Jun Yan

According to our database1, Jun Yan
  • authored at least 231 papers between 2003 and 2018.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
A New Asymptotic Analysis Technique for Diversity Receptions Over Correlated Lognormal Fading Channels.
IEEE Trans. Communications, 2018

Two sparse-based methods for off-grid direction-of-arrival estimation.
Signal Processing, 2018

Three-Dimensional VLC Positioning Based on Angle Difference of Arrival With Arbitrary Tilting Angle of Receiver.
IEEE Journal on Selected Areas in Communications, 2018

2017
Asymptotically Tight Performance Bounds of Diversity Receptions Over α-μ Fading Channels With Arbitrary Correlation.
IEEE Trans. Vehicular Technology, 2017

A Toeplitz Covariance Matrix Reconstruction Approach for Direction-of-Arrival Estimation.
IEEE Trans. Vehicular Technology, 2017

Q-Learning-Based Vulnerability Analysis of Smart Grid Against Sequential Topology Attacks.
IEEE Trans. Information Forensics and Security, 2017

Joint Wireless Positioning and Emitter Identification in DVB-T Single Frequency Networks.
TBC, 2017

An Improved Compressive Sensing and Received Signal Strength-Based Target Localization Algorithm with Unknown Target Population for Wireless Local Area Networks.
Sensors, 2017

Automated selection of r for the r largest order statistics approach with adjustment for sequential testing.
Statistics and Computing, 2017

Large-scale extraction of drug-disease pairs from the medical literature.
JASIST, 2017

Understanding usage of Internet of Things (IOT) systems in China: Cognitive experience and affect experience as moderator.
IT & People, 2017

A High-resolution DOA Estimation Method with a Family of Nonconvex Penalties.
CoRR, 2017

Gridless Two-dimensional DOA Estimation With L-shaped Array Based on the Cross-covariance Matrix.
CoRR, 2017

A New Asymptotic Analysis Technique for Diversity Receptions Over Correlated Lognormal Fading Channels.
CoRR, 2017

Automatic Bug Triage using Semi-Supervised Text Classification.
CoRR, 2017

A novel phase performance evaluation method for particle swarm optimization algorithms using velocity-based state estimation.
Appl. Soft Comput., 2017

InsDal: A safe and extensible instrumentation tool on Dalvik byte-code for Android applications.
Proceedings of the IEEE 24th International Conference on Software Analysis, 2017

Sentence-level Sentiment Classification with Weak Supervision.
Proceedings of the 40th International ACM SIGIR Conference on Research and Development in Information Retrieval, 2017

Widget-Sensitive and Back-Stack-Aware GUI Exploration for Testing Android Apps.
Proceedings of the 2017 IEEE International Conference on Software Quality, 2017

Self-paced Compensatory Deep Boltzmann Machine for Semi-Structured Document Embedding.
Proceedings of the Twenty-Sixth International Joint Conference on Artificial Intelligence, 2017

Combinatorial Testing on Implementations of HTML5 Support.
Proceedings of the 2017 IEEE International Conference on Software Testing, 2017

Detecting Energy Bugs in Android Apps Using Static Analysis.
Proceedings of the Formal Methods and Software Engineering, 2017

The Effects of Consumer Perceived Different Service of Trusted Third Party on Trust Intention: An Empirical Study in Australia.
Proceedings of the 14th IEEE International Conference on e-Business Engineering, 2017

An CNN-LSTM Attention Approach to Understanding User Query Intent from Online Health Communities.
Proceedings of the 2017 IEEE International Conference on Data Mining Workshops, 2017

A fast covariance matrix reconstruction method for two-dimensional direction-of-arrival estimation.
Proceedings of the 2017 IEEE International Conference on Acoustics, 2017

VLC Positioning Using Cameras with Unknown Tilting Angles.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

GIS applications in developing zero-waste strategies at a mid-size American university.
Proceedings of the 25th International Conference on Geoinformatics, 2017

A new technique for analyzing asymptotic outage performance of diversity over lognormal fading channels.
Proceedings of the 15th Canadian Workshop on Information Theory, 2017

Optimal user node placement for multi-hop FSO broadcasting communications under weak turbulence conditions.
Proceedings of the 15th Canadian Workshop on Information Theory, 2017

Comprehensive Static Analysis for Configurable Software via Combinatorial Instantiation.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017

Minimax design of orthogonal filter banks with sparse coefficients.
Proceedings of the 30th IEEE Canadian Conference on Electrical and Computer Engineering, 2017

Towards Cost Reduction in Cloud-Based Workflow Management through Data Replication.
Proceedings of the Fifth International Conference on Advanced Cloud and Big Data, 2017

Active Sentiment Domain Adaptation.
Proceedings of the 55th Annual Meeting of the Association for Computational Linguistics, 2017

2016
Light-Weight, Inter-Procedural and Callback-Aware Resource Leak Detection for Android Apps.
IEEE Trans. Software Eng., 2016

Online Updating of Statistical Inference in the Big Data Setting.
Technometrics, 2016

Variance Analysis and Adaptive Sampling for Indirect Light Path Reuse.
J. Comput. Sci. Technol., 2016

Priority L2 cache design for time predictability.
IJES, 2016

Cyber-physical attacks and defences in the smart grid: a survey.
IET Cyper-Phys. Syst.: Theory & Appl., 2016

Target Directed Event Sequence Generation for Android Applications.
CoRR, 2016

Detection of False Data Injection Attacks in Smart Grid under Colored Gaussian Noise.
CoRR, 2016

PEDAL: a dynamic analysis tool for efficient concurrency bug reproduction in big data environment.
Cluster Computing, 2016

Lightweight Method-Level Energy Consumption Estimation for Android Applications.
Proceedings of the 10th International Symposium on Theoretical Aspects of Software Engineering, 2016

Relda2: an effective static analysis tool for resource leak detection in Android apps.
Proceedings of the 31st IEEE/ACM International Conference on Automated Software Engineering, 2016

Fixing Resource Leaks in Android Apps with Light-Weight Static Analysis and Low-Overhead Instrumentation.
Proceedings of the 27th IEEE International Symposium on Software Reliability Engineering, 2016

Detection of false data attacks in smart grid with supervised learning.
Proceedings of the 2016 International Joint Conference on Neural Networks, 2016

Direction-of-arrival estimation based on Toeplitz covariance matrix reconstruction.
Proceedings of the 2016 IEEE International Conference on Acoustics, 2016

Detection of false data injection attacks in smart grid under colored Gaussian noise.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

A relay node placement for free space optical communication system under multi-user environments.
Proceedings of the International Conference on Computer, 2016

A visible light communication indoor localization algorithm in rotated environments.
Proceedings of the International Conference on Computer, 2016

A residual error analysis based secure CS approach for malicious node attack.
Proceedings of the International Conference on Computer, 2016

The Floating-Point Extension of Symbolic Execution Engine for Bug Detection.
Proceedings of the 23rd Asia-Pacific Software Engineering Conference, 2016

Understanding the influence and service type of trusted third party on consumers' online trust: evidence from Australian B2C marketplace.
Proceedings of the 18th Annual International Conference on Electronic Commerce, 2016

2015
Joint Substation-Transmission Line Vulnerability Assessment Against the Smart Grid.
IEEE Trans. Information Forensics and Security, 2015

Fuzzy control and wavelet transform-based energy management strategy design of a hybrid tracked bulldozer.
Journal of Intelligent and Fuzzy Systems, 2015

Base Station Placement for Wireless Sensor Network Positioning System via Lexicographical Stratified Programming.
TIIS, 2015

Intelligent load frequency controller using GrADP for island smart grid with electric vehicles and renewable resources.
Neurocomputing, 2015

Delta extraction in a limited collaborative environment.
IJIIDS, 2015

Using grouping strategy and pattern discovery for delta extraction in a limited collaborative environment.
IJBIDM, 2015

Object detection oriented video reconstruction using compressed sensing.
EURASIP J. Adv. Sig. Proc., 2015

Automatic Modulation Recognition of PSK Signals with Sub-Nyquist Sampling Based on High Order Statistics.
CoRR, 2015

Automatic Modulation Recognition of PSK Signals Using Nonuniform Compressive Samples Based on High Order Statistics.
CoRR, 2015

A Novel Compressed Sensing Based Model for Reconstructing Sparse Signals Using Phase Sparse Character.
CoRR, 2015

An Improved SVM-Based Cognitive Diagnosis Algorithm for Operation States of Distribution Grid.
Cognitive Computation, 2015

A Data Fusion Scheme for Modified EKF Banks Positioning Algorithm in Mixed LOS/NLOS Conditions.
Proceedings of the 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), 2015

Automatic Detection of Parameter Shielding for Test Case Generation.
Proceedings of the 27th International Conference on Software Engineering and Knowledge Engineering, 2015

Diversity of cascading failure processes in electrical grids.
Proceedings of the 2015 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference, 2015

Quantum Bit Commitment with Application in Quantum Zero-Knowledge Proof (Extended Abstract).
Proceedings of the Algorithms and Computation - 26th International Symposium, 2015

Reflex-Tree: A Biologically Inspired Parallel Architecture for Future Smart Cities.
Proceedings of the 44th International Conference on Parallel Processing, 2015

Gridless postprocessing for sparse signal reconstruction based DOA estimation.
Proceedings of the 2015 IEEE International Conference on Digital Signal Processing, 2015

Performance analysis of interference-limited AF Relay Systems with Antenna Correlation.
Proceedings of the IEEE International Conference on Communication, 2015

Smart Grid Vulnerability under Cascade-Based Sequential Line-Switching Attacks.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

An improved GMP based localization algorithm for unknown target population environments.
Proceedings of the 10th International Conference on Communications and Networking in China, 2015

Business Rule Driven Composite Service Optimisation and Selection.
Proceedings of the 2015 IEEE International Conference on Services Computing, 2015

2014
Quality-Aware Service Selection for Service-Based Systems Based on Iterative Multi-Attribute Combinatorial Auction.
IEEE Trans. Software Eng., 2014

Revealing Cascading Failure Vulnerability in Power Grids Using Risk-Graph.
IEEE Trans. Parallel Distrib. Syst., 2014

Resilience Analysis of Power Grids Under the Sequential Attack.
IEEE Trans. Information Forensics and Security, 2014

Integrated Security Analysis on Cascading Failure in Complex Networks.
IEEE Trans. Information Forensics and Security, 2014

Single frequency network based mobile tracking in NLOS environments.
Physical Communication, 2014

Generating combinatorial test suite using combinatorial optimization.
Journal of Systems and Software, 2014

Block-Refined Orthogonal Matching Pursuit for Sparse Signal Recovery.
IEICE Transactions, 2014

Quantum Bit Commitment with Application in Quantum Zero-Knowledge Proof.
IACR Cryptology ePrint Archive, 2014

Fuzzy modeling, maximum likelihood estimation, and Kalman filtering for target tracking in NLOS scenarios.
EURASIP J. Adv. Sig. Proc., 2014

Trust-oriented QoS-aware composite service selection based on genetic algorithms.
Concurrency and Computation: Practice and Experience, 2014

Attribute-Based Data Transfer with Filtering Scheme in Cloud Computing.
Comput. J., 2014

Professional or interactive: CEOs' image strategies in the microblogging context.
Computers in Human Behavior, 2014

Modified Zero-Padding Method for Fast Long PN-Code Acquisition.
Proceedings of the IEEE 80th Vehicular Technology Conference, 2014

Towards a Trust Model for Trust Establishment and Management in Business-to-Consumer E-Commerce.
Proceedings of the 2014 IEEE 11th Intl Conf on Ubiquitous Intelligence and Computing and 2014 IEEE 11th Intl Conf on Autonomic and Trusted Computing and 2014 IEEE 14th Intl Conf on Scalable Computing and Communications and Its Associated Workshops, 2014

Choreography Scenario-Based Test Data Generation.
Proceedings of the 2014 Theoretical Aspects of Software Engineering Conference, 2014

Automatic Test Data Generation for Unit Testing to Achieve MC/DC Criterion.
Proceedings of the Eighth International Conference on Software Security and Reliability, 2014

Automated Coverage-Driven Test Data Generation Using Dynamic Symbolic Execution.
Proceedings of the Eighth International Conference on Software Security and Reliability, 2014

Attribute Based Service Customization and Selection.
Proceedings of the 7th IEEE International Conference on Service-Oriented Computing and Applications, 2014

Automatic modulation recognition of PSK signals with Sub-Nyquist sampling based on high order statistics.
Proceedings of the 2014 IEEE International Symposium on Signal Processing and Information Technology, 2014

Frequency control using on-line learning method for island smart grid with EVs and PVs.
Proceedings of the 2014 International Joint Conference on Neural Networks, 2014

The sequential attack against power grid networks.
Proceedings of the IEEE International Conference on Communications, 2014

Low-rate turbo-Hadamard coding approach for narrow-band interference suppression.
Proceedings of the IEEE International Conference on Communications, 2014

Patients' adoption of the e-appointment scheduling service: A case study in primary healthcare.
Proceedings of the Investing in E-Health: People, Knowledge and Technology for a Healthy Future, 2014

Coordinated attacks against substations and transmission lines in power grids.
Proceedings of the IEEE Global Communications Conference, 2014

A novel direct approach for highway design and visualization based on LIDAR.
Proceedings of the 22nd International Conference on Geoinformatics, 2014

Impact of signal transmission delays on power system damping control using heuristic dynamic programming.
Proceedings of the 2014 IEEE Symposium on Computational Intelligence Applications in Smart Grid, 2014

Improved Spectral Clustering Algorithm Based on Similarity Measure.
Proceedings of the Advanced Data Mining and Applications - 10th International Conference, 2014

2013
A Decentralized Service Discovery Approach on Peer-to-Peer Networks.
IEEE Trans. Services Computing, 2013

Multi-Contingency Cascading Analysis of Smart Grid Based on Self-Organizing Map.
IEEE Trans. Information Forensics and Security, 2013

METscout: a pathfinder exploring the landscape of metabolites, enzymes and transporters.
Nucleic Acids Research, 2013

Incremental service level agreements violation handling with time impact analysis.
Journal of Systems and Software, 2013

PyDPI: Freely Available Python Package for Chemoinformatics, Bioinformatics, and Chemogenomics Studies.
Journal of Chemical Information and Modeling, 2013

Fusion framework for multi-focus images based on compressed sensing.
IET Image Processing, 2013

Sparse channel estimation of MIMO-OFDM systems with unconstrained smoothed l 0-norm-regularized least squares compressed sensing.
EURASIP J. Wireless Comm. and Networking, 2013

A Base Station Identification Algorithm for SFN Positioning Systems in NLOS Environment.
Proceedings of the 78th IEEE Vehicular Technology Conference, 2013

Towards Conformance Testing of Choreography Based on Scenario.
Proceedings of the Seventh International Symposium on Theoretical Aspects of Software Engineering, 2013

A Search Strategy Guided by Uncovered Branches for Concolic Testing.
Proceedings of the 2013 13th International Conference on Quality Software, 2013

Characterizing and detecting resource leaks in Android applications.
Proceedings of the 2013 28th IEEE/ACM International Conference on Automated Software Engineering, 2013

Revealing temporal features of attacks against smart grid.
Proceedings of the IEEE PES Innovative Smart Grid Technologies Conference, 2013

Cascade: A Test Generation Tool for Combinatorial Testing.
Proceedings of the Sixth IEEE International Conference on Software Testing, 2013

Profile directed systematic testing of concurrent programs.
Proceedings of the 8th International Workshop on Automation of Software Test, 2013

Accurate and Low-Overhead Process-Level Energy Estimation for Modern Hard Disk Drives.
Proceedings of the 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, 2013

Multilateral Game in Chinese Real Estate Price: A Game Analysis of Real Estate Tax and Land Tightening.
Proceedings of the Sixth International Conference on Business Intelligence and Financial Engineering, 2013

2012
Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption.
IEEE Trans. Parallel Distrib. Syst., 2012

Modeling and Simulation of an Adaptive Neuro-Fuzzy Inference System (ANFIS) for Mobile Learning.
TLT, 2012

Privacy preserving protocol for service aggregation in cloud computing.
Softw., Pract. Exper., 2012

Privacy enhanced data outsourcing in the cloud.
J. Network and Computer Applications, 2012

Static Timing Analysis of Shared Caches for Multicore Processors.
JCSE, 2012

New constructions of OSBE schemes and their applications in oblivious access control.
Int. J. Inf. Sec., 2012

Base station identification in single-frequency network positioning system under mixed line-of-sight/non-line-of-sight condition.
IET Communications, 2012

Efficient oblivious transfers with access control.
Computers & Mathematics with Applications, 2012

Attribute-Based Oblivious Access Control.
Comput. J., 2012

Cooperative scheme in SFN positioning system.
Proceedings of the 2012 Ubiquitous Positioning, 2012

A Path-oriented Approach to Generating Executable Test Sequences for Extended Finite State Machines.
Proceedings of the Sixth International Symposium on Theoretical Aspects of Software Engineering, 2012

A Surprisingly Simple Way of Reversing Trace Distance via Entanglement.
Proceedings of the Theory and Applications of Models of Computation, 2012

Complete Problem for Perfect Zero-Knowledge Quantum Proof.
Proceedings of the SOFSEM 2012: Theory and Practice of Computer Science, 2012

Automating Code Reviews with Simulink Code Inspector.
Proceedings of the Dagstuhl-Workshop MBEES: Modellbasierte Entwicklung eingebetteter Systeme VIII, 2012

Towards Modelling Real Time Constraints.
Proceedings of the ICSOFT 2012 - Proceedings of the 7th International Conference on Software Paradigm Trends, Rome, Italy, 24, 2012

Patients' perceptions of web self-service applications in primary healthcare.
Proceedings of the Health Informatics: Building a Healthcare Future Through Trusted Information, 2012

Computing Resource Prediction for MapReduce Applications Using Decision Tree.
Proceedings of the Web Technologies and Applications - 14th Asia-Pacific Web Conference, 2012

Solving Generalized Optimization Problems Subject to SMT Constraints.
Proceedings of the Frontiers in Algorithmics and Algorithmic Aspects in Information and Management, 2012

INSC: An Iterative Negotiation Approach for Service Compositions.
Proceedings of the 2012 IEEE Ninth International Conference on Services Computing, 2012

2011
A goodness-of-fit test for multivariate multiparameter copulas based on multiplier central limit theorems.
Statistics and Computing, 2011

An Interference Matrix Based Approach to Bounding Worst-Case Inter-Thread Cache Interferences and WCET for Multi-Core Processors.
JCSE, 2011

Computing and Reducing Transient Error Propagation in Registers.
JCSE, 2011

Bounding Worst-Case Performance for Multi-Core Processors with Shared L2 Instruction Caches.
JCSE, 2011

A passive location system for single frequency networks using digital terrestrial TV signals.
European Transactions on Telecommunications, 2011

Fitting semiparametric regressions for panel count survival data with an R package spef.
Computer Methods and Programs in Biomedicine, 2011

Privacy-Preserved Access Control for Cloud Computing.
Proceedings of the IEEE 10th International Conference on Trust, 2011

Modeling Mobile Learning System Using ANFIS.
Proceedings of the ICALT 2011, 2011

RCM-Fuzzy Model and Its Applications to Maintenance with Cost/Serviceability Optimization.
Proceedings of the Applied Informatics and Communication - International Conference, 2011

Improving the Performance of Personalized Recommendation with Ontological User Interest Model.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011

Analyzing Fault-Impact Region of Composite Service for Supporting Fault Handling Process.
Proceedings of the IEEE International Conference on Services Computing, 2011

Web Service Selection Based on Similarity Evaluation.
Proceedings of the IEEE International Conference on Services Computing, 2011

2010
TSS: Efficient Term Set Search in Large Peer-to-Peer Textual Collections.
IEEE Trans. Computers, 2010

An offer generation approach to SLA negotiation support in service oriented computing.
Service Oriented Computing and Applications, 2010

Nonparametric rank-based tests of bivariate extreme-value dependence.
J. Multivariate Analysis, 2010

Design and implementation of hybrid multicore simulators.
IJES, 2010

An Agent-Based Personalized Active Service Model.
Proceedings of the Fifth IEEE International Symposium on Service-Oriented System Engineering, 2010

Automatic Bug Triage using Semi-Supervised Text Classification.
Proceedings of the 22nd International Conference on Software Engineering & Knowledge Engineering (SEKE'2010), Redwood City, San Francisco Bay, CA, USA, July 1, 2010

A Generic Construction of Dynamic Single Sign-on with Strong Security.
Proceedings of the Security and Privacy in Communication Networks, 2010

Time-Predictable L2 Cache Design for High-Performance Real-Time Systems.
Proceedings of the 16th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications, 2010

Dynamic Trust Model for Federated Identity Management.
Proceedings of the Fourth International Conference on Network and System Security, 2010

Enhanced learner model for adaptive mobile learning.
Proceedings of the iiWAS'2010, 2010

Using landsat data to detect long-term morphodynamic behavior of estuaries: A case study in the Xiaoqing River estuary, China.
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2010

The application of BP and RBF model in the forecasting of the runoff and the sediment transport volume in Linjin section.
Proceedings of the Sixth International Conference on Natural Computation, 2010

A Network-aware Virtual Machine Placement and Migration Approach in Cloud Computing.
Proceedings of the GCC 2010, 2010

A framework for privacy policy management in service aggregation.
Proceedings of the 2010 14th International Conference on Computer Supported Cooperative Work in Design, 2010

Combinatorial Testing with Shielding Parameters.
Proceedings of the 17th Asia Pacific Software Engineering Conference, 2010

Constructing an Authentication Token to Access External Services in Service Aggregation.
Proceedings of the 2010 IEEE International Conference on Services Computing, 2010

2009
Optimizing Instruction Prefetching to Improve Worst-Case Performance for Real-Time Applications.
JCSE, 2009

Lifetime service level agreement management with autonomous agents for services provision.
Inf. Sci., 2009

An expert system using rough sets theory for aided conceptual design of ship's engine room automation.
Expert Syst. Appl., 2009

Forwarding index of cube-connected cycles.
Discrete Applied Mathematics, 2009

The moderate deviation principle for self-normalized sums of sums of i.i.d. random variables.
Appl. Math. Lett., 2009

Verification of Composite Services with Temporal Consistency Checking and Temporal Satisfaction Estimation.
Proceedings of the Web Information Systems Engineering, 2009

Optimization Way of Engineering Equipment Maintenance Based on Process Algebra.
Proceedings of the 2009 IITA International Conference on Services Science, 2009

The Fuzzy Synthesize Assess in Reliability and Maintainability of Military Engineer Machinery.
Proceedings of the 2009 IITA International Conference on Services Science, 2009

Towards dynamic formation of temporal constraints for the service level agreements negotiation.
Proceedings of the IEEE International Conference on Service-Oriented Computing and Applications, 2009

Accurately Estimating Worst-Case Execution Time for Multi-core Processors with Shared Direct-Mapped Instruction Caches.
Proceedings of the 15th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications, 2009

A Machine Learning Based Framework for Adaptive Mobile Learning.
Proceedings of the Advances in Web Based Learning, 2009

ServiceTrust: Supporting Reputation-Oriented Service Selection.
Proceedings of the Service-Oriented Computing, 7th International Joint Conference, 2009

Levenberg-Marquardt Algorithm Applied to Forecast the Ice Conditions in Ningmeng Reach of the Yellow River.
Proceedings of the Fifth International Conference on Natural Computation, 2009

An E-learning System Architecture Based on Web Services and Intelligent Agents.
Proceedings of the 9th International Conference on Hybrid Intelligent Systems (HIS 2009), 2009

The Fuzzy-AI Modeling for Optimization of Long-Term Metro Vehicle Repair.
Proceedings of the Sixth International Conference on Fuzzy Systems and Knowledge Discovery, 2009

Closed-loop identification for model predictive control: Direct method.
Proceedings of the 48th IEEE Conference on Decision and Control, 2009

Research and Design of Extension Case Base Based on CBR.
Proceedings of the Business Intelligence: Artificial Intelligence in Business, 2009

Dynamic Service Selection for Service Composition with Time Constraints.
Proceedings of the 20th Australian Software Engineering Conference (ASWEC 2009), 2009

2008
Kernel Density Estimation of traffic accidents in a network space.
Computers, Environment and Urban Systems, 2008

Analyzing the worst-case execution time for instruction caches with prefetching.
ACM Trans. Embedded Comput. Syst., 2008

Exploiting virtual registers to reduce pressure on real registers.
TACO, 2008

A time-predictable VLIW processor and its compiler support.
Real-Time Systems, 2008

A backtracking search tool for constructing combinatorial test suites.
Journal of Systems and Software, 2008

An efficient method to generate feasible paths for basis path testing.
Inf. Process. Lett., 2008

Cross-estimator design for coordinated systems: Constraints, covariance, and communications resource assignment.
Automatica, 2008

Test Data Generation for C Programs with String-Handling Functions.
Proceedings of the Second IEEE/IFIP International Symposium on Theoretical Aspects of Software Engineering, 2008

Path-based verification for composition of semantic web services.
Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), 2008

WCET Analysis for Multi-Core Processors with Shared L2 Instruction Caches.
Proceedings of the 14th IEEE Real-Time and Embedded Technology and Applications Symposium, 2008

Robust Watermark Algorithm Based on the Wavelet Moment Modulation and Neural Network Detection.
Proceedings of the Advances in Neural Networks, 2008

Towards QoS-Based Web Services Discovery.
Proceedings of the Service-Oriented Computing - ICSOC 2008 Workshops, 2008

Adaptation of Web Service Composition Based on Workflow Patterns.
Proceedings of the Service-Oriented Computing, 2008

A fully integrated zero-IF mobile TV tuner RFIC for S-band CMMB application.
Proceedings of the IEEE 2008 Custom Integrated Circuits Conference, 2008

A multifunction transceiver RFIC for 802.11a/b/g WLAN and DVB-H applications.
Proceedings of the IEEE 2008 Custom Integrated Circuits Conference, 2008

3D Measurement of Human Faces for Biometric Application by Digital Fringe Projection with Digital Light Projection (DLP).
Proceedings of the BIOSIG 2008, 2008

A Practical Geographic Ontology for Spatial Web Services.
Proceedings of the 2008 IEEE International Conference on Services Computing (SCC 2008), 2008

Chord4S: A P2P-based Decentralised Service Discovery Approach.
Proceedings of the 2008 IEEE International Conference on Services Computing (SCC 2008), 2008

2007
Evaluating instruction cache vulnerability to transient errors.
SIGARCH Computer Architecture News, 2007

Hybrid multi-core architecture for boosting single-threaded performance.
SIGARCH Computer Architecture News, 2007

Parallelizing MCMC for Bayesian spatiotemporal geostatistical models.
Statistics and Computing, 2007

Autonomous service level agreement negotiation for service composition provision.
Future Generation Comp. Syst., 2007

A New Upper Bound On Forwarding Index of Graphs.
Ars Comb., 2007

A p2p based service flow system with advanced ontology-based service profiles.
Advanced Engineering Informatics, 2007

Secure Routing Protocol based Trust for Ad Hoc Networks.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

WCET analysis of instruction caches with prefetching.
Proceedings of the 2007 ACM SIGPLAN/SIGBED Conference on Languages, 2007

An agent-based decentralised process management framework for web service composition.
Proceedings of the 2nf International Conference on Scalable Information Systems, 2007

Virtual Registers: Reducing Register Pressure Without Enlarging the Register File.
Proceedings of the High Performance Embedded Architectures and Compilers, 2007

Towards Collaborative Service Level Agreement Negotiation.
Proceedings of the Grid Service Engineering and Management: The 4th International Conference on Grid Service Engineering and Management, 2007

An Agent-based Framework for Service Level Agreement Management.
Proceedings of the 11th International Conference on Computer Supported Cooperative Work in Design, 2007

2006
SwinDeW-a p2p-based decentralized workflow management system.
IEEE Trans. Systems, Man, and Cybernetics, Part A, 2006

BPEL4WS Unit Testing: Test Case Generation Using a Concurrent Path Analysis Approach.
Proceedings of the 17th International Symposium on Software Reliability Engineering (ISSRE 2006), 2006

A direct-conversion mixer with DC-offset cancellation for IEEE 802.11a WLAN receiver.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2006), 2006

WFMS-based Data Integration for e-Learning.
Proceedings of the 10th International Conference on CSCW in Design, 2006

Towards Autonomous Service Level Agreement Negotiation for Adaptive Service Composition.
Proceedings of the 10th International Conference on CSCW in Design, 2006

An Agent Negotiation Approach for Establishment of Service Level Agreement.
Proceedings of the Computer Supported Cooperative Work in Design III, 2006

Backtracking Algorithms and Search Heuristics to Generate Test Suites for Combinatorial Testing.
Proceedings of the 30th Annual International Computer Software and Applications Conference, 2006

Preface.
Proceedings of the Business Process Management Workshops, 2006

SwinDeW-S: Extending P2P Workflow Systems for Adaptive Composite Web Services.
Proceedings of the 17th Australian Software Engineering Conference (ASWEC 2006), 2006

A Coordinated Architecture for the Agent-based Service Level Agreement Negotiation ofWeb Service Composition.
Proceedings of the 17th Australian Software Engineering Conference (ASWEC 2006), 2006

Finding Relations Among Linear Constraints.
Proceedings of the Artificial Intelligence and Symbolic Computation, 2006

2005
Incorporating state estimation into model predictive control and its application to network traffic control.
Automatica, 2005

A Service Workflow Management Framework Based on Peer-to-Peer and Agent Technologies.
Proceedings of the Fifth International Conference on Quality Software (QSIC 2005), 2005

Compiler-guided register reliability improvement against soft errors.
Proceedings of the EMSOFT 2005, 2005

Adapting P2P based decentralised workflow system SwinDeW-S with Web service profile support.
Proceedings of the Ninth International Conference on Computer Supported Cooperative Work in Design, 2005

2004
Towards Incompletely Specified Process Support in SwinDeW - A Peer-to-Peer Based Workflow System.
Proceedings of the Computer Supported Cooperative Work in Design I, 2004

Effective Visualisation of Workflow Enactment.
Proceedings of the Advanced Web Technologies and Applications, 2004

2003
Enacting Business Processes in a Decentralised Environment with p2p-Based Workflow Support.
Proceedings of the Advances in Web-Age Information Management, 2003

A Data Storage Mechanism for Peer-to-Peer Based Decentralised Workflow Systems.
Proceedings of the Fifteenth International Conference on Software Engineering & Knowledge Engineering (SEKE'2003), 2003

Decentralised Coordination for Software Process Enactment.
Proceedings of the Software Process Technology, 9th International Workshop, 2003


  Loading...