Dynadiffuse: A dynamic diffusion model for continuous time constrained influence maximization M Xie, Q Yang, Q Wang, G Cong, G Melo Proceedings of the AAAI Conference on Artificial Intelligence 29 (1), 2015 | 37 | 2015 |
A cut-off approach for bounded verification of parameterized systems Q Yang, M Li Proceedings of the 32nd ACM/IEEE International Conference on Software …, 2010 | 25 | 2010 |
Value-based multiple software projects scheduling with genetic algorithm J Xiao, Q Wang, M Li, Q Yang, L Xie, D Liu Trustworthy Software Development Processes: International Conference on …, 2009 | 20 | 2009 |
Designing and modeling of covert channels in operating systems Y Lin, SUR Malik, K Bilal, Q Yang, Y Wang, SU Khan IEEE Transactions on Computers 65 (6), 1706-1719, 2015 | 19 | 2015 |
An algebraic approach for managing inconsistencies in software processes Q Yang, M Li, Q Wang, G Yang, J Zhai, J Li, L Hou, Y Yang International Conference on Software Process, 121-133, 2007 | 18 | 2007 |
Merging similar patterns for hardware prefetching S Jiang, Q Yang, Y Ci 2022 55th IEEE/ACM International Symposium on Microarchitecture (MICRO …, 2022 | 15 | 2022 |
Systematic review of software process modeling and analysis MS Li, QS Yang, J Zhai Journal of Software 20 (3), 524-545, 2009 | 14 | 2009 |
Evaluation of the capability of personal software process based on data envelopment analysis L Ding, Q Yang, L Sun, J Tong, Y Wang Software Process Workshop, 235-248, 2005 | 13 | 2005 |
A vertex centric parallel algorithm for linear temporal logic model checking in Pregel M Xie, Q Yang, J Zhai, Q Wang Journal of Parallel and Distributed Computing 74 (11), 3161-3174, 2014 | 12 | 2014 |
Stochastic process algebra based software process simulation modeling J Zhai, Q Yang, F Su, J Xiao, Q Wang, M Li International Conference on Software Process, 136-147, 2009 | 12 | 2009 |
Value-risk trade-off analysis for iteration planning in extreme programming X Dong, QS Yang, Q Wang, J Zhai, G Ruhe 2011 18th Asia-Pacific Software Engineering Conference, 397-404, 2011 | 9 | 2011 |
A secure and rapid response architecture for virtual machine migration from an untrusted hypervisor to a trusted one T Wu, Q Yang, Y He Frontiers of Computer Science 11, 821-835, 2017 | 8 | 2017 |
Behaviorki: behavior pattern based runtime integrity checking for operating system kernel X Feng, Q Yang, L Shi, Q Wang 2018 IEEE International Conference on Software Quality, Reliability and …, 2018 | 7 | 2018 |
Creating Process-Agents incrementally by mining process asset library H Huang, J Xiao, Q Yang, Q Wang, H Wu Information Sciences 233, 183-199, 2013 | 6 | 2013 |
Real-time performance evaluation of embedded operating system in aerospace JL Dong, YF Li, QS Yang, J Zhai Computer Engineering and Design 34 (1), 114-120, 2013 | 5 | 2013 |
On mobility of software processes M Li, Q Yang, J Zhai, G Yang Software Process Workshop, 105-114, 2006 | 5 | 2006 |
automated process quality assurance for distributed software development J Zhai, Q Yang, Y Yang, J Xiao, Q Wang, M Li Software Engineering Approaches for Offshore and Outsourced Development …, 2009 | 4 | 2009 |
Predicting Lemmas in Generalization of IC3 Y Su, Q Yang, Y Ci Proceedings of the 61st ACM/IEEE Design Automation Conference, 1-6, 2024 | 3 | 2024 |
Matryoshka: A Coalesced Delta Sequence Prefetcher S Jiang, Y Ci, Q Yang, M Li Proceedings of the 50th International Conference on Parallel Processing, 1-11, 2021 | 3 | 2021 |
PMU-extended Hardware ROP Attack Detection W Li, M Li, Y Ma, Q Yang 2018 12th IEEE International Conference on Anti-counterfeiting, Security …, 2018 | 2 | 2018 |