Year |
Citation |
Score |
2015 |
Rahme J, Xu H. A Software Reliability Model For Cloud-Based Software Rejuvenation Using Dynamic Fault Trees International Journal of Software Engineering and Knowledge Engineering. 25: 1491-1513. DOI: 10.1142/S021819401540029X |
0.326 |
|
2013 |
Fitch DF, Xu H. A Raid-Based Secure And Fault-Tolerant Model For Cloud Information Storage International Journal of Software Engineering and Knowledge Engineering. 23: 627-654. DOI: 10.1142/S0218194013400111 |
0.304 |
|
2013 |
Ford BJ, Xu H, Valova I. A Real-Time Self-Adaptive Classifier for Identifying Suspicious Bidders in Online Auctions The Computer Journal. 56: 646-663. DOI: 10.1093/Comjnl/Bxs025 |
0.306 |
|
2012 |
Dong F, Shatz SM, Xu H, Majumdar D. Price comparison: A reliable approach to identifying shill bidding in online auctions? Electronic Commerce Research and Applications. 11: 171-179. DOI: 10.1016/J.Elerap.2011.12.003 |
0.643 |
|
2011 |
Xu H, Reddyreddy A, Fitch DF. Defending Against XML-Based Attacks Using State-Based XML Firewall Journal of Computers. 6: 2395-2407. DOI: 10.4304/Jcp.6.11.2395-2407 |
0.327 |
|
2010 |
Ford BJ, Xu H, Bates CK, Shatz SM. Visual specification of layered bidding strategies for autonomous bidding agents Journal of Computers. 5: 941-950. DOI: 10.4304/Jcp.5.6.940-950 |
0.643 |
|
2010 |
Dong F, Shatz SM, Xu H. Reasoning under uncertainty for shill detection in online auctions using Dempster-Shafer theory International Journal of Software Engineering and Knowledge Engineering. 20: 943-973. DOI: 10.1142/S0218194010005018 |
0.645 |
|
2009 |
Dong F, Shatz SM, Xu H. Combating online in-auction fraud: Clues, techniques and challenges Computer Science Review. 3: 245-258. DOI: 10.1016/J.Cosrev.2009.09.001 |
0.644 |
|
2008 |
Xu H, Ayachit M, Reddyreddy A. Formal modelling and analysis of XML firewall for service-oriented systems International Journal of Security and Networks. 3: 147-160. DOI: 10.1504/Ijsn.2008.020089 |
0.349 |
|
2007 |
Zhang X, Xu H, Shrestha B. An integrated role-based approach for modeling, designing and implementing multi-agent systems Journal of the Brazilian Computer Society. 13: 45-60. DOI: 10.1007/Bf03192409 |
0.409 |
|
2005 |
Xu H, Zhang Z, Shatz SM. A security based model for mobile agent software systems International Journal of Software Engineering and Knowledge Engineering. 15: 719-746. DOI: 10.1142/S0218194005002518 |
0.617 |
|
2003 |
Xu H, Shatz SM. A framework for model-based design of agent-oriented software Ieee Transactions On Software Engineering. 29: 15-30. DOI: 10.1109/Tse.2003.1166586 |
0.64 |
|
1999 |
Gedela RK, Shatz SM, Xu H. Formal modeling of synchronization methods for concurrent objects in Ada 95 Acm Sigada Ada Letters. 211-220. DOI: 10.1145/319295.319325 |
0.607 |
|
1999 |
Gedela RK, Shatz SM, Xu H. Compositional Petri net models of advanced tasking in Ada-95 Computer Languages. 25: 55-87. DOI: 10.1016/S0096-0551(99)00014-4 |
0.61 |
|
Show low-probability matches. |