Travelled to:
1 × Australia
1 × China
1 × Germany
1 × Japan
1 × Poland
1 × Switzerland
1 × The Netherlands
2 × Belgium
2 × Brazil
2 × France
2 × India
2 × Portugal
2 × Spain
2 × United Kingdom
3 × Hungary
5 × Italy
9 × USA
Collaborated with:
M.Wermelinger J.Mylopoulos B.Nuseibeh S.Butler J.Jürjens T.T.Tun W.Zhao H.Sharp X.Peng J.C.S.d.P.Leite A.Lapouchnian A.K.Bandara Y.Wang B.Chen S.Liaskos P.A.Akiki L.Montrieux J.Schreck N.D.Q.Bui L.Jiang H.Dayani-Fard P.Andritsos L.Liu R.C.Laney V.N.L.Franqueira E.S.K.Yu N.Niu A.Lozano M.Salifu S.M.Easterbrook C.B.Haley A.Sardinha A.Rashid T.Long Z.Jin N.A.Ernst T.Nguyen S.A.McIlraith L.Fu Z.Xing X.Tan A.G.Torres R.Therón F.J.G.Peñalvo R.Wieringa A.Tedeschi M.Jackson L.Pasquale M.Salehie L.Cavallaro Y.Lin Z.Hu S.Hidaka H.Kato P.Schobbens H.Toussaint W.Qian X.P.0001 J.S.0001 P.H.M.Maia L.Vieira M.Chagas A.Zisman B.A.Price I.Omoronyia J.Gu T.H.Tan J.Sun B.González-Baixauli W.Candillon G.Vanwormhoudt Y.Zou M.Littou
Talks about:
softwar (12) requir (10) base (10) system (7) evolut (7) secur (7) model (7) tool (7) name (7) goal (7)
Person: Yijun Yu
DBLP: Yu:Yijun
Facilitated 2 volumes:
Contributed to:
Wrote 54 papers:
- ICPC-2015-ButlerWY #java #overview
- A survey of the forms of Java reference names (SB, MW, YY), pp. 196–206.
- ICSME-2015-ButlerWY #java
- Investigating naming convention adherence in Java references (SB, MW, YY), pp. 41–50.
- MSR-2015-WermelingerY #architecture #dataset #evolution
- An Architectural Evolution Dataset (MW, YY), pp. 502–505.
- ICSE-2014-AkikiBY #adaptation #enterprise #user interface
- Integrating adaptive user interface capabilities in enterprise applications (PAA, AKB, YY), pp. 712–723.
- ICSE-2014-ChenPYNZ #adaptation #generative #incremental #model transformation #runtime #self
- Self-adaptation through incremental generative model transformations at runtime (BC, XP, YY, BN, WZ), pp. 676–687.
- MSR-2013-ButlerWYS #dataset #identifier #named
- INVocD: identifier name vocabulary dataset (SB, MW, YY, HS), pp. 405–408.
- RE-2013-PasqualeYSCTN #adaptation #forensics
- Requirements-driven adaptive digital forensics (LP, YY, MS, LC, TTT, BN), pp. 340–341.
- ICEIS-v3-2012-AkikiBY #adaptation #enterprise #modelling #runtime #user interface #using
- Using Interpreted Runtime Models for Devising Adaptive User Interfaces of Enterprise Applications (PAA, AKB, YY), pp. 72–77.
- ICSE-2012-YuLHHKM #bidirectional #invariant #maintenance #traceability
- Maintaining invariant traceability through bidirectional transformations (YY, YL, ZH, SH, HK, LM), pp. 540–550.
- RE-2012-FuPYMZ #monitoring #requirements #self
- Stateful requirements monitoring for self-repairing socio-technical systems (LF, XP, YY, JM, WZ), pp. 121–130.
- RE-2012-TunBPYHON #mobile #privacy #requirements
- Privacy arguments: Analysing selective disclosure requirements for mobile applications (TTT, AKB, BAP, YY, CBH, IO, BN), pp. 131–140.
- SAC-2012-SardinhaYNR #aspect-oriented #identification #named #traceability
- EA-tracer: identifying traceability links between code aspects and early aspects (AS, YY, NN, AR), pp. 1035–1042.
- ASE-2011-YuTN #detection #source code #specification
- Specifying and detecting meaningful changes in programs (YY, TTT, BN), pp. 273–282.
- ECOOP-2011-ButlerWYS #identifier
- Improving the Tokenisation of Identifier Names (SB, MW, YY, HS), pp. 130–154.
- ESEC-FSE-2011-MontrieuxWY #data access #specification #tool support #uml #verification
- Tool support for UML-based specification and verification of role-based access control properties (LM, MW, YY), pp. 456–459.
- ICSE-2011-PengXTYZ #feature model
- Iterative context-aware feature location (XP, ZX, XT, YY, WZ), pp. 900–903.
- ICSM-2011-ButlerWYS #java #mining
- Mining java class naming conventions (SB, MW, YY, HS), pp. 93–102.
- ICSM-2011-TorresTPWY #analysis #evolution #named #visual notation
- Maleku: An evolutionary visual software analysis tool for providing insights into software evolution (AGT, RT, FJGP, MW, YY), pp. 594–597.
- RE-2011-ChenPYZ #self #web
- Are your sites down? Requirements-driven self-tuning for the survivability of Web systems (BC, XP, YY, WZ), pp. 219–228.
- RE-2011-FranqueiraTYWN #security
- Risk and argument: A risk-based argumentation method for practical security (VNLF, TTT, YY, RW, BN), pp. 239–248.
- RE-2011-YuTTFN #named
- OpenArgue: Supporting argumentation to evolve secure software systems (YY, TTT, AT, VNLF, BN), pp. 351–352.
- ASE-2010-MontrieuxJHYST #code generation #tool support
- Tool support for code generation from a UMLsec property (LM, JJ, CBH, YY, PYS, HT), pp. 357–358.
- CSMR-2010-ButlerWYS #empirical #identifier #quality
- Exploring the Influence of Identifier Names on Code Quality: An Empirical Study (SB, MW, YY, HS), pp. 156–165.
- RE-2010-PengCYZ #feedback #self
- Self-Tuning of Software Systems Through Goal-based Feedback Loop Control (XP, BC, YY, WZ), pp. 104–107.
- GTTSE-2009-WermelingerY #evolution
- Some Issues in the “Archaeology” of Software Evolution (MW, YY), pp. 426–445.
- RE-2009-LongLYJ #approach #evaluation #requirements #security
- AVT Vector: A Quantitative Security Requirements Evaluation Approach Based on Assets, Vulnerabilities and Trustworthiness of Environment (TL, LL, YY, ZJ), pp. 377–378.
- RE-2009-TunJLNY #problem #using
- Are Your Lights Off? Using Problem Frames to Diagnose System Failures (TTT, MJ, RCL, BN, YY), pp. 343–348.
- REFSQ-2009-TunYLN #approach #identification #interactive #problem
- Early Identification of Problem Interactions: A Tool-Supported Approach (TTT, YY, RCL, BN), pp. 74–88.
- ASE-2008-YuJS #development #tool support #traceability
- Tools for Traceability in Secure Software Development (YY, JJ, JS), pp. 503–504.
- FASE-2008-JurjensSY #analysis #automation #security #using
- Automated Analysis of Permission-Based Security Using UMLsec (JJ, JS, YY), pp. 292–295.
- ICSM-2008-WermelingerYL #architecture #case study #design #evolution
- Design principles in architectural evolution: A case study (MW, YY, AL), pp. 396–405.
- ICSM-2008-YuJM #maintenance #traceability
- Traceability for the maintenance of secure software (YY, JJ, JM), pp. 297–306.
- MSR-2008-WermelingerY #eclipse #evolution #plugin
- Analyzing the evolution of eclipse plugins (MW, YY), pp. 133–136.
- RE-2008-ErnstMYN #evolution #lifecycle #requirements
- Supporting Requirements Model Evolution throughout the System Life-Cycle (NAE, JM, YY, TN), pp. 321–322.
- SAC-2008-YuLLM #configuration management
- Configuring features with stakeholder goals (YY, JCSdPL, AL, JM), pp. 645–649.
- WCRE-2008-YuW #comprehension #evolution #tool support
- Graph-Centric Tools for Understanding the Evolution and Relationships of Software Structures (YY, MW), pp. 329–330.
- ASE-2007-JurjensY #modelling #security #tool support
- Tools for model-based security engineering: models vs. code (JJ, YY), pp. 545–546.
- ASE-2007-WangMYM #approach #automation #monitoring #requirements
- An automated approach to monitoring and diagnosing requirements (YW, SAM, YY, JM), pp. 293–302.
- RE-2007-SalifuYN #monitoring #problem #specification
- Specifying Monitoring and Switching Problems in Context (MS, YY, BN), pp. 211–220.
- RE-2007-YuNGCMELV #aspect-oriented #validation
- Tracing and Validating Goal Aspects (YY, NN, BGB, WC, JM, SME, JCSdPL, GV), pp. 53–56.
- RE-2006-LiaskosLYYM #analysis #on the #variability
- On Goal-based Variability Acquisition and Analysis (SL, AL, YY, ESKY, JM), pp. 76–85.
- CAiSE-2005-LeiteYLYM #reuse
- Quality-Based Software Reuse (JCSdPL, YY, LL, ESKY, JM), pp. 535–550.
- FASE-2005-Dayani-FardYMA #architecture #c #c++ #legacy
- Improving the Build Architecture of Legacy C/C++ Software Systems (HDF, YY, JM, PA), pp. 96–110.
- ICSM-2005-YuDMA #evolution #scalability
- Reducing Build Time through Precompilations for Evolving Large Software (YY, HDF, JM, PA), pp. 59–68.
- RE-2005-LiaskosLWYE #approach #configuration management
- Configuring Common Personal Software: a Requirements-Driven Approach (SL, AL, YW, YY, SME), pp. 9–18.
- RE-2005-YuWMLLL #legacy #modelling #reverse engineering
- Reverse Engineering Goal Models from Legacy Code (YY, YW, JM, SL, AL, JCSdPL), pp. 363–372.
- WCRE-2005-YuMWLLZLL #named #requirements #reverse engineering
- RETR: Reverse Engineering to Requirements (YY, JM, YW, SL, AL, YZ, ML, JCSdPL), p. 234.
- RE-2004-YuLM #aspect-oriented #modelling #requirements
- From Goals to Aspects: Discovering Aspects from Requirements Goal Models (YY, JCSdPL, JM), pp. 38–47.
- WCRE-1999-ButlerWYS99a #empirical #identifier #quality
- Relating Identifier Naming Flaws and Code Quality: An Empirical Study (SB, MW, YY, HS), pp. 31–35.
- ASE-2016-PengGT0YNZ #composition #crowdsourcing #mobile #named
- CrowdService: serving the individuals through mobile crowdsourcing and service composition (XP, JG, THT, JS, YY, BN, WZ), pp. 214–219.
- ASE-2017-QianP0YNZ #collaboration #composition #social
- O2O service composition with social collaboration (WQ, XP0, JS0, YY, BN, WZ), pp. 451–461.
- ASE-2019-BuiYJ #named #network
- AutoFocus: Interpreting Attention-Based Neural Networks by Code Perturbation (NDQB, YY, LJ), pp. 38–41.
- ASE-2019-MaiaVCYZN #adaptation #component
- Cautious Adaptation of Defiant Components (PHMM, LV, MC, YY, AZ, BN), pp. 974–985.
- ESEC-FSE-2019-BuiYJ #api #learning #named
- SAR: learning cross-language API mappings with little knowledge (NDQB, YY, LJ), pp. 796–806.