


default search action
Jun Han 0004
Person information
- affiliation: Swinburne University of Technology, Hawthorn, VIC, Australia
Other persons with the same name
- Jun Han — disambiguation page
- Jun Han 0001
— Yonsei University, School of Electrical and Electronic Engineering, Seoul, South Korea (and 2 more)
- Jun Han 0002 — Dartmouth College, USA
- Jun Han 0003
— Fudan University, State Key Laboratory of ASIC and System, Shanghai, China
- Jun Han 0005
— Capital Normal University, College of Education, Beijing, China
- Jun Han 0006 — Bond University, QLD, Australia
- Jun Han 0007 — University of Georgia, Athens, GA, USA
- Jun Han 0008 — University of California, San Diego, La Jolla, CA, USA
- Jun Han 0009 — Dortmund University of Technology, Germany
- Jun Han 0010
— Chinese University of Hong Kong-Shenzhen (CUHK-SZ), Shenzhen, China (and 1 more)
- Jun Han 0011 — University of Queensland, Australia
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j48]Chang-Ai Sun
, Yufei Gong
, Meng Li
, Luo Xu
, Jun Han
, Yanbo Han
:
Detecting Inconsistencies in Microservice-Based Systems: An Annotation-Assisted Scenario-Oriented Approach. IEEE Trans. Serv. Comput. 17(5): 2194-2209 (2024) - 2023
- [j47]Luke Bartlett
, Muhammad Ashad Kabir
, Jun Han:
A Review on Business Process Management System Design: The Role of Virtualization and Work Design. IEEE Access 11: 116786-116819 (2023) - [j46]Chang-Ai Sun, Zhen Wang, Zaixing Zhang, Luo Xu, Jun Han, Yanbo Han:
A feature-driven variability-enabled approach to adaptive service compositions. Int. J. Web Grid Serv. 19(1): 79-112 (2023) - [j45]Chang-Ai Sun
, An Fu
, Jingting Jia
, Meng Li
, Jun Han
:
Improving Conformance of Web Services: A Constraint-based Model-driven Approach. ACM Trans. Web 17(2): 12:1-12:36 (2023) - 2022
- [j44]Md. Arafat Hossain
, Jiaojiao Jiang, Jun Han, Muhammad Ashad Kabir
, Jean-Guy Schneider, Chengfei Liu
:
Inferring data model from service interactions for response generation in service virtualization. Inf. Softw. Technol. 145: 106803 (2022) - [j43]Md. Arafat Hossain
, Jun Han, Jean-Guy Schneider, Jiaojiao Jiang, Muhammad Ashad Kabir
, Steve Versteeg:
Extracting Formats of Service Messages with Varying Payloads. ACM Trans. Internet Techn. 22(3): 71:1-71:31 (2022) - 2021
- [b2]Iqbal H. Sarker
, Alan Colman, Jun Han, Paul A. Watters:
Context-Aware Machine Learning and Mobile Data Analytics - Automated Rule-based Services with Intelligent Decision-Making. Springer 2021, ISBN 978-3-030-88529-8, pp. 1-157 - [j42]Muhammad Ashad Kabir
, Jun Han, Md. Arafat Hossain, Steve Versteeg:
SpecMiner: Heuristic-based mining of service behavioral models from interaction traces. Future Gener. Comput. Syst. 117: 59-71 (2021) - [j41]Jiaojiao Jiang
, Jean-Guy Schneider
, Steve Versteeg, Jun Han, Md. Arafat Hossain, Chengfei Liu
:
R-gram: Inferring message formats of service protocols with relative positional n-grams. J. Netw. Comput. Appl. 196: 103247 (2021) - [c143]Md Kafil Uddin, Qiang He, Jun Han, Caslon Chua
:
Mining Cross-Domain Apps for Software Evolution: A Feature-based Approach. ASE 2021: 743-755 - 2020
- [j40]Iqbal H. Sarker
, Alan Colman
, Jun Han, A. S. M. Kayes
, Paul A. Watters
:
CalBehav: A Machine Learning-Based Personalized Calendar Behavioral Model Using Time-Series Smartphone Data. Comput. J. 63(7): 1109-1123 (2020) - [j39]Khavee Agustus Botangen
, Jian Yu
, Yanbo Han, Quan Z. Sheng
, Jun Han:
Quantifying the adaptability of workflow-based service compositions. Future Gener. Comput. Syst. 102: 95-111 (2020) - [j38]Jiaojiao Jiang
, Steve Versteeg, Jun Han, Md. Arafat Hossain
, Jean-Guy Schneider
:
A positional keyword-based approach to inferring fine-grained message formats. Future Gener. Comput. Syst. 102: 369-381 (2020) - [j37]Iqbal H. Sarker
, Alan Colman
, Jun Han, Asif Irshad Khan
, Yoosef B. Abushark, Khaled Salah:
BehavDT: A Behavioral Decision Tree Learning to Build User-Centric Context-Aware Predictive Model. Mob. Networks Appl. 25(3): 1151-1161 (2020) - [c142]Md Kafil Uddin, Qiang He, Jun Han, Caslon Chua
:
App Competition Matters: How to Identify Your Competitor Apps? SCC 2020: 370-377 - [c141]Md Kafil Uddin, Qiang He, Jun Han, Caslon Chua:
Feature Recommendation by Mining Updates and User Feedback from Competitor Apps. MobiQuitous 2020: 18-28 - [c140]Md Kafil Uddin, Qiang He, Jun Han, Caslon Chua
:
Comparison of Text-Based and Feature-Based Semantic Similarity Between Android Apps. WISE (1) 2020: 530-545 - [i15]Iqbal H. Sarker, Alan Colman, Jun Han, Asif Irshad Khan, Yoosef B. Abushark, Khaled Salah:
BehavDT: A Behavioral Decision Tree Learning to Build User-Centric Context-Aware Predictive Model. CoRR abs/2001.00621 (2020) - [i14]Indika Kumara, Jun Han, Alan Colman, Willem-Jan van den Heuvel, Damian A. Tamburri:
FM4SN: A Feature-Oriented Approach to Tenant-Driven Customization of Multi-Tenant Service Networks. CoRR abs/2002.03637 (2020) - [i13]Indika Kumara, Jun Han, Alan Colman, Willem-Jan van den Heuvel, Damian A. Tamburri, Malinda Kapuruge:
SDSN@RT: a middleware environment for single-instance multi-tenant cloud applications. CoRR abs/2002.07582 (2020) - [i12]Muhammad Ashad Kabir, Jun Han, Md. Arafat Hossain
, Steve Versteeg:
Heuristic-based Mining of Service Behavioral Models from Interaction Traces. CoRR abs/2011.00431 (2020)
2010 – 2019
- 2019
- [j36]Chang-Ai Sun
, Zhen Wang, Zaixing Zhang, Pan Wang, Xiao He, Jun Han:
Toward Supporting Unplanned Dynamic Changes of Service-Based Business Processes. IEEE Access 7: 48982-48997 (2019) - [j35]Jiaojiao Jiang
, Steve Versteeg, Jun Han, Md. Arafat Hossain
, Jean-Guy Schneider, Christopher Leckie
, Zeinab Farahmandpour:
P-Gram: Positional N-Gram for the Clustering of Machine-Generated Messages. IEEE Access 7: 88504-88516 (2019) - [j34]A. S. M. Kayes
, Jun Han, Wenny Rahayu, Tharam S. Dillon, Md. Saiful Islam
, Alan Colman
:
A Policy Model and Framework for Context-Aware Access Control to Information Resources†. Comput. J. 62(5): 670-705 (2019) - [j33]A. S. M. Kayes
, Wenny Rahayu, Tharam S. Dillon, Elizabeth Chang
, Jun Han:
Context-aware access control with imprecise context characterization for cloud-based data resources. Future Gener. Comput. Syst. 93: 237-255 (2019) - [j32]Iqbal H. Sarker
, Alan Colman
, Jun Han:
RecencyMiner: mining recency-based personalized behavior from contextual smartphone data. J. Big Data 6: 49 (2019) - [j31]Indika Kumara
, Jun Han, Alan Colman
, Willem-Jan van den Heuvel, Damian A. Tamburri
, Malinda Kapuruge:
SDSN@RT: A middleware environment for single-instance multitenant cloud applications. Softw. Pract. Exp. 49(5): 813-839 (2019) - [c139]Indika Kumara
, Jun Han, Alan Colman
, Willem-Jan van den Heuvel, Damian A. Tamburri
:
FM4SN: A Feature-Oriented Approach to Tenant-Driven Customization of Multi-Tenant Service Networks. SCC 2019: 108-115 - [c138]Mohammad Jabed Morshed Chowdhury, Alan Colman
, Muhammad Ashad Kabir
, Jun Han, Paul Sarda:
Continuous Authorization in Subject-Driven Data Sharing Using Wearable Devices. TrustCom/BigDataSE 2019: 327-333 - [i11]Iqbal H. Sarker, Alan Colman, Jun Han, A. S. M. Kayes, Paul A. Watters:
CalBehav: A Machine Learning based Personalized Calendar Behavioral Model using Time-Series Smartphone Data. CoRR abs/1909.04724 (2019) - 2018
- [j30]Iqbal H. Sarker
, Alan Colman
, Muhammad Ashad Kabir
, Jun Han:
Individualized Time-Series Segmentation for Mining Mobile Phone User Behavior. Comput. J. 61(3): 349-368 (2018) - [c137]Mohammad Jabed Morshed Chowdhury
, Alan Colman
, Jun Han, Muhammad Ashad Kabir
:
A system architecture for subject-centric data sharing. ACSW 2018: 4:1-4:10 - [c136]Indika Kumara
, Jun Han, Alan Colman
, Willem-Jan van den Heuvel, Damian A. Tamburri
:
Runtime Evolution of Multi-tenant Service Networks. ESOCC 2018: 33-48 - [c135]Mohammad Jabed Morshed Chowdhury, Alan Colman, Jun Han, Muhammad Ashad Kabir:
A Policy Framework for Subject-Driven Data Sharing. HICSS 2018: 1-10 - [c134]Chang-Ai Sun, Meng Li, Jingting Jia, Jun Han:
Constraint-Based Model-Driven Testing of Web Services for Behavior Conformance. ICSOC 2018: 543-559 - [c133]Mohammad Jabed Morshed Chowdhury
, Alan Colman
, Muhammad Ashad Kabir
, Jun Han, Paul Sarda:
Blockchain as a Notarization Service for Data Sharing with Personal Data Store. TrustCom/BigDataSE 2018: 1330-1335 - [c132]Mohammad Jabed Morshed Chowdhury
, Alan Colman
, Muhammad Ashad Kabir
, Jun Han, Paul Sarda:
Blockchain Versus Database: A Critical Analysis. TrustCom/BigDataSE 2018: 1348-1353 - [c131]Paul Sarda, Mohammad Jabed Morshed Chowdhury
, Alan Colman
, Muhammad Ashad Kabir
, Jun Han:
Blockchain for Fraud Prevention: A Work-History Fraud Prevention System. TrustCom/BigDataSE 2018: 1858-1863 - [c130]Md. Arafat Hossain
, Steve Versteeg, Jun Han, Muhammad Ashad Kabir
, Jiaojiao Jiang
, Jean-Guy Schneider:
Mining accurate message formats for service APIs. SANER 2018: 266-276 - [i10]Iqbal H. Sarker, Alan Colman, Muhammad Ashad Kabir, Jun Han:
Individualized Time-Series Segmentation for Mining Mobile Phone User Behavior. CoRR abs/1811.09577 (2018) - [i9]Quan Z. Sheng, Jian Yu, Hanchuan Xu, Wei Emma Zhang, Anne H. H. Ngu, Jun Han, Ruilin Liu:
ContextServ: Towards Model-Driven Development of Context-AwareWeb Services. CoRR abs/1811.12573 (2018) - 2017
- [j29]Jian Yu
, Jun Han, Jean-Guy Schneider
, Cameron M. Hine, Steve Versteeg:
A Petri-Net-Based Virtual Deployment Testing Environment for Enterprise Software Systems. Comput. J. 60(1): 27-44 (2017) - [j28]Indika Kumara
, Jun Han, Alan W. Colman
, Malinda Kapuruge:
Software-Defined Service Networking: Performance Differentiation in Shared Multi-Tenant Cloud Applications. IEEE Trans. Serv. Comput. 10(1): 9-22 (2017) - [c129]Iqbal H. Sarker
, Muhammad Ashad Kabir
, Alan Colman
, Jun Han:
An Improved Naive Bayes Classifier-Based Noise Detection Technique for Classifying User Phone Call Behavior. AusDM 2017: 72-85 - [c128]Iqbal H. Sarker
, Muhammad Ashad Kabir
, Alan Colman
, Jun Han:
An effective call prediction model based on noisy mobile phone data. UbiComp/ISWC Adjunct 2017: 193-196 - [c127]Iqbal H. Sarker
, Muhammad Ashad Kabir
, Alan Colman
, Jun Han:
Designing architecture of a rule-based system for managing phone call interruptions. UbiComp/ISWC Adjunct 2017: 898-903 - [c126]Iqbal H. Sarker
, Muhammad Ashad Kabir
, Alan Colman
, Jun Han:
Understanding recency-based behavior model for individual mobile phone users. UbiComp/ISWC Adjunct 2017: 916-921 - [c125]Zeinab Farahmandpour, Steve Versteeg, Jun Han, Anand Kameswaran:
Service Virtualisation of Internet-of-Things Devices: Techniques and Challenges. RCoSE@ICSE 2017: 32-35 - [c124]Iqbal H. Sarker
, Muhammad Ashad Kabir
, Alan W. Colman
, Jun Han:
An Approach to Modeling Call Response Behavior on Mobile Phones Based on Multi-Dimensional Contexts. MOBILESoft@ICSE 2017: 91-95 - [c123]Iqbal H. Sarker
, Muhammad Ashad Kabir
, Alan Colman
, Jun Han:
Identifying Recent Behavioral Data Length in Mobile Phone Log. MobiQuitous 2017: 545-546 - [c122]A. S. M. Kayes
, J. Wenny Rahayu, Tharam S. Dillon, Elizabeth Chang
, Jun Han:
Context-Aware Access Control with Imprecise Context Characterization Through a Combined Fuzzy Logic and Ontology-Based Approach. OTM Conferences (1) 2017: 132-153 - [i8]A. S. M. Kayes, Jun Han, J. Wenny Rahayu, Md. Saiful Islam, Alan W. Colman:
A Policy Model and Framework for Context-Aware Access Control to Information Resources. CoRR abs/1703.02162 (2017) - [i7]Zeinab Farahmandpour, Steve Versteeg, Anand Kameswaran, Jun Han:
Service Virtualisation of Internet-of-Things Devices: Techniques and Challenges. CoRR abs/1705.05501 (2017) - [i6]Iqbal H. Sarker, Muhammad Ashad Kabir, Alan Colman, Jun Han:
An Improved Naive Bayes Classifier-based Noise Detection Technique for Classifying User Phone Call Behavior. CoRR abs/1710.04461 (2017) - [i5]Iqbal H. Sarker, Muhammad Ashad Kabir, Alan Colman, Jun Han:
Identifying Recent Behavioral Data Length in Mobile Phone Log. CoRR abs/1711.06837 (2017) - 2016
- [b1]Muhammad Ashad Kabir
, Jun Han, Alan Colman
:
Pervasive Social Computing - Socially-Aware Pervasive Systems and Mobile Applications. Springer 2016, ISBN 978-3-319-29949-5, pp. 1-282 - [j27]Tuan Nguyen, Alan W. Colman
, Jun Han:
A Feature-Based Framework for Developing and Provisioning Customizable Web Services. IEEE Trans. Serv. Comput. 9(4): 496-510 (2016) - [c121]Iqbal H. Sarker
, Alan Colman
, Muhammad Ashad Kabir
, Jun Han:
Behavior-Oriented Time Segmentation for Mining Individualized Rules of Mobile Phone Users. DSAA 2016: 488-497 - [c120]Iqbal H. Sarker
, Muhammad Ashad Kabir
, Alan Colman
, Jun Han:
Evidence-Based Behavioral Model for Calendar Schedules of Individual Mobile Phone Users. DSAA 2016: 584-593 - [c119]Iqbal H. Sarker
, Alan W. Colman
, Muhammad Ashad Kabir
, Jun Han:
Understanding individuals phone call behavior for calendar events. UbiComp Adjunct 2016: 605-607 - [c118]Iqbal H. Sarker
, Alan W. Colman
, Muhammad Ashad Kabir
, Jun Han:
Phone call log as a context source to modeling individual user behavior. UbiComp Adjunct 2016: 630-634 - [c117]Muhammad Ashad Kabir
, Jun Han, Alan W. Colman
, Naif R. Aljohani, Mohammed Basheri
, Zhenchang Xing, Shang-Wei Lin
:
Engineering Socially-Aware Systems and Applications. ICECCS 2016: 81-90 - [c116]Steve Versteeg, Miao Du, John Bird, Jean-Guy Schneider
, John C. Grundy
, Jun Han:
Enhanced playback of automated service emulation models using entropy analysis. CSED@ICSE 2016: 49-55 - [c115]Cameron M. Hine, Jean-Guy Schneider, Jun Han, Steve Versteeg:
Enterprise software service emulation: constructing large-scale testbeds. CSED@ICSE 2016: 56-62 - [c114]Steven Versteeg, Miao Du, Jean-Guy Schneider
, John Grundy, Jun Han, Menka Goyal:
Opaque service virtualisation: a practical tool for emulating endpoint systems. ICSE (Companion Volume) 2016: 202-211 - [c113]Muhammad Ashad Kabir
, Jun Han, Alan Colman
, Naif R. Aljohani, Mohammed Basheri
, Muhammad Ahtisham Aslam
:
Ontological Reasoning About Situations from Calendar Events. OTM Conferences 2016: 810-826 - [c112]Iqbal H. Sarker
, Muhammad Ashad Kabir
, Alan Colman
, Jun Han:
Predicting how you respond to phone calls: towards discovering temporal behavioral rules. OZCHI 2016: 421-425 - [i4]Steve Versteeg, Miao Du, John Bird, Jean-Guy Schneider, John C. Grundy, Jun Han:
Enhanced Playback of Automated Service Emulation Models Using Entropy Analysis. CoRR abs/1605.06668 (2016) - [i3]Steve Versteeg, Miao Du, Jean-Guy Schneider, John C. Grundy, Jun Han, Menka Goyal:
Opaque Service Virtualisation: A Practical Tool for Emulating Endpoint Systems. CoRR abs/1605.06670 (2016) - [i2]Cameron M. Hine, Jean-Guy Schneider, Jun Han, Steve Versteeg:
Enterprise Software Service Emulation: Constructing Large-Scale Testbeds. CoRR abs/1605.06729 (2016) - 2015
- [j26]Muhammad Ashad Kabir
, Jun Han, Jian Yu
, Alan W. Colman
:
Inferring User Situations from Interaction Events in Social Media. Comput. J. 58(9): 2026-2043 (2015) - [j25]A. S. M. Kayes
, Jun Han, Alan Colman
:
OntCAAC: An Ontology-Based Approach to Context-Aware Access Control for Software Services. Comput. J. 58(11): 3000-3034 (2015) - [j24]Muhammad Ashad Kabir
, Jun Han, Alan W. Colman
, Jian Yu
:
Social Context as a Service: Managing Adaptation in Collaborative Pervasive Applications. Int. J. Cooperative Inf. Syst. 24(1): 1540001:1-1540001:32 (2015) - [j23]A. S. M. Kayes
, Jun Han, Alan W. Colman
:
An ontological framework for situation-aware access control of software services. Inf. Syst. 53: 253-277 (2015) - [j22]Jian Yu
, Quan Z. Sheng
, Joshua K. Y. Swee, Jun Han, Chengfei Liu
, Talal H. Noor:
Model-driven development of adaptive web service processes with aspects and rules. J. Comput. Syst. Sci. 81(3): 533-552 (2015) - [j21]Muhammad Ashad Kabir
, Jun Han, Bonghee Hong:
Reader level filtering for efficient query processing in RFID middleware. J. Netw. Comput. Appl. 48: 58-70 (2015) - [j20]Miao Du, Steven Versteeg, Jean-Guy Schneider, Jun Han, John C. Grundy:
Interaction Traces Mining for Efficient System Responses Generation. ACM SIGSOFT Softw. Eng. Notes 40(1): 1-8 (2015) - [j19]Tharindu Patikirikorala, Liuping Wang
, Alan Colman
, Jun Han:
Differentiated Performance Management in Virtualized Environments Using Nonlinear Control. IEEE Trans. Netw. Serv. Manag. 12(1): 101-113 (2015) - [c111]Qiang He, Jun Han, Feifei Chen, Yanchun Wang, Rajesh Vasa
, Yun Yang, Hai Jin:
QoS-Aware Service Selection for Customisable Multi-tenant Service-Based Systems: Maturity and Approaches. CLOUD 2015: 237-244 - [c110]Indika Kumara
, Jun Han, Alan Colman
, Malinda Kapuruge:
Software-Defined Service Networking: Runtime Sharing with Performance Differentiation in Multi-tenant SaaS Applications. SCC 2015: 210-217 - [i1]Miao Du, Steven Versteeg, Jean-Guy Schneider, John C. Grundy, Jun Han:
From Network Traces to System Responses: Opaquely Emulating Software Services. CoRR abs/1510.01421 (2015) - 2014
- [j18]Muhammad Ashad Kabir
, Jun Han, Alan W. Colman
:
SocioTelematics: Harnessing social interaction-relationships in developing automotive applications. Pervasive Mob. Comput. 14: 129-146 (2014) - [j17]Muhammad Ashad Kabir
, Jun Han, Jian Yu
, Alan Colman
:
User-centric social context information management: an ontology-based approach and platform. Pers. Ubiquitous Comput. 18(5): 1061-1083 (2014) - [j16]Qiang He, Jun Han, Yun Yang, Hai Jin, Jean-Guy Schneider
, Steven Versteeg:
Formulating Cost-Effective Monitoring Strategies for Service-Based Systems. IEEE Trans. Software Eng. 40(5): 461-482 (2014) - [c109]Malinda Kapuruge, Jun Han, Alan W. Colman
, Ulf Rüegg:
EPClets - A Lightweight and Flexible Textual Language to Augment EPC Process Modelling. IEEE SCC 2014: 693-700 - [c108]A. S. M. Kayes
, Jun Han, Alan Colman
:
PO-SAAC: A Purpose-Oriented Situation-Aware Access Control Framework for Software Services. CAiSE 2014: 58-74 - [c107]Tharindu Patikirikorala, Alan W. Colman
, Jun Han:
4M-Switch: Multi-mode-multi-model supervisory control framework for performance differentiation in virtual machine environments. CNSM 2014: 145-153 - [c106]A. S. M. Kayes
, Jun Han, Alan Colman
, Md. Saiful Islam
:
RelBOSS: A Relationship-Aware Access Control Framework for Software Services. OTM Conferences 2014: 258-276 - [p3]Alan W. Colman, Mahmoud Hussein, Jun Han, Malinda Kapuruge:
Context Aware and Adaptive Systems. Context in Computing 2014: 63-82 - [p2]Muhammad Ashad Kabir
, Alan Colman, Jun Han:
SocioPlatform: A Platform for Social Context-Aware Applications. Context in Computing 2014: 291-308 - [p1]Tuan Nguyen, Alan Colman
, Jun Han:
Comprehensive Variability Modeling and Management for Customizable Process-Based Service Compositions. Web Services Foundations 2014: 507-533 - 2013
- [j15]Khaled M. Khan
, Abdelkarim Erradi, Saleh Alhazbi
, Jun Han:
Addressing security compatibility for multi-tenant cloud services. Int. J. Comput. Appl. Technol. 47(4): 370-378 (2013) - [c105]Mahmoud Hussein
, Jun Han, Jian Yu
, Alan Colman
:
Enabling Runtime Evolution of Context-Aware Adaptive Services. IEEE SCC 2013: 248-255 - [c104]Indika Kumara
, Jun Han, Alan Colman
, Tuan Nguyen, Malinda Kapuruge:
Sharing with a Difference: Realizing Service-Based SaaS Applications with Runtime Sharing and Variation in Dynamic Software Product Lines. IEEE SCC 2013: 567-574 - [c103]Tharindu Patikirikorala, Alan Colman
, Jun Han:
Can Control-Component Libraries Reduce the Costs of Developing Control Engineering-Based Self-Adaptive Systems? APSEC (1) 2013: 42-49 - [c102]Jian Yu
, Jun Han, Steven O. Gunarso, Steven Versteeg:
A Business Protocol Unit Testing Framework for Web Service Composition. CAiSE 2013: 17-34 - [c101]Malinda Kapuruge, Jun Han, Alan W. Colman
, Indika Kumara
:
ROAD4SaaS: Scalable Business Service-Based SaaS Applications. CAiSE 2013: 338-352 - [c100]Malinda Kapuruge, Jun Han, Alan Colman
, Indika Kumara
:
Enabling Ad-hoc Business Process Adaptations through Event-Driven Task Decoupling. CAiSE 2013: 384-399 - [c99]Indika Kumara
, Jun Han, Alan Colman
, Malinda Kapuruge:
Runtime Evolution of Service-Based Multi-tenant SaaS Applications. ICSOC 2013: 192-206 - [c98]A. S. M. Kayes
, Jun Han, Alan Colman
:
A Context-Aware Access Control Framework for Software Services. ICSOC Workshops 2013: 569-577 - [c97]Mahmoud Hussein
, Jun Han, Jian Yu, Alan Colman
:
Scenario-Based Validation of Requirements for Context-Aware Adaptive Services. ICWS 2013: 348-355 - [c96]Muhammad Ashad Kabir
, Jun Han, Alan Colman
, Jian Yu
:
SCaaS: A Platform for Managing Adaptation in Collaborative Pervasive Applications. OTM Conferences 2013: 149-166 - [c95]A. S. M. Kayes
, Jun Han, Alan Colman
:
A Semantic Policy Framework for Context-Aware Access Control Applications. TrustCom/ISPA/IUCC 2013: 753-762 - [c94]Malinda Kapuruge, Jun Han, Alan Colman
:
Supporting Adaptation Patterns in the Event-Driven Business Process Modeling Paradigm. WISE (2) 2013: 299-308 - [c93]A. S. M. Kayes
, Jun Han, Alan Colman
:
An Ontology-Based Approach to Context-Aware Access Control for Software Services. WISE (1) 2013: 410-420 - 2012
- [j14]Jian Yu
, Quan Z. Sheng
, Jun Han, Yanbo Wu, Chengfei Liu
:
A semantically enhanced service repository for user-centric service discovery and management. Data Knowl. Eng. 72: 202-218 (2012) - [j13]Tharindu Patikirikorala, Alan W. Colman
, Jun Han, Liuping Wang
:
An evaluation of multi-model self-managing control schemes for adaptive performance management of software systems. J. Syst. Softw. 85(12): 2678-2696 (2012) - [c92]Qiang He, Jun Han, Yun Yang, John Grundy
, Hai Jin:
QoS-Driven Service Selection for Multi-tenant SaaS. IEEE CLOUD 2012: 566-573 - [c91]Qiang He, Jun Han, Yun Yang, Jean-Guy Schneider
, Hai Jin, Steven Versteeg:
Probabilistic Critical Path Identification for Cost-Effective Monitoring of Service-Based Systems. IEEE SCC 2012: 178-185 - [c90]A. S. M. Kayes
, Jun Han, Alan W. Colman
:
ICAF: A Context-Aware Framework for Access Control. ACISP 2012: 442-449 - [c89]Tharindu Patikirikorala, Liuping Wang, Alan W. Colman
, Jun Han:
Managing performance and resources in software systems using nonlinear predictive control. ACC 2012: 4124-4129 - [c88]Minh H. Tran, Alan W. Colman
, Jun Han, Hongyu Zhang
:
Modeling and Verification of Context-Aware Systems. APSEC 2012: 79-84 - [c87]Muhammad Ashad Kabir
, Jun Han, Jian Yu
, Alan W. Colman
:
SCIMS: A Social Context Information Management System for Socially-Aware Applications. CAiSE 2012: 301-317 - [c86]Mahmoud Hussein
, Jun Han, Alan W. Colman
, Jian Yu
:
An Architecture-Based Approach to Developing Context-Aware Adaptive Systems. ECBS 2012: 154-163 - [c85]Tharindu Patikirikorala, Alan W. Colman
, Jun Han, Liuping Wang
:
A systematic survey on the design of self-adaptive software systems using control engineering approaches. SEAMS 2012: 33-42 - [c84]Jian Yu
, Jun Han, Quan Z. Sheng
, Steven O. Gunarso:
PerCAS: An Approach to Enabling Dynamic and Personalized Adaptation for Context-Aware Services. ICSOC 2012: 173-190 - [c83]Tharindu Patikirikorala, Indika Kumara
, Alan W. Colman
, Jun Han, Liuping Wang, Denis Weerasiri, Waruna Ranasinghe:
Dynamic Performance Management in Multi-tenanted Business Process Servers Using Nonlinear Control. ICSOC 2012: 206-221 - [c82]Tuan Nguyen, Alan W. Colman
, Jun Han:
Enabling the Delivery of Customizable Web Services. ICWS 2012: 138-145 - [c81]Cameron M. Hine, Jean-Guy Schneider
, Jun Han, Steven Versteeg:
Quokka: visualising interactions of enterprise software environment emulators. ASE 2012: 370-373 - [c80]Jian Yu
, Jun Han, Jean-Guy Schneider
, Cameron M. Hine, Steven Versteeg:
A virtual deployment testing environment for enterprise software systems. QoSA 2012: 101-110 - [c79]Steven Versteeg, Cameron M. Hine, Jean-Guy Schneider
, Jun Han:
Emulation of Cloud-Scale Environments for Scalability Testing. QSIC 2012: 201-209 - [c78]Muhammad Ashad Kabir
, Jun Han, Alan W. Colman
, Jian Yu
:
SocioTelematics: Leveraging Interaction-Relationships in Developing Telematics Systems to Support Cooperative Convoys. UIC/ATC 2012: 40-47 - [c77]Mahmoud Hussein
, Jian Yu
, Jun Han, Alan W. Colman
:
Scenario-Driven Development of Context-Aware Adaptive Web Services. WISE 2012: 228-242 - [c76]Malinda Kapuruge, Jun Han, Alan W. Colman
:
Representing Service-Relationships as First Class Entities in Service Orchestrations. WISE 2012: 257-270 - [c75]Qiang He, Jun Han, Yun Yang, Jean-Guy Schneider
, Hai Jin, Steven Versteeg:
Probabilistic critical path identification for cost-effective monitoring of service-based web applications. WWW (Companion Volume) 2012: 523-524 - 2011
- [c74]Ingo Müller, Jun Han, Jean-Guy Schneider
, Steven Versteeg:
Tackling the Loss of Control: Standards-Based Conjoint Management of Security Requirements for Cloud Services. IEEE CLOUD 2011: 573-581 - [c73]Malinda Kapuruge, Alan W. Colman
, Jun Han:
Defining Customizable Business Processes without Compromising the Maintainability in Multi-tenant SaaS Applications. IEEE CLOUD 2011: 748-749 - [c72]Malinda Kapuruge, Jun Han, Alan W. Colman
:
Controlled Flexibility in Business Processes Defined for Service Compositions. IEEE SCC 2011: 346-353 - [c71]Mahmoud Hussein
, Jun Han, Alan W. Colman
:
An Approach to Model-Based Development of Context-Aware Adaptive Systems. COMPSAC 2011: 205-214 - [c70]Ingo Müller, Jun Han, Jean-Guy Schneider
, Steven Versteeg:
Idea: A Reference Platform for Systematic Information Security Management Tool Support. ESSoS 2011: 256-263 - [c69]Muhammad Ashad Kabir
, Jun Han, Alan W. Colman
:
Modeling and Coordinating Social Interactions in Pervasive Environments. ICECCS 2011: 243-252 - [c68]Tharindu Patikirikorala, Alan W. Colman
, Jun Han, Liuping Wang
:
A multi-model framework to implement self-managing control systems for QoS management. SEAMS 2011: 218-227 - [c67]Tuan Nguyen, Alan W. Colman
, Jun Han:
Modeling and Managing Variability in Process-Based Service Compositions. ICSOC 2011: 404-420 - [c66]Garth Heward, Jun Han, Jean-Guy Schneider
, Steven Versteeg:
Run-time management and optimization of web service monitoring systems. SOCA 2011: 1-6 - [c65]Tuan Nguyen, Alan W. Colman
, Muhammad Adeel Talib, Jun Han:
Managing service variability: state of the art and open issues. VaMoS 2011: 165-173 - [c64]Malinda Kapuruge, Alan W. Colman
, Jun Han:
Achieving Multi-tenanted Business Processes in SaaS Applications. WISE 2011: 143-157 - [c63]Tuan Nguyen, Alan W. Colman
, Jun Han:
A Web Services Variability Description Language (WSVL) for Business Users Oriented Service Customization. WISE Workshops 2011: 321-334 - 2010
- [j12]Khaled M. Khan, Jun Han:
A Tool Support for Secure Software Integration. Int. J. Secur. Softw. Eng. 1(2): 35-56 (2010) - [c62]Muhammad Adeel Talib, Alan W. Colman
, Jun Han, Justin King, Malinda Kapuruge:
A Service Packaging Platform for Delivering Services. IEEE SCC 2010: 202-209 - [c61]Cameron M. Hine, Jean-Guy Schneider
, Jun Han, Steven Versteeg:
Modelling Enterprise System Protocols and Trace Conformance. Australian Software Engineering Conference 2010: 35-44 - [c60]Malinda Kapuruge, Jun Han, Alan W. Colman
:
Support for Business Process Flexibility in Service Compositions: An Evaluative Survey. Australian Software Engineering Conference 2010: 97-106 - [c59]Garth Heward, Ingo Müller, Jun Han, Jean-Guy Schneider
, Steven Versteeg:
Assessing the Performance Impact of Service Monitoring. Australian Software Engineering Conference 2010: 192-201 - [c58]Minh H. Tran, Alan W. Colman, Jun Han:
Service-Based Development of Context-Aware Automotive Telematics Systems. ICECCS 2010: 53-62 - [c57]Garth Heward, Jun Han, Ingo Müller, Jean-Guy Schneider
, Steven Versteeg:
A Case Study on Optimizing Web Service Monitoring Configurations. ICSOC Workshops 2010: 4-14 - [c56]Garth Heward, Jun Han, Ingo Müller, Jean-Guy Schneider
, Steven Versteeg:
Optimizing the Configuration of Web Service Monitors. ICSOC 2010: 587-595 - [c55]Muhammad Ashad Kabir
, Jun Han, Wooseok Ryu, Bonghee Hong:
An Approach to Query Decomposition for Reader Level Filtering in RFID Middleware. RTCSA 2010: 124-129 - [c54]Muhammad Adeel Talib, Tuan Nguyen, Alan W. Colman, Jun Han:
Requirements for Evolvable Dynamic Software Product Lines. SPLC Workshops 2010: 43-46 - [c53]Tan Phan, Jun Han, Garth Heward, Steven Versteeg:
Propagation of Data Protection Requirements in Multi-stakeholder Web Services Systems. WISE 2010: 67-76 - [c52]Tan Phan, Jun Han, Garth Heward, Steven Versteeg:
Protecting data in multi-stakeholder web service system. WWW 2010: 1163-1164
2000 – 2009
- 2009
- [j11]Antony Tang
, Jun Han, Rajesh Vasa
:
Software Architecture Design Reasoning: A Case for Improved Methodology Support. IEEE Softw. 26(2): 43-49 (2009) - [c51]Cameron M. Hine, Jean-Guy Schneider
, Jun Han, Steven Versteeg:
Scalable Emulation of Enterprise Systems. Australian Software Engineering Conference 2009: 142-151 - [c50]Wanfeng Bu, Antony Tang
, Jun Han:
An analysis of decision-centric architectural design approaches. SHARK@ICSE 2009: 33-40 - [c49]Minh H. Tran, Jun Han, Alan Colman
:
Social context: Supporting interaction awareness in ubiquitous environments. MobiQuitous 2009: 1-10 - [c48]Tan Phan, Jun Han, Ingo Müller, Malinda Kapuruge, Steven Versteeg:
SOABSE: An approach to realizing business-oriented security requirements with Web Service security policies. SOCA 2009: 1-10 - 2008
- [j10]Jian Yu
, Yanbo Han, Jun Han, Yan Jin, Paolo Falcarin
, Maurizio Morisio:
Synthesizing Service Composition Models on the Basis of Temporal Business Rules. J. Comput. Sci. Technol. 23(6): 885-894 (2008) - [j9]John C. Grundy
, Jun Han:
Introduction to the Special Issue. J. Syst. Softw. 81(12): 2105 (2008) - [c47]Tan Phan, Jun Han, Jean-Guy Schneider, Tim Ebringer, Tony Rogers:
A Survey of Policy-Based Management Approaches for Service Oriented Systems. Australian Software Engineering Conference 2008: 392-401 - [c46]Artem Vorobiev, Jun Han, Nargiza Bekmamedova:
An Ontology Framework for Managing Security Attacks and Defences in Component Based Software Systems. Australian Software Engineering Conference 2008: 552-561 - [c45]Khaled M. Khan
, Jun Han:
Specifying Security Goals of Component Based Systems: An End-User Perspective. ICCBSS 2008: 101-109 - [c44]Tan Phan, Jun Han, Jean-Guy Schneider, Kirk Wilson:
Quality-Driven Business Policy Specification and Refinement for Service-Oriented Systems. ICSOC 2008: 5-21 - [c43]Ingo Müller, Jun Han, Jean-Guy Schneider
, Steven Versteeg:
A Conceptual Framework for Unified and Comprehensive SOA Management. ICSOC Workshops 2008: 28-40 - [c42]Antony Tang, Minh H. Tran, Jun Han, Hans van Vliet:
Design Reasoning Improves Software Design Quality. QoSA 2008: 28-42 - 2007
- [j8]Alan W. Colman, Jun Han:
Roles, players and adaptable organizations. Appl. Ontology 2(2): 105-126 (2007) - [j7]Antony Tang
, Ann E. Nicholson
, Yan Jin, Jun Han:
Using Bayesian belief networks for change impact analysis in architecture design. J. Syst. Softw. 80(1): 127-148 (2007) - [j6]Antony Tang
, Yan Jin, Jun Han:
A rationale-based architecture model for design traceability and reasoning. J. Syst. Softw. 80(6): 918-934 (2007) - [j5]Alan W. Colman
, Jun Han:
Using role-based coordination to achieve software adaptability. Sci. Comput. Program. 64(2): 223-245 (2007) - [c41]Alan W. Colman
, Linh Duy Pham, Jun Han, Jean-Guy Schneider
:
Towards Dynamic Matching of Business-Level Protocols in Adaptive Service Compositions. Business Process Management Workshops 2007: 502-507 - [c40]Jun Han, Alan W. Colman
:
The Four Major Challenges of Engineering Adaptive Software Architectures. COMPSAC (2) 2007: 565-572 - [c39]Yan Jin, Antony Tang
, Jun Han, Yan Liu:
Performance Evaluation and Prediction for Legacy Information Systems. ICSE 2007: 540-549 - [c38]Jian Yu, Jun Han, Paolo Falcarin, Maurizio Morisio:
Using Temporal Business Rules to Synthesize Service Composition Process Models. ACT4SOC 2007: 85-94 - [c37]Jun Han, Yan Jin, Zheng Li, Tan Phan, Jian Yu
:
Guiding the Service Composition Process with Temporal Business Rules. ICWS 2007: 735-742 - [c36]Tan Phan, Jun Han, Jean-Guy Schneider, Tim Ebringer, Tony Rogers:
Policy-Based Service Registration and Discovery. OTM Conferences (1) 2007: 417-426 - 2006
- [j4]Alan W. Colman, Jun Han:
Adaptive service-oriented systems: an organisational approach. Comput. Syst. Sci. Eng. 21(4) (2006) - [j3]Antony Tang
, Muhammad Ali Babar, Ian Gorton, Jun Han:
A survey of architecture design rationale. J. Syst. Softw. 79(12): 1792-1804 (2006) - [j2]Elisabetta Di Nitto, Robert J. Hall, Jun Han, Yanbo Han, Andrea Polini, Kurt Sandkuhl, Andrea Zisman:
Report on the International Workshop on Service Oriented Software Engineering (IW-SOSE06). ACM SIGSOFT Softw. Eng. Notes 31(5): 36-38 (2006) - [c35]Jun Han, Yanbo Han, Yan Jin, Jianwu Wang, Jian Yu
:
Personalized Active Service Spaces for End-User Service Composition. IEEE SCC 2006: 198-205 - [c34]Artem Vorobiev, Jun Han:
Secrobat: Secure and Robust Component-based Architectures. APSEC 2006: 3-10 - [c33]Jun Han, Khaled M. Khan
:
Security-Oriented Service Composition and Evolution. APSEC 2006: 71-78 - [c32]Zheng Li, Yan Jin, Jun Han:
A Runtime Monitoring and Validation Framework for Web Service Interactions. ASWEC 2006: 70-79 - [c31]Khaled M. Khan
, Jun Han:
Assessing Security Properties of Software Components: A Software Engineer's Perspective. ASWEC 2006: 199-210 - [c30]Elisabetta Di Nitto, Robert J. Hall, Jun Han, Yanbo Han, Andrea Polini, Kurt Sandkuhl, Andrea Zisman:
International workshop on service oriented software engineering (IW-SOSE'06). ICSE 2006: 1036-1037 - [c29]Xuan Thang Nguyen, Ryszard Kowalczyk
, Jun Han:
Using Dynamic Asynchronous Aggregate Search for Quality Guarantees of Multiple Web Services Compositions. ICSOC 2006: 129-140 - [c28]Boris Wu, Jian Ying Zhang, Mohan Baruwal Chhetri
, Jian Lin, SukKeong Goh, Xuan Thang Nguyen, Ingo Müller, E. Gomes, L. Zheng, Jun Han, Ryszard Kowalczyk
:
Adaptive Service Agreement and Process Management. ICWS 2006: 927-930 - [c27]Alan W. Colman
, Linh Duy Pham, Jun Han, Jean-Guy Schneider
:
Adaptive application-specific middleware. MW4SOC 2006: 6-11 - [c26]Muhammad Ali Babar, Antony Tang
, Ian Gorton, Jun Han:
Industrial Perspective on the Usefulness of Design Rationale for Software Maintenance: A Survey. QSIC 2006: 201-208 - [c25]Artem Vorobiev, Jun Han:
Specifying Dynamic Security Properties of Web Service Based Systems. SKG 2006: 34 - [c24]Artem Vorobiev, Jun Han:
Security Attack Ontology for Web Services. SKG 2006: 42 - [c23]Jian Yu
, Tan Phan Manh, Jun Han, Yan Jin, Yanbo Han, Jianwu Wang:
Pattern Based Property Specification and Verification for Service Composition. WISE 2006: 156-168 - [e1]Elisabetta Di Nitto, Robert J. Hall, Jun Han, Yanbo Han, Andrea Polini, Kurt Sandkuhl, Andrea Zisman:
The 2006 International Workshop on Service Oriented Software Engineering (IW-SOSE '06), May 27-28, 2006, Shanghai, China, in conjunction with ICSE 2006. IEEE Computer Society 2006, ISBN 0-7695-2726-4 [contents] - 2005
- [c22]Yan Jin, Jun Han:
Consistency and Interoperability Checking for Component Interaction Rules. APSEC 2005: 595-602 - [c21]Alan W. Colman
, Jun Han:
Operational Management Contracts for Adaptive Software Organisation. Australian Software Engineering Conference 2005: 170-179 - [c20]Khaled M. Khan
, Jun Han:
Deriving Systems Level Security Properties of Component Based Composite Systems. Australian Software Engineering Conference 2005: 334-343 - [c19]Alan W. Colman
, Jun Han:
Coordination Systems in Role-Based Adaptive Software. COORDINATION 2005: 63-78 - [c18]Antony Tang
, Jun Han:
Architecture Rationalization: A Methodology for Architecture Verifiability, Traceability and Completeness. ECBS 2005: 135-144 - [c17]Alan W. Colman, Jun Han:
Organizational Abstractions for Adaptive Systems. HICSS 2005 - [c16]Yan Jin, Jun Han:
Specifying Interaction Constraints of Software Components for Better Understandability and Interoperability. ICCBSS 2005: 54-64 - [c15]Zheng Li, Jun Han, Yan Jin:
Pattern-Based Specification and Validation of Web Services Interaction Properties. ICSOC 2005: 73-86 - [c14]Yan Jin, Jun Han:
Runtime Validation of Behavioural Contracts for Component Software. QSIC 2005: 177-186 - [c13]Antony Tang
, Yan Jin, Jun Han, Ann E. Nicholson
:
Predicting Change Impact in Architecture Design with Bayesian Belief Networks. WICSA 2005: 67-76 - [c12]Antony Tang
, Muhammad Ali Babar, Ian Gorton, Jun Han:
A Survey of the Use and Documentation of Architecture Design Rationale. WICSA 2005: 89-98 - [c11]Alan W. Colman
, Jun Han:
Using Association Aspects to Implement Organisational Contracts. CoOrg@COORDINATION 2005: 37-53 - 2004
- [c10]Antony Tang
, Jun Han, Pin Chen:
A Comparative Analysis of Architecture Frameworks. APSEC 2004: 640-647 - [c9]Khaled M. Khan
, Jun Han:
A Process Framework for Characterising Security Properties of Component-Based Software Systems. Australian Software Engineering Conference 2004: 358-367 - [c8]Jun Han:
A Software Engineering Perspective for Services Security. GCC Workshops 2004: 366-373 - 2003
- [c7]Jun Han, Ksze Kae Ker:
Ensuring Compatible Interactions within Component-based Software Systems. APSEC 2003: 436-445 - [c6]Khaled M. Khan, Jun Han:
A Security Characterisation Framework for Trustworthy Component Based Software Systems. COMPSAC 2003: 164-169 - [c5]Jun Han:
Interaction Compatibility: An Essential Ingredient for Service Composition. GCC (1) 2003: 59-66 - 2002
- [j1]Khaled M. Khan
, Jun Han:
Composing Security-Aware Software. IEEE Softw. 19(1): 34-41 (2002) - 2001
- [c4]Khaled M. Khan
, Jun Han, Yuliang Zheng
:
A Framework for an Active Interface to Characterise Compositional Security Contracts of Software Components. Australian Software Engineering Conference 2001: 117-126 - 2000
- [c3]Khaled M. Khan
, Jun Han, Yuliang Zheng
:
Characterizing User Data Protection of Software Components. Australian Software Engineering Conference 2000: 3-12 - [c2]Khaled M. Khan, Jun Han, Yuliang Zheng:
Security Characterization of Software Components and Their Composition. TOOLS (36) 2000: 240-249
1990 – 1999
- 1999
- [c1]Khaled M. Khan
, Jun Han, Yuliang Zheng
:
Security Properties of Software Components. ISW 1999: 52-56
Coauthor Index
aka: Alan Colman
aka: Steven Versteeg

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-05-13 21:37 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint