Qiusong Yang

According to our database1, Qiusong Yang authored at least 22 papers between 2005 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Execute on Clear (EoC): Enhancing Security for Unsafe Speculative Instructions by Precise Identification and Safe Execution.
Proceedings of the 41st IEEE International Conference on Computer Design, 2023

2022
Merging Similar Patterns for Hardware Prefetching.
Proceedings of the 55th IEEE/ACM International Symposium on Microarchitecture, 2022

Secure Access Policy (SAP): Invisibly Executing Speculative Unsafe Accesses in an Isolated Environment.
Proceedings of the IEEE 40th International Conference on Computer Design, 2022

2021
Matryoshka: A Coalesced Delta Sequence Prefetcher.
Proceedings of the ICPP 2021: 50th International Conference on Parallel Processing, Lemont, IL, USA, August 9, 2021

2018
BehaviorKI: Behavior Pattern Based Runtime Integrity Checking for Operating System Kernel.
Proceedings of the 2018 IEEE International Conference on Software Quality, 2018

2017
A secure and rapid response architecture for virtual machine migration from an untrusted hypervisor to a trusted one.
Frontiers Comput. Sci., 2017

2016
Designing and Modeling of Covert Channels in Operating Systems.
IEEE Trans. Computers, 2016

2015
DynaDiffuse: A Dynamic Diffusion Model for Continuous Time Constrained Influence Maximization.
Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence, 2015

2014
A vertex centric parallel algorithm for linear temporal logic model checking in Pregel.
J. Parallel Distributed Comput., 2014

2013
Creating Process-Agents incrementally by mining process asset library.
Inf. Sci., 2013

2012
Assumption Generation for Asynchronous Systems by Abstraction Refinement.
Proceedings of the Formal Aspects of Component Software, 9th International Symposium, 2012

2011
DRiVeR: Diagnosing Runtime Property Violations Based on Dependency Rules.
Proceedings of the Fifth International Conference on Secure Software Integration and Reliability Improvement, 2011

Automatic mining of change set size information from repository for precise productivity estimation.
Proceedings of the International Conference on Software and Systems Process, 2011

Attacking the Dimensionality Problem of Parameterized Systems via Bounded Reachability Graphs.
Proceedings of the Fundamentals of Software Engineering - 4th IPM International Conference, 2011

Value-Risk Trade-off Analysis for Iteration Planning in Extreme Programming.
Proceedings of the 18th Asia Pacific Software Engineering Conference, 2011

2010
A cut-off approach for bounded verification of parameterized systems.
Proceedings of the 32nd ACM/IEEE International Conference on Software Engineering, 2010

2009
Stochastic Process Algebra Based Software Process Simulation Modeling.
Proceedings of the Trustworthy Software Development Processes, 2009

Value-Based Multiple Software Projects Scheduling with Genetic Algorithm.
Proceedings of the Trustworthy Software Development Processes, 2009

2008
Automated Process Quality Assurance for Distributed Software Development.
Proceedings of the Software Engineering Approaches for Offshore and Outsourced Development, 2008

2007
An Algebraic Approach for Managing Inconsistencies in Software Processes, .
Proceedings of the Software Process Dynamics and Agility, 2007

2006
On Mobility of Software Processes.
Proceedings of the Software Process Change, 2006

2005
Evaluation of the Capability of Personal Software Process Based on Data Envelopment Analysis.
Proceedings of the Unifying the Software Process Spectrum, 2005


  Loading...