default search action
Bixin Li
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j60]Hao Chen, Shengyang Zhou, Chen Chen, Zheng Dai, Bixin Li:
A Business-Oriented Methodology to Evaluate the Security of Software Architecture Quantitatively. Int. J. Softw. Eng. Knowl. Eng. 34(2): 239-271 (2024) - [j59]Tong Wang, Bixin Li:
EsArCost: Estimating repair costs of software architecture erosion using slice technology. J. Syst. Softw. 208: 111875 (2024) - [j58]Tianyuan Hu, Jingyue Li, Xiangfei Xu, Bixin Li:
SoliTester: Detecting exploitable external-risky vulnerability in smart contracts using contract account triggering method. J. Softw. Evol. Process. 36(7) (2024) - [j57]Tianyuan Hu, Bixin Li, Zhenyu Pan, Chen Qian:
Detect Defects of Solidity Smart Contract Based on the Knowledge Graph. IEEE Trans. Reliab. 73(1): 186-202 (2024) - [c104]Huaixu Lin, Bixin Li, Liang Liu, Lulu Wang, Jianming Chang:
OTCP-ISVM: Online Test Case Prioritization Based on Incremental Support Vector Machine. QRS 2024: 84-94 - [c103]Ao Fan, Li Liao, Lulu Wang, Bixin Li:
Test Case Generation for Access Control Based on UML Activity Diagram. QRS 2024: 95-104 - [c102]Jiahao Ren, Jianming Chang, Lulu Wang, Zaixing Zhang, Bixin Li:
Graph-Based Salient Class Classification in Commits. QRS 2024: 620-631 - [i2]Mei Han, Lulu Wang, Jianming Chang, Bixin Li, Chunguang Zhang:
Learning Graph-based Patch Representations for Identifying and Assessing Silent Vulnerability Fixes. CoRR abs/2409.08512 (2024) - 2023
- [j56]Chunguang Zhang, Bixin Li, Lulu Wang, Haixin Xu, Tao Shao:
A Hierarchical Model for Quality Evaluation of Mixed Source Software Based on ISO/IEC 25010. Int. J. Softw. Eng. Knowl. Eng. 33(2): 181-205 (2023) - [j55]Tong Wang, Bixin Li, Lingyuan Zhu:
A Quality-Driven Iterative Evolution Approach for Software Architecture. Int. J. Softw. Eng. Knowl. Eng. 33(2): 231-255 (2023) - [j54]Chen Cheng, Bixin Li, Dong Chen:
A quality evaluation method for intelligent traffic management system based on business data flow. J. Intell. Fuzzy Syst. 45(4): 6193-6208 (2023) - [j53]Qihao Bao, Bixin Li, Tianyuan Hu, Xueyong Sun:
A survey of blockchain consensus safety and security: State-of-the-art, challenges, and future work. J. Syst. Softw. 196: 111555 (2023) - [j52]Jiaxin Pan, Zixuan Liu, Donglin Li, Lulu Wang, Bixin Li:
An empirical study of software architecture resilience evaluation methods. J. Syst. Softw. 202: 111726 (2023) - [j51]Lulu Wang, Peng Hu, Xianglong Kong, Wenjie Ouyang, Bixin Li, Haixin Xu, Tao Shao:
Microservice architecture recovery based on intra-service and inter-service features. J. Syst. Softw. 204: 111754 (2023) - [c101]Xiangfei Xu, Tianyuan Hu, Bixin Li, Li Liao:
CCDetector: Detect Chaincode Vulnerabilities Based on Knowledge Graph. COMPSAC 2023: 699-704 - [c100]Donglin Li, Zixuan Liu, Jiaxin Pan, Bixin Li:
Evaluating the Resilience of Software Architecture Based on Minimal Path. DSA 2023: 42-53 - [i1]Mingke Yang, Yuming Zhou, Bixin Li, Yutian Tang:
On Code Reuse from StackOverflow: An Exploratory Study on Jupyter Notebook. CoRR abs/2302.11732 (2023) - 2022
- [j50]Li Wang, Xianglong Kong, Jiahui Wang, Bixin Li:
An incremental software architecture recovery technique driven by code changes. Frontiers Inf. Technol. Electron. Eng. 23(5): 664-677 (2022) - [j49]Md Nasir Uddin, Bixin Li, Zafar Ali, Pavlos Kefalas, Inayat Khan, Islam Zada:
Software defect prediction employing BiLSTM and BERT-based semantic feature. Soft Comput. 26(16): 7877-7891 (2022) - [j48]Bixin Li, Zhenyu Pan, Tianyuan Hu:
ReDefender: Detecting Reentrancy Vulnerabilities in Smart Contracts Automatically. IEEE Trans. Reliab. 71(2): 984-999 (2022) - [c99]Yin Li, Bixin Li:
Answering Why-Not Questions on GeoSPARQL Queries. APWeb/WAIM (2) 2022: 286-300 - [c98]Chen Qian, Tianyuan Hu, Bixin Li:
A BiLSTM-Attention Model for Detecting Smart Contract Defects More Accurately. QRS 2022: 53-62 - [c97]Jingyuan Cai, Ying Zhou, Tianyuan Hu, Bixin Li:
PTLC: Protect the Identity Privacy during Cross-Chain Asset Transaction More Effectively. QRS Companion 2022: 70-78 - [c96]Qihao Bao, Bixin Li, Tianyuan Hu, Dongyu Cao:
Model Checking the Safety of Raft Leader Election Algorithm. QRS 2022: 400-409 - [c95]Xueyong Sun, Qihao Bao, Bixin Li:
Can PoW Consensus Protocol Resist the Whale Attack? QRS 2022: 504-515 - 2021
- [c94]Zhenyu Pan, Tianyuan Hu, Chen Qian, Bixin Li:
ReDefender: A Tool for Detecting Reentrancy Vulnerabilities in Smart Contracts Effectively. QRS 2021: 915-925 - [c93]Tianyuan Hu, Zhenyu Pan, Bixin Li:
SolDetector: Detect Defects Based on Knowledge Graph of Solidity Smart Contract. SEKE 2021: 423-428 - 2020
- [j47]Chunling Hu, Xiaona Wu, Bixin Li:
A Framework for Trustworthy Web Service Composition and Optimization. IEEE Access 8: 73508-73522 (2020) - [j46]Xianglong Kong, Weina Han, Li Liao, Bixin Li:
An analysis of correctness for API recommendation: are the unmatched results useless? Sci. China Inf. Sci. 63(9): 1-15 (2020) - [j45]Biao Xiong, Rong Fan, Shuai Wang, Bixin Li, Can Wang:
Performance Evaluation and Disruption Recovery for Military Supply Chain Network. Complex. 2020: 9760604:1-9760604:10 (2020) - [j44]Chunling Hu, Cuicui Liu, Bixin Li:
Evaluating the trustworthiness of BPEL processes based on data dependency and XBFG. Int. J. Comput. Sci. Eng. 21(1): 146-161 (2020) - [j43]Lulu Wang, Bixin Li, Xianglong Kong:
Type slicing: An accurate object oriented slicing based on sub-statement level dependence graph. Inf. Softw. Technol. 127: 106369 (2020) - [c92]Xinyun Cheng, Xianglong Kong, Li Liao, Bixin Li:
A Combined Method for Usage of NLP Libraries Towards Analyzing Software Documents. CAiSE 2020: 515-529 - [c91]Qiwei Song, Xianglong Kong, Lulu Wang, Bixin Li:
An Empirical Investigation into the Effects of Code Comments on Issue Resolution. COMPSAC 2020: 921-930 - [c90]Huidan Li, Rensong Xie, Xianglong Kong, Lulu Wang, Bixin Li:
An Analysis of Utility for API Recommendation: Do the Matched Results Have the Same Efforts? QRS 2020: 479-488 - [c89]Tong Wang, Bixin Li, Lingyuan Zhu:
A Co-evolutionary Method Between Architecture and Code. SEKE 2020: 147-152 - [c88]Renhao Xiong, David Lo, Bixin Li:
Distinguishing Similar Design Pattern Instances through Temporal Behavior Analysis. SANER 2020: 296-307
2010 – 2019
- 2019
- [j42]Shunhui Ji, Bixin Li, Pengcheng Zhang:
Test Case Selection for All-Uses Criterion-Based Regression Testing of Composite Service. IEEE Access 7: 174438-174464 (2019) - [j41]Lulu Wang, Jingyue Li, Bixin Li:
Tracking runtime concurrent dependences in java threads using thread control profiling. J. Syst. Softw. 148: 116-131 (2019) - [j40]Lulu Wang, Jingyue Li, Bixin Li:
Erratum to "Tracking runtime concurrent dependences in java threads using thread control profiling" [The Journal of Systems and Software 148 (2019) 116-131]. J. Syst. Softw. 153: 44 (2019) - [j39]Bixin Li, Rong Fan, Bing Yang, Shigang Lin:
Detection of Abnormal Oil Data Based on Feature Selection. Rev. d'Intelligence Artif. 33(4): 321-325 (2019) - [c87]Chunling Hu, Guoqing Geng, Bixin Li, Chao Tang, Xiaofeng Wang:
Verifying Cloud Application for the Interaction Correctness Using SoaML and SPIN. ICSCA 2019: 210-216 - [c86]Chunling Hu, Bixin Li, Xiaofeng Wang, Gang Lv:
Empirical Study of Hybrid Optimization Strategy for Evolutionary Testing. ICPCSEE (2) 2019: 41-53 - [c85]Rensong Xie, Xianglong Kong, Lulu Wang, Ying Zhou, Bixin Li:
HiRec: API Recommendation using Hierarchical Context. ISSRE 2019: 369-379 - [c84]Tong Wang, Bixin Li:
Analyzing Software Architecture Evolvability Based on Multiple Architectural Attributes Measurements. QRS 2019: 204-215 - [c83]Tong Wang, Dongdong Wang, Bixin Li:
A Multilevel Analysis Method for Architecture Erosion. SEKE 2019: 443-566 - [c82]Tong Wang, Yelian Zhang, Xufang Gong, Bixin Li:
Recover and Optimize Software Architecture Based on Source Code and Directory Hierarchies (S). SEKE 2019: 469-599 - [c81]Qiang Yin, Lulu Wang, Bixin Li:
Identify MVC architectural pattern based on ontology. SEKE 2019: 612-777 - [c80]Lihui Tang, Lulu Wang, Bixin Li:
Identify Blackboard Pattern Based on Ontology. TASE 2019: 224-231 - [c79]Tong Wang, Dongdong Wang, Ying Zhou, Bixin Li:
Software Multiple-Level Change Detection Based on Two-Step MPAT Matching. SANER 2019: 4-14 - [c78]Renhao Xiong, Bixin Li:
Accurate Design Pattern Detection Based on Idiomatic Implementation Matching in Java Language Context. SANER 2019: 163-174 - 2018
- [j38]Xianglong Kong, Bixin Li, Lulu Wang, Wensheng Wu:
Directory-Based Dependency Processing for Software Architecture Recovery. IEEE Access 6: 52321-52335 (2018) - [j37]Pengfei Duan, Ying Zhou, Xufang Gong, Bixin Li:
A Systematic Mapping Study on the Verification of Cyber-Physical Systems. IEEE Access 6: 59043-59064 (2018) - [j36]Chunling Hu, Bixin Li, Xiaobing Sun:
Mining Variable-Method Correlation for Change Impact Analysis. IEEE Access 6: 77581-77595 (2018) - [j35]Huihui Liu, Bixin Li, Yibiao Yang, Wanwangying Ma, Ru Jia:
Exploring the Impact of Code Smells on Fine-Grained Structural Change-Proneness. Int. J. Softw. Eng. Knowl. Eng. 28(10): 1487-1516 (2018) - [j34]Xianglong Kong, Lingming Zhang, W. Eric Wong, Bixin Li:
The impacts of techniques, programs and tests on automated program repair: An empirical study. J. Syst. Softw. 137: 480-496 (2018) - [c77]Ying Zhou, Xufang Gong, Jiakai Li, Bixin Li:
Verifying CPS for Self-Adaptability. ICIS 2018: 166-172 - [c76]Ying Zhou, Xufang Gong, Bixin Li, Min Zhu:
A Framework for CPS Modeling and Verification Based on dL. ICIS 2018: 173-179 - [c75]Huihui Liu, Yijun Yu, Bixin Li, Yibiao Yang, Ru Jia:
Are Smell-Based Metrics Actually Useful in Effort-Aware Structural Change-Proneness Prediction? An Empirical Study. APSEC 2018: 315-324 - [c74]Huihui Liu, Xufang Gong, Li Liao, Bixin Li:
Evaluate How Cyclomatic Complexity Changes in the Context of Software Evolution. COMPSAC (2) 2018: 756-761 - 2017
- [j33]Zecheng Li, Li Liao, Hareton Leung, Bixin Li, Chao Li:
Evaluating the credibility of cloud services. Comput. Electr. Eng. 58: 161-175 (2017) - [j32]Biao Xiong, Bixin Li, Rong Fan, Qingzhong Zhou, Wu Li:
Modeling and Simulation for Effectiveness Evaluation of Dynamic Discrete Military Supply Chain Networks. Complex. 2017: 6052037:1-6052037:9 (2017) - [j31]Dong Qiu, Bixin Li, Earl T. Barr, Zhendong Su:
Understanding the syntactic rule usage in java. J. Syst. Softw. 123: 160-172 (2017) - [j30]Xiaobing Sun, Xiangyue Liu, Bin Li, Bixin Li, David Lo, Lingzhi Liao:
Clustering Classes in Packages for Program Comprehension. Sci. Program. 2017: 3787053:1-3787053:15 (2017) - [c73]Bixin Li, Li Liao, Yi Cheng:
Evaluating Software Architecture Evolution Using Performance Simulation. ACIT/CSII/BCD 2017: 7-13 - [c72]Ying Zhou, Min Zhu, Xufang Gong, Bixin Li:
Verifying CPS Using DDL. Intelligent Environments (Workshops) 2017: 15-24 - 2016
- [j29]Lulu Wang, Bixin Li, Hareton Leung:
A new method to encode calling contexts with recursions. Sci. China Inf. Sci. 59(5): 052104:1-052104:15 (2016) - [j28]Xiaobing Sun, Xin Peng, Bin Li, Bixin Li, Wanzhi Wen:
IPSETFUL: an iterative process of selecting test cases for effective fault localization by exploring concept lattice of program spectra. Frontiers Comput. Sci. 10(5): 812-831 (2016) - [j27]Yan Lei, Min Zhang, Bixin Li, Jingan Ren, Yinhua Jiang:
The Impact of Information Richness on Fault Localization. IEICE Trans. Inf. Syst. 99-D(1): 265-269 (2016) - [j26]Dong Qiu, Bixin Li, Hareton Leung:
Understanding the API usage in Java. Inf. Softw. Technol. 73: 81-100 (2016) - [j25]Fei Liu, Bixin Li, Rupesh Nasre:
Efficient online cycle detection technique combining with Steensgaard points-to information. Softw. Pract. Exp. 46(5): 601-623 (2016) - [c71]Shunhui Ji, Bixin Li, Pengcheng Zhang:
Test Case Selection for Data Flow Based Regression Testing of BPEL Composite Services. SCC 2016: 547-554 - [c70]Li Liao, Bixin Li, Chao Li:
A Model to Evaluate the Credibility of Service in Cloud Computing Environment. DASC/PiCom/DataCom/CyberSciTech 2016: 294-301 - [c69]Li Liao, ShanShan Qi, Bixin Li:
Trust analysis of composite service evolution. SERA 2016: 15-22 - [c68]Bixin Li, Li Liao, Jingwen Si:
A technique to evaluate software evolution based on architecture metric. SERA 2016: 273- - 2015
- [j24]Xiaobing Sun, Bixin Li, Hareton K. N. Leung, Bin Li, Yun Li:
MSR4SM: Using topic models to effectively mining software repositories for software maintenance tasks. Inf. Softw. Technol. 66: 1-12 (2015) - [j23]Xiaobing Sun, Bixin Li, Hareton Leung, Bin Li, Junwu Zhu:
Static change impact analysis techniques: A comparative study. J. Syst. Softw. 109: 137-149 (2015) - [c67]Chuanqi Tao, Jerry Gao, Bixin Li:
Cloud-Based Infrastructure for Mobile Testing as a Service. CBD 2015: 133-140 - [c66]Xianglong Kong, Lingming Zhang, W. Eric Wong, Bixin Li:
Experience report: How do techniques, programs, and tests impact automated program repair? ISSRE 2015: 194-204 - [c65]Chuanqi Tao, Jerry Gao, Bixin Li:
A Model-Based Framework to Support Complexity Analysis Service for Regression Testing of Component-Based Software. SOSE 2015: 326-331 - 2014
- [j22]Bixin Li, Lulu Wang, Hareton Leung:
Profiling selected paths with loops. Sci. China Inf. Sci. 57(7): 1-15 (2014) - [j21]Dong Qiu, Bixin Li, Shunhui Ji, Hareton K. N. Leung:
Regression Testing of Web Service: A Systematic Mapping Study. ACM Comput. Surv. 47(2): 21:1-21:46 (2014) - [j20]Chunli Xie, Bixin Li, Hareton Leung:
SRM: a staged reliability model for Web service. Innov. Syst. Softw. Eng. 10(2): 137-154 (2014) - [j19]Xiaobing Sun, Hareton Leung, Bin Li, Bixin Li:
Change impact analysis and changeability assessment for a change proposal: An empirical study ☆☆. J. Syst. Softw. 96: 51-60 (2014) - [j18]Bixin Li, Li Liao, Hareton Leung, Rui Song:
PHAT: A Preference and Honesty Aware Trust Model for Web Services. IEEE Trans. Netw. Serv. Manag. 11(3): 363-375 (2014) - 2013
- [j17]Bixin Li, Qiandong Zhang, Xiaobing Sun, Hareton Leung:
Using water wave propagation phenomenon to study software change impact analysis. Adv. Eng. Softw. 58: 45-53 (2013) - [j16]Xiaobing Sun, Bixin Li, Wanzhi Wen, Sai Zhang:
Analyzing Impact Rules of Different Change Types to Support Change Impact Analysis. Int. J. Softw. Eng. Knowl. Eng. 23(3): 259-288 (2013) - [j15]Bixin Li, Xiaobing Sun, Jacky Keung:
FCA-CIA: An approach of using FCA to support cross-level change impact analysis for object oriented Java programs. Inf. Softw. Technol. 55(8): 1437-1449 (2013) - [j14]Chuanqi Tao, Bixin Li, Jerry Gao:
A Systematic State-Based Approach to Regression Testing of Component Software. J. Softw. 8(3): 560-571 (2013) - [j13]Bixin Li, Xiaobing Sun, Hareton Leung, Sai Zhang:
A survey of code-based change impact analysis techniques. Softw. Test. Verification Reliab. 23(8): 613-646 (2013) - [j12]Bixin Li, Shunhui Ji, Dong Qiu, Hareton Leung, Gongyuan Zhang:
Verifying the Concurrent Properties in BPEL Based Web Service Composition Process. IEEE Trans. Netw. Serv. Manag. 10(4): 410-424 (2013) - [c64]Xiaobing Sun, Ying Chen, Bin Li, Bixin Li:
Exploring software engineering data with formal concept analysis. DAPSE@ICSE 2013: 14-16 - [c63]Xiaobing Sun, Bixin Li, Wanzhi Wen:
CLPS-MFL: Using Concept Lattice of Program Spectrum for Effective Multi-fault Localization. QSIC 2013: 204-207 - [c62]Bixin Li, Qiandong Zhang, Xiaobing Sun, Hareton Leung:
WAVE-CIA: a novel CIA approach based on call graph mining. SAC 2013: 1000-1005 - [c61]Chuanqi Tao, Bixin Li, Jerry Gao:
Testing Configurable Architectures For Component-Based Software Using an Incremental Approach. SEKE 2013: 356-361 - [c60]Fei Liu, Lulu Wang, Bixin Li:
ELCD: an efficient online cycle detection technique for pointer analysis. SEKE 2013: 606-611 - [c59]Dong Qiu, Bixin Li, Zhendong Su:
An empirical analysis of the co-evolution of schema and code in database applications. ESEC/SIGSOFT FSE 2013: 125-135 - [c58]Bixin Li, Shunhui Ji, Li Liao, Dong Qiu, Mingjie Sun:
Monitoring Web Services for Conformance. SOSE 2013: 92-102 - [c57]Bixin Li, Rui Song, Li Liao, Cuicui Liu:
A User-Oriented Trust Model for Web Services. SOSE 2013: 224-232 - 2012
- [j11]Bixin Li, Xiaobing Sun, Hareton Leung:
Combining concept lattice with call graph for impact analysis. Adv. Eng. Softw. 53: 1-13 (2012) - [j10]Bixin Li, Dong Qiu, Hareton Leung, Di Wang:
Automatic test case selection for regression testing of composite service based on extensible BPEL flow graph. J. Syst. Softw. 85(6): 1300-1324 (2012) - [j9]Bixin Li, Lulu Wang, Hareton Leung, Fei Liu:
Profiling all paths: A new profiling technique for both cyclic and acyclic paths. J. Syst. Softw. 85(7): 1558-1576 (2012) - [c56]Rui Song, Bixin Li, Xiaona Wu, Cuicui Liu, ShanShan Qi:
A Preference and Honesty Aware Trust Model for Web Services. APSEC 2012: 61-66 - [c55]Xiaona Wu, Bixin Li, Rui Song, Cuicui Liu, ShanShan Qi:
Trust-Based Service Composition and Optimization. APSEC 2012: 67-72 - [c54]ShanShan Qi, Bixin Li, Cuicui Liu, Xiaona Wu, Rui Song:
A Trust Impact Analysis Model for Composite Service Evolution. APSEC 2012: 73-78 - [c53]Cuicui Liu, Bixin Li, ShanShan Qi, Xiaona Wu, Rui Song:
Data Depedency Based Trust Evaluation for BPEL Processes. APSEC 2012: 857-866 - [c52]Xiaobing Sun, Bixin Li, Qiandong Zhang:
A Change Proposal Driven Approach for Changeability Assessment Using FCA-Based Impact Analysis. COMPSAC 2012: 328-333 - [c51]Xiaobing Sun, Bin Li, Bixin Li, Wanzhi Wen:
A comparative study of static CIA techniques. Internetware 2012: 23:1-23:8 - [c50]Xiaoxiang Zhai, Qiaoqiao Chen, Shunhui Ji, Bixin Li:
A Unified Modeling and Verifying Framework for Cyber Physical Systems. QSIC 2012: 128-131 - [c49]Qiandong Zhang, Bixin Li, Xiaobing Sun:
Mining Call Graph for Change Impact Analysis. SEKE 2012: 7-12 - [c48]Xiaoxiang Zhai, Bixin Li, Min Zhu, Jiakai Li, Qiaoqiao Chen, Shunhui Ji:
Verification of Cyber-Physical Systems Based on Differential-Algebraic Temporal Dynamic Logic. SEKE 2012: 231-234 - [c47]Min Zhu, Bixin Li, Jiakai Li, Qiaoqiao Chen, Xiaoxiang Zhai, Shunhui Ji:
HybridUML Based Verification of CPS Using Differential Dynamic Logic. SEKE 2012: 235-238 - [c46]Jiakai Li, Bixin Li, Qiaoqiao Chen, Min Zhu, Shunhui Ji, Xiaoxiang Zhai:
A HybridUML and QdL Based Verification Method for CPS Self-Adaptability. SEKE 2012: 239-242 - [c45]Xiaobing Sun, Bixin Li, Chuanqi Tao, Qiandong Zhang:
Using FCA-based Change Impact Analysis for Regression Testing. SEKE 2012: 452-457 - 2011
- [c44]Xifeng Wang, Bixin Li, Li Liao, Chunli Xie:
Ontology-Based Reliability Evaluation for Web Service. COMPSAC 2011: 348-349 - [c43]Chunli Xie, Bixin Li, Xifeng Wang:
A Staged Model for Web Service Reliability. COMPSAC 2011: 564-565 - [c42]Lulu Wang, Bixin Li:
A Technique of Profiling Selective Paths. COMPSAC 2011: 588-589 - [c41]Zhengshan Wang, Bixin Li, Lulu Wang, Qiao Li:
An Effective Approach for Automatic Generation of Class Integration Test Order. COMPSAC 2011: 680-681 - [c40]Chuanqi Tao, Bixin Li, Jerry Gao:
Regression Testing of Component-Based Software: A Systematic Practise Based on State Testing. HASE 2011: 29-32 - [c39]Xiaobing Sun, Bixin Li:
Using Formal Concept Analysis to support change analysis. ASE 2011: 641-645 - [c38]Xiaobing Sun, Bixin Li, Sai Zhang, Chuanqi Tao, Xiang Chen, Wanzhi Wen:
Using lattice of class and method dependence for change impact analysis of object oriented programs. SAC 2011: 1439-1444 - [c37]Lulu Wang, Bixin Li:
A Technology of Profiling Inter-procedural Paths. SEKE 2011: 31-36 - [c36]Fei Liu, Bixin Li:
Multithreaded Pointer Analysis Based on Petri Net. SEKE 2011: 127-130 - [c35]Wanzhi Wen, Bixin Li, Xiaobing Sun, Jiakai Li:
Program slicing spectrum-based software fault localization. SEKE 2011: 213-218 - [c34]Chuanqi Tao, Bixin Li, Jerry Gao:
A Model-based Approach to Regression Testing of Component-based Software. SEKE 2011: 230-237 - [c33]Zhengshan Wang, Bixin Li, Lulu Wang, Qiao Li:
A Brief Survey on Automatic Integration Test Order Generation. SEKE 2011: 254-257 - [c32]Chunli Xie, Bixin Li, Xifeng Wang:
A Web Service Reliability Model Based on Birth-Death Process. SEKE 2011: 625-628 - 2010
- [j8]Bixin Li, Shunhui Ji, Dong Qiu, Ju Cai:
Generating Test Cases of Composite Services Based on OWL-S and eh-CPN. Int. J. Softw. Eng. Knowl. Eng. 20(7): 921-941 (2010) - [j7]Pengcheng Zhang, Henry Muccini, Yuelong Zhu, Bixin Li:
Model and Verification of WS-CDL Based on UML Diagrams. Int. J. Softw. Eng. Knowl. Eng. 20(8): 1119-1149 (2010) - [j6]Pengcheng Zhang, Bixin Li, Lars Grunske:
Timed Property Sequence Chart. J. Syst. Softw. 83(3): 371-390 (2010) - [j5]Pengcheng Zhang, Henry Muccini, Bixin Li:
A classification and comparison of model checking software architecture techniques. J. Syst. Softw. 83(5): 723-744 (2010) - [c31]Gongyuan Zhang, Bixin Li:
A Way to Model Flow Construct and Its Three Properties Verification for BPEL Specification. APSCC 2010: 277-284 - [c30]Bixin Li, Xiaocong Fan, Ying Zhou, Zhiyong Su:
Evaluating the Reliability of Web Services Based on BPEL Code Structure Analysis and Run-Time Information Capture. APSEC 2010: 206-215 - [c29]Chuanqi Tao, Bixin Li, Xiaobing Sun, Ying Zhou:
A Hierarchical Model for Regression Test Selection and Cost Analysis of Java Programs. APSEC 2010: 290-299 - [c28]Zhengshan Wang, Bixin Li, Lulu Wang, Meng Wang, Xufang Gong:
Using Coupling Measure Technique and Random Iterative Algorithm for Inter-Class Integration Test Order Problem. COMPSAC Workshops 2010: 329-334 - [c27]Chuanqi Tao, Bixin Li, Xiaobing Sun, Chongfeng Zhang:
An Approach to Regression Test Selection Based on Hierarchical Slicing Technique. COMPSAC Workshops 2010: 347-352 - [c26]Meng Wang, Bixin Li, Zhengshan Wang, Xiaoyuan Xie:
An Optimization Strategy for Evolutionary Testing Based on Cataclysm. COMPSAC Workshops 2010: 359-364 - [c25]Xiaobing Sun, Bixin Li, Chuanqi Tao, Wanzhi Wen, Sai Zhang:
Change Impact Analysis Based on a Taxonomy of Change Types. COMPSAC 2010: 373-382 - [c24]Bixin Li, Dong Qiu, Shunhui Ji, Di Wang:
Automatic test case selection and generation for regression testing of composite service based on extensible BPEL flow graph. ICSM 2010: 1-10 - [c23]Pengcheng Zhang, Zhiyong Su, Yuelong Zhu, Wenrui Li, Bixin Li:
WS-PSC Monitor: A Tool Chain for Monitoring Temporal and Timing Properties in Composite Service Based on Property Sequence Chart. RV 2010: 485-489
2000 – 2009
- 2009
- [c22]Mingjie Sun, Bixin Li, Pengcheng Zhang:
Monitoring BPEL-Based Web Service Composition Using AOP. ACIS-ICIS 2009: 1172-1177 - [c21]Bixin Li, Yu Zhou, Jun Pang:
Model-Driven Automatic Generation of Verified BPEL Code for Web Service Composition. APSEC 2009: 355-362 - [c20]Pengcheng Zhang, Lars Grunske, Antony Tang, Bixin Li:
A Formal Syntax for Probabilistic Timed Property Sequence Charts. ASE 2009: 500-504 - [c19]Bixin Li, Ju Cai, Dong Qiu, Shunhui Ji, Yuting Jiang:
Generating Test Cases of Composite Services Based on OWL-S and EH-CPN. SEKE 2009: 350-355 - [c18]Bixin Li, Lili Yang, Shunhui Ji, Dong Qiu, Xufang Gong:
WSTester: Testing Web Service for Behavior Conformance. SEKE 2009: 456-459 - 2008
- [c17]Pengcheng Zhang, Bixin Li, Zhiyong Su, Mingjie Sun:
Extending PSC for Monitoring the Timed Properties in Composite Services. APSEC 2008: 335-342 - [c16]Pengcheng Zhang, Bixin Li, Henry Muccini, Mingjie Sun:
An Approach to Monitor Scenario-Based Temporal Properties in Web Service Compositions. APWeb Workshops 2008: 144-154 - [c15]Pengcheng Zhang, Bixin Li, Mingjie Sun, Xufang Gong:
A PSC-Based Approach to Monitor the Timed Properties in Web Service Compositions. COMPSAC 2008: 112-115 - [c14]Pengcheng Zhang, Bixin Li, Mingjie Sun:
A Timed Extension of Property Sequence Chart. HASE 2008: 197-206 - [c13]Pengcheng Zhang, Bixin Li, Henry Muccini, Yu Zhou, Mingjie Sun:
Data-Enriched Modeling and Verification of WS-CDL Based on UML Models. ICWS 2008: 752-753 - [c12]Di Wang, Bixin Li, Ju Cai:
Regression Testing of Composite Service: An XBFG-Based Approach. SERVICES II 2008: 112-119 - [c11]Bixin Li, Zhiyong Su, Ying Zhou, Xufang Gong:
A user-oriented Web service reliability model. SMC 2008: 3612-3617 - 2007
- [c10]Bixin Li, Yu Zhou, Ying Zhou, Xufang Gong:
A Formal Model for Web Service Composition and Its Application Analysis. APSCC 2007: 204-210 - [c9]Pengcheng Zhang, Yu Zhou, Bixin Li:
A service-oriented methodology supporting automatic synthesis and verification of component behavior model. SNPD (1) 2007: 511-516 - [c8]Xufang Gong, Yanchen Wang, Ying Zhou, Bixin Li:
On Testing Multi-threaded Java Programs. SNPD (1) 2007: 702-706 - 2006
- [c7]Bixin Li, Yancheng Wang, Lili Yang:
An Integrated Regression Testing Framework to Multi-Threaded Java Programs. SET 2006: 237-248 - [c6]Yancheng Wang, Bixin Li, Xufang Gong:
An Extension to Robustness Slicing Algorithm Based on Dynamic Array. SNPD 2006: 77-84 - 2005
- [j4]Bixin Li, Ying Zhou, Yancheng Wang, Junhui Mo:
Matrix-based component dependence representation and its applications in software quality assurance. ACM SIGPLAN Notices 40(11): 29-36 (2005) - [c5]Bixin Li, Ying Zhou, Junhui Mo, Yancheng Wang:
Analyzing the Conditions of Coupling Existence Based on Program Slicing and Some Abstract Information-Flow. SNPD 2005: 96-101 - [c4]Ying Zhou, Bixin Li:
A Study of Model Layers and Reflection. SNPD 2005: 110-113 - 2004
- [j3]Bixin Li, Xiaocong Fan, Jun Pang, Jianjun Zhao:
Model for Slicing JAVA Programs Hierarchically. J. Comput. Sci. Technol. 19(6): 848-858 (2004) - [c3]Yingzhou Zhang, Baowen Xu, Liang Shi, Bixin Li, Hongji Yang:
Modular Monadic Program Slicing. COMPSAC 2004: 66-71 - 2003
- [j2]Bixin Li:
A technique to analyze information-flow in object-oriented programs. Inf. Softw. Technol. 45(6): 305-314 (2003) - 2002
- [j1]Bixin Li:
Analyzing information-flow in java program based on slicing technique. ACM SIGSOFT Softw. Eng. Notes 27(5): 98-103 (2002) - [c2]Bixin Li:
An Approach for Assessing Software Coupling. APLAS 2002: 337-351
1990 – 1999
- 1999
- [c1]Yunfeng Wang, Bixin Li, Jun Pang, Ming Zha, Guoliang Zheng:
A Formal Software Development Approach Based on COOZ and Refinement Calculus. TOOLS (31) 1999: 261-266
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-22 20:14 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint