default search action
Weizhong Shao
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2016
- [j8]Xiao He, Tian Zhang, Changjun Hu, Zhiyi Ma, Weizhong Shao:
An MDE performance testing framework based on random model generation. J. Syst. Softw. 121: 247-264 (2016) - 2015
- [c36]Xiao He, Yanmei Fu, Chang-Ai Sun, Zhiyi Ma, Weizhong Shao:
Towards Model-Driven Variability-Based Flexible Service Compositions. COMPSAC 2015: 298-303 - 2014
- [j7]Xiao He, Changjun Hu, Zhiyi Ma, Weizhong Shao:
A bidirectional-transformation-based framework for software visualization and visual editing. Sci. China Inf. Sci. 57(5): 1-23 (2014) - [c35]Huihong He, Zhiyi Ma, Hongjie Chen, Chih-Yi Yeh, Weizhong Shao:
An Aspect-Oriented Approach to SLA-Driven Monitoring Multi-tenant Cloud Application. IEEE CLOUD 2014: 857-864 - [c34]Xiao He, Tian Zhang, Zhiyi Ma, Weizhong Shao:
Randomized Model Generation for Performance Testing of Model Transformations. COMPSAC 2014: 11-20 - [c33]Huihong He, Zhiyi Ma, Hongjie Chen, Dan Wu, Huanhuan Liu, Weizhong Shao:
An SLA-Driven Cache Optimization Approach for Multi-tenant Application on PaaS. COMPSAC 2014: 139-148 - [c32]Lin Zhang, Yao Guo, Xiangqun Chen, Weizhong Shao, Lei Chen:
Topic Evolutions in Scientific Conferences. SEKE 2014: 507-510 - [c31]Huihong He, Zhiyi Ma, Hongjie Chen, Weizhong Shao:
How the crowd impacts commercial applications: a user-oriented approach. CrowdSoft@SIGSOFT FSE 2014: 1-6 - 2013
- [j6]Hui Liu, Zhendong Niu, Zhiyi Ma, Weizhong Shao:
Identification of generalization refactoring opportunities. Autom. Softw. Eng. 20(1): 81-110 (2013) - [j5]Hui Liu, Xue Guo, Weizhong Shao:
Monitor-Based Instant Software Refactoring. IEEE Trans. Software Eng. 39(8): 1112-1126 (2013) - [c30]Huihong He, Zhiyi Ma, Hongjie Chen, Weizhong Shao:
Towards an SLA-Driven cache adjustment approach for applications on PaaS. Internetware 2013: 11:1-11:10 - [c29]Junjun Kong, Yao Guo, Xiangqun Chen, Weizhong Shao:
Supporting Localized Interactions among Heterogeneous Smart Things with ThingWare. UIC/ATC 2013: 650-655 - 2012
- [j4]Hui Liu, Zhiyi Ma, Weizhong Shao, Zhendong Niu:
Schedule of Bad Smell Detection and Resolution: A New Way to Save Effort. IEEE Trans. Software Eng. 38(1): 220-235 (2012) - [c28]Huihong He, Zhiyi Ma, Xiang Li, Hongjie Chen, Weizhong Shao:
An Approach to Estimating Cost of Running Cloud Applications Based on AWS. APSEC 2012: 571-576 - [c27]Junjun Kong, Jiannong Cao, Yang Liu, Yao Guo, Weizhong Shao:
Smarter wheelchairs who can talk to each other: An integrated and collaborative approach. Healthcom 2012: 522-525 - [c26]Yi Liu, Zhiyi Ma, Rui Qiu, Hongjie Chen, Weizhong Shao:
An Approach to Integrating Non-functional Requirements into UML Design Models Based on NFR-Specific Patterns. QSIC 2012: 132-135 - [c25]Yi Liu, Zhiyi Ma, Hui Liu, Weizhong Shao:
Risk-driven Non-functional Requirement Analysis and Specification. SEKE 2012: 55-60 - 2011
- [j3]Hui Liu, Zhendong Niu, Zhiyi Ma, Weizhong Shao:
Suffix tree-based approach to detecting duplications in sequence diagrams. IET Softw. 5(4): 385-397 (2011) - [c24]Xiao He, Zhiyi Ma, Yi Liu, Hongjie Chen, Weizhong Shao:
VisTML: A Visual Modeling Language for Model Transformation. APSEC 2011: 130-137 - [c23]Sibo Cai, Yanzhen Zou, Lijie Wang, Bing Xie, Weizhong Shao:
A Semi-supervised Approach for Component Recommendation Based on Citations. ICSR 2011: 78-86 - [c22]Hui Song, Gang Huang, Franck Chauvel, Wei Zhang, Yanchun Sun, Weizhong Shao, Hong Mei:
Instant and Incremental QVT Transformation for Runtime Models. MoDELS 2011: 273-288 - [c21]Sibo Cai, Yanzhen Zou, Lijie Wang, Bing Xie, Weizhong Shao:
Recommending Component by Citation: A Semi-supervised Approach for Determination. SEKE 2011: 489-494 - 2010
- [c20]Yi Liu, Zhiyi Ma, Weizhong Shao:
Integrating Non-functional Requirement Modeling into Model Driven Development Method. APSEC 2010: 98-107
2000 – 2009
- 2009
- [c19]Sibo Cai, Yanzhen Zou, Bing Xie, Weizhong Shao:
Leveraging Robust Service Evaluation by Introducing the Web of Trust. IEEE CLOUD 2009: 190-197 - [c18]Xiao He, Zhiyi Ma, Yan Zhang, Weizhong Shao:
On Model Transformation Reuse. COMPSAC (1) 2009: 638-639 - [c17]Donggang Cao, Zan Xiao, Weizhong Shao:
A Service-oriented Programming Platform for Internet-Based Virtual Computing Environment. ICPADS 2009: 700-705 - [c16]Liang Gu, Yueqiang Cheng, Xuhua Ding, Robert H. Deng, Yao Guo, Weizhong Shao:
Remote Attestation on Function Execution (Work-in-Progress). INTRUST 2009: 60-72 - [c15]Hui Liu, Limei Yang, Zhendong Niu, Zhiyi Ma, Weizhong Shao:
Facilitating software refactoring with appropriate resolution order of bad smells. ESEC/SIGSOFT FSE 2009: 265-268 - 2008
- [c14]Sibo Cai, Yanzhen Zou, Bing Xie, Weizhong Shao:
Mining the Web of Trust for Web Services Selection. ICWS 2008: 809-810 - [c13]Liang Gu, Xuhua Ding, Robert H. Deng, Yanzhen Zou, Bing Xie, Weizhong Shao, Hong Mei:
Model-Driven Remote Attestation: Attesting Remote System from Behavioral Aspect. ICYCS 2008: 2347-2353 - 2007
- [c12]Xiao He, Zhiyi Ma, Weizhong Shao, Ge Li:
A metamodel for the notation of graphical modeling languages. COMPSAC (1) 2007: 219-224 - [c11]Hui Liu, Ge Li, Zhiyi Ma, Weizhong Shao:
Scheduling of conflicting refactorings to promote quality improvement. ASE 2007: 489-492 - [c10]Ge Li, Lu Zhang, Bing Xie, Weizhong Shao:
Ontology Based Classification Generating Method for Browsing-Based Component Retrieval. SEKE 2007: 428- - 2006
- [j2]Ge Li, Lu Zhang, Yan Li, Bing Xie, Weizhong Shao:
Shortening retrieval sequences in browsing-based component retrieval using information entropy. J. Syst. Softw. 79(2): 216-230 (2006) - [c9]Hui Liu, Zhiyi Ma, Lu Zhang, Weizhong Shao:
Detecting Duplications in Sequence Diagrams Based on Suffix Trees. APSEC 2006: 269-276 - [c8]Weizhong Shao, Gang Huang, Haiyan Zhao:
Modeling of component based systems. ICSE 2006: 1077-1078 - 2005
- [j1]Robert H. Deng, Di Ma, Weizhong Shao, Yongdong Wu:
Scalable trusted online dissemination of JPEG2000 images. Multim. Syst. 11(1): 60-67 (2005) - [c7]Haohai Ma, Zhe Ji, Weizhong Shao, Lu Zhang:
Towards the UML Evaluation Using Taxonomic Patterns on Meta-Classes. QSIC 2005: 37-44 - 2004
- [c6]Siyuan Liu, Shuhong Wang, Robert H. Deng, Weizhong Shao:
A Block Oriented Fingerprinting Scheme in Relational Database. ICISC 2004: 455-466 - [c5]Ge Li, Ying Pan, Lu Zhang, Bing Xie, Weizhong Shao:
Attribute Ranking: An Entropy-Based Approach to Accelerating Browsing-Based Component Retrieval. ICSR 2004: 232-241 - [c4]Haohai Ma, Weizhong Shao, Lu Zhang, Yanbing Jiang:
Applying OO Metrics to Assess UML Meta-models. UML 2004: 12-26 - [c3]Yanbing Jiang, Weizhong Shao, Lu Zhang, Zhiyi Ma, Xiangwen Meng, Haohai Ma:
On the Classification of UML's Meta Model Extension Mechanism. UML 2004: 54-68 - 2003
- [c2]Cheng Peng, Robert H. Deng, Yongdong Wu, Weizhong Shao:
A flexible and scalable authentication scheme for JPEG2000 image codestreams. ACM Multimedia 2003: 433-441
1990 – 1999
- 1997
- [c1]Yuanhong Wang, Hong Mei, Weizhong Shao:
Experience Report: Using Design Patterns in the Development of JB System. TOOLS (24) 1997: 159-165
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-04 20:04 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint