Zude Li

According to our database1, Zude Li authored at least 30 papers between 2006 and 2022.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Motivation Under Gamification: An Empirical Study of Developers' Motivations and Contributions in Stack Overflow.
IEEE Trans. Software Eng., 2022

2020
Improving students' programming quality with the continuous inspection process: a social coding perspective.
Frontiers Comput. Sci., 2020

Haste Makes Waste: An Empirical Study of Fast Answers in Stack Overflow.
Proceedings of the IEEE International Conference on Software Maintenance and Evolution, 2020

2019
Studying in the 'Bazaar': An Exploratory Study of Crowdsourced Learning in GitHub.
IEEE Access, 2019

2018
Internal quality assurance for external contributions in GitHub: An empirical investigation.
J. Softw. Evol. Process., 2018

Continuous inspection in the classroom: improving students' programming quality with social coding methods.
Proceedings of the 40th International Conference on Software Engineering: Companion Proceeedings, 2018

2016
Does the Role Matter? An Investigation of the Code Quality of Casual Contributors in GitHub.
Proceedings of the 23rd Asia-Pacific Software Engineering Conference, 2016

2014
Lexical-semantic SLVM for XML Document Classification.
J. Softw., 2014

Service retrieval based on hybrid SLVM of WSDL.
Proceedings of the 6th Asia-Pacific Symposium on Internetware, 2014

2013
Research and design of the firewall penetration technology serving to distributed cloud resource.
Proceedings of the 5th Asia-Pacific Symposium on Internetware, 2013

2011
Characteristics of multiple-component defects and architectural hotspots: a large system case study.
Empir. Softw. Eng., 2011

Diagnosing new faults using mutants and prior faults.
Proceedings of the 33rd International Conference on Software Engineering, 2011

A Case Study of Measuring Degeneration of Software Architectures from a Defect Perspective.
Proceedings of the 18th Asia Pacific Software Engineering Conference, 2011

2010
A towards an extended relational algebra for software architecture.
ACM SIGSOFT Softw. Eng. Notes, 2010

F007: finding rediscovered faults from the field using function-level failed traces of software in the field.
Proceedings of the 2010 conference of the Centre for Advanced Studies on Collaborative Research, 2010

2009
Does Requirements Clustering Lead to Modular Design?.
Proceedings of the Requirements Engineering: Foundation for Software Quality, 2009

Trusted resource dissemination in Internetware systems.
Proceedings of the First Asia-Pacific Symposium on Internetware, 2009

Analysis of pervasive multiple-component defects in a large software system.
Proceedings of the 25th IEEE International Conference on Software Maintenance (ICSM 2009), 2009

Trust and Privacy in Dissemination Control.
Proceedings of the 2009 IEEE International Conference on e-Business Engineering, 2009

2008
On Access-Unrestricted Data Anonymity and Privacy Inference Disclosure Control.
Int. J. Inf. Secur. Priv., 2008

Privacy Inference Attacking and Prevention on Multiple Relative K-Anonymized Microdata Sets.
Proceedings of the Progress in WWW Research and Development, 2008

2007
An Approach to Requirements Encapsulation with Clustering.
Proceedings of the Anais do WER07, 2007

Capture Inference Attacks for K-Anonymity with Privacy Inference Logic.
Proceedings of the Advances in Databases: Concepts, 2007

2006
Towards a dynamic multi-policy dissemination control model: (DMDCON).
SIGMOD Rec., 2006

Role-Based Peer-to-Peer Model: Capture Global Pseudonymity for Privacy Protection.
Proceedings of the Advances in Web-Age Information Management, 2006

FGAC-QD: Fine-Grained Access Control Model Based on Query Decomposition Strategy.
Proceedings of the Trust and Privacy in Digital Business, Third International Conference, 2006

Towards an Anti-inference (K, l)-Anonymity Model with Value Association Rules.
Proceedings of the Database and Expert Systems Applications, 17th International Conference, 2006

Privacy Preservation and Protection by Extending Generalized Partial Indices.
Proceedings of the Flexible and Efficient Information Handling, 2006

Towards a More Reasonable Generalization Cost Metric for K-Anonymization.
Proceedings of the Flexible and Efficient Information Handling, 2006

Resource Management Continuity With Constraint Inheritance Relation.
Proceedings of the The First International Conference on Availability, 2006


  Loading...