Haiping Xu, Ph.D. - Publications

Affiliations: 
2003 University of Illinois at Chicago, Chicago, IL, United States 
Area:
Computer Science

14 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2015 Rahme J, Xu H. A Software Reliability Model For Cloud-Based Software Rejuvenation Using Dynamic Fault Trees International Journal of Software Engineering and Knowledge Engineering. 25: 1491-1513. DOI: 10.1142/S021819401540029X  0.326
2013 Fitch DF, Xu H. A Raid-Based Secure And Fault-Tolerant Model For Cloud Information Storage International Journal of Software Engineering and Knowledge Engineering. 23: 627-654. DOI: 10.1142/S0218194013400111  0.304
2013 Ford BJ, Xu H, Valova I. A Real-Time Self-Adaptive Classifier for Identifying Suspicious Bidders in Online Auctions The Computer Journal. 56: 646-663. DOI: 10.1093/Comjnl/Bxs025  0.306
2012 Dong F, Shatz SM, Xu H, Majumdar D. Price comparison: A reliable approach to identifying shill bidding in online auctions? Electronic Commerce Research and Applications. 11: 171-179. DOI: 10.1016/J.Elerap.2011.12.003  0.643
2011 Xu H, Reddyreddy A, Fitch DF. Defending Against XML-Based Attacks Using State-Based XML Firewall Journal of Computers. 6: 2395-2407. DOI: 10.4304/Jcp.6.11.2395-2407  0.327
2010 Ford BJ, Xu H, Bates CK, Shatz SM. Visual specification of layered bidding strategies for autonomous bidding agents Journal of Computers. 5: 941-950. DOI: 10.4304/Jcp.5.6.940-950  0.643
2010 Dong F, Shatz SM, Xu H. Reasoning under uncertainty for shill detection in online auctions using Dempster-Shafer theory International Journal of Software Engineering and Knowledge Engineering. 20: 943-973. DOI: 10.1142/S0218194010005018  0.645
2009 Dong F, Shatz SM, Xu H. Combating online in-auction fraud: Clues, techniques and challenges Computer Science Review. 3: 245-258. DOI: 10.1016/J.Cosrev.2009.09.001  0.644
2008 Xu H, Ayachit M, Reddyreddy A. Formal modelling and analysis of XML firewall for service-oriented systems International Journal of Security and Networks. 3: 147-160. DOI: 10.1504/Ijsn.2008.020089  0.349
2007 Zhang X, Xu H, Shrestha B. An integrated role-based approach for modeling, designing and implementing multi-agent systems Journal of the Brazilian Computer Society. 13: 45-60. DOI: 10.1007/Bf03192409  0.409
2005 Xu H, Zhang Z, Shatz SM. A security based model for mobile agent software systems International Journal of Software Engineering and Knowledge Engineering. 15: 719-746. DOI: 10.1142/S0218194005002518  0.617
2003 Xu H, Shatz SM. A framework for model-based design of agent-oriented software Ieee Transactions On Software Engineering. 29: 15-30. DOI: 10.1109/Tse.2003.1166586  0.64
1999 Gedela RK, Shatz SM, Xu H. Formal modeling of synchronization methods for concurrent objects in Ada 95 Acm Sigada Ada Letters. 211-220. DOI: 10.1145/319295.319325  0.607
1999 Gedela RK, Shatz SM, Xu H. Compositional Petri net models of advanced tasking in Ada-95 Computer Languages. 25: 55-87. DOI: 10.1016/S0096-0551(99)00014-4  0.61
Show low-probability matches.