The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Jing Dong: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Jing Dong
    Model checking the composition of hypermedia design components. [Citation Graph (0, 0)][DBLP]
    CASCON, 2000, pp:3- [Conf]
  2. Paulo S. C. Alencar, Donald D. Cowan, Jing Dong, Carlos José Pereira de Lucena
    A Pattern-Based Approach to Structural Design Composition. [Citation Graph (0, 0)][DBLP]
    COMPSAC, 1999, pp:160-165 [Conf]
  3. Jun Kong, Kang Zhang, Jing Dong, Guang-Lei Song
    A Graph Grammar Approach to Software Architecture Verification and Transformation. [Citation Graph (0, 0)][DBLP]
    COMPSAC, 2003, pp:492-0 [Conf]
  4. Jing Dong, Paulo S. C. Alencar, Donald D. Cowan
    Ensuring Structure and Behavior Correctness in Design Composition. [Citation Graph (0, 0)][DBLP]
    ECBS, 2000, pp:279-0 [Conf]
  5. Jing Dong, Sheng Yang, Kang Zhang
    A Model Transformation Approach for Design Pattern Evolutions. [Citation Graph (0, 0)][DBLP]
    ECBS, 2006, pp:80-92 [Conf]
  6. Paulo S. C. Alencar, Donald D. Cowan, Jing Dong, Carlos José Pereira de Lucena
    A Transformational Approach to Structural Design Assessment and Change. [Citation Graph (0, 0)][DBLP]
    ECOOP Workshops, 1998, pp:60-61 [Conf]
  7. Jing Dong, Paulo S. C. Alencar, Donald D. Cowan
    Correct Composition of Design Components. [Citation Graph (0, 0)][DBLP]
    ECOOP Workshops, 1999, pp:188- [Conf]
  8. Jing Dong, Sheng Yang
    Towards Trusted Composition in Software Design. [Citation Graph (0, 0)][DBLP]
    HASE, 2004, pp:306-307 [Conf]
  9. Jun Kong, Kang Zhang, Jing Dong
    Grammar-Specified Model-Driven Architectures. [Citation Graph (0, 0)][DBLP]
    ICECCS, 2005, pp:24-25 [Conf]
  10. Jing Dong
    A logical framework for design composition. [Citation Graph (0, 0)][DBLP]
    ICSE, 2000, pp:698-700 [Conf]
  11. Jing Dong, Sheng Yang, Yongtao Sun, W. Eric Wong
    QVT based model transformation for design pattern evolutions. [Citation Graph (0, 0)][DBLP]
    IMSA, 2006, pp:16-22 [Conf]
  12. Jing Dong, Paulo S. C. Alencar, Donald D. Cowan
    A Formal Framework for Design Component Contracts. [Citation Graph (0, 0)][DBLP]
    IRI, 2003, pp:53-60 [Conf]
  13. Jing Dong, Shanguo Chen, Jun-Jang Jeng
    Event-Based Blackboard Architecture for Multi-Agent Systems. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:379-384 [Conf]
  14. Jing Dong, Sheng Yang, Kang Zhang
    VisDP: A Web Service for Visualizing Design Patterns on Demand. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:385-391 [Conf]
  15. Jing Dong, Paulo S. C. Alencar, Donald D. Cowan
    A Behavioral Analysis Approach to Pattern-Based Composition. [Citation Graph (0, 0)][DBLP]
    OOIS, 2001, pp:540-0 [Conf]
  16. Jing Dong
    Representing the Applications and Compositions of Design Patterns in UML. [Citation Graph (0, 0)][DBLP]
    SAC, 2003, pp:1092-1098 [Conf]
  17. Jing Dong, Sheng Yang
    Extending UML to Visualize Design Patterns In Class Diagrams. [Citation Graph (0, 0)][DBLP]
    SEKE, 2003, pp:124-131 [Conf]
  18. Jing Dong, Yongtao Sun, Sheng Yang
    OWL-S Ontology Framework Extension for Dynamic Web Service Composition. [Citation Graph (0, 0)][DBLP]
    SEKE, 2006, pp:544-549 [Conf]
  19. Kendra Cooper, Lirong Dai, Yi Deng, Jing Dong
    Developing a Formal Design Analysis Framework. [Citation Graph (0, 0)][DBLP]
    Software Engineering Research and Practice, 2003, pp:68-73 [Conf]
  20. Jing Dong, Rucha Khisti, Kendra Cooper, Yi Deng
    A Component Framework for Resource Management Systems. [Citation Graph (0, 0)][DBLP]
    Software Engineering Research and Practice, 2004, pp:681-687 [Conf]
  21. Jing Dong, Sheng Yang
    Visualizing design patterns with a UML profile. [Citation Graph (0, 0)][DBLP]
    HCC, 2003, pp:123-125 [Conf]
  22. Jing Dong, Paulo S. C. Alencar, Donald D. Cowan
    On Analysis of Design Component Contracts: A Case Study. [Citation Graph (0, 0)][DBLP]
    STEP, 2003, pp:103-113 [Conf]
  23. Jing Dong, Sheng Yang, Dushyant S. Lad, Yongtao Sun
    Service Oriented Evolutions and Analyses of Design Patterns. [Citation Graph (0, 0)][DBLP]
    SOSE, 2006, pp:11-18 [Conf]
  24. Jun Kong, Kang Zhang, Jing Dong, Guang-Lei Song
    A Generative Style-driven Framework for Software Architecture Design. [Citation Graph (0, 0)][DBLP]
    SEW, 2005, pp:173-182 [Conf]
  25. Jing Dong
    Adding pattern related information in structural and behavioral diagrams. [Citation Graph (0, 0)][DBLP]
    Information & Software Technology, 2004, v:46, n:5, pp:293-300 [Journal]
  26. Jing Dong
    UML Extensions for Design Pattern Compositions. [Citation Graph (0, 0)][DBLP]
    Journal of Object Technology, 2002, v:1, n:5, pp:151-163 [Journal]
  27. Daniel M. Berry, Khuzaima Daudjee, Jing Dong, Igor Fainchtein, Maria Augusta Nelson, Torsten Nelson, Lihua Ou
    User's manual as a requirements specification: case studies. [Citation Graph (0, 0)][DBLP]
    Requir. Eng., 2004, v:9, n:1, pp:67-82 [Journal]
  28. Jing Dong, Paulo S. C. Alencar, Donald D. Cowan
    A behavioral analysis and verification approach to pattern-based design composition. [Citation Graph (0, 0)][DBLP]
    Software and System Modeling, 2004, v:3, n:4, pp:262-272 [Journal]
  29. Jing Dong, Paulo S. C. Alencar, Donald D. Cowan
    Automating the analysis of design component contracts. [Citation Graph (0, 0)][DBLP]
    Softw., Pract. Exper., 2006, v:36, n:1, pp:27-71 [Journal]
  30. Jing Dong, Sheng Yang, Kang Zhang
    Visualizing Design Patterns in Their Applications and Compositions. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 2007, v:33, n:7, pp:433-453 [Journal]
  31. W. Eric Wong, Lei Zhao, Yu Qi, Kai-Yuan Cai, Jing Dong
    Effective Fault Localization using BP Neural Networks. [Citation Graph (0, 0)][DBLP]
    SEKE, 2007, pp:374-379 [Conf]
  32. Jing Dong, Yajing Zhao
    Classification of Design Pattern Traits. [Citation Graph (0, 0)][DBLP]
    SEKE, 2007, pp:473-0 [Conf]
  33. Jing Dong, Tu Peng, Zongyan Qiu
    Commutability of Design Pattern Instantiation and Integration. [Citation Graph (0, 0)][DBLP]
    TASE, 2007, pp:283-292 [Conf]
  34. Jing Dong, Paulo S. C. Alencar, Donald D. Cowan, Sheng Yang
    Composing pattern-based components and verifying correctness. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2007, v:80, n:11, pp:1755-1769 [Journal]
  35. Chunying Zhao, Jun Kong, Jing Dong, Kang Zhang
    Pattern-based design evolution using graph transformation. [Citation Graph (0, 0)][DBLP]
    J. Vis. Lang. Comput., 2007, v:18, n:4, pp:378-398 [Journal]

  36. DP-Miner: Design Pattern Discovery Using Matrix. [Citation Graph (, )][DBLP]


  37. Building fuzzy hybrid Horn logic rules on top of ontologies. [Citation Graph (, )][DBLP]


  38. Blind image steganalysis based on run-length histogram analysis. [Citation Graph (, )][DBLP]


  39. Effective image splicing detection based on image chroma. [Citation Graph (, )][DBLP]


  40. Research of Animal Disease Information System Based on GIS Technology. [Citation Graph (, )][DBLP]


  41. Monitoring Method of Cow Anthrax Based on Gis and Spatial Statistical Analysis. [Citation Graph (, )][DBLP]


  42. Compound record clustering algorithm for design pattern detection by decision tree learning. [Citation Graph (, )][DBLP]


  43. Fusion Based Blind Image Steganalysis by Boosting Feature Selection. [Citation Graph (, )][DBLP]


  44. A Survey of Passive Image Tampering Detection. [Citation Graph (, )][DBLP]


  45. Multi-class Blind Steganalysis Based on Image Run-Length Analysis. [Citation Graph (, )][DBLP]


  46. Run-Length and Edge Statistics Based Approach for Image Splicing Detection. [Citation Graph (, )][DBLP]


  47. Model Checking Security Pattern Compositions. [Citation Graph (, )][DBLP]


  48. Design pattern detection by template matching. [Citation Graph (, )][DBLP]


  49. Verifying Behavioral Correctness of Design Pattern Implementation. [Citation Graph (, )][DBLP]


  50. Hierarchical Composition of OWL-S Web Services. [Citation Graph (, )][DBLP]


  51. Architecture and Design Pattern Discovery Techniques - A Review. [Citation Graph (, )][DBLP]


  52. Secure group communication in wireless mesh networks. [Citation Graph (, )][DBLP]


  53. A Generic Model of Enterprise Service-Oriented Architecture. [Citation Graph (, )][DBLP]


  54. Perspectives of Granular Computing in Software Engineering. [Citation Graph (, )][DBLP]


  55. Adaptation in a Pervasive Computing Environment. [Citation Graph (, )][DBLP]


  56. A Survey of Formal Methods for Software Architecture. [Citation Graph (, )][DBLP]


  57. Mitigating attacks against virtual coordinate based routing in wireless sensor networks. [Citation Graph (, )][DBLP]


  58. Practical defenses against pollution attacks in intra-flow network coding for wireless mesh networks. [Citation Graph (, )][DBLP]


  59. An Ontology-Based Integrated Assessment Framework for High-Assurance Systems. [Citation Graph (, )][DBLP]


  60. On the Pitfalls of High-Throughput Multicast Metrics in Adversarial Wireless Mesh Networks. [Citation Graph (, )][DBLP]


  61. Effects of watermarking on iris recognition performance. [Citation Graph (, )][DBLP]


  62. Real-Time Service-Oriented Distributed Governance. [Citation Graph (, )][DBLP]


  63. Secure group communication in wireless mesh networks. [Citation Graph (, )][DBLP]


  64. Secure network coding for wireless mesh networks: Threats, challenges, and directions. [Citation Graph (, )][DBLP]


  65. High-Assurance Service-Oriented Architectures. [Citation Graph (, )][DBLP]


Search in 0.038secs, Finished in 0.041secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002