关注
Qiusong Yang
Qiusong Yang
Institute of Software, Chinese Academy of Sciencies
在 iscas.ac.cn 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Dynadiffuse: A dynamic diffusion model for continuous time constrained influence maximization
M Xie, Q Yang, Q Wang, G Cong, G Melo
Proceedings of the AAAI Conference on Artificial Intelligence 29 (1), 2015
372015
A cut-off approach for bounded verification of parameterized systems
Q Yang, M Li
Proceedings of the 32nd ACM/IEEE International Conference on Software …, 2010
252010
Value-based multiple software projects scheduling with genetic algorithm
J Xiao, Q Wang, M Li, Q Yang, L Xie, D Liu
Trustworthy Software Development Processes: International Conference on …, 2009
202009
Designing and modeling of covert channels in operating systems
Y Lin, SUR Malik, K Bilal, Q Yang, Y Wang, SU Khan
IEEE Transactions on Computers 65 (6), 1706-1719, 2015
192015
An algebraic approach for managing inconsistencies in software processes
Q Yang, M Li, Q Wang, G Yang, J Zhai, J Li, L Hou, Y Yang
International Conference on Software Process, 121-133, 2007
182007
Merging similar patterns for hardware prefetching
S Jiang, Q Yang, Y Ci
2022 55th IEEE/ACM International Symposium on Microarchitecture (MICRO …, 2022
152022
Systematic review of software process modeling and analysis
MS Li, QS Yang, J Zhai
Journal of Software 20 (3), 524-545, 2009
142009
Evaluation of the capability of personal software process based on data envelopment analysis
L Ding, Q Yang, L Sun, J Tong, Y Wang
Software Process Workshop, 235-248, 2005
132005
A vertex centric parallel algorithm for linear temporal logic model checking in Pregel
M Xie, Q Yang, J Zhai, Q Wang
Journal of Parallel and Distributed Computing 74 (11), 3161-3174, 2014
122014
Stochastic process algebra based software process simulation modeling
J Zhai, Q Yang, F Su, J Xiao, Q Wang, M Li
International Conference on Software Process, 136-147, 2009
122009
Value-risk trade-off analysis for iteration planning in extreme programming
X Dong, QS Yang, Q Wang, J Zhai, G Ruhe
2011 18th Asia-Pacific Software Engineering Conference, 397-404, 2011
92011
A secure and rapid response architecture for virtual machine migration from an untrusted hypervisor to a trusted one
T Wu, Q Yang, Y He
Frontiers of Computer Science 11, 821-835, 2017
82017
Behaviorki: behavior pattern based runtime integrity checking for operating system kernel
X Feng, Q Yang, L Shi, Q Wang
2018 IEEE International Conference on Software Quality, Reliability and …, 2018
72018
Creating Process-Agents incrementally by mining process asset library
H Huang, J Xiao, Q Yang, Q Wang, H Wu
Information Sciences 233, 183-199, 2013
62013
Real-time performance evaluation of embedded operating system in aerospace
JL Dong, YF Li, QS Yang, J Zhai
Computer Engineering and Design 34 (1), 114-120, 2013
52013
On mobility of software processes
M Li, Q Yang, J Zhai, G Yang
Software Process Workshop, 105-114, 2006
52006
automated process quality assurance for distributed software development
J Zhai, Q Yang, Y Yang, J Xiao, Q Wang, M Li
Software Engineering Approaches for Offshore and Outsourced Development …, 2009
42009
Predicting Lemmas in Generalization of IC3
Y Su, Q Yang, Y Ci
Proceedings of the 61st ACM/IEEE Design Automation Conference, 1-6, 2024
32024
Matryoshka: A Coalesced Delta Sequence Prefetcher
S Jiang, Y Ci, Q Yang, M Li
Proceedings of the 50th International Conference on Parallel Processing, 1-11, 2021
32021
PMU-extended Hardware ROP Attack Detection
W Li, M Li, Y Ma, Q Yang
2018 12th IEEE International Conference on Anti-counterfeiting, Security …, 2018
22018
系统目前无法执行此操作,请稍后再试。
文章 1–20