engineering Research & Practice, 2007

Effective Fault Localization using BP Neural Networks.
Proceedings of the Nineteenth International Conference on Software Engineering & Knowledge Engineering (SEKE'2007), 2007

Classification of Design Pattern Traits.
Proceedings of the Nineteenth International Conference on Software Engineering & Knowledge Engineering (SEKE'2007), 2007

Model Checking Security Pattern Compositions.
Proceedings of the Seventh International Conference on Quality Software (QSIC 2007), 2007

Fusion Based Blind Image Steganalysis by Boosting Feature Selection.
Proceedings of the Digital Watermarking, 6th International Workshop, 2007

Perspectives of Granular Computing in Software Engineering.
Proceedings of the 2007 IEEE International Conference on Granular Computing, 2007

DP-Miner: Design Pattern Discovery Using Matrix.
Proceedings of the 14th Annual IEEE International Conference and Workshop on Engineering of Computer Based Systems (ECBS 2007), 2007

2006
Automating the analysis of design component contracts.
Softw., Pract. Exper., 2006

Dynamic web service composition based on OWL-S.
Science in China Series F: Information Sciences, 2006

Service Oriented Evolutions and Analyses of Design Patterns.
Proceedings of the 2006 International Workshop on Service Oriented Software Engineering (IW-SOSE '06), 2006

OWL-S Ontology Framework Extension for Dynamic Web Service Composition.
Proceedings of the Eighteenth International Conference on Software Engineering & Knowledge Engineering (SEKE'2006), 2006

QVT based model transformation for design pattern evolutions.
Proceedings of the Tenth IASTED International Conference on Internet and Multimedia Systems and Applications (IMSA 2006), 2006

A Model Transformation Approach for Design Pattern Evolutions.
Proceedings of the 13th Annual IEEE International Conference and Workshop on Engineering of Computer Based Systems (ECBS 2006), 2006

2005
A COTS architectural component specification stencil for selection and reasoning.
ACM SIGSOFT Software Engineering Notes, 2005

A Generative Style-driven Framework for Software Architecture Design.
Proceedings of the 29th Annual IEEE / NASA Software Engineering Workshop (SEW-29 2005), 2005

VisDP: A Web Service for Visualizing Design Patterns on Demand.
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005

Event-Based Blackboard Architecture for Multi-Agent Systems.
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005

Grammar-Specified Model-Driven Architectures.
Proceedings of the 10th International Conference on Engineering of Complex Computer Systems (ICECCS 2005), 2005

2004
A behavioral analysis and verification approach to pattern-based design composition.
Software and System Modeling, 2004

User's manual as a requirements specification: case studies.
Requir. Eng., 2004

Adding pattern related information in structural and behavioral diagrams.
Information & Software Technology, 2004

A Component Framework for Resource Management Systems.
Proceedings of the International Conference on Software Engineering Research and Practice, 2004

Towards Trusted Composition in Software Design.
Proceedings of the 8th IEEE International Symposium on High-Assurance Systems Engineering (HASE 2004), 2004

2003
Visualizing design patterns with a UML profile.
Proceedings of the 2003 IEEE Symposium on Human Centric Computing Languages and Environments (HCC 2003), 2003

On Analysis of Design Component Contracts: A Case Study.
Proceedings of the 11th International Workshop on Software Technology and Engineering Practice (STEP 2003), 2003

Developing a Formal Design Analysis Framework.
Proceedings of the International Conference on Software Engineering Research and Practice, 2003

Extending UML to Visualize Design Patterns In Class Diagrams.
Proceedings of the Fifteenth International Conference on Software Engineering & Knowledge Engineering (SEKE'2003), 2003

Representing the Applications and Compositions of Design Patterns in UML.
Proceedings of the 2003 ACM Symposium on Applied Computing (SAC), 2003

A Formal Framework for Design Component Contracts.
Proceedings of the 2003 IEEE International Conference on Information Reuse and Integration, 2003

A Graph Grammar Approach to Software Architecture Verification and Transformation.
Proceedings of the 27th International Computer Software and Applications Conference (COMPSAC 2003): Design and Assessment of Trustworthy Software-Based Systems, 2003

2002
UML Extensions for Design Pattern Compositions.
Journal of Object Technology, 2002

2001
A Behavioral Analysis Approach to Pattern-Based Composition.
Proceedings of the OOIS'2001, 2001

2000
A logical framework for design composition.
Proceedings of the 22nd International Conference on on Software Engineering, 2000

Ensuring Structure and Behavior Correctness in Design Composition.
Proceedings of the 7th IEEE International Symposium on Engineering of Computer-Based Systems (ECBS 2000), 2000

Model checking the composition of hypermedia design components.
Proceedings of the 2000 conference of the Centre for Advanced Studies on Collaborative Research, 2000

1999
Correct Composition of Design Components.
Proceedings of the Object-Oriented Technology, ECOOP'99 Workshop Reader, 1999

A Pattern-Based Approach to Structural Design Composition.
Proceedings of the 23rd International Computer Software and Applications Conference (COMPSAC '99), 1999

1998
A Transformational Approach to Structural Design Assessment and Change.
Proceedings of the Object-Oriented Technology, ECOOP'98 Workshop Reader, 1998


  Loading...