default search action
Shi Ying
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j57]Rui Wang, Gang Tian, Shi Ying:
MicroCM: A cloud monitoring architecture for microservice invocation. Comput. Networks 238: 110121 (2024) - [j56]Jian Zhu, Qian Li, Shi Ying, Zhihua Zheng:
Research on Parallel Task Scheduling Algorithm of SaaS Platform Based on Dynamic Adaptive Particle Swarm Optimization in Cloud Service Environment. Int. J. Comput. Intell. Syst. 17(1): 260 (2024) - [j55]Hailong Cheng, Shi Ying, Xiaoyu Duan, Wanli Yuan:
DLLog: An Online Log Parsing Approach for Large-Scale System. Int. J. Intell. Syst. 2024: 1-17 (2024) - [j54]Tiangang Li, Shi Ying, Yishi Zhao, Jianga Shang:
Batch Jobs Load Balancing Scheduling in Cloud Computing Using Distributional Reinforcement Learning. IEEE Trans. Parallel Distributed Syst. 35(1): 169-185 (2024) - [j53]Xiangbo Tian, Shi Ying, Tiangang Li, Mengting Yuan, Ruijin Wang, Yishi Zhao, Jianga Shang:
iTCRL: Causal-Intervention-Based Trace Contrastive Representation Learning for Microservice Systems. IEEE Trans. Software Eng. 50(10): 2583-2601 (2024) - [j52]Ziheng Li, Yongjiao Sun, Xin Bi, Ruijin Wang, Shi Ying, Hangxu Ji:
Multi-temporal heterogeneous graph learning with pattern-aware attention for industrial chain risk detection. World Wide Web (WWW) 27(4): 38 (2024) - 2023
- [j51]Wanli Yuan, Shi Ying, Xiaoyu Duan, Hailong Cheng, Yishi Zhao, Jianga Shang:
PVE: A log parsing method based on VAE using embedding vectors. Inf. Process. Manag. 60(5): 103476 (2023) - [j50]Haitao Wu, Shi Ying:
Finding Similar Users over Multiple Attributes on the Basis of Intuitionistic Fuzzy Set. Mob. Networks Appl. 28(4): 1362-1370 (2023) - [c36]Zhanting Zhou, Kejun Bi, Yuyanzhen Zhong, Chao Tang, Dongfen Li, Shi Ying, Ruijin Wang:
HKTGNN: Hierarchical Knowledge Transferable Graph Neural Network-based Supply Chain Risk Assessment. ISPA/BDCloud/SocialCom/SustainCom 2023: 772-782 - [c35]Patigül Abliz, Shi Ying:
Bias Reduced Methods to Q-learning. ICONIP (8) 2023: 378-395 - [i2]Zhanting Zhou, Kejun Bi, Yuyanzhen Zhong, Chao Tang, Dongfen Li, Shi Ying, Ruijin Wang:
HKTGNN: Hierarchical Knowledge Transferable Graph Neural Network-based Supply Chain Risk Assessment. CoRR abs/2311.04244 (2023) - 2022
- [j49]Jian Zhu, Qian Li, Shi Ying:
SAAS parallel task scheduling based on cloud service flow load algorithm. Comput. Commun. 182: 170-183 (2022) - [j48]Wei Li, Qingan Li, Yunlong Ming, Weijiao Dai, Shi Ying, Mengting Yuan:
An empirical study of the effectiveness of IR-based bug localization for large-scale industrial projects. Empir. Softw. Eng. 27(2): 47 (2022) - [j47]Nana Zhang, Shi Ying, Kun Zhu, Dandan Zhu:
Software defect prediction based on stacked sparse denoising autoencoders and enhanced extreme learning machine. IET Softw. 16(1): 29-47 (2022) - [j46]Kun Zhu, Shi Ying, Weiping Ding, Nana Zhang, Dandan Zhu:
IVKMP: A robust data-driven heterogeneous defect model based on deep representation optimization learning. Inf. Sci. 583: 332-363 (2022) - [j45]Patigül Abliz, Shi Ying:
Underestimation estimators to Q-learning. Inf. Sci. 607: 173-185 (2022) - 2021
- [j44]Jian Zhu, Qian Li, Shi Ying:
Failure Analysis of Static Analysis Software Module Based on Big Data Tendency Prediction. Complex. 2021: 6660830:1-6660830:12 (2021) - [j43]Xiaoyu Duan, Shi Ying, Wanli Yuan, Hailong Cheng, Xiang Yin:
A Generative Adversarial Networks for Log Anomaly Detection. Comput. Syst. Sci. Eng. 37(1): 135-148 (2021) - [j42]Xiaoyu Duan, Shi Ying, Wanli Yuan, Hailong Cheng, Xiang Yin:
QLLog: A log anomaly detection method based on Q-learning algorithm. Inf. Process. Manag. 58(3): 102540 (2021) - [j41]Xiaoyu Duan, Shi Ying, Hailong Cheng, Wanli Yuan, Xiang Yin:
OILog: An online incremental log keyword extraction approach based on MDP-LSTM neural network. Inf. Syst. 95: 101618 (2021) - [j40]Nana Zhang, Shi Ying, Weiping Ding, Kun Zhu, Dandan Zhu:
WGNCS: A robust hybrid cross-version defect model via multi-objective optimization and deep enhanced feature representation. Inf. Sci. 570: 545-576 (2021) - [j39]Guoli Cheng, Shi Ying, Bingming Wang, Yuhang Li:
Efficient Performance Prediction for Apache Spark. J. Parallel Distributed Comput. 149: 40-51 (2021) - [j38]Kun Zhu, Shi Ying, Nana Zhang, Dandan Zhu:
Software defect prediction based on enhanced metaheuristic feature selection optimization and a hybrid deep neural network. J. Syst. Softw. 180: 111026 (2021) - [j37]Guoli Cheng, Shi Ying, Bingming Wang:
Tuning configuration of apache spark on public clouds by combining multi-objective optimization and performance prediction model. J. Syst. Softw. 180: 111028 (2021) - [j36]Zhe Yang, Shi Ying, Bingming Wang, Yiyao Li, Bo Dong, Jiangyi Geng, Ting Zhang:
A System Fault Diagnosis Method with a Reclustering Algorithm. Sci. Program. 2021: 6617882:1-6617882:8 (2021) - [j35]Bo Dong, Shi Ying, Bingming Wang, Guoli Cheng, Jiangyi Geng:
Analysing the Impact of Scaling Out SaaS Software on Response Time. Sci. Program. 2021: 6629867:1-6629867:11 (2021) - [j34]Shi Ying, Bingming Wang, Lu Wang, Qingshan Li, Yishi Zhao, Jianga Shang, Hao Huang, Guoli Cheng, Zhe Yang, Jiangyi Geng:
An Improved KNN-Based Efficient Log Anomaly Detection Method with Automatically Labeled Samples. ACM Trans. Knowl. Discov. Data 15(3): 34:1-34:22 (2021) - [c34]Ting Gan, Keqi Han, Hao Huang, Shi Ying, Yunjun Gao, Zongpeng Li:
Diffusion Network Inference from Partial Observations. AAAI 2021: 7493-7500 - 2020
- [j33]Rui Wang, Shi Ying:
SaaS software performance issue diagnosis using independent component analysis and restricted Boltzmann machine. Concurr. Comput. Pract. Exp. 32(14) (2020) - [j32]Kun Zhu, Nana Zhang, Shi Ying, Dandan Zhu:
Within-project and cross-project just-in-time defect prediction based on denoising autoencoder and convolutional neural network. IET Softw. 14(3): 185-195 (2020) - [j31]Bingming Wang, Shi Ying, Guoli Cheng, Rui Wang, Zhe Yang, Bo Dong:
Log-Based Anomaly Detection with the Improved K-Nearest Neighbor. Int. J. Softw. Eng. Knowl. Eng. 30(2): 239-262 (2020) - [j30]Bo Dong, Shi Ying, Lin Li, Hui Luo, Zhe Yang:
Impact Analysis About Response Time Considering Deployment Change of SaaS Software. Int. J. Softw. Eng. Knowl. Eng. 30(7): 977-1004 (2020) - [j29]Ting Zhang, Shi Ying, Jiangyi Geng:
Database resource integration of shared cloud platform based on RAC architecture. Neural Comput. Appl. 32(1): 127-138 (2020) - [j28]Bingming Wang, Shi Ying, Zhe Yang:
A Log-Based Anomaly Detection Method with Efficient Neighbor Searching and Automatic K Neighbor Selection. Sci. Program. 2020: 4365356:1-4365356:17 (2020) - [j27]Rui Wang, Shi Ying, Meiyan Li, Shun Jia:
HSACMA: a hierarchical scalable adaptive cloud monitoring architecture. Softw. Qual. J. 28(3): 1379-1410 (2020) - [c33]Bingming Wang, Shi Ying, Guoli Cheng, Yiyao Li:
A log-based anomaly detection method with the NW ensemble rules. QRS 2020: 72-82 - [c32]Yun Qian, Shi Ying, Bingming Wang:
Anomaly Detection in Distributed Systems via Variational Autoencoders. SMC 2020: 2822-2829
2010 – 2019
- 2019
- [j26]Zhiqiang Li, Xiao-Yuan Jing, Xiaoke Zhu, Hongyu Zhang, Baowen Xu, Shi Ying:
Heterogeneous defect prediction with two-stage ensemble learning. Autom. Softw. Eng. 26(3): 599-651 (2019) - [j25]Rui Wang, Shi Ying, Xiangyang Jia:
Log Data Modeling and Acquisition in Supporting SaaS Software Performance Issue Diagnosis. Int. J. Softw. Eng. Knowl. Eng. 29(9): 1245-1277 (2019) - [j24]Zhiqiang Li, Xiao-Yuan Jing, Xiaoke Zhu, Hongyu Zhang, Baowen Xu, Shi Ying:
On the Multiple Sources and Privacy Preservation Issues for Heterogeneous Defect Prediction. IEEE Trans. Software Eng. 45(4): 391-411 (2019) - 2018
- [j23]Jiangyi Geng, Shi Ying, Xiangyang Jia, Ting Zhang, Xuan Liu, Lanqing Guo, Jifeng Xuan:
Supporting Many-Objective Software Requirements Decision: An Exploratory Study on the Next Release Problem. IEEE Access 6: 60547-60558 (2018) - [j22]Zhiqiang Li, Xiao-Yuan Jing, Fei Wu, Xiaoke Zhu, Baowen Xu, Shi Ying:
Cost-sensitive transfer kernel canonical correlation analysis for heterogeneous defect prediction. Autom. Softw. Eng. 25(2): 201-245 (2018) - [j21]Rui Wang, Shi Ying:
SaaS software performance issue identification using HMRF-MAP framework. Softw. Pract. Exp. 48(11): 2000-2018 (2018) - [j20]Rui Wang, Shi Ying:
Cover Image Volume 48, Issue 11. Softw. Pract. Exp. 48(11): i (2018) - [c31]Yuhang Li, Shi Ying, Xiangyang Jia, Yisen Xu, Lily Zhao, Guoli Cheng, Bingming Wang, Jifeng Xuan:
EH-Recommender: Recommending Exception Handling Strategies Based on Program Context. ICECCS 2018: 104-114 - 2017
- [j19]Tong Xue, Shi Ying, Qing Wu, Xiangyang Jia, Xiaohui Hu, Xiaoying Zhai, Tao Zhang:
Verifying integrity of exception handling in service-oriented software. Int. J. Grid Util. Comput. 8(1): 7-21 (2017) - [j18]Fumin Qi, Xiao-Yuan Jing, Xiaoke Zhu, Xiaoyuan Xie, Baowen Xu, Shi Ying:
Software effort estimation based on open source projects: Case study of Github. Inf. Softw. Technol. 92: 145-157 (2017) - [j17]Lin Chen, Shi Ying, Xiangyang Jia:
SHMA: 一种云平台的监控框架 (SHMA: Monitoring Architecture for Clouds). 计算机科学 44(1): 7-12 (2017) - [c30]Fei Wu, Xiao-Yuan Jing, Xiwei Dong, Jicheng Cao, Mingwei Xu, Hongyu Zhang, Shi Ying, Baowen Xu:
Cross-project and within-project semi-supervised software defect prediction problems study using a unified solution. ICSE (Companion Volume) 2017: 195-197 - [c29]Rui Wang, Shi Ying, Chengai Sun, Hongyan Wan, Huo-lin Zhang, Xiangyang Jia:
Model Construction and Data Management of Running Log in Supporting SaaS Software Performance Analysis. SEKE 2017: 149-154 - 2016
- [j16]Gaoshan Zheng, Shi Ying, Rui Wu:
基于语义技术的软件用户访问控制方法 (Semantic-based Access Control Approach for Software User). 计算机科学 43(8): 131-136 (2016) - [c28]Hao Huang, Song Wang, Shuangke Wu, Yunjun Gao, Wei Lu, Qinming He, Shi Ying:
Mining Arbitrary Shaped Clusters and Outputting a High Quality Dendrogram. DEXA (1) 2016: 153-168 - [c27]Fei Wu, Xiao-Yuan Jing, Xiwei Dong, Jicheng Cao, Baowen Xu, Shi Ying:
Cost-Sensitive Local Collaborative Representation for Software Defect Prediction. SATE 2016: 102-107 - [c26]Zhenni You, Tieyun Qian, Baochao Zhang, Shi Ying:
Identifying Implicit Enterprise Users from the Imbalanced Social Data. WISE (2) 2016: 94-101 - 2015
- [j15]Chu Du, ZhangBing Zhou, Shi Ying, Jianwei Niu, Qun Wang:
An efficient indexing and query mechanism for ubiquitous IoT services. Int. J. Ad Hoc Ubiquitous Comput. 18(4): 245-255 (2015) - [j14]Quanyu Wang, Guobin Lv, Shi Ying, Feng Zhou:
一种策略驱动的BPEL流程异常处理框架 (Policy Driven Exception Handling Framework for BPEL Processes). 计算机科学 42(1): 180-186 (2015) - [j13]Haitao Wu, Shi Ying:
基于信息内容和拓扑关系的社会媒体用户兴趣分类 (Classifying Interests of Social Media Users Based on Information Content and Social Graph). 计算机科学 42(4): 185-189 (2015) - [j12]Caoqing Jiang, Fangxiong Xiao, Rong Gao, Shi Ying, Jing Wen:
基于抽象解释的服务间消息的数据约减 (Data Reduction Analysis for Message between Services Based on Abstract Interpretation). 计算机科学 42(12): 175-180 (2015) - [c25]Lin Li, Shi Ying, Bo Dong, Tong Xue:
A Multi-objective Ant Colony Algorithm for Deployment Optimization of Internetware Application. Internetware 2015: 186-194 - [c24]Xiangyang Jia, Carlo Ghezzi, Shi Ying:
Enhancing reuse of constraint solutions to improve symbolic execution. ISSTA 2015: 177-187 - [i1]Xiangyang Jia, Carlo Ghezzi, Shi Ying:
Enhancing Reuse of Constraint Solutions to Improve Symbolic Execution. CoRR abs/1501.07174 (2015) - 2014
- [j11]Hua Guan, Shi Ying, Chunwei Wang:
A Correctness Verification Approach of the BPEL Exception Handling CPN Model Based on Temporal Property. J. Networks 9(10): 2743-2750 (2014) - [c23]Xiao-Yuan Jing, Shi Ying, Zhi-Wu Zhang, Shanshan Wu, Jin Liu:
Dictionary learning based software defect prediction. ICSE 2014: 414-423 - [c22]Xiao-Yuan Jing, Zhi-Wu Zhang, Shi Ying, Feng Wang, Yang-Ping Zhu:
Software defect prediction based on collaborative representation classification. ICSE Companion 2014: 632-633 - 2013
- [j10]Yao Chen, Shi Ying, Liqiang Zhang, Juebo Wu:
Exception Detection for Web Service Composition Using Improved Bayesian Network. J. Digit. Inf. Manag. 11(2): 108-114 (2013) - [j9]Haitao Wu, Shi Ying, Xiangyang Jia, Liqiang Zhang, Xu Chen:
Robustness Analysis of Social Network based on a Dynamic Model. J. Digit. Inf. Manag. 11(6): 453-461 (2013) - [j8]Zhen You, Jinyun Xue, Shi Ying, Dongming Jiang, Qimin Hu:
Formalization of Distributed and Dynamic Resources Allocation Using Category Theory. J. Softw. 8(12): 3088-3095 (2013) - [j7]An Liu, Qing Li, Liusheng Huang, Shi Ying, Mingjun Xiao:
Coalitional Game for Community-Based Autonomous Web Services Cooperation. IEEE Trans. Serv. Comput. 6(3): 387-399 (2013) - [c21]Tong Xue, Shi Ying, Qing Wu:
Exception Handling in Service-Oriented Software: A Survey. GreenCom/iThings/CPScom 2013: 2048-2052 - 2012
- [j6]Kai Zhao, Linlin Zhang, Shi Ying:
Ontology-Based Exception Handling for Semantic Business Process Execution. J. Softw. 7(8): 1791-1798 (2012) - [c20]Yi Zheng, Shi Ying, Yibing Wang:
Event Recognition Based on Co-occurrence Concept Analysis. CLSW 2012: 102-109 - [c19]Quanyu Wang, Guobin Lv, Shi Ying, Jing Wen:
A policy-driven exception handling approach for service-oriented processes. CSCWD 2012: 449-455 - [c18]Shi Ying:
Research on Semantic Programming Language. Intelligent Information Processing 2012: 15 - 2011
- [j5]Pei He, Lishan Kang, Colin G. Johnson, Shi Ying:
Hoare logic-based genetic programming. Sci. China Inf. Sci. 54(3): 623-637 (2011) - [j4]Qinbao Song, Zihan Jia, Martin J. Shepperd, Shi Ying, Jin Liu:
A General Software Defect-Proneness Prediction Framework. IEEE Trans. Software Eng. 37(3): 356-370 (2011) - 2010
- [c17]Zhen You, Jinyun Xue, Shi Ying:
Categorial Semantics of a Solution to Distributed Dining Philosophers Problem. FAW 2010: 172-184 - [e1]Der-Tsai Lee, Danny Z. Chen, Shi Ying:
Frontiers in Algorithmics, 4th International Workshop, FAW 2010, Wuhan, China, August 11-13, 2010. Proceedings. Lecture Notes in Computer Science 6213, Springer 2010, ISBN 978-3-642-14552-0 [contents]
2000 – 2009
- 2009
- [j3]Yingxu Wang, Cyprian F. Ngolah, Hadi Ahmadi, Phillip C.-Y. Sheu, Shi Ying:
The Formal Design Model of a Lift Dispatching System (LDS). Int. J. Softw. Sci. Comput. Intell. 1(4): 111-137 (2009) - [c16]Luokai Hu, Shi Ying, Xiangyang Jia, Kai Zhao:
Towards an Approach of Semantic Access Control for Cloud Computing. CloudCom 2009: 145-156 - [c15]Xiangyang Jia, Shi Ying, Luokai Hu, Chunlin Chen:
Scheduling Active Services in Clustered JBI Environment. CloudCom 2009: 413-422 - [c14]Wen-jie Yuan, Shi Ying:
A Reflective Requirements Specification for Requirements Evolving. WGEC 2009: 23-26 - 2008
- [j2]Tao Zhang, Shi Ying, Sheng Cao, Jiankeng Zhang:
A modelling approach to service-oriented architecture. Enterp. Inf. Syst. 2(3): 239-257 (2008) - [c13]Youcong Ni, Shi Ying, Jing Wen, Linlin Zhang, Peng Ye, Jiajing Zhang:
Study on Weaving Process at Software Architectural level. APSCC 2008: 1574-1577 - [c12]Linlin Zhang, Shi Ying, You-Cong Ni, Jing Wen, Kai Zhao, Ye Peng:
Towards Multi-Dimensional Separating of NFRs in Software Architecture. CSSE (2) 2008: 104-107 - [c11]Yao Jun-feng, Shi Ying, Wen-jie Yuan, Ye Peng, Luo Ju-bo, Jia Xiang-Yang:
A Framework of Reflective Mechanism for Supporting OWL-S Requirements Specifications Evolution. CSSE (2) 2008: 288-291 - [c10]Jing Wen, Shi Ying, You-Cong Ni, Linlin Zhang:
Architectural Design of the Online Auction System with AOSAD. ICEBE 2008: 5-12 - 2007
- [c9]Xiangyang Jia, Shi Ying, Tao Zhang, Honghua Cao, Dan Xie:
A New Architecture Description Language for Service-Oriented Architec. GCC 2007: 96-103 - [c8]Xiaojian Li, Shi Ying, Ying Zheng, Dan Xie:
Applying Architectural Reflection on Dependable Software. IMECS 2007: 1138-1141 - 2006
- [c7]Honghua Cao, Shi Ying, Dehui Du:
Towards Model-based Verification of BPEL with Model Checking. CIT 2006: 190 - [c6]ZaoQing Liang, Shi Ying, Rongzeng Cao, Xiangyang Jia, Tao Zhang:
Reuse Software Architecture through Dynamic Composition. CONFENIS 2006: 297-305 - [c5]Tao Zhang, Shi Ying, Sheng Cao, Xiangyang Jia:
A Modeling Framework for Service-Oriented Architecture. QSIC 2006: 219-226 - [c4]Shi Ying, ZaoQing Liang, JunLi Wang, FuDi Wang:
A Reflection Mechanism for Reusing Software Architecture. QSIC 2006: 235-243 - 2004
- [c3]Hao Chen, Shi Ying, Jin Liu, Wei Wang:
SE4SC: A Specific Search Engine for Software Components. CIT 2004: 863-868 - [c2]Dehui Du, Shi Ying, Keqing He, Yangfan He:
An Approach for Constructing Software Component Repository in Grid Environments. GCC Workshops 2004: 75-82 - 2003
- [c1]Chao Liu, Keqing He, Jie Liu, Shi Ying:
Some Domain Patterns in Web Application Framework. COMPSAC 2003: 674-677
1990 – 1999
- 1999
- [j1]Guoqing Wu, Xiang Liu, Shi Ying, Tetsuo Tamai:
Automated analysis of the SCR-style requirements specifications. J. Comput. Sci. Technol. 14(4): 401-407 (1999)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-11 22:24 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint