Lin Liu

Orcid: 0000-0002-3704-2322

Affiliations:
  • Tsinghua University, School of Software, Beijing, China


According to our database1, Lin Liu authored at least 202 papers between 1998 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Counteracting sociocultural barriers in global software engineering using group activities.
J. Softw. Evol. Process., May, 2024

Re-evaluation of PhishI game and its utilisation in eliciting security requirements.
Int. J. Inf. Comput. Secur., 2024

Welcome to the Fifth International Workshop on Requirements Engineering for Well-Being, Aging, and Health.
Proceedings of the 32nd IEEE International Requirements Engineering Conference, 2024

BTTackler: A Diagnosis-based Framework for Efficient Deep Learning Hyperparameter Optimization.
Proceedings of the 30th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2024

2023
Sustaining human health: A requirements engineering perspective.
J. Syst. Softw., October, 2023

MUGAN: Thermal Infrared Image Colorization Using Mixed-Skipping UNet and Generative Adversarial Network.
IEEE Trans. Intell. Veh., April, 2023

Retrieving arXiv, SocArXiv, and SSRN metadata for initial review screening.
Inf. Softw. Technol., 2023

Welcome to REWBAH 2023: The Fourth International Workshop on Requirements Engineering for Well-Being, Aging, and Health.
Proceedings of the 31st IEEE International Requirements Engineering Conference, RE 2023, 2023

Tobacco Leaf Disease Segmentation based on TDSSNet.
Proceedings of the Twelfth International Conference on Image Processing Theory, 2023

Building Smart Systems to Satisfice User Intention in Situ: A Look Back to the Future.
Proceedings of the IEEE International Conference on Software Services Engineering, 2023

2022
MPFINet: A Multilevel Parallel Feature Injection Network for Panchromatic and Multispectral Image Fusion.
Remote. Sens., December, 2022

On the utilization of non-quality assessed literature in software engineering research.
J. Softw. Evol. Process., 2022

Requirements Engineering for Machine Learning: A Review and Reflection.
Proceedings of the 30th IEEE International Requirements Engineering Conference Workshops, 2022

What Should Abeeha do? an Activity for Phishing Awareness.
Proceedings of the 22nd IEEE International Conference on Software Quality, 2022

Revisiting Hazard Analysis Requirements.
Proceedings of the 9th International Conference on Dependable Systems and Their Applications, 2022

2021
Requirements Engineering for Well-Being, Aging, and Health: An Overview for Practitioners.
IEEE Softw., 2021

Understanding and deciphering of social engineering attack scenarios.
Secur. Priv., 2021

ReHiC: Enhancing Hi-C data resolution via residual convolutional network.
J. Bioinform. Comput. Biol., 2021

A Novel Multi-class Classification Architecture Combining Population-based Sampling and Multi-expert Classifier for Imbalanced Data.
Proceedings of the 2021 IEEE International Conference on Systems, Man, and Cybernetics, 2021

REWBAH 2021: Second International Workshop on Requirements Engineering for Well-Being, Aging, and Health : Welcome from the Organizers.
Proceedings of the 29th IEEE International Requirements Engineering Conference Workshops, 2021

Smart3E: Enabling End Users to Express Their Needs for Smart Homes.
Proceedings of the 29th IEEE International Requirements Engineering Conference, 2021

Intelligent Health Information Services Requirements Revisited from an Actor's Perspective.
Proceedings of the IEEE International Conference on Digital Health, 2021

2020
Conceptualising, extracting and analysing requirements arguments in users' forums: The CrowdRE-Arg framework.
J. Softw. Evol. Process., 2020

Requirements knowledge acquisition from online user forums.
IET Softw., 2020

What Users Think about Predictive Analytics? A Survey on NFRs.
Proceedings of the 28th IEEE International Requirements Engineering Conference, 2020

Hierarchical Feature Embedding for Attribute Recognition.
Proceedings of the 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2020

Understanding Social Engineers Strategies from the Perspective of Sun-Tzu Philosophy.
Proceedings of the 44th IEEE Annual Computers, Software, and Applications Conference, 2020

The Use of Grey Literature and Google Scholar in Software Engineering Systematic Literature Reviews.
Proceedings of the 44th IEEE Annual Computers, Software, and Applications Conference, 2020

Google Scholar vs. Dblp vs. Microsoft Academic Search: An Indexing Comparison for Software Engineering Literature.
Proceedings of the 44th IEEE Annual Computers, Software, and Applications Conference, 2020

2019
Contemplating social engineering studies and attack scenarios: A review study.
Secur. Priv., 2019

How persuasive is a phishing email? A phishing game for phishing awareness.
J. Comput. Secur., 2019

Sharing information online rationally: An observation of user privacy concerns and awareness using serious game.
J. Inf. Secur. Appl., 2019

Improving software security awareness using a serious game.
IET Softw., 2019

Improving software requirements reasoning by novices: a story-based approach.
IET Softw., 2019

Socio-Technological Factors Affecting User's Adoption of eHealth Functionalities: A Case Study of China and Ukraine eHealth Systems.
IEEE Access, 2019

Crowd Intelligence in Requirements Engineering: Current Status and Future Directions.
Proceedings of the Requirements Engineering: Foundation for Software Quality, 2019

Analysis of Requirements-Related Arguments in User Forums.
Proceedings of the 27th IEEE International Requirements Engineering Conference, 2019

Limiting the Neighborhood: De-Small-World Network for Outbreak Prevention.
Proceedings of the Computational Data and Social Networks - 8th International Conference, 2019

Design and Engineering of Adaptive Software Systems.
Proceedings of the Engineering Adaptive Software Systems, 2019

2018
Uncertain Graph Data Management.
Proceedings of the Encyclopedia of Database Systems, Second Edition, 2018

Design and preliminary evaluation of a cyber Security Requirements Education Game (SREG).
Inf. Softw. Technol., 2018

Linguistic Analysis of Crowd Requirements: An Experimental Study.
Proceedings of the 7th IEEE International Workshop on Empirical Requirements Engineering, 2018

Automated Dental Image Analysis by Deep Learning on Small Dataset.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018

2017
A statistical analysis approach to predict user's changing requirements for software service evolution.
J. Syst. Softw., 2017

Requirements cybernetics: Elicitation based on user behavioral data.
J. Syst. Softw., 2017

Recent Studies on i*: A Survey.
Proceedings of the 10th International i* Workshop co-located with the 29th International Conference on Advanced Information Systems Engineering (CAiSE 2017), 2017

Designing the Next Mobile App Recommender System for the Globe.
Proceedings of the 14th International Symposium on Pervasive Systems, 2017

Big Data Services Requirements Analysis.
Proceedings of the Requirements Engineering for Internet of Things, 2017

2016
When intelligence meets data: game story generation by compositional creativity.
Int. J. Creative Comput., 2016

Desiree: a Refinement Calculus for Requirements Problems.
CoRR, 2016

Flourishing creativity in software development via Internetware paradigm.
Sci. China Inf. Sci., 2016

Requirements Engineering for Health Data Analytics: Challenges and Possible Directions.
Proceedings of the 24th IEEE International Requirements Engineering Conference, 2016

Similarity-based Reasoning with Quality Goals.
Proceedings of the Ninth International i* Workshop co-located with 24th International Conference on Requirements Engineering (RE 2016), 2016

A Conflict Prevention Scheduling Strategy for Shared-State Scheduling in Large Scale Cluster.
Proceedings of the Cloud Computing and Security - Second International Conference, 2016

An Online Identity and Smart Contract Management System.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

Engineering Requirements with Desiree: An Empirical Evaluation.
Proceedings of the Advanced Information Systems Engineering, 2016

2015
From Stakeholder Requirements to Formal Specifications Through Refinement.
Proceedings of the Requirements Engineering: Foundation for Software Quality, 2015

A Creative Lifecycle Model for Internetware Based Software Development.
Proceedings of the 7th Asia-Pacific Symposium on Internetware, 2015

Making Climate Models Reusable: From Static Model Analysis to On-demand Model Integration.
Proceedings of the 39th IEEE Annual Computer Software and Applications Conference, 2015

Towards an Applied Oral Health Ontology: A Round Trip between Clinical Data and Experiential Medical Knowledge.
Proceedings of the 39th Annual Computer Software and Applications Conference, 2015

2014
OCSO: Off-the-cloud service optimization for green efficient service resource utilization.
J. Cloud Comput., 2014

Requirements model driven adaption and evolution of Internetware.
Sci. China Inf. Sci., 2014

Non-functional requirements as qualities, with a spice of ontology.
Proceedings of the IEEE 22nd International Requirements Engineering Conference, 2014

Introducing Code Assets of a New White-Box Security Modeling Language.
Proceedings of the IEEE 38th Annual Computer Software and Applications Conference, 2014

Eliciting Relations from Natural Language Requirements Documents Based on Linguistic and Statistical Analysis.
Proceedings of the IEEE 38th Annual Computer Software and Applications Conference, 2014

Decision Trees: Theory and Algorithms.
Proceedings of the Data Classification: Algorithms and Applications, 2014

2013
Report on the fourth Asia-Pacific symposium on internetware (Internetware 2012).
ACM SIGSOFT Softw. Eng. Notes, 2013

Requirements Engineering for Security, Privacy and Services in Cloud Environments.
Requir. Eng., 2013

Editorial: Internetware in Motion.
Int. J. Softw. Informatics, 2013

Limiting the Neighborhood: De-Small-World Network for Outbreak Prevention
CoRR, 2013

Non-Functional Requirements Revisited.
Proceedings of the 6th International <i>i*</i> Workshop 2013, 2013

Modelling internetware community with social roles.
Proceedings of the 5th Asia-Pacific Symposium on Internetware, 2013

TARGO: Transition and Reallocation Based Green Optimization for Cloud VMs.
Proceedings of the 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, 2013

Understanding Requirements for Online Services Based on Users' Behavioural Data Analysis.
Proceedings of the IEEE 37th Annual Computer Software and Applications Conference, 2013

2012
Evolution of Energy Awareness Using an Open Carbon Footprint Calculation Platform.
Proceedings of the Handbook of Energy-Aware and Green Computing - Two Volume Set., 2012

An approximation algorithm for dominating nodes selection in multi-channel multi-radio wireless sensor networks.
Int. J. Sens. Networks, 2012

Joint Interference Suppression for Multi-User TDD MIMO Downlink with Other-Cell Interference.
IEEE Commun. Lett., 2012

Requirements Management - Novel Perspectives and Challenges (Dagstuhl Seminar 12442).
Dagstuhl Reports, 2012

Displacement residual based DDM matching algorithm.
Sci. China Inf. Sci., 2012

CBrowse: a SAM/BAM-based contig browser for transcriptome assembly visualization and analysis.
Bioinform., 2012

Minimum Total Communication Power Connected Dominating Set in Wireless Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2012

Understanding evolution in Internetware using a double pyramids model.
Proceedings of the Fourth Asia-Pacific Symposium on Internetware, 2012

Evolution for the sustainability of internetware.
Proceedings of the Fourth Asia-Pacific Symposium on Internetware, 2012

Reliable Clustering on Uncertain Graphs.
Proceedings of the 12th IEEE International Conference on Data Mining, 2012

User's Requirements Driven Services Adaptation and Evolution.
Proceedings of the 36th Annual IEEE Computer Software and Applications Conference Workshops, 2012

Performance Analysis of Reusable Components with Hybrid Modelling of Strategies and Processes: A Real World Case Study.
Proceedings of the 36th Annual IEEE Computer Software and Applications Conference Workshops, 2012

Software Service Evolution: A Requirements Perspective.
Proceedings of the 36th Annual IEEE Computer Software and Applications Conference Workshops, 2012

Service-Driven Migrating of Enterprise Information Systems: A Case Study.
Proceedings of the 19th Asia-Pacific Software Engineering Conference, 2012

2011
Design and implementation of an open framework for ubiquitous carbon footprint calculator applications.
Sustain. Comput. Informatics Syst., 2011

Distance-Constraint Reachability Computation in Uncertain Graphs.
Proc. VLDB Endow., 2011

Designing IT systems according to environmental settings: A strategic analysis framework.
J. Strateg. Inf. Syst., 2011

Multi-target QSAR Modelling in the Analysis and Design of HIV-HCV Co-Inhibitors : An In-silico Study.
BMC Bioinform., 2011

IRENE: Context aware mood sharing for social network.
Proceedings of the 2011 IEEE International Conference on Service-Oriented Computing and Applications, 2011

Analysing security requirements patterns based on problems decomposition and composition.
Proceedings of the First International Workshop On Requirements Patterns, 2011

Evolution vs. innovation in requirements for services.
Proceedings of the Requirements Engineering for Systems, 2011

Agent-Oriented Requirements Analysis from Scenarios.
Proceedings of the Agent and Multi-Agent Systems: Technologies and Applications, 2011

Environment-Driven Threats Elicitation for Web Applications.
Proceedings of the Agent and Multi-Agent Systems: Technologies and Applications, 2011

Discovering highly reliable subgraphs in uncertain graphs.
Proceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2011

I*-Prefer: A Tool for Preference Model-Driven Decision Making.
Proceedings of the 5<sup>th</sup> International <i>i</i>* Workshop 2011, 2011

Adaptive Service Composition Based on Runtime Requirements Monitoring.
Proceedings of the IEEE International Conference on Web Services, 2011

Security Requirements Engineering in the Wild: A Survey of Common Practices.
Proceedings of the 35th Annual IEEE International Computer Software and Applications Conference, 2011

Understanding the Diversity of Services Based on Users' Identities.
Proceedings of the Advanced Information Systems Engineering, 2011

2010
Specifying and Composing Web Services with an Environment Ontology-Based Approach.
Int. J. Web Serv. Res., 2010

Why Requirements Engineering Fails: A Survey Report from China.
Proceedings of the RE 2010, 18th IEEE International Requirements Engineering Conference, Sydney, New South Wales, Australia, September 27, 2010

Goal-oriented requirements modelling for running systems.
Proceedings of the First International Workshop on Requirements@Run.Time, 2010

Automated Generation of Attack Routes for Service Security Analysis - A Preliminary Report.
Proceedings of the 4<sup>th</sup> International <i>i</i>* Workshop, 2010

Parallelization of Thermal Recovery Simulation Based on PETSc.
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2010

Goal-driven adaptation of internetware.
Proceedings of the Second Asia-Pacific Symposium on Internetware, 2010

Analysis of Secretary Proteins in the Genome of the Plant Pathogenic Fungus <i>Botrytis Cinerea</i>.
Proceedings of the Computer and Computing Technologies in Agriculture IV, 2010

Chlorimuronethyl Resistance Selectable Marker Unsuited for the Transformation of Rice Blast Fungus <i>(Magnaporthe Grisea)</i>.
Proceedings of the Computer and Computing Technologies in Agriculture IV, 2010

Towards a personalized privacy management framework.
Proceedings of the ICSE Workshop on Software Engineering for Secure Systems, 2010

UCFC - Ubiquitous personal Carbon Footprint Calculation Platform.
Proceedings of the International Green Computing Conference 2010, 2010

Assure High Quality Code Using Refactoring and Obfuscation Techniques.
Proceedings of the Fifth International Conference on Frontier of Computer Science and Technology, 2010

Resource Organization and Management of the Platform for Supporting Teacher Education Innovation Based on IPv6.
Proceedings of the Entertainment for Education. Digital Techniques and Systems, 2010

Synthesizing Enterprise Strategic Model and Business Processes in Active-i.
Proceedings of the Workshops Proceedings of the 14th IEEE International Enterprise Distributed Object Computing Conference, 2010

Negotiating Service Requirements among Strategic Actors.
Proceedings of the Workshop Proceedings of the 34th Annual IEEE International Computer Software and Applications Conference, 2010

Optimizing Requirements Elicitation with an i* and Bayesian Network Integrated Modelling Approach.
Proceedings of the Workshop Proceedings of the 34th Annual IEEE International Computer Software and Applications Conference, 2010

Service Security Analysis Based on i*: An Approach from the Attacker Viewpoint.
Proceedings of the Workshop Proceedings of the 34th Annual IEEE International Computer Software and Applications Conference, 2010

A Formalism for Extending the NFR Framework to Support the Composition of the Goal Trees.
Proceedings of the 17th Asia Pacific Software Engineering Conference, 2010

2009
Guest Editorial: Special Section on Requirements Engineering for Services—Challenges and Practices.
IEEE Trans. Serv. Comput., 2009

WebGMAP: a web service for mapping and aligning cDNA sequences to genomes.
Nucleic Acids Res., 2009

An Information Fusion-Enabled Third Party E-Commerce Platform Based on SOA.
J. Softw., 2009

Secure-I*: Engineering Secure Software Systems through Social Analysis.
Int. J. Softw. Informatics, 2009

Minimum Connected R-Hop k-Dominating Set in Wireless Networks.
Discret. Math. Algorithms Appl., 2009

Trust based security auto-configuration for smart assisted living environments.
Proceedings of the 2nd ACM Workshop on Assurable and Usable Security Configuration, 2009

<i>i</i>*-prefer: optimizing requirements elicitation process based on actor preferences.
Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), 2009

AVT Vector: A Quantitative Security Requirements Evaluation Approach Based on Assets, Vulnerabilities and Trustworthiness of Environment.
Proceedings of the RE 2009, 17th IEEE International Requirements Engineering Conference, Atlanta, Georgia, USA, August 31, 2009

Understanding Chinese Characteristics of Requirements Engineering.
Proceedings of the RE 2009, 17th IEEE International Requirements Engineering Conference, Atlanta, Georgia, USA, August 31, 2009

Cartesian contour: a concise representation for a collection of frequent sets.
Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Paris, France, June 28, 2009

Requirements-driven Internetware services evaluation.
Proceedings of the First Asia-Pacific Symposium on Internetware, 2009

Analyzing project risks within a cultural and organizational setting.
Proceedings of the 2009 ICSE Workshop on Leadership and Management in Software Architecture, 2009

The Research and Application on Streaming Data of GIS Data Mining.
Proceedings of the First International Workshop on Database Technology and Applications, 2009

Preference Model Driven Services Selection.
Proceedings of the Advanced Information Systems Engineering, 21st International Conference, 2009

Dealing with Complexity Using Conceptual Models Based on Tropos.
Proceedings of the Conceptual Modeling: Foundations and Applications, 2009

2008
Building toward Capability Specifications of Web Services Based on an Environment Ontology.
IEEE Trans. Knowl. Data Eng., 2008

An Innovative Method to Classify Remote-Sensing Images Using Ant Colony Optimization.
IEEE Trans. Geosci. Remote. Sens., 2008

Towards a service requirements modelling ontology based on agent knowledge and intentions.
Int. J. Agent Oriented Softw. Eng., 2008

A bottom-up approach to discover transition rules of cellular automata using ant intelligence.
Int. J. Geogr. Inf. Sci., 2008

Energy Efficient Broadcast Routing in Ad Hoc Sensor Networks with Directional Antennas.
Proceedings of the Wireless Algorithms, 2008

MEGORE: Multimedia Enhanced Goal-Oriented Requirement Elicitation Experience in China.
Proceedings of the 2008 Third International Workshop on Multimedia and Enjoyable Requirements Engineering, 2008

Balancing Academic and Industrial Needs in RE Courses.
Proceedings of the Third International Workshop on Requirements Engineering Education and Training, 2008

Modelling Requirements Patterns with a Goal and PF Integrated Analysis Approach.
Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference, 2008

REFS 2008 Workshop Organization.
Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference, 2008

Message from the REFS 2008 Workshop Organizers.
Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference, 2008

Joint Topology Control and Power Conservation for Wireless Sensor Networks Using Transmit Power Adjustment.
Proceedings of the Computing and Combinatorics, 14th Annual International Conference, 2008

ASREF: An Adaptive Service Requirements Elicitation Framework Based on Goal-Oriented Modelling.
Proceedings of the Memorias de la XI Conferencia Iberoamericana de Software Engineering (CIbSE 2008), 2008

2007
WebTraceMiner: a web service for processing and mining EST sequence trace files.
Nucleic Acids Res., 2007

Polymorphism of Microsatellite Sequence within ABC Transporter Genes in Phytopathogenic Fungus, Magnaporthe Grisea.
Proceedings of the Computer And Computing Technologies In Agriculture, 2007

Polymorphism of Microsatellite Sequence within Protein Kinase ORFs in Phytopathogenic Fungus, Magnaporthe Grisea.
Proceedings of the Computer And Computing Technologies In Agriculture, 2007

SREM: A Service Requirements Elicitation Mechanism based on Ontology.
Proceedings of the 31st Annual International Computer Software and Applications Conference, 2007

Towards Controllable Requirements Engineering Processes based on Cybernetics.
Proceedings of the 31st Annual International Computer Software and Applications Conference, 2007

2006
Content Description Model and Framework for Efficient Content Distribution.
Proceedings of the Advances in Web Intelligence and Data Mining, 2006

Content Consistency Model for Pervasive Internet Access.
Proceedings of the Advances in Web Intelligence and Data Mining, 2006

Object Placement and Caching Strategies on AN.P2P.
Proceedings of the Advances in Web-Age Information Management, 2006

Extending SOA to Cover Unreliable Services on Internet.
Proceedings of the 2006 International Workshop on Service Oriented Software Engineering (IW-SOSE '06), 2006

Delegation Models in Service Oriented Systems.
Proceedings of the 2006 International Workshop on Service Oriented Software Engineering (IW-SOSE '06), 2006

Content Grid: A Novel Approach to Address Pervasive Internet Access.
Proceedings of the 2006 International Conference on Semantics, 2006

Content Delivered on Internet - How Much Can We Trust?
Proceedings of the 2006 International Conference on Semantics, 2006

Web Object Cacheability How Much Do We Know?
Proceedings of the Eighteenth International Conference on Software Engineering & Knowledge Engineering (SEKE'2006), 2006

AN.P2P - an Active Peer-to-peer System.
Proceedings of the Eighteenth International Conference on Software Engineering & Knowledge Engineering (SEKE'2006), 2006

Integrating Goals and Problem Frames in Requirements Analysis.
Proceedings of the 14th IEEE International Conference on Requirements Engineering (RE 2006), 2006

Towards A Service Requirements Ontology on Knowledge and Intention.
Proceedings of the Sixth International Conference on Quality Software (QSIC 2006), 2006

Analyzing trust in technology strategies.
Proceedings of the 2006 International Conference on Privacy, 2006

Framework for Pervasive Web Content Delivery.
Proceedings of the Advances in Multimedia Information Processing, 2006

On Constructing Environment Ontology for Semantic Web Services.
Proceedings of the Knowledge Science, 2006

An RDF-based annotation framework for providing web resources integrity.
Proceedings of the 2006 IEEE International Conference on Information Reuse and Integration, 2006

An active peer-to-peer system for heterogeneous service provisioning.
Proceedings of the 2006 IEEE International Conference on Information Reuse and Integration, 2006

Performance modeling for real-time content adaptation network.
Proceedings of the 2006 IEEE International Conference on Information Reuse and Integration, 2006

Empirical study on web content consistency.
Proceedings of the 2006 IEEE International Conference on Information Reuse and Integration, 2006

An Approach for Specifying Capability ofWeb Services based on Environment Ontology.
Proceedings of the 2006 IEEE International Conference on Web Services (ICWS 2006), 2006

Task Delegation in Active Web Intermediary Network.
Proceedings of the 2006 IEEE International Conference on Web Services (ICWS 2006), 2006

Towards automatic problem decomposition: an ontology-based approach.
Proceedings of the 2006 International Workshop on Advances and Applications of Problem Frames, 2006

Environment Ontology-Based Capability Specification for Web Service Discovery.
Proceedings of the Formal Methods and Software Engineering, 2006

Modeling Delegation through an i*-based Approach.
Proceedings of the 2006 IEEE/WIC/ACM International Conference on Intelligent Agent Technology, 2006

Data Integrity Related Markup Language and HTTP Protocol Support for Web Intermediaries.
Proceedings of the Embedded and Ubiquitous Computing, International Conference, 2006

Proxy-Based Pervasive Multimedia Content Delivery.
Proceedings of the 30th Annual International Computer Software and Applications Conference, 2006

Security Design Based on Social Modeling.
Proceedings of the 30th Annual International Computer Software and Applications Conference, 2006

Web Service Retrieval: An Approach Based on Context Ontology.
Proceedings of the 30th Annual International Computer Software and Applications Conference, 2006

Quantitative Analysis on the Cacheability Factors of Web Objects.
Proceedings of the 30th Annual International Computer Software and Applications Conference, 2006

A Risk Assessment Model for Enterprise Network Security.
Proceedings of the Autonomic and Trusted Computing, Third International Conference, 2006

Modeling Identity Management Architecture Within a Social Setting.
Proceedings of the Frontiers of WWW Research and Development, 2006

Content Grid Architecture for Pervasive Content Delivery.
Proceedings of the 2006 IEEE International Conference on Services Computing (SCC 2006), 2006

Web Content Consistency Through Explicit Ownership Definition.
Proceedings of the 2006 IEEE International Conference on Services Computing (SCC 2006), 2006

2005
Quantitative Modeling for Web Objects' Cacheability.
Proceedings of the Advances in Web-Age Information Management, 2005

CGSV: An Adaptable Stream-Integrated Grid Monitoring System.
Proceedings of the Network and Parallel Computing, IFIP International Conference, 2005

FleMA: A Flexible Measurement Architecture for ChinaGrid.
Proceedings of the Parallel and Distributed Processing and Applications, 2005

Slant Correction of Vehicle License Plate Image.
Proceedings of the Image Analysis and Processing, 2005

Quality-Based Software Reuse.
Proceedings of the Advanced Information Systems Engineering, 17th International Conference, 2005

Human Contour Extraction Using Level Set.
Proceedings of the Fifth International Conference on Computer and Information Technology (CIT 2005), 2005

Error Resilience Schemes of H.264/AVC for 3G Conversational Video Services.
Proceedings of the Fifth International Conference on Computer and Information Technology (CIT 2005), 2005

2004
Specifying and analyzing early requirements in Tropos.
Requir. Eng., 2004

Designing information systems in social context: a goal and scenario modelling approach.
Inf. Syst., 2004

A Semantic Description Scheme of Soccer Video Based on MPEG-7.
Proceedings of the Advances in Multimedia Information Processing - PCM 2004, 5th Pacific Rim Conference on Multimedia, Tokyo, Japan, November 30, 2004

Intentional Modeling to Support Identity Management.
Proceedings of the Conceptual Modeling, 2004

2003
Cooperation strategies for agent-based P2P systems.
Web Intell. Agent Syst., 2003

Security and Privacy Requirements Analysis within a Social Setting.
Proceedings of the 11th IEEE International Conference on Requirements Engineering (RE 2003), 2003

Specifying and Analyzing Early Requirements: Some Experimental Results.
Proceedings of the 11th IEEE International Conference on Requirements Engineering (RE 2003), 2003

2002
Designing Web-Based Systems in Social Context: A Goal and Scenario Based Approach.
Proceedings of the Advanced Information Systems Engineering, 14th International Conference, 2002

Modeling and Evaluating Cooperation Strategies in P2P Agent Systems.
Proceedings of the Agents and Peer-to-Peer Computing, First International Workshop, 2002

2001
Modelling Strategic Actor Relationships to Support Intellectual Property Management.
Proceedings of the Conceptual Modeling, 2001

2000
Modelling Trust for System Design Using the i<sup>*</sup> Strategic Actors Framework.
Proceedings of the Fourth International Conference on Autonomous Agents, 2000

1998
OSNET - A Language for Domain Modeling.
Proceedings of the TOOLS 1998: 27th International Conference on Technology of Object-Oriented Languages and Systems, 1998


  Loading...