LiGuo Huang

According to our database1, LiGuo Huang
  • authored at least 50 papers between 2003 and 2017.
  • has a "Dijkstra number"2 of three.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2017
Software cybernetics in BPM: Modeling software behavior as feedback for evolution by a novel discovery method based on augmented event logs.
Journal of Systems and Software, 2017

Swarm-Based Spreading Points.
Proceedings of the Advances in Swarm Intelligence - 8th International Conference, 2017

Improving Random Test Sets Using a Locally Spreading Approach.
Proceedings of the 2017 IEEE International Conference on Software Quality, 2017

Tracing requirements in software design.
Proceedings of the 2017 International Conference on Software and System Process, 2017

Data driven credit risk management process: a machine learning approach.
Proceedings of the 2017 International Conference on Software and System Process, 2017

2016
Guest editors' introduction.
Journal of Software: Evolution and Process, 2016

Process mining with token carried data.
Inf. Sci., 2016

A security and cost aware scheduling algorithm for heterogeneous tasks of scientific workflow in clouds.
Future Generation Comp. Syst., 2016

When to release in open source project?
Proceedings of the 38th International Conference on Software Engineering, 2016

2015
Can method data dependencies support the assessment of traceability between requirements and source code?
Journal of Software: Evolution and Process, 2015

SMPLearner: learning to predict software maintainability.
Autom. Softw. Eng., 2015

AutoODC: Automated generation of orthogonal defect classifications.
Autom. Softw. Eng., 2015

Recovering Traceability Links in Requirements Documents.
Proceedings of the 19th Conference on Computational Natural Language Learning, 2015

2014
Guest editors' introduction.
Journal of Software: Evolution and Process, 2014

Reducing view inconsistency by predicting avatars' motion in multi-server distributed virtual environments.
J. Network and Computer Applications, 2014

Distance-Aware Approach for Time-Constraint Wireless Data Querying Based on Game Theory.
J. Inf. Sci. Eng., 2014

The incremental commitment spiral model (ICSM): principles and practices for successful systems and software.
Proceedings of the International Conference on Software and Systems Process 2014, 2014

2013
A second-order smooth penalty function algorithm for constrained optimization problems.
Comp. Opt. and Appl., 2013

2012
Hybrid modeling and simulation for trustworthy software process management: a stakeholder-oriented approach.
Journal of Software: Evolution and Process, 2012

Rule-based context-aware adaptation: a goal-oriented approach.
Int. J. Pervasive Computing and Communications, 2012

Statistical Mechanisms for Detecting Malicious Behaviors in Resource Allocation from Non-cooperative P2P Environments.
Int. J. Computational Intelligence Systems, 2012

Discovering process models from event multiset.
Expert Syst. Appl., 2012

Do data dependencies in source code complement call dependencies for understanding requirements traceability?
Proceedings of the 28th IEEE International Conference on Software Maintenance, 2012

2011
An analysis of trends in productivity and cost drivers over years.
Proceedings of the 7th International Conference on Predictive Models in Software Engineering, 2011

AutoODC: Automated generation of Orthogonal Defect Classifications.
Proceedings of the 26th IEEE/ACM International Conference on Automated Software Engineering (ASE 2011), 2011

GoPoMoSA: a goal-oriented process modeling and simulation advisor.
Proceedings of the International Conference on Software and Systems Process, 2011

Impact of process simulation on software practice: an initial report.
Proceedings of the 33rd International Conference on Software Engineering, 2011

Experiences with text mining large collections of unstructured systems development artifacts at jpl.
Proceedings of the 33rd International Conference on Software Engineering, 2011

Text Mining Support for Software Requirements: Traceability Assurance.
Proceedings of the 44th Hawaii International International Conference on Systems Science (HICSS-44 2011), 2011

Empirical Research in Software Process Modeling: A Systematic Literature Review.
Proceedings of the 5th International Symposium on Empirical Software Engineering and Measurement, 2011

Relevance and alignment of Real-Client Real-Project courses via technology transfer.
Proceedings of the 24th IEEE-CS Conference on Software Engineering Education and Training, 2011

2010
Modeling the Value-Based Software Process with Object-Petri-Nets.
Int. J. Software and Informatics, 2010

Text mining in supporting software systems risk assurance.
Proceedings of the ASE 2010, 2010

On Scoping Stakeholders and Artifacts in Software Process.
Proceedings of the New Modeling Concepts for Today's Software Processes, 2010

2009
Incremental Process Modeling through Stakeholder-Based Hybrid Process Simulation.
Proceedings of the Trustworthy Software Development Processes, 2009

2008
Applying Value-Based Software Process: An ERP Example.
Int. J. Software and Informatics, 2008

Developing a SSE-CMM-based security risk assessment process for patient-centered healthcare systems.
Proceedings of the 6th international workshop on Software quality, 2008

2006
How Much Software Quality Investment Is Enough: A Value-Based Approach.
IEEE Software, 2006

Tailor the Value-Based Software Quality Achievement Process to Project Business Cases.
Proceedings of the Software Process Change, 2006

Applying the Value/Petri process to ERP software development in China.
Proceedings of the 28th International Conference on Software Engineering (ICSE 2006), 2006

2005
Using iDAVE to determine availability requirements.
ACM SIGSOFT Software Engineering Notes, 2005

Determining how much software assurance is enough?: a value-based approach.
ACM SIGSOFT Software Engineering Notes, 2005

A Value-Based Process for Achieving Software Dependability.
Proceedings of the Unifying the Software Process Spectrum, 2005

Determining how much software assurance is enough? A value-based approach.
Proceedings of the 2005 International Symposium on Empirical Software Engineering (ISESE 2005), 2005

Using iDAVE to determine availability requirements.
Proceedings of the third workshop on Software quality, 2005

2004
The ROI of Software Dependability: The iDAVE Model.
IEEE Software, 2004

Using Empirical Testbeds to Accelerate Technology Maturity and Transition: The SCRover Experience.
Proceedings of the 2004 International Symposium on Empirical Software Engineering (ISESE 2004), 2004

2003
A cost driven disk scheduling algorithm for multimedia object retrieval.
IEEE Trans. Multimedia, 2003

Value-Based Software Engineering: A Case Study.
IEEE Computer, 2003

Strategic Architectural Flexibility.
Proceedings of the 19th International Conference on Software Maintenance (ICSM 2003), 2003


  Loading...