default search action
Dianxiang Xu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c105]Yu Luo, Weifeng Xu, Karl Andersson, Mohammad Shahadat Hossain, Dianxiang Xu:
FELLMVP: An Ensemble LLM Framework for Classifying Smart Contract Vulnerabilities. Blockchain 2024: 89-96 - [c104]Yu Luo, Weifeng Xu, Dianxiang Xu:
Predicting Code Vulnerability Types via Heterogeneous GNN Learning. ESORICS (3) 2024: 67-87 - [c103]Irfan Ali Khan, Yu Luo, Weifeng Xu, Dianxiang Xu:
GNN-Based Transfer Learning and Tuning for Detecting Code Vulnerabilities across Different Programming Languages. QRS 2024: 596-607 - 2023
- [c102]Vladislav Dubrovenski, Erzhuo Chen, Dianxiang Xu:
SMT-Based Verification of NGAC Policies. COMPSAC 2023: 860-869 - [c101]Vladislav Dubrovenski, Md Nazmul Karim, Erzhuo Chen, Dianxiang Xu:
Dynamic Access Control with Administrative Obligations: A Case Study. QRS Companion 2023: 157-166 - [c100]Erzhuo Chen, Vladislav Dubrovenski, Dianxiang Xu:
Coverage-Based Testing of Obligations in NGAC Systems. SACMAT 2023: 169-179 - 2022
- [j45]Yu Luo, Weifeng Xu, Dianxiang Xu:
Predicting Integer Overflow Errors via Supervised Learning. Int. J. Artif. Intell. Tools 31(8): 2250047:1-2250047:28 (2022) - [c99]Yu Luo, Weifeng Xu, Dianxiang Xu:
Compact Abstract Graphs for Detecting Code Vulnerability with GNN Models. ACSAC 2022: 497-507 - [c98]Weifeng Xu, Lin Deng, Dianxiang Xu:
Towards Designing Shared Digital Forensics Instructional Materials. COMPSAC 2022: 117-122 - [c97]Weifeng Xu, Dianxiang Xu:
Visualizing and Reasoning about Presentable Digital Forensic Evidence with Knowledge Graphs. PST 2022: 1-10 - [c96]Dianxiang Xu, Roshan Shrestha, Ning Shen, Yunpeng Zhang:
Towards a Theory on Testing XACML Policies. SACMAT 2022: 103-114 - 2021
- [c95]Anthony Luo, Dianxiang Xu:
Quantifying Event Impact on the Bitcoin Blockchain. COMPSAC 2021: 268-273 - [c94]Yu Luo, Weifeng Xu, Dianxiang Xu:
Detecting Integer Overflow Errors in Java Source Code via Machine Learning. ICTAI 2021: 724-728 - [c93]Erzhuo Chen, Vladislav Dubrovenski, Dianxiang Xu:
Mutation Analysis of NGAC Policies. SACMAT 2021: 71-82 - 2020
- [j44]Zhiyuan Li, Weijia Xing, Samer Khamaiseh, Dianxiang Xu:
Detecting Saturation Attacks Based on Self-Similarity of OpenFlow Traffic. IEEE Trans. Netw. Serv. Manag. 17(1): 607-621 (2020) - [c92]Samer Khamaiseh, Edoardo Serra, Dianxiang Xu:
vSwitchGuard: Defending OpenFlow Switches Against Saturation Attacks. COMPSAC 2020: 851-860 - [c91]Abdulrahman Alatawi, Weifeng Xu, Dianxiang Xu:
A Bigram-based Inference Model for Retrieving Abbreviated Phrases in Source Code. EASE 2020: 11-20 - [c90]Dianxiang Xu, Roshan Shrestha, Ning Shen:
Automated Strong Mutation Testing of XACML Policies. SACMAT 2020: 105-116 - [i1]Anthony Luo, Dianxiang Xu:
Assessing Holistic Impacts of Major Events on the Bitcoin Blockchain Network. CoRR abs/2006.02416 (2020)
2010 – 2019
- 2019
- [j43]Yan Wu, Anthony Luo, Dianxiang Xu:
Identifying suspicious addresses in Bitcoin thefts. Digit. Investig. 31 (2019) - [j42]Qiang Zhang, Dianxiang Xu, Tianze Gao, Zhihe Wang:
Effect of NO2 on O3 Using Complex Network Topology Analysis. IEEE Trans. Comput. Soc. Syst. 6(6): 1329-1342 (2019) - [c89]Patrick Chapman, Dianxiang Xu, Lin Deng, Yin Xiong:
Deviant: A Mutation Testing Tool for Solidity Smart Contracts. Blockchain 2019: 319-324 - [c88]Samer Khamaiseh, Edoardo Serra, Zhiyuan Li, Dianxiang Xu:
Detecting Saturation Attacks in SDN via Machine Learning. ICCCS 2019: 1-8 - [c87]Yan Wu, Anthony Luo, Dianxiang Xu:
Forensic Analysis of Bitcoin Transactions. ISI 2019: 167-169 - 2018
- [j41]Izzat Alsmadi, Abdallah Khreishah, Dianxiang Xu:
Network slicing to improve multicasting in HPC clusters. Clust. Comput. 21(3): 1493-1506 (2018) - [j40]Weifeng Xu, Dianxiang Xu, Abdulrahman Alatawi, Omar el Ariss, Yunkai Liu:
Statistical Unigram Analysis for Source Code Repository. Int. J. Semantic Comput. 12(2): 237-260 (2018) - [c86]Roshan Shrestha, Hoda Mehrpouyan, Dianxiang Xu:
Model Checking of Security Properties in Industrial Control Systems (ICS). CODASPY 2018: 164-166 - [c85]Yan Wu, Nitish Dhakal, Dianxiang Xu, Jin-Hee Cho:
Analysis and Prediction of Endorsement-Based Skill Assessment in LinkedIn. COMPSAC (1) 2018: 461-470 - [c84]Dianxiang Xu, Eun-Sun Cho:
Message from the SEPT Symposium Program Chairs. COMPSAC (1) 2018: 599 - [c83]Zhiyuan Li, Weijia Xing, Dianxiang Xu:
Detecting Saturation Attacks in Software-Defined Networks. ISI 2018: 163-168 - [c82]Samer Khamaiseh, Patrick Chapman, Dianxiang Xu:
Model-Based Testing of Obligatory ABAC Systems. QRS 2018: 405-413 - [c81]Dianxiang Xu, Roshan Shrestha, Ning Shen:
Automated Coverage-Based Testing of XACML Policies. SACMAT 2018: 3-14 - [c80]Roshan Shrestha, Shuai Peng, Turner Lehmbecker, Dianxiang Xu:
XPA: An Open Soruce IDE for XACML Policies (S). SEKE 2018: 188-187 - 2017
- [c79]Nitish Dhakal, Francesca Spezzano, Dianxiang Xu:
Predicting Friendship Strength for Privacy Preserving: A Case Study on Facebook. ASONAM 2017: 1096-1103 - [c78]Dianxiang Xu, Omar el Ariss, Yunkai Liu, Abdulrahman Alatawi:
Statistical Unigram Analysis for Source Code Repository. BigMM 2017: 1-8 - [c77]Weifeng Xu, Dianxiang Xu, Lin Deng:
Measurement of Source Code Readability Using Word Concreteness and Memory Retention of Variable Names. COMPSAC (1) 2017: 33-38 - [c76]Samer Khamaiseh, Dianxiang Xu:
Software Security Testing via Misuse Case Modeling. DASC/PiCom/DataCom/CyberSciTech 2017: 534-541 - [c75]Abdulrahman Alatawi, Weifeng Xu, Dianxiang Xu:
Bayesian Unigram-Based Inference for Expanding Abbreviations in Source Code. ICTAI 2017: 543-550 - 2016
- [j39]Sandeep Lakaraju, Dianxiang Xu, Yong Wang:
Analysis of Healthcare Workflows in Accordance with Access Control Policies. Int. J. Heal. Inf. Syst. Informatics 11(1): 1-20 (2016) - [j38]Dianxiang Xu, Weifeng Xu, Manghui Tu, Ning Shen, William C. Chu, Chih-Hung Chang:
Automated Integration Testing Using Logical Contracts. IEEE Trans. Reliab. 65(3): 1205-1222 (2016) - [c74]Bhavani Thuraisingham, Dianxiang Xu, Hiroki Takakura, Mohammad Zulkernine, Elisa Bertino:
Message from the SEPT Organizing Committee. COMPSAC 2016: 399 - [c73]Jin-Hee Cho, Izzat Alsmadi, Dianxiang Xu:
Privacy and Social Capital in Online Social Networks. GLOBECOM 2016: 1-7 - [c72]Izzat Alsmadi, Dianxiang Xu, Jin-Hee Cho:
Interaction-based Reputation Model in Online Social Networks. ICISSP 2016: 265-272 - [c71]Dianxiang Xu, Shuai Peng:
Towards automatic repair of access control policies. PST 2016: 485-492 - [c70]Dianxiang Xu, Zhenyu Wang, Shuai Peng, Ning Shen:
Automated Fault Localization of XACML Policies. SACMAT 2016: 137-147 - [c69]Sung-Ju Fan Chiang, Daniel Chen, Dianxiang Xu:
Conformance Testing of Balana: An Open Source Implementation of the XACML3.0 Standard. SEKE 2016: 492-497 - 2015
- [j37]Izzat Alsmadi, Dianxiang Xu:
Security of Software Defined Networks: A survey. Comput. Secur. 53: 79-108 (2015) - [j36]Dianxiang Xu, Ning Shen, Yunpeng Zhang:
Detecting Incorrect Uses of Combining Algorithms in XACML 3.0 Policies. Int. J. Softw. Eng. Knowl. Eng. 25(9-10): 1551-1572 (2015) - [j35]Dianxiang Xu, Michael Kent, Lijo Thomas, Tejeddine Mouelhi, Yves Le Traon:
Automated Model-Based Testing of Role-Based Access Control Using Predicate/Transition Nets. IEEE Trans. Computers 64(9): 2490-2505 (2015) - [j34]Dianxiang Xu, Weifeng Xu, Michael Kent, Lijo Thomas, Linzhang Wang:
An Automated Test Generation Technique for Software Quality Assurance. IEEE Trans. Reliab. 64(1): 247-268 (2015) - [c68]Bhavani Thuraisingham, Dianxiang Xu, Hiroki Takakura, Mohammad Zulkernine, Elisa Bertino:
Message from SEPT Symposium Organizing Committee. COMPSAC 2015: 421 - [c67]Dianxiang Xu, Yunpeng Zhang, Ning Shen:
Formalizing Semantic Differences between Combining Algorithms in XACML 3.0 Policies. QRS 2015: 163-172 - [c66]Dianxiang Xu, Ning Shen, Yunpeng Zhang:
Fault-Based Testing of Combining Algorithms in XACML3.0 Policies. SEKE 2015: 433-438 - [c65]Izzat Alsmadi, Milson Munakami, Dianxiang Xu:
Model-Based Testing of SDN Firewalls: A Case Study. TSA 2015: 81-88 - 2014
- [j33]Hong Zhu, Daniel Hoffman, John Hughes, Dianxiang Xu:
Toward a mature industrial practice of software test automation. Softw. Qual. J. 22(2): 239-240 (2014) - [c64]Dianxiang Xu, Weifeng Xu, Manghui Tu:
Automated Generation of Integration Test Sequences from Logical Contracts. COMPSAC Workshops 2014: 632-637 - [c63]Dianxiang Xu, Ning Shen:
Effectiveness of Automated Function Testing with Petri Nets: A Series of Controlled Experiments. SEKE 2014: 211-216 - [c62]Dianxiang Xu, Yunpeng Zhang:
Specification and Analysis of Attribute-Based Access Control Policies: An Overview. SERE (Companion) 2014: 41-49 - [c61]Weifeng Xu, Tao Ding, Dianxiang Xu:
Rule-Based Test Input Generation from Bytecode. SERE 2014: 108-117 - [c60]Sandeep Lakkaraju, Dianxiang Xu:
Integrated Modeling and Analysis of Attribute Based Access Control Policies and Workflows in Healthcare. TSA 2014: 36-43 - 2013
- [j32]Manghui Tu, Hui Ma, Liangliang Xiao, I-Ling Yen, Farokh B. Bastani, Dianxiang Xu:
Data Placement in P2P Data Grids Considering the Availability, Security, Access Performance and Load Balancing. J. Grid Comput. 11(1): 103-127 (2013) - [j31]Dianxiang Xu, Omar el Ariss:
Guest Editor's Introduction. Int. J. Softw. Eng. Knowl. Eng. 23(5): 587-588 (2013) - [j30]Manghui Tu, Dianxiang Xu:
Resilience as a New System Engineering for Cloud Computing. J. Commun. 8(4): 267-274 (2013) - [j29]Aaron Marback, Hyunsook Do, Ke He, Samuel Kondamarri, Dianxiang Xu:
A threat model-based approach to security testing. Softw. Pract. Exp. 43(2): 241-258 (2013) - [c59]Weifeng Xu, Tao Ding, Hanlin Wang, Dianxiang Xu:
Mining Test Oracles for Test Inputs Generated from Java Bytecode. COMPSAC 2013: 27-32 - [c58]Chih-Hung Chang, Chih-Wei Lu, William C. Chu, Xin-Hao Huang, Dianxiang Xu, Tse-Chuan Hsu, Yu-Bin Lai:
An UML Behavior Diagram Based Automatic Testing Approach. COMPSAC Workshops 2013: 511-516 - [c57]Dianxiang Xu, Michael Sanford, Zhaoliang Liu, Spencer Johnson, Mark Emry, Brad Brockmueller, Michael To:
Testing access control and obligation policies. ICNC 2013: 540-544 - [c56]Manghui Tu, Dianxiang Xu:
System resilience modeling and enhancement for the cloud. ICNC 2013: 1021-1025 - [c55]Junhua Ding, Dianxiang Xu, Jidong Ge:
An Approach for Analyzing Software Specifications in Petri Nets. SEKE 2013: 411-416 - [c54]Dianxiang Xu:
Software security testing of an online banking system: a unique research experience for undergraduates and computer teachers. SIGCSE 2013: 705-710 - [c53]Manghui Tu, Liangliang Xiao, Dianxiang Xu:
Maximizing the Availability of Replicated Services in Widely Distributed Systems Considering Network Availability. SERE 2013: 178-187 - 2012
- [j28]Omar el Ariss, Dianxiang Xu:
Secure System Modeling: Integrating Security Attacks with Statecharts. Int. J. Softw. Informatics 6(2): 271-306 (2012) - [j27]Manghui Tu, Dianxiang Xu, Cristian Balan, Kyle Cronin:
On the Development of Digital Forensics Curriculum. J. Digit. Forensics Secur. Law 7(3): 13-32 (2012) - [j26]Dianxiang Xu, Omar el Ariss, Weifeng Xu, Linzhang Wang:
Testing aspect-oriented programs with finite state machines. Softw. Test. Verification Reliab. 22(4): 267-293 (2012) - [j25]Dianxiang Xu, Manghui Tu, Michael Sanford, Lijo Thomas, Daniel Woodraska, Weifeng Xu:
Automated Security Test Generation with Formal Threat Models. IEEE Trans. Dependable Secur. Comput. 9(4): 526-540 (2012) - [j24]W. Eric Wong, Vidroha Debroy, Dianxiang Xu:
Towards Better Fault Localization: A Crosstab-Based Statistical Approach. IEEE Trans. Syst. Man Cybern. Part C 42(3): 378-396 (2012) - [c52]Dianxiang Xu, William C. Chu:
A Methodology for Building Effective Test Models with Function Nets. COMPSAC 2012: 334-339 - [c51]Dianxiang Xu, Lijo Thomas, Michael Kent, Tejeddine Mouelhi, Yves Le Traon:
A model-based approach to automated testing of access control policies. SACMAT 2012: 209-218 - [c50]Dianxiang Xu, Janghwan Tae:
Automated Generation of Concurrent Test Code from Function Nets. SEKE 2012: 346-351 - [c49]Junhua Ding, Dianxiang Xu:
Model-Based Metamorphic Testing: A Case Study. SEKE 2012: 363-368 - [c48]Dianxiang Xu, Weifeng Xu, Bharath K. Bavikati, W. Eric Wong:
Mining Executable Specifications of Web Applications from Selenium IDE Tests. SERE 2012: 263-272 - [e2]Daniel Hoffman, John Hughes, Dianxiang Xu:
7th International Workshop on Automation of Software Test, AST 2012, Zurich, Switzerland, June 2-3, 2012. IEEE Computer Society 2012, ISBN 978-1-4673-1821-1 [contents] - [r1]Omar el Ariss, Dianxiang Xu:
System Modeling with UML State Machines. Handbook of Finite State Based Models and Applications 2012: 371-386 - 2011
- [j23]Omar el Ariss, Dianxiang Xu, W. Eric Wong:
Integrating Safety Analysis With Functional Modeling. IEEE Trans. Syst. Man Cybern. Part A 41(4): 610-624 (2011) - [c47]Dianxiang Xu:
A Tool for Automated Test Code Generation from High-Level Petri Nets. Petri Nets 2011: 308-317 - [c46]Lijo Thomas, Weifeng Xu, Dianxiang Xu:
Mutation Analysis of Magento for Evaluating Threat Model-Based Security Testing. COMPSAC Workshops 2011: 184-189 - [c45]Manghui Tu, Dianxiang Xu, Zhonghang Xia, Jicheng Fu:
Reach Availability Modeling of Replicated Services. COMPSAC 2011: 688-693 - [c44]Junhua Ding, Tong Wu, Dianxiang Xu, Jun Q. Lu, Xin-Hua Hu:
Metamorphic testing of a Monte Carlo modeling program. AST 2011: 1-7 - [c43]Omar el Ariss, Dianxiang Xu:
Modeling security attacks with statecharts. QoSA/ISARCS 2011: 123-132 - [c42]Daniel Woodraska, Michael Sanford, Dianxiang Xu:
Security mutation testing of the FileZilla FTP server. SAC 2011: 1425-1430 - [c41]Michael Sanford, Daniel Woodraska, Dianxiang Xu:
Security Analysis of FileZilla Server Using Threat Models. SEKE 2011: 678-682 - [c40]Omar el Ariss, Jianfei Wu, Dianxiang Xu:
Towards an Enhanced Design Level Security: Integrating Attack Trees with Statecharts. SSIRI 2011: 1-10 - 2010
- [j22]Phillip A. Laplante, Fevzi Belli, Jerry Gao, Greg Kapfhammer, Keith W. Miller, W. Eric Wong, Dianxiang Xu:
Software Test Automation. Adv. Softw. Eng. 2010: 163746:1-163746:2 (2010) - [j21]Jun Kong, Dianxiang Xu, Xiaoqin Zeng:
Uml-Based Modeling and Analysis of Security Threats. Int. J. Softw. Eng. Knowl. Eng. 20(6): 875-897 (2010) - [c39]Dianxiang Xu, Junhua Ding:
Prioritizing State-Based Aspect Tests. ICST 2010: 265-274 - [c38]Omar el Ariss, Dianxiang Xu, Santosh Dandey, Bradley Vender, Philip E. McClean, Brian M. Slator:
A Systematic Capture and Replay Strategy for Testing Complex GUI Based Java Applications. ITNG 2010: 1038-1043 - [c37]Yong Wang, Dianxiang Xu, William M. Lively, Dick B. Simmons:
A Stochastic Model for Optimizing the Patching Time of Software Bugs. SEKE 2010: 88-92
2000 – 2009
- 2009
- [j20]Dianxiang Xu, Weifeng Xu, W. Eric Wong:
Automated Test Code Generation from Class State Models. Int. J. Softw. Eng. Knowl. Eng. 19(4): 599-623 (2009) - [j19]Dianxiang Xu, Omar el Ariss, Weifeng Xu, Lin-Zhang Wang:
Aspect-Oriented Modeling and Verification with Finite State Machines. J. Comput. Sci. Technol. 24(5): 949-961 (2009) - [j18]Jun Kong, Kang Zhang, Jing Dong, Dianxiang Xu:
Specifying behavioral semantics of UML diagrams through graph transformations. J. Syst. Softw. 82(2): 292-306 (2009) - [c36]Jianfei Wu, Anne Denton, Omar el Ariss, Dianxiang Xu:
Mining for Core Patterns in Stock Market Data. ICDM Workshops 2009: 558-563 - [c35]Aaron Marback, Hyunsook Do, Ke He, Samuel Kondamarri, Dianxiang Xu:
Security Test Generation Using Threat Trees. AST 2009: 62-69 - [c34]Weifeng Xu, Dianxiang Xu:
Automated Evaluation of Runtime Object States against Model-Level States for State-Based Test Execution. ICST Workshops 2009: 3-9 - [c33]Zhanqi Cui, Linzhang Wang, Xuandong Li, Dianxiang Xu:
Modeling and integrating aspects with UML activity diagrams. SAC 2009: 430-437 - [c32]Sathish Pinagapani, Dianxiang Xu, Jun Kong:
A Comparative Study of Access Control Languages. SSIRI 2009: 407-412 - 2008
- [j17]Dianxiang Xu, Vivek Goel, Kendall E. Nygard, W. Eric Wong:
Aspect-oriented specification of threat-driven security requirements. Int. J. Comput. Appl. Technol. 31(1/2): 131-140 (2008) - [j16]Dianxiang Xu, Weifeng Xu, W. Eric Wong:
Testing Aspect-Oriented Programs with UML Design Models. Int. J. Softw. Eng. Knowl. Eng. 18(3): 413-437 (2008) - [c31]Kendall E. Nygard, Dianxiang Xu, Jonathan Pikalek, Martin C. Lundell:
Multi-agent designs for ambient systems. AMBI-SYS 2008: 10 - [c30]Jun Kong, Dianxiang Xu:
A UML-Based Framework for Design and Analysis of Dependable Software. COMPSAC 2008: 28-31 - [c29]Omar el Ariss, Dianxiang Xu, W. Eric Wong, Yuting Chen, Yann-Hang Lee:
A Systematic Approach for Integrating Fault Trees into System Statecharts. COMPSAC 2008: 120-123 - [p1]Dianxiang Xu:
Software Security. Wiley Encyclopedia of Computer Science and Engineering 2008 - 2007
- [c28]Dianxiang Xu, Xudong He:
Generation of test requirements from aspectual use cases. WTAOP@AOSD 2007: 17-22 - [c27]Dianxiang Xu, Izzat Alsmadi, Weifeng Xu:
Model Checking Aspect-Oriented Design Specification. COMPSAC (1) 2007: 491-500 - [c26]Linzhang Wang, W. Eric Wong, Dianxiang Xu:
A Threat Model Driven Approach for Security Testing. SESS@ICSE 2007: 10 - [c25]Dianxiang Xu, Weifeng Xu, W. Eric Wong:
Automated Test Code Generation from UML Protocol State Machines. SEKE 2007: 99-104 - [e1]Dianxiang Xu, Roger T. Alexander:
Proceedings of the 3rd workshop on Testing aspect-oriented programs, WTAOP 2007, Vancouver, British Columbia, Canada, March 12-13, 2007. ACM 2007, ISBN 978-1-59593-663-9 [contents] - 2006
- [j15]Junhua Ding, Peter J. Clarke, Dianxiang Xu, Xudong He, Yi Deng:
A formal model-based approach for developing an interoperable mobile agent system. Multiagent Grid Syst. 2(4): 401-412 (2006) - [j14]Dianxiang Xu, Kendall E. Nygard:
Threat-Driven Modeling and Verification of Secure Software Using Aspect-Oriented Petri Nets. IEEE Trans. Software Eng. 32(4): 265-278 (2006) - [c24]Dianxiang Xu, Weifeng Xu:
State-based incremental testing of aspect-oriented programs. AOSD 2006: 180-189 - [c23]Dianxiang Xu, Vivek Goel, Kendall E. Nygard:
An Aspect-Oriented Approach to Security Requirements Analysis. COMPSAC (2) 2006: 79-82 - [c22]Joshua J. Pauli, Dianxiang Xu:
Integrating Functional and Security Requirements with Use Case Decomposition. ICECCS 2006: 57-66 - [c21]Weifeng Xu, Dianxiang Xu:
State-based testing of integration aspects. WTAOP 2006: 7-14 - [c20]Joshua J. Pauli, Dianxiang Xu:
Ensuring Consistent Use/Misuse Case Decomposition for Secure Systems. SEKE 2006: 392-397 - 2005
- [c19]Dianxiang Xu, Joshua J. Pauli:
Threat-Driven Architectural Design of Secure Information Systems. ICEIS (3) 2005: 136-143 - [c18]Wu-Jun Li, Chong-Jun Wang, Dianxiang Xu, Bin Luo, Zhaoqian Chen:
A Study on Illumination Invariant Face Recognition Methods Based on Multiple Eigenspaces. ISNN (2) 2005: 131-136 - [c17]Joshua J. Pauli, Dianxiang Xu:
Misuse Case-Based Design and Analysis of Secure Software Architecture. ITCC (2) 2005: 398-403 - [c16]Dianxiang Xu, Vivek Goel:
An Aspect-Oriented Approach to Mobile Agent Access Control. ITCC (1) 2005: 668-673 - [c15]Dianxiang Xu, Kendall E. Nygard:
A threat-driven approach to modeling and verifying secure software. ASE 2005: 342-346 - [c14]Dianxiang Xu, Weifeng Xu, Kendall E. Nygard:
A State-Based Approach to Testing Aspect-Oriented Programs. SEKE 2005: 366-371 - [c13]Junhua Ding, Dianxiang Xu, Yi Deng, Peter J. Clarke, Xudong He:
Design an Interoperable Mobile Agent System Based on Predicate Transition Net Models. SEKE 2005: 560-565 - [c12]Joshua J. Pauli, Dianxiang Xu:
Trade-off Analysis of Misuse Case-based Secure Software Architectures: A Case Study. MSVVEIS 2005: 89-95 - 2004
- [j13]Sen Cao Richard, Richard A. Volz, Jamison Johnson, Jonathan Whetzel, Dianxiang Xu, Maitreyi Nanjanath:
Development of a distributed multi-player computer game for scientific experimentation of team training protocols. Electron. Libr. 22(1): 43-54 (2004) - [c11]Wu-Jun Li, Chong-Jun Wang, Dianxiang Xu, Shifu Chen:
Illumination Invariant Face Recognition Based on Neural Network Ensemble. ICTAI 2004: 486-490 - [c10]Dianxiang Xu, Priti Borse, Ken Grigsby, Kendall E. Nygard:
A Petri Net Based Software Architecture for UAV Simulation. Software Engineering Research and Practice 2004: 227-234 - 2003
- [j12]Dianxiang Xu, Richard A. Volz, Thomas R. Ioerger, John Yen:
Modeling and Analyzing Multi-Agent Behaviors Using Predicate/Transition Nets. Int. J. Softw. Eng. Knowl. Eng. 13(1): 103-124 (2003) - [j11]Dianxiang Xu, Jianwen Yin, Yi Deng, Junhua Ding:
A Formal Architectural Model for Logical Agent Mobility. IEEE Trans. Software Eng. 29(1): 31-45 (2003) - [c9]Dianxiang Xu, Michael S. Miller, Richard A. Volz, Thomas R. Ioerger:
Collaborative Agents for C2 Teamwork Simulation. IC-AI 2003: 723-729 - [c8]Dianxiang Xu, Richard A. Volz, Michael S. Miller, Jesse Plymale:
Human-Agent Teamwork for Distributed Team Training. ICTAI 2003: 602- - 2002
- [c7]Dianxiang Xu, Richard A. Volz, Thomas R. Ioerger:
Generating Parallel Based on Planning Graph Analysis of Predicate/Transition Nets. IC-AI 2002: 440-446 - [c6]Dianxiang Xu, Richard A. Volz, Thomas R. Ioerger, John Yen:
Modeling and verifying multi-agent behaviors using predicate/transition nets. SEKE 2002: 193-200 - 2001
- [c5]John Yen, Jianwen Yin, Thomas R. Ioerger, Michael S. Miller, Dianxiang Xu, Richard A. Volz:
CAST: Collaborative Agents for Simulating Teamwork. IJCAI 2001: 1135-1144 - 2000
- [c4]Dianxiang Xu, Yi Deng:
Modeling mobile agent systems with high level Petri nets. SMC 2000: 3177-3182
1990 – 1999
- 1999
- [j10]Xiaocong Fan, Dianxiang Xu, Jianmin Hou, Guoliang Zheng:
Reasoning about concurrent actions in multi-agent systems. J. Comput. Sci. Technol. 14(4): 422-428 (1999) - [j9]Dianxiang Xu:
A Type System of Logic Objects. ACM SIGPLAN Notices 34(2): 52-56 (1999) - [c3]Xiaocong Fan, Dianxiang Xu, Guoliang Zheng:
Reasoning about Inheritance and Cloning Behaviors of Software Agents. TOOLS (31) 1999: 77-82 - 1998
- [j8]Dianxiang Xu:
A logic based language for networked agents. Inf. Softw. Technol. 40(8): 435-442 (1998) - [j7]Dianxiang Xu:
Towards an object-oriented logic framework for knowledge based systems. Knowl. Based Syst. 10(6): 351-357 (1998) - [j6]Xiaocong Fan, Dianxiang Xu, Jianmin Hou, Guoliang Zheng:
SPLAW: A Computable Language for Agent-oriented Programming. ACM SIGPLAN Notices 33(1): 61-69 (1998) - [j5]Xiaocong Fan, Dianxiang Xu, Jianmin Hou, Guoliang Zheng:
Reasoning about team tracking. ACM SIGSOFT Softw. Eng. Notes 23(3): 79-82 (1998) - [c2]Xiaocong Fan, Dianxiang Xu, Jianmin Hou, Guoliang Zheng:
SPLAW: A Computable Agent-Oriented Programming Language. ISORC 1998: 144-145 - 1996
- [j4]Dianxiang Xu, Guoliang Zheng:
Towards a declarative semantics of inheritance with exceptions. J. Comput. Sci. Technol. 11(1): 61-71 (1996) - 1995
- [j3]Dianxiang Xu, Guoliang Zheng:
Logical object as a basis of knowledge based systems. J. Comput. Sci. Technol. 10(5): 425-438 (1995) - [j2]Dianxiang Xu, Guoliang Zheng:
Logical Objects with Constraints. ACM SIGPLAN Notices 30(1): 5-10 (1995) - [j1]Dianxiang Xu, Guoliang Zheng:
Inheritance as sublation and its semantics. ACM SIGSOFT Softw. Eng. Notes 20(5): 62-66 (1995) - 1994
- [c1]Shifu Chen, Dianxiang Xu:
KBMDL: A Knowledge Based Model Description Language for Decision Support. ICTAI 1994: 696-699
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-28 20:15 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint