The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Yijun Yu: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Yijun Yu, Jianguo Lu, Jing-Hao Xue, Yi Zhang, Weiwei Sun
    Localizing XML Documents through XSLT. [Citation Graph (0, 0)][DBLP]
    Applied Informatics, 2003, pp:1059-1064 [Conf]
  2. Julio Cesar Sampaio do Prado Leite, Yijun Yu, Lin Liu, Eric S. K. Yu, John Mylopoulos
    Quality-Based Software Reuse. [Citation Graph (0, 0)][DBLP]
    CAiSE, 2005, pp:535-550 [Conf]
  3. Yijun Yu, Homayoun Dayani-Fard, John Mylopoulos
    Removing false code dependencies to speedup software build processes. [Citation Graph (0, 0)][DBLP]
    CASCON, 2003, pp:343-352 [Conf]
  4. Alexei Lapouchnian, Yijun Yu, Sotirios Liaskos, John Mylopoulos
    Requirements-driven design of autonomic application software. [Citation Graph (0, 0)][DBLP]
    CASCON, 2006, pp:80-94 [Conf]
  5. Homayoun Dayani-Fard, Yijun Yu, John Mylopoulos, Periklis Andritsos
    Improving the Build Architecture of Legacy C/C++ Software Systems. [Citation Graph (0, 0)][DBLP]
    FASE, 2005, pp:96-110 [Conf]
  6. Yijun Yu, Huaizhong Lin, Yimin Yu, Chun Chen
    Personalized Web Recommendation Based on Path Clustering. [Citation Graph (0, 0)][DBLP]
    FQAS, 2006, pp:368-377 [Conf]
  7. Yijun Yu, Huaizhong Lin, Yimin Yu, Chun Chen
    Mining Interest Navigation Patterns Based on Hybrid Markov Model. [Citation Graph (0, 0)][DBLP]
    FQAS, 2006, pp:470-478 [Conf]
  8. Qi Wang, Yijun Yu, Erik H. D'Hollander
    Visualizing the Iteration Space in PEFPT. [Citation Graph (0, 0)][DBLP]
    HPCN Europe, 1997, pp:908-915 [Conf]
  9. Yimin Yu, Duanqing Xu, Chun Chen, Yijun Yu, Lei Zhao
    A Surface Errors Locator System for Ancient Culture Preservation. [Citation Graph (0, 0)][DBLP]
    ICADL, 2006, pp:360-369 [Conf]
  10. Yijun Yu, Erik H. D'Hollander
    Partitioning Loops with Variable Dependence Distances. [Citation Graph (0, 0)][DBLP]
    ICPP, 2000, pp:209-218 [Conf]
  11. Yijun Yu, Erik H. D'Hollander
    Non-Uniform Dependences Partitioned by Recurrence Chains. [Citation Graph (0, 0)][DBLP]
    ICPP, 2004, pp:100-107 [Conf]
  12. Yijun Yu, Homayoun Dayani-Fard, John Mylopoulos, Periklis Andritsos
    Reducing Build Time through Precompilations for Evolving Large Software. [Citation Graph (0, 0)][DBLP]
    ICSM, 2005, pp:59-68 [Conf]
  13. Yijun Yu, Kristof Beyls, Erik H. D'Hollander
    Visualizing the Impact of the Cache on Program Execution. [Citation Graph (0, 0)][DBLP]
    IV, 2001, pp:336-341 [Conf]
  14. Yijun Yu, Kristof Beyls, Erik H. D'Hollander
    Performance Visualizations using XML Representations. [Citation Graph (0, 0)][DBLP]
    IV, 2004, pp:795-800 [Conf]
  15. Weiwei Sun, Weibin Shi, Bole Shi, Wenyun Ji, Yijun Yu
    A self-adaptive scheduling algorithm of on-demand broadcasts. [Citation Graph (0, 0)][DBLP]
    MSWiM, 2001, pp:139-146 [Conf]
  16. Kristof Beyls, Erik H. D'Hollander, Yijun Yu
    Visualization Enables the Programmer to Reduce Cache Misses. [Citation Graph (0, 0)][DBLP]
    IASTED PDCS, 2002, pp:774-781 [Conf]
  17. Kristof Beyls, Erik H. D'Hollander, Yijun Yu
    JPT: A Java Parallelization Tool. [Citation Graph (0, 0)][DBLP]
    PVM/MPI, 1999, pp:173-180 [Conf]
  18. Sotirios Liaskos, Alexei Lapouchnian, Yiqiao Wang, Yijun Yu, Steve M. Easterbrook
    Configuring Common Personal Software: a Requirements-Driven Approach. [Citation Graph (0, 0)][DBLP]
    RE, 2005, pp:9-18 [Conf]
  19. Yijun Yu, Julio Cesar Sampaio do Prado Leite, John Mylopoulos
    From Goals to Aspects: Discovering Aspects from Requirements Goal Models. [Citation Graph (0, 0)][DBLP]
    RE, 2004, pp:38-47 [Conf]
  20. Yijun Yu, Yiqiao Wang, John Mylopoulos, Sotirios Liaskos, Alexei Lapouchnian, Julio Cesar Sampaio do Prado Leite
    Reverse Engineering Goal Models from Legacy Code. [Citation Graph (0, 0)][DBLP]
    RE, 2005, pp:363-372 [Conf]
  21. Sotirios Liaskos, Alexei Lapouchnian, Yijun Yu, Eric Yu, John Mylopoulos
    On Goal-based Variability Acquisition and Analysis. [Citation Graph (0, 0)][DBLP]
    RE, 2006, pp:76-85 [Conf]
  22. Qing Zhang, Huiqiong Chen, Yijun Yu, Zhipeng Xie, Baile Shi
    Dynamically Self-Organized Service Composition in Wireless Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    TES, 2004, pp:95-106 [Conf]
  23. Yijun Yu, John Mylopoulos, Yiqiao Wang, Sotirios Liaskos, Alexei Lapouchnian, Ying Zou, Martin Littou, Julio Cesar Sampaio do Prado Leite
    RETR: Reverse Engineering to Requirements. [Citation Graph (0, 0)][DBLP]
    WCRE, 2005, pp:234- [Conf]
  24. Jianguo Lu, Yijun Yu, John Mylopoulos
    A Lightweight Approach to Semantic Web Service Synthesis. [Citation Graph (0, 0)][DBLP]
    WIRI, 2005, pp:240-247 [Conf]
  25. Yijun Yu, Jianguo Lu, John Mylopoulos, Weiwei Sun, Jing-Hao Xue, Erik H. D'Hollander
    Making XML document markup international. [Citation Graph (0, 0)][DBLP]
    Softw., Pract. Exper., 2005, v:35, n:1, pp:1-14 [Journal]
  26. Yijun Yu, Erik H. D'Hollander
    Loop Parallelization using the 3D Iteration Space Visualizer. [Citation Graph (0, 0)][DBLP]
    J. Vis. Lang. Comput., 2001, v:12, n:2, pp:163-181 [Journal]
  27. Weiwei Sun, Weibin Shi, Bole Shi, Yijun Yu
    A Cost-Efficient Scheduling Algorithm of On-Demand Broadcasts. [Citation Graph (0, 0)][DBLP]
    Wireless Networks, 2003, v:9, n:3, pp:239-247 [Journal]
  28. Alexei Lapouchnian, Yijun Yu, John Mylopoulos
    Requirements-Driven Design and Configuration Management of Business Processes. [Citation Graph (0, 0)][DBLP]
    BPM, 2007, pp:246-261 [Conf]
  29. Yijun Yu, Jianguo Lu, Juan Fernández-Ramil, Phil Yuan
    Comparing Web Services with other Software Components. [Citation Graph (0, 0)][DBLP]
    ICWS, 2007, pp:388-397 [Conf]
  30. Jianguo Lu, Yijun Yu
    Web Service Search: Who, When, What, and How. [Citation Graph (0, 0)][DBLP]
    WISE Workshops, 2007, pp:284-295 [Conf]
  31. Jianguo Lu, Yijun Yu, Debashis Roy, Deepa Saha
    Web Service Composition: A Reality Check. [Citation Graph (0, 0)][DBLP]
    WISE, 2007, pp:523-532 [Conf]

  32. Goal-Directed Modeling of Self-adaptive Software Architecture. [Citation Graph (, )][DBLP]


  33. Enforcing a security pattern in stakeholder goal models. [Citation Graph (, )][DBLP]


  34. Towards a Problem Oriented Engineering Theory of Pattern-Oriented Analysis and Design. [Citation Graph (, )][DBLP]


  35. Automated Analysis of Permission-Based Security Using UMLsec. [Citation Graph (, )][DBLP]


  36. Using formal concept analysis to construct and visualise hierarchies of socio-technical relations. [Citation Graph (, )][DBLP]


  37. Design principles in architectural evolution: A case study. [Citation Graph (, )][DBLP]


  38. Traceability for the maintenance of secure software. [Citation Graph (, )][DBLP]


  39. From Goals to High-Variability Software Design. [Citation Graph (, )][DBLP]


  40. An automated approach to monitoring and diagnosing requirements. [Citation Graph (, )][DBLP]


  41. Tools for model-based security engineering: models vs. code. [Citation Graph (, )][DBLP]


  42. Tools for Traceability in Secure Software Development. [Citation Graph (, )][DBLP]


  43. Tool support for code generation from a UMLsec property. [Citation Graph (, )][DBLP]


  44. Analyzing the evolution of eclipse plugins. [Citation Graph (, )][DBLP]


  45. Supporting Requirements Model Evolution throughout the System Life-Cycle. [Citation Graph (, )][DBLP]


  46. Specifying Monitoring and Switching Problems in Context. [Citation Graph (, )][DBLP]


  47. Tracing and Validating Goal Aspects. [Citation Graph (, )][DBLP]


  48. Are Your Lights Off? Using Problem Frames to Diagnose System Failures. [Citation Graph (, )][DBLP]


  49. AVT Vector: A Quantitative Security Requirements Evaluation Approach Based on Assets, Vulnerabilities and Trustworthiness of Environment. [Citation Graph (, )][DBLP]


  50. Configuring features with stakeholder goals. [Citation Graph (, )][DBLP]


  51. Graph-Centric Tools for Understanding the Evolution and Relationships of Software Structures. [Citation Graph (, )][DBLP]


  52. Relating Identifier Naming Flaws and Code Quality: An Empirical Study. [Citation Graph (, )][DBLP]


  53. Early Identification of Problem Interactions: A Tool-Supported Approach. [Citation Graph (, )][DBLP]


  54. Exploring the Dimensions of Variability: a Requirements Engineering Perspective. [Citation Graph (, )][DBLP]


  55. Tools for Traceable Security Verification. [Citation Graph (, )][DBLP]


  56. Model-Based Argument Analysis for Evolving Security Requirements. [Citation Graph (, )][DBLP]


  57. Monitoring and diagnosing software requirements. [Citation Graph (, )][DBLP]


Search in 0.005secs, Finished in 0.008secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002