[1]
P. He, B. Li, X. Liu, J. Chen, and Y. Ma. An empirical study on software defect prediction with a simplified metric set. Information and Software Technology, 59:170–190, 2015. (doi:10.1016/j.infsof.2014.11.006)
[2]
W. Li, W. Guo, and E. Franzinelli. Achieving dynamic workload balancing for P2P volunteer computing. In 44th Annual Conference of the International Conference on Parallel Processing Workshops, ICPPW 2015, volume 2015-January, pages 240–249. Institute of Electrical and Electronics Engineers Inc., 2015. (doi:10.1109/ICPPW.2015.34)
[3]
W. Mo, B. Shen, Y. He, and H. Zhong. GEMiner: Mining social and programming behaviors to identify experts in GitHub. In 7th Asia-Pacific Symposium on Internetware, Internetware 2015, volume 06-November-2015, pages 93–101. Association for Computing Machinery, 2015. (doi:10.1145/2875913.2875924)
[4]
L. Li, J. Wang, and Y. Hui. ReliableTrust: Trust model based on professional knowledge node of local knowledge for a reliable request. Journal of Computational Information Systems, 11(18):6589–6596, 2015. (doi:10.12733/jcis15354)
[5]
Y. Qu, X. Guan, Q. Zheng, T. Liu, L. Wang, Y. Hou, and Z. Yang. Exploring community structure of software call graph and its applications in class cohesion measurement. Journal of Systems and Software, 108:193–210, 2015. (doi:10.1016/j.jss.2015.06.015)
[6]
Y. Li, Y. Cheng, V. Gligor, and A. Perrig. Establishing software-only root of trust on embedded systems: Facts and fiction. 23rd International Workshop on Security Protocols, 2015, 9379:50–68, 2015. (doi:10.1007/978-3-319-26096-9_7)
[7]
Q. Do, B. Martini, and K.-K.R. Choo. Exfiltrating data from Android devices. Computers and Security, 48:74–91, 2015. (doi:10.1016/j.cose.2014.10.016)
[8]
T.-Y. Wu, J.-S. Pan, C.-M. Chen, and C.-W. Lin. Towards SQL injection attacks detection mechanism using parse tree. 8th International Conference on Genetic and Evolutionary Computing, ICGEC 2014, 329:371–380, 2015. (doi:10.1007/978-3-319-12286-1_38)
[9]
Jian Ni, Jie Lin, Steven J. Harrington, and Naveen Sharma. Two-level structured overlay design for cluster management in a peer-to-peer network. United States Patent 9,015,342, April 2015. Assignee: Xerox Corporation (Norwalk, CT).
[10]
A. Muñoz, M. Urueña, R. Aparicio, and G. Rodrıguez De Los Santos. Digital wiretap warrant: Improving the security of ETSI lawful interception. Digital Investigation, 14:1–16, 2015. (doi:10.1016/j.diin.2015.04.005)
[11]
B. Xu and D. Li. An empirical study of the motivations for content contribution and community participation in Wikipedia. Information and Management, 52(3):275–286, 2015. (doi:10.1016/j.im.2014.12.003)
[12]
Jian Ni and Jie Lin. Two-level structured overlay design for cluster management in a peer-to-peer network. United States Patent 9,026,628, May 2015. Assignee: Xerox Corporation (Norwalk, CT).
[13]
Z. Al-Mousa and Q. Nasir. cl-CIDPS: A cloud computing based cooperative intrusion detection and prevention system framework. 1st International Conference on Future Network Systems and Security, FNSS 2015, 523:181–194, 2015. (doi:10.1007/978-3-319-19210-9_13)
[14]
M. De Bayser, L.G. Azevedo, and R. Cerqueira. ResearchOps: The case for DevOps in scientific applications. In 14th IFIP/IEEE International Symposium on Integrated Network Management, IM 2015, pages 1398–1404. Institute of Electrical and Electronics Engineers Inc., 2015. (doi:10.1109/INM.2015.7140503)
[15]
D. Di Ruscio, D.S. Kolovos, I. Korkontzelos, N. Matragkas, and J.J. Vinju. OSSMETER: A software measurement platform for automatically analysing open source software projects. In 10th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering, ESEC/FSE 2015, pages 970–973. Association for Computing Machinery, Inc, 2015. (doi:10.1145/2786805.2803186)
[16]
A.B. Al-Badareen, J.-M. Desharnais, and A. Abran. A suite of rules for developing and evaluating software quality models. 25th International Workshop on Software Measurement, IWSM 2015 and 10th International Conference on Software Process and Product Measurement, Mensura 2015, 230:1–13, 2015. (doi:10.1007/978-3-319-24285-9_1)
[17]
S. De Kinderen and Q. Ma. Requirements engineering for the design of conceptual modeling languages. Applied Ontology, 10(1):7–24, 2015. (doi:10.3233/AO-150139)
[18]
J. Al Dallal. Accounting for data encapsulation in the measurement of object-oriented class cohesion. Journal of Software: Evolution and Process, 27(5):373–400, 2015. (doi:10.1002/smr.1714)
[19]
H. Ren, W. Mo, G. Zhao, D. Ren, and S. Liu. Breadth first search based cosine software code framework automation algorithm. In ASME 2015 Power Conference, POWER 2015, collocated with the ASME 2015 9th International Conference on Energy Sustainability, the ASME 2015 13th International Conference on Fuel Cell Science, Engineering and Technology, and the ASME 2015 Nuclear Forum, volume 2015-January. American Society of Mechanical Engineers (ASME), 2015. (doi:10.1115/POWER201549855)
[20]
Y. Bai, G. Yin, and H. Wang. Multi-dimensions of developer trustworthiness assessment in OSS community. In 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2014, pages 75–81. Institute of Electrical and Electronics Engineers Inc., 2015. (doi:10.1109/TrustCom.2014.14)
[21]
J. Lin, W.-T. Zhu, Q. Wang, N. Zhang, J. Jing, and N. Gao. RIKE+: Using revocable identities to support key escrow in public key infrastructures with flexibility. IET Information Security, 9(2):136–147, 2015. (doi:10.1049/iet-ifs.2013.0552)
[22]
D. Qiu, S. Wang, and D. Xu. Application of cache in P2P systems. In Proceedings - 2015 IEEE 12th International Conference on Ubiquitous Intelligence and Computing, 2015 IEEE 12th International Conference on Advanced and Trusted Computing, 2015 IEEE 15th International Conference on Scalable Computing and Communications, 2015 IEEE International Conference on Cloud and Big Data Computing, 2015 IEEE International Conference on Internet of People and Associated Symposia/Workshops, UIC-ATC-ScalCom-CBDCom-IoP 2015, pages 1461–1465. Institute of Electrical and Electronics Engineers Inc., 2015. (doi:10.1109/UIC-ATC-ScalCom-CBDCom-IoP.2015.263)
[23]
L. Gui, R. Shen, Y. Yu, D. Feng, Y. Peng, and W. Liu. DLG-hypertree: A low-diameter, server-centric datacenter network architecture. In 8th IEEE International Conference on Cloud Computing, CLOUD 2015, pages 1077–1080. Institute of Electrical and Electronics Engineers Inc., 2015. (doi:10.1109/CLOUD.2015.156)
[24]
Q. Fan, H. Wang, G. Yin, and T. Wang. Ranking open source software based on crowd wisdom. In 6th IEEE International Conference on Software Engineering and Service Science, ICSESS 2015, volume 2015-November, pages 966–972. IEEE Computer Society, 2015. (doi:10.1109/ICSESS.2015.7339215)
[25]
Y. Qiu, W. Zhang, W. Zou, J. Liu, and Q. Liu. An empirical study of developer quality. In IEEE International Conference on Software Quality, Reliability and Security-Companion, QRS-C 2015, pages 202–209. Institute of Electrical and Electronics Engineers Inc., 2015. (doi:10.1109/QRS-C.2015.33)
[26]
X. Zhu, L. Zhong, H. Zong, C. Hou, and N. Zhang. Understanding of the component-based software evolution by using similarity measurement. In 5th International Conference on Computer Engineering and Networks, CENet 2015, volume 12-13-September-2015. Proceedings of Science (PoS), 2015.
[27]
Y. Gil, F. Michel, V. Ratnakar, M. Hauder, C. Duffy, H. Dugan, and P. Hanson. A task-centered framework for computationally-grounded science collaborations. In 11th IEEE International Conference on eScience, eScience 2015, pages 352–361. Institute of Electrical and Electronics Engineers Inc., 2015. (doi:10.1109/eScience.2015.76)
[28]
T. Van Der Storm and J.J. Vinju. Towards multilingual programming environments. Science of Computer Programming, 97(P1):143–149, 2015. (doi:10.1016/j.scico.2013.11.041)
[29]
Z. Lin and J. Whitehead. Why power laws? an explanation from fine-grained code changes. In 12th Working Conference on Mining Software Repositories, MSR 2015, volume 2015-August, pages 68–75. IEEE Computer Society, 2015. (doi:10.1109/MSR.2015.14)
[30]
W. Shi and A. Afanasyev. RepoSync: Combined action-based and data-based synchronization model in named data network. In IEEE Conference on Computer Communications Workshops, INFOCOM WKSHPS 2015, volume 2015-August, pages 275–280. Institute of Electrical and Electronics Engineers Inc., 2015. (doi:10.1109/INFCOMW.2015.7179397)
[31]
S. Hai-Jew. Conducting semantic-based network analyses from social media data: Extracted insights about the data leakage movement. In Design Strategies and Innovations in Multimedia Presentations, pages 369–427. IGI Global, 2015. (doi:10.4018/978-1-4666-8696-0.ch011)
[32]
W. Wang, B. Li, and P. He. An analysis of the evolution of developers' role in open-source software community. Complex Systems and Complexity Science, 12(1):1–7, 2015. (doi:10.13306/j.1672-3813.2015.01.001)
[33]
X. Wang, N.L. Or, Z. Lu, and D. Pao. Hardware accelerator to detect multi-segment virus patterns. Computer Journal, 58(10):2443–2460, 2015. (doi:10.1093/comjnl/bxu079)
[34]
W. Wang, N. Niu, H. Liu, and Y. Wu. Tagging in assisted tracing. In 8th IEEE/ACM International Symposium on Software and Systems Traceability, SST 2015, pages 8–14. Institute of Electrical and Electronics Engineers Inc., 2015. (doi:10.1109/SST.2015.9)
[35]
T. Peng, C.-H. Chi, A. Chiasera, G. Armellin, M. Ronchetti, and C. Matteotti. Modeling and composition of environment-as-a-service. In IEEE International Conference on Services Computing, SCC 2015, pages 443–450. Institute of Electrical and Electronics Engineers Inc., 2015. (doi:10.1109/SCC.2015.67)
[36]
W. Wang, G. Poo-Caamaño, E. Wilde, and D.M. German. What is the GIST? understanding the use of public gists on GitHub. In 12th Working Conference on Mining Software Repositories, MSR 2015, volume 2015-August, pages 314–323. IEEE Computer Society, 2015. (doi:10.1109/MSR.2015.36)
[37]
X. Zhao, Z. Wang, X. Fan, and Z. Wang. A clustering-bayesian network based approach for test case prioritization. In 39th IEEE Annual Computer Software and Applications Conference Workshops, COMPSACW 2015, volume 3, pages 542–547. IEEE Computer Society, 2015. (doi:10.1109/COMPSAC.2015.154)
[38]
S. Kaur, K. Kaur, and N. Kaur. An empirical investigation of relationship between software metrics. In 2nd IEEE International Conference on Advances in Computing and Communication Engineering, ICACCE 2015, pages 639–643. Institute of Electrical and Electronics Engineers Inc., 2015. (doi:10.1109/ICACCE.2015.23)
[39]
A. Kaur, K. Kaur, and H. Kaur. An investigation of the accuracy of code and process metrics for defect prediction of mobile applications. In 4th International Conference on Reliability, Infocom Technologies and Optimization, ICRITO 2015. Institute of Electrical and Electronics Engineers Inc., 2015. (doi:10.1109/ICRITO.2015.7359220)
[40]
L. Chen, B. Fang, Z. Shang, and Y. Tang. Negative samples reduction in cross-company software defects prediction. Information and Software Technology, 62(1):67–77, 2015. (doi:10.1016/j.infsof.2015.01.014)
[41]
A. Kaur, K. Kaur, and K. Pathak. A proposed new model for maintainability index of open source software. In 2014 3rd International Conference on Reliability, Infocom Technologies and Optimization, ICRITO 2014. Institute of Electrical and Electronics Engineers Inc., 2015. (doi:10.1109/ICRITO.2014.7014758)
[42]
E. Shaw, A. Shaw, and D. Umphress. Mining Android apps to predict market ratings. In 2014 6th International Conference on Mobile Computing, Applications and Services, MobiCASE 2014, pages 166–167. Institute of Electrical and Electronics Engineers Inc., 2015. (doi:10.4108/icst.mobicase.2014.257773)
[43]
X. Chen, G. Sime, C. Lutteroth, and G. Weber. OAuthHub-a service for consolidating authentication services. In 19th IEEE International Enterprise Distributed Object Computing Conference Workshps and Demonstrations, EDOCW 2015, volume 2015-November, pages 201–210. Institute of Electrical and Electronics Engineers Inc., 2015. (doi:10.1109/EDOC.2015.36)
[44]
L. Kong, G. Bauer, and J. Hale. Robust wireless signal indoor localization. Concurrency Computation, 27(11):2839–2850, 2015. (doi:10.1002/cpe.3443)
[45]
J. Lima, C. Treude, F.F. Filho, and U. Kulesza. Assessing developer contribution with repository mining-based metrics. In 31st IEEE International Conference on Software Maintenance and Evolution, ICSME 2015, pages 536–540. Institute of Electrical and Electronics Engineers Inc., 2015. (doi:10.1109/ICSM.2015.7332509)
[46]
R. Dyer, H.A. Nguyen, H. Rajan, and T.N. Nguyen. Boa: Ultra-large-scale software repository and source-code mining. ACM Transactions on Software Engineering and Methodology, 25(1), 2015. (doi:10.1145/2803171)
[47]
J. Ruan, T. Samatsu, and Y. Shi. A similarity-based M(1,2,3) approach and its application in rating the security of network systems. International Journal of Innovative Computing, Information and Control, 11(6):2177–2191, 2015.
[48]
Y. Tian, M. Nagappan, D. Lo, and A.E. Hassan. What are the characteristics of high-rated apps? a case study on free Android applications. In 31st IEEE International Conference on Software Maintenance and Evolution, ICSME 2015, pages 301–310. Institute of Electrical and Electronics Engineers Inc., 2015. (doi:10.1109/ICSM.2015.7332476)
[49]
P. Bahr, J. Berthold, and M. Elsman. Certified symbolic management of financial multi-party contracts. In 20th ACM SIGPLAN International Conference on Functional Programming, ICFP 2015, volume 2015-August, pages 315–327. Association for Computing Machinery, 2015. (doi:10.1145/2784731.2784747)
[50]
G. Vale, D. Albuquerque, E. Figueiredo, and A. Garcia. Defining metric thresholds for software product lines: A comparative study. In 19th International Software Product Line Conference, SPLC 2015, volume 20-24-July-2015, pages 176–185. Association for Computing Machinery, 2015. (doi:10.1145/2791060.2791078)
[51]
S.Y. Köse, L. Demir, S. Tunal, and D.T. Eliiyi. Capacity improvement using simulation optimization approaches: A case study in the thermotechnology industry. Engineering Optimization, 47(2):149–164, 2015. (doi:10.1080/0305215X.2013.875166)
[52]
M.M. Hall, C.B. Jones, and P. Smart. Spatial natural language generation for location description in photo captions. 12th International Conference on Spatial Information Theory, COSIT 2015, 9368:196–223, 2015. (doi:10.1007/978-3-319-23374-1_10)
[53]
John D. Mehr, Elissa E. S. Murphy, Navjot Virk, and Lara M. Sosnosky. Hybrid distributed and cloud backup architecture. United States Patent 8,935,366, January 2015. Assignee: Microsoft Corporation (Redmond, WA).
[54]
Casparus Cate, James J. Fitzgibbon, Robert R. Keller, Jr., Cory Sorice, James Scott Murray, Gregory John Stanek, and Colin Barns Willmott. Barrier operator feature enhancement. United States Patent 9,122,254, September 2015. Assignee: The Chamberlain Group, Inc. (Elmhurst, IL).
[55]
Casparus Cate, James J. Fitzgibbon, Robert R. Keller, Jr., Sapta Gireesh Pudipeddi, and Cory Sorice. Barrier operator feature enhancement. United States Patent 9,141,099, September 2015. Assignee: The Chamberlain Group, Inc. (Elmhurst, IL).
[56]
X. Zhou and Z. Yu. A novel approach for the selection of super peers in P2P networks. ICIC Express Letters, 9(2):551–556, 2015.
[57]
G.M. Rama and A. Kak. Some structural measures of API usability. Software - Practice and Experience, 45(1):75–110, 2015. (doi:10.1002/spe.2215)
[58]
D. Jing and H. Yang. Creative computing for bespoke ideation. In 2015 IEEE 39th Annual Computer Software and Applications Conference - Stephen S. Yau Academic Symposium, COMPSAC 2015, volume 1, pages 34–43. IEEE Computer Society, 2015. (doi:10.1109/COMPSAC.2015.203)
[59]
M. Kaya and S.A. Özel. Integrating an online compiler and a plagiarism detection tool into the Moodle distance education system for easy assessment of programming assignments. Computer Applications in Engineering Education, 23(3):363–373, 2015. (doi:10.1002/cae.21606)
[60]
Y. Zhao and S.S.M. Chow. Privacy preserving collaborative filtering from asymmetric randomized encoding. 19th International Conference on Financial Cryptography and Data Security, FC 2015, 8975:459–477, 2015. (doi:10.1007/978-3-662-47854-7_28)
[61]
L. Yang and C.L. Henry. How ARL academic libraries present open web resources — a proposed solution to address discoverability. Journal of Academic Librarianship, 41(5):629–635, 2015. (doi:10.1016/j.acalib.2015.06.018)
[62]
N. Choi and J.A. Pruett. The characteristics and motivations of library open source software developers: An empirical study. Library and Information Science Research, 37(2):109–117, 2015. (doi:10.1016/j.lisr.2015.02.007)
[63]
M. Aram and G. Neumann. Multilayered analysis of co-development of business information systems. Journal of Internet Services and Applications, 6(1), 2015. (doi:10.1186/s13174-015-0030-8)
[64]
B. Suri and S. Singhal. Investigating the OO characteristics of software using CKJM metrics. In 4th International Conference on Reliability, Infocom Technologies and Optimization, ICRITO 2015. Institute of Electrical and Electronics Engineers Inc., 2015. (doi:10.1109/ICRITO.2015.7359254)
[65]
S.Y. Kose and O. Kilincci. Hybrid approach for buffer allocation in open serial production lines. Computers and Operations Research, 60:67–78A, 2015. (doi:10.1016/j.cor.2015.01.009)
[66]
S.Y. Kose and O. Kilincci. Analyzing buffer allocations using utilization-based search methods. In 45th International Conference on Computers and Industrial Engineering, CIE 2015. Universite de Lorraine, 2015.
[67]
Jonathan Salz and Richard S. Tibbetts. Stream processor with compiled programs. United States Patent 9,038,041, May 2015. Assignee: TIBCO Software, Inc. (Palo Alto, CA).
[68]
G. Vale and E. Figueiredo. A method to derive metric thresholds for software product lines. In 29th Brazilian Symposium on Software Engineering, SBES 2015, pages 110–119. Institute of Electrical and Electronics Engineers Inc., 2015. (doi:10.1109/SBES.2015.9)
[69]
H.M. Tran and J. Schönwälder. DisCaRia — distributed case-based reasoning system for fault management. IEEE Transactions on Network and Service Management, 12(4):540–553, 2015. (doi:10.1109/TNSM.2015.2496224)
[70]
X. Huang, T. Zhao, and Y. Cao. PIR: A domain specific language for multimedia information retrieval. In Web Design and Development: Concepts, Methodologies, Tools, and Applications, volume 2-3, pages 748–771. IGI Global, 2015. (doi:10.4018/978-1-4666-8619-9.ch035)
[71]
A. Decan, T. Mens, M. Claes, and P. Grosjean. On the development and distribution of r packages: An empirical analysis of the r ecosystem. In European Conference on Software Architecture Workshops, ECSAW 2015, volume 07-11-September-2015. Association for Computing Machinery, 2015. (doi:10.1145/2797433.2797476)
[72]
T. Voigt, S. Flad, and P. Struss. Model-based fault localization in bottling plants. Advanced Engineering Informatics, 29(1):101–114, 2015. (doi:10.1016/j.aei.2014.09.007)
[73]
G. Szoke, C. Nagy, P. Hegedus, R. Ferenc, and T. Gyimothy. Do automatic refactorings improve maintainability? an industrial case study. In 31st IEEE International Conference on Software Maintenance and Evolution, ICSME 2015, pages 429–438. Institute of Electrical and Electronics Engineers Inc., 2015. (doi:10.1109/ICSM.2015.7332494)
[74]
R. Kikas, M. Dumas, and D. Pfahl. Issue dynamics in github projects. 16th International Conference on Product-Focused Software Process Improvement, PROFES 2015, 9459:295–310, 2015. (doi:10.1007/978-3-319-26844-6_22)
[75]
S. Amann, S. Beyer, K. Kevic, and H. Gall. Software mining studies: Goals, approaches, artifacts, and replicability. 10th LASER Summer School on Software Engineering: Software for the Cloud and Big Data, LASER 2013–2014, 8987:121–158, 2015. (doi:10.1007/978-3-319-28406-4_5)
[76]
G. Dèvai, D. Leskò, and M. Tejfel. The EDSL's struggle for their sources. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 8606:300–335, 2015. (doi:10.1007/978-3-319-15940-9_7)
[77]
J. Smeds, K. Nybom, and I. Porres. DevOps: A definition and perceived adoption impediments. 16th International Conference on Agile Software Development, XP 2015, 212:166–177, 2015. (doi:10.1007/978-3-319-18612-2_14)
[78]
N. Gupta, D. Singh, and A. Sharma. Identifying effective software metrics for categorical defect prediction using structural equation modeling. In 3rd International Symposium on Women in Computing and Informatics, WCI 2015, volume 10-13-August-2015, pages 59–65. Association for Computing Machinery, 2015. (doi:10.1145/2791405.2791484)
[79]
S. Naval, V. Laxmi, M. Rajarajan, M.S. Gaur, and M. Conti. Employing program semantics for malware detection. IEEE Transactions on Information Forensics and Security, 10(12):2591–2604, 2015. (doi:10.1109/TIFS.2015.2469253)
[80]
P. Mehta, J. Sharda, and M.L. Das Maniklal. Sqlshield: Preventing SQL injection attacks by modifying user input data. 11th International Conference on Information Systems Security, ICISS 2015, 9478:192–206, 2015. (doi:10.1007/978-3-319-26961-0_12)
[81]
B. Wulff, A. Wilson, B. Jost, and M. Ketterl. An adopter centric API and visual programming interface for the definition of strategies for automated camera tracking. In 17th IEEE International Symposium on Multimedia, ISM 2015, pages 587–592. Institute of Electrical and Electronics Engineers Inc., 2015. (doi:10.1109/ISM.2015.106)
[82]
G. Bajwa, M. Fazeen, R. Dantu, and S. Tanpure. Unintentional bugs to vulnerability mapping in Android applications. In 13th IEEE International Conference on Intelligence and Security Informatics, ISI 2015, pages 176–178. Institute of Electrical and Electronics Engineers Inc., 2015. (doi:10.1109/ISI.2015.7165966)
[83]
L. Fürst, M. Mernik, and V. Mahnič. Converting metamodels to graph grammars: doing without advanced graph grammar features. Software and Systems Modeling, 14(3):1297–1317, 2015. (doi:10.1007/s10270-013-0380-2)
[84]
F. Ebert, F. Castor, and A. Serebrenik. An exploratory study on exception handling bugs in Java programs. Journal of Systems and Software, 106:82–101, 2015. (doi:10.1016/j.jss.2015.04.066)
[85]
A. Bates, K.R.B. Butler, M. Sherr, C. Shields, P. Traynor, and D. Wallach. Accountable wiretapping-or-i know they can hear you now. Journal of Computer Security, 23(2):167–195, 2015. (doi:10.3233/JCS-140515)
[86]
A. Costa, A. Alfieri, A. Matta, and S. Fichera. A parallel tabu search for solving the primal buffer allocation problem in serial production systems. Computers and Operations Research, 64:97–112, 2015. (doi:10.1016/j.cor.2015.05.013)
[87]
P. Mayer, J. Velasco, A. Klarl, R. Hennicker, M. Puviani, F. Tiezzi, R. Pugliese, J. Keznikl, and T. Bureš. The autonomic cloud. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 8998:495–512, 2015.
[88]
N. Allen, P. Krishnan, and B. Scholz. Combining type-analysis with points-to analysis for analyzing Java library source-code. In 4th ACM SIGPLAN International Workshop on State of the Art in Program Analysis, SOAP 2015, pages 13–18. Association for Computing Machinery, Inc, 2015. (doi:10.1145/2771284.2771287)
[89]
V. Gupta, N. Ganeshan, and T.K. Singhal. Determining the root causes of various software bugs throughsoftware metrics. In 2nd International Conference on Computing for Sustainable Global Development, INDIACom 2015, pages 1211–1215. Institute of Electrical and Electronics Engineers Inc., 2015.
[90]
R.-I. Chang, T.-T. Wei, and C.-H. Wang. A cost-effective key distribution of P2P IPTV DRM over opportunistic multicast overlay for e-commerce systems. Electronic Commerce Research, 15(1):49–71, 2015. (doi:10.1007/s10660-015-9176-5)
[91]
F.-M. Huang, Y.H. Huang, C. Szu, A.Y.S. Su, M.C. Chen, and Y.S. Sun. A study of a life logging smartphone app and its power consumption observation in location-based service scenario. In 3rd IEEE International Conference on Mobile Services, MS 2015, pages 225–232. Institute of Electrical and Electronics Engineers Inc., 2015. (doi:10.1109/MobServ.2015.40)
[92]
Y.C. Cheng, J.-S. Jwo, and C.-T. Tsai. A leading indicator of post-release defect density in refactoring-based software maintenance — a case study. International Computer Symposium, ICS 2014, 274:1815–1821, 2015. (doi:10.3233/978-1-61499-484-8-1815)
[93]
Yu Zheng, Jianqiao Feng, Xing Xie, and Wei-Ying Ma. Detecting spatial outliers in a location entity dataset. United States Patent 9,063,226, June 2015. Assignee: Microsoft Technology Licensing, LLC (Redmond, WA).
[94]
L.D. Couto, P.W.V. Tran-Jorgensen, J.W. Coleman, and K. Lausdahl. Migrating to an extensible architecture for abstract syntax trees. In 12th Working IEEE/IFIP Conference on Software Architecture, WICSA 2015, pages 145–154. Institute of Electrical and Electronics Engineers Inc., 2015. (doi:10.1109/WICSA.2015.10)
[95]
L.H. Silva, M. Ramos, M.T. Valente, A. Bergel, and N. Anquetil. Does JavaScript software embrace classes? In 22nd IEEE International Conference on Software Analysis, Evolution, and Reengineering, SANER 2015, pages 73–82. Institute of Electrical and Electronics Engineers Inc., 2015. (doi:10.1109/SANER.2015.7081817)
[96]
F.F. Filho, M.G. Perin, C. Treude, S. Marczak, L. Melo, I.M. da Silva, and L.B. dos Santos. A study on the geographical distribution of Brazil's prestigious software developers. Journal of Internet Services and Applications, 6(1), 2015. (doi:10.1186/s13174-015-0032-6)
[97]
Yu Zheng, Chang Sheng, and Xing Xie. Recommending points of interests in a region. United States Patent 9,009,177, April 2015. Assignee: Microsoft Corporation (Redmond, WA).
[98]
H.J. Macho, G. Robles, and J.M. González-Barahona. Evaluation of FLOSS by analyzing its software evolution: An example using the moodle platform. Journal of Information Technology Research, 8(1):62–81, 2015. (doi:10.4018/JITR.2015010105)
[99]
B.R. Reddy, S. Khurana, and A. Ojha. Software maintainability estimation made easy — a comprehensive tool COIN. In 6th International Conference on Computer and Communication Technology, ICCCT 2015, volume 25-27-September-2015, pages 68–72. Association for Computing Machinery, 2015. (doi:10.1145/2818567.2818580)
[100]
R.N. Akram, K. Markantonakis, and K. Mayes. Enhancing java runtime environment for smart cards against runtime attacks. 20th European Symposium on Research in Computer Security, ESORICS 2015, 9327:541–560, 2015. (doi:10.1007/978-3-319-24177-7_27)
[101]
O.A.L. Lemos, A.C. De Paula, H. Sajnani, and C.V. Lopes. Can the use of types and query expansion help improve large-scale code search? In IEEE 15th International Working Conference on Source Code Analysis and Manipulation, SCAM 2015, pages 41–50. Institute of Electrical and Electronics Engineers Inc., 2015. (doi:10.1109/SCAM.2015.7335400)
[102]
B.T.S. Kumar, D.V. Kumar, and K.R. Prithviraj. Wayback machine: Reincarnation to vanished online citations. Program, 49(2):205–223, 2015. (doi:10.1108/PROG-07-2013-0039)
[103]
Brendan Kitts, Brian Burdick, Dyng Au, and Tyson Roberts. Method and system for automatically targeting ads to television media using demographic similarity. United States Patent 9,088,833, July 2015. Assignee: LUCID COMMERCE, INC. (Seattle, WA).
[104]
Brendan Kitts, Brian Burdick, Dyng Au, and Tyson Roberts. Targeting television ads using keywords. United States Patent 9,161,099, October 2015. Assignee: Lucid Commerce, Inc. (Seattle, WA).
[105]
Raymond E. Ozzie, Jack E. Ozzie, George P. Moromisato, Paresh S. Suthar, Raman Narayanan, and Matthew S. Augustine. Data synchronization and sharing relationships. United States Patent 9,203,786, December 2015. Assignee: Microsoft Technology Licensing, LLC (Redmond, WA).
[106]
C.Y. Chong and S.P. Lee. Analyzing maintainability and reliability of object-oriented software using weighted complex network. Journal of Systems and Software, 110:28–53, 2015. (doi:10.1016/j.jss.2015.08.014)
[107]
K. Jezek and J. Ambroz. Detecting incompatibilities concealed in duplicated software libraries. In 41st Euromicro Conference on Software Engineering and Advanced Applications, SEAA 2015, pages 233–240. Institute of Electrical and Electronics Engineers Inc., 2015. (doi:10.1109/SEAA.2015.17)
[108]
M. Jarke and C.R. Prause. Gamification for enforcing coding conventions. In 10th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering, ESEC/FSE 2015, pages 649–660. Association for Computing Machinery, Inc, 2015. (doi:10.1145/2786805.2786806)
[109]
C.V. Lopes and J. Ossher. How scale affects structure in Java programs. In 2015 ACM SIGPLAN International Conference on Object-Oriented Programming, Systems, Languages, and Applications, OOPSLA 2015, volume 25-30-Oct-2015, pages 675–694. Association for Computing Machinery, 2015. (doi:10.1145/2814270.2814300)
[110]
S.M. Hemam and O. Hioual. Load balancing by requests redistribution in failure nodes context. In International Conference on Intelligent Information Processing, Security and Advanced Communication, IPAC 2015, volume 23-25-November-2015. Association for Computing Machinery, 2015. (doi:10.1145/2816839.2816847)
[111]
Satya V. Gupta and Prashant Shenoy. System and methods for run time detection and correction of memory corruption. United States Patent 8,966,312, February 2015. Assignee: Virsec Systems, Inc. (Acton, MA).
[112]
C. Biray and F. Buzluca. A learning-based method for detecting defective classes in object-oriented systems. In 2015 8th IEEE International Conference on Software Testing, Verification and Validation Workshops, ICSTW 2015. Institute of Electrical and Electronics Engineers Inc., 2015. (doi:10.1109/ICSTW.2015.7107477)
[113]
T. Abdou and P. Kamthan. A knowledge management approach for testing open source software systems. In 33rd IEEE International Performance Computing and Communications Conference, IPCCC 2014. Institute of Electrical and Electronics Engineers Inc., 2015. (doi:10.1109/PCCC.2014.7017022)
[114]
S. Weiss and R. Stolletz. Buffer allocation in stochastic flow lines via sample-based optimization with initial bounds. OR Spectrum, 37(4):869–902, 2015. (doi:10.1007/s00291-015-0393-z)
[115]
M. Savić and M. Ivanović. Validation of static program analysis tools by self-application: A case study. In 4th Workshop on Software Quality Analysis, Monitoring, Improvement, and Applications, SQAMIA 2015, volume 1375, pages 61–68. CEUR-WS, 2015.
[116]
B. Hoisl and S. Sobernig. Consistency rules for uml-based domain-specific language models: A literature review. In 8th Joint International Workshop on Model-Based Architecting of Cyber-Physical and Embedded Systems and 1st International Workshop on UML Consistency Rules, ACES-MB 2015 and WUCOR 2015, volume 1508, pages 29–36. CEUR-WS, 2015.
[117]
B. Urban and B.C. Greyling. Open source software adoption and links to innovation performance. International Journal of Technological Learning, Innovation and Development, 7(3):261–278, 2015. (doi:10.1504/IJTLID.2015.070379)
[118]
N. Nahas and M. Nourelfath. Buffer allocation, machine selection and preventive maintenance optimization in unreliable production lines. In International Conference on Industrial Engineering and Systems Management, IEEE IESM 2015, pages 1028–1033. Institute of Electrical and Electronics Engineers Inc., 2015. (doi:10.1109/IESM.2015.7380281)
[119]
E. Azadi Marand, E. Azadi Marand, and M. Challenger. DSML4CP: A domain-specific modeling language for concurrent programming. Computer Languages, Systems and Structures, 44:319–341, 2015. (doi:10.1016/j.cl.2015.09.002)
[120]
G. Bavota, A. De Lucia, M. Di Penta, R. Oliveto, and F. Palomba. An experimental investigation on the innate relationship between quality and refactoring. Journal of Systems and Software, 107:1–14, 2015. (doi:10.1016/j.jss.2015.05.024)
[121]
S. Wagner, A. Goeb, L. Heinemann, M. Kläs, C. Lampasona, K. Lochmann, A. Mayr, R. Plösch, A. Seidl, J. Streit, and A. Trendowicz. Operationalised product quality models and assessment: The Quamoco approach. Information and Software Technology, 62(1):101–123, 2015. (doi:10.1016/j.infsof.2015.02.009)
[122]
E. Flores, A. Barrõn Cedeño, L. Moreno, and P. Rosso. Uncovering source code reuse in large-scale academic environments. Computer Applications in Engineering Education, 23(3):383–390, 2015. (doi:10.1002/cae.21608)
[123]
K. Tabata, H. Tanno, and M. Oinuma. Helping testers by fault-prone functionality prediction. In 10th Asia-Pacific Symposium on Information and Telecommunication Technologies, APSITT 2015, pages 94–96. Institute of Electrical and Electronics Engineers Inc., 2015. (doi:10.1109/APSITT.2015.7217084)
[124]
L. Amorim, E. Costa, N. Antunes, B. Fonseca, and M. Ribeiro. Experience report: Evaluating the effectiveness of decision trees for detecting code smells. In 26th IEEE International Symposium on Software Reliability Engineering, ISSRE 2015, pages 261–269. Institute of Electrical and Electronics Engineers Inc., 2015. (doi:10.1109/ISSRE.2015.7381819)
[125]
H. Chanti, L. Thiry, M. Hassenforder, E. Blanchard, and P. Fromy. Fire safety DSL based algebra. In 3rd International Conference on Control, Engineering and Information Technology, CEIT 2015. Institute of Electrical and Electronics Engineers Inc., 2015. (doi:10.1109/CEIT.2015.7233083)
[126]
J. Liebig, A. Janker, F. Garbe, S. Apel, and C. Lengauer. Morpheus: Variability-aware refactoring in the wild. In 37th IEEE/ACM International Conference on Software Engineering, ICSE 2015, volume 1, pages 380–391. IEEE Computer Society, 2015. (doi:10.1109/ICSE.2015.57)
[127]
C. Mateos, M. Crasso, A. Zunino, and J.L. Ordiales Coscia. A stitch in time saves nine: Early improving code-first web services discoverability. International Journal of Cooperative Information Systems, 24(2), 2015. (doi:10.1142/S0218843015500045)
[128]
G. Godena, T. Lukman, M. Heričko, and S. Strmčnik. The experience of implementing model-driven engineering tools in the process control domain. Information Technology and Control, 44(2):135–147, 2015. (doi:10.5755/j01.itc.44.2.6258)
[129]
X. Franch, R.S. Kenett, A. Susi, N. Galanis, R. Glott, and F. Mancinelli. Community data for OSS adoption risk management. The Art and Science of Analyzing Software Data, pages 377–409, 2015. (doi:10.1016/B978-0-12-411519-4.00014-8)
[130]
I. Polato, D. Barbosa, A. Hindle, and F. Kon. Hadoop branching: Architectural impacts on energy and performance. In 6th International Green and Sustainable Computing Conference, IGSC 2015. Institute of Electrical and Electronics Engineers Inc., 2015. (doi:10.1109/IGCC.2015.7393709)
[131]
J. Rasley, E. Gessiou, T. Ohmann, Y. Brun, S. Krishnamurthi, and J. Cappos. Detecting latent cross-platform API violations. In 26th IEEE International Symposium on Software Reliability Engineering, ISSRE 2015, pages 484–495. Institute of Electrical and Electronics Engineers Inc., 2015. (doi:10.1109/ISSRE.2015.7381841)
[132]
S. Bayati, D. Parsons, T. Susnjak, and M. Heidary. Big data analytics on large-scale socio-technical software engineering archives. In 3rd International Conference on Information and Communication Technology, ICoICT 2015, pages 65–69. Institute of Electrical and Electronics Engineers Inc., 2015. (doi:10.1109/ICoICT.2015.7231398)
[133]
F. Camilo, A. Meneely, and M. Nagappan. Do bugs foreshadow vulnerabilities? a study of the Chromium project. In 12th Working Conference on Mining Software Repositories, MSR 2015, volume 2015-August, pages 269–279. IEEE Computer Society, 2015. (doi:10.1109/MSR.2015.32)
[134]
E. Berndt, D. Furniss, and A. Blandford. Learning contextual inquiry and distributed cognition: a case study on technology use in anaesthesia. Cognition, Technology and Work, 17(3):431–449, 2015. (doi:10.1007/s10111-014-0314-y)
[135]
F. Michel, V. Ratnakar, Y. Gil, and M. Hauder. A virtual crowdsourcing community for open collaboration in science processes. In 21st Americas Conference on Information Systems, AMCIS 2015. Americas Conference on Information Systems, 2015.
[136]
C. Vitolo, Y. Elkhatib, D. Reusser, C.J.A. Macleod, and W. Buytaert. Web technologies for environmental big data. Environmental Modelling and Software, 63:185–198, 2015. (doi:10.1016/j.envsoft.2014.10.007)
[137]
B. Bryant, J.-M. Jézéquel, R. Lämmel, M. Mernik, M. Schindler, F. Steinmann, J.-P. Tolvanen, A. Vallecillo, and M. Völter. Globalized domain specific language engineering. International Dagstuhl Seminar on Globalizing Domain-Specific Languages, 2014, 9400:43–69, 2015. (doi:10.1007/978-3-319-26172-0_4)
[138]
H. Santos, J.F. Pimentel, V. Torres Da Silva, and L. Murta. Software rejuvenation via a multi-agent approach. Journal of Systems and Software, 104:41–59, 2015. (doi:10.1016/j.jss.2015.02.017)
[139]
O. Günalp, C. Escoffier, and P. Lalanda. Demo abstract: Reproducible deployment of pervasive applications. In 13th IEEE International Conference on Pervasive Computing and Communication, PerCom Workshops 2015, pages 211–213. Institute of Electrical and Electronics Engineers Inc., 2015. (doi:10.1109/PERCOMW.2015.7134025)
[140]
O. Günalp, C. Escoffier, and P. Lalanda. Rondo: A tool suite for continuous deployment in dynamic environments. In IEEE International Conference on Services Computing, SCC 2015, pages 720–727. Institute of Electrical and Electronics Engineers Inc., 2015. (doi:10.1109/SCC.2015.102)
[141]
E. Loukis, Y. Charalabidis, and A. Androutsopoulou. Evaluating a passive social media citizensourcing innovation. 14th IFIP WG 8.5 International Conference on Electronic Government, EGOV 2015, 9248:305–320, 2015. (doi:10.1007/978-3-319-22479-4_23)
[142]
R. Robbes, D. Röthlisberger, and É. Tanter. Object-oriented software extensions in practice. Empirical Software Engineering, 20(3):745–782, 2015. (doi:10.1007/s10664-013-9298-0)
[143]
A.-K. Hueske, J. Endrikat, and E. Guenther. External environment, the innovating organization, and its individuals: A multilevel model for identifying innovation barriers accounting for social uncertainties. Journal of Engineering and Technology Management - JET-M, 35:45–70, 2015. (doi:10.1016/j.jengtecman.2014.10.001)
[144]
D.T. Nguyen, Q.B. Duong, E. Zamai, and M.K. Shahzad. Fault diagnosis for the complex manufacturing system. Proceedings of the Institution of Mechanical Engineers, Part O: Journal of Risk and Reliability, 230(2):178–194, 2015. (doi:10.1177/1748006X15623089)
[145]
S.M. Ghanem, M.A. Ismail, and S.G. Omar. VITAL: Structured and clustered super-peer network for similarity search. Peer-to-Peer Networking and Applications, 8(6):965–991, 2015. (doi:10.1007/s12083-014-0304-0)
[146]
R.G. Shirey, K.M. Hopkinson, K.E. Stewart, D.D. Hodson, and B.J. Borghetti. Analysis of implementations to secure git for use as an encrypted distributed version control system. In 48th Annual Hawaii International Conference on System Sciences, HICSS 2015, volume 2015-March, pages 5310–5319. IEEE Computer Society, 2015. (doi:10.1109/HICSS.2015.625)
[147]
John M. Harvey, Michael David Atella, Thomas Francis Doyle, Loyie H. Sims, III, and Satish N. Ram. Digital over-the-air keying system. United States Patent 9,165,416, October 2015. Assignee: OMNITRACS, LLC (Dallas, TX).
[148]
David D. Brandt, Kenwood Hall, Mark Burton Anderson, Craig D. Anderson, and George Bradford Collins. System and methodology providing automation security analysis and network intrusion protection in an industrial environment. United States Patent 9,009,084, April 2015. Assignee: Rockwell Automation Technologies, Inc. (Mayfield Heights, OH).
[149]
Adrian Perrig, Pradeep Khosla, Arvind Seshadri, Mark Luk, and Leendert van Doorn. Verifying integrity and guaranteeing execution of code on untrusted computer platform. United States Patent 9,177,153, November 2015. Assignee: Carnegie Mellon University (Pittsburg, PA).
[150]
Salvatore J. Stolfo, Angelos D. Keromytis, Brian M. Bowen, Shlomo Hershkop, Vasileios P. Kemerlis, Pratap V. Prabhu, and Malek Ben Salem. Methods, systems, and media for baiting inside attackers. United States Patent 9,009,829, April 2015. Assignee: The Trustees of Columbia University in the City of New York (New York, NY).
[151]
T. Chusho and J. Xu. Description and implementation of business logic for end-user-initiative development. 14th International Conference on New Trends in Intelligent Software Methodology, Tools, and Techniques, SoMeT 2015, 532:355–366, 2015. (doi:10.1007/978-3-319-22689-7_27)
[152]
L. Hatton and G. Warr. Protein structure and evolution: Are they constrained globally by a principle derived from information theory? PLoS ONE, 10(5), 2015. (doi:10.1371/journal.pone.0125663)
[153]
M. Harari and D. Jobin. International co-operation. The OECD Convention on Bribery, pages 486–533, 2015. (doi:10.1007/CBO9781139565332)
[154]
G. Burlet and A. Hindle. An empirical study of end-user programmers in the computer music community. In 12th Working Conference on Mining Software Repositories, MSR 2015, volume 2015-August, pages 292–302. IEEE Computer Society, 2015. (doi:10.1109/MSR.2015.34)
[155]
J.T. Stroud and K.J. Feeley. Responsible academia: Optimizing conference locations to minimize greenhouse gas emissions. Ecography, 38(4):402–404, 2015. (doi:10.1111/ecog.01366)
[156]
M.K. Chawla and I. Chhabra. SQMMA: Software quality model for maintainability analysis. In 8th ACM COMPUTE INDIA Conference, Compute 2015, volume 29-31-October-2015, pages 9–17. Association for Computing Machinery, 2015. (doi:10.1145/2835043.2835062)
[157]
Jr. Girola, F. and J.L.V. Barbosa. U-deal: A decentralized trail-aware model for business opportunities identification. IEEE Latin America Transactions, 13(5):1640–1648, 2015. (doi:10.1109/TLA.2015.7112026)
[158]
A.-K. Hueske and E. Guenther. What hampers innovation? External stakeholders, the organization, groups and individuals: a systematic review of empirical barrier research. Management Review Quarterly, 65(2):113–148, 2015. (doi:10.1007/s11301-014-0109-5)
[159]
Daniel Willis and Gordon Freedman. Method and system supporting audited reporting of advertising impressions from video games. United States Patent 9,180,369, November 2015. Assignee: Google Inc. (Mountain View, CA).
[160]
A. Sotelo and S. Takahashi. GOLD: A graph oriented language implemented using the eclipse xtext framework. In Eclipse Technology eXchange Workshop, ETX 2015, pages 19–24. Association for Computing Machinery, Inc, 2015. (doi:10.1145/2846650.2846653)
[161]
E. Murphy-Hill, T. Zimmermann, C. Bird, and N. Nagappan. The design space of bug fixes and how developers navigate it. IEEE Transactions on Software Engineering, 41(1):65–81, 2015. (doi:10.1109/TSE.2014.2357438)
[162]
B.F.D. Santos Neto, M. Ribeiro, V.T. Da Silva, C. Braga, C.J.P. De Lucena, and E. De Barros Costa. AutoRefactoring: A platform to build refactoring agents. Expert Systems with Applications, 42(3):1652–1664, 2015. (doi:10.1016/j.eswa.2014.09.022)
[163]
O. Franco-Bedoya, D. Ameller, D. Costal, and X. Franch. Measuring the quality of open source software ecosystems using QuESo. 9th International Joint Conference on Software Technologies, ICSOFT 2014, 555:39–62, 2015. (doi:10.1007/978-3-319-25579-8_3)
[164]
J. Pan. Data leakage triage: Quantitative measure of effectiveness of containment plan. International Journal of Information and Computer Security, 7(2-4):240–254, 2015. (doi:10.1504/IJICS.2015.073032)
[165]
C. Sanders, A. Shah, and S. Zhang. Comprehensive analysis of the Android google play's auto-update policy. 11th International Conference on Information Security Practice and Experience, ISPEC 2015, 9065:365–377, 2015. (doi:10.1007/978-3-319-17533-1_25)
[166]
F. Chauvel, H. Song, N. Ferry, and F. Fleurey. Evaluating robustness of cloud-based systems. Journal of Cloud Computing, 4(1), 2015. (doi:10.1186/s13677-015-0043-7)
[167]
M. Mesgari, C. Okoli, M. Mehdi, F.Å. Nielsen, and A. Lanamäki. "the sum of all human knowledge": A systematic review of scholarly research on the content of Wikipedia. Journal of the Association for Information Science and Technology, 66(2):219–245, 2015. (doi:10.1002/asi.23172)
[168]
A. Adewumi, O. Emebo, S. Misra, and L. Fernandez. Tool support for Cascading Style Sheets' complexity metrics. 4th International Conference on Soft Computing, Intelligent Systems and Information Technology, ICSIIT 2015, 516:551–560, 2015. (doi:10.1007/978-3-662-46742-8_50)
[169]
A. Adewumi, S. Misra, and N. Omoregbe. Evaluating open source software quality models against ISO 25010. In 15th IEEE International Conference on Computer and Information Technology, CIT 2015, 14th IEEE International Conference on Ubiquitous Computing and Communications, IUCC 2015, 13th IEEE International Conference on Dependable, Autonomic and Secure Computing, DASC 2015 and 13th IEEE International Conference on Pervasive Intelligence and Computing, PICom 2015, pages 872–877. Institute of Electrical and Electronics Engineers Inc., 2015. (doi:10.1109/CIT/IUCC/DASC/PICOM.2015.130)
[170]
U. Segundo, J. López-Cuadrado, L. Aldamiz-Echevarria, T.A. Pérez, D. Buenestado, A. Iruetaguena, R. Barrena, and J.M. Pikatza. Automatic construction of fuzzy inference systems for computerized clinical guidelines and protocols. Applied Soft Computing Journal, 26:257–269, 2015. (doi:10.1016/j.asoc.2014.09.045)
[171]
C. Borrego, S. Robles, A. Fabregues, and A. Sánchez-Carmona. A mobile code bundle extension for application-defined routing in delay and disruption tolerant networking. Computer Networks, 87:59–77, 2015. (doi:10.1016/j.comnet.2015.05.017)
[172]
P. Priller, W. Gruber, N. Olberding, and D. Peinsipp. Towards perfectly scalable real-time systems. International Conference on Computer Safety, Reliability, and Securitym, SAFECOMP 2015 and held 3rd International Workshop on Assurance Cases for Software-Intensive Systems ASSURE 2015, Workshop on Dependable Embedded and Cyber-Physical Systems and Systems-of-Systems, DECSoS 2015, 2nd International Workshop on the Integration of Safety and Security Engineering, ISSE 2015, Workshop on Reliability and Security Aspects for Critical Infrastructure Protection, ReSA4CI 2015, and 4th InternationalWorkshop on NextGeneration of System Assurance Approaches for Safety-Critical Systems SASSUR, 2015, 9338:212–223, 2015. (doi:10.1007/978-3-319-24249-1_19)
[173]
M. Cadariu, E. Bouwers, J. Visser, and A. Van Deursen. Tracking known security vulnerabilities in proprietary software systems. In 22nd IEEE International Conference on Software Analysis, Evolution, and Reengineering, SANER 2015, pages 516–519. Institute of Electrical and Electronics Engineers Inc., 2015. (doi:10.1109/SANER.2015.7081868)
[174]
J. Hintsch, C. Gorling, and K. Turowski. Modularization of software as a service products: A case study of the configuration management tool Puppet. In 3rd International Conference on Enterprise Systems, ES 2015, pages 184–191. Institute of Electrical and Electronics Engineers Inc., 2015. (doi:10.1109/ES.2015.25)
[175]
H. Oumarou, N. Anquetil, A. Etien, S. Ducasse, and K.D. Taiwe. Identifying the exact fixing actions of static rule violation. In 22nd IEEE International Conference on Software Analysis, Evolution, and Reengineering, SANER 2015, pages 371–379. Institute of Electrical and Electronics Engineers Inc., 2015. (doi:10.1109/SANER.2015.7081847)
[176]
M. Gatrell, S. Counsell, S. Swift, R.M. Hierons, and X. Liu. Test and production classes of an industrial C# system: A refactoring and fault perspective. In 41st Euromicro Conference on Software Engineering and Advanced Applications, SEAA 2015, pages 35–38. Institute of Electrical and Electronics Engineers Inc., 2015. (doi:10.1109/SEAA.2015.40)
[177]
T. Buchert, L. Nussbaum, and J. Gustedt. Towards complete tracking of provenance in experimental distributed systems research. International Workshops on Parallel Processing Workshops, Euro-Par 2015, 9523:604–616, 2015. (doi:10.1007/978-3-319-27308-2_49)
[178]
M. Ceccato, A. Capiluppi, P. Falcarin, and C. Boldyreff. A large study on the effect of code obfuscation on the quality of java code. Empirical Software Engineering, 20(6):1486–1524, 2015. (doi:10.1007/s10664-014-9321-0)
[179]
H. Groenda, S. Seifermann, K. Müller, and G. Jaworek. The cooperate assistive teamwork environment for software description languages. 13th European Conference on the Advancement of Assistive Technology, AAATE 2015, 217:111–118, 2015. (doi:10.3233/978-1-61499-566-1-111)
[180]
J.L. Johnson, H. tom Wörden, and K. van Wijk. PLACE: An open-source Python package for laboratory automation, control, and experimentation. Journal of Laboratory Automation, 20(1):10–16, 2015. (doi:10.1177/2211068214553022)
[181]
Z.J. Estrada, C. Pham, F. Deng, Z. Kalbarczyk, R.K. Iyer, and L. Yan. Dynamic VM dependability monitoring using hypervisor probes. In 11th European Dependable Computing Conference, EDCC 2015, pages 61–72. Institute of Electrical and Electronics Engineers Inc., 2015. (doi:10.1109/EDCC.2015.9)
[182]
F.A. Fontana, V. Ferme, M. Zanoni, and A. Yamashita. Automatic metric thresholds derivation for code smell detection. In 6th International Workshop on Emerging Trends in Software Metrics, WETSoM 2015, volume 2015-August, pages 44–53. IEEE Computer Society, 2015. (doi:10.1109/WETSoM.2015.14)
[183]
Q.D. Soetens, J. Pérez, S. Demeyer, and A. Zaidman. Circumventing refactoring masking using fine-grained change recording. In 14th International Workshop on Principles of Software Evolution, IWPSE 2015, volume 30-Aug-2015, pages 9–18. Institute of Electrical and Electronics Engineers Inc., 2015. (doi:10.1145/2804360.2804362)
[184]
Abha Lessing, Christophe Schnelle, Paul William Leslie, and Geoffrey John Nolan. MALTweb multi-axis viewing interface and higher level scoping. United States Patent 8,972,846, March 2015. Assignee: Timebase Pty Limited (Sydney NSW, AU).
[185]
Abha Lessing, Christophe Schnelle, and Peter Mariani. Maltweb multi-axis viewing interface and higher level scoping. United States Patent 8,983,955, March 2015. Assignee: Timebase PTY Limited (Sydney NSW, AU).
[186]
K. Blincoe and D. Damian. Implicit coordination: A case study of the rails OSS project. 11th IFIP WG 2.13 International Conference on Open Source Systems, OSS 2015, 451:35–44, 2015. (doi:10.1007/978-3-319-17837-0_4)
[187]
M. Alenezi and M. Zarour. Modularity measurement and evolution in object-oriented open-source projects. In 2015 International Conference on Engineering and MIS, ICEMIS 2015, volume 24-26-September-2015. Association for Computing Machinery, 2015. (doi:10.1145/2832987.2833013)
[188]
Z. Mushtaq and G. Rasool. Multilingual source code analysis: State of the art and challenges. In 9th International Conference on Open Source Systems and Technologies, ICOSST 2015, pages 170–175. Institute of Electrical and Electronics Engineers Inc., 2015. (doi:10.1109/ICOSST.2015.7396422)
[189]
I. Bluemke and A. StepieŃ. Experiment on defect prediction. 10th International Conference on Dependability and Complex Systems, DepCoS-RELCOMEX 2015, 365:25–34, 2015. (doi:10.1007/978-3-319-19216-1_3)
[190]
M. Gatrell and S. Counsell. The effect of refactoring on change and fault-proneness in commercial C# software. Science of Computer Programming, 102:44–56, 2015. (doi:10.1016/j.scico.2014.12.002)
[191]
M. Konôpka and M. Bieliková. Software developer activity as a source for identifying hidden source code dependencies. 41st International Conference on Current Trends in Theory and Practice of Computer Science, SOFSEM 2015, 8939:449–462, 2015.
[192]
T. Galinac Grbac and D. Huljenić. On the probability distribution of faults in complex software systems. Information and Software Technology, 58:250–258, 2015. (doi:10.1016/j.infsof.2014.06.014)
[193]
B.T. Sampath Kumar and K.R. Prithviraj. Bringing life to dead: Role of Wayback Machine in retrieving vanished URLs. Journal of Information Science, 41(1):71–81, 2015. (doi:10.1177/0165551514552752)
[194]
M. Dolores Gallego, S. Bueno, F. José Racero, and J. Noyes. Open source software: The effects of training on acceptance. Computers in Human Behavior, 49:390–399, 2015. (doi:10.1016/j.chb.2015.03.029)
[195]
N. Senthil Madasamy and T. Revathi. Secure concurrent communication predicament with solutions in peer-to-peer network. ARPN Journal of Engineering and Applied Sciences, 10(9):4097–4104, 2015.
[196]
N. Shah. Sluts 'r' us: Intersections of gender, protocol and agency in the digital age. First Monday, 20(4), 2015. (doi:10.5210/fm.v20i4.5463)
[197]
I. Sila. The state of empirical research on the adoption and diffusion of business-to-business e-commerce. International Journal of Electronic Business, 12(3):258–301, 2015. (doi:10.1504/IJEB.2015.071386)
[198]
E. Jung. A persistent web data architecture with named data networking. Lecture Notes in Electrical Engineering, 373:153–158, 2015. (doi:10.1007/978-981-10-0281-6_22)
[199]
Rod Cope. Analyzing content using abstractable interchangeable elements. United States Patent 9,092,487, July 2015. Assignee: OpenLogic, Inc. (Broomfield, CO).
[200]
Anthony Rose. Filter for a distributed network. United States Patent 9,098,683, August 2015. Assignee: Global File Systems Holdings, LLC (Sherman Oaks, CA).
[201]
S. Delbruel, D. Frey, and F. Taïani. Decentralized view prediction for global content placement. In 14th Workshop on Adaptive and Reflective Middleware, ARM 2015. Association for Computing Machinery, Inc, 2015. (doi:10.1145/2834965.2834974)
[202]
R. Malhotra, A. Chug, and P. Khosla. Prioritization of classes for refactoring: A step towards improvement in software quality. In 3rd International Symposium on Women in Computing and Informatics, WCI 2015, volume 10-13-August-2015, pages 228–234. Association for Computing Machinery, 2015. (doi:10.1145/2791405.2791463)
[203]
M. Waterman, J. Noble, and G. Allan. How much up-front? a grounded theory of agile architecture. In 37th IEEE/ACM International Conference on Software Engineering, ICSE 2015, volume 1, pages 347–357. IEEE Computer Society, 2015. (doi:10.1109/ICSE.2015.54)
[204]
H. Uchimiya, S. Ogata, and K. Kaijiri. Method mining in experimental software engineering. In 2014 2nd International Conference on Systems and Informatics, ICSAI 2014, pages 1012–1016. Institute of Electrical and Electronics Engineers Inc., 2015. (doi:10.1109/ICSAI.2014.7009433)
[205]
D. Holstein, T.W. Cease, and M.G. Seewald. Application and management of cybersecurity measures for protection and control. In 7th International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, CyberC 2015, pages 76–83. Institute of Electrical and Electronics Engineers Inc., 2015. (doi:10.1109/CyberC.2015.80)
[206]
T. Hartmann, A. Moawad, F. Fouquet, G. Nain, J. Klein, and Y. Le Traon. Stream my models: Reactive peer-to-peer distributed models@run.time. In 18th ACM/IEEE International Conference on Model Driven Engineering Languages and Systems, MODELS 2015, pages 80–89. Institute of Electrical and Electronics Engineers Inc., 2015. (doi:10.1109/MODELS.2015.7338238)
[207]
F. Medeiros, C. Kästner, M. Ribeiro, S. Nadi, and R. Gheyi. The love/hate relationship with the C preprocessor: An interview study. In 29th European Conference on Object-Oriented Programming, ECOOP 2015, volume 37, pages 495–518. Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, 2015. (doi:10.4230/LIPIcs.ECOOP.2015.495)
[208]
M. Teixeira, R. Ribeiro, M. Barbosa, F. Enembreck, and R. Massa. A modeling architecture for the orchestration of service components in factory automation. In 20th IEEE International Conference on Emerging Technologies and Factory Automation, ETFA 2015, volume 2015-October. Institute of Electrical and Electronics Engineers Inc., 2015. (doi:10.1109/ETFA.2015.7301446)
[209]
R. Jabangwe, J. Börstler, and K. Petersen. Handover of managerial responsibilities in global software development: a case study of source code evolution and quality. Software Quality Journal, 23(4):539–566, 2015. (doi:10.1007/s11219-014-9247-1)
[210]
A. Pescador, A. Garmendia, E. Guerra, J.S. Sánchez Cuadrado, and J. De Lara. Pattern-based development of domain-specific modelling languages. In 18th ACM/IEEE International Conference on Model Driven Engineering Languages and Systems, MODELS 2015, pages 166–175. Institute of Electrical and Electronics Engineers Inc., 2015. (doi:10.1109/MODELS.2015.7338247)
[211]
R. Karthika, M. Anandaraj, and K.P. Vijayakumar. Efficient content distribution mechanism in peer to peer networks. International Journal of Applied Engineering Research, 10(49):334–339, 2015.
[212]
J. Ruohonen, S. Hyrynsalmi, and V. Leppänen. Software evolution and time series volatility: An empirical exploration. In 14th International Workshop on Principles of Software Evolution, IWPSE 2015, volume 30-Aug-2015, pages 56–65. Institute of Electrical and Electronics Engineers Inc., 2015. (doi:10.1145/2804360.2804367)
[213]
J. Ruohonen, S. Hyrynsalmi, and V. Leppänen. Exploring the stability of software with time-series cross-sectional data. In 2nd International Workshop on Software Architecture and Metrics, SAM 2015, pages 41–47. Institute of Electrical and Electronics Engineers Inc., 2015. (doi:10.1109/SAM.2015.13)
[214]
J.-P. Tolvanen, V. Djukić, and A. Popovic. Metamodeling for medical devices: Code generation, model-debugging and run-time synchronization. In 6th International Conference on Emerging Ubiquitous Systems and Pervasive Networks, EUSPN 2015, volume 63, pages 539–544. Elsevier, 2015. (doi:10.1016/j.procs.2015.08.382)
[215]
S.A. Licorish, C.W. Lee, B.T.R. Savarimuthu, P. Patel, and S.G. Macdonell. They'll know it when they see it: Analyzing post-release feedback from the Android community. In 21st Americas Conference on Information Systems, AMCIS 2015. Americas Conference on Information Systems, 2015.
[216]
A.M. Bejarano, L.E. Garcıa, and E.E. Zurek. Detection of source code similitude in academic environments. Computer Applications in Engineering Education, 23(1):13–22, 2015. (doi:10.1002/cae.21571)
[217]
M.M. Ferreira, K.A.M. Ferreira, and H.T. Marques-Neto. Mapping the potential change impact in object-oriented software. In 30th Annual ACM Symposium on Applied Computing, SAC 2015, volume 13-17-April-2015, pages 1654–1656. Association for Computing Machinery, 2015. (doi:10.1145/2695664.2696043)
[218]
A.L. Nicolini, A.G. Maguitman, and C.I. Chesñevar. ArgP2P: An argumentative approach for intelligent query routing in P2P networks. 3rd International Workshop on Theory and Applications of Formal Argumentation, TAFA 2015, 9524:194–210, 2015. (doi:10.1007/978-3-319-28460-6_12)
[219]
M. Ebrahimi and S.M.T. Rouhani Rankoohi. An ant-based approach to cluster peers in P2P database systems. Knowledge and Information Systems, 43(1):219–247, 2015. (doi:10.1007/s10115-014-0743-1)
[220]
K. Haribabu and C. Hota. Analysis of floating index caching technique for P2P overlay index propagation. In 16th International Conference on Distributed Computing and Networking, ICDCN 2015, volume 04-07-January-2015. Association for Computing Machinery, 2015. (doi:10.1145/2684464.2684489)
[221]
W.N. Robinson and T. Deng. Data mining behavioral transitions in open source repositories. In 48th Annual Hawaii International Conference on System Sciences, HICSS 2015, volume 2015-March, pages 5280–5289. IEEE Computer Society, 2015. (doi:10.1109/HICSS.2015.622)
[222]
R. Malhotra and A.J. Bansal. Fault prediction considering threshold effects of object-oriented metrics. Expert Systems, 32(2):203–219, 2015. (doi:10.1111/exsy.12078)
[223]
M.H. Almomani and F. Ababneh. The expected opportunity cost and selecting the optimal subset. Applied Mathematical Sciences, 9(131):6507–6519, 2015. (doi:10.12988/ams.2015.58561)
[224]
D.Ó. Coileáin and D. O'Mahony. Accounting and accountability in content distribution architectures: A survey. ACM Computing Surveys, 47(4), 2015. (doi:10.1145/2723701)
[225]
V.M. Deshmukh and G.R. Bamnote. An empirical study of XML parsers across applications. In 1st International Conference on Computing, Communication, Control and Automation, ICCUBEA 2015, pages 396–401. Institute of Electrical and Electronics Engineers Inc., 2015. (doi:10.1109/ICCUBEA.2015.83)
[226]
V.M. Deshmukh and G.R. Bamnote. An empirical evaluation of optimization parameters in XML parsing for performance enhancement. In IEEE International Conference on Computer, Communication and Control, IC4 2015. Institute of Electrical and Electronics Engineers Inc., 2015. (doi:10.1109/IC4.2015.7375582)
[227]
M. Jureczko and L. Madeyski. Cross-project defect prediction with respect to code ownership model: An empirical study. E-Informatica Software Engineering Journal, 9(1):21–35, 2015. (doi:10.5277/e-Inf150102)
[228]
L. Madeyski and M. Jureczko. Which process metrics can significantly improve defect prediction models? an empirical study. Software Quality Journal, 23(3):393–422, 2015. (doi:10.1007/s11219-014-9241-7)
[229]
V. Suganthi and S. Duraisamy. An efficient method for quality estimation in open sourcesoftware using improved particle swarm optimization. International Journal of Applied Engineering Research, 10(1):1791–1806, 2015.
[230]
L. Aversano and M. Tortorella. Analysing the reliability of open source software projects. In 10th International Conference on Software Engineering and Applications, ICSOFT-EA 2015, pages 348–357. SciTePress, 2015.
[231]
T. Clark. XPL: A language for modular homogeneous language embedding. Science of Computer Programming, 98:589–616, 2015. (doi:10.1016/j.scico.2014.08.005)
[232]
M.C. Huang. Using SOA and web 2.0 in web service applications. In International Conference on Network Security and Communication Engineering, NSCE 2014, pages 339–342. CRC Press/Balkema, 2015.
[233]
J.M.G. Smith. Optimal workload allocation in closed queueing networks with state dependent queues. Annals of Operations Research, 231(1):157–183, 2015. (doi:10.1007/s10479-013-1418-0)
[234]
Michael H. Ficco. Distributed media-protection systems and methods to operate the same. United States Patent 9,178,693, November 2015. Assignee: The DIRECTV Group, Inc. (El Segundo, CA).
[235]
Michael H. Ficco. Distributed media-aggregation systems and methods to operate the same. United States Patent 9,225,761, December 2015. Assignee: The DIRECTV Group, Inc. (El Segundo, CA).
[236]
Archana Vidya Menon. Method and system for managing display of personalized advertisements in a user interface (UI) of an on-screen interactive program (IPG). United States Patent 9,106,942, August 2015.
[237]
E. Gebennini, A. Grassi, and C. Fantuzzi. The two-machine one-buffer continuous time model with restart policy. Annals of Operations Research, 231(1):33–64, 2015. (doi:10.1007/s10479-013-1373-9)
[238]
M. Bačıková, J. Porubän, S. Chodarev, and M. Nosál'. Bootstrapping DSLs from user interfaces. In 30th Annual ACM Symposium on Applied Computing, SAC 2015, volume 13-17-April-2015, pages 2115–2118. Association for Computing Machinery, 2015. (doi:10.1145/2695664.2695994)
[239]
A. Heikkinen, T. Koskela, and M. Ylianttila. Performance evaluation of distributed data delivery on mobile devices using WebRTC. In 11th International Wireless Communications and Mobile Computing Conference, IWCMC 2015, pages 1036–1042. Institute of Electrical and Electronics Engineers Inc., 2015. (doi:10.1109/IWCMC.2015.7289225)
[240]
M. Rodriguez, M. Piattini, and C.M. Fernandez. A hard look at software quality: Pilot program uses ISO/IEC 25000 family to evaluate, improve and certify software products. Quality Progress, 48(9):30–36, 2015.
[241]
M. Rodrıguez, O. Pedreira, and C.M. Fernández. Certification of the maintainability of software product. a case study. In XI Jornadas Iberoamericanas de Ingenieria de Software e Ingenieria del Conocimiento, JIISIC 2015 - 11th Ibero-American Conference on Software Engineering and Knowledge Engineering, JIISIC 2015, pages 93–105. Escuela Superior Politecnica de Chimborazo, 2015.
[242]
V. Cosentino, J.L.C. Izquierdo, and J. Cabot. Gitana: A SQL-based Git repository inspector. 34th International Conference on Conceptual Modeling, ER 2015, 9381:329–343, 2015. (doi:10.1007/978-3-319-25264-3_24)
[243]
D. Villatoro, G. Andrighetto, R. Conte, and J. Sabater-Mir. Self-policing through norm internalization: A cognitive solution to the tragedy of the digital commons in social networks. JASSS, 18(2):1–28, 2015.
[244]
J. Augustine, G. Pandurangan, P. Robinson, and E. Upfal. Distributed agreement in dynamic peer-to-peer networks. Journal of Computer and System Sciences, 81(7):1088–1109, 2015. (doi:10.1016/j.jcss.2014.10.005)
[245]
J. Augustine, G. Pandurangan, P. Robinson, S. Roche, and E. Upfal. Enabling robust and efficient distributed computation in dynamic peer-to-peer networks. In 56th IEEE Annual Symposium on Foundations of Computer Science, FOCS 2015, volume 2015-December, pages 350–369. IEEE Computer Society, 2015. (doi:10.1109/FOCS.2015.29)
[246]
O. Stecklina, P. Langendörfer, F. Vater, T. Kranz, and G. Leander. Intrinsic code attestation by instruction chaining for embedded devices. 11th International Conference Security and Privacy in Communication Networks, SecureComm 2015, 164:97–115, 2015. (doi:10.1007/978-3-319-28865-9_6)
[247]
S.R. Choudhary, A. Gorla, and A. Orso. Automated test input generation for android: Are we there yet? In 30th IEEE/ACM International Conference on Automated Software Engineering, ASE 2015, pages 429–440. Institute of Electrical and Electronics Engineers Inc., 2015. (doi:10.1109/ASE.2015.89)
[248]
L.E. Lwakatare, P. Kuvaja, and M. Oivo. Dimensions of devops. 16th International Conference on Agile Software Development, XP 2015, 212:212–217, 2015. (doi:10.1007/978-3-319-18612-2_19)
[249]
R.K. Mahapatra, R. Manzar, and V.S. Bhadauria. Adoption and use of open source infrastructure software by large corporations: The case of MySQL. Journal of Database Management, 26(4):1–17, 2015. (doi:10.4018/JDM.2015100101)
[250]
G.M. Kapitsaki, N.D. Tselikas, and I.E. Foukarakis. An insight into license tools for open source software systems. Journal of Systems and Software, 102:72–87, 2015. (doi:10.1016/j.jss.2014.12.050)
[251]
T.F. Bissyandé, L. Réveillère, J.L. Lawall, Y.-D. Bromberg, and G. Muller. Implementing an embedded compiler using program transformation rules. Software - Practice and Experience, 45(2):177–196, 2015. (doi:10.1002/spe.2225)
[252]
Behzad Shahraray, Andrea Basso, Lee Begeja, David C. Gibbon, Zhu Liu, and Bernard S. Renger. System and method for adaptive playback based on destination. United States Patent 9,026,555, May 2015. Assignee: AT&T Intellectual Property I, L.P. (Atlanta, GA).
[253]
A.H. Ghapanchi and M. Tavana. A longitudinal study of the impact of open source software project characteristics on positive outcomes. Information Systems Management, 32(4):285–298, 2015. (doi:10.1080/10580530.2015.1079999)
[254]
Michael Eddington and Adam Cecchetti. Metaphor based language fuzzing of computer code. United States Patent 9,098,352, August 2015. Assignee: DEJA VU SECURITY, LLC (Seattle, WA).
[255]
T. Chaikalis and A. Chatzigeorgiou. Forecasting java software evolution trends employing network models. IEEE Transactions on Software Engineering, 41(6):582–602, 2015. (doi:10.1109/TSE.2014.2381249)
[256]
R. Josephine Grace Rexilla and P. Shanthi. Optimizing cloud bandwidth and cost using content aware chunk prediction to improve efficiency of retrieval. Indian Journal of Science and Technology, 8(16), 2015. (doi:10.17485/ijst/2015/v8i16/61966)
[257]
A. Hindle. Green mining: a methodology of relating software change and configuration to power consumption. Empirical Software Engineering, 20(2):374–409, 2015. (doi:10.1007/s10664-013-9276-6)
[258]
D. Schall. Social Network-Based Recommender Systems. Springer International Publishing, 2015. (doi:10.1007/978-3-319-22735-1)
[259]
T. Chusho. The classification of matching applications for end-user-initiative development. In International MultiConference of Engineers and Computer Scientists 2015, IMECS 2015, volume 1, pages 476–481. Newswood Limited, 2015.
[260]
S. Karumanchi, J. Li, and A. Squicciarini. Securing resource discovery in content hosting networks. Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, 152:153–173, 2015. (doi:10.1007/978-3-319-23829-6_12)
[261]
F. Felisberto, R. Laza, F. Fdez-Riverola, and A. Pereira. A distributed multiagent system architecture for body area networks applied to healthcare monitoring. BioMed Research International, 2015, 2015. (doi:10.1155/2015/192454)
[262]
S. Campanelli, P. Foglia, and C.A. Prete. An architecture to integrate IEC 61131-3 systems in an IEC 61499 distributed solution. Computers in Industry, 72:47–67, 2015. (doi:10.1016/j.compind.2015.04.002)
[263]
H. Heitkötter, H. Kuchen, and T.A. Majchrzak. Extending a model-driven cross-platform development approach for business apps. Science of Computer Programming, 97(P1):31–36, 2015. (doi:10.1016/j.scico.2013.11.013)
[264]
C. Casalnuovo, B. Vasilescu, P. Devanbu, and V. Filkov. Developer on boarding in GitHub: The role of prior social links and language experience. In 10th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering, ESEC/FSE 2015, pages 817–828. Association for Computing Machinery, Inc, 2015. (doi:10.1145/2786805.2786854)
[265]
J.E. Marynowski, A.O. Santin, and A.R. Pimentel. Method for testing the fault tolerance of MapReduce frameworks. Computer Networks, 86:1–13, 2015. (doi:10.1016/j.comnet.2015.04.009)
[266]
D.M.C. Nascimento, R. Almeida Bittencourt, and C. Chavez. Open source projects in software engineering education: a mapping study. Computer Science Education, 25(1):67–114, 2015. (doi:10.1080/08993408.2015.1033159)
[267]
Kumar Rangarajan, Jonathan M. Sanders, and Tanuj Vohra. Error detection on the stack. United States Patent 9,183,114, November 2015. Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION (Armonk, NY).
[268]
Stylianos Sidiroglou, Angelos D. Keromytis, and Salvatore J. Stolfo. Systems, methods, and media protecting a digital data processing device from attack. United States Patent 9,143,518, September 2015. Assignee: The Trustees of Columbia University in the City of New York (New York, NY).
[269]
L. Ramanathan and S.K. Iyer. A qualitative study on the adoption of open source software in information technology outsourcing organizations. 11th IFIP WG 2.13 International Conference on Open Source Systems, OSS 2015, 451:103–113, 2015. (doi:10.1007/978-3-319-17837-0_10)
[270]
L. Ramanathan and S. Krishnan. An empirical investigation into the adoption of open source software in information technology outsourcing organizations. Journal of Systems and Information Technology, 17(2):167–192, 2015. (doi:10.1108/JSIT-10-2014-0070)
[271]
A. Nazarov. Can you afford to ignore open source software? In 36th Hydrology and Water Resources Symposium: The Art and Science of Water, HWRS 2015, pages 1404–1412. Engineers Australia, 2015.
[272]
V. Zaytsev. Taxonomy of flexible linguistic commitments. In 1st Workshop on Flexible Model Driven Engineering, FlexMDE 2015 - co-located with ACM/IEEE 18th International Conference on Model Driven Engineering Languages and Systems, MoDELS 2015, volume 1470, pages 42–50. CEUR-WS, 2015.
[273]
A. Rastogi. Contributor's performance, participation intentions, its influencers and project performance. In 37th IEEE/ACM International Conference on Software Engineering, ICSE 2015, volume 2, pages 919–922. IEEE Computer Society, 2015. (doi:10.1109/ICSE.2015.292)
[274]
Y. Kashiwabara, T. Ishio, H. Hata, and K. Inoue. Method verb recommendation using association rule mining in a set of existing projects. IEICE Transactions on Information and Systems, E98D(3):627–636, 2015. (doi:10.1587/transinf.2014EDP7276)
[275]
M. Gharehyazie, D. Posnett, B. Vasilescu, and V. Filkov. Developer initiation and social interactions in OSS: A case study of the Apache software foundation. Empirical Software Engineering, 20(5):1318–1353, 2015. (doi:10.1007/s10664-014-9332-x)
[276]
K.L. Narasimhamu, V. Venugopal Reddy, and C.S. Rao. Optimization of buffer allocation in manufacturing system using particle swarm optimization. International Review on Modelling and Simulations, 8(2):212–222, 2015.
[277]
R.S. Alkhawaldeh and J.M. Jose. Experimental study on semi-structured peer-to-peer information retrieval network. 6th International Conference on Labs of the Evaluation Forum, CLEF 2015, 9283:3–14, 2015. (doi:10.1007/978-3-319-24027-5_1)
[278]
J. Teixeira. On the openness of digital platforms/ecosystems. In 11th International Symposium on Open Collaboration, OPENSYM 2015. Association for Computing Machinery, Inc, 2015. (doi:10.1145/2788993.2789829)
[279]
M. Marchesi. 15 years of application of statistical physics methods to the study of software systems. In 6th International Workshop on Emerging Trends in Software Metrics, WETSoM 2015, volume 2015-August, pages 1–2. IEEE Computer Society, 2015. (doi:10.1109/WETSoM.2015.9)
[280]
K. Kasemsap. The role of e-business adoption in the business world. Strategic Infrastructure Development for Economic Growth and Social Change, pages 51–63, 2015. (doi:10.4018/978-1-4666-7470-7.ch005)
[281]
A. Malatras. State-of-the-art survey on P2P overlay networks in pervasive computing environments. Journal of Network and Computer Applications, 55:1–23, 2015. (doi:10.1016/j.jnca.2015.04.014)
[282]
M. Bruntink. Towards base rates in software analytics: Early results and challenges from studying Ohloh. Science of Computer Programming, 97(P1):135–142, 2015. (doi:10.1016/j.scico.2013.11.023)
[283]
R. Shatnawi. Deriving metrics thresholds using log transformation. Journal of Software: Evolution and Process, 27(2):95–113, 2015. (doi:10.1002/smr.1702)
[284]
A. Safarkhanlou, A. Souri, M. Norouzi, and S.E.H. Sardroud. Formalizing and verification of an antivirus protection service using model checking. In 3rd International Conference on Recent Trends in Computing, ICRTC 2015, volume 57, pages 1324–1331. Elsevier, 2015. (doi:10.1016/j.procs.2015.07.443)
[285]
S. Mukherjee. Video Games and Storytelling: Reading Games and Playing Books. Palgrave Macmillan, 2015. (doi:10.1057/9781137525055)
[286]
Y. Radziwill. Cyber-attacks and the exploitable imperfections of international law. Brill, 2015. (doi:10.1163/9789004298309)
[287]
R.A. Abouhogail. Network security and metrology: A survey. International Journal of Security and its Applications, 9(11):251–270, 2015. (doi:10.14257/ijsia.2015.9.11.24)
[288]
P. Chakraborty. Fifty years of peephole optimization. Current Science, 108(12):2186–2190, 2015.
[289]
E. Vasilomanolakis, S. Karuppayah, M. Muhlhauser, and M. Fischer. Taxonomy and survey of collaborative intrusion detection. ACM Computing Surveys, 47(4), 2015. (doi:10.1145/2716260)