default search action
Luxi Chen
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i1]Luxi Chen, Zhengyi Wang, Chongxuan Li, Tingting Gao, Hang Su, Jun Zhu:
MicroDreamer: Zero-shot 3D Generation in ~20 Seconds by Score-based Iterative Reconstruction. CoRR abs/2404.19525 (2024)
2010 – 2019
- 2017
- [j9]Luxi Chen, Linpeng Huang, Chen Li, Xiwen Wu:
Incorporating architectural modelling with state-based reliability evaluation. Int. J. Ad Hoc Ubiquitous Comput. 26(3): 167-184 (2017) - [j8]Luxi Chen, Linpeng Huang, Chen Li, Xiwen Wu:
Self-adaptive architecture evolution with model checking: A software cybernetics approach. J. Syst. Softw. 124: 228-246 (2017) - 2015
- [j7]Jean-Pierre Aubin, Luxi Chen, Anya Désilles:
Cournot Maps for Intercepting Evader Evolutions by a Pursuer. Dyn. Games Appl. 5(3): 275-296 (2015) - [j6]Luxi Chen, Linpeng Huang, Chen Li, Tao Zan:
Integrating behavior analysis into architectural modeling. Frontiers Comput. Sci. 9(1): 15-33 (2015) - [j5]Chen Li, Linpeng Huang, Luxi Chen:
Breeze graph grammar: a graph grammar approach for modeling the software architecture of big data-oriented software systems. Softw. Pract. Exp. 45(8): 1023-1050 (2015) - [c15]Xiwen Wu, Linpeng Huang, Chen Li, Luxi Chen:
Estimating Software System Reliability: An Architecture-Based Approach. IMIS 2015: 184-191 - [c14]Luxi Chen, Linpeng Huang, Hao Zhong, Chen Li, Xiwen Wu:
Breeze: A modeling tool for designing, analyzing, and improving software architecture. RE 2015: 284-285 - 2014
- [j4]Jean-Pierre Aubin, Luxi Chen, Olivier Dordan:
Retrospective-Prospective Differential Inclusions and Their Control by the Differential Connection Tensors of Their Evolutions: The Trendometer. Complex Syst. 23(2) (2014) - [c13]Luxi Chen, Ni Yan, Miranda Kiang, Anna S. Muth, Kruthi Sabnis Krishna:
Innomotion: a web-based rehabilitation system helping patients recover and gain self-awareness of their body away from the clinic. CHI Extended Abstracts 2014: 233-238 - [c12]Luxi Chen, Linpeng Huang, Chen Li, Linzhu Wu, Weichao Luo:
Design and Safety Analysis for System Architecture: A Breeze/ADL-Based Approach. COMPSAC 2014: 261-266 - [c11]Luxi Chen, Linpeng Huang, Chen Li, Mengyao Ruan:
Architecture Reconfiguration in Pervasive Environment: An AADL-based Approach. IMIS 2014: 23-30 - [c10]Xiaoyu Fu, Linpeng Huang, Guannan Su, Luxi Chen, Chen Li, Linzhu Wu:
Using entropy weight-based TOPSIS to implement failure mode and effects analysis. Internetware 2014: 89-96 - [c9]Chen Li, Linpeng Huang, Luxi Chen, Xiwen Wu:
An Approach to Modelling and Evaluating AGG Based Reliable Software Systems. TASE 2014: 122-125 - 2013
- [j3]Jean-Pierre Aubin, Luxi Chen, Marie-Hélène Durand:
Dynamic decentralization of harvesting constraints in the management of tychastic evolution of renewable resources. Comput. Manag. Sci. 10(4): 281-298 (2013) - [j2]Chen Li, Linpeng Huang, Luxi Chen, Weichao Luo:
Deadlock detection and recovery for component-based systems. Math. Comput. Model. 58(5-6): 1362-1378 (2013) - [c8]Chen Li, Linpeng Huang, Luxi Chen, Chengyuan Yu:
Breeze/ADL: Graph Grammar Support for an XML-Based Software Architecture Description Language. COMPSAC 2013: 800-805 - [c7]Chen Li, Linpeng Huang, Luxi Chen, Chengyuan Yu:
BGG: A Graph Grammar Approach for Software Architecture Verification and Reconfiguration. IMIS 2013: 291-298 - [c6]Luxi Chen, Linpeng Huang, Chen Li, Tao Zan:
A Bidirectional Framework for Model Synchronization in Component-Based Software Development. QSIC 2013: 313-319 - 2012
- [j1]Jean-Pierre Aubin, Luxi Chen, Olivier Dordan, Patrick Saint-Pierre:
Viabilist and tychastic approaches to guaranteed ALM problem. Risk Decis. Anal. 3(1-2): 89-113 (2012) - [c5]Luxi Chen, Linpeng Huang, Chen Li, Weichao Luo:
Software Architecture Matching by Meta-model Extension and Refinement. APSEC 2012: 422-427 - [c4]Chen Li, Linpeng Huang, Luxi Chen, Weichao Luo, Xu Li:
PBDDR: Probe-Based Deadlock Detection and Recovery Strategy for Component-Based Systems. APSEC 2012: 790-795 - [c3]Chen Li, Linpeng Huang, Luxi Chen, Weichao Luo:
Using Dynamic Probe for Deadlock Detection in Component-Based System. IMIS 2012: 292-299 - [c2]Chen Li, Linpeng Huang, Luxi Chen, Xu Li, Weichao Luo:
Dynamic software architectures: formal specification and verification with CSP. Internetware 2012: 5:1-5:8 - [c1]Luxi Chen, Linpeng Huang, Chen Li:
Component Substitutability Behavior Consistency Verification Based on Architecture-driven Development. IPDPS Workshops 2012: 1556-1562
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-27 17:30 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint