Travelled to:
1 × Australia
1 × Canada
1 × China
1 × France
1 × Germany
1 × Portugal
1 × Sweden
1 × The Netherlands
1 × United Kingdom
6 × USA
Collaborated with:
E.S.K.Yu J.Mylopoulos R.Jin Z.Jin C.Chi H.Xie F.Peng Y.Yu W.Ma H.Zhang C.C.Aggarwal T.Li Y.Xiang J.Yang J.Yuan F.Li J.Horkoff A.Borgida G.Guizzardi B.Ding H.Wang T.Long M.Su H.Wang J.Sun F.Liu H.Zhang J.Yin J.C.S.d.P.Leite A.Fuxman M.Pistore M.Roveri R.S.S.Guizzardi Y.Shan J.Xu T.Burda R.Lu G.Fan G.Chen X.Xun S.Wang
Talks about:
requir (9) base (6) prefer (3) understand (2) uncertain (2) approach (2) qualiti (2) analysi (2) system (2) social (2)
Person: Lin Liu
DBLP: Liu:Lin
Contributed to:
Wrote 19 papers:
- REFSQ-2015-LiHBG0M #refinement #requirements #specification
- From Stakeholder Requirements to Formal Specifications Through Refinement (FLL, JH, AB, GG, LL, JM), pp. 164–180.
- RE-2014-LiHMGGB0 #non-functional #ontology #requirements
- Non-functional requirements as qualities, with a spice of ontology (FLL, JH, JM, RSSG, GG, AB, LL), pp. 293–302.
- CAiSE-2011-SunLZLY #comprehension
- Understanding the Diversity of Services Based on Users’ Identities (JS, FL, HZ, LL, ESKY), pp. 612–626.
- KDD-2011-JinLA #graph #nondeterminism #reliability
- Discovering highly reliable subgraphs in uncertain graphs (RJ, LL, CCA), pp. 992–1000.
- VLDB-2011-JinLDW #constraints #graph #nondeterminism #reachability
- Distance-Constraint Reachability Computation in Uncertain Graphs (RJ, LL, BD, HW), pp. 551–562.
- RE-2010-LiuLP #overview #requirements #why
- Why Requirements Engineering Fails: A Survey Report from China (LL, TL, FP), pp. 317–322.
- CAiSE-2009-MaLXZY #modelling
- Preference Model Driven Services Selection (WM, LL, HX, HZ, JY), pp. 216–230.
- KDD-2009-JinXL #representation #set
- Cartesian contour: a concise representation for a collection of frequent sets (RJ, YX, LL), pp. 417–426.
- RE-2009-LiuZPMSXB #comprehension #requirements
- Understanding Chinese Characteristics of Requirements Engineering (LL, HZ, FP, WM, YS, JX, TB), pp. 261–266.
- RE-2009-LongLYJ #approach #evaluation #requirements #security
- AVT Vector: A Quantitative Security Requirements Evaluation Approach Based on Assets, Vulnerabilities and Trustworthiness of Environment (TL, LL, YY, ZJ), pp. 377–378.
- SAC-2009-XieLY #elicitation #optimisation #process #requirements
- i*-prefer: optimizing requirements elicitation process based on actor preferences (HX, LL, JY), pp. 347–354.
- RE-2006-LiuJ #analysis #problem #requirements
- Integrating Goals and Problem Frames in Requirements Analysis (LL, ZJ), pp. 342–343.
- SEKE-2006-ChiSLW #peer-to-peer
- AN.P2P — an Active Peer-to-peer System (CHC, MS, LL, HW), pp. 607–612.
- SEKE-2006-ChiYL #how #question #web
- Web Object Cacheability How Much Do We Know? (CHC, JLY, LL), pp. 252–255.
- CAiSE-2005-LeiteYLYM #reuse
- Quality-Based Software Reuse (JCSdPL, YY, LL, ESKY, JM), pp. 535–550.
- RE-2003-FuxmanLPRM #requirements #specification
- Specifying and Analyzing Early Requirements: Some Experimental Results (AF, LL, MP, MR, JM), p. 105–?.
- RE-2003-LiuYM #analysis #privacy #requirements #security #social
- Security and Privacy Requirements Analysis within a Social Setting (LL, ESKY, JM), pp. 151–161.
- CAiSE-2002-LiuY #approach #design #social
- Designing Web-Based Systems in Social Context: A Goal and Scenario Based Approach (LL, ESKY), pp. 37–51.
- TOOLS-ASIA-1998-LuJLFCXW #domain model #modelling #named
- OSNET — A Language for Domain Modeling (RL, ZJ, LL, GF, GC, XX, SW), p. 83–?.