default search action
Mingxue Wang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c26]Andrea Tonon, Bora Caglayan, MingXue Wang, Peng Hu, Fei Shen, Puchao Zhang:
Shrec: a Sre Behaviour Knowledge Graph Model for Shell Command Recommendations. SANER 2024: 406-416 - [i3]Andrea Tonon, Bora Caglayan, MingXue Wang, Peng Hu, Fei Shen, Puchao Zhang:
SHREC: a SRE Behaviour Knowledge Graph Model for Shell Command Recommendations. CoRR abs/2408.05592 (2024) - [i2]Bora Caglayan, Ming Xue Wang, John D. Kelleher, Shen Fei, Gui Tong, Jiandong Ding, Puchao Zhang:
BIS: NL2SQL Service Evaluation Benchmark for Business Intelligence Scenarios. CoRR abs/2410.22925 (2024) - 2022
- [c25]Sabyasachi Kamila, Walid Magdy, Sourav Dutta, MingXue Wang:
AX-MABSA: A Framework for Extremely Weakly Supervised Multi-label Aspect Based Sentiment Analysis. EMNLP 2022: 6136-6147 - [c24]Jiqiang Lu, Mingxue Wang, Can Wang, Chen Yang:
Collision-Based Attacks on White-Box Implementations of the AES Block Cipher. SAC 2022: 328-352 - [i1]Sabyasachi Kamila, Walid Magdy, Sourav Dutta, MingXue Wang:
AX-MABSA: A Framework for Extremely Weakly Supervised Multi-label Aspect Based Sentiment Analysis. CoRR abs/2211.03837 (2022) - 2021
- [c23]Óscar Corcho, David Chaves-Fraga, Jhon Toledo, Julián Arenas-Guerrero, Carlos Badenes-Olmedo, Mingxue Wang, Hu Peng, Nicholas Burrett, Jose Mora, Puchao Zhang:
A High-Level Ontology Network for ICT Infrastructures. ISWC 2021: 446-462
2010 – 2019
- 2019
- [c22]Erik Aumayr, MingXue Wang, Anne-Marie Bosneag:
Probabilistic Knowledge-Graph based Workflow Recommender for Network Management Automation. WOWMOM 2019: 1-7 - 2018
- [j4]MingXue Wang, Sidath Handurukande:
An Anomaly Detection Analytic Engine for Mobile Network Management Streaming Data. Int. J. Next Gener. Comput. 9(2) (2018) - [c21]MingXue Wang, Vincent Huang, Anne-Marie Cristina Bosneag:
A Novel Split-Merge-Evolve k Clustering Algorithm. BigDataService 2018: 229-236 - 2017
- [c20]Anne-Marie Bosneag, MingXue Wang:
Intelligent network management mechanisms as a step towards SG. NOF 2017: 52-57 - 2016
- [j3]MingXue Wang, Kosala Yapa Bandara, Claus Pahl:
A distributed architecture for policy-customisable multi-tenant processes-as-a-service. Int. J. Parallel Emergent Distributed Syst. 31(4): 377-404 (2016) - [c19]Anne-Marie Bosneag, Sidath Handurukande, MingXue Wang:
Fighting Fire with Fire - Strategies for Managing the Complexity of Future Networks Management. ICIN 2016 - [c18]Anne-Marie Bosneag, Sidath Handurukande, James O'Sullivan, MingXue Wang:
Real-world experiences with CQI-based analyses for dense LTE networks. NOMS 2016: 943-948 - [c17]MingXue Wang, Sidath Handurukande:
A Streaming Data Anomaly Detection Analytic Engine for Mobile Network Management. UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld 2016: 722-729 - 2015
- [j2]Kosala Yapa Bandara, MingXue Wang, Claus Pahl:
An extended ontology-based context model and manipulation calculus for dynamic Web service processes. Serv. Oriented Comput. Appl. 9(2): 87-106 (2015) - [c16]MingXue Wang, Robin Grindrod, Jimmy O'Meara, Mikel Zuzuarregui, Eloy Martinez, Enda Fallon:
Enterprise Search with Development for Network Management System. BigData Congress 2015: 430-437 - [c15]Eloy Martinez, Enda Fallon, Sheila Fallon, MingXue Wang:
ADAMANT - An Anomaly Detection Algorithm for MAintenance and Network Troubleshooting. IM 2015: 1292-1297 - [c14]Eloy Martinez, Enda Fallon, Sheila Fallon, MingXue Wang:
CADMANT: Context Anomaly Detection for MAintenance and Network Troubleshooting. IWCMC 2015: 1017-1022 - [c13]Mikel Zuzuarregui, Enda Fallon, MingXue Wang, John Keeney, Paul Jacob:
PRISENIT - A Probabilistic Search Recommendation Algorithm to Improve Search Efficiency for Network Intelligence and Troubleshooting. UKSim 2015: 355-360 - 2013
- [c12]Ming-Xue Wang, Lei Xu, Claus Pahl:
A Coordination Protocol for User-customisable Cloud Policy Monitoring. CLOSER 2013: 337-344 - [c11]Claus Pahl, Neel Mani, Ming-Xue Wang:
A Domain-Specific Model for Data Quality Constraints in Service Process Adaptations. ESOCC Workshops 2013: 303-317 - 2012
- [c10]MingXue Wang, Sidath B. Handurukande, Mohamed Nassar:
RPig: A scalable framework for machine learning and advanced statistical functionalities. CloudCom 2012: 293-300 - [c9]Ming-Xue Wang, Claus Pahl:
User-Customisable Policy Monitoring for Multi-tenant Cloud Architectures. ESOCC 2012: 212-213 - 2011
- [j1]Claus Pahl, Veronica Gacitua-Decar, MingXue Wang, Kosala Yapa Bandara:
Ontology-based composition and matching for dynamic cloud service coordination. Int. J. Metadata Semant. Ontologies 6(3/4): 195-206 (2011) - [c8]Claus Pahl, Veronica Gacitua-Decar, MingXue Wang, Kosala Yapa Bandara:
A Coordination Space Architecture for Service Collaboration and Cooperation. CAiSE Workshops 2011: 366-377 - [c7]Claus Pahl, Veronica Gacitua-Decar, MingXue Wang, Kosala Yapa Bandara:
Ontology-Based Composition and Matching for Dynamic Service Coordination. CAiSE Workshops 2011: 464-477 - 2010
- [c6]MingXue Wang, Kosala Yapa Bandara, Claus Pahl:
Process as a Service. IEEE SCC 2010: 578-585 - [c5]Jose John, MingXue Wang, Claus Pahl:
Dynamic Architectural Constraints Monitoring and Reconfiguration in Service Architectures. ECSA 2010: 311-318
2000 – 2009
- 2009
- [c4]MingXue Wang, Kosala Yapa Bandara, Claus Pahl:
Integrated Constraint Violation Handling for Dynamic Service Composition. IEEE SCC 2009: 168-175 - [c3]MingXue Wang, Kosala Yapa Bandara, Claus Pahl:
Constraint Integration and Violation Handling for BPEL Processes. ICIW 2009: 337-342 - [c2]Kosala Yapa Bandara, MingXue Wang, Claus Pahl:
Context modeling and constraints binding in web service business processes. CASTA@ESEC/SIGSOFT FSE 2009: 29-32 - 2008
- [c1]Colm Moore, Ming Xue Wang, Claus Pahl:
An Architecture for Autonomic Web Service Process Planning. WEWST@ECOWS 2008: 117-130
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-01 00:17 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint