default search action
Yuhui Lin
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c24]Jia Cai, Yuhui Lin, Ruihong Ma:
Multimodal emotion recognition based on long-distance modeling and multi-source data fusion. CIPAE 2023: 497-503 - [c23]Yiwei Lu, Yuhui Lin, Xue Li, Alan Bundy, Burkhard Schäfer, Andrew Ireland:
Logic and Theory Repair in Legal Modification. COGAI@IJCLR 2023 - [c22]Yiwei Lu, Zhe Yu, Yuhui Lin, Burkhard Schafer, Andrew Ireland, Lachlan Urquhart:
A Legal System to Modify Autonomous Vehicle Designs in Transnational Contexts. JURIX 2023: 347-352 - [c21]Craig Innes, Andrew Ireland, Yuhui Lin, Subramanian Ramamoorthy:
Anticipating Accidents through Reasoned Simulation. TAS 2023: 4:1-4:11 - [i4]Craig Innes, Andrew Ireland, Yuhui Lin, Subramanian Ramamoorthy:
Anticipating Accidents through Reasoned Simulation. CoRR abs/2306.04499 (2023) - 2022
- [c20]Yuhui Lin, Hao Lin, Zhiyi Lu:
Warning of Dangerous Driving Behavior Caused by Drivers and Road Environmental Factors. CECNet 2022: 48-55 - [c19]Yiwei Lu, Zhe Yu, Yuhui Lin, Burkhard Schafer, Andrew Ireland, Lachlan Urquhart:
An Argumentation and Ontology Based Legal Support System for AI Vehicle Design. JURIX 2022: 213-218 - 2021
- [c18]Sheriffo Ceesay, Yuhui Lin, Adam Barker:
Benchmarking and Performance Modelling of Dataflow with Cycles. BDCAT 2021: 91-100 - [c17]Sheriffo Ceesay, Yuhui Lin, Adam Barker:
Adaptive brokerage framework for the cloud with functional testing. UCC Companion 2021: 14:1-14:6 - [i3]Chalee Boonprasop, Yuhui Lin, Adam Barker:
A Risk-taking Broker Model to Optimise User Requests placement on On-demand and Contract VMs. CoRR abs/2103.07133 (2021) - 2020
- [c16]Yuhui Lin, Adam Barker, John Thomson:
Modelling VM Latent Characteristics and Predicting Application Performance using Semi-supervised Non-negative Matrix Factorization. CLOUD 2020: 470-474 - [c15]Sheriffo Ceesay, Yuhui Lin, Adam Barker:
A Survey: Benchmarking and Performance Modelling of Data Intensive Applications. BDCAT 2020: 67-76 - [c14]Yuhui Lin, Adam Barker, Sheriffo Ceesay:
Exploring Characteristics of Inter-cluster Machines and Cloud Applications on Google Clusters. IEEE BigData 2020: 2785-2794 - [c13]Yuhui Lin, Jack Briggs, Adam Barker:
FIFE: an Infrastructure-as-Code Based Framework for Evaluating VM Instances from Multiple Clouds. UCC 2020: 91-100 - [c12]Qi Si, Zhipeng Cheng, Yuhui Lin, Lianfen Huang, Yuliang Tang:
Network Selection in Heterogeneous Vehicular Network: A One-to-Many Matching Approach. VTC Spring 2020: 1-5 - [i2]Sheriffo Ceesay, Adam Barker, Yuhui Lin:
Benchmarking and Performance Modelling of MapReduce Communication Pattern. CoRR abs/2005.11608 (2020)
2010 – 2019
- 2019
- [j3]Yuhui Lin, Alan Bundy, Gudmund Grov, Ewen Maclean:
Automating Event-B invariant proofs by rippling and proof patching. Formal Aspects Comput. 31(1): 95-129 (2019) - [c11]Abdessalam Elhabbash, Yehia Elkhatib, Gordon S. Blair, Yuhui Lin, Adam Barker:
A Framework for SLO-driven Cloud Specification and Brokerage. CCGRID 2019: 666-667 - [c10]Sheriffo Ceesay, Adam Barker, Yuhui Lin:
Benchmarking and Performance Modelling of MapReduce Communication Pattern. CloudCom 2019: 127-134 - [c9]Abdessalam Elhabbash, Yehia Elkhatib, Gordon S. Blair, Yuhui Lin, Adam Barker, John Thomson:
Envisioning SLO-driven Service Selection in Multi-cloud Applications. UCC Companion 2019: 9-14 - 2018
- [j2]Gudmund Grov, Yuhui Lin:
The Tinker tool for graphical tactic development. Int. J. Softw. Tools Technol. Transf. 20(2): 139-155 (2018) - [c8]Wei Chen, Yuhui Lin, Vashti Galpin, Vivek Nigam, Myungjin Lee, David Aspinall:
Formal Analysis of Sneak-Peek: A Data Centre Attack and Its Mitigations. SEC 2018: 307-322 - 2016
- [j1]Yuhui Lin, Gudmund Grov, Rob Arthan:
Understanding and maintaining tactics graphically OR how we are learning that a diagram can be worth more than 10K LoC. J. Formaliz. Reason. 9(2): 69-130 (2016) - [c7]Yibo Liang, Yuhui Lin, Gudmund Grov:
'The Tinker' for Rodin. ABZ 2016: 262-268 - [c6]Yuhui Lin, Gudmund Grov, Colin O'Halloran, Priiya G.:
A Super Industrial Application of PSGraph. ABZ 2016: 319-325 - [c5]Gudmund Grov, Yuhui Lin, Vytautas Tumas:
Mechanised Verification Patterns for Dafny. FM 2016: 326-343 - [c4]Yuhui Lin, Pierre Le Bras, Gudmund Grov:
Developing and Debugging Proof Strategies by Tinkering. TACAS 2016: 573-579 - [i1]Yuhui Lin, Gudmund Grov, Rob Arthan:
Understanding and maintaining tactics graphically OR how we learned that a diagram can be worth more than 10K LoC. CoRR abs/1610.05593 (2016) - 2014
- [c3]Gudmund Grov, Aleks Kissinger, Yuhui Lin:
Tinker, tailor, solver, proof. UITP 2014: 23-34 - 2013
- [c2]Gudmund Grov, Aleks Kissinger, Yuhui Lin:
A Graphical Language for Proof Strategies. LPAR 2013: 324-339 - 2012
- [c1]Yuhui Lin, Alan Bundy, Gudmund Grov:
The Use of Rippling to Automate Event-B Invariant Preservation Proofs. NASA Formal Methods 2012: 231-236
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:02 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint