Changqin Huang

Learn More
Context: Software development effort estimation (SDEE) is the process of predicting the effort required to develop a software system. In order to improve estimation accuracy, many researchers have proposed machine learning (ML) based SDEE models (ML models) since 1990s. However, there has been no attempt to analyze the empirical evidence on ML models in a(More)
In grid environments, the dynamic and multi-institutional nature introduces challenging security issues. In this paper, we propose subtask-based authorization service (SAS) architecture to fully secure a type of application oriented to engineering and scientific computing. We minimize privileges for task by decomposing the parallel task and re-allotting the(More)
To provide personalized support in on-line course resources system, a semantic web-based personalized learning service is proposed to enhance the learner's learning efficiency. In this system four most important characteristics are semantically detailed to describe each learning object and learner. Then, a semantic mechanism is designed to compare the(More)
With the development of advanced Internet technology, business applications across multiple enterprises based on Web Services Composition (WSC) paradigm are widely used. When system failure occurs, some tasks of the flow may be committed while others unscheduled, in this situation, it is important to accurately analyze execution log of composition business(More)
Applications running on the Internet of Things, such as the Wireless Sensor and Actuator Networks (WSANs) platform, generally have different quality of service (QoS) requirements. For urgent events, it is crucial that information be reported to the actuator quickly, and the communication cost is the second factor. However, for interesting events,(More)
Fog (From cOre to edGe) computing employs a huge number of wireless embedded devices to enable end users with anywhere-anytime-to-anything connectivity. Due to their operating nature, wireless sensor nodes often work unattended, and hence are exposed to a variety of attacks. Preserving source-location privacy plays a key role in some wireless sensor network(More)