The SCEAS System
Navigation Menu

Search the dblp DataBase


Jun Han: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Jun Han, Yanbo Han, Yan Jin, Jianwu Wang, Jian Yu
    Personalized Active Service Spaces for End-User Service Composition. [Citation Graph (0, 0)][DBLP]
    IEEE SCC, 2006, pp:198-205 [Conf]
  2. Jun Han
    TRAM: A Tool for Requirements and Architecture Management. [Citation Graph (0, 0)][DBLP]
    ACSC, 2001, pp:60-68 [Conf]
  3. Jun Han
    Providing Configuration Management Support in Software Engineering Environments. [Citation Graph (0, 0)][DBLP]
    APSEC, 1995, pp:282-0 [Conf]
  4. Jun Han
    A Comprehensive Interface Definition Framework for Software Components. [Citation Graph (0, 0)][DBLP]
    APSEC, 1998, pp:110-0 [Conf]
  5. Jun Han, Ksze Kae Ker
    Ensuring Compatible Interactions within Component-based Software Systems. [Citation Graph (0, 0)][DBLP]
    APSEC, 2003, pp:436-445 [Conf]
  6. Yan Jin, Jun Han
    Consistency and Interoperability Checking for Component Interaction Rules. [Citation Graph (0, 0)][DBLP]
    APSEC, 2005, pp:595-602 [Conf]
  7. Antony Tang, Jun Han, Pin Chen
    A Comparative Analysis of Architecture Frameworks. [Citation Graph (0, 0)][DBLP]
    APSEC, 2004, pp:640-647 [Conf]
  8. Yun Yang, Jun Han
    Classification of and Experimentation on Tool Interfacing in Software Development Environments. [Citation Graph (0, 0)][DBLP]
    APSEC, 1996, pp:56-65 [Conf]
  9. Min Wu, Xiaoyang Zeng, Jun Han, Yongyi Wu, Yibo Fan
    A high-performance platform-based SoC for information security. [Citation Graph (0, 0)][DBLP]
    ASP-DAC, 2006, pp:122-123 [Conf]
  10. Khaled M. Khan, Jun Han
    A Process Framework for Characterising Security Properties of Component-Based Software Systems. [Citation Graph (0, 0)][DBLP]
    Australian Software Engineering Conference, 2004, pp:358-367 [Conf]
  11. Khaled M. Khan, Jun Han
    Deriving Systems Level Security Properties of Component Based Composite Systems. [Citation Graph (0, 0)][DBLP]
    Australian Software Engineering Conference, 2005, pp:334-343 [Conf]
  12. Khaled M. Khan, Jun Han
    Assessing Security Properties of Software Components: A Software Engineer's Perspective. [Citation Graph (0, 0)][DBLP]
    ASWEC, 2006, pp:199-210 [Conf]
  13. Khaled M. Khan, Jun Han, Yuliang Zheng
    Characterizing User Data Protection of Software Components. [Citation Graph (0, 0)][DBLP]
    Australian Software Engineering Conference, 2000, pp:3-12 [Conf]
  14. Khaled M. Khan, Jun Han, Yuliang Zheng
    A Framework for an Active Interface to Characterise Compositional Security Contracts of Software Components. [Citation Graph (0, 0)][DBLP]
    Australian Software Engineering Conference, 2001, pp:117-126 [Conf]
  15. Alan W. Colman, Jun Han
    Operational Management Contracts for Adaptive Software Organisation. [Citation Graph (0, 0)][DBLP]
    Australian Software Engineering Conference, 2005, pp:170-179 [Conf]
  16. Zheng Li, Yan Jin, Jun Han
    A Runtime Monitoring and Validation Framework for Web Service Interactions. [Citation Graph (0, 0)][DBLP]
    ASWEC, 2006, pp:70-79 [Conf]
  17. Khaled M. Khan, Jun Han
    A Security Characterisation Framework for Trustworthy Component Based Software Systems. [Citation Graph (0, 0)][DBLP]
    COMPSAC, 2003, pp:164-169 [Conf]
  18. Alan W. Colman, Jun Han
    Coordination Systems in Role-Based Adaptive Software. [Citation Graph (0, 0)][DBLP]
    COORDINATION, 2005, pp:63-78 [Conf]
  19. Hardeep Singh, Jun Han
    Increasing Concurrency in Object-Oriented Databases for Software Engineering Environments. [Citation Graph (0, 13)][DBLP]
    DASFAA, 1997, pp:175-184 [Conf]
  20. Antony Tang, Jun Han
    Architecture Rationalization: A Methodology for Architecture Verifiability, Traceability and Completeness. [Citation Graph (0, 0)][DBLP]
    ECBS, 2005, pp:135-144 [Conf]
  21. Jun Han
    Object-Oriented Modeling of Software Processes and Artifacts: Promises and Challenges. [Citation Graph (0, 0)][DBLP]
    ECOOP Workshops, 1997, pp:315-318 [Conf]
  22. Jun Han
    Semantic and Usage Packaging for Software Components. [Citation Graph (0, 0)][DBLP]
    ECOOP Workshops, 1999, pp:7-8 [Conf]
  23. Jun Han, Pin Chen
    Architecture Support for System-of-Systems Evolution. [Citation Graph (0, 0)][DBLP]
    EDCIS, 2002, pp:332-346 [Conf]
  24. Jun Han, Graham McMahon, Stephen Sugden
    A Branch and Bound Algorithm for Capacitated Minimum Spanning Tree Problem (Research Note). [Citation Graph (0, 0)][DBLP]
    Euro-Par, 2002, pp:404-408 [Conf]
  25. Jun Han
    Interaction Compatibility: An Essential Ingredient for Service Composition. [Citation Graph (0, 0)][DBLP]
    GCC (1), 2003, pp:59-66 [Conf]
  26. Jun Han
    A Software Engineering Perspective for Services Security. [Citation Graph (0, 0)][DBLP]
    GCC Workshops, 2004, pp:366-373 [Conf]
  27. Alan W. Colman, Jun Han
    Organizational Abstractions for Adaptive Systems. [Citation Graph (0, 0)][DBLP]
    HICSS, 2005, pp:- [Conf]
  28. Yan Jin, Jun Han
    Specifying Interaction Constraints of Software Components for Better Understandability and Interoperability. [Citation Graph (0, 0)][DBLP]
    ICCBSS, 2005, pp:54-64 [Conf]
  29. XueLian Lin, Jinpeng Huai, Xudong Liu, Jun Han
    Active Peer to Peer. [Citation Graph (0, 0)][DBLP]
    ICN, 2007, pp:31- [Conf]
  30. Elisabetta Di Nitto, Robert J. Hall, Jun Han, Yanbo Han, Andrea Polini, Kurt Sandkuhl, Andrea Zisman
    International workshop on service oriented software engineering (IW-SOSE'06). [Citation Graph (0, 0)][DBLP]
    ICSE, 2006, pp:1036-1037 [Conf]
  31. Yan Jin, Antony Tang, Jun Han, Yan Liu
    Performance Evaluation and Prediction for Legacy Information Systems. [Citation Graph (0, 0)][DBLP]
    ICSE, 2007, pp:540-549 [Conf]
  32. Jun Han
    Designing for Increased Software Maintainability. [Citation Graph (0, 0)][DBLP]
    ICSM, 1997, pp:278-286 [Conf]
  33. Zheng Li, Jun Han, Yan Jin
    Pattern-Based Specification and Validation of Web Services Interaction Properties. [Citation Graph (0, 0)][DBLP]
    ICSOC, 2005, pp:73-86 [Conf]
  34. Xuan Thang Nguyen, Ryszard Kowalczyk, Jun Han
    Using Dynamic Asynchronous Aggregate Search for Quality Guarantees of Multiple Web Services Compositions. [Citation Graph (0, 0)][DBLP]
    ICSOC, 2006, pp:129-140 [Conf]
  35. B. Wu, Jian Ying Zhang, Mohan Baruwal Chhetri, Jian Lin, SukKeong Goh, Xuan Thang Nguyen, Ingo Müller, E. Gomes, L. Zheng, Jun Han, Ryszard Kowalczyk
    Adaptive Service Agreement and Process Management. [Citation Graph (0, 0)][DBLP]
    ICWS, 2006, pp:927-930 [Conf]
  36. Jun Han, Graham McMahon, Stephen Sugden
    A Branch and Bound Algorithm for Minimum Cost Network Flow Problem. [Citation Graph (0, 0)][DBLP]
    IDEAL, 2002, pp:167-172 [Conf]
  37. Khaled M. Khan, Jun Han, Yuliang Zheng
    Security Properties of Software Components. [Citation Graph (0, 0)][DBLP]
    ISW, 1999, pp:52-56 [Conf]
  38. Jun Han, Claudio Moraga
    The Influence of the Sigmoid Function Parameters on the Speed of Backpropagation Learning. [Citation Graph (0, 0)][DBLP]
    IWANN, 1995, pp:195-201 [Conf]
  39. Jun Han, Graham McMahon, Stephen Sugden
    A Node-oriented Branch and Bound Algorithm for the Capacitated Minimum Spanning Tree Problem. [Citation Graph (0, 0)][DBLP]
    LCN, 2003, pp:460-469 [Conf]
  40. Yan Jin, Jun Han
    Runtime Validation of Behavioural Contracts for Component Software. [Citation Graph (0, 0)][DBLP]
    QSIC, 2005, pp:177-186 [Conf]
  41. Muhammad Ali Babar, Antony Tang, Ian Gorton, Jun Han
    Industrial Perspective on the Usefulness of Design Rationale for Software Maintenance: A Survey. [Citation Graph (0, 0)][DBLP]
    QSIC, 2006, pp:201-208 [Conf]
  42. Jinpeng Huai, Xianxian Li, Wenyi Zhang, Jun Han, Yongzhen Zhuang
    A Software Protocol of Goals and Operations Based on BDI Model. [Citation Graph (0, 0)][DBLP]
    SUTC (1), 2006, pp:454-461 [Conf]
  43. Jun Han, Jim Welsh
    Object Organisation in Software Environments for Formal Methods. [Citation Graph (0, 0)][DBLP]
    TAPSOFT, 1993, pp:299-313 [Conf]
  44. Antony Tang, Muhammad Ali Babar, Ian Gorton, Jun Han
    A Survey of the Use and Documentation of Architecture Design Rationale. [Citation Graph (0, 0)][DBLP]
    WICSA, 2005, pp:89-98 [Conf]
  45. Antony Tang, Yan Jin, Jun Han, Ann E. Nicholson
    Predicting Change Impact in Architecture Design with Bayesian Belief Networks. [Citation Graph (0, 0)][DBLP]
    WICSA, 2005, pp:67-76 [Conf]
  46. Jian Yu, Tan Phan Manh, Jun Han, Yan Jin, Yanbo Han, Jianwu Wang
    Pattern Based Property Specification and Verification for Service Composition. [Citation Graph (0, 0)][DBLP]
    WISE, 2006, pp:156-168 [Conf]
  47. Zhaohao Sun, Jun Han
    Inverse alpha-Cuts and Interval [a, b) -Cuts. [Citation Graph (0, 0)][DBLP]
    ICICIC (1), 2006, pp:441-444 [Conf]
  48. Jinpeng Huai, Jun Han
    An Enhanced Exact Procedure for the CMST Problem. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:704-709 [Conf]
  49. Artem Vorobiev, Jun Han
    Specifying Dynamic Security Properties of Web Service Based Systems. [Citation Graph (0, 0)][DBLP]
    SKG, 2006, pp:34- [Conf]
  50. Artem Vorobiev, Jun Han
    Security Attack Ontology for Web Services. [Citation Graph (0, 0)][DBLP]
    SKG, 2006, pp:42- [Conf]
  51. Khaled M. Khan, Jun Han, Yuliang Zheng
    Security Characterization of Software Components and Their Composition. [Citation Graph (0, 0)][DBLP]
    TOOLS (36), 2000, pp:240-249 [Conf]
  52. Alan W. Colman, Jun Han
    Using Association Aspects to Implement Organisational Contracts. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2006, v:150, n:3, pp:37-53 [Journal]
  53. Yun Yang, Jun Han
    A Productivity-Centred Approach for Classifying Software Tool Interfacing. [Citation Graph (0, 0)][DBLP]
    J. Braz. Comp. Soc., 1998, v:5, n:1, pp:- [Journal]
  54. Antony Tang, Muhammad Ali Babar, Ian Gorton, Jun Han
    A survey of architecture design rationale. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2006, v:79, n:12, pp:1792-1804 [Journal]
  55. Antony Tang, Ann E. Nicholson, Yan Jin, Jun Han
    Using Bayesian belief networks for change impact analysis in architecture design. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2007, v:80, n:1, pp:127-148 [Journal]
  56. Alan W. Colman, Jun Han
    Using role-based coordination to achieve software adaptability. [Citation Graph (0, 0)][DBLP]
    Sci. Comput. Program., 2007, v:64, n:2, pp:223-245 [Journal]
  57. Khaled M. Khan, Jun Han
    Composing Security-Aware Software. [Citation Graph (0, 0)][DBLP]
    IEEE Software, 2002, v:19, n:1, pp:34-41 [Journal]
  58. Jim Welsh, Jun Han
    Software Documents: Concepts and Tools. [Citation Graph (0, 0)][DBLP]
    Software - Concepts and Tools, 1994, v:15, n:1, pp:12-25 [Journal]
  59. Jun Han, Zhaohao Sun, Jinpeng Huai, Xian Li
    An Efficient Node Partitioning Algorithm for the Capacitated Minimum Spanning Tree Problem. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2007, pp:575-580 [Conf]
  60. Jun Han, Xudong Liu, Jinpeng Huai, XueLian Lin, Xiaoxuan Ma, Xian Li
    InfoXP: An E-government Information eXchange Platform Based on Overlay Network. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2007, pp:949-954 [Conf]
  61. Jun Han, Alan W. Colman
    The Four Major Challenges of Engineering Adaptive Software Architectures. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2007, pp:565-572 [Conf]
  62. Jun Han, Yan Jin, Zheng Li, Tan Phan, Jian Yu
    Guiding the Service Composition Process with Temporal Business Rules. [Citation Graph (0, 0)][DBLP]
    ICWS, 2007, pp:735-742 [Conf]
  63. Yehua Gu, Xiaoyang Zeng, Jun Han, Jia Zhao
    A Low-cost and High-performance SoC Design for OMA DRM2 Applications. [Citation Graph (0, 0)][DBLP]
    ISCAS, 2007, pp:3510-3513 [Conf]
  64. Jing Wang, Lang Mai, Yanjie Peng, Jun Han, Xiaoyang Zeng
    An Energy-Proportion Synchronization Method for IR-UWB Communications. [Citation Graph (0, 0)][DBLP]
    ISCAS, 2007, pp:2578-2581 [Conf]
  65. Tan Phan, Jun Han, Jean-Guy Schneider, Tim Ebringer, Tony Rogers
    Policy-Based Service Registration and Discovery. [Citation Graph (0, 0)][DBLP]
    OTM Conferences (1), 2007, pp:417-426 [Conf]
  66. Jiang B. Liu, Jun Han
    A Practical Knowledge Discovery Process for Distributed Data Mining. [Citation Graph (0, 0)][DBLP]
    ISCA Conference on Intelligent Systems, 2002, pp:11-16 [Conf]
  67. Antony Tang, Yan Jin, Jun Han
    A rationale-based architecture model for design traceability and reasoning. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2007, v:80, n:6, pp:918-934 [Journal]
  68. Alan W. Colman, Jun Han
    Roles, players and adaptable organizations. [Citation Graph (0, 0)][DBLP]
    Applied Ontology, 2007, v:2, n:2, pp:105-126 [Journal]

  69. A Service Packaging Platform for Delivering Services. [Citation Graph (, )][DBLP]

  70. Secrobat: Secure and Robust Component-based Architectures. [Citation Graph (, )][DBLP]

  71. Security-Oriented Service Composition and Evolution. [Citation Graph (, )][DBLP]

  72. A low-cost cryptographic processor for security embedded system. [Citation Graph (, )][DBLP]

  73. A multi-task-oriented security processing architecture with powerful extensibility. [Citation Graph (, )][DBLP]

  74. A Survey of Policy-Based Management Approaches for Service Oriented Systems. [Citation Graph (, )][DBLP]

  75. An Ontology Framework for Managing Security Attacks and Defences in Component Based Software Systems. [Citation Graph (, )][DBLP]

  76. Scalable Emulation of Enterprise Systems. [Citation Graph (, )][DBLP]

  77. Toward Trustworthy Semantic Web Service Discovery and Selection. [Citation Graph (, )][DBLP]

  78. Towards Dynamic Matching of Business-Level Protocols in Adaptive Service Compositions. [Citation Graph (, )][DBLP]

  79. A Comparative Study into Architecture-Based Safety Evaluation Methodologies Using AADL's Error Annex and Failure Propagation Models. [Citation Graph (, )][DBLP]

  80. Experience-Based Trust in E-Commerce. [Citation Graph (, )][DBLP]

  81. Specifying Security Goals of Component Based Systems: An End-User Perspective. [Citation Graph (, )][DBLP]

  82. A Privacy Protection Method for P2P-based Web Service Discovery. [Citation Graph (, )][DBLP]

  83. Five Perspectives on Case Based Reasoning. [Citation Graph (, )][DBLP]

  84. Evaluation Model of Learning Effect Based on Adaptive Wavelet Neural Network. [Citation Graph (, )][DBLP]

  85. Gas/Liquid Two-Phase Flow Regime Recognition by Combining the Features of Shannon's Entropy with the Improved Elman Network. [Citation Graph (, )][DBLP]

  86. Learning evaluation based on learning process characteristics and Elman wavelet network model. [Citation Graph (, )][DBLP]

  87. A dual scale heterogeneous organizational network model. [Citation Graph (, )][DBLP]

  88. Quality-Driven Business Policy Specification and Refinement for Service-Oriented Systems. [Citation Graph (, )][DBLP]

  89. A Conceptual Framework for Unified and Comprehensive SOA Management. [Citation Graph (, )][DBLP]

  90. Using Temporal Business Rules to Synthesize Service Composition Process Models. [Citation Graph (, )][DBLP]

  91. Optimal frame synchronization for DVB-S2. [Citation Graph (, )][DBLP]

  92. Tracking loop for IR-UWB communications in IEEE 802.15 multi-path channels. [Citation Graph (, )][DBLP]

  93. A full-custom design of AES SubByte module with signal independent power consumption. [Citation Graph (, )][DBLP]

  94. GlycoVault: A Bioinformatics Infrastructure for Glycan Pathway Visualization, Analysis and Modeling. [Citation Graph (, )][DBLP]

  95. Adaptive application-specific middleware. [Citation Graph (, )][DBLP]

  96. Exploiting user-group relationships for increasing concurrency in software engineering environments. [Citation Graph (, )][DBLP]

  97. SNORES: towards a less-intrusive home sleep monitoring system using wireless sensor networks. [Citation Graph (, )][DBLP]

  98. An Automatic Layout Function in BPEL Visual Modeling Tool. [Citation Graph (, )][DBLP]

  99. Protecting data in multi-stakeholder web service system. [Citation Graph (, )][DBLP]

  100. Design Reasoning Improves Software Design Quality. [Citation Graph (, )][DBLP]

  101. Research and Implement of Multi-Dimensional Transfer Function Based on Boundaries. [Citation Graph (, )][DBLP]

  102. Two-dimensional Parity-based Concurrent Error Detection Method for AES Algorithm against Differential Fault Attack and its VLSI Implementation. [Citation Graph (, )][DBLP]

Search in 0.007secs, Finished in 0.012secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002