default search action
Jianwen Xiang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j33]Siwei Zhou, Zhao Li, Jianwen Xiang:
Reliability analysis of dynamic fault trees with Priority-AND gates using conditional binary decision diagrams. Reliab. Eng. Syst. Saf. 253: 110495 (2025) - 2024
- [j32]Xiao Yu, Jiqing Rao, Lei Liu, Guancheng Lin, Wenhua Hu, Jacky Wai Keung, Junwei Zhou, Jianwen Xiang:
Improving effort-aware defect prediction by directly learning to rank software modules. Inf. Softw. Technol. 165: 107250 (2024) - [j31]Wiraj Udara Wickramaarachchi, Dongdong Zhao, Junwei Zhou, Jianwen Xiang:
An effective iris biometric privacy protection scheme with renewability. J. Inf. Secur. Appl. 80: 103684 (2024) - [j30]Qianrong Zheng, Jianwen Xiang, Rui Hao, Xuemin Zhang, Songsong Liao, Dongdong Zhao:
A cancellable iris template protection scheme based on inverse merger and Bloom filter. J. Inf. Secur. Appl. 85: 103849 (2024) - [j29]Chen Zhang, Jianwen Xiang, Rui Hao, Wenhua Hu, Domenico Cotroneo, Roberto Natella, Roberto Pietrantuono:
SGT: Aging-related bug prediction via semantic feature learning based on graph-transformer. J. Syst. Softw. 217: 112156 (2024) - [j28]Kai Jia, Xiao Yu, Chen Zhang, Wenzhi Xie, Dongdong Zhao, Jianwen Xiang:
PMTT: Parallel multi-scale temporal convolution network and transformer for predicting the time to aging failure of software systems. J. Syst. Softw. 217: 112167 (2024) - [j27]Kai Jia, Xiao Yu, Chen Zhang, Wenzhi Xie, Dongdong Zhao, Jianwen Xiang:
TTAFPred: Prediction of time to aging failure for software systems based on a two-stream multi-scale features fusion network. Softw. Qual. J. 32(4): 1481-1513 (2024) - [c99]Lihao Wang, Junwei Zhou, Dongdong Zhao, Dongqing Liao, Mengjie Wang, Jianwen Xiang:
AEDD: Anomaly Edge Detection Defense for Visual Recognition in Autonomous Vehicle Systems. CSCWD 2024: 1722-1727 - [c98]Jianwen Xiang, Xuemin Zhang, Qianrong Zheng, Longmin Deng, Dongdong Zhao, Junwei Zhou:
CIDF: Combined Intrusion Detection Framework in Industrial Control Systems based on Packet Signature and Enhanced FSFDP. Internetware 2024 - [c97]Chuqi Guo, Yu Lin, Ling Dong, Zhijie Feng, Luyao Ye, Wenhua Hu, Siwei Zhou, Jianwen Xiang:
Reliability Analysis of Man-Machine Systems Considering Imperfect Error Coverage Model. ISSRE (Workshops) 2024: 385-390 - [c96]Dongdong Zhao, Zizhuo Yu, Jing Zhou, Jianwen Xiang:
A Privacy-Preserving Source Code Vulnerability Detection Method. PRCV (3) 2024: 438-452 - [c95]Zhijie Feng, Yu Lin, Chuqi Guo, Jianwen Xiang:
A Human-Machine Intervention Model of Autonomous Driving Vehicle. QRS Companion 2024: 544-553 - 2023
- [j26]Jacky Wai Keung, Leonardo Mariani, Jianwen Xiang, Xiao Yu:
ISSRE 2021 special section. Inf. Softw. Technol. 159: 107227 (2023) - [j25]Junwei Zhou, Botian Lei, Huile Lang, Emmanouil Panaousis, Kaitai Liang, Jianwen Xiang:
Secure genotype imputation using homomorphic encryption. J. Inf. Secur. Appl. 72: 103386 (2023) - [j24]Dongdong Zhao, Lei Liao, Wenjian Luo, Jianwen Xiang, Hao Jiang, Xiaoyi Hu:
Generating Random SAT Instances: Multiple Solutions could be Predefined and Deeply Hidden. J. Artif. Intell. Res. 76: 435-470 (2023) - [j23]Kai Jia, Xiao Yu, Chen Zhang, Wenhua Hu, Dongdong Zhao, Jianwen Xiang:
Software Aging Prediction for Cloud Services Using a Gate Recurrent Unit Neural Network Model Based on Time Series Decomposition. IEEE Trans. Emerg. Top. Comput. 11(3): 580-593 (2023) - [c94]Longmin Deng, Xuemin Zhang, Qianrong Zheng, Dongdong Zhao, Junwei Zhou, Jianwen Xiang:
A New Dataset for Intrusion Detection in Industrial Control System: A Gas Pipeline Testbed Study. ISPA/BDCloud/SocialCom/SustainCom 2023: 887-892 - [c93]Meng Zhao, Zhu Di, Zhe Xia, Jing Tian, Jianwen Xiang, Lin Jun:
OWETC: Open world encrypted traffic classification based on semi-supervised class incremental learning. ISPA/BDCloud/SocialCom/SustainCom 2023: 1089-1096 - [c92]Dongdong Zhao, Songsong Liao, Huanhuan Li, Jianwen Xiang:
Competitor Attack Model for Privacy-Preserving Deep Learning. CCGridW 2023: 133-140 - [c91]Jun Xiang, Jianwen Xiang, Guanjie Li, Yongsheng Wang, Liping Lu:
A Hybrid Deep Learning Model Considering External Factors for Accurate Short-Term Traffic Flow Prediction. CNIOT 2023: 607-613 - [c90]Wenhua Hu, Lei Liu, Peixin Yang, Kuan Zou, Jiajun Li, Guancheng Lin, Jianwen Xiang:
Revisiting "code smell severity classification using machine learning techniques". COMPSAC 2023: 840-849 - [c89]Dongdong Zhao, Ying Chen, Jianwen Xiang, Huanhuan Li:
DLMT: Outsourcing Deep Learning with Privacy Protection Based on Matrix Transformation. CSCWD 2023: 1384-1389 - [c88]Peixin Yang, Lin Zhu, Wenhua Hu, Jacky Wai Keung, Liping Lu, Jianwen Xiang:
The Impact of the bug number on Effort-Aware Defect Prediction: An Empirical Study. Internetware 2023: 67-78 - [c87]Xiaolei Yu, Kai Jia, Wenhua Hu, Jing Tian, Jianwen Xiang:
Black-Box Test Case Prioritization Using Log Analysis and Test Case Diversity. ISSREW 2023: 186-191 - [c86]Wenzhi Xie, Chen Zhang, Kai Jia, Dongdong Zhao, Junwei Zhou, Jing Tian, Jianwen Xiang:
Cross-Project Aging-Related Bug Prediction Based on Feature Transfer and Class Imbalance Learning. ISSREW 2023: 206-213 - [c85]Chen Zhang, Shuo Feng, Wenzhi Xie, Dongdong Zhao, Jianwen Xiang, Roberto Pietrantuono, Roberto Natella, Domenico Cotroneo:
IFCM: An improved Fuzzy C-means clustering method to handle Class Overlap on Aging-related Software Bug Prediction. ISSRE 2023: 590-600 - [c84]Dongdong Zhao, Hucheng Liao, Songsong Liao, Huanhuan Li, Jianwen Xiang:
Cancelable Iris Biometrics Based on Transformation Network. QRS 2023: 507-516 - 2022
- [j22]Siwei Zhou, Luyao Ye, Shengwu Xiong, Jianwen Xiang:
Reliability analysis of dynamic fault trees with Priority-AND gates based on irrelevance coverage model. Reliab. Eng. Syst. Saf. 224: 108553 (2022) - [j21]Jianwen Xiang, Zixiang Wang, Chuanli Wu, Dongdong Zhao, Jing Tian:
Optimal redundancies of parallel-series systems in irrelevancy coverage model. Reliab. Eng. Syst. Saf. 225: 108567 (2022) - [j20]Junwei Zhou, Yijia Qian, Qingtian Zou, Peng Liu, Jianwen Xiang:
DeepSyslog: Deep Anomaly Detection on Syslog Using Sentence Embedding and Metadata. IEEE Trans. Inf. Forensics Secur. 17: 3051-3061 (2022) - [c83]Dongdong Zhao, Pingchuan Zhang, Jianwen Xiang, Jing Tian:
NegDL: Privacy-preserving Deep Learning Based on Negative Database. ICDIS 2022: 118-126 - [c82]Yancai Zhou, Chen Zhang, Kai Jia, Dongdong Zhao, Jianwen Xiang:
A Software Aging-Related Bug Prediction Framework Based on Deep Learning and Weakly Supervised Oversampling. ISSRE Workshops 2022: 185-192 - [c81]Kai Jia, Xiao Yu, Chen Zhang, Wenhua Hu, Dongdong Zhao, Jianwen Xiang:
The Impact of Software Aging and Rejuvenation on the User Experience for Android System. ISSRE 2022: 435-445 - [c80]Kangning Song, Siwei Zhou, Luyao Ye, Piaoyi Liu, Jing Tian, Jianwen Xiang:
Reliability Analysis of Multi-State System Based on Irrelevance Coverage Model. PRDC 2022: 184-193 - [c79]Dongdong Zhao, Zhao Wang, Huanhuan Li, Jianwen Xiang:
GAN-Based Privacy-Preserving Unsupervised Domain Adaptation. QRS 2022: 117-126 - [c78]Longmin Deng, Dongdong Zhao, Junwei Zhou, Zhe Xia, Jianwen Xiang:
CBSDI: Cross-Architecture Binary Code Similarity Detection based on Index Table. QRS 2022: 527-536 - 2021
- [j19]Dongdong Zhao, Xiaoyi Hu, Shengwu Xiong, Jing Tian, Jianwen Xiang, Jing Zhou, Huanhuan Li:
k-means clustering and kNN classification based on negative databases. Appl. Soft Comput. 110: 107732 (2021) - [j18]Luyao Ye, Dongdong Zhao, Jianwen Xiang, Laura Carnevali, Enrico Vicario:
Quantitative Analysis of the Dynamic Relevance of Systems. IEEE Trans. Reliab. 70(1): 82-98 (2021) - [j17]Lin Li, Mengjing Zhang, Zhaohui Chao, Jianwen Xiang:
Using context information to enhance simple question answering. World Wide Web 24(1): 249-277 (2021) - [c77]Mengting Liang, Dimeng Li, Bin Xu, Dongdong Zhao, Xiao Yu, Jianwen Xiang:
Within-Project Software Aging Defect Prediction Based on Active Learning. ISSRE Workshops 2021: 1-8 - [c76]Piaoyi Liu, Siwei Zhou, Luyao Ye, Dongdong Zhao, Jianwen Xiang:
A Combinatorial Reliability Analysis of Dynamic Fault Trees with Priority-AND Gates. ISSRE Workshops 2021: 182-188 - [c75]Chuanli Wu, Zixiang Wang, Siwei Zhou, Dongdong Zhao, Jing Tian, Jianwen Xiang:
Reliability Analysis of Systems Subject to Imperfect Fault Coverage Considering Failure Propagation and Component Relevancy. ISSRE Workshops 2021: 210-217 - [c74]Luyao Ye, Erqing Li, Dongdong Zhao, Shengwu Xiong, Siwei Zhou, Jianwen Xiang:
An Efficient Approximation for Quantitative Analysis of Dynamic Fault Trees. ISSRE 2021: 242-252 - [c73]Dimeng Li, Mengting Liang, Bin Xu, Xiao Yu, Junwei Zhou, Jianwen Xiang:
A Cross-Project Aging-Related Bug Prediction Approach Based on Joint Probability Domain Adaptation and k-means SMOTE. QRS Companion 2021: 350-358 - [c72]Jiqing Rao, Xiao Yu, Chen Zhang, Junwei Zhou, Jianwen Xiang:
Learning to rank software modules for effort-aware defect prediction. QRS Companion 2021: 372-380 - [c71]Zixiang Wang, Siwei Zhou, Dongdong Zhao, Jianwen Xiang:
Reliability-redundancy allocation problem considering imperfect fault coverage. QRS 2021: 394-403 - [e1]Zhi Jin, Xuandong Li, Jianwen Xiang, Leonardo Mariani, Ting Liu, Xiao Yu, Nahgmeh Ivaki:
32nd IEEE International Symposium on Software Reliability Engineering, ISSRE 2021, Wuhan, China, October 25-28, 2021. IEEE 2021, ISBN 978-1-6654-2587-2 [contents] - [i2]Dongdong Zhao, Pingchuan Zhang, Jianwen Xiang, Jing Tian:
NegDL: Privacy-Preserving Deep Learning Based on Negative Database. CoRR abs/2103.05854 (2021) - 2020
- [j16]Siwei Zhou, Jianwen Xiang, W. Eric Wong:
Reliability analysis of dynamic fault trees with spare gates using conditional binary decision diagrams. J. Syst. Softw. 170: 110766 (2020) - [j15]Zhongwei Xie, Lin Li, Xian Zhong, Luo Zhong, Jianwen Xiang:
Image-to-video person re-identification with cross-modal embeddings. Pattern Recognit. Lett. 133: 70-76 (2020) - [j14]Jianwen Xiang, Caisheng Weng, Dongdong Zhao, Artur Andrzejak, Shengwu Xiong, Lin Li, Jing Tian:
Software aging and rejuvenation in android: new models and metrics. Softw. Qual. J. 28(1): 85-106 (2020) - [j13]Abdeldjalil Saidani, Jianwen Xiang, Deloula Mansouri:
A Lossless Compression Approach Based on Delta Encoding and T-RLE in WSNs. Wirel. Commun. Mob. Comput. 2020: 8824954:1-8824954:10 (2020) - [c70]Qinchen Liu, Jianwen Xiang, Bin Xu, Dongdong Zhao, Wenhua Hu, Jian Wang:
Aging-Related Bugs Prediction Via Convolutional Neural Network. DSA 2020: 90-98 - [c69]Zhibin Zhang, Dian Zhou, Jiqing Rao, Dongdong Zhao, Wenhua Hu, Jianwen Xiang, Zhongjin Liu, Yanzhen Xing:
VSFBS: Vulnerability Search in Firmware Based on String. DSA 2020: 555-563 - [c68]Junwei Zhou, Ke Shu, Peng Liu, Jianwen Xiang, Shengwu Xiong:
Face Anti-Spoofing Based on Dynamic Color Texture Analysis Using Local Directional Number Pattern. ICPR 2020: 4221-4228 - [c67]Bin Xu, Dongdong Zhao, Kai Jia, Junwei Zhou, Jing Tian, Jianwen Xiang:
Cross-Project Aging-Related Bug Prediction Based on Joint Distribution Adaptation and Improved Subclass Discriminant Analysis. ISSRE 2020: 325-334 - [c66]Dongdong Zhao, Xiaoyan Zhou, Jianwen Xiang, Wenjian Luo:
NDBIris with Better Unlinkability. SSCI 2020: 2948-2956
2010 – 2019
- 2019
- [j12]Yousif A. Alhaj, Jianwen Xiang, Dongdong Zhao, Mohammed Abdulaziz Aide Al-qaness, Mohamed E. Abd Elaziz, Abdelghani Dahou:
A Study of the Effects of Stemming Strategies on Arabic Document Classification. IEEE Access 7: 32664-32671 (2019) - [j11]Dongdong Zhao, Hong Lin, Linjun Ran, Mushuai Han, Jing Tian, Liping Lu, Shengwu Xiong, Jianwen Xiang:
CVSkSA: cross-architecture vulnerability search in firmware based on kNN-SVM and attributed control flow graph. Softw. Qual. J. 27(3): 1045-1068 (2019) - [c65]Abdeldjalil Saidani, Jianwen Xiang, Deloula Mansouri:
A New Lossless Compression Scheme for WSNs Using RLE Algorithm. APNOMS 2019: 1-6 - [c64]Mushuai Han, Dongdong Zhao, Hong Lin, Dian Zhou, Jianwen Xiang, Zhongjin Liu, Yanzhen Xing:
VSkLCG A Method for Cross-Platform Vulnerability Search in Firmware. DSA 2019: 395-400 - [c63]Ming Yang, Dongdong Zhao, Luyao Ye, Siwei Zhou, Jianwen Xiang:
Reliability Analysis of Phased-Mission System in Irrelevancy Coverage Model. QRS 2019: 89-96 - [c62]Man Yu, Dongdong Zhao, Dian Zhou, Linjun Ran, Jianwen Xiang, Zhongjin Liu, Yanzhen Xing:
Vulnerability Detection in Firmware Based on Clonal Selection Algorithm. SSCI 2019: 1915-1921 - [c61]Dongdong Zhao, Xiaoyi Hu, Shengwu Xiong, Jing Tian, Jianwen Xiang, Jing Zhou, Huanhuan Li:
A Fine-grained Privacy-preserving k-means Clustering Algorithm Upon Negative Databases. SSCI 2019: 1945-1951 - [i1]Lin Li, Mengjing Zhang, Zhaohui Chao, Jianwen Xiang:
Using Context Information to Enhance Simple Question Answering. CoRR abs/1905.01995 (2019) - 2018
- [j10]Ruoyu Wang, Guoqiang Li, Jianwen Xiang, Hongming Cai:
A customised automata algorithm and toolkit for language learning and application. Int. J. Big Data Intell. 5(1/2): 114-123 (2018) - [j9]Dongdong Zhao, Shu Fang, Jianwen Xiang, Jing Tian, Shengwu Xiong:
Iris Template Protection Based on Local Ranking. Secur. Commun. Networks 2018: 4519548:1-4519548:9 (2018) - [j8]Xing Liu, Haiying Zhou, Jianwen Xiang, Shengwu Xiong, Kun Mean Hou, Christophe de Vaulx, Huan Wang, Tianhui Shen, Qing Wang:
Energy and Delay Optimization of Heterogeneous Multicore Wireless Multimedia Sensor Nodes by Adaptive Genetic-Simulated Annealing Algorithm. Wirel. Commun. Mob. Comput. 2018 (2018) - [c60]K. P. N. Jayasena, Lin Li, Mohamed Abd El-Aziz, Shengwu Xiong, Jianwen Xiang:
Optimizing the Energy Efficient VM consolidation by a Multi-Objective Algorithm. CSCWD 2018: 81-86 - [c59]Jianwen Xiang, Shu Fang, Dongdong Zhao, Jing Tian, Shengwu Xiong, Dong Li, Chunhui Yang:
Handling Unreasonable Data in Negative Surveys. DASFAA (2) 2018: 395-403 - [c58]Wei Jiang, Siwei Zhou, Luyao Ye, Dongdong Zhao, Jing Tian, W. Eric Wong, Jianwen Xiang:
An Algebraic Binary Decision Diagram for Analysis of Dynamic Fault Tree. DSA 2018: 44-51 - [c57]Yang Liu, Lin Li, Jianwen Xiang:
Using Clustering Labels to Supervise Mashup Service Classification. ER Workshops 2018: 35-38 - [c56]Shouyu Huo, Dongdong Zhao, Xing Liu, Jianwen Xiang, Yingshou Zhong, Haiguo Yu:
Using machine learning for software aging detection in Android system. ICACI 2018: 741-746 - [c55]Xiaoyi Hu, Liping Lu, Dongdong Zhao, Jianwen Xiang, Xing Liu, Haiying Zhou, Shengwu Xiong, Jing Tian:
Privacy-Preserving K-Means Clustering Upon Negative Databases. ICONIP (4) 2018: 191-204 - [c54]Dongdong Zhao, Xiaoyi Hu, Jing Tian, Shengwu Xiong, Jianwen Xiang:
Iris Template Protection Based on Randomized Response Technique and Aggregated Block Information. ISSRE 2018: 248-258 - [c53]Jianwen Xiang, Caisheng Weng, Dongdong Zhao, Jing Tian, Shengwu Xiong, Lin Li, Artur Andrzejak:
A New Software Rejuvenation Model for Android. ISSRE Workshops 2018: 293-299 - [c52]Jianwen Xiang, Lang Liu, Ming Yang, Siwei Zhou, Luyao Ye, Caisheng Weng, Dongdong Zhao, Jing Tian:
Crane: A Tool for Reliability Analysis with Different Coverage Models. LADC 2018: 171-174 - [c51]Erqing Li, Chuangming Xia, Dongdong Zhao, Liping Lu, Jianwen Xiang, Yueying He, Jin Wang, Jiangning Wu:
Improved Heatmap Visualization of Pareto-Optimal Set in Multi-Objective Optimization of Defensive Strategy. QRS Companion 2018: 345-352 - [c50]Zhongwei Xie, Lin Li, Xian Zhong, Luo Zhong, Qing Xie, Jianwen Xiang:
A Hybrid Model Reuse Training Approach for Multilingual OCR. WISE (1) 2018: 497-512 - 2017
- [j7]Fumio Machida, Jianwen Xiang, Kumiko Tadano, Yoshiharu Maeno:
Lifetime Extension of Software Execution Subject to Aging. IEEE Trans. Reliab. 66(1): 123-134 (2017) - [c49]Jianguo Wu, Jianwen Xiang, Dongdong Zhao, Huanhuan Li, Qing Xie, Xiaoyi Hu:
Negative Survey with Manual Selection: A Case Study in Chinese Universities. APWeb/WAIM (1) 2017: 57-65 - [c48]Hong Lin, Dongdong Zhao, Linjun Ran, Mushuai Han, Jing Tian, Jianwen Xiang, Xian Ma, Yingshou Zhong:
CVSSA: Cross-Architecture Vulnerability Search in Firmware Based on Support Vector Machine and Attributed Control Flow Graph. DSA 2017: 35-41 - [c47]Linjun Ran, Liping Lu, Hong Lin, Mushuai Han, Dongdong Zhao, Jianwen Xiang, Haiguo Yu, Xian Ma:
An Experimental Study of Four Methods for Homology Analysis of Firmware Vulnerability. DSA 2017: 42-50 - [c46]Yiyun Pan, Junwei Zhou, Yongsheng Gao, Jianwen Xiang, Shengwu Xiong, Yanchao Yang:
Robust Facial Landmark Localization Using LBP Histogram Correlation Based Initialization. FG 2017: 619-625 - [c45]Chunhui Yang, Yan Gao, Xuedong Kong, Dingfang Chen, Shengwu Xiong, Jianwen Xiang:
Analysis and Estimate the Effect of Knowledge on Software Reliability Distribution. HCC 2017: 561-570 - [c44]Xiaohong Zhang, Jianwen Xiang, Shengwu Xiong:
Shape retrieval using multiscale ellipse descriptor. ICIP 2017: 1042-1046 - [c43]Caisheng Weng, Dongdong Zhao, Liping Lu, Jianwen Xiang, Chunhui Yang, Dong Li:
A Rejuvenation Strategy in Android. ISSRE Workshops 2017: 273-279 - [c42]Shanmuganathan Vasanthapriyan, Jing Tian, Dongdong Zhao, Shengwu Xiong, Jianwen Xiang:
An Ontology-Based Knowledge Sharing Portal for Software Testing. QRS Companion 2017: 472-479 - [c41]Jing Sun, Van-Nam Huynh, Yoshiteru Nakamori, Jianguo Wu, Jing Tian, Jianwen Xiang:
Knowledge Management in Graduate Research. QRS Companion 2017: 480-485 - [c40]Jianguo Wu, Dongdong Zhao, Liping Lu, Jing Tian, Jianwen Xiang:
A Comparative Study of Knowledge Management on Undergraduate by Questionnaire. QRS Companion 2017: 486-492 - [c39]Shanmuganathan Vasanthapriyan, Jing Tian, Dongdong Zhao, Shengwu Xiong, Jianwen Xiang:
An Ontology-based Knowledge Management System for Software Testing. SEKE 2017: 230-235 - 2016
- [j6]Ning Wang, Zhe Xia, Jianwen Xiang:
Editorial: Special issue on security and dependability of internet of things. J. Inf. Secur. Appl. 31: 1-2 (2016) - [c38]Chuangming Xia, Jing Tian, Erqing Li, Junwei Zhou, Jianwen Xiang, Jin Wang, Liang Bai, Yueying He:
An Efficient Tool for Industrial Control System Security Analysis. DASC/PiCom/DataCom/CyberSciTech 2016: 424-427 - [c37]Caisheng Weng, Jianwen Xiang, Shengwu Xiong, Dongdong Zhao, Chunhui Yang:
Analysis of Software Aging in Android. ISSRE Workshops 2016: 78-83 - [c36]Ruoyu Wang, Guoqiang Li, Daniel W. Sun, Jianwen Xiang, Hongming Cai:
CAT: A Customized Automata Toolkit. QRS Companion 2016: 171-177 - [c35]Jianguo Wu, Jing Tian, Liping Lu, Caisheng Weng, Jianwen Xiang:
Surveys on Knowledge Management and Knowledge Creation in a Chinese Research University. QRS Companion 2016: 186-193 - [c34]F. Meng, Yoshiteru Nakamori, Jing Tian, Jianwen Xiang:
An Evaluation Framework of Knowledge Management Activities. QRS Companion 2016: 194-201 - [c33]Jing Sun, Yoshiteru Nakamori, Jing Tian, Jianwen Xiang:
Exploring Academic Knowledge Creation Models for Graduate Researches. QRS Companion 2016: 202-209 - [c32]Jianwen Xiang, Siwei Zhou, Luyao Ye, Shengwu Xiong, W. Eric Wong:
A Generalized Multiple-Valued Decision Diagram for Reliability Analysis of Fault-Tolerant Systems. TSA 2016: 36-41 - 2015
- [j5]Jianwen Xiang, Fumio Machida, Kumiko Tadano, Yoshiharu Maeno:
An Imperfect Fault Coverage Model With Coverage of Irrelevant Components. IEEE Trans. Reliab. 64(1): 320-332 (2015) - [c31]Fumio Machida, Jianwen Xiang, Kumiko Tadano, Shigeru Hosono:
An Asset-Based Development Approach for Availability and Safety Analysis on a Flood Alert System. DSN Workshops 2015: 51-56 - [c30]Bingbing Fang, Guoqiang Li, Ling Fang, Jianwen Xiang:
A Refined Algorithm for Reachability Analysis of Updatable Timed Automata. QRS Companion 2015: 230-236 - [c29]Shanmuganathan Vasanthapriyan, Jing Tian, Jianwen Xiang:
A Survey on Knowledge Management in Software Engineering. QRS Companion 2015: 237-244 - [c28]Yoshiteru Nakamori, Fei Meng, Michitaka Kosaka, Jing Tian, Jianwen Xiang:
Service Systems Development Based on a Knowledge Synthesis Methodology. QRS Companion 2015: 245-250 - 2014
- [c27]Jianwen Xiang, Fumio Machida, Kumiko Tadano, Shigeru Hosono:
Is Cut Sequence Necessary in Dynamic Fault Trees? ISSRE Workshops 2014: 138-139 - [c26]Jianwen Xiang, Fumio Machida, Kumiko Tadano, Yoshiharu Maeno:
Analysis of Persistence of Relevance in Systems with Imperfect Fault Coverage. SAFECOMP 2014: 109-124 - 2013
- [j4]Jianwen Xiang, Fumio Machida, Kumiko Tadano, Yoshiharu Maeno, Kazuo Yanoo:
Coverage of Irrelevant Components in Systems with Imperfect Fault Coverage. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 96-A(7): 1649-1652 (2013) - [j3]Kumiko Tadano, Jianwen Xiang, Fumio Machida, Yoshiharu Maeno:
Identification of Smallest Unacceptable Combinations of Simultaneous Component Failures in Information Systems. IEICE Trans. Inf. Syst. 96-D(9): 1941-1951 (2013) - [c25]Fumio Machida, Jianwen Xiang, Kumiko Tadano, Yoshiharu Maeno, Takashi Horikawa:
Performability analysis of RAID10 versus RAID6. DSN 2013: 1-2 - [c24]Jianwen Xiang, Fumio Machida, Kumiko Tadano, Yoshiharu Maeno:
Persistence of relevance: A missing issue in imperfect coverage models. ISSRE (Supplemental Proceedings) 2013: 3-4 - [c23]Fumio Machida, Jianwen Xiang, Kumiko Tadano, Yoshiharu Maeno:
Composing hierarchical stochastic model from SysML for system availability analysis. ISSRE 2013: 51-60 - [c22]Jianwen Xiang, Fumio Machida, Kumiko Tadano, Kazuo Yanoo, Wei Sun, Yoshiharu Maeno:
A Static Analysis of Dynamic Fault Trees with Priority-AND Gates. LADC 2013: 58-67 - [c21]Kumiko Tadano, Jianwen Xiang, Fumio Machida, Yoshiharu Maeno:
Performability Modeling of Manual Resolution of Data Inconsistencies for Optimization of Data Synchronization Interval. MODELSWARD 2013: 233-240 - 2012
- [c20]Jianwen Xiang, Fumio Machida, Kumiko Tadano, Kazuo Yanoo, Wei Sun, Yoshiharu Maeno:
Combinatorial Analysis of Dynamic Fault Trees with Priority-AND Gates. ISSRE Workshops 2012: 3-4 - [c19]Fumio Machida, Jianwen Xiang, Kumiko Tadano, Yoshiharu Maeno:
Software Life-Extension: A New Countermeasure to Software Aging. ISSRE 2012: 131-140 - [c18]Fumio Machida, Jianwen Xiang, Kumiko Tadano, Yoshiharu Maeno:
Aging-Related Bugs in Cloud Computing Software. ISSRE Workshops 2012: 287-292 - [c17]Kumiko Tadano, Fumio Machida, Jianwen Xiang, Yoshiharu Maeno:
Identification of Minimal Unacceptable Combinations of Simultaneous Component Failures in Information Systems. PRDC 2012: 21-30 - [c16]Fumio Machida, Jianwen Xiang, Kumiko Tadano, Yoshiharu Maeno:
Combined Server Rejuvenation in a Virtualized Data Center. UIC/ATC 2012: 486-493 - 2011
- [j2]Jianwen Xiang, Jing Tian, Akira Mori:
Goal-directed human activity computing. J. Ambient Intell. Smart Environ. 3(2): 127-145 (2011) - [c15]Kumiko Tadano, Jianwen Xiang, Fumio Machida, Yoshiharu Maeno, Takao Osaki, Atsushi Kobayashi:
Design Improvement of System Administrative Operations for Certification. WOSOCER 2011: 31-36 - [c14]Jianwen Xiang, Kazuo Yanoo, Yoshiharu Maeno, Kumiko Tadano, Fumio Machida, Atsushi Kobayashi, Takao Osaki:
Efficient Analysis of Fault Trees with Voting Gates. ISSRE 2011: 230-239 - [c13]Sayaka Izukura, Kazuo Yanoo, Takao Osaki, Hiroshi Sakaki, Daichi Kimura, Jianwen Xiang:
Applying a Model-Based Approach to IT Systems Development Using SysML Extension. MoDELS 2011: 563-577 - [c12]Kumiko Tadano, Jianwen Xiang, Masahiro Kawato, Yoshiharu Maeno:
Automatic Synthesis of SRN Models from System Operation Templates for Availability Analysis. SAFECOMP 2011: 296-309 - [c11]Kumiko Tadano, Jianwen Xiang, Masahiro Kawato, Yoshiharu Maeno:
Synthesizing SRN Models from System Operations with SysML Diagrams for Availability Analysis. SSIRI (Companion) 2011: 5-6 - [c10]Jianwen Xiang, Kazuo Yanoo, Yoshiharu Maeno, Kumiko Tadano:
Automatic Synthesis of Static Fault Trees from System Models. SSIRI 2011: 127-136 - 2010
- [c9]Jianwen Xiang, Kazuo Yanoo:
Automatic Static Fault Tree Analysis from System Models. PRDC 2010: 241-242
2000 – 2009
- 2009
- [c8]Jianwen Xiang, Akira Mori:
A Goal-Directed Human Activity Computing Model. ISPAN 2009: 135-142 - 2008
- [c7]Jianwen Xiang, Dines Bjørner, Kokichi Futatsugi:
Formal digital license language with OTS/CafeOBJ method. AICCSA 2008: 652-660 - 2007
- [j1]Jianwen Xiang, Kazuhiro Ogata, Weiqiang Kong, Kokichi Futatsugi:
From Fault Tree Analysis to Formal System Specification and Verification with OTS/CafeOBJ. Inf. Media Technol. 2(2): 448-460 (2007) - 2006
- [c6]Jianwen Xiang, Weiqiang Kong, Kokichi Futatsugi, Kazuhiro Ogata:
Analysis of Positive Incentives for Protecting Secrets in Digital Rights Management. WEBIST (2) 2006: 5-12 - 2005
- [c5]Jianwen Xiang, Kazuhiro Ogata:
Formal Fault Tree Analysis of State Transition Systems. QSIC 2005: 124-134 - 2004
- [c4]Weiqiang Kong, Kazuhiro Ogata, Jianwen Xiang, Kokichi Futatsugi:
Formal Analysis of an Anonymous Fair Exchange E-Commerce Protocol. CIT 2004: 1100-1107 - [c3]Jianwen Xiang, Kokichi Futatsugi, Yanxiang He:
Fault Tree and Formal Methods in System Safety Analysis. CIT 2004: 1108-1115 - [c2]Jianwen Xiang, Kokichi Futatsugi, Yanxiang He:
Formal fault tree construction and system safety analysis. IASTED Conf. on Software Engineering 2004: 378-384 - [c1]Jianwen Xiang, Kokichi Futatsugi, Yanxiang He:
Formal construction model and specification of fault tree. IASTED Conf. on Software Engineering and Applications 2004: 374-381
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-11 21:40 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint