BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
EDIT!
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
Travelled to:
1 × Australia
1 × China
1 × Germany
1 × Japan
1 × Poland
1 × Switzerland
1 × The Netherlands
2 × Belgium
2 × Brazil
2 × France
2 × India
2 × Portugal
2 × Spain
2 × United Kingdom
3 × Hungary
5 × Italy
9 × USA
Collaborated with:
M.Wermelinger J.Mylopoulos B.Nuseibeh S.Butler J.Jürjens T.T.Tun W.Zhao H.Sharp X.Peng J.C.S.d.P.Leite A.Lapouchnian A.K.Bandara Y.Wang B.Chen S.Liaskos P.A.Akiki L.Montrieux J.Schreck N.D.Q.Bui L.Jiang H.Dayani-Fard P.Andritsos L.Liu R.C.Laney V.N.L.Franqueira E.S.K.Yu N.Niu A.Lozano M.Salifu S.M.Easterbrook C.B.Haley A.Sardinha A.Rashid T.Long Z.Jin N.A.Ernst T.Nguyen S.A.McIlraith L.Fu Z.Xing X.Tan A.G.Torres R.Therón F.J.G.Peñalvo R.Wieringa A.Tedeschi M.Jackson L.Pasquale M.Salehie L.Cavallaro Y.Lin Z.Hu S.Hidaka H.Kato P.Schobbens H.Toussaint W.Qian X.P.0001 J.S.0001 P.H.M.Maia L.Vieira M.Chagas A.Zisman B.A.Price I.Omoronyia J.Gu T.H.Tan J.Sun B.González-Baixauli W.Candillon G.Vanwormhoudt Y.Zou M.Littou
Talks about:
softwar (12) requir (10) base (10) system (7) evolut (7) secur (7) model (7) tool (7) name (7) goal (7)

Person: Yijun Yu

DBLP DBLP: Yu:Yijun

Facilitated 2 volumes:

CSMR-WCRE 2014PrCo
ICMT 2012PrCo

Contributed to:

ICPC 20152015
ICSME 20152015
MSR 20152015
ICSE 20142014
MSR 20132013
RE 20132013
ICEIS v3 20122012
ICSE 20122012
RE 20122012
SAC 20122012
ASE 20112011
ECOOP 20112011
ESEC/FSE 20112011
ICSE 20112011
ICSM 20112011
RE 20112011
ASE 20102010
CSMR 20102010
RE 20102010
GTTSE 20092009
RE 20092009
REFSQ 20092009
ASE 20082008
FASE 20082008
ICSM 20082008
MSR 20082008
RE 20082008
SAC 20082008
WCRE 20082008
ASE 20072007
RE 20072007
RE 20062006
CAiSE 20052005
FASE 20052005
ICSM 20052005
RE 20052005
WCRE 20052005
RE 20042004
WCRE 20092009
ASE 20162016
ASE 20172017
ASE 20192019
ESEC/FSE 20192019

Wrote 54 papers:

ICPC-2015-ButlerWY #java #overview
A survey of the forms of Java reference names (SB, MW, YY), pp. 196–206.
ICSME-2015-ButlerWY #java
Investigating naming convention adherence in Java references (SB, MW, YY), pp. 41–50.
MSR-2015-WermelingerY #architecture #dataset #evolution
An Architectural Evolution Dataset (MW, YY), pp. 502–505.
ICSE-2014-AkikiBY #adaptation #enterprise #user interface
Integrating adaptive user interface capabilities in enterprise applications (PAA, AKB, YY), pp. 712–723.
ICSE-2014-ChenPYNZ #adaptation #generative #incremental #model transformation #runtime #self
Self-adaptation through incremental generative model transformations at runtime (BC, XP, YY, BN, WZ), pp. 676–687.
MSR-2013-ButlerWYS #dataset #identifier #named
INVocD: identifier name vocabulary dataset (SB, MW, YY, HS), pp. 405–408.
RE-2013-PasqualeYSCTN #adaptation #forensics
Requirements-driven adaptive digital forensics (LP, YY, MS, LC, TTT, BN), pp. 340–341.
ICEIS-v3-2012-AkikiBY #adaptation #enterprise #modelling #runtime #user interface #using
Using Interpreted Runtime Models for Devising Adaptive User Interfaces of Enterprise Applications (PAA, AKB, YY), pp. 72–77.
ICSE-2012-YuLHHKM #bidirectional #invariant #maintenance #traceability
Maintaining invariant traceability through bidirectional transformations (YY, YL, ZH, SH, HK, LM), pp. 540–550.
RE-2012-FuPYMZ #monitoring #requirements #self
Stateful requirements monitoring for self-repairing socio-technical systems (LF, XP, YY, JM, WZ), pp. 121–130.
RE-2012-TunBPYHON #mobile #privacy #requirements
Privacy arguments: Analysing selective disclosure requirements for mobile applications (TTT, AKB, BAP, YY, CBH, IO, BN), pp. 131–140.
SAC-2012-SardinhaYNR #aspect-oriented #identification #named #traceability
EA-tracer: identifying traceability links between code aspects and early aspects (AS, YY, NN, AR), pp. 1035–1042.
ASE-2011-YuTN #detection #source code #specification
Specifying and detecting meaningful changes in programs (YY, TTT, BN), pp. 273–282.
ECOOP-2011-ButlerWYS #identifier
Improving the Tokenisation of Identifier Names (SB, MW, YY, HS), pp. 130–154.
ESEC-FSE-2011-MontrieuxWY #data access #specification #tool support #uml #verification
Tool support for UML-based specification and verification of role-based access control properties (LM, MW, YY), pp. 456–459.
ICSE-2011-PengXTYZ #feature model
Iterative context-aware feature location (XP, ZX, XT, YY, WZ), pp. 900–903.
ICSM-2011-ButlerWYS #java #mining
Mining java class naming conventions (SB, MW, YY, HS), pp. 93–102.
ICSM-2011-TorresTPWY #analysis #evolution #named #visual notation
Maleku: An evolutionary visual software analysis tool for providing insights into software evolution (AGT, RT, FJGP, MW, YY), pp. 594–597.
RE-2011-ChenPYZ #self #web
Are your sites down? Requirements-driven self-tuning for the survivability of Web systems (BC, XP, YY, WZ), pp. 219–228.
RE-2011-FranqueiraTYWN #security
Risk and argument: A risk-based argumentation method for practical security (VNLF, TTT, YY, RW, BN), pp. 239–248.
RE-2011-YuTTFN #named
OpenArgue: Supporting argumentation to evolve secure software systems (YY, TTT, AT, VNLF, BN), pp. 351–352.
ASE-2010-MontrieuxJHYST #code generation #tool support
Tool support for code generation from a UMLsec property (LM, JJ, CBH, YY, PYS, HT), pp. 357–358.
CSMR-2010-ButlerWYS #empirical #identifier #quality
Exploring the Influence of Identifier Names on Code Quality: An Empirical Study (SB, MW, YY, HS), pp. 156–165.
RE-2010-PengCYZ #feedback #self
Self-Tuning of Software Systems Through Goal-based Feedback Loop Control (XP, BC, YY, WZ), pp. 104–107.
GTTSE-2009-WermelingerY #evolution
Some Issues in the “Archaeology” of Software Evolution (MW, YY), pp. 426–445.
RE-2009-LongLYJ #approach #evaluation #requirements #security
AVT Vector: A Quantitative Security Requirements Evaluation Approach Based on Assets, Vulnerabilities and Trustworthiness of Environment (TL, LL, YY, ZJ), pp. 377–378.
RE-2009-TunJLNY #problem #using
Are Your Lights Off? Using Problem Frames to Diagnose System Failures (TTT, MJ, RCL, BN, YY), pp. 343–348.
REFSQ-2009-TunYLN #approach #identification #interactive #problem
Early Identification of Problem Interactions: A Tool-Supported Approach (TTT, YY, RCL, BN), pp. 74–88.
ASE-2008-YuJS #development #tool support #traceability
Tools for Traceability in Secure Software Development (YY, JJ, JS), pp. 503–504.
FASE-2008-JurjensSY #analysis #automation #security #using
Automated Analysis of Permission-Based Security Using UMLsec (JJ, JS, YY), pp. 292–295.
ICSM-2008-WermelingerYL #architecture #case study #design #evolution
Design principles in architectural evolution: A case study (MW, YY, AL), pp. 396–405.
ICSM-2008-YuJM #maintenance #traceability
Traceability for the maintenance of secure software (YY, JJ, JM), pp. 297–306.
MSR-2008-WermelingerY #eclipse #evolution #plugin
Analyzing the evolution of eclipse plugins (MW, YY), pp. 133–136.
RE-2008-ErnstMYN #evolution #lifecycle #requirements
Supporting Requirements Model Evolution throughout the System Life-Cycle (NAE, JM, YY, TN), pp. 321–322.
SAC-2008-YuLLM #configuration management
Configuring features with stakeholder goals (YY, JCSdPL, AL, JM), pp. 645–649.
WCRE-2008-YuW #comprehension #evolution #tool support
Graph-Centric Tools for Understanding the Evolution and Relationships of Software Structures (YY, MW), pp. 329–330.
ASE-2007-JurjensY #modelling #security #tool support
Tools for model-based security engineering: models vs. code (JJ, YY), pp. 545–546.
ASE-2007-WangMYM #approach #automation #monitoring #requirements
An automated approach to monitoring and diagnosing requirements (YW, SAM, YY, JM), pp. 293–302.
RE-2007-SalifuYN #monitoring #problem #specification
Specifying Monitoring and Switching Problems in Context (MS, YY, BN), pp. 211–220.
RE-2007-YuNGCMELV #aspect-oriented #validation
Tracing and Validating Goal Aspects (YY, NN, BGB, WC, JM, SME, JCSdPL, GV), pp. 53–56.
RE-2006-LiaskosLYYM #analysis #on the #variability
On Goal-based Variability Acquisition and Analysis (SL, AL, YY, ESKY, JM), pp. 76–85.
CAiSE-2005-LeiteYLYM #reuse
Quality-Based Software Reuse (JCSdPL, YY, LL, ESKY, JM), pp. 535–550.
FASE-2005-Dayani-FardYMA #architecture #c #c++ #legacy
Improving the Build Architecture of Legacy C/C++ Software Systems (HDF, YY, JM, PA), pp. 96–110.
ICSM-2005-YuDMA #evolution #scalability
Reducing Build Time through Precompilations for Evolving Large Software (YY, HDF, JM, PA), pp. 59–68.
RE-2005-LiaskosLWYE #approach #configuration management
Configuring Common Personal Software: a Requirements-Driven Approach (SL, AL, YW, YY, SME), pp. 9–18.
RE-2005-YuWMLLL #legacy #modelling #reverse engineering
Reverse Engineering Goal Models from Legacy Code (YY, YW, JM, SL, AL, JCSdPL), pp. 363–372.
WCRE-2005-YuMWLLZLL #named #requirements #reverse engineering
RETR: Reverse Engineering to Requirements (YY, JM, YW, SL, AL, YZ, ML, JCSdPL), p. 234.
RE-2004-YuLM #aspect-oriented #modelling #requirements
From Goals to Aspects: Discovering Aspects from Requirements Goal Models (YY, JCSdPL, JM), pp. 38–47.
WCRE-1999-ButlerWYS99a #empirical #identifier #quality
Relating Identifier Naming Flaws and Code Quality: An Empirical Study (SB, MW, YY, HS), pp. 31–35.
ASE-2016-PengGT0YNZ #composition #crowdsourcing #mobile #named
CrowdService: serving the individuals through mobile crowdsourcing and service composition (XP, JG, THT, JS, YY, BN, WZ), pp. 214–219.
ASE-2017-QianP0YNZ #collaboration #composition #social
O2O service composition with social collaboration (WQ, XP0, JS0, YY, BN, WZ), pp. 451–461.
ASE-2019-BuiYJ #named #network
AutoFocus: Interpreting Attention-Based Neural Networks by Code Perturbation (NDQB, YY, LJ), pp. 38–41.
ASE-2019-MaiaVCYZN #adaptation #component
Cautious Adaptation of Defiant Components (PHMM, LV, MC, YY, AZ, BN), pp. 974–985.
ESEC-FSE-2019-BuiYJ #api #learning #named
SAR: learning cross-language API mappings with little knowledge (NDQB, YY, LJ), pp. 796–806.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.