Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    RL-Based CEP Operator Placement Method on Edge Networks Using Response Time Feedback

    The placement of operators in Complex Event Processing (CEP) services, handling real-time data with DAGs, faces challenges due to the NP-hard nature and edge environment complexity. Prior research by Cai et al...

    Yuyou Wang, Hao Hu, Hongyu Kuang, Chenyou Fan in Web Information Systems and Applications (2023)

  2. No Access

    Article

    Propagating frugal user feedback through closeness of code dependencies to improve IR-based traceability recovery

    Traceability recovery captures trace links among different software artifacts (e.g., requirements and code) when two artifacts cover the same part of system functionalities. These trace links provide important...

    Hui Gao, Hongyu Kuang, **aoxing Ma, Hao Hu, Jian Lü in Empirical Software Engineering (2022)

  3. No Access

    Chapter and Conference Paper

    Automated Reliability Analysis of Redundancy Architectures Using Statistical Model Checking

    Reliability is a fundamental property for mission and safety-critical systems, and adopting redundancy architectures is a common and prominent practice to increase system reliability. This paper proposes a nov...

    Hongbin He, Hongyu Kuang, Lin Yang in Knowledge Science, Engineering and Managem… (2022)

  4. No Access

    Article

    Automated detection on the security of the linked-list operations

    Hongyu Kuang, Jian Wang, Ruilin Li, Chao Feng, YunFei Su in Frontiers of Computer Science (2021)

  5. Chapter and Conference Paper

    Response Time Aware Operator Placement for Complex Event Processing in Edge Computing

    A typical complex event processing (CEP) service is composed by a set of operators organized as a directed acyclic graph. This kind of service is usually used to handle large amounts of real-time data. Meanwhi...

    **nchen Cai, Hongyu Kuang, Hao Hu, Wei Song, Jian Lü in Service-Oriented Computing (2018)

  6. No Access

    Chapter and Conference Paper

    Improving Automatic Identification of Outdated Requirements by Using Closeness Analysis Based on Source Code Changes

    Updating requirements specification when software systems evolve is vital to keep requirements away from being obsolete and useless. However, this is a manual task that is labor-intensive. Consequently, develo...

    Hongyu Kuang, Jia Nie, Hao Hu, Jian Lü in Software Engineering and Methodology for E… (2016)