Остановите войну!
for scientists:
default search action
Eric S. K. Yu
- > Home > Persons > Eric S. K. Yu
Publications
- 2023
- [j41]Meira Levy, Eduard C. Groen, Kuldar Taveter, Daniel Amyot, Eric Yu, Lin Liu, Ita Richardson, Maria Spichkova, Alexandra Jussli, Sébastien Mosser:
Sustaining human health: A requirements engineering perspective. J. Syst. Softw. 204: 111792 (2023) - [c184]Lin Liu, Eric S. K. Yu, Meira Levy, Daniel Amyot:
Welcome to REWBAH 2023: The Fourth International Workshop on Requirements Engineering for Well-Being, Aging, and Health. REW 2023: 383-385 - 2021
- [j36]Meira Levy, Lin Liu, Daniel Amyot, Eric S. K. Yu, Muneef Alshammari, Malak Baslyman, Elizabeth Bjarnason, Christopher Bull, Carlos Henrique C. Duarte, Eduard C. Groen, Sami Jantunen, Sylwia Kopczynska, Lysanne Lessard, Ita Richardson, Jens H. Weber, Ziqi Wei:
Requirements Engineering for Well-Being, Aging, and Health: An Overview for Practitioners. IEEE Softw. 38(3): 7-12 (2021) - [c179]Eric S. K. Yu, Lin Liu, Meira Levy, Daniel Amyot:
REWBAH 2021: Second International Workshop on Requirements Engineering for Well-Being, Aging, and Health : Welcome from the Organizers. RE Workshops 2021: 236-238 - 2011
- [c100]Junjun Sun, Feng Liu, He Zhang, Lin Liu, Eric S. K. Yu:
Understanding the Diversity of Services Based on Users' Identities. CAiSE 2011: 612-626 - [c98]Golnaz Elahi, Eric S. K. Yu, Tong Li, Lin Liu:
Security Requirements Engineering in the Wild: A Survey of Common Practices. COMPSAC 2011: 314-319 - 2010
- [c84]Tong Li, Lin Liu, Golnaz Elahi, Eric S. K. Yu, Barrett R. Bryant:
Service Security Analysis Based on i*: An Approach from the Attacker Viewpoint. COMPSAC Workshops 2010: 127-133 - [c77]Yunsong Jian, Lin Liu, Jianmin Wang, Eric Yu:
Goal-driven adaptation of internetware. Internetware 2010: 10 - [c72]Tong Li, Golnaz Elahi, Lin Liu, Eric S. K. Yu:
Automated Generation of Attack Routes for Service Security Analysis - A Preliminary Report. iStar 2010: 57-61 - [c70]Yunsong Jian, Tong Li, Lin Liu, Eric S. K. Yu:
Goal-oriented requirements modelling for running systems. RE@RunTime 2010: 1-8 - 2009
- [j18]Lin Liu, Eric S. K. Yu, John Mylopoulos:
Secure-I*: Engineering Secure Software Systems through Social Analysis. Int. J. Softw. Informatics 3(1): 89-120 (2009) - [j16]Lin Liu, Eric S. K. Yu, Hong Mei:
Guest Editorial: Special Section on Requirements Engineering for Services—Challenges and Practices. IEEE Trans. Serv. Comput. 2(4): 318-319 (2009) - 2008
- [j15]Lin Liu, Qiang Liu, Chi-Hung Chi, Zhi Jin, Eric S. K. Yu:
Towards a service requirements modelling ontology based on agent knowledge and intentions. Int. J. Agent Oriented Softw. Eng. 2(3): 324-349 (2008) - [c61]Colette Rolland, Eric S. K. Yu, Jian Yang, Lin Liu:
Message from the REFS 2008 Workshop Organizers. COMPSAC 2008: 599 - [c60]Colette Rolland, Eric S. K. Yu, Jian Yang, Lin Liu:
REFS 2008 Workshop Organization. COMPSAC 2008: 600 - 2006
- [c42]Lin Liu, Eric S. K. Yu:
Modeling Identity Management Architecture Within a Social Setting. APWeb 2006: 917-922 - [c40]Lin Liu, Eric S. K. Yu, John Mylopoulos:
Security Design Based on Social Modeling. COMPSAC (2) 2006: 71-78 - [c38]Jennifer Horkoff, Eric S. K. Yu, Lin Liu:
Analyzing trust in technology strategies. PST 2006: 9 - [c37]Lin Liu, Qiang Liu, Chi-Hung Chi, Zhi Jin, Eric S. K. Yu:
Towards A Service Requirements Ontology on Knowledge and Intention. QSIC 2006: 452-462 - 2005
- [c35]Julio César Sampaio do Prado Leite, Yijun Yu, Lin Liu, Eric S. K. Yu, John Mylopoulos:
Quality-Based Software Reuse. CAiSE 2005: 535-550 - 2004
- [j12]Lin Liu, Eric S. K. Yu:
Designing information systems in social context: a goal and scenario modelling approach. Inf. Syst. 29(2): 187-203 (2004) - [c30]Lin Liu, Eric S. K. Yu:
Intentional Modeling to Support Identity Management. ER 2004: 555-566 - 2003
- [c26]Lin Liu, Eric S. K. Yu, John Mylopoulos:
Security and Privacy Requirements Analysis within a Social Setting. RE 2003: 151-161 - 2002
- [c23]Lin Liu, Eric S. K. Yu:
Designing Web-Based Systems in Social Context: A Goal and Scenario Based Approach. CAiSE 2002: 37-51 - 2001
- [c18]Eric S. K. Yu, Lin Liu, Ying Li:
Modelling Strategic Actor Relationships to Support Intellectual Property Management. ER 2001: 164-178 - 2000
- [c16]Eric S. K. Yu, Lin Liu:
Modelling Trust for System Design Using the i* Strategic Actors Framework. Trust in Cyber-societies 2000: 175-194
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-21 18:05 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint