default search action
Qiusong Yang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c19]Yufeng Li, Yiwei Ci, Qiusong Yang:
TIUP: Effective Processor Verification with Tautology-Induced Universal Properties. ASPDAC 2024: 269-274 - [i2]Yufeng Li, Qiusong Yang, Yiwei Ci, Enyuan Tian:
SEPE-SQED: Symbolic Quick Error Detection by Semantically Equivalent Program Execution. CoRR abs/2404.03172 (2024) - [i1]Yufeng Li, Yiwei Ci, Qiusong Yang:
TIUP: Effective Processor Verification with Tautology-Induced Universal Properties. CoRR abs/2404.17094 (2024) - 2023
- [c18]Xiaoni Meng, Qiusong Yang, Yiwei Ci, Pei Zhao, Shan Zhao, Mingshu Li:
Execute on Clear (EoC): Enhancing Security for Unsafe Speculative Instructions by Precise Identification and Safe Execution. ICCD 2023: 587-595 - 2022
- [c17]Xiaoni Meng, Qiusong Yang, Yiwei Ci, Pei Zhao, Shan Zhao, Tianlin Huo, Mingshu Li:
Secure Access Policy (SAP): Invisibly Executing Speculative Unsafe Accesses in an Isolated Environment. ICCD 2022: 80-88 - [c16]Shizhi Jiang, Qiusong Yang, Yiwei Ci:
Merging Similar Patterns for Hardware Prefetching. MICRO 2022: 1012-1026 - 2021
- [c15]Shizhi Jiang, Yiwei Ci, Qiusong Yang, Mingshu Li:
Matryoshka: A Coalesced Delta Sequence Prefetcher. ICPP 2021: 5:1-5:11
2010 – 2019
- 2018
- [c14]Xinyue Feng, Qiusong Yang, Lin Shi, Qing Wang:
BehaviorKI: Behavior Pattern Based Runtime Integrity Checking for Operating System Kernel. QRS 2018: 13-24 - 2017
- [j4]Tao Wu, Qiusong Yang, Yeping He:
A secure and rapid response architecture for virtual machine migration from an untrusted hypervisor to a trusted one. Frontiers Comput. Sci. 11(5): 821-835 (2017) - 2016
- [j3]Yuqi Lin, Saif Ur Rehman Malik, Kashif Bilal, Qiusong Yang, Yongji Wang, Samee U. Khan:
Designing and Modeling of Covert Channels in Operating Systems. IEEE Trans. Computers 65(6): 1706-1719 (2016) - 2015
- [c13]Miao Xie, Qiusong Yang, Qing Wang, Gao Cong, Gerard de Melo:
DynaDiffuse: A Dynamic Diffusion Model for Continuous Time Constrained Influence Maximization. AAAI 2015: 346-352 - 2014
- [j2]Miao Xie, Qiusong Yang, Jian Zhai, Qing Wang:
A vertex centric parallel algorithm for linear temporal logic model checking in Pregel. J. Parallel Distributed Comput. 74(11): 3161-3174 (2014) - 2013
- [j1]Hui Huang, Junchao Xiao, Qiusong Yang, Qing Wang, Hong Wu:
Creating Process-Agents incrementally by mining process asset library. Inf. Sci. 233: 183-199 (2013) - 2012
- [c12]Qiusong Yang, Edmund M. Clarke, Anvesh Komuravelli, Mingshu Li:
Assumption Generation for Asynchronous Systems by Abstraction Refinement. FACS 2012: 260-276 - 2011
- [c11]Xin Dong, Qiusong Yang, Qing Wang, Jian Zhai, Günther Ruhe:
Value-Risk Trade-off Analysis for Iteration Planning in Extreme Programming. APSEC 2011: 397-404 - [c10]Qiusong Yang, Bei Zhang, Jian Zhai, Mingshu Li:
Attacking the Dimensionality Problem of Parameterized Systems via Bounded Reachability Graphs. FSEN 2011: 221-235 - [c9]Hui Huang, Qiusong Yang, Junchao Xiao, Jian Zhai:
Automatic mining of change set size information from repository for precise productivity estimation. ICSSP 2011: 72-80 - [c8]Yanbin Liu, Ye Yang, Qiusong Yang, Mingshu Li:
DRiVeR: Diagnosing Runtime Property Violations Based on Dependency Rules. SSIRI (Companion) 2011: 194-201 - 2010
- [c7]Qiusong Yang, Mingshu Li:
A cut-off approach for bounded verification of parameterized systems. ICSE (1) 2010: 345-354
2000 – 2009
- 2009
- [c6]Junchao Xiao, Qing Wang, Mingshu Li, Qiusong Yang, Lizi Xie, Dapeng Liu:
Value-Based Multiple Software Projects Scheduling with Genetic Algorithm. ICSP 2009: 50-62 - [c5]Jian Zhai, Qiusong Yang, Feng Su, Junchao Xiao, Qing Wang, Mingshu Li:
Stochastic Process Algebra Based Software Process Simulation Modeling. ICSP 2009: 136-147 - 2008
- [c4]Jian Zhai, Qiusong Yang, Ye Yang, Junchao Xiao, Qing Wang, Mingshu Li:
Automated Process Quality Assurance for Distributed Software Development. SEAFOOD 2008: 196-210 - 2007
- [c3]Qiusong Yang, Mingshu Li, Qing Wang, Guowei Yang, Jian Zhai, Juan Li, Lishan Hou, Yun Yang:
An Algebraic Approach for Managing Inconsistencies in Software Processes, . ICSP 2007: 121-133 - 2006
- [c2]Mingshu Li, Qiusong Yang, Jian Zhai, Guowei Yang:
On Mobility of Software Processes. SPW/ProSim 2006: 105-114 - 2005
- [c1]Liping Ding, Qiusong Yang, Liang Sun, Jie Tong, Yongji Wang:
Evaluation of the Capability of Personal Software Process Based on Data Envelopment Analysis. ISPW 2005: 235-248
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:15 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint