关注
Jiuyun Xu
Jiuyun Xu
在 upc.edu.cn 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
A method based on the combination of laxity and ant colony system for cloud-fog task scheduling
J Xu, Z Hao, R Zhang, X Sun
IEEE Access 7, 116218-116226, 2019
1062019
Markov-htn planning approach to enhance flexibility of automatic web service composition
K Chen, J Xu, S Reiff-Marganiec
2009 IEEE International Conference on Web Services, 9-16, 2009
1062009
Towards heuristic web services composition using immune algorithm
J Xu, S Reiff-Marganiec
2008 IEEE international conference on web services, 238-245, 2008
662008
Using relational database to build OWL ontology from XML data sources
J Xu, W Li
2007 International Conference on Computational Intelligence and Security …, 2007
512007
A profile clustering based event logs repairing approach for process mining
J Xu, J Liu
IEEE Access 7, 17872-17881, 2019
232019
Using markov decision process model with logic scoring of preference model to optimize htn web services composition
J Xu, K Chen, S Reiff-Marganiec
International Journal of Web Services Research (IJWSR) 8 (2), 53-73, 2011
202011
Optimal offloading decision strategies and their influence analysis of mobile edge computing
J Xu, Z Hao, X Sun
Sensors 19 (14), 3231, 2019
192019
MLSA: a static bugs analysis tool based on LLVM IR
H Liang, L Wang, D Wu, J Xu
2016 17th IEEE/ACIS International Conference on Software Engineering …, 2016
172016
Web services feature interaction detection based on situation calculus
J Xu, W Yu, K Chen, S Reiff-Marganiec
2010 6th World Congress on Services, 213-220, 2010
162010
[Retracted] A Comprehensive Survey on Sharding in Blockchains
J Xi, S Zou, G Xu, Y Guo, Y Lu, J Xu, X Zhang
Mobile Information Systems 2021 (1), 5483243, 2021
152021
Fog-cloud task scheduling of energy consumption optimisation with deadline consideration
J Xu, X Sun, R Zhang, H Liang, Q Duan
International Journal of Internet Manufacturing and Services 7 (4), 375-392, 2020
152020
Survey on privacy protection of android devices
H Liang, D Wu, J Xu, H Ma
2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing …, 2015
142015
A blockchain dynamic sharding scheme based on hidden Markov model in collaborative IoT
J Xi, G Xu, S Zou, Y Lu, G Li, J Xu, R Wang
IEEE Internet of Things Journal, 2023
102023
A repairing missing activities approach with succession relation for event logs
J Liu, J Xu, R Zhang, S Reiff-Marganiec
Knowledge and Information Systems 63 (2), 477-495, 2021
102021
Modeling business process of web services with an extended strips operations to detection feature interaction problems runtime
J Xu, K Chen, Y Duan, S Reiff-Marganiec
2011 IEEE International Conference on Web Services, 516-523, 2011
102011
Semantic connection set-based massive RDF data query processing in Spark environment
J Xu, C Zhang
EURASIP Journal on Wireless Communications and Networking 2019 (1), 256, 2019
72019
IFTS: A location privacy protection method based on initial and final trajectory segments
J Xu, L Liu, R Zhang, J Xie, Q Duan, L Shi
IEEE Access 9, 18112-18122, 2021
62021
Local reputation management in cloud computing
J Xu, D Jiang, B Wang, D Yang, S Reiff-Marganiec
2015 IEEE World Congress on Services, 261-267, 2015
62015
A temporal adaptive access mechanism for data fusion in an IoT environment
J Xu, S Liu, X Lu, L Li, H Liang, Q Duan, R Liu
Sensors 18 (12), 4205, 2018
42018
Optimized composite service transactions through execution results prediction
J Xu, Z Li, H Chi, M Wang, C Guan, S Reiff-Marganiec, H Shen
2016 IEEE International Conference on Web Services (ICWS), 690-693, 2016
42016
系统目前无法执行此操作,请稍后再试。
文章 1–20