default search action
Yijun Yu
Person information
- affiliation: The Open University, Milton Keynes, UK
Other persons with a similar name
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j51]Guangming Liang, Jie Hu, Kun Yang, Siyao Song, Tingcai Liu, Ning Xie, Yijun Yu:
Data Augmentation for Predictive Digital Twin Channel: Learning Multi-Domain Correlations by Convolutional TimeGAN. IEEE J. Sel. Top. Signal Process. 18(1): 18-33 (2024) - [j50]Tianxing Wu, Kai Yao, Wei Li, Guilin Qi, Yijun Yu, Nengwen Zhao, Renyou Zhang, Peibo Duan:
Triple confidence measurement in knowledge graph with multiple heterogeneous evidences. World Wide Web (WWW) 27(6): 70 (2024) - [c152]Chunmiao Li, Yijun Yu, Haitao Wu, Luca Carlig, Shijie Nie, Lingxiao Jiang:
Unleashing the Power of Clippy in Real-World Rust Projects. ICSE Companion 2024: 318-319 - [c151]Zhi Li, Xiaohong Chen, Nan Niu, Yijun Yu:
Welcome to the Fourth International Workshop on Environment-Driven Requirements Engineering (EnviRE'24). RE Workshops 2024: 164-165 - [i14]Yao Wang, Yijun Yu, Yexing Li, Dong Li, Xiaoxue Zhao, Chungang Yang:
Network Intent Decomposition and Optimization for Energy-Aware Radio Access Network. CoRR abs/2404.18386 (2024) - [i13]Xiaoxue Zhao, Yijun Yu, Yexing Li, Dong Li, Yao Wang, Chungang Yang:
Decomposition Model Assisted Energy-Saving Design in Radio Access Network. CoRR abs/2404.18418 (2024) - 2023
- [j49]Bo Huang, Shuai Zhang, Jitao Huang, Yijun Yu, Zhicai Shi, Yujie Xiong:
Knowledge distilled pre-training model for vision-language-navigation. Appl. Intell. 53(5): 5607-5619 (2023) - [j48]Lingfeng Gui, Yijun Yu, Titilola O. Oliyide, Eirini Siougkrou, Alan Armstrong, Amparo Galindo, Fareed Bhasha Sayyed, Stanley P. Kolis, Claire S. Adjiman:
Integrating model-based design of experiments and computer-aided solvent design. Comput. Chem. Eng. 177: 108345 (2023) - [j47]Davi Monteiro Barbosa, Yijun Yu, Andrea Zisman, Bashar Nuseibeh:
Adaptive Observability for Forensic-Ready Microservice Systems. IEEE Trans. Serv. Comput. 16(5): 3196-3209 (2023) - [c150]Hanliang Zhang, Cristina David, Yijun Yu, Meng Wang:
Ownership Guided C to Rust Translation. CAV (3) 2023: 459-482 - [c149]Tamara Lopez, Helen Sharp, Michel Wermelinger, Melanie Langer, Mark Levine, Caroline Jay, Yijun Yu, Bashar Nuseibeh:
Accounting for socio-technical resilience in software engineering. CHASE 2023: 31-36 - [c148]Zhi Jin, Nan Niu, Yijun Yu:
An RE'23 Workshop on Environment-Driven Requirements Engineering (EnviRE'23). REW 2023: 168-169 - [i12]Hanliang Zhang, Cristina David, Yijun Yu, Meng Wang:
Ownership guided C to Rust translation. CoRR abs/2303.10515 (2023) - [i11]Chunmiao Li, Yijun Yu, Haitao Wu, Luca Carlig, Shijie Nie, Lingxiao Jiang:
Unleashing the Power of Clippy in Real-World Rust Projects. CoRR abs/2310.11738 (2023) - 2022
- [j46]Christopher Neale, Ian Kennedy, Blaine A. Price, Yijun Yu, Bashar Nuseibeh:
The case for Zero Trust Digital Forensics. Digit. Investig. 40(Supplement): 301352 (2022) - [j45]Yixing Luo, Yuan Zhou, Haiyan Zhao, Zhi Jin, Tianwei Zhang, Yang Liu, Danny Barthaud, Yijun Yu:
Online adaptation for autonomous unmanned systems driven by requirements satisfaction model. Softw. Syst. Model. 21(4): 1295-1319 (2022) - [c147]Michael Ling, Yijun Yu, Haitao Wu, Yuan Wang, James R. Cordy, Ahmed E. Hassan:
In Rust We Trust - A Transpiler from Unsafe C to Safer Rust. ICSE-Companion 2022: 354-355 - [c146]Nghi D. Q. Bui, Yijun Yu:
Towards Robust Models of Code via Energy-Based Learning on Auxiliary Datasets. ASE 2022: 147:1-147:3 - [c145]Zhi Jin, Nan Niu, Yijun Yu:
An RE'22 Workshop on Environment-Driven Requirements Engineering (EnviRE'22). RE Workshops 2022: 1 - 2021
- [j44]Dimitris Gkoumas, Qiuchi Li, Christina Lioma, Yijun Yu, Dawei Song:
What makes the difference? An empirical comparison of fusion strategies for multimodal language analysis. Inf. Fusion 66: 184-197 (2021) - [j43]Md. Rafiqul Islam Rabin, Nghi D. Q. Bui, Ke Wang, Yijun Yu, Lingxiao Jiang, Mohammad Amin Alipour:
On the generalizability of Neural Program Models with respect to semantic-preserving program transformations. Inf. Softw. Technol. 135: 106552 (2021) - [c144]Nghi D. Q. Bui, Yijun Yu, Lingxiao Jiang:
TreeCaps: Tree-Based Capsule Networks for Source Code Processing. AAAI 2021: 30-38 - [c143]Dimitris Gkoumas, Qiuchi Li, Shahram Dehdashti, Massimo Melucci, Yijun Yu, Dawei Song:
Quantum Cognitively Motivated Decision Fusion for Video Sentiment Analysis. AAAI 2021: 827-835 - [c142]Yijun Yu, Min Li:
A Weighted Non-convex Restoration Model for Hyperspectral Image. ICIG (2) 2021: 167-178 - [c141]Nghi D. Q. Bui, Yijun Yu, Lingxiao Jiang:
InferCode: Self-Supervised Learning of Code Representations by Predicting Subtrees. ICSE 2021: 1186-1197 - [c140]Dimitris Gkoumas, Qiuchi Li, Yijun Yu, Dawei Song:
An Entanglement-driven Fusion Neural Network for Video Sentiment Analysis. IJCAI 2021: 1736-1742 - [c139]Zhi Jin, Nan Niu, Yijun Yu:
An RE'21 Workshop on Environment-Driven Requirements Engineering (EnviRE'21). RE Workshops 2021: 421 - [c138]Jara Alvarez Masso, Alexandru Mihai Rogozea, Jan Medvesek, Saeid Mokaram, Yijun Yu:
LIPSYNC.AI: A.I. Driven Lips and Tongue Animations Using Articulatory Phonetic Descriptors and FACS Blendshapes. SIGGRAPH ASIA Emerging Technologies 2021: 9:1-9:2 - [c137]Nghi D. Q. Bui, Yijun Yu, Lingxiao Jiang:
Self-Supervised Contrastive Learning for Code Retrieval and Summarization via Semantic-Preserving Transformations. SIGIR 2021: 511-521 - [i10]Dimitris Gkoumas, Qiuchi Li, Shahram Dehdashti, Massimo Melucci, Yijun Yu, Dawei Song:
Quantum Cognitively Motivated Decision Fusion for Video Sentiment Analysis. CoRR abs/2101.04406 (2021) - [i9]Yuyang Wei, Yijun Yu, Minxue Pan, Tian Zhang:
A Feature Table approach to decomposing monolithic applications into microservices. CoRR abs/2105.07157 (2021) - 2020
- [j42]Yalan Chen, Xingyun Liu, Yijun Yu, Chunjiang Yu, Lan Yang, Yuxin Lin, Ting Xi, Ziyun Ye, Zhe Feng, Bairong Shen:
PCaLiStDB: a lifestyle database for precision prevention of prostate cancer. Database J. Biol. Databases Curation 2020: baz154 (2020) - [j41]Yalan Chen, Yijun Yu, Xin Lin, Zhenwei Han, Zhe Feng, Xinyi Hua, Dongliang Chen, Xiaotao Xu, Yuanpeng Zhang, Guheng Wang, Chenxi Huang:
Intelligent Rehabilitation Assistance Tools for Distal Radius Fracture: A Systematic Review Based on Literatures and Mobile Application Stores. Comput. Math. Methods Medicine 2020: 7613569:1-7613569:9 (2020) - [j40]Chunmiao Li, Shijie Nie, Yang Cao, Yijun Yu, Zhenjiang Hu:
Trace-Based Dynamic Gas Estimation of Loops in Smart Contracts. IEEE Open J. Comput. Soc. 1: 295-306 (2020) - [j39]Pierre A. Akiki, Paul A. Akiki, Arosha K. Bandara, Yijun Yu:
EUD-MARS: End-user development of model-driven adaptive robotics software systems. Sci. Comput. Program. 200: 102534 (2020) - [j38]Chun Liu, Wei Yang, Zheng Li, Yijun Yu:
Recommending software features to designers: From the perspective of users. Softw. Pract. Exp. 50(9): 1778-1792 (2020) - [c136]Chunmiao Li, Shijie Nie, Yang Cao, Yijun Yu, Zhenjiang Hu:
Dynamic Gas Estimation of Loops Using Machine Learning. BlockSys 2020: 428-441 - [c135]Kristian Beckers, Duncan Ki-Aries, Seok-Won Lee, Yijun Yu:
Welcome from the ESPRE 2020 Organisers. ESPRE@RE 2020: vi - [c134]Yixing Luo, Yijun Yu, Zhi Jin, Yao Li, Zuohua Ding, Yuan Zhou, Yang Liu:
Privacy-Aware UAV Flights through Self-Configuring Motion Planning. ICRA 2020: 1169-1175 - [c133]Yuyang Wei, Yijun Yu, Minxue Pan, Tian Zhang:
A Feature Table approach to decomposing monolithic applications into microservices. Internetware 2020: 21-30 - [i8]Md. Rafiqul Islam Rabin, Nghi D. Q. Bui, Yijun Yu, Lingxiao Jiang, Mohammad Amin Alipour:
On the Generalizability of Neural Program Analyzers with respect to Semantic-Preserving Program Transformations. CoRR abs/2008.01566 (2020) - [i7]Nghi D. Q. Bui, Yijun Yu, Lingxiao Jiang:
TreeCaps: Tree-Based Capsule Networks for Source Code Processing. CoRR abs/2009.09777 (2020) - [i6]Nghi D. Q. Bui, Yijun Yu, Lingxiao Jiang:
InferCode: Self-Supervised Learning of Code Representations by Predicting Subtrees. CoRR abs/2012.07023 (2020)
2010 – 2019
- 2019
- [j37]Yijun Yu, Danny Barthaud, Blaine A. Price, Arosha K. Bandara, Andrea Zisman, Bashar Nuseibeh:
LiveBox: A Self-Adaptive Forensic-Ready Service for Drones. IEEE Access 7: 148401-148412 (2019) - [j36]Fayola Peters, Thein Than Tun, Yijun Yu, Bashar Nuseibeh:
Text Filtering and Ranking for Security Bug Report Prediction. IEEE Trans. Software Eng. 45(6): 615-631 (2019) - [c132]Paulo Henrique M. Maia, Lucas Vieira, Matheus Lima Chagas, Yijun Yu, Andrea Zisman, Bashar Nuseibeh:
Dragonfly: a tool for simulating self-adaptive drone behaviours. SEAMS@ICSE 2019: 107-113 - [c131]Yijun Yu:
fAST: flattening abstract syntax trees for efficiency. ICSE (Companion Volume) 2019: 278-279 - [c130]Nghi D. Q. Bui, Yijun Yu, Lingxiao Jiang:
AutoFocus: Interpreting Attention-Based Neural Networks by Code Perturbation. ASE 2019: 38-41 - [c129]Paulo Henrique M. Maia, Lucas Vieira, Matheus Lima Chagas, Yijun Yu, Andrea Zisman, Bashar Nuseibeh:
Cautious Adaptation of Defiant Components. ASE 2019: 974-985 - [c128]Yixing Luo, Yijun Yu, Zhi Jin, Haiyan Zhao:
Environment-Centric Safety Requirements for Autonomous Unmanned Systems. RE 2019: 410-415 - [c127]Zhi Jin, Xiaohong Chen, Zhi Li, Yijun Yu:
RE4CPS: Requirements Engineering for Cyber-Physical Systems. RE 2019: 496-497 - [c126]Nghi D. Q. Bui, Yijun Yu, Lingxiao Jiang:
SAR: learning cross-language API mappings with little knowledge. ESEC/SIGSOFT FSE 2019: 796-806 - [c125]Bui D. Q. Nghi, Yijun Yu, Lingxiao Jiang:
Bilateral Dependency Neural Networks for Cross-Language Algorithm Classification. SANER 2019: 422-433 - [p6]Soichiro Hidaka, Zhenjiang Hu, Marin Litoiu, Lin Liu, Patrick Martin, Xin Peng, Guiling Wang, Yijun Yu:
Design and Engineering of Adaptive Software Systems. Engineering Adaptive Software Systems 2019: 1-33 - [p5]Amel Bennaceur, Thein Than Tun, Yijun Yu, Bashar Nuseibeh:
Requirements Engineering. Handbook of Software Engineering 2019: 51-92 - [p4]Yijun Yu, Nobukazu Yoshioka, Tetsuo Tamai:
Assessing Security and Privacy Behavioural Risks for Self-Protection Systems. Engineering Adaptive Software Systems 2019: 135-147 - [e3]Yijun Yu, Arosha K. Bandara, Shinichi Honiden, Zhenjiang Hu, Tetsuo Tamai, Hausi A. Müller, John Mylopoulos, Bashar Nuseibeh:
Engineering Adaptive Software Systems - Communications of NII Shonan Meetings. Springer 2019, ISBN 978-981-13-2184-9 [contents] - [i5]Nghi D. Q. Bui, Yijun Yu, Lingxiao Jiang:
SAR: Learning Cross-Language API Mappings with Little Knowledge. CoRR abs/1906.03835 (2019) - 2018
- [j35]Tezcan Dilshener, Michel Wermelinger, Yijun Yu:
Locating bugs without looking back. Autom. Softw. Eng. 25(3): 383-434 (2018) - [j34]Amel Bennaceur, Thein Than Tun, Arosha K. Bandara, Yijun Yu, Bashar Nuseibeh:
Feature-Driven Mediator Synthesis: Supporting Collaborative Security in the Internet of Things. ACM Trans. Cyber Phys. Syst. 2(3): 21:1-21:25 (2018) - [j33]Matheus Paixão, Mark Harman, Yuanyuan Zhang, Yijun Yu:
An Empirical Study of Cohesion and Coupling: Balancing Optimization and Disruption. IEEE Trans. Evol. Comput. 22(3): 394-414 (2018) - [j32]Zhengheng Yuan, Xiaohong Chen, Jing Liu, Yijun Yu, Haiying Sun, Tingliang Zhou, Zhi Jin:
Simplifying the Formal Verification of Safety Requirements in Zone Controllers Through Problem Frames and Constraint-Based Projection. IEEE Trans. Intell. Transp. Syst. 19(11): 3517-3528 (2018) - [j31]Xin Peng, Jingxiao Gu, Tian Huat Tan, Jun Sun, Yijun Yu, Bashar Nuseibeh, Wenyun Zhao:
CrowdService: Optimizing Mobile Crowdsourcing and Service Composition. ACM Trans. Internet Techn. 18(2): 19:1-19:25 (2018) - [c124]Nghi D. Q. Bui, Lingxiao Jiang, Yijun Yu:
Cross-Language Learning for Program Classification Using Bilateral Tree-Based Convolutional Neural Networks. AAAI Workshops 2018: 758-761 - [c123]Huihui Liu, Yijun Yu, Bixin Li, Yibiao Yang, Ru Jia:
Are Smell-Based Metrics Actually Useful in Effort-Aware Structural Change-Proneness Prediction? An Empirical Study. APSEC 2018: 315-324 - [c122]Thein Than Tun, M. Yang, Arosha K. Bandara, Yijun Yu, Armstrong Nhlabatsi, Niamul Khan, Khaled M. Khan, Bashar Nuseibeh:
Requirements and specifications for adaptive security: concepts and analysis. SEAMS@ICSE 2018: 161-171 - [e2]Yijun Yu, Erik M. Fredericks, Premkumar T. Devanbu:
Proceedings of the 4th ACM SIGSOFT International Workshop on NLP for Software Engineering, NL4SE@ESEC/SIGSOFT FSE 2018, Lake Buena Vista, FL, USA, November 4, 2018. ACM 2018, ISBN 978-1-4503-6055-5 [contents] - 2017
- [j30]Yijun Yu, Haruhiko Kaiya, Nobukazu Yoshioka, Zhenjiang Hu, Hironori Washizaki, Yingfei Xiong, Amin Hosseinian Far:
Goal Modelling for Security Problem Matching and Pattern Enforcement. Int. J. Secur. Softw. Eng. 8(3): 42-57 (2017) - [j29]Pierre A. Akiki, Arosha K. Bandara, Yijun Yu:
Visual Simple Transformations: Empowering End-Users to Wire Internet of Things Objects. ACM Trans. Comput. Hum. Interact. 24(2): 10:1-10:43 (2017) - [c121]Mahmoud Barhamgi, Mu Yang, Chia-Mu Yu, Yijun Yu, Arosha K. Bandara, Djamal Benslimane, Bashar Nuseibeh:
Enabling End-Users to Protect their Privacy. AsiaCCS 2017: 905-907 - [c120]Xiaohong Chen, Ling Yin, Yijun Yu, Zhi Jin:
Transforming Timing Requirements into CCSL Constraints to Verify Cyber-Physical Systems. ICFEM 2017: 54-70 - [c119]Giovanna Avellis, Julian Harty, Yijun Yu:
Towards Mobile Twin Peaks for App Development. MOBILESoft@ICSE 2017: 189-193 - [c118]Yue Zhao, Xin Feng, Na Chen, Yaoguang Wang, Yijun Yu, Hongbo Wang:
A multi-dimensional hierarchical performance evaluation model for edge cloud platform. IIKI 2017: 389-393 - [c117]Wenyi Qian, Xin Peng, Jun Sun, Yijun Yu, Bashar Nuseibeh, Wenyun Zhao:
O2O service composition with social collaboration. ASE 2017: 451-461 - [c116]Yijun Yu, Thein Than Tun:
Snap forensics: a tradeoff between ephemeral intelligence and persistent evidence collection. SERF@ESEC/SIGSOFT FSE 2017: 10-11 - [i4]Nghi D. Q. Bui, Lingixao Jiang, Yijun Yu:
Cross-Language Learning for Program Classification using Bilateral Tree-Based Convolutional Neural Networks. CoRR abs/1710.06159 (2017) - 2016
- [j28]Mahmoud Barhamgi, Arosha K. Bandara, Yijun Yu, Khalid Belhajjame, Bashar Nuseibeh:
Protecting Privacy in the Cloud: Current Practices, Future Directions. Computer 49(2): 68-72 (2016) - [j27]Pierre A. Akiki, Arosha K. Bandara, Yijun Yu:
Engineering Adaptive Model-Driven User Interfaces. IEEE Trans. Software Eng. 42(12): 1118-1147 (2016) - [c115]Alexei Lapouchnian, Yijun Yu, Sotirios Liaskos, John Mylopoulos:
Requirements-driven design of autonomic application software. CASCON 2016: 23-37 - [c114]Xin Peng, Jingxiao Gu, Tian Huat Tan, Jun Sun, Yijun Yu, Bashar Nuseibeh, Wenyun Zhao:
CrowdService: serving the individuals through mobile crowdsourcing and service composition. ASE 2016: 214-219 - [c113]Tezcan Dilshener, Michel Wermelinger, Yijun Yu:
Locating bugs without looking back. MSR 2016: 286-290 - [c112]Thein Than Tun, Blaine A. Price, Arosha K. Bandara, Yijun Yu, Bashar Nuseibeh:
Verifiable Limited Disclosure: Reporting and Handling Digital Evidence in Police Investigations. RE Workshops 2016: 102-105 - [c111]Joshua Gray, Virginia N. L. Franqueira, Yijun Yu:
Forensically-Sound Analysis of Security Risks of Using Local Password Managers. RE Workshops 2016: 114-121 - [e1]Lidia López, Yijun Yu:
Proceedings of the Ninth International i* Workshop co-located with 24th International Conference on Requirements Engineering (RE 2016), Beijing, China, September 12-13, 2016. CEUR Workshop Proceedings 1674, CEUR-WS.org 2016 [contents] - 2015
- [j26]Yijun Yu, Virginia N. L. Franqueira, Thein Than Tun, Roel J. Wieringa, Bashar Nuseibeh:
Automated analysis of security requirements through risk-based argumentation. J. Syst. Softw. 106: 102-116 (2015) - [j25]Yijun Yu:
The Aftermath of the Missing Flight MH370: What Can Engineers Do? [Point of View]. Proc. IEEE 103(11): 1948-1951 (2015) - [j24]Armstrong Nhlabatsi, Thein Than Tun, Niamul Khan, Yijun Yu, Arosha K. Bandara, Khaled M. Khan, Bashar Nuseibeh:
"Why can't I do that?": Tracing Adaptive Security Decisions. EAI Endorsed Trans. Self Adapt. Syst. 1(1): e2 (2015) - [j23]Yiannis Kanellopoulos, Yijun Yu:
Guest editorial: Special section: Software quality and maintainability. Softw. Qual. J. 23(1): 77-78 (2015) - [j22]Bihuan Chen, Xin Peng, Yijun Yu, Wenyun Zhao:
Requirements-Driven Self-Optimization of Composite Services Using Feedback Control. IEEE Trans. Serv. Comput. 8(1): 107-120 (2015) - [c110]Thein Than Tun, Robyn R. Lutz, Brian Nakayama, Yijun Yu, Divita Mathur, Bashar Nuseibeh:
The Role of Environmental Assumptions in Failures of DNA Nanosystems. COUFLESS@ICSE 2015: 27-33 - [c109]Armstrong Nhlabatsi, Yijun Yu, Andrea Zisman, Thein Than Tun, Niamul Khan, Arosha K. Bandara, Khaled M. Khan, Bashar Nuseibeh:
Managing Security Control Assumptions Using Causal Traceability. SST@ICSE 2015: 43-49 - [c108]Simon Butler, Michel Wermelinger, Yijun Yu:
Investigating naming convention adherence in Java references. ICSME 2015: 41-50 - [c107]Simon Butler, Michel Wermelinger, Yijun Yu:
A survey of the forms of Java reference names. ICPC 2015: 196-206 - [c106]Michel Wermelinger, Yijun Yu:
An Architectural Evolution Dataset. MSR 2015: 502-505 - [c105]Tian Zhang, Minxue Pan, Jizhou Zhao, Yijun Yu, Xuandong Li:
An Open Framework for Semantic Code Queries on Heterogeneous Repositories. TASE 2015: 39-46 - 2014
- [j21]Pierre A. Akiki, Arosha K. Bandara, Yijun Yu:
Adaptive Model-Driven User Interface Development Systems. ACM Comput. Surv. 47(1): 9:1-9:33 (2014) - [j20]Bihuan Chen, Xin Peng, Yijun Yu, Wenyun Zhao:
Uncertainty handling in goal-driven self-optimization - Limiting the negative effect on adaptation. J. Syst. Softw. 90: 114-127 (2014) - [c104]Armstrong Nhlabatsi, Thein Than Tun, Niamul Khan, Yijun Yu, Arosha K. Bandara, Khaled M. Khan, Bashar Nuseibeh:
Traceability for Adaptive Information Security in the Cloud. IEEE CLOUD 2014: 958-959 - [c103]Xin Peng, Yi Xie, Yijun Yu, John Mylopoulos, Wenyun Zhao:
Evolving Commitments for Self-Adaptive Socio-technical Systems. ICECCS 2014: 98-107 - [c102]Amel Bennaceur, Arosha K. Bandara, Michael Jackson, Wei Liu, Lionel Montrieux, Thein Than Tun, Yijun Yu, Bashar Nuseibeh:
Requirements-driven mediation for collaborative security. SEAMS 2014: 37-42 - [c101]Christopher Bailey, Lionel Montrieux, Rogério de Lemos, Yijun Yu, Michel Wermelinger:
Run-time generation, transformation, and verification of access control models for self-protection. SEAMS 2014: 135-144 - [c100]Bihuan Chen, Xin Peng, Yijun Yu, Bashar Nuseibeh, Wenyun Zhao:
Self-adaptation through incremental generative model transformations at runtime. ICSE 2014: 676-687 - [c99]Pierre A. Akiki, Arosha K. Bandara, Yijun Yu:
Integrating adaptive user interface capabilities in enterprise applications. ICSE 2014: 712-723 - [c98]Mu Yang, Yijun Yu, Arosha K. Bandara, Bashar Nuseibeh:
Adaptive Sharing for Online Social Networks: A Trade-off Between Privacy Risk and Social Benefit. TrustCom 2014: 45-52 - [i3]Liliana Pasquale, Yijun Yu, Luca Cavallaro, Mazeiar Salehie, Thein Than Tun, Bashar Nuseibeh:
Engineering Adaptive Digital Investigations using Forensics Requirements. CoRR abs/1402.0997 (2014) - 2013
- [j19]Thein Than Tun, Robin C. Laney, Yijun Yu, Bashar Nuseibeh:
Specifying software features for composition: A tool-supported approach. Comput. Networks 57(12): 2454-2464 (2013) - [j18]Eric Bouwers, Yijun Yu:
Preface. Electron. Commun. Eur. Assoc. Softw. Sci. Technol. 60 (2013) - [j17]Stefan Taubenberger, Jan Jürjens, Yijun Yu, Bashar Nuseibeh:
Resolving vulnerability identification errors using security requirements on business process models. Inf. Manag. Comput. Secur. 21(3): 202-223 (2013) - [j16]Xin Peng, Zhenchang Xing, Xi Tan, Yijun Yu, Wenyun Zhao:
Improving feature location using structural similarity and iterative graph mapping. J. Syst. Softw. 86(3): 664-676 (2013) - [c97]Pierre A. Akiki, Arosha K. Bandara, Yijun Yu:
Preserving Designer Input on Concrete User Interfaces Using Constraints While Maintaining Adaptive Behavior. CASFE 2013: 9-16 - [c96]Pierre A. Akiki, Arosha K. Bandara, Yijun Yu:
RBUIS: simplifying enterprise application user interfaces through engineering role-based adaptive behavior. EICS 2013: 3-12 - [c95]Pierre A. Akiki, Arosha K. Bandara, Yijun Yu:
Crowdsourcing user interface adaptations for minimizing the bloat in enterprise applications. EICS 2013: 121-126 - [c94]Pierre A. Akiki, Arosha K. Bandara, Yijun Yu:
Cedar studio: an IDE supporting adaptive model-driven user interfaces for enterprise applications. EICS 2013: 139-144 - [c93]Lionel Montrieux, Yijun Yu, Michel Wermelinger:
Developing a domain-specific plug-in for a modelling platform: The good, the bad, the ugly. TOPI@ICSE 2013: 1-6 - [c92]Lionel Montrieux, Yijun Yu, Michel Wermelinger, Zhenjiang Hu:
Issues in representing domain-specific concerns in model-driven engineering. MiSE 2013: 1-6 - [c91]Simon Butler, Michel Wermelinger, Yijun Yu, Helen Sharp:
INVocD: identifier name vocabulary dataset. MSR 2013: 405-408 - [c90]Liliana Pasquale, Yijun Yu, Mazeiar Salehie, Luca Cavallaro, Thein Than Tun, Bashar Nuseibeh:
Requirements-driven adaptive digital forensics. RE 2013: 340-341 - [c89]Rui-Zhi Dong, Xin Peng, Yijun Yu, Wenyun Zhao:
Requirements-Driven Self-Repairing against Environmental Failures. TASE 2013: 241-244 - [p3]Yijun Yu, Xin Peng, Julio César Sampaio do Prado Leite:
Reasoning About Dynamic Aspectual Requirements. Aspect-Oriented Requirements Engineering 2013: 23-42 - [p2]Saad Bin Saleem, Lionel Montrieux, Yijun Yu, Thein Than Tun, Bashar Nuseibeh:
Maintaining Security Requirements of Software Systems Using Evolving Crosscutting Dependencies. Aspect-Oriented Requirements Engineering 2013: 167-181 - [p1]Thein Than Tun, Yijun Yu, Michael Jackson, Robin C. Laney, Bashar Nuseibeh:
Aspect Interactions: A Requirements Engineering Perspective. Aspect-Oriented Requirements Engineering 2013: 271-286 - [i2]Shinichi Honiden, Zhenjiang Hu, Hausi A. Müller, John Mylopoulos, Yijun Yu:
Engineering Adaptive Software Systems (EASSy) (NII Shonan Meeting 2013-7). NII Shonan Meet. Rep. 2013 (2013) - 2012
- [j15]Xin Peng, Bihuan Chen, Yijun Yu, Wenyun Zhao:
Self-tuning of software systems through dynamic quality tradeoff and value-based feedback control loop. J. Syst. Softw. 85(12): 2707-2719 (2012) - [j14]Mohammed Salifu, Yijun Yu, Arosha K. Bandara, Bashar Nuseibeh:
Analysing monitoring and switching problems for adaptive systems. J. Syst. Softw. 85(12): 2829-2839 (2012) - [c88]Azadeh Alebrahim, Thein Than Tun, Yijun Yu, Maritta Heisel, Bashar Nuseibeh:
An Aspect-Oriented Approach to Relating Security Requirements and Access Control. CAiSE Forum 2012: 15-22 - [c87]Yiannis Kanellopoulos, Yijun Yu:
Workshop Proposal for CSMR 2012 - SQM 2012. CSMR 2012: 561-562 - [c86]Pierre A. Akiki, Arosha K. Bandara, Yijun Yu:
Using Interpreted Runtime Models for Devising Adaptive User Interfaces of Enterprise Applications. ICEIS (3) 2012: 72-77 - [c85]Yijun Yu, Yu Lin, Zhenjiang Hu, Soichiro Hidaka, Hiroyuki Kato, Lionel Montrieux:
Maintaining invariant traceability through bidirectional transformations. ICSE 2012: 540-550 - [c84]Lingxiao Fu, Xin Peng, Yijun Yu, John Mylopoulos, Wenyun Zhao:
Stateful requirements monitoring for self-repairing socio-technical systems. RE 2012: 121-130 - [c83]Thein Than Tun, Arosha K. Bandara, Blaine A. Price, Yijun Yu, Charles B. Haley, Inah Omoronyia, Bashar Nuseibeh:
Privacy arguments: Analysing selective disclosure requirements for mobile applications. RE 2012: 131-140 - [c82]Alberto Sardinha, Yijun Yu, Nan Niu, Awais Rashid:
EA-tracer: identifying traceability links between code aspects and early aspects. SAC 2012: 1035-1042 - [i1]Arosha K. Bandara, Shinichi Honiden, Yijun Yu:
Engineering Autonomic Systems (EASy) (NII Shonan Meeting 2012-3). NII Shonan Meet. Rep. 2012 (2012) - 2011
- [j13]Andreas Bauer, Jan Jürjens, Yijun Yu:
Run-Time Security Traceability for Evolving Systems. Comput. J. 54(1): 58-87 (2011) - [j12]Michel Wermelinger, Yijun Yu, Angela Lozano, Andrea Capiluppi:
Assessing architectural evolution: a case study. Empir. Softw. Eng. 16(5): 623-666 (2011) - [j11]Xin Peng, Yijun Yu, Wenyun Zhao:
Analyzing evolution of variability in a software product line: From contexts and requirements to features. Inf. Softw. Technol. 53(7): 707-721 (2011) - [c81]Gábor Bergmann, Fabio Massacci, Federica Paci, Thein Than Tun, Dániel Varró, Yijun Yu:
A Tool for Managing Evolving Security Requirements. CAiSE Forum 2011: 49-56 - [c80]Gábor Bergmann, Fabio Massacci, Federica Paci, Thein Than Tun, Dániel Varró, Yijun Yu:
A Tool for Managing Evolving Security Requirements. CAiSE Forum (Selected Papers) 2011: 110-125 - [c79]Fabio Massacci, John Mylopoulos, Federica Paci, Thein Than Tun, Yijun Yu:
An Extended Ontology for Security Requirements. CAiSE Workshops 2011: 622-636 - [c78]Yijun Yu, Thein Than Tun, Arosha K. Bandara, Tian Zhang, Bashar Nuseibeh:
From Model-Driven Software Development Processes to Problem Diagnoses at Runtime. Models@run.time@Dagstuhl 2011: 188-207 - [c77]Simon Butler, Michel Wermelinger, Yijun Yu, Helen Sharp:
Improving the Tokenisation of Identifier Names. ECOOP 2011: 130-154 - [c76]Thomas Heyman, Koen Yskout, Riccardo Scandariato, Holger Schmidt, Yijun Yu:
The Security Twin Peaks. ESSoS 2011: 167-180 - [c75]Xin Peng, Zhenchang Xing, Xi Tan, Yijun Yu, Wenyun Zhao:
Iterative context-aware feature location. ICSE 2011: 900-903 - [c74]Simon Butler, Michel Wermelinger, Yijun Yu, Helen Sharp:
Mining java class naming conventions. ICSM 2011: 93-102 - [c73]Antonio González Torres, Roberto Therón, Francisco José García-Peñalvo, Michel Wermelinger, Yijun Yu:
Maleku: An evolutionary visual software analysis tool for providing insights into software evolution. ICSM 2011: 594-597 - [c72]Jennifer Horkoff, Yijun Yu, Eric S. K. Yu:
OpenOME: An Open-source Goal and Agent-Oriented Model Drawing and Analysis Tool. iStar 2011: 154-156 - [c71]Lionel Montrieux, Michel Wermelinger, Yijun Yu:
Challenges in model-based evolution and merging of access control policies. EVOL/IWPSE 2011: 116-120 - [c70]Yijun Yu, Thein Than Tun, Bashar Nuseibeh:
Specifying and detecting meaningful changes in programs. ASE 2011: 273-282 - [c69]Guillaume Benats, Arosha K. Bandara, Yijun Yu, Jean-Noël Colin, Bashar Nuseibeh:
PrimAndroid: Privacy Policy Modelling and Analysis for Android Applications. POLICY 2011: 129-132 - [c68]Bihuan Chen, Xin Peng, Yijun Yu, Wenyun Zhao:
Are your sites down? Requirements-driven self-tuning for the survivability of Web systems. RE 2011: 219-228 - [c67]Virginia N. L. Franqueira, Thein Than Tun, Yijun Yu, Roel J. Wieringa, Bashar Nuseibeh:
Risk and argument: A risk-based argumentation method for practical security. RE 2011: 239-248 - [c66]Yijun Yu, Thein Than Tun, Alessandra Tedeschi, Virginia N. L. Franqueira, Bashar Nuseibeh:
OpenArgue: Supporting argumentation to evolve secure software systems. RE 2011: 351-352 - [c65]Stefan Taubenberger, Jan Jürjens, Yijun Yu, Bashar Nuseibeh:
Problem Analysis of Traditional IT-Security Risk Assessment Methods - An Experience Report from the Insurance and Auditing Domain. SEC 2011: 259-270 - [c64]Gábor Bergmann, Fabio Massacci, Federica Paci, Thein Than Tun, Dániel Varró, Yijun Yu:
SeCMER: A Tool to Gain Control of Security Requirements Evolution. ServiceWave 2011: 321-322 - [c63]Lionel Montrieux, Michel Wermelinger, Yijun Yu:
Tool support for UML-based specification and verification of role-based access control properties. SIGSOFT FSE 2011: 456-459 - [c62]Bihuan Chen, Xin Peng, Yijun Yu, Wenyun Zhao:
Survivability-oriented self-tuning of web systems. WWW (Companion Volume) 2011: 23-24 - 2010
- [j10]Armstrong Nhlabatsi, Bashar Nuseibeh, Yijun Yu:
Security Requirements Engineering for Evolving Software Systems: A Survey. Int. J. Secur. Softw. Eng. 1(1): 54-73 (2010) - [c61]Nan Niu, Juha Savolainen, Yijun Yu:
Variability Modeling for Product Line Viewpoints Integration. COMPSAC 2010: 337-346 - [c60]Simon Butler, Michel Wermelinger, Yijun Yu, Helen Sharp:
Exploring the Influence of Identifier Names on Code Quality: An Empirical Study. CSMR 2010: 156-165 - [c59]Teng Long, Lin Liu, Yijun Yu, Zhiguo Wan:
Assure High Quality Code Using Refactoring and Obfuscation Techniques. FCST 2010: 246-252 - [c58]Lionel Montrieux, Jan Jürjens, Charles B. Haley, Yijun Yu, Pierre-Yves Schobbens, Hubert Toussaint:
Tool support for code generation from a UMLsec property. ASE 2010: 357-358 - [c57]Xin Peng, Bihuan Chen, Yijun Yu, Wenyun Zhao:
Self-Tuning of Software Systems Through Goal-based Feedback Loop Control. RE 2010: 104-107 - [c56]Thein Than Tun, Yijun Yu, Charles B. Haley, Bashar Nuseibeh:
Model-Based Argument Analysis for Evolving Security Requirements. SSIRI 2010: 88-97
2000 – 2009
- 2009
- [j9]Yiqiao Wang, Sheila A. McIlraith, Yijun Yu, John Mylopoulos:
Monitoring and diagnosing software requirements. Autom. Softw. Eng. 16(1): 3-35 (2009) - [j8]Nan Niu, Yijun Yu, Bruno González-Baixauli, Neil A. Ernst, Julio César Sampaio do Prado Leite, John Mylopoulos:
Aspects across Software Life Cycle: A Goal-Driven Approach. LNCS Trans. Aspect Oriented Softw. Dev. 6: 83-110 (2009) - [c55]Shan Tang, Xin Peng, Yijun Yu, Wenyun Zhao:
Goal-Directed Modeling of Self-adaptive Software Architecture. BMMDS/EMMSAD 2009: 313-325 - [c54]Jerry Overton, Jon G. Hall, Lucia Rapanotti, Yijun Yu:
Towards a Problem Oriented Engineering Theory of Pattern-Oriented Analysis and Design. COMPSAC (2) 2009: 255-260 - [c53]Michel Wermelinger, Yijun Yu:
Some Issues in the 'Archaeology' of Software Evolution. GTTSE 2009: 426-445 - [c52]Michel Wermelinger, Yijun Yu, Markus Strohmaier:
Using formal concept analysis to construct and visualise hierarchies of socio-technical relations. ICSE Companion 2009: 327-330 - [c51]Raian Ali, Yijun Yu, Ruzanna Chitchyan, Armstrong Nhlabatsi, Paolo Giorgini:
Towards a Unified Framework for Contextual Variability in Requirements. IWSPM 2009: 31-34 - [c50]Thein Than Tun, Michael Jackson, Robin C. Laney, Bashar Nuseibeh, Yijun Yu:
Are Your Lights Off? Using Problem Frames to Diagnose System Failures. RE 2009: 343-348 - [c49]Teng Long, Lin Liu, Yijun Yu, Zhi Jin:
AVT Vector: A Quantitative Security Requirements Evaluation Approach Based on Assets, Vulnerabilities and Trustworthiness of Environment. RE 2009: 377-378 - [c48]Thein Than Tun, Yijun Yu, Robin C. Laney, Bashar Nuseibeh:
Early Identification of Problem Interactions: A Tool-Supported Approach. REFSQ 2009: 74-88 - [c47]Simon Butler, Michel Wermelinger, Yijun Yu, Helen Sharp:
Relating Identifier Naming Flaws and Code Quality: An Empirical Study. WCRE 2009: 31-35 - 2008
- [c46]Jan Jürjens, Yijun Yu, Andreas Bauer:
Tools for Traceable Security Verification. BCS Int. Acad. Conf. 2008: 367-390 - [c45]Yijun Yu, Haruhiko Kaiya, Hironori Washizaki, Yingfei Xiong, Zhenjiang Hu, Nobukazu Yoshioka:
Enforcing a security pattern in stakeholder goal models. QoP 2008: 9-14 - [c44]Jan Jürjens, Jörg Schreck, Yijun Yu:
Automated Analysis of Permission-Based Security Using UMLsec. FASE 2008: 292-295 - [c43]Yijun Yu, Jan Jürjens, John Mylopoulos:
Traceability for the maintenance of secure software. ICSM 2008: 297-306 - [c42]Michel Wermelinger, Yijun Yu, Angela Lozano:
Design principles in architectural evolution: A case study. ICSM 2008: 396-405 - [c41]Yijun Yu, Alexei Lapouchnian, Sotirios Liaskos, John Mylopoulos, Julio César Sampaio do Prado Leite:
From Goals to High-Variability Software Design. ISMIS 2008: 1-16 - [c40]Yijun Yu, Jan Jürjens, Jörg Schreck:
Tools for Traceability in Secure Software Development. ASE 2008: 503-504 - [c39]Michel Wermelinger, Yijun Yu:
Analyzing the evolution of eclipse plugins. MSR 2008: 133-136 - [c38]Neil A. Ernst, John Mylopoulos, Yijun Yu, Tien Nguyen:
Supporting Requirements Model Evolution throughout the System Life-Cycle. RE 2008: 321-322 - [c37]Yijun Yu, Julio César Sampaio do Prado Leite, Alexei Lapouchnian, John Mylopoulos:
Configuring features with stakeholder goals. SAC 2008: 645-649 - [c36]Yijun Yu, Michel Wermelinger:
Graph-Centric Tools for Understanding the Evolution and Relationships of Software Structures. WCRE 2008: 329-330 - 2007
- [j7]David Williams, Yijun Yu, Levi Kennedy, Xianyang Zhu, Lawrence Carin:
A Bivariate Gaussian Model for Unexploded Ordnance Classification with EMI Data. IEEE Geosci. Remote. Sens. Lett. 4(4): 629-633 (2007) - [j6]Yijun Yu, Lawrence Carin:
Three-Dimensional Bayesian Inversion With Application to Subsurface Sensing. IEEE Trans. Geosci. Remote. Sens. 45(5-1): 1258-1270 (2007) - [c35]Nan Niu, Steve Easterbrook, Yijun Yu:
A Taxonomy of Asymmetric Requirements Aspects. EA@AOSD 2007: 1-18 - [c34]Alexei Lapouchnian, Yijun Yu, John Mylopoulos:
Requirements-Driven Design and Configuration Management of Business Processes. BPM 2007: 246-261 - [c33]Yijun Yu, Jianguo Lu, Juan Fernández-Ramil, Phil Yuan:
Comparing Web Services with other Software Components. ICWS 2007: 388-397 - [c32]Yiqiao Wang, Sheila A. McIlraith, Yijun Yu, John Mylopoulos:
An automated approach to monitoring and diagnosing requirements. ASE 2007: 293-302 - [c31]Jan Jürjens, Yijun Yu:
Tools for model-based security engineering: models vs. code. ASE 2007: 545-546 - [c30]Yijun Yu, Nan Niu, Bruno González-Baixauli, William Candillon, John Mylopoulos, Steve M. Easterbrook, Julio César Sampaio do Prado Leite, Gilles Vanwormhoudt:
Tracing and Validating Goal Aspects. RE 2007: 53-56 - [c29]Mohammed Salifu, Yijun Yu, Bashar Nuseibeh:
Specifying Monitoring and Switching Problems in Context. RE 2007: 211-220 - [c28]Sotirios Liaskos, Lei Jiang, Alexei Lapouchnian, Yiqiao Wang, Yijun Yu, Julio César Sampaio do Prado Leite, John Mylopoulos:
Exploring the Dimensions of Variability: a Requirements Engineering Perspective. VaMoS 2007: 17-26 - [c27]Jianguo Lu, Yijun Yu:
Web Service Search: Who, When, What, and How. WISE Workshops 2007: 284-295 - [c26]Jianguo Lu, Yijun Yu, Debashis Roy, Deepa Saha:
Web Service Composition: A Reality Check. WISE 2007: 523-532 - 2006
- [c25]Alexei Lapouchnian, Yijun Yu, Sotirios Liaskos, John Mylopoulos:
Requirements-driven design of autonomic application software. CASCON 2006: 80-94 - [c24]Yijun Yu, Huaizhong Lin, Yimin Yu, Chun Chen:
Personalized Web Recommendation Based on Path Clustering. FQAS 2006: 368-377 - [c23]Yijun Yu, Huaizhong Lin, Yimin Yu, Chun Chen:
Mining Interest Navigation Patterns Based on Hybrid Markov Model. FQAS 2006: 470-478 - [c22]Yimin Yu, Duanqing Xu, Chun Chen, Yijun Yu, Lei Zhao:
A Surface Errors Locator System for Ancient Culture Preservation. ICADL 2006: 360-369 - [c21]Sotirios Liaskos, Alexei Lapouchnian, Yijun Yu, Eric S. K. Yu, John Mylopoulos:
On Goal-based Variability Acquisition and Analysis. RE 2006: 76-85 - 2005
- [j5]Alexei Lapouchnian, Sotirios Liaskos, John Mylopoulos, Yijun Yu:
Towards requirements-driven autonomic systems design. ACM SIGSOFT Softw. Eng. Notes 30(4): 1-7 (2005) - [j4]Yijun Yu, Jianguo Lu, John Mylopoulos, Weiwei Sun, Jing-Hao Xue, Erik H. D'Hollander:
Making XML document markup international. Softw. Pract. Exp. 35(1): 1-14 (2005) - [c20]Julio César Sampaio do Prado Leite, Yijun Yu, Lin Liu, Eric S. K. Yu, John Mylopoulos:
Quality-Based Software Reuse. CAiSE 2005: 535-550 - [c19]Homayoun Dayani-Fard, Yijun Yu, John Mylopoulos, Periklis Andritsos:
Improving the Build Architecture of Legacy C/C++ Software Systems. FASE 2005: 96-110 - [c18]Yijun Yu, Homayoun Dayani-Fard, John Mylopoulos, Periklis Andritsos:
Reducing Build Time through Precompilations for Evolving Large Software. ICSM 2005: 59-68 - [c17]Sotirios Liaskos, Alexei Lapouchnian, Yiqiao Wang, Yijun Yu, Steve M. Easterbrook:
Configuring Common Personal Software: a Requirements-Driven Approach. RE 2005: 9-18 - [c16]Yijun Yu, Yiqiao Wang, John Mylopoulos, Sotirios Liaskos, Alexei Lapouchnian, Julio César Sampaio do Prado Leite:
Reverse Engineering Goal Models from Legacy Code. RE 2005: 363-372 - [c15]Yijun Yu, John Mylopoulos, Yiqiao Wang, Sotirios Liaskos, Alexei Lapouchnian, Ying Zou, Martin Littou, Julio César Sampaio do Prado Leite:
RETR: Reverse Engineering to Requirements. WCRE 2005: 234 - [c14]Jianguo Lu, Yijun Yu, John Mylopoulos:
A Lightweight Approach to Semantic Web Service Synthesis. WIRI 2005: 240-247 - 2004
- [j3]Yijun Yu, Tiejun Yu, Lawrence Carin:
Three-dimensional inverse scattering of a dielectric target embedded in a lossy half-space. IEEE Trans. Geosci. Remote. Sens. 42(5): 957-973 (2004) - [c13]Yijun Yu, Erik H. D'Hollander:
Non-Uniform Dependences Partitioned by Recurrence Chains. ICPP 2004: 100-107 - [c12]Yijun Yu, Kristof Beyls, Erik H. D'Hollander:
Performance Visualizations using XML Representations. IV 2004: 795-800 - [c11]Yijun Yu, Julio César Sampaio do Prado Leite, John Mylopoulos:
From Goals to Aspects: Discovering Aspects from Requirements Goal Models. RE 2004: 38-47 - [c10]Qing Zhang, Huiqiong Chen, Yijun Yu, Zhipeng Xie, Baile Shi:
Dynamically Self-Organized Service Composition in Wireless Ad Hoc Networks. TES 2004: 95-106 - 2003
- [j2]Weiwei Sun, Weibin Shi, Bole Shi, Yijun Yu:
A Cost-Efficient Scheduling Algorithm of On-Demand Broadcasts. Wirel. Networks 9(3): 239-247 (2003) - [c9]Yijun Yu, Jianguo Lu, Jing-Hao Xue, Yi Zhang, Weiwei Sun:
Localizing XML Documents through XSLT. Applied Informatics 2003: 1059-1064 - [c8]Yijun Yu, Homayoun Dayani-Fard, John Mylopoulos:
Removing false code dependencies to speedup software build processes. CASCON 2003: 343-352 - 2002
- [c7]Kristof Beyls, Erik H. D'Hollander, Yijun Yu:
Visualization Enables the Programmer to Reduce Cache Misses. IASTED PDCS 2002: 774-781 - 2001
- [j1]Yijun Yu, Erik H. D'Hollander:
Loop Parallelization using the 3D Iteration Space Visualizer. J. Vis. Lang. Comput. 12(2): 163-181 (2001) - [c6]Yijun Yu, Kristof Beyls, Erik H. D'Hollander:
Visualizing the Impact of the Cache on Program Execution. IV 2001: 336-341 - [c5]Weiwei Sun, Weibin Shi, Bole Shi, Wenyun Ji, Yijun Yu:
A self-adaptive scheduling algorithm of on-demand broadcasts. MSWiM 2001: 139-146 - 2000
- [c4]Yijun Yu, Erik H. D'Hollander:
Partitioning Loops with Variable Dependence Distances. ICPP 2000: 209-218
1990 – 1999
- 1999
- [c3]Yijun Yu:
A 3D-Java tool to visualize loop-carried dependences. PARCO 1999: 730-737 - [c2]Kristof Beyls, Erik H. D'Hollander, Yijun Yu:
JPT: A Java Parallelization Tool. PVM/MPI 1999: 173-180 - 1997
- [c1]Qi Wang, Yijun Yu, Erik H. D'Hollander:
Visualizing the Iteration Space in PEFPT. HPCN Europe 1997: 908-915
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-14 23:29 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint