Zhiqiu Huang

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Bibliography

2024
FuEPRe: a fusing embedding method with attention for post recommendation.
Serv. Oriented Comput. Appl., March, 2024

2023
An Accurate Identifier Renaming Prediction and Suggestion Approach.
ACM Trans. Softw. Eng. Methodol., November, 2023

Supporting maintenance and testing for AI functions of mobile apps based on user reviews: An empirical study on plant identification apps.
J. Softw. Evol. Process., November, 2023

Multicriteria decision making taxonomy of code recommendation system challenges: a fuzzy-AHP analysis.
Inf. Technol. Manag., June, 2023

Maneuver Conditioned Vehicle Trajectory Prediction Using Self-Attention.
Int. J. Comput. Intell. Appl., June, 2023

What Is the Intended Usage Context of This Model? An Exploratory Study of Pre-Trained Models on Various Model Repositories.
ACM Trans. Softw. Eng. Methodol., May, 2023

BEQAIN: An Effective and Efficient Identifier Normalization Approach With BERT and the Question Answering System.
IEEE Trans. Software Eng., April, 2023

A Comprehensive Investigation of the Impact of Class Overlap on Software Defect Prediction.
IEEE Trans. Software Eng., April, 2023

Ensure: Towards Reliable Control of Cyber-Physical Systems Under Uncertainty.
IEEE Trans. Reliab., March, 2023

CRAM: Code Recommendation With Programming Context Based on Self-Attention Mechanism.
IEEE Trans. Reliab., March, 2023

The prediction of programming performance using student profiles.
Educ. Inf. Technol., January, 2023

Model-Based Reinforcement Learning and Neural-Network-Based Policy Compression for Spacecraft Rendezvous on Resource-Constrained Embedded Systems.
IEEE Trans. Ind. Informatics, 2023

Shrinking the Semantic Gap: Spatial Pooling of Local Moment Invariants for Copy-Move Forgery Detection.
IEEE Trans. Inf. Forensics Secur., 2023

Boosting source code suggestion with self-supervised Transformer Gated Highway.
J. Syst. Softw., 2023

DLRegion: Coverage-guided fuzz testing of deep neural networks with region-based neuron selection strategies.
Inf. Softw. Technol., 2023

How to get better embeddings with code pre-trained models? An empirical study.
CoRR, 2023

Towards an Accurate and Secure Detector against Adversarial Perturbations.
CoRR, 2023

A Practical Runtime Security Policy Transformation Framework for Software Defined Networks.
CoRR, 2023

An accident prediction architecture based on spatio-clock stochastic and hybrid model for autonomous driving safety.
Concurr. Comput. Pract. Exp., 2023

Simplexity testbed: A model-based digital twin testbed.
Comput. Ind., 2023

DABAC: Smart Contract-Based Spatio-Temporal Domain Access Control for the Internet of Things.
IEEE Access, 2023

Test Input Selection for Deep Neural Network Enhancement Based on Multiple-Objective Optimization.
Proceedings of the IEEE International Conference on Software Analysis, 2023

Run-Time Assured Reinforcement Learning for Safe Spacecraft Rendezvous with Obstacle Avoidance.
Proceedings of the Dependable Software Engineering. Theories, Tools, and Applications, 2023

DeepRank: Test Case Prioritization for Deep Neural Networks.
Proceedings of the 35th International Conference on Software Engineering and Knowledge Engineering, 2023

BTM: Black-Box Testing for DNN Based on Meta-Learning.
Proceedings of the 23rd IEEE International Conference on Software Quality, 2023

BDGSE: A Symbolic Execution Technique for High MC/DC.
Proceedings of the 23rd IEEE International Conference on Software Quality, 2023

Multi-Objective White-Box Test Input Selection for Deep Neural Network Model Enhancement.
Proceedings of the 34th IEEE International Symposium on Software Reliability Engineering, 2023

A Fine-Grained Evaluation of Mutation Operators for Deep Learning Systems: A Selective Mutation Approach.
Proceedings of the 14th Asia-Pacific Symposium on Internetware, 2023

AKD: Using Adversarial Knowledge Distillation to Achieve Black-box Attacks.
Proceedings of the International Joint Conference on Neural Networks, 2023

Optimized Tokenization Process for Open-Vocabulary Code Completion: An Empirical Study.
Proceedings of the 27th International Conference on Evaluation and Assessment in Software Engineering, 2023

2022
Boosting API Recommendation With Implicit Feedback.
IEEE Trans. Software Eng., 2022

Ontology-Based Privacy Data Chain Disclosure Discovery Method for Big Data.
IEEE Trans. Serv. Comput., 2022

A Privacy Risk Assessment Scheme for Fog Nodes in Access Control System.
IEEE Trans. Reliab., 2022

Do Developers Really Know How to Use Git Commands? A Large-scale Study Using Stack Overflow.
ACM Trans. Softw. Eng. Methodol., 2022

SafeOSL: Ensuring memory safety of C via ownership-based intermediate language.
Softw. Pract. Exp., 2022

ASTENS-BWA: Searching partial syntactic similar regions between source code fragments via AST-based encoded sequence alignment.
Sci. Comput. Program., 2022

Label enhancement with label-specific feature learning.
Int. J. Mach. Learn. Cybern., 2022

Fast code recommendation via approximate sub-tree matching.
Frontiers Inf. Technol. Electron. Eng., 2022

Toward an accurate method renaming approach via structural and lexical analyses.
Frontiers Inf. Technol. Electron. Eng., 2022

Random or heuristic? An empirical study on path search strategies for test generation in KLEE.
J. Syst. Softw., 2022

Meaningful Update and Repair of Markov Decision Processes for Self-Adaptive Systems.
J. Comput. Sci. Technol., 2022

SDN-Based Privacy and Functional Authentication Scheme for Fog Nodes of Smart Healthcare.
IEEE Internet Things J., 2022

Sequence-Aware API Recommendation Based on Collaborative Filtering.
Int. J. Softw. Eng. Knowl. Eng., 2022

Statistical Model Checking for Stochastic and Hybrid Autonomous Driving Based on Spatio-Clock Constraints.
Int. J. Softw. Eng. Knowl. Eng., 2022

Exploring the Impact of Balanced and Imbalanced Learning in Source Code Suggestion.
Int. J. Softw. Eng. Knowl. Eng., 2022

Privacy regulation aware service selection for multi-provision cloud service composition.
Future Gener. Comput. Syst., 2022

A user requirements-oriented privacy policy self-adaption scheme in cloud computing.
Frontiers Comput. Sci., 2022

Shrinking the Semantic Gap: Spatial Pooling of Local Moment Invariants for Copy-Move Forgery Detection.
CoRR, 2022

SysML-based compositional verification and safety analysis for safety-critical cyber-physical systems.
Connect. Sci., 2022

Improving Code Completion by Sequence Features and Structural Features.
Proceedings of the 4th World Symposium on Software Engineering, 2022

Multi-Modal Code Summarization with Retrieved Summary.
Proceedings of the 22nd IEEE International Working Conference on Source Code Analysis and Manipulation, 2022

IEMT: Inequality-Based Metamorphic Testing for Autonomous Driving Models.
Proceedings of the 22nd IEEE International Conference on Software Quality, 2022

Improved Methods of Pointer Mixture Network for Code Completion.
Proceedings of the 22nd IEEE International Conference on Software Quality, 2022

Filling Missing Labels in Label Distribution Learning by Exploiting Label-Specific Feature Selection.
Proceedings of the International Joint Conference on Neural Networks, 2022

SIA-Net: Scalable Interaction-Aware Network for Vehicle Trajectory Prediction Based on Self-Attention.
Proceedings of the 34th IEEE International Conference on Tools with Artificial Intelligence, 2022

2021
User Review-Based Change File Localization for Mobile Applications.
IEEE Trans. Software Eng., 2021

Enriching API Documentation with Code Samples and Usage Scenarios from Crowd Knowledge.
IEEE Trans. Software Eng., 2021

TrafficGAN: Network-Scale Deep Traffic Prediction With Generative Adversarial Nets.
IEEE Trans. Intell. Transp. Syst., 2021

Towards a Statistical Model Checking Method for Safety-Critical Cyber-Physical System Verification.
Secur. Commun. Networks, 2021

A strategy-proof auction mechanism for service composition based on user preferences.
Frontiers Inf. Technol. Electron. Eng., 2021

Analyzing close relations between target artifacts for improving IR-based requirement traceability recovery.
Frontiers Inf. Technol. Electron. Eng., 2021

C2AADL_Reverse: A model-driven reverse engineering approach to development and verification of safety-critical software.
J. Syst. Archit., 2021

Discovering API Directives from API Specifications with Text Classification.
J. Comput. Sci. Technol., 2021

DeepBackground: Metamorphic testing for Deep-Learning-driven image recognition systems accompanied by Background-Relevance.
Inf. Softw. Technol., 2021

Personalized API Recommendations.
Int. J. Softw. Eng. Knowl. Eng., 2021

Supporting Requirements to Code Traceability Creation by Code Comments.
Int. J. Softw. Eng. Knowl. Eng., 2021

Improved Entity Linking for Simple Question Answering Over Knowledge Graph.
Int. J. Softw. Eng. Knowl. Eng., 2021

Improving source code suggestion with code embedding and enhanced convolutional long short-term memory.
IET Softw., 2021

Exploiting augmented intelligence in the modeling of safety-critical autonomous systems.
Formal Aspects Comput., 2021

SDN-based Runtime Security Enforcement Approach for Privacy Preservation of Dynamic Web Service Composition.
CoRR, 2021

SPASC: Strategy-proof auction mechanism with cost and QoS incentive for service composition.
Concurr. Comput. Pract. Exp., 2021

A security policy model transformation and verification approach for software defined networking.
Comput. Secur., 2021

PABC: A Patent Application System Based on Blockchain.
IEEE Access, 2021

Recovering Semantic Traceability between Requirements and Source Code Using Feature Representation Techniques.
Proceedings of the 21st IEEE International Conference on Software Quality, 2021

DeepMnist: A method of white box testing based on hierarchy.
Proceedings of the 21st IEEE International Conference on Software Quality, 2021

Hybrid Collaborative Filtering-Based API Recommendation.
Proceedings of the 21st IEEE International Conference on Software Quality, 2021

A Deep Method Renaming Prediction and Refinement Approach for Java Projects.
Proceedings of the 21st IEEE International Conference on Software Quality, 2021

Exception Handling Recommendation Based on Self-Attention Network.
Proceedings of the IEEE International Symposium on Software Reliability Engineering, 2021

Using Dynamic Analysis to Automatically Detect Anti-Adblocker on the Web.
Proceedings of the 2021 IEEE Conference on Computer Communications Workshops, 2021

A system for detecting third-party tracking through the combination of dynamic analysis and static analysis.
Proceedings of the 2021 IEEE Conference on Computer Communications Workshops, 2021

A Statistical Learning Model with Deep Learning Characteristics.
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2021

Ant Hole: Data Poisoning Attack Breaking out the Boundary of Face Cluster.
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2021

Deep Learning-Based Resolution Prediction of Software Enhancement Reports.
Proceedings of the 11th IEEE Annual Computing and Communication Workshop and Conference, 2021

An Empirical Study on the Usage and Evolution of Identifier Styles in Practice.
Proceedings of the 28th Asia-Pacific Software Engineering Conference, 2021

2020
SeqST-GAN: Seq2Seq Generative Adversarial Nets for Multi-step Urban Crowd Flow Prediction.
ACM Trans. Spatial Algorithms Syst., 2020

An Approach to Generate the Traceability Between Restricted Natural Language Requirements and AADL Models.
IEEE Trans. Reliab., 2020

SDN-Based Security Enforcement Framework for Data Sharing Systems of Smart Healthcare.
IEEE Trans. Netw. Serv. Manag., 2020

Readiness model for requirements change management in global software development.
J. Softw. Evol. Process., 2020

GPS Trajectory Completion Using End-to-End Bidirectional Convolutional Recurrent Encoder-Decoder Architecture with Attention Mechanism.
Sensors, 2020

Automatic traceability link recovery via active learning.
Frontiers Inf. Technol. Electron. Eng., 2020

基于语义相似度的API使用模式推荐 (Semantic Similarity Based API Usage Pattern Recommendation).
计算机科学, 2020

智能化信息物理系统中非确定性的分类研究 (Taxonomy of Uncertainty Factors in Intelligence-oriented Cyber-physical Systems).
计算机科学, 2020

Developer portraying: A quick approach to understanding developers on OSS platforms.
Inf. Softw. Technol., 2020

Identifying security issues for mobile applications based on user review summarization.
Inf. Softw. Technol., 2020

Effort-Aware semi-Supervised just-in-Time defect prediction.
Inf. Softw. Technol., 2020

CodeGRU: Context-aware deep learning with gated recurrent unit for source code modeling.
Inf. Softw. Technol., 2020

Deep Transfer Learning for Source Code Modeling.
Int. J. Softw. Eng. Knowl. Eng., 2020

A topology and risk-aware access control framework for cyber-physical space.
Frontiers Comput. Sci., 2020

SOM-based DDoS Defense Mechanism using SDN for the Internet of Things.
CoRR, 2020

Code line generation based on deep context-awareness of onsite programming.
Sci. China Inf. Sci., 2020

Exploring the Characteristics of Identifiers: A Large-Scale Empirical Study on 5, 000 Open Source Projects.
IEEE Access, 2020

Context-Aware Trust and Reputation Model for Fog-Based IoT.
IEEE Access, 2020

Test Data Augmentation for Image Recognition Software.
Proceedings of the 20th IEEE International Conference on Software Quality, 2020

Metamorphic Testing for Plant Identification Mobile Applications Based on Test Contexts.
Proceedings of the Mobile Computing, Applications, and Services, 2020

ASPDup: AST-Sequence-based Progressive Duplicate Code Detection Tool for Onsite Programming Code.
Proceedings of the Internetware'20: 12th Asia-Pacific Symposium on Internetware, 2020

Adaptive Code Completion with Meta-learning.
Proceedings of the Internetware'20: 12th Asia-Pacific Symposium on Internetware, 2020

Towards continues code recommendation and implementation system: An Initial Framework.
Proceedings of the EASE '20: Evaluation and Assessment in Software Engineering, 2020

Multi-task Adversarial Spatial-Temporal Networks for Crowd Flow Prediction.
Proceedings of the CIKM '20: The 29th ACM International Conference on Information and Knowledge Management, 2020

SSMDL: Semi-supervised Multi-task Deep Learning for Transportation Mode Classification and Path Prediction with GPS Trajectories.
Proceedings of the Web and Big Data - 4th International Joint Conference, 2020

Deep neural architecture for geospatial trajectory completion over occupancy gridmap.
Proceedings of the 13th IEEE International Conference on Cloud Computing, 2020

2019
Efficient Traffic Estimation With Multi-Sourced Data by Parallel Coupled Hidden Markov Model.
IEEE Trans. Intell. Transp. Syst., 2019

SMinder: Detect a Left-behind Phone using Sensor-based Context Awareness.
Mob. Networks Appl., 2019

Augmenting Java method comments generation with context information based on neural networks.
J. Syst. Softw., 2019

面向大数据的隐私发布暴露检测方法 (Big Data Oriented Privacy Disclosure Detection Method for Information Release).
计算机科学, 2019

Spectrum-Based Fault Localization Framework to Support Fault Understanding.
IEICE Trans. Inf. Syst., 2019

DeepVS: An Efficient and Generic Approach for Source Code Modeling Usage.
CoRR, 2019

Behavior-aware Service Access Control Mechanism using Security Policy Monitoring for SOA Systems.
CoRR, 2019

A topology-aware access control model for collaborative cyber-physical spaces: Specification and verification.
Comput. Secur., 2019

SELoc: Collect Your Location Data Using Only a Barometer Sensor.
IEEE Access, 2019

A Trust-Aware Task Offloading Framework in Mobile Edge Computing.
IEEE Access, 2019

SENSORY: Leveraging Code Statement Sequence Information for Code Snippets Recommendation.
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019

2018
Detecting safety-related components in statecharts through traceability and model slicing.
Softw. Pract. Exp., 2018

Preserving privacy information flow security in composite service evolution.
Frontiers Inf. Technol. Electron. Eng., 2018

Using information flow analysis to detect implicit information leaks for web service composition.
Frontiers Inf. Technol. Electron. Eng., 2018

Spectrum-Based Fault Localization Using Fault Triggering Model to Refine Fault Ranking List.
IEICE Trans. Inf. Syst., 2018

Privacy-aware cloud service selection approach based on P-Spec policy models and privacy sensitivities.
Future Gener. Comput. Syst., 2018

Partial Order Reduction for the full Class of State/Event Linear Temporal Logic.
Comput. J., 2018

Privacy preserving cloud data sharing system with flexible control.
Comput. Electr. Eng., 2018

BTrack: Using Barometer for Energy Efficient Location Tracking on Mountain Roads.
IEEE Access, 2018

Spectrum-Based Fault Localization via Enlarging Non-Fault Region to Improve Fault Absolute Ranking.
IEEE Access, 2018

Hierarchical Behavior Annex: Towards an AADL Functional Specification Extension.
Proceedings of the 16th ACM/IEEE International Conference on Formal Methods and Models for System Design, 2018

Runtime verification of memory safety via source transformation.
Proceedings of the 40th International Conference on Software Engineering: Companion Proceeedings, 2018

TRFIoT: Trust and Reputation Model for Fog-based IoT.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

Efficient Verification of Service-Based Applications for Flexible Modeling.
Proceedings of the 2018 IEEE International Conference on Services Computing, 2018

2017
Computing Urban Traffic Congestions by Incorporating Sparse GPS Probe Data and Social Media Data.
ACM Trans. Inf. Syst., 2017

Quantitative risk analysis of safety-critical embedded systems.
Softw. Qual. J., 2017

Modeling and verification of Web services composition based on model transformation.
Softw. Pract. Exp., 2017

υ-Support vector machine based on discriminant sparse neighborhood preserving embedding.
Pattern Anal. Appl., 2017

Partial order reduction for checking LTL formulae with the next-time operator.
J. Log. Comput., 2017

支持抽象解释的静态分析方法的形式化体系研究 (Research on Static Analysis Formalism Supporting Abstract Interpretation).
计算机科学, 2017

基于本体概念相似度的软件构件检索方法 (Software Component Retrieval Method Based on Ontology Concept Similarity).
计算机科学, 2017

Lightweight fault localization combined with fault context to improve fault absolute rank.
Sci. China Inf. Sci., 2017

A Better Translation From LTL to Transition-Based Generalized Büchi Automata.
IEEE Access, 2017

Evaluating Data Filter on Cross-Project Defect Prediction: Comparison and Improvements.
IEEE Access, 2017

Privacy Disclosure Checking Method Applied on Collaboration Interactions Among SaaS Services.
IEEE Access, 2017

Idology and Its Applications in Public Security and Network Security.
Proceedings of the Intelligence and Security Informatics - 12th Pacific Asia Workshop, 2017

Distributed System Model Using SysML and Event-B.
Proceedings of the Machine Learning and Intelligent Communications, 2017

Intrusion Detection with Tree-Based Data Mining Classification Techniques by Using KDD.
Proceedings of the Machine Learning and Intelligent Communications, 2017

Analyzing APIs documentation and code to detect directive defects.
Proceedings of the 39th International Conference on Software Engineering, 2017

2016
Three-way decisions based software defect prediction.
Knowl. Based Syst., 2016

基于RBAC的隐私访问控制研究 (Research on Privacy Access Control Based on RBAC).
计算机科学, 2016

面向DO-333的襟缝翼控制单元安全性分析 (Safety Analysis of Slat and Flap Control Unit for DO-333).
计算机科学, 2016

Secure and controllable k-NN query over encrypted cloud data with key confidentiality.
J. Parallel Distributed Comput., 2016

Multi-Resource Modeling of Real-Time Software Based on Resource Timed Process Algebra.
Int. J. Softw. Eng. Knowl. Eng., 2016

Neighborhood based decision-theoretic rough set models.
Int. J. Approx. Reason., 2016

Idology and Its Applications in Public Security and Network Security.
CoRR, 2016

A Key-Policy Attribute-Based Proxy Re-Encryption Without Random Oracles.
Comput. J., 2016

Lightweight Fault Localization Combining with Fault-Context.
Proceedings of the International Conference on Software Analysis, Testing and Evolution, 2016

Weighted Control Flow Subgraph to Support Debugging Activities.
Proceedings of the 2016 IEEE International Conference on Software Quality, 2016

Estimating Urban Traffic Congestions with Multi-sourced Data.
Proceedings of the IEEE 17th International Conference on Mobile Data Management, 2016

Partial Order Reduction for State/Event Systems.
Proceedings of the Formal Methods and Software Engineering, 2016

2015
On the Security of A Privacy-Preserving Product Calculation Scheme.
IEEE Trans. Dependable Secur. Comput., 2015

Model checking aircraft controller software: a case study.
Softw. Pract. Exp., 2015

A MDE-Based Approach to the Safety Verification of Extended SysML Activity Diagram.
J. Softw., 2015

故障树领域本体及SWRL规则的构建方法研究 (Construction Method for Fault Tree Domain Ontology Supporting SWRL Rules).
计算机科学, 2015

一种基于故障扩展SysML活动图的安全性验证框架研究 (Research on Framework of Safety Verification Based on Fault-extended SysML Activity Diagram).
计算机科学, 2015

一种结合线性时序逻辑和故障树的软件安全验证方法 (Method Combining Linear Temporal Logic and Fault Tree for Software Safety Verification).
计算机科学, 2015

基于属性的支持策略本体推理的访问控制方法研究 (Attribute-based Access Control Method Supporting Policies Ontology Reasoning).
计算机科学, 2015

标准模型下增强的无需安全信道的带关键词搜索的公钥加密 (Secure Channel Free Searchable Encryption in Standard Model).
计算机科学, 2015

Requirement-Oriented Privacy Protection Analysis Architecture in Cloud Computing.
J. Commun., 2015

Verifying specifications with associated attributes in graph transformation systems.
Frontiers Comput. Sci., 2015

SGAM: strategy-proof group buying-based auction mechanism for virtual machine allocation in clouds.
Concurr. Comput. Pract. Exp., 2015

Formal Semantics of Runtime Monitoring, Verification, Enforcement and Control.
Proceedings of the 2015 International Symposium on Theoretical Aspects of Software Engineering, 2015

2014
Using Game Theory to Analyze Strategic Choices of Service Providers and Service Requesters.
J. Softw., 2014

Verification of Behavior-aware Privacy Requirements in Web Services Composition.
J. Softw., 2014

The Application of SWRL Based Ontology Inference for Privacy Protection.
J. Softw., 2014

Service Outsourcing Character Oriented Privacy Conflict Detection Method in Cloud Computing.
J. Appl. Math., 2014

A Correctness Assurance Approach to Automatic Synthesis of Composite Web Services.
IEICE Trans. Inf. Syst., 2014

OMReasoner: combination of multi-matchers for ontology matching: results for OAEI 2014.
Proceedings of the 9th International Workshop on Ontology Matching collocated with the 13th International Semantic Web Conference (ISWC 2014), 2014

Strategy-Proof Auction Mechanism with Group Price for Virtual Machine Allocation in Clouds.
Proceedings of the Second International Conference on Advanced Cloud and Big Data, 2014

2013
Supporting negotiation mechanism privacy authority method in cloud computing.
Knowl. Based Syst., 2013

Analyzing Temporal Constraints for Web Services Composition.
J. Softw., 2013

Two-Phase Classification Based on Three-Way Decisions.
Proceedings of the Rough Sets and Knowledge Technology - 8th International Conference, 2013

Minimal cut sequence generation for state/event fault trees.
Proceedings of the 2013 Middleware Doctoral Symposium, 2013

2012
Self-adaptive semantic web service matching method.
Knowl. Based Syst., 2012

Evolutionary Approaches for Multi-Objective Next Release Problem.
Comput. Informatics, 2012

OMReasoner: using multi-matchers and reasoner for ontology matching: results for OAEI 2012.
Proceedings of the 7th International Workshop on Ontology Matching, 2012

Feature modeling and Verification based on Description Logics.
Proceedings of the 24th International Conference on Software Engineering & Knowledge Engineering (SEKE'2012), 2012

A Graph Transformation Based Approach for Modeling Component-Level Migration in Mobile Environments.
Proceedings of the 36th Annual IEEE Computer Software and Applications Conference Workshops, 2012

2011
Unified Modelling Functional and Non-Functional Aspects of Web Services Composition Using PTCCS 1.
Int. J. Web Serv. Res., 2011

Analysis of the minimal privacy disclosure for web services collaborations with role mechanisms.
Expert Syst. Appl., 2011

Minimal privacy authorization in web services collaboration.
Comput. Stand. Interfaces, 2011

OMReasoner: using reasoner for ontology matching: results for OAEI 2011.
Proceedings of the 6th International Workshop on Ontology Matching, 2011

2010
An Improved Algorithm for Session Identification on Web Log.
Proceedings of the Web Information Systems and Mining - International Conference, 2010

Making Architectural Decisions Based on Requirements: Analysis and Combination of Risk-Based and Quality Attribute-Based Methods.
Proceedings of the Symposia and Workshops on Ubiquitous, 2010

Modeling Service Composition Using Priced Probabilistic Process Algebra.
Proceedings of the Fifth IEEE International Symposium on Service-Oriented System Engineering, 2010

An MDE Based Approach for Generating Software Architecture Models from Formal Specifications.
Proceedings of the 10th International Conference on Quality Software, 2010

Multi-objective Fuzzy Clustering Method for Image Segmentation Based on Variable-Length Intelligent Optimization Algorithm.
Proceedings of the Advances in Computation and Intelligence - 5th International Symposium, 2010

Towards a Formal Verification Approach for Business Process Coordination.
Proceedings of the IEEE International Conference on Web Services, 2010

Checking Structural Integrity for Metadata Repository Systems by Means of Description Logics.
Proceedings of the Database Systems for Advanced Applications, 2010

2009
A Semantic Model for Matchmaking of Web Services Based on Description Logics.
Fundam. Informaticae, 2009

Modeling and Verification of Automatic Multi-business Transactions.
Proceedings of the 21st International Conference on Software Engineering & Knowledge Engineering (SEKE'2009), 2009

A DL-based method for access control policy conflict detecting.
Proceedings of the First Asia-Pacific Symposium on Internetware, 2009

Modeling and Analysis of Flexible Transaction for Web Services.
Proceedings of the IEEE International Conference on Web Services, 2009

Modeling Cost-Aware Web Services Composition Using PTCCS.
Proceedings of the IEEE International Conference on Web Services, 2009

Role-based consistency verification for privacy-aware Web services.
Proceedings of the 2009 International Symposium on Collaborative Technologies and Systems, 2009

Reasoning about Web Services with Dynamic Description Logics.
Proceedings of the CSIE 2009, 2009 WRI World Congress on Computer Science and Information Engineering, March 31, 2009

Ensuring Coordination of Multi-business Interactions.
Proceedings of the 2009 IEEE International Conference on Services Computing (SCC 2009), 2009

2008
Conceptual modeling rules extracting for data streams.
Knowl. Based Syst., 2008

Description Logic Based Consistency Checking upon Data Mining Metadata.
Proceedings of the Rough Sets and Knowledge Technology, Third International Conference, 2008

A Formal Method Support for Resource Modeling of Web Services Composition.
Proceedings of the 2008 International Symposium on Computer Science and Computational Technology, 2008

Polymorphism Sequence Diagrams Test Data Automatic Generation Based on OCL.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

Support Web Services Composition with Optimal Cost Using PPA.
Proceedings of the 2008 IEEE International Conference on Web Services (ICWS 2008), 2008

Counterexample Generation for Probabilistic Timed Automata Model Checking.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

2007
Using Description Logics Reasoner for Ontology Matching.
Proceedings of the Workshop on Intelligent Information Technology Application, 2007

Fuzzy Implication Methods in Fuzzy Logic.
Proceedings of the Fourth International Conference on Fuzzy Systems and Knowledge Discovery, 2007

2006
Research on the Rules of Mapping from Relational Model to OWL.
Proceedings of the OWLED*06 Workshop on OWL: Experiences and Directions, 2006

A Formal Framework for Reasoning on Metadata Based on CWM.
Proceedings of the Conceptual Modeling, 2006


  Loading...