Остановите войну!
for scientists:
default search action
Yijun Yu
Publications
- 2020
- [j39]Pierre A. Akiki, Paul A. Akiki, Arosha K. Bandara, Yijun Yu:
EUD-MARS: End-user development of model-driven adaptive robotics software systems. Sci. Comput. Program. 200: 102534 (2020) - 2019
- [j37]Yijun Yu, Danny Barthaud, Blaine A. Price, Arosha K. Bandara, Andrea Zisman, Bashar Nuseibeh:
LiveBox: A Self-Adaptive Forensic-Ready Service for Drones. IEEE Access 7: 148401-148412 (2019) - [e3]Yijun Yu, Arosha K. Bandara, Shinichi Honiden, Zhenjiang Hu, Tetsuo Tamai, Hausi A. Müller, John Mylopoulos, Bashar Nuseibeh:
Engineering Adaptive Software Systems - Communications of NII Shonan Meetings. Springer 2019, ISBN 978-981-13-2184-9 [contents] - 2018
- [j34]Amel Bennaceur, Thein Than Tun, Arosha K. Bandara, Yijun Yu, Bashar Nuseibeh:
Feature-Driven Mediator Synthesis: Supporting Collaborative Security in the Internet of Things. ACM Trans. Cyber Phys. Syst. 2(3): 21:1-21:25 (2018) - [c122]Thein Than Tun, M. Yang, Arosha K. Bandara, Yijun Yu, Armstrong Nhlabatsi, Niamul Khan, Khaled M. Khan, Bashar Nuseibeh:
Requirements and specifications for adaptive security: concepts and analysis. SEAMS@ICSE 2018: 161-171 - 2017
- [j29]Pierre A. Akiki, Arosha K. Bandara, Yijun Yu:
Visual Simple Transformations: Empowering End-Users to Wire Internet of Things Objects. ACM Trans. Comput. Hum. Interact. 24(2): 10:1-10:43 (2017) - [c121]Mahmoud Barhamgi, Mu Yang, Chia-Mu Yu, Yijun Yu, Arosha K. Bandara, Djamal Benslimane, Bashar Nuseibeh:
Enabling End-Users to Protect their Privacy. AsiaCCS 2017: 905-907 - 2016
- [j28]Mahmoud Barhamgi, Arosha K. Bandara, Yijun Yu, Khalid Belhajjame, Bashar Nuseibeh:
Protecting Privacy in the Cloud: Current Practices, Future Directions. Computer 49(2): 68-72 (2016) - [j27]Pierre A. Akiki, Arosha K. Bandara, Yijun Yu:
Engineering Adaptive Model-Driven User Interfaces. IEEE Trans. Software Eng. 42(12): 1118-1147 (2016) - [c112]Thein Than Tun, Blaine A. Price, Arosha K. Bandara, Yijun Yu, Bashar Nuseibeh:
Verifiable Limited Disclosure: Reporting and Handling Digital Evidence in Police Investigations. RE Workshops 2016: 102-105 - 2015
- [j24]Armstrong Nhlabatsi, Thein Than Tun, Niamul Khan, Yijun Yu, Arosha K. Bandara, Khaled M. Khan, Bashar Nuseibeh:
"Why can't I do that?": Tracing Adaptive Security Decisions. EAI Endorsed Trans. Self Adapt. Syst. 1(1): e2 (2015) - [c109]Armstrong Nhlabatsi, Yijun Yu, Andrea Zisman, Thein Than Tun, Niamul Khan, Arosha K. Bandara, Khaled M. Khan, Bashar Nuseibeh:
Managing Security Control Assumptions Using Causal Traceability. SST@ICSE 2015: 43-49 - 2014
- [j21]Pierre A. Akiki, Arosha K. Bandara, Yijun Yu:
Adaptive Model-Driven User Interface Development Systems. ACM Comput. Surv. 47(1): 9:1-9:33 (2014) - [c104]Armstrong Nhlabatsi, Thein Than Tun, Niamul Khan, Yijun Yu, Arosha K. Bandara, Khaled M. Khan, Bashar Nuseibeh:
Traceability for Adaptive Information Security in the Cloud. IEEE CLOUD 2014: 958-959 - [c102]Amel Bennaceur, Arosha K. Bandara, Michael Jackson, Wei Liu, Lionel Montrieux, Thein Than Tun, Yijun Yu, Bashar Nuseibeh:
Requirements-driven mediation for collaborative security. SEAMS 2014: 37-42 - [c99]Pierre A. Akiki, Arosha K. Bandara, Yijun Yu:
Integrating adaptive user interface capabilities in enterprise applications. ICSE 2014: 712-723 - [c98]Mu Yang, Yijun Yu, Arosha K. Bandara, Bashar Nuseibeh:
Adaptive Sharing for Online Social Networks: A Trade-off Between Privacy Risk and Social Benefit. TrustCom 2014: 45-52 - 2013
- [c97]Pierre A. Akiki, Arosha K. Bandara, Yijun Yu:
Preserving Designer Input on Concrete User Interfaces Using Constraints While Maintaining Adaptive Behavior. CASFE 2013: 9-16 - [c96]Pierre A. Akiki, Arosha K. Bandara, Yijun Yu:
RBUIS: simplifying enterprise application user interfaces through engineering role-based adaptive behavior. EICS 2013: 3-12 - [c95]Pierre A. Akiki, Arosha K. Bandara, Yijun Yu:
Crowdsourcing user interface adaptations for minimizing the bloat in enterprise applications. EICS 2013: 121-126 - [c94]Pierre A. Akiki, Arosha K. Bandara, Yijun Yu:
Cedar studio: an IDE supporting adaptive model-driven user interfaces for enterprise applications. EICS 2013: 139-144 - 2012
- [j14]Mohammed Salifu, Yijun Yu, Arosha K. Bandara, Bashar Nuseibeh:
Analysing monitoring and switching problems for adaptive systems. J. Syst. Softw. 85(12): 2829-2839 (2012) - [c86]Pierre A. Akiki, Arosha K. Bandara, Yijun Yu:
Using Interpreted Runtime Models for Devising Adaptive User Interfaces of Enterprise Applications. ICEIS (3) 2012: 72-77 - [c83]Thein Than Tun, Arosha K. Bandara, Blaine A. Price, Yijun Yu, Charles B. Haley, Inah Omoronyia, Bashar Nuseibeh:
Privacy arguments: Analysing selective disclosure requirements for mobile applications. RE 2012: 131-140 - [i1]Arosha K. Bandara, Shinichi Honiden, Yijun Yu:
Engineering Autonomic Systems (EASy) (NII Shonan Meeting 2012-3). NII Shonan Meet. Rep. 2012 (2012) - 2011
- [c78]Yijun Yu, Thein Than Tun, Arosha K. Bandara, Tian Zhang, Bashar Nuseibeh:
From Model-Driven Software Development Processes to Problem Diagnoses at Runtime. Models@run.time@Dagstuhl 2011: 188-207 - [c69]Guillaume Benats, Arosha K. Bandara, Yijun Yu, Jean-Noël Colin, Bashar Nuseibeh:
PrimAndroid: Privacy Policy Modelling and Analysis for Android Applications. POLICY 2011: 129-132
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-08 23:45 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint