default search action
Jingyue Li
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j32]Jin Zhang, Jingyue Li, Zhirong Yang:
Dynamic robustness evaluation for automated model selection in operation. Inf. Softw. Technol. 178: 107603 (2025) - 2024
- [j31]Zhe Li, Qian He, Jingyue Li:
A survey of deep learning-driven architecture for predictive maintenance. Eng. Appl. Artif. Intell. 133: 108285 (2024) - [j30]Jianyu Wu, Hao He, Kai Gao, Wenxin Xiao, Jingyue Li, Minghui Zhou:
A comprehensive analysis of challenges and strategies for software release notes on GitHub. Empir. Softw. Eng. 29(5): 104 (2024) - [j29]Tianyuan Hu, Jingyue Li, Xiangfei Xu, Bixin Li:
SoliTester: Detecting exploitable external-risky vulnerability in smart contracts using contract account triggering method. J. Softw. Evol. Process. 36(7) (2024) - [j28]Bing Zhang, Rong Ren, Jia Liu, Mingcai Jiang, Jiadong Ren, Jingyue Li:
SQLPsdem: A Proxy-Based Mechanism Towards Detecting, Locating and Preventing Second-Order SQL Injections. IEEE Trans. Software Eng. 50(7): 1807-1826 (2024) - [c70]Damilare Peter Oyinloye, Jingyue Li:
Proof of Success Rate: A Past Behaviour-Based Consensus Protocol. Blockchain 2024: 201-208 - [i11]Jakob Svennevik Notland, Jingyue Li, Mariusz Nowostawski, Peter Halland Haro:
SoK: Cross-Chain Bridging Architectural Design Flaws and Mitigations. CoRR abs/2403.00405 (2024) - 2023
- [j27]Xin Zhou, Runfeng Mao, He Zhang, Qiming Dai, Huang Huang, Haifeng Shen, Jingyue Li, Guoping Rong:
Revisit security in the era of DevOps: An evidence-based inquiry into DevSecOps industry. IET Softw. 17(4): 435-454 (2023) - [j26]Nektaria Kaloudi, Jingyue Li:
AST-SafeSec: Adaptive Stress Testing for Safety and Security Co-Analysis of Cyber-Physical Systems. IEEE Trans. Inf. Forensics Secur. 18: 5567-5579 (2023) - [j25]Jakob Svennevik Notland, Mariusz Nowostawski, Jingyue Li:
Runtime Evolution of Bitcoin's Consensus Rules. IEEE Trans. Software Eng. 49(9): 4477-4495 (2023) - [c69]Carl Smestad, Jingyue Li:
A Systematic Literature Review on Client Selection in Federated Learning. EASE 2023: 2-11 - [c68]Huikun Liu, Yanze Wang, Zhaowei Jiang, He Zhang, Jingyue Li, Sigurd Eileras, Haakon Pelsholen Busterud:
Perceived Trust in Blockchain Systems: An Interview-based Survey. EASE 2023: 386-393 - [c67]Jingyue Li, Per Håkon Meland, Jakob Svennevik Notland, André Storhaug, Jostein Hjortland Tysse:
Evaluating the Impact of ChatGPT on Exercises of a Software Security Course. ESEM 2023: 1-6 - [c66]Hao He, Minghui Zhou, Qingye Wang, Jingyue Li:
Open Source Software Onboarding as a University Course: An Experience Report. SEET@ICSE 2023: 324-336 - [c65]André Storhaug, Jingyue Li, Tianyuan Hu:
Efficient Avoidance of Vulnerabilities in Auto-completed Smart Contract Code Using Vulnerability-constrained Decoding. ISSRE 2023: 683-693 - [c64]Wenxin Xiao, Jingyue Li, Hao He, Ruiqiao Qiu, Minghui Zhou:
Personalized First Issue Recommender for Newcomers in Open Source Projects. ASE 2023: 800-812 - [c63]Jianyu Wu, Weiwei Xu, Kai Gao, Jingyue Li, Minghui Zhou:
Characterize Software Release Notes of GitHub Projects: Structure, Writing Style, and Content. SANER 2023: 473-484 - [i10]Jakob Svennevik Notland, Mariusz Nowostawski, Jingyue Li:
An Empirical Study on Governance in Bitcoin's Consensus Evolution. CoRR abs/2305.04079 (2023) - [i9]Carl Smestad, Jingyue Li:
A Systematic Literature Review on Client Selection in Federated Learning. CoRR abs/2306.04862 (2023) - [i8]Wenxin Xiao, Jingyue Li, Hao He, Ruiqiao Qiu, Minghui Zhou:
Personalized First Issue Recommender for Newcomers in Open Source Projects. CoRR abs/2308.09038 (2023) - [i7]André Storhaug, Jingyue Li, Tianyuan Hu:
Efficient Avoidance of Vulnerabilities in Auto-completed Smart Contract Code Using Vulnerability-constrained Decoding. CoRR abs/2309.09826 (2023) - [i6]Jingyue Li, Per Håkon Meland, Jakob Svennevik Notland, André Storhaug, Jostein Hjortland Tysse:
Evaluating the Impact of ChatGPT on Exercises of a Software Security Course. CoRR abs/2309.10085 (2023) - 2022
- [j24]Shanshan Jiang, Kine Jakobsen, Jonas Bueie, Jingyue Li, Peter Halland Haro:
A Tertiary Review on Blockchain and Sustainability With Focus on Sustainable Development Goals. IEEE Access 10: 114975-115006 (2022) - [j23]Zhe Li, Eivind Kristoffersen, Jingyue Li:
Deep transfer learning for failure prediction across failure types. Comput. Ind. Eng. 172(Part): 108521 (2022) - [j22]Bing Zhang, Jingyue Li, Jiadong Ren, Guoyan Huang:
Efficiency and Effectiveness of Web Application Vulnerability Detection Approaches: A Review. ACM Comput. Surv. 54(9): 190:1-190:35 (2022) - [j21]Elnaz Namazi, Rudolf Mester, Chaoru Lu, Jingyue Li:
Geolocation estimation of target vehicles using image processing and geometric computation. Neurocomputing 499: 35-46 (2022) - [j20]Anh Nguyen-Duc, Barbara Weber, Tao Yue, Jingyue Li:
Special section on IST for EASE2021. Inf. Softw. Technol. 152: 107046 (2022) - [c62]Kim André Midtlid, Johannes Åsheim, Jingyue Li:
Magnitude Adversarial Spectrum Search-based Black-box Attack against Image Classification. AISec@CCS 2022: 67-77 - [c61]Terje Haugum, Bjørnar Hoff, Mohammed Alsadi, Jingyue Li:
Security and Privacy Challenges in Blockchain Interoperability - A Multivocal Literature Review. EASE 2022: 347-356 - [c60]Peiru Li, Shanshan Li, Mengjie Ding, Jiapeng Yu, He Zhang, Xin Zhou, Jingyue Li:
A Vulnerability Detection Framework for Hyperledger Fabric Smart Contracts Based on Dynamic and Static Analysis. EASE 2022: 366-374 - [c59]Kim André Midtlid, Johannes Åsheim, Jingyue Li:
Understanding Black-Box Attacks Against Object Detectors from a User's Perspective. QUATIC 2022: 266-280 - [c58]Ask Berstad Kolltveit, Jingyue Li:
Operationalizing machine learning models: a systematic literature review. SE4RAI@ICSE 2022: 1-8 - [c57]Huamin Ren, Xiaomeng Su, Robert Jenssen, Jingyue Li, Stian Normann Anfinsen:
Attention-guided Temporal Convolutional Network for Non-intrusive Load Monitoring. SmartGridComm 2022: 419-425 - [c56]Eivind Solberg Rydningen, Erika Åsberg, Letizia Jaccheri, Jingyue Li:
Advantages and opportunities of the IOTA tangle for health data management: a systematic mapping study. WETSEB@ICSE 2022: 9-16 - [d1]Elnaz Namazi, Jingyue Li, Chaoru Lu:
Detailed proposed methodologies. IEEE DataPort, 2022 - [i5]Elnaz Namazi, Rudolf Mester, Chaoru Lu, Jingyue Li:
Geolocation estimation of target vehicles using image processing and geometric computation. CoRR abs/2203.10938 (2022) - [i4]Hui Han, Jingyue Li:
Tiny Machine Learning: A New Technique for AI Security. ERCIM News 2022(129): 0 (2022) - 2021
- [j19]Nektaria Kaloudi, Jingyue Li:
The AI-Based Cyber Threat Landscape: A Survey. ACM Comput. Surv. 53(1): 20:1-20:34 (2021) - [c55]Sindre Beba, Magnus Melseth Karlsen, Jingyue Li, Bing Zhang:
Critical Understanding of Security Vulnerability Detection Plugin Evaluation Reports. APSEC 2021: 275-284 - [c54]Henrik Knudsen, Jakob Svennevik Notland, Peter Halland Haro, Truls Bakkejord Ræder, Jingyue Li:
Consensus in Blockchain Systems with Low Network Throughput: A Systematic Mapping Study. BIOTC 2021: 15-23 - [c53]Henrik Knudsen, Jingyue Li, Jakob Svennevik Notland, Peter Halland Haro, Truls Bakkejord Ræder:
High-Performance Asynchronous Byzantine Fault Tolerance Consensus Protocol. Blockchain 2021: 476-483 - [c52]Hong Guo, Darja Smite, Jingyue Li, Shang Gao:
Enterprise Architecture and Agility: A Systematic Mapping Study. BMSD 2021: 296-305 - [c51]Hong Guo, Jingyue Li, Shang Gao, Darja Smite:
Agile Enterprise Architecture by Leveraging Use Cases. ENASE 2021: 501-509 - [c50]Hong Guo, Jingyue Li, Shang Gao, Darja Smite:
Understanding How Enterprise Architecture Contributes to Organizational Alignment. I3E 2021: 383-396 - [c49]Huamin Ren, Filippo Maria Bianchi, Jingyue Li, Rasmus L. Olsen, Robert Jenssen, Stian Normann Anfinsen:
Towards Applicability: A Comparative Study on Non-Intrusive Load Monitoring Algorithms. ICCE 2021: 1-5 - [c48]Hong Guo, Jingyue Li, Shang Gao, Darja Smite:
Boost the Potential of EA: Essential Practices. ICEIS (2) 2021: 735-742 - [c47]Shanshan Jiang, Kine Jakobsen, Letizia Jaccheri, Jingyue Li:
Blockchain and Sustainability: A Tertiary Study. BoKSS@ICSE 2021: 7-8 - [c46]Torstein Meyer, Nektaria Kaloudi, Jingyue Li:
A Systematic Literature Review on Malicious Use of Reinforcement Learning. EnCyCriS@ICSE 2021: 21-28 - [c45]Alexander Michael Staff, Jin Zhang, Jingyue Li, Jing Xie, Elizabeth Ann Traiger, Jon Arne Glomsrud, Kristian Bertheussen Karolius:
An Empirical Study on Cross-Data Transferability of Adversarial Attacks on Object Detectors. AI-Cybersec@SGAI 2021: 38-52 - [c44]Zhaoni Liu, Xianmin Wang, Zhikun Chen, Ming Zhao, Sihai Zhang, Jingyue Li:
3D-Fingerprint Augment based on Super-Resolution for Indoor 3D WiFi Localization. WCSP 2021: 1-5 - [e2]Ruzanna Chitchyan, Jingyue Li, Barbara Weber, Tao Yue:
EASE 2021: Evaluation and Assessment in Software Engineering, Trondheim, Norway, June 21-24, 2021. ACM 2021, ISBN 978-1-4503-9053-8 [contents] - [i3]Henrik Knudsen, Jakob Svennevik Notland, Peter Halland Haro, Truls Bakkejord Ræder, Jingyue Li:
Consensus in Blockchain Systems with Low Network Throughput: A Systematic Mapping Study. CoRR abs/2103.02916 (2021) - [i2]Shanshan Jiang, Kine Jakobsen, Letizia Jaccheri, Jingyue Li:
Blockchain and Sustainability: A Tertiary Study. CoRR abs/2103.16937 (2021) - 2020
- [j18]Jin Zhang, Jingyue Li:
Testing and verification of neural-network-based safety-critical control software: A systematic literature review. Inf. Softw. Technol. 123: 106296 (2020) - [c43]Elias Brattli Sørensen, Edvard Kristoffer Karlsen, Jingyue Li:
What Norwegian Developers Want and Need From Security-Directed Program Analysis Tools: A Survey. EASE 2020: 505-511 - [c42]Elnaz Namazi, Jingyue Li, Rudolf Mester, Chaoru Lu:
Identifying and Counting Vehicles in Multiple Lanes by Using a Low-Cost Vehicle-Mounted Sensor for Intelligent Traffic Management Systems. HAIS 2020: 598-611 - [e1]Jingyue Li, Letizia Jaccheri, Torgeir Dingsøyr, Ruzanna Chitchyan:
EASE '20: Evaluation and Assessment in Software Engineering, Trondheim, Norway, April 15-17, 2020. ACM 2020, ISBN 978-1-4503-7731-7 [contents]
2010 – 2019
- 2019
- [j17]Elnaz Namazi, Jingyue Li, Chaoru Lu:
Intelligent Intersection Management Systems Considering Autonomous Vehicles: A Systematic Literature Review. IEEE Access 7: 91946-91965 (2019) - [j16]Chen Wang, Liang Peng, Jingyue Li, Zeng-Guang Hou, Weiqun Wang:
Quantitative Analysis of Motor Synergies and Assessment of Upper-limb Motor Function for Post-stroke Rehabilitation Based on Multi-modal Data Fusion. Aust. J. Intell. Inf. Process. Syst. 15(3): 25-33 (2019) - [j15]Per Håkon Meland, Karin Bernsmed, Christian Frøystad, Jingyue Li, Guttorm Sindre:
An experimental evaluation of bow-tie analysis for security. Inf. Comput. Secur. 27(4) (2019) - [j14]Lulu Wang, Jingyue Li, Bixin Li:
Tracking runtime concurrent dependences in java threads using thread control profiling. J. Syst. Softw. 148: 116-131 (2019) - [j13]Lulu Wang, Jingyue Li, Bixin Li:
Erratum to "Tracking runtime concurrent dependences in java threads using thread control profiling" [The Journal of Systems and Software 148 (2019) 116-131]. J. Syst. Softw. 153: 44 (2019) - [c41]Nora Tomas, Jingyue Li, Huang Huang:
An Empirical Study on Culture, Automation, Measurement, and Sharing of DevSecOps. Cyber Security 2019: 1-8 - [c40]Jingyue Li, Sindre Beba, Magnus Melseth Karlsen:
Evaluation of Open-Source IDE Plugins for Detecting Security Vulnerabilities. EASE 2019: 200-209 - [c39]Hong Guo, Jingyue Li, Shang Gao:
Understanding Challenges of Applying Enterprise Architecture in Public Sectors: A Technology Acceptance Perspective. EDOC Workshops 2019: 38-43 - [c38]Chen Wang, Liang Peng, Zeng-Guang Hou, Jingyue Li, Lincong Luo, Sheng Chen, Weiqun Wang:
Kinematic Redundancy Analysis during Goal-Directed Motion for Trajectory Planning of an Upper-Limb Exoskeleton Robot. EMBC 2019: 5251-5255 - [c37]Hong Guo, Sobah Abbas Petersen, Shang Gao, Jingyue Li, Anthony Bokolo Jr.:
Embracing Modern Technologies and Urban Development Trends: Initial Evaluation of a Smart City Enterprise Architecture Frameworks. EMCIS 2019: 247-257 - [c36]Eivind Kristoffersen, Oluseun Omotola Aremu, Fenna Blomsma, Patrick Mikalef, Jingyue Li:
Exploring the Relationship Between Data Science and Circular Economy: An Enhanced CRISP-DM Process Model. I3E 2019: 177-189 - [c35]Eirik Harald Lund, Letizia Jaccheri, Jingyue Li, Orges Cico, Xiaoying Bai:
Blockchain and sustainability: a systematic mapping study. WETSEB@ICSE 2019: 16-23 - [c34]Dag Erik Homdrum Løvgren, Jingyue Li, Tosin Daniel Oyetoyan:
A data-driven security game to facilitate information security education. ICSE (Companion Volume) 2019: 256-257 - [c33]Shanshan Jiang, Thomas F. Hagelien, Marit K. Natvig, Jingyue Li:
Ontology-Based Semantic Search for Open Government Data. ICSC 2019: 7-15 - [c32]Elnaz Namazi, Rein Nisja Holthe-Berg, Christoffer Skar Lofsberg, Jingyue Li:
Using Vehicle-Mounted Camera to Collect Information for Managing Mixed Traffic. SITIS 2019: 222-230 - [i1]Jin Zhang, Jingyue Li:
Testing and verification of neural-network-based safety-critical control software: A systematic literature review. CoRR abs/1910.06715 (2019) - 2018
- [c31]Per Håkon Meland, Karin Bernsmed, Christian Frøystad, Jingyue Li, Guttorm Sindre:
An Experimental Evaluation of Bow-Tie Analysis for Cybersecurity Requirements. CyberICPS/SECPRE@ESORICS 2018: 173-191 - [c30]Jingyue Li, Jin Zhang, Nektaria Kaloudi:
Could We Issue Driving Licenses to Autonomous Vehicles? SAFECOMP Workshops 2018: 473-480 - 2017
- [c29]Kristian Fjeld Hasselknippe, Jingyue Li:
A Novel Tool for Automatic GUI Layout Testing. APSEC 2017: 695-700 - 2016
- [c28]Jingyue Li, Altin Qeriqi, Martin Steffen, Ingrid Chieh Yu:
Automatic translation from FBD-PLC-programs to NuSMV for model checking safety-critical control systems. NIK 2016 - 2015
- [c27]Jingyue Li, Torbjørn Skramstad, Thierry Coq:
Interface Information Management Tools for the Maritime and Oil and Gas Industry. COMPSAC Workshops 2015: 164-169 - [c26]Zhen-zhen Zhu, Jingyue Li, Si-si Yang, Hong Zhou:
A moving foreground objects extraction method under camouflage effect. ICDIP 2015: 963102 - 2014
- [j12]Zhihao Liu, Qin-he Gao, Gangfeng Deng, Hai-long Niu, Jingyue Li:
The position control of hydraulic cylinder based on high-speed on-off valve. Int. J. Model. Identif. Control. 22(1): 54-67 (2014) - 2013
- [p1]Claudia P. Ayala, Xavier Franch, Reidar Conradi, Jingyue Li, Daniela S. Cruzes:
Developing Software with Open Source Software Components. Finding Source Code on the Web for Remix and Reuse 2013: 167-186 - 2012
- [j11]Jingyue Li, Tor Stålhane, Reidar Conradi, Jan M. W. Kristiansen:
Enhancing Defect Tracking Systems to Facilitate Software Quality Improvement. IEEE Softw. 29(2): 59-66 (2012) - [c25]Jingyue Li, Michael D. Ernst:
CBCD: Cloned buggy code detector. ICSE 2012: 310-320 - 2011
- [j10]Claudia P. Ayala, Øyvind Hauge, Reidar Conradi, Xavier Franch, Jingyue Li:
Selection of third party software in Off-The-Shelf-based software development - An interview study with industrial practitioners. J. Syst. Softw. 84(4): 620-637 (2011) - [c24]Erik Stensrud, Torbjørn Skramstad, Jingyue Li, Jing Xie:
Towards Goal-Based Software Safety Certification Based on Prescriptive Standards. WOSOCER 2011: 13-18 - 2010
- [j9]Anita Gupta, Jingyue Li, Reidar Conradi, Harald Rønneberg, Einar Landre:
Change profiles of a reused class framework vs. two of its applications. Inf. Softw. Technol. 52(1): 110-125 (2010) - [c23]Jingyue Li, Nils Brede Moe, Tore Dybå:
Transition from a plan-driven process to Scrum: a longitudinal case study on software quality. ESEM 2010 - [c22]Jingyue Li, Tor Stålhane, Jan M. W. Kristiansen, Reidar Conradi:
Cost drivers of software corrective maintenance: An empirical study in two companies. ICSM 2010: 1-8
2000 – 2009
- 2009
- [j8]Anita Gupta, Jingyue Li, Reidar Conradi, Harald Rønneberg, Einar Landre:
A case study comparing defect profiles of a reused framework and of applications reusing it. Empir. Softw. Eng. 14(2): 227-255 (2009) - [j7]Jingyue Li, Reidar Conradi, Christian Bunse, Marco Torchiano, Odd Petter N. Slyngstad, Maurizio Morisio:
Development with Off-the-Shelf Components: 10 Facts. IEEE Softw. 26(2): 80-87 (2009) - [c21]Claudia P. Ayala, Øyvind Hauge, Reidar Conradi, Xavier Franch, Jingyue Li, Ketil Sandanger Velle:
Challenges of the Open Source Component Marketplace in the Industry. OSS 2009: 213-224 - 2008
- [j6]Weibing Chen, Jingyue Li, Jianqiang Ma, Reidar Conradi, Junzhong Ji, Chunnian Liu:
An empirical study on software development with open source components in the chinese software industry. Softw. Process. Improv. Pract. 13(1): 89-100 (2008) - [j5]Jianqiang Ma, Jingyue Li, Weibing Chen, Reidar Conradi, Junzhong Ji, Chunnian Liu:
A state-of-the-practice study on communication and coordination between chinese software suppliers and their global outsourcers. Softw. Process. Improv. Pract. 13(3): 233-247 (2008) - [j4]Jingyue Li, Reidar Conradi, Odd Petter N. Slyngstad, Marco Torchiano, Maurizio Morisio, Christian Bunse:
A State-of-the-Practice Survey of Risk Management in Development with Off-the-Shelf Software Components. IEEE Trans. Software Eng. 34(2): 271-286 (2008) - [c20]Junzhong Ji, Jingyue Li, Reidar Conradi, Chunnian Liu, Jianqiang Ma, Weibing Chen:
Some lessons learned in conducting software engineering surveys in china. ESEM 2008: 168-177 - [c19]Odd Petter N. Slyngstad, Jingyue Li, Reidar Conradi, Harald Rønneberg, Einar Landre, Harald Wesenberg:
The Impact of Test Driven Development on the Evolution of a Reusable Framework of Components - An Industrial Case Study. ICSEA 2008: 214-223 - [c18]Odd Petter N. Slyngstad, Jingyue Li, Reidar Conradi, Muhammad Ali Babar:
Identifying and Understanding Architectural Risks in Software Evolution: An Empirical Study. PROFES 2008: 400-414 - 2007
- [c17]Jingyue Li, Jianqiang Ma, Reidar Conradi, Weibing Chen, Junzhong Ji, Chunnian Liu:
A Survey on the Business Relationship between Chinese Outsourcing Software Suppliers and Their Outsourcers. APSEC 2007: 470-477 - [c16]Jingyue Li, Anita Gupta, Jon Arvid Børretzen, Reidar Conradi:
The Empirical Studies on Quality Benefits of Reusing Software Components. COMPSAC (2) 2007: 399-402 - [c15]Jingyue Li, Xiaomeng Su:
Making Cost Effective Security Decision with Real Option Thinking. ICSEA 2007: 14 - [c14]Weibing Chen, Jingyue Li, Jianqiang Ma, Reidar Conradi, Junzhong Ji, Chunnian Liu:
A Survey of Software Development with Open Source Components in Chinese Software Industry. ICSP 2007: 208-220 - [c13]Claudia P. Ayala, Carl-Fredrik Sørensen, Reidar Conradi, Xavier Franch, Jingyue Li:
Open Source Collaboration for Fostering Off-The-Shelf Components Selection. OSS 2007: 17-30 - [c12]Jianqiang Ma, Jingyue Li, Weibing Chen, Reidar Conradi, Junzhong Ji, Chunnian Liu:
An Industrial Survey of Software Outsourcing in China. PROFES 2007: 5-19 - 2006
- [j3]Jingyue Li, Finn Olav Bjørnson, Reidar Conradi, Vigdis By Kampenes:
An empirical study of variations in COTS-based software development processes in the Norwegian IT industry. Empir. Softw. Eng. 11(3): 433-461 (2006) - [j2]Jingyue Li, Axel Anders Kvale, Reidar Conradi:
A Case Stud on Improving Changeability of COTS-Based System Using Aspect-Oriented Programming. J. Inf. Sci. Eng. 22(2): 375-390 (2006) - [c11]Jingyue Li, Reidar Conradi, Odd Petter N. Slyngstad, Christian Bunse, Marco Torchiano, Maurizio Morisio:
An empirical study on decision making in off-the-shelf component-based development. ICSE 2006: 897-900 - [c10]Jingyue Li, Marco Torchiano, Reidar Conradi, Odd Petter N. Slyngstad, Christian Bunse:
A State-of-the-Practice Survey of Off-the-Shelf Component-Based Development Processes. ICSR 2006: 16-28 - 2005
- [j1]Jingyue Li, Reidar Conradi, Odd Petter N. Slyngstad, Christian Bunse, Umair Khan, Maurizio Morisio, Marco Torchiano:
Barriers to disseminating off-the-shelf based development theories to IT industry. ACM SIGSOFT Softw. Eng. Notes 30(4): 1-4 (2005) - [c9]Jingyue Li, Reidar Conradi, Odd Petter N. Slyngstad, Marco Torchiano, Maurizio Morisio, Christian Bunse:
Preliminary Results from a State-of-the-Practice Survey on Risk Management in Off-the-Shelf Component-Based Development. ICCBSS 2005: 278-288 - [c8]Reidar Conradi, Jingyue Li, Odd Petter N. Slyngstad, Vigdis By Kampenes, Christian Bunse, Maurizio Morisio, Marco Torchiano:
Reflections on conducting an international survey of software engineering. ISESE 2005: 214-223 - [c7]Jingyue Li, Reidar Conradi, Odd Petter N. Slyngstad, Christian Bunse, Muhammad Umair Ahmed Khan, Marco Torchiano, Maurizio Morisio:
Validation of New Theses on Off-the-Shelf Component Based Development. IEEE METRICS 2005: 26 - [c6]Jingyue Li, Reidar Conradi, Odd Petter N. Slyngstad, Christian Bunse, Muhammad Umair Ahmed Khan, Marco Torchiano, Maurizio Morisio:
An Empirical Study on Off-the-Shelf Component Usage in Industrial Projects. PROFES 2005: 54-68 - [c5]Axel Anders Kvale, Jingyue Li, Reidar Conradi:
A case study on building COTS-based system using aspect-oriented programming. SAC 2005: 1491-1498 - [c4]Reidar Conradi, Jingyue Li:
Observations on versioning of off-the-shelf components in industrial projects (short paper). SCM 2005: 33-42 - 2004
- [c3]Jingyue Li, Finn Olav Bjørnson, Reidar Conradi, Vigdis By Kampenes:
An Empirical Study of Variations in COTS-based Software Development Processes in Norwegian IT Industry. IEEE METRICS 2004: 72-83 - [c2]Jingyue Li, Reidar Conradi, Parastoo Mohagheghi, Odd Are Sæhle, Øivind Wang, Erlend Naalsund, Ole Anders Walseth:
A Study of Developer Attitude to Component Reuse in Three IT Companies. PROFES 2004: 538-552 - 2001
- [c1]Chunnian Liu, Lei Zheng, Junzhong Ji, Chengzhong Yang, Jingyue Li, Wensheng Yang:
Electronic Homework on the WWW. Web Intelligence 2001: 540-548
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-19 21:45 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint