2008 | ||
---|---|---|
92 | EE | Ronghua Lu, Jun Han, Xiaoyang Zeng, Qing Li, Lang Mai, Jia Zhao: A low-cost cryptographic processor for security embedded system. ASP-DAC 2008: 113-114 |
91 | EE | Tan Phan, Jun Han, Jean-Guy Schneider, Tim Ebringer, Tony Rogers: A Survey of Policy-Based Management Approaches for Service Oriented Systems. Australian Software Engineering Conference 2008: 392-401 |
90 | EE | Artem Vorobiev, Jun Han, Nargiza Bekmamedova: An Ontology Framework for Managing Security Attacks and Defences in Component Based Software Systems. Australian Software Engineering Conference 2008: 552-561 |
89 | EE | Lars Grunske, Jun Han: A Comparative Study into Architecture-Based Safety Evaluation Methodologies Using AADL's Error Annex and Failure Propagation Models. HASE 2008: 283-292 |
88 | EE | Khaled M. Khan, Jun Han: Specifying Security Goals of Component Based Systems: An End-User Perspective. ICCBSS 2008: 101-109 |
87 | EE | Zhaohao Sun, Jun Han, Dong Dong: Five Perspectives on Case Based Reasoning. ICIC (2) 2008: 410-419 |
86 | EE | Tan Phan, Jun Han, Jean-Guy Schneider, Kirk Wilson: Quality-Driven Business Policy Specification and Refinement for Service-Oriented Systems. ICSOC 2008: 5-21 |
85 | EE | Ingo Müller, Jun Han, Jean-Guy Schneider, Steven Versteeg: A Conceptual Framework for Unified and Comprehensive SOA Management. ICSOC Workshops 2008: 28-40 |
84 | EE | Daxian Yun, Yanjie Peng, Jun Han, Xiaoyang Zeng: Tracking loop for IR-UWB communications in IEEE 802.15 multi-path channels. ISCAS 2008: 2490-2493 |
83 | EE | Liang Li, Jun Han, Xiaoyang Zeng, Jia Zhao: A full-custom design of AES SubByte module with signal independent power consumption. ISCAS 2008: 3302-3305 |
82 | EE | Li Qing, Xiaoyang Zeng, Wu Chuan, Zhang Yulong, Deng Yunsong, Jun Han: Optimal frame synchronization for DVB-S2. ISCAS 2008: 956-959 |
81 | EE | Shravya Nimmagadda, Amrita Basu, Matthew Eavenson, Jun Han, Maciej Janik, Rajesh Narra, Kishore Nimmagadda, Arpan Sharma, Krys Kochut, John A. Miller, William S. York: GlycoVault: A Bioinformatics Infrastructure for Glycan Pathway Visualization, Analysis and Modeling. ITNG 2008: 692-697 |
80 | EE | Antony Tang, Minh H. Tran, Jun Han, Hans van Vliet: Design Reasoning Improves Software Design Quality. QoSA 2008: 28-42 |
79 | EE | John C. Grundy, Jun Han: Introduction to the Special Issue. Journal of Systems and Software 81(12): 2105 (2008) |
2007 | ||
78 | EE | Jun Han, Zhaohao Sun, Jinpeng Huai, Xian Li: An Efficient Node Partitioning Algorithm for the Capacitated Minimum Spanning Tree Problem. ACIS-ICIS 2007: 575-580 |
77 | EE | Jun Han, Xudong Liu, Jinpeng Huai, Xuelian Lin, Xiaoxuan Ma, Xian Li: InfoXP: An E-government Information eXchange Platform Based on Overlay Network. ACIS-ICIS 2007: 949-954 |
76 | Jian Yu, Jun Han, Paolo Falcarin, Maurizio Morisio: Using Temporal Business Rules to Synthesize Service Composition Process Models. ACT4SOC 2007: 85-94 | |
75 | EE | Alan W. Colman, Linh Duy Pham, Jun Han, Jean-Guy Schneider: Towards Dynamic Matching of Business-Level Protocols in Adaptive Service Compositions. Business Process Management Workshops 2007: 502-507 |
74 | EE | Jun Han, Alan W. Colman: The Four Major Challenges of Engineering Adaptive Software Architectures. COMPSAC (2) 2007: 565-572 |
73 | EE | Zhaohao Sun, Sukui Lu, Jun Han, Gavin R. Finnie: Experience-Based Trust in E-Commerce. I3E (1) 2007: 643-651 |
72 | EE | Kuien Liu, Qing Wang, Jun Han, Hu Wu: A Privacy Protection Method for P2P-based Web Service Discovery. ICEBE 2007: 551-558 |
71 | EE | Xuelian Lin, Jinpeng Huai, Xudong Liu, Jun Han: Active Peer to Peer. ICN 2007: 31 |
70 | EE | Xudong Liu, Xiaoxuan Ma, Jun Han, Xuelian Lin: A dual scale heterogeneous organizational network model. ICPADS 2007: 1-8 |
69 | EE | Yan Jin, Antony Tang, Jun Han, Yan Liu: Performance Evaluation and Prediction for Legacy Information Systems. ICSE 2007: 540-549 |
68 | EE | Jun Han, Yan Jin, Zheng Li, Tan Phan, Jian Yu: Guiding the Service Composition Process with Temporal Business Rules. ICWS 2007: 735-742 |
67 | EE | Jing Wang, Lang Mai, Yanjie Peng, Jun Han, Xiaoyang Zeng: An Energy-Proportion Synchronization Method for IR-UWB Communications. ISCAS 2007: 2578-2581 |
66 | EE | Yehua Gu, Xiaoyang Zeng, Jun Han, Jia Zhao: A Low-cost and High-performance SoC Design for OMA DRM2 Applications. ISCAS 2007: 3510-3513 |
65 | EE | Tan Phan, Jun Han, Jean-Guy Schneider, Tim Ebringer, Tony Rogers: Policy-Based Service Registration and Discovery. OTM Conferences (1) 2007: 417-426 |
64 | EE | Alan W. Colman, Jun Han: Roles, players and adaptable organizations. Applied Ontology 2(2): 105-126 (2007) |
63 | EE | Antony Tang, Ann E. Nicholson, Yan Jin, Jun Han: Using Bayesian belief networks for change impact analysis in architecture design. Journal of Systems and Software 80(1): 127-148 (2007) |
62 | EE | Antony Tang, Yan Jin, Jun Han: A rationale-based architecture model for design traceability and reasoning. Journal of Systems and Software 80(6): 918-934 (2007) |
61 | EE | Alan W. Colman, Jun Han: Using role-based coordination to achieve software adaptability. Sci. Comput. Program. 64(2): 223-245 (2007) |
2006 | ||
60 | Elisabetta Di Nitto, Robert J. Hall, Jun Han, Yanbo Han, Andrea Polini, Kurt Sandkuhl, Andrea Zisman: The 2006 International Workshop on Service Oriented Software Engineering (IW-SOSE '06), May 27-28, 2006, Shanghai, China, in conjunction with ICSE 2006 IEEE Computer Society 2006 | |
59 | EE | Artem Vorobiev, Jun Han: Secrobat: Secure and Robust Component-based Architectures. APSEC 2006: 3-10 |
58 | EE | Jun Han, Khaled M. Khan: Security-Oriented Service Composition and Evolution. APSEC 2006: 71-78 |
57 | EE | Min Wu, Xiaoyang Zeng, Jun Han, Yongyi Wu, Yibo Fan: A high-performance platform-based SoC for information security. ASP-DAC 2006: 122-123 |
56 | EE | Khaled M. Khan, Jun Han: Assessing Security Properties of Software Components: A Software Engineer's Perspective. ASWEC 2006: 199-210 |
55 | EE | Zheng Li, Yan Jin, Jun Han: A Runtime Monitoring and Validation Framework for Web Service Interactions. ASWEC 2006: 70-79 |
54 | EE | Zhaohao Sun, Jun Han: Inverse alpha-Cuts and Interval [a, b) -Cuts. ICICIC (1) 2006: 441-444 |
53 | EE | Elisabetta Di Nitto, Robert J. Hall, Jun Han, Yanbo Han, Andrea Polini, Kurt Sandkuhl, Andrea Zisman: International workshop on service oriented software engineering (IW-SOSE'06). ICSE 2006: 1036-1037 |
52 | EE | Xuan Thang Nguyen, Ryszard Kowalczyk, Jun Han: Using Dynamic Asynchronous Aggregate Search for Quality Guarantees of Multiple Web Services Compositions. ICSOC 2006: 129-140 |
51 | EE | Boris Wu, Jian Ying Zhang, Mohan Baruwal Chhetri, Jian Lin, SukKeong Goh, Xuan Thang Nguyen, Ingo Müller, E. Gomes, L. Zheng, Jun Han, Ryszard Kowalczyk: Adaptive Service Agreement and Process Management. ICWS 2006: 927-930 |
50 | EE | Jun Han, Yanbo Han, Yan Jin, Jianwu Wang, Jian Yu: Personalized Active Service Spaces for End-User Service Composition. IEEE SCC 2006: 198-205 |
49 | EE | Alan W. Colman, Linh Duy Pham, Jun Han, Jean-Guy Schneider: Adaptive application-specific middleware. MW4SOC 2006: 6-11 |
48 | EE | Muhammad Ali Babar, Antony Tang, Ian Gorton, Jun Han: Industrial Perspective on the Usefulness of Design Rationale for Software Maintenance: A Survey. QSIC 2006: 201-208 |
47 | EE | Artem Vorobiev, Jun Han: Specifying Dynamic Security Properties of Web Service Based Systems. SKG 2006: 34 |
46 | EE | Artem Vorobiev, Jun Han: Security Attack Ontology for Web Services. SKG 2006: 42 |
45 | EE | Jinpeng Huai, Xianxian Li, Wenyi Zhang, Jun Han, Yongzhen Zhuang: A Software Protocol of Goals and Operations Based on BDI Model. SUTC (1) 2006: 454-461 |
44 | EE | Jian Yu, Tan Phan Manh, Jun Han, Yan Jin, Yanbo Han, Jianwu Wang: Pattern Based Property Specification and Verification for Service Composition. WISE 2006: 156-168 |
43 | EE | Elisabetta Di Nitto, Robert J. Hall, Jun Han, Yanbo Han, Andrea Polini, Kurt Sandkuhl, Andrea Zisman: Report on the International Workshop on Service Oriented Software Engineering (IW-SOSE06). ACM SIGSOFT Software Engineering Notes 31(5): 36-38 (2006) |
42 | EE | Alan W. Colman, Jun Han: Using Association Aspects to Implement Organisational Contracts. Electr. Notes Theor. Comput. Sci. 150(3): 37-53 (2006) |
41 | EE | Antony Tang, Muhammad Ali Babar, Ian Gorton, Jun Han: A survey of architecture design rationale. Journal of Systems and Software 79(12): 1792-1804 (2006) |
2005 | ||
40 | EE | Yan Jin, Jun Han: Consistency and Interoperability Checking for Component Interaction Rules. APSEC 2005: 595-602 |
39 | EE | Alan W. Colman, Jun Han: Operational Management Contracts for Adaptive Software Organisation. Australian Software Engineering Conference 2005: 170-179 |
38 | EE | Khaled M. Khan, Jun Han: Deriving Systems Level Security Properties of Component Based Composite Systems. Australian Software Engineering Conference 2005: 334-343 |
37 | EE | Alan W. Colman, Jun Han: Coordination Systems in Role-Based Adaptive Software. COORDINATION 2005: 63-78 |
36 | EE | Antony Tang, Jun Han: Architecture Rationalization: A Methodology for Architecture Verifiability, Traceability and Completeness. ECBS 2005: 135-144 |
35 | EE | Alan W. Colman, Jun Han: Organizational Abstractions for Adaptive Systems. HICSS 2005 |
34 | EE | Yan Jin, Jun Han: Specifying Interaction Constraints of Software Components for Better Understandability and Interoperability. ICCBSS 2005: 54-64 |
33 | EE | Jinpeng Huai, Jun Han: An Enhanced Exact Procedure for the CMST Problem. ICITA (2) 2005: 704-709 |
32 | EE | Zheng Li, Jun Han, Yan Jin: Pattern-Based Specification and Validation of Web Services Interaction Properties. ICSOC 2005: 73-86 |
31 | EE | Yan Jin, Jun Han: Runtime Validation of Behavioural Contracts for Component Software. QSIC 2005: 177-186 |
30 | EE | Antony Tang, Yan Jin, Jun Han, Ann E. Nicholson: Predicting Change Impact in Architecture Design with Bayesian Belief Networks. WICSA 2005: 67-76 |
29 | EE | Antony Tang, Muhammad Ali Babar, Ian Gorton, Jun Han: A Survey of the Use and Documentation of Architecture Design Rationale. WICSA 2005: 89-98 |
2004 | ||
28 | EE | Antony Tang, Jun Han, Pin Chen: A Comparative Analysis of Architecture Frameworks. APSEC 2004: 640-647 |
27 | EE | Khaled M. Khan, Jun Han: A Process Framework for Characterising Security Properties of Component-Based Software Systems. Australian Software Engineering Conference 2004: 358-367 |
26 | EE | Jun Han: A Software Engineering Perspective for Services Security. GCC Workshops 2004: 366-373 |
2003 | ||
25 | EE | Jun Han, Ksze Kae Ker: Ensuring Compatible Interactions within Component-based Software Systems. APSEC 2003: 436-445 |
24 | EE | Khaled M. Khan, Jun Han: A Security Characterisation Framework for Trustworthy Component Based Software Systems. COMPSAC 2003: 164-169 |
23 | EE | Jun Han: Interaction Compatibility: An Essential Ingredient for Service Composition. GCC (1) 2003: 59-66 |
22 | EE | Jun Han, Graham McMahon, Stephen Sugden: A Node-oriented Branch and Bound Algorithm for the Capacitated Minimum Spanning Tree Problem. LCN 2003: 460-469 |
2002 | ||
21 | EE | Jun Han, Pin Chen: Architecture Support for System-of-Systems Evolution. EDCIS 2002: 332-346 |
20 | EE | Jun Han, Graham McMahon, Stephen Sugden: A Branch and Bound Algorithm for Capacitated Minimum Spanning Tree Problem (Research Note). Euro-Par 2002: 404-408 |
19 | EE | Jun Han, Graham McMahon, Stephen Sugden: A Branch and Bound Algorithm for Minimum Cost Network Flow Problem. IDEAL 2002: 167-172 |
18 | Jiang B. Liu, Jun Han: A Practical Knowledge Discovery Process for Distributed Data Mining. ISCA Conference on Intelligent Systems 2002: 11-16 | |
17 | EE | Khaled M. Khan, Jun Han: Composing Security-Aware Software. IEEE Software 19(1): 34-41 (2002) |
2001 | ||
16 | EE | Jun Han: TRAM: A Tool for Requirements and Architecture Management. ACSC 2001: 60-68 |
15 | EE | Khaled M. Khan, Jun Han, Yuliang Zheng: A Framework for an Active Interface to Characterise Compositional Security Contracts of Software Components. Australian Software Engineering Conference 2001: 117-126 |
2000 | ||
14 | EE | Khaled M. Khan, Jun Han, Yuliang Zheng: Characterizing User Data Protection of Software Components. Australian Software Engineering Conference 2000: 3-12 |
13 | EE | Khaled M. Khan, Jun Han, Yuliang Zheng: Security Characterization of Software Components and Their Composition. TOOLS (36) 2000: 240-249 |
1999 | ||
12 | Jun Han: Semantic and Usage Packaging for Software Components. ECOOP Workshops 1999: 7-8 | |
11 | EE | Khaled M. Khan, Jun Han, Yuliang Zheng: Security Properties of Software Components. ISW 1999: 52-56 |
1998 | ||
10 | EE | Jun Han: A Comprehensive Interface Definition Framework for Software Components. APSEC 1998: 110- |
9 | Yun Yang, Jun Han: A Productivity-Centred Approach for Classifying Software Tool Interfacing. J. Braz. Comp. Soc. 5(1): (1998) | |
1997 | ||
8 | EE | Hardeep Singh, Jun Han: Increasing Concurrency in Object-Oriented Databases for Software Engineering Environments. DASFAA 1997: 175-184 |
7 | EE | Jun Han: Object-Oriented Modeling of Software Processes and Artifacts: Promises and Challenges. ECOOP Workshops 1997: 315-318 |
6 | EE | Jun Han: Designing for Increased Software Maintainability. ICSM 1997: 278-286 |
1996 | ||
5 | EE | Yun Yang, Jun Han: Classification of and Experimentation on Tool Interfacing in Software Development Environments. APSEC 1996: 56-65 |
1995 | ||
4 | EE | Jun Han: Providing Configuration Management Support in Software Engineering Environments. APSEC 1995: 282- |
3 | Jun Han, Claudio Moraga: The Influence of the Sigmoid Function Parameters on the Speed of Backpropagation Learning. IWANN 1995: 195-201 | |
1994 | ||
2 | Jim Welsh, Jun Han: Software Documents: Concepts and Tools. Software - Concepts and Tools 15(1): 12-25 (1994) | |
1993 | ||
1 | Jun Han, Jim Welsh: Object Organisation in Software Environments for Formal Methods. TAPSOFT 1993: 299-313 |