Name
Playground
About
FAQ
GitHub
Playground
Shortest Path Finder
Community Detector
Connected Papers
Author Trending
Bingbing Zhang
Fakhri Rido Muhammad
Claudia Calabrese
Maria Concetta Palumbo
Henry Y. K. Lau
Jhonathan Pinzon
Giovanni Venturelli
Chen Ma
Radu Timofte
Kuanrui Yin
Home
/
Author
/
ZUDE LI
Author Info
Open Visualization
Name
Affiliation
Papers
ZUDE LI
University of Western Ontario, London, Ontario, Canada
22
Collaborators
Citations
PageRank
22
49
8.73
Referers
Referees
References
98
457
275
Search Limit
100
457
Publications (22 rows)
Collaborators (22 rows)
Referers (98 rows)
Referees (100 rows)
Title
Citations
PageRank
Year
Service retrieval based on hybrid SLVM of WSDL
0
0.34
2014
Lexical-semantic SLVM for XML Document Classification.
0
0.34
2014
Research and design of the firewall penetration technology serving to distributed cloud resource
0
0.34
2013
Diagnosing new faults using mutants and prior faults.
5
0.39
2011
A Case Study of Measuring Degeneration of Software Architectures from a Defect Perspective
0
0.34
2011
Characteristics of multiple-component defects and architectural hotspots: a large system case study
7
0.71
2011
A towards an extended relational algebra for software architecture
5
0.36
2010
F007: finding rediscovered faults from the field using function-level failed traces of software in the field
6
0.44
2010
Trust and Privacy in Dissemination Control
0
0.34
2009
Analysis Of Pervasive Multiple-Component Defects In A Large Software System
3
0.37
2009
Trusted resource dissemination in Internetware systems
0
0.34
2009
Does Requirements Clustering Lead to Modular Design?
1
0.35
2009
On Access-Unrestricted Data Anonymity And Privacy Inference Disclosure Control
1
0.36
2008
Privacy inference attacking and prevention on multiple relative k-anonymized microdata sets
0
0.34
2008
An Approach to Requirements Encapsulation with Clustering
7
0.51
2007
Capture inference attacks for K-anonymity with privacy inference logic
1
0.37
2007
Towards a dynamic multi-policy dissemination control model: (DMDCON)
6
0.65
2006
Towards a more reasonable generalization cost metric for k-anonymization
2
0.39
2006
Privacy preservation and protection by extending generalized partial indices
2
0.38
2006
Role-based peer-to-peer model: capture global pseudonymity for privacy protection
0
0.34
2006
Resource Management Continuity With Constraint Inheritance Relation
3
0.39
2006
FGAC-QD: fine-grained access control model based on query decomposition strategy
0
0.34
2006
1