- [1]
- P. He,
B. Li, X. Liu, J. Chen, and
Y. Ma.
An empirical study on software defect prediction with a simplified metric set.
Information and Software Technology, 59:170–190, 2015.
(doi:10.1016/j.infsof.2014.11.006)
- [2]
- W. Li,
W. Guo, and E. Franzinelli.
Achieving dynamic workload balancing for P2P volunteer computing.
In 44th Annual Conference of the International Conference on Parallel
Processing Workshops, ICPPW 2015, volume 2015-January, pages 240–249.
Institute of Electrical and Electronics Engineers Inc., 2015.
(doi:10.1109/ICPPW.2015.34)
- [3]
- W. Mo,
B. Shen, Y. He, and H. Zhong.
GEMiner: Mining social and programming behaviors to identify experts in
GitHub.
In 7th Asia-Pacific Symposium on Internetware, Internetware 2015,
volume 06-November-2015, pages 93–101. Association for Computing Machinery,
2015.
(doi:10.1145/2875913.2875924)
- [4]
- L. Li,
J. Wang, and Y. Hui.
ReliableTrust: Trust model based on professional knowledge node of local
knowledge for a reliable request.
Journal of Computational Information Systems, 11(18):6589–6596,
2015.
(doi:10.12733/jcis15354)
- [5]
- Y. Qu,
X. Guan, Q. Zheng, T. Liu,
L. Wang, Y. Hou, and Z. Yang.
Exploring community structure of software call graph and its applications in
class cohesion measurement.
Journal of Systems and Software, 108:193–210, 2015.
(doi:10.1016/j.jss.2015.06.015)
- [6]
- Y. Li,
Y. Cheng, V. Gligor, and
A. Perrig.
Establishing software-only root of trust on embedded systems: Facts and
fiction.
23rd International Workshop on Security Protocols, 2015,
9379:50–68, 2015.
(doi:10.1007/978-3-319-26096-9_7)
- [7]
- Q. Do,
B. Martini, and K.-K.R. Choo.
Exfiltrating data from Android devices.
Computers and Security, 48:74–91, 2015.
(doi:10.1016/j.cose.2014.10.016)
- [8]
- T.-Y. Wu,
J.-S. Pan, C.-M. Chen, and C.-W.
Lin.
Towards SQL injection attacks detection mechanism using parse tree.
8th International Conference on Genetic and Evolutionary Computing, ICGEC
2014, 329:371–380, 2015.
(doi:10.1007/978-3-319-12286-1_38)
- [9]
- Jian
Ni, Jie Lin, Steven J. Harrington, and
Naveen Sharma.
Two-level
structured overlay design for cluster management in a peer-to-peer
network.
United States Patent 9,015,342, April 2015.
Assignee: Xerox Corporation (Norwalk, CT).
- [10]
- A. Muñoz, M. Urueña,
R. Aparicio, and G. Rodrıguez De
Los Santos.
Digital wiretap warrant: Improving the security of ETSI lawful
interception.
Digital Investigation, 14:1–16, 2015.
(doi:10.1016/j.diin.2015.04.005)
- [11]
- B. Xu and
D. Li.
An empirical study of the motivations for content contribution and community
participation in Wikipedia.
Information and Management, 52(3):275–286, 2015.
(doi:10.1016/j.im.2014.12.003)
- [12]
- Jian
Ni and Jie Lin.
Two-level
structured overlay design for cluster management in a peer-to-peer
network.
United States Patent 9,026,628, May 2015.
Assignee: Xerox Corporation (Norwalk, CT).
- [13]
- Z. Al-Mousa and Q. Nasir.
cl-CIDPS: A cloud computing based cooperative intrusion detection and
prevention system framework.
1st International Conference on Future Network Systems and Security, FNSS
2015, 523:181–194, 2015.
(doi:10.1007/978-3-319-19210-9_13)
- [14]
- M. De Bayser, L.G. Azevedo,
and R. Cerqueira.
ResearchOps: The case for DevOps in scientific applications.
In 14th IFIP/IEEE International Symposium on Integrated Network
Management, IM 2015, pages 1398–1404. Institute of Electrical and
Electronics Engineers Inc., 2015.
(doi:10.1109/INM.2015.7140503)
- [15]
- D. Di Ruscio, D.S. Kolovos,
I. Korkontzelos, N. Matragkas, and
J.J. Vinju.
OSSMETER: A software measurement platform for automatically analysing open
source software projects.
In 10th Joint Meeting of the European Software Engineering Conference and
the ACM SIGSOFT Symposium on the Foundations of Software Engineering,
ESEC/FSE 2015, pages 970–973. Association for Computing Machinery,
Inc, 2015.
(doi:10.1145/2786805.2803186)
- [16]
- A.B. Al-Badareen, J.-M.
Desharnais, and A. Abran.
A suite of rules for developing and evaluating software quality models.
25th International Workshop on Software Measurement, IWSM 2015 and 10th
International Conference on Software Process and Product Measurement, Mensura
2015, 230:1–13, 2015.
(doi:10.1007/978-3-319-24285-9_1)
- [17]
- S. De Kinderen and Q. Ma.
Requirements engineering for the design of conceptual modeling languages.
Applied Ontology, 10(1):7–24, 2015.
(doi:10.3233/AO-150139)
- [18]
- J. Al Dallal.
Accounting for data encapsulation in the measurement of object-oriented class
cohesion.
Journal of Software: Evolution and Process, 27(5):373–400, 2015.
(doi:10.1002/smr.1714)
- [19]
- H. Ren,
W. Mo, G. Zhao, D. Ren, and
S. Liu.
Breadth first search based cosine software code framework automation algorithm.
In ASME 2015 Power Conference, POWER 2015, collocated with the ASME 2015
9th International Conference on Energy Sustainability, the ASME 2015 13th
International Conference on Fuel Cell Science, Engineering and Technology,
and the ASME 2015 Nuclear Forum, volume 2015-January. American Society
of Mechanical Engineers (ASME), 2015.
(doi:10.1115/POWER201549855)
- [20]
- Y. Bai,
G. Yin, and H. Wang.
Multi-dimensions of developer trustworthiness assessment in OSS community.
In 13th IEEE International Conference on Trust, Security and Privacy in
Computing and Communications, TrustCom 2014, pages 75–81. Institute
of Electrical and Electronics Engineers Inc., 2015.
(doi:10.1109/TrustCom.2014.14)
- [21]
- J. Lin,
W.-T. Zhu, Q. Wang, N. Zhang,
J. Jing, and N. Gao.
RIKE+: Using revocable identities to support key escrow in public key
infrastructures with flexibility.
IET Information Security, 9(2):136–147, 2015.
(doi:10.1049/iet-ifs.2013.0552)
- [22]
- D. Qiu,
S. Wang, and D. Xu.
Application of cache in P2P systems.
In Proceedings - 2015 IEEE 12th International Conference on Ubiquitous
Intelligence and Computing, 2015 IEEE 12th International Conference on
Advanced and Trusted Computing, 2015 IEEE 15th International Conference on
Scalable Computing and Communications, 2015 IEEE International Conference on
Cloud and Big Data Computing, 2015 IEEE International Conference on Internet
of People and Associated Symposia/Workshops, UIC-ATC-ScalCom-CBDCom-IoP
2015, pages 1461–1465. Institute of Electrical and Electronics
Engineers Inc., 2015.
(doi:10.1109/UIC-ATC-ScalCom-CBDCom-IoP.2015.263)
- [23]
- L. Gui,
R. Shen, Y. Yu, D. Feng,
Y. Peng, and W. Liu.
DLG-hypertree: A low-diameter, server-centric datacenter network
architecture.
In 8th IEEE International Conference on Cloud Computing, CLOUD
2015, pages 1077–1080. Institute of Electrical and Electronics
Engineers Inc., 2015.
(doi:10.1109/CLOUD.2015.156)
- [24]
- Q. Fan,
H. Wang, G. Yin, and T. Wang.
Ranking open source software based on crowd wisdom.
In 6th IEEE International Conference on Software Engineering and Service
Science, ICSESS 2015, volume 2015-November, pages 966–972. IEEE
Computer Society, 2015.
(doi:10.1109/ICSESS.2015.7339215)
- [25]
- Y. Qiu,
W. Zhang, W. Zou, J. Liu, and
Q. Liu.
An empirical study of developer quality.
In IEEE International Conference on Software Quality, Reliability and
Security-Companion, QRS-C 2015, pages 202–209. Institute of
Electrical and Electronics Engineers Inc., 2015.
(doi:10.1109/QRS-C.2015.33)
- [26]
- X. Zhu,
L. Zhong, H. Zong, C. Hou, and
N. Zhang.
Understanding of the component-based software evolution by using similarity
measurement.
In 5th International Conference on Computer Engineering and Networks,
CENet 2015, volume 12-13-September-2015. Proceedings of Science (PoS),
2015.
- [27]
- Y. Gil, F. Michel,
V. Ratnakar, M. Hauder,
C. Duffy, H. Dugan, and
P. Hanson.
A task-centered framework for computationally-grounded science collaborations.
In 11th IEEE International Conference on eScience, eScience 2015,
pages 352–361. Institute of Electrical and Electronics Engineers Inc., 2015.
(doi:10.1109/eScience.2015.76)
- [28]
- T. Van Der Storm and J.J.
Vinju.
Towards multilingual programming environments.
Science of Computer Programming, 97(P1):143–149, 2015.
(doi:10.1016/j.scico.2013.11.041)
- [29]
- Z. Lin and J. Whitehead.
Why power laws? an explanation from fine-grained code changes.
In 12th Working Conference on Mining Software Repositories, MSR
2015, volume 2015-August, pages 68–75. IEEE Computer Society, 2015.
(doi:10.1109/MSR.2015.14)
- [30]
- W. Shi and A. Afanasyev.
RepoSync: Combined action-based and data-based synchronization model in
named data network.
In IEEE Conference on Computer Communications Workshops, INFOCOM WKSHPS
2015, volume 2015-August, pages 275–280. Institute of Electrical and
Electronics Engineers Inc., 2015.
(doi:10.1109/INFCOMW.2015.7179397)
- [31]
- S. Hai-Jew.
Conducting semantic-based network analyses from social media data: Extracted
insights about the data leakage movement.
In Design Strategies and Innovations in Multimedia Presentations,
pages 369–427. IGI Global, 2015.
(doi:10.4018/978-1-4666-8696-0.ch011)
- [32]
- W. Wang,
B. Li, and P. He.
An analysis of the evolution of developers' role in open-source software
community.
Complex Systems and Complexity Science, 12(1):1–7, 2015.
(doi:10.13306/j.1672-3813.2015.01.001)
- [33]
- X. Wang, N.L. Or,
Z. Lu, and D. Pao.
Hardware accelerator to detect multi-segment virus patterns.
Computer Journal, 58(10):2443–2460, 2015.
(doi:10.1093/comjnl/bxu079)
- [34]
- W. Wang, N. Niu,
H. Liu, and Y. Wu.
Tagging in assisted tracing.
In 8th IEEE/ACM International Symposium on Software and Systems
Traceability, SST 2015, pages 8–14. Institute of Electrical and
Electronics Engineers Inc., 2015.
(doi:10.1109/SST.2015.9)
- [35]
- T. Peng, C.-H. Chi,
A. Chiasera, G. Armellin,
M. Ronchetti, and C. Matteotti.
Modeling and composition of environment-as-a-service.
In IEEE International Conference on Services Computing, SCC 2015,
pages 443–450. Institute of Electrical and Electronics Engineers Inc., 2015.
(doi:10.1109/SCC.2015.67)
- [36]
- W. Wang,
G. Poo-Caamaño, E. Wilde, and
D.M. German.
What is the GIST? understanding the use of public gists on GitHub.
In 12th Working Conference on Mining Software Repositories, MSR
2015, volume 2015-August, pages 314–323. IEEE Computer Society, 2015.
(doi:10.1109/MSR.2015.36)
- [37]
- X. Zhao,
Z. Wang, X. Fan, and Z. Wang.
A clustering-bayesian network based approach for test case prioritization.
In 39th IEEE Annual Computer Software and Applications Conference
Workshops, COMPSACW 2015, volume 3, pages 542–547. IEEE Computer
Society, 2015.
(doi:10.1109/COMPSAC.2015.154)
- [38]
- S. Kaur, K. Kaur, and
N. Kaur.
An empirical investigation of relationship between software metrics.
In 2nd IEEE International Conference on Advances in Computing and
Communication Engineering, ICACCE 2015, pages 639–643. Institute of
Electrical and Electronics Engineers Inc., 2015.
(doi:10.1109/ICACCE.2015.23)
- [39]
- A. Kaur,
K. Kaur, and H. Kaur.
An investigation of the accuracy of code and process metrics for defect
prediction of mobile applications.
In 4th International Conference on Reliability, Infocom Technologies and
Optimization, ICRITO 2015. Institute of Electrical and Electronics
Engineers Inc., 2015.
(doi:10.1109/ICRITO.2015.7359220)
- [40]
- L. Chen,
B. Fang, Z. Shang, and Y. Tang.
Negative samples reduction in cross-company software defects prediction.
Information and Software Technology, 62(1):67–77, 2015.
(doi:10.1016/j.infsof.2015.01.014)
- [41]
- A. Kaur,
K. Kaur, and K. Pathak.
A proposed new model for maintainability index of open source software.
In 2014 3rd International Conference on Reliability, Infocom Technologies
and Optimization, ICRITO 2014. Institute of Electrical and Electronics
Engineers Inc., 2015.
(doi:10.1109/ICRITO.2014.7014758)
- [42]
- E. Shaw,
A. Shaw, and D. Umphress.
Mining Android apps to predict market ratings.
In 2014 6th International Conference on Mobile Computing, Applications
and Services, MobiCASE 2014, pages 166–167. Institute of Electrical
and Electronics Engineers Inc., 2015.
(doi:10.4108/icst.mobicase.2014.257773)
- [43]
- X. Chen,
G. Sime, C. Lutteroth, and
G. Weber.
OAuthHub-a service for consolidating authentication services.
In 19th IEEE International Enterprise Distributed Object Computing
Conference Workshps and Demonstrations, EDOCW 2015, volume
2015-November, pages 201–210. Institute of Electrical and Electronics
Engineers Inc., 2015.
(doi:10.1109/EDOC.2015.36)
- [44]
- L. Kong,
G. Bauer, and J. Hale.
Robust wireless signal indoor localization.
Concurrency Computation, 27(11):2839–2850, 2015.
(doi:10.1002/cpe.3443)
- [45]
- J. Lima,
C. Treude, F.F. Filho, and
U. Kulesza.
Assessing developer contribution with repository mining-based metrics.
In 31st IEEE International Conference on Software Maintenance and
Evolution, ICSME 2015, pages 536–540. Institute of Electrical and
Electronics Engineers Inc., 2015.
(doi:10.1109/ICSM.2015.7332509)
- [46]
- R. Dyer,
H.A. Nguyen, H. Rajan, and T.N.
Nguyen.
Boa: Ultra-large-scale software repository and source-code mining.
ACM Transactions on Software Engineering and Methodology, 25(1),
2015.
(doi:10.1145/2803171)
- [47]
- J. Ruan,
T. Samatsu, and Y. Shi.
A similarity-based M(1,2,3) approach and its application in rating the
security of network systems.
International Journal of Innovative Computing, Information and
Control, 11(6):2177–2191, 2015.
- [48]
- Y. Tian,
M. Nagappan, D. Lo, and A.E.
Hassan.
What are the characteristics of high-rated apps? a case study on free Android
applications.
In 31st IEEE International Conference on Software Maintenance and
Evolution, ICSME 2015, pages 301–310. Institute of Electrical and
Electronics Engineers Inc., 2015.
(doi:10.1109/ICSM.2015.7332476)
- [49]
- P. Bahr,
J. Berthold, and M. Elsman.
Certified symbolic management of financial multi-party contracts.
In 20th ACM SIGPLAN International Conference on Functional Programming,
ICFP 2015, volume 2015-August, pages 315–327. Association for
Computing Machinery, 2015.
(doi:10.1145/2784731.2784747)
- [50]
- G. Vale,
D. Albuquerque, E. Figueiredo, and
A. Garcia.
Defining metric thresholds for software product lines: A comparative study.
In 19th International Software Product Line Conference, SPLC 2015,
volume 20-24-July-2015, pages 176–185. Association for Computing Machinery,
2015.
(doi:10.1145/2791060.2791078)
- [51]
- S.Y.
Köse, L. Demir, S. Tunal, and
D.T. Eliiyi.
Capacity improvement using simulation optimization approaches: A case study
in the thermotechnology industry.
Engineering Optimization, 47(2):149–164, 2015.
(doi:10.1080/0305215X.2013.875166)
- [52]
- M.M.
Hall, C.B. Jones, and P. Smart.
Spatial natural language generation for location description in photo captions.
12th International Conference on Spatial Information Theory, COSIT
2015, 9368:196–223, 2015.
(doi:10.1007/978-3-319-23374-1_10)
- [53]
- John D. Mehr, Elissa E. S.
Murphy, Navjot Virk, and Lara M. Sosnosky.
Hybrid
distributed and cloud backup architecture.
United States Patent 8,935,366, January 2015.
Assignee: Microsoft Corporation (Redmond, WA).
- [54]
- Casparus Cate, James J.
Fitzgibbon, Robert R. Keller, Jr., Cory
Sorice, James Scott Murray, Gregory John
Stanek, and Colin Barns Willmott.
Barrier
operator feature enhancement.
United States Patent 9,122,254, September 2015.
Assignee: The Chamberlain Group, Inc. (Elmhurst, IL).
- [55]
- Casparus Cate, James J.
Fitzgibbon, Robert R. Keller, Jr.,
Sapta Gireesh Pudipeddi, and Cory Sorice.
Barrier
operator feature enhancement.
United States Patent 9,141,099, September 2015.
Assignee: The Chamberlain Group, Inc. (Elmhurst, IL).
- [56]
- X. Zhou
and Z. Yu.
A novel approach for the selection of super peers in P2P networks.
ICIC Express Letters, 9(2):551–556, 2015.
- [57]
- G.M. Rama
and A. Kak.
Some structural measures of API usability.
Software - Practice and Experience, 45(1):75–110, 2015.
(doi:10.1002/spe.2215)
- [58]
- D. Jing
and H. Yang.
Creative computing for bespoke ideation.
In 2015 IEEE 39th Annual Computer Software and Applications Conference -
Stephen S. Yau Academic Symposium, COMPSAC 2015, volume 1, pages
34–43. IEEE Computer Society, 2015.
(doi:10.1109/COMPSAC.2015.203)
- [59]
- M. Kaya and S.A. Özel.
Integrating an online compiler and a plagiarism detection tool into the
Moodle distance education system for easy assessment of programming
assignments.
Computer Applications in Engineering Education, 23(3):363–373,
2015.
(doi:10.1002/cae.21606)
- [60]
- Y. Zhao
and S.S.M. Chow.
Privacy preserving collaborative filtering from asymmetric randomized encoding.
19th International Conference on Financial Cryptography and Data
Security, FC 2015, 8975:459–477, 2015.
(doi:10.1007/978-3-662-47854-7_28)
- [61]
- L. Yang
and C.L. Henry.
How ARL academic libraries present open web resources — a proposed solution
to address discoverability.
Journal of Academic Librarianship, 41(5):629–635, 2015.
(doi:10.1016/j.acalib.2015.06.018)
- [62]
- N. Choi and J.A. Pruett.
The characteristics and motivations of library open source software developers:
An empirical study.
Library and Information Science Research, 37(2):109–117, 2015.
(doi:10.1016/j.lisr.2015.02.007)
- [63]
- M. Aram and G. Neumann.
Multilayered analysis of co-development of business information systems.
Journal of Internet Services and Applications, 6(1), 2015.
(doi:10.1186/s13174-015-0030-8)
- [64]
- B. Suri and S. Singhal.
Investigating the OO characteristics of software using CKJM metrics.
In 4th International Conference on Reliability, Infocom Technologies and
Optimization, ICRITO 2015. Institute of Electrical and Electronics
Engineers Inc., 2015.
(doi:10.1109/ICRITO.2015.7359254)
- [65]
- S.Y. Kose and O. Kilincci.
Hybrid approach for buffer allocation in open serial production lines.
Computers and Operations Research, 60:67–78A, 2015.
(doi:10.1016/j.cor.2015.01.009)
- [66]
- S.Y.
Kose and O. Kilincci.
Analyzing buffer allocations using utilization-based search methods.
In 45th International Conference on Computers and Industrial Engineering,
CIE 2015. Universite de Lorraine, 2015.
- [67]
- Jonathan Salz and Richard S.
Tibbetts.
Stream
processor with compiled programs.
United States Patent 9,038,041, May 2015.
Assignee: TIBCO Software, Inc. (Palo Alto, CA).
- [68]
- G. Vale and E. Figueiredo.
A method to derive metric thresholds for software product lines.
In 29th Brazilian Symposium on Software Engineering, SBES 2015,
pages 110–119. Institute of Electrical and Electronics Engineers Inc., 2015.
(doi:10.1109/SBES.2015.9)
- [69]
- H.M. Tran and
J. Schönwälder.
DisCaRia — distributed case-based reasoning system for fault management.
IEEE Transactions on Network and Service Management,
12(4):540–553, 2015.
(doi:10.1109/TNSM.2015.2496224)
- [70]
- X. Huang, T. Zhao, and
Y. Cao.
PIR: A domain specific language for multimedia information retrieval.
In Web Design and Development: Concepts, Methodologies, Tools, and
Applications, volume 2-3, pages 748–771. IGI Global, 2015.
(doi:10.4018/978-1-4666-8619-9.ch035)
- [71]
- A. Decan, T. Mens,
M. Claes, and P. Grosjean.
On the development and distribution of r packages: An empirical analysis of
the r ecosystem.
In European Conference on Software Architecture Workshops, ECSAW
2015, volume 07-11-September-2015. Association for Computing
Machinery, 2015.
(doi:10.1145/2797433.2797476)
- [72]
- T. Voigt, S. Flad, and
P. Struss.
Model-based fault localization in bottling plants.
Advanced Engineering Informatics, 29(1):101–114, 2015.
(doi:10.1016/j.aei.2014.09.007)
- [73]
- G. Szoke, C. Nagy,
P. Hegedus, R. Ferenc, and
T. Gyimothy.
Do automatic refactorings improve maintainability? an industrial case study.
In 31st IEEE International Conference on Software Maintenance and
Evolution, ICSME 2015, pages 429–438. Institute of Electrical and
Electronics Engineers Inc., 2015.
(doi:10.1109/ICSM.2015.7332494)
- [74]
- R. Kikas, M. Dumas, and
D. Pfahl.
Issue dynamics in github projects.
16th International Conference on Product-Focused Software Process
Improvement, PROFES 2015, 9459:295–310, 2015.
(doi:10.1007/978-3-319-26844-6_22)
- [75]
- S. Amann, S. Beyer,
K. Kevic, and H. Gall.
Software mining studies: Goals, approaches, artifacts, and replicability.
10th LASER Summer School on Software Engineering: Software for the Cloud
and Big Data, LASER 2013–2014, 8987:121–158, 2015.
(doi:10.1007/978-3-319-28406-4_5)
- [76]
- G. Dèvai, D. Leskò,
and M. Tejfel.
The EDSL's struggle for their sources.
Lecture Notes in Computer Science (including subseries Lecture Notes in
Artificial Intelligence and Lecture Notes in Bioinformatics),
8606:300–335, 2015.
(doi:10.1007/978-3-319-15940-9_7)
- [77]
- J. Smeds, K. Nybom, and
I. Porres.
DevOps: A definition and perceived adoption impediments.
16th International Conference on Agile Software Development, XP
2015, 212:166–177, 2015.
(doi:10.1007/978-3-319-18612-2_14)
- [78]
- N. Gupta, D. Singh, and
A. Sharma.
Identifying effective software metrics for categorical defect prediction using
structural equation modeling.
In 3rd International Symposium on Women in Computing and Informatics, WCI
2015, volume 10-13-August-2015, pages 59–65. Association for
Computing Machinery, 2015.
(doi:10.1145/2791405.2791484)
- [79]
- S. Naval, V. Laxmi,
M. Rajarajan, M.S. Gaur, and
M. Conti.
Employing program semantics for malware detection.
IEEE Transactions on Information Forensics and Security,
10(12):2591–2604, 2015.
(doi:10.1109/TIFS.2015.2469253)
- [80]
- P. Mehta, J. Sharda, and
M.L. Das Maniklal.
Sqlshield: Preventing SQL injection attacks by modifying user input data.
11th International Conference on Information Systems Security, ICISS
2015, 9478:192–206, 2015.
(doi:10.1007/978-3-319-26961-0_12)
- [81]
- B. Wulff, A. Wilson,
B. Jost, and M. Ketterl.
An adopter centric API and visual programming interface for the definition of
strategies for automated camera tracking.
In 17th IEEE International Symposium on Multimedia, ISM 2015,
pages 587–592. Institute of Electrical and Electronics Engineers Inc., 2015.
(doi:10.1109/ISM.2015.106)
- [82]
- G. Bajwa, M. Fazeen,
R. Dantu, and S. Tanpure.
Unintentional bugs to vulnerability mapping in Android applications.
In 13th IEEE International Conference on Intelligence and Security
Informatics, ISI 2015, pages 176–178. Institute of Electrical and
Electronics Engineers Inc., 2015.
(doi:10.1109/ISI.2015.7165966)
- [83]
- L. Fürst, M. Mernik, and
V. Mahnič.
Converting metamodels to graph grammars: doing without advanced graph grammar
features.
Software and Systems Modeling, 14(3):1297–1317, 2015.
(doi:10.1007/s10270-013-0380-2)
- [84]
- F. Ebert, F. Castor, and
A. Serebrenik.
An exploratory study on exception handling bugs in Java programs.
Journal of Systems and Software, 106:82–101, 2015.
(doi:10.1016/j.jss.2015.04.066)
- [85]
- A. Bates, K.R.B. Butler,
M. Sherr, C. Shields,
P. Traynor, and D. Wallach.
Accountable wiretapping-or-i know they can hear you now.
Journal of Computer Security, 23(2):167–195, 2015.
(doi:10.3233/JCS-140515)
- [86]
- A. Costa, A. Alfieri,
A. Matta, and S. Fichera.
A parallel tabu search for solving the primal buffer allocation problem in
serial production systems.
Computers and Operations Research, 64:97–112, 2015.
(doi:10.1016/j.cor.2015.05.013)
- [87]
- P. Mayer, J. Velasco,
A. Klarl, R. Hennicker,
M. Puviani, F. Tiezzi,
R. Pugliese, J. Keznikl, and
T. Bureš.
The autonomic cloud.
Lecture Notes in Computer Science (including subseries Lecture Notes in
Artificial Intelligence and Lecture Notes in Bioinformatics),
8998:495–512, 2015.
- [88]
- N. Allen, P. Krishnan, and
B. Scholz.
Combining type-analysis with points-to analysis for analyzing Java library
source-code.
In 4th ACM SIGPLAN International Workshop on State of the Art in Program
Analysis, SOAP 2015, pages 13–18. Association for Computing
Machinery, Inc, 2015.
(doi:10.1145/2771284.2771287)
- [89]
- V. Gupta, N. Ganeshan, and
T.K. Singhal.
Determining the root causes of various software bugs throughsoftware metrics.
In 2nd International Conference on Computing for Sustainable Global
Development, INDIACom 2015, pages 1211–1215. Institute of Electrical
and Electronics Engineers Inc., 2015.
- [90]
- R.-I.
Chang, T.-T. Wei, and C.-H. Wang.
A cost-effective key distribution of P2P IPTV DRM over opportunistic
multicast overlay for e-commerce systems.
Electronic Commerce Research, 15(1):49–71, 2015.
(doi:10.1007/s10660-015-9176-5)
- [91]
- F.-M.
Huang, Y.H. Huang, C. Szu,
A.Y.S. Su, M.C. Chen, and Y.S.
Sun.
A study of a life logging smartphone app and its power consumption observation
in location-based service scenario.
In 3rd IEEE International Conference on Mobile Services, MS 2015,
pages 225–232. Institute of Electrical and Electronics Engineers Inc., 2015.
(doi:10.1109/MobServ.2015.40)
- [92]
- Y.C.
Cheng, J.-S. Jwo, and C.-T. Tsai.
A leading indicator of post-release defect density in refactoring-based
software maintenance — a case study.
International Computer Symposium, ICS 2014, 274:1815–1821, 2015.
(doi:10.3233/978-1-61499-484-8-1815)
- [93]
- Yu Zheng, Jianqiao Feng,
Xing Xie, and Wei-Ying Ma.
Detecting
spatial outliers in a location entity dataset.
United States Patent 9,063,226, June 2015.
Assignee: Microsoft Technology Licensing, LLC (Redmond, WA).
- [94]
- L.D.
Couto, P.W.V. Tran-Jorgensen, J.W. Coleman,
and K. Lausdahl.
Migrating to an extensible architecture for abstract syntax trees.
In 12th Working IEEE/IFIP Conference on Software Architecture, WICSA
2015, pages 145–154. Institute of Electrical and Electronics
Engineers Inc., 2015.
(doi:10.1109/WICSA.2015.10)
- [95]
- L.H.
Silva, M. Ramos, M.T. Valente,
A. Bergel, and N. Anquetil.
Does JavaScript software embrace classes?
In 22nd IEEE International Conference on Software Analysis, Evolution,
and Reengineering, SANER 2015, pages 73–82. Institute of Electrical
and Electronics Engineers Inc., 2015.
(doi:10.1109/SANER.2015.7081817)
- [96]
- F.F.
Filho, M.G. Perin, C. Treude,
S. Marczak, L. Melo, I.M.
da Silva, and L.B. dos Santos.
A study on the geographical distribution of Brazil's prestigious software
developers.
Journal of Internet Services and Applications, 6(1), 2015.
(doi:10.1186/s13174-015-0032-6)
- [97]
- Yu Zheng, Chang Sheng, and
Xing Xie.
Recommending
points of interests in a region.
United States Patent 9,009,177, April 2015.
Assignee: Microsoft Corporation (Redmond, WA).
- [98]
- H.J.
Macho, G. Robles, and J.M.
González-Barahona.
Evaluation of FLOSS by analyzing its software evolution: An example using
the moodle platform.
Journal of Information Technology Research, 8(1):62–81, 2015.
(doi:10.4018/JITR.2015010105)
- [99]
- B.R.
Reddy, S. Khurana, and A. Ojha.
Software maintainability estimation made easy — a comprehensive tool COIN.
In 6th International Conference on Computer and Communication Technology,
ICCCT 2015, volume 25-27-September-2015, pages 68–72. Association for
Computing Machinery, 2015.
(doi:10.1145/2818567.2818580)
- [100]
- R.N.
Akram, K. Markantonakis, and K. Mayes.
Enhancing java runtime environment for smart cards against runtime attacks.
20th European Symposium on Research in Computer Security, ESORICS
2015, 9327:541–560, 2015.
(doi:10.1007/978-3-319-24177-7_27)
- [101]
- O.A.L.
Lemos, A.C. De Paula, H. Sajnani, and
C.V. Lopes.
Can the use of types and query expansion help improve large-scale code search?
In IEEE 15th International Working Conference on Source Code Analysis and
Manipulation, SCAM 2015, pages 41–50. Institute of Electrical and
Electronics Engineers Inc., 2015.
(doi:10.1109/SCAM.2015.7335400)
- [102]
- B.T.S.
Kumar, D.V. Kumar, and K.R. Prithviraj.
Wayback machine: Reincarnation to vanished online citations.
Program, 49(2):205–223, 2015.
(doi:10.1108/PROG-07-2013-0039)
- [103]
- Brendan Kitts, Brian Burdick,
Dyng Au, and Tyson Roberts.
Method
and system for automatically targeting ads to television media using
demographic similarity.
United States Patent 9,088,833, July 2015.
Assignee: LUCID COMMERCE, INC. (Seattle, WA).
- [104]
- Brendan Kitts, Brian Burdick,
Dyng Au, and Tyson Roberts.
Targeting
television ads using keywords.
United States Patent 9,161,099, October 2015.
Assignee: Lucid Commerce, Inc. (Seattle, WA).
- [105]
- Raymond E. Ozzie, Jack E.
Ozzie, George P. Moromisato, Paresh S. Suthar,
Raman Narayanan, and Matthew S. Augustine.
Data
synchronization and sharing relationships.
United States Patent 9,203,786, December 2015.
Assignee: Microsoft Technology Licensing, LLC (Redmond, WA).
- [106]
- C.Y.
Chong and S.P. Lee.
Analyzing maintainability and reliability of object-oriented software using
weighted complex network.
Journal of Systems and Software, 110:28–53, 2015.
(doi:10.1016/j.jss.2015.08.014)
- [107]
- K. Jezek and J. Ambroz.
Detecting incompatibilities concealed in duplicated software libraries.
In 41st Euromicro Conference on Software Engineering and Advanced
Applications, SEAA 2015, pages 233–240. Institute of Electrical and
Electronics Engineers Inc., 2015.
(doi:10.1109/SEAA.2015.17)
- [108]
- M. Jarke and C.R. Prause.
Gamification for enforcing coding conventions.
In 10th Joint Meeting of the European Software Engineering Conference and
the ACM SIGSOFT Symposium on the Foundations of Software Engineering,
ESEC/FSE 2015, pages 649–660. Association for Computing Machinery,
Inc, 2015.
(doi:10.1145/2786805.2786806)
- [109]
- C.V.
Lopes and J. Ossher.
How scale affects structure in Java programs.
In 2015 ACM SIGPLAN International Conference on Object-Oriented
Programming, Systems, Languages, and Applications, OOPSLA 2015, volume
25-30-Oct-2015, pages 675–694. Association for Computing Machinery, 2015.
(doi:10.1145/2814270.2814300)
- [110]
- S.M.
Hemam and O. Hioual.
Load balancing by requests redistribution in failure nodes context.
In International Conference on Intelligent Information Processing,
Security and Advanced Communication, IPAC 2015, volume
23-25-November-2015. Association for Computing Machinery, 2015.
(doi:10.1145/2816839.2816847)
- [111]
- Satya V. Gupta and Prashant
Shenoy.
System
and methods for run time detection and correction of memory corruption.
United States Patent 8,966,312, February 2015.
Assignee: Virsec Systems, Inc. (Acton, MA).
- [112]
- C. Biray and F. Buzluca.
A learning-based method for detecting defective classes in object-oriented
systems.
In 2015 8th IEEE International Conference on Software Testing,
Verification and Validation Workshops, ICSTW 2015. Institute of
Electrical and Electronics Engineers Inc., 2015.
(doi:10.1109/ICSTW.2015.7107477)
- [113]
- T. Abdou and P. Kamthan.
A knowledge management approach for testing open source software systems.
In 33rd IEEE International Performance Computing and Communications
Conference, IPCCC 2014. Institute of Electrical and Electronics
Engineers Inc., 2015.
(doi:10.1109/PCCC.2014.7017022)
- [114]
- S. Weiss and R. Stolletz.
Buffer allocation in stochastic flow lines via sample-based optimization with
initial bounds.
OR Spectrum, 37(4):869–902, 2015.
(doi:10.1007/s00291-015-0393-z)
- [115]
- M. Savić and
M. Ivanović.
Validation of static program analysis tools by self-application: A case
study.
In 4th Workshop on Software Quality Analysis, Monitoring, Improvement,
and Applications, SQAMIA 2015, volume 1375, pages 61–68. CEUR-WS,
2015.
- [116]
- B. Hoisl and S. Sobernig.
Consistency rules for uml-based domain-specific language models: A literature
review.
In 8th Joint International Workshop on Model-Based Architecting of
Cyber-Physical and Embedded Systems and 1st International Workshop on UML
Consistency Rules, ACES-MB 2015 and WUCOR 2015, volume 1508, pages
29–36. CEUR-WS, 2015.
- [117]
- B. Urban and B.C. Greyling.
Open source software adoption and links to innovation performance.
International Journal of Technological Learning, Innovation and
Development, 7(3):261–278, 2015.
(doi:10.1504/IJTLID.2015.070379)
- [118]
- N. Nahas and M. Nourelfath.
Buffer allocation, machine selection and preventive maintenance optimization in
unreliable production lines.
In International Conference on Industrial Engineering and Systems
Management, IEEE IESM 2015, pages 1028–1033. Institute of Electrical
and Electronics Engineers Inc., 2015.
(doi:10.1109/IESM.2015.7380281)
- [119]
- E. Azadi Marand,
E. Azadi Marand, and M. Challenger.
DSML4CP: A domain-specific modeling language for concurrent programming.
Computer Languages, Systems and Structures, 44:319–341, 2015.
(doi:10.1016/j.cl.2015.09.002)
- [120]
- G. Bavota, A. De Lucia,
M. Di Penta, R. Oliveto, and
F. Palomba.
An experimental investigation on the innate relationship between quality and
refactoring.
Journal of Systems and Software, 107:1–14, 2015.
(doi:10.1016/j.jss.2015.05.024)
- [121]
- S. Wagner, A. Goeb,
L. Heinemann, M. Kläs,
C. Lampasona, K. Lochmann,
A. Mayr, R. Plösch,
A. Seidl, J. Streit, and
A. Trendowicz.
Operationalised product quality models and assessment: The Quamoco
approach.
Information and Software Technology, 62(1):101–123, 2015.
(doi:10.1016/j.infsof.2015.02.009)
- [122]
- E. Flores, A. Barrõn
Cedeño, L. Moreno, and P. Rosso.
Uncovering source code reuse in large-scale academic environments.
Computer Applications in Engineering Education, 23(3):383–390,
2015.
(doi:10.1002/cae.21608)
- [123]
- K. Tabata, H. Tanno, and
M. Oinuma.
Helping testers by fault-prone functionality prediction.
In 10th Asia-Pacific Symposium on Information and Telecommunication
Technologies, APSITT 2015, pages 94–96. Institute of Electrical and
Electronics Engineers Inc., 2015.
(doi:10.1109/APSITT.2015.7217084)
- [124]
- L. Amorim, E. Costa,
N. Antunes, B. Fonseca, and
M. Ribeiro.
Experience report: Evaluating the effectiveness of decision trees for
detecting code smells.
In 26th IEEE International Symposium on Software Reliability Engineering,
ISSRE 2015, pages 261–269. Institute of Electrical and Electronics
Engineers Inc., 2015.
(doi:10.1109/ISSRE.2015.7381819)
- [125]
- H. Chanti, L. Thiry,
M. Hassenforder, E. Blanchard, and
P. Fromy.
Fire safety DSL based algebra.
In 3rd International Conference on Control, Engineering and Information
Technology, CEIT 2015. Institute of Electrical and Electronics
Engineers Inc., 2015.
(doi:10.1109/CEIT.2015.7233083)
- [126]
- J. Liebig, A. Janker,
F. Garbe, S. Apel, and
C. Lengauer.
Morpheus: Variability-aware refactoring in the wild.
In 37th IEEE/ACM International Conference on Software Engineering, ICSE
2015, volume 1, pages 380–391. IEEE Computer Society, 2015.
(doi:10.1109/ICSE.2015.57)
- [127]
- C. Mateos, M. Crasso,
A. Zunino, and J.L. Ordiales Coscia.
A stitch in time saves nine: Early improving code-first web services
discoverability.
International Journal of Cooperative Information Systems, 24(2),
2015.
(doi:10.1142/S0218843015500045)
- [128]
- G. Godena, T. Lukman,
M. Heričko, and S. Strmčnik.
The experience of implementing model-driven engineering tools in the process
control domain.
Information Technology and Control, 44(2):135–147, 2015.
(doi:10.5755/j01.itc.44.2.6258)
- [129]
- X. Franch, R.S. Kenett,
A. Susi, N. Galanis, R. Glott,
and F. Mancinelli.
Community data for OSS adoption risk management.
The Art and Science of Analyzing Software Data, pages 377–409,
2015.
(doi:10.1016/B978-0-12-411519-4.00014-8)
- [130]
- I. Polato, D. Barbosa,
A. Hindle, and F. Kon.
Hadoop branching: Architectural impacts on energy and performance.
In 6th International Green and Sustainable Computing Conference, IGSC
2015. Institute of Electrical and Electronics Engineers Inc., 2015.
(doi:10.1109/IGCC.2015.7393709)
- [131]
- J. Rasley, E. Gessiou,
T. Ohmann, Y. Brun,
S. Krishnamurthi, and J. Cappos.
Detecting latent cross-platform API violations.
In 26th IEEE International Symposium on Software Reliability Engineering,
ISSRE 2015, pages 484–495. Institute of Electrical and Electronics
Engineers Inc., 2015.
(doi:10.1109/ISSRE.2015.7381841)
- [132]
- S. Bayati, D. Parsons,
T. Susnjak, and M. Heidary.
Big data analytics on large-scale socio-technical software engineering
archives.
In 3rd International Conference on Information and Communication
Technology, ICoICT 2015, pages 65–69. Institute of Electrical and
Electronics Engineers Inc., 2015.
(doi:10.1109/ICoICT.2015.7231398)
- [133]
- F. Camilo, A. Meneely, and
M. Nagappan.
Do bugs foreshadow vulnerabilities? a study of the Chromium project.
In 12th Working Conference on Mining Software Repositories, MSR
2015, volume 2015-August, pages 269–279. IEEE Computer Society, 2015.
(doi:10.1109/MSR.2015.32)
- [134]
- E. Berndt, D. Furniss, and
A. Blandford.
Learning contextual inquiry and distributed cognition: a case study on
technology use in anaesthesia.
Cognition, Technology and Work, 17(3):431–449, 2015.
(doi:10.1007/s10111-014-0314-y)
- [135]
- F. Michel, V. Ratnakar,
Y. Gil, and M. Hauder.
A virtual crowdsourcing community for open collaboration in science processes.
In 21st Americas Conference on Information Systems, AMCIS 2015.
Americas Conference on Information Systems, 2015.
- [136]
- C. Vitolo, Y. Elkhatib,
D. Reusser, C.J.A. Macleod, and
W. Buytaert.
Web technologies for environmental big data.
Environmental Modelling and Software, 63:185–198, 2015.
(doi:10.1016/j.envsoft.2014.10.007)
- [137]
- B. Bryant, J.-M.
Jézéquel, R. Lämmel, M. Mernik,
M. Schindler, F. Steinmann, J.-P.
Tolvanen, A. Vallecillo, and M. Völter.
Globalized domain specific language engineering.
International Dagstuhl Seminar on Globalizing Domain-Specific Languages,
2014, 9400:43–69, 2015.
(doi:10.1007/978-3-319-26172-0_4)
- [138]
- H. Santos, J.F. Pimentel,
V. Torres Da Silva, and L. Murta.
Software rejuvenation via a multi-agent approach.
Journal of Systems and Software, 104:41–59, 2015.
(doi:10.1016/j.jss.2015.02.017)
- [139]
- O. Günalp, C. Escoffier,
and P. Lalanda.
Demo abstract: Reproducible deployment of pervasive applications.
In 13th IEEE International Conference on Pervasive Computing and
Communication, PerCom Workshops 2015, pages 211–213. Institute of
Electrical and Electronics Engineers Inc., 2015.
(doi:10.1109/PERCOMW.2015.7134025)
- [140]
- O. Günalp, C. Escoffier,
and P. Lalanda.
Rondo: A tool suite for continuous deployment in dynamic environments.
In IEEE International Conference on Services Computing, SCC 2015,
pages 720–727. Institute of Electrical and Electronics Engineers Inc., 2015.
(doi:10.1109/SCC.2015.102)
- [141]
- E. Loukis, Y. Charalabidis,
and A. Androutsopoulou.
Evaluating a passive social media citizensourcing innovation.
14th IFIP WG 8.5 International Conference on Electronic Government, EGOV
2015, 9248:305–320, 2015.
(doi:10.1007/978-3-319-22479-4_23)
- [142]
- R. Robbes,
D. Röthlisberger, and É. Tanter.
Object-oriented software extensions in practice.
Empirical Software Engineering, 20(3):745–782, 2015.
(doi:10.1007/s10664-013-9298-0)
- [143]
- A.-K.
Hueske, J. Endrikat, and E. Guenther.
External environment, the innovating organization, and its individuals: A
multilevel model for identifying innovation barriers accounting for social
uncertainties.
Journal of Engineering and Technology Management - JET-M,
35:45–70, 2015.
(doi:10.1016/j.jengtecman.2014.10.001)
- [144]
- D.T.
Nguyen, Q.B. Duong, E. Zamai, and
M.K. Shahzad.
Fault diagnosis for the complex manufacturing system.
Proceedings of the Institution of Mechanical Engineers, Part O: Journal
of Risk and Reliability, 230(2):178–194, 2015.
(doi:10.1177/1748006X15623089)
- [145]
- S.M.
Ghanem, M.A. Ismail, and S.G. Omar.
VITAL: Structured and clustered super-peer network for similarity search.
Peer-to-Peer Networking and Applications, 8(6):965–991, 2015.
(doi:10.1007/s12083-014-0304-0)
- [146]
- R.G.
Shirey, K.M. Hopkinson, K.E. Stewart,
D.D. Hodson, and B.J. Borghetti.
Analysis of implementations to secure git for use as an encrypted distributed
version control system.
In 48th Annual Hawaii International Conference on System Sciences, HICSS
2015, volume 2015-March, pages 5310–5319. IEEE Computer Society,
2015.
(doi:10.1109/HICSS.2015.625)
- [147]
- John M. Harvey, Michael David
Atella, Thomas Francis Doyle, Loyie H. Sims,
III, and Satish N. Ram.
Digital
over-the-air keying system.
United States Patent 9,165,416, October 2015.
Assignee: OMNITRACS, LLC (Dallas, TX).
- [148]
- David D. Brandt, Kenwood
Hall, Mark Burton Anderson, Craig D. Anderson,
and George Bradford Collins.
System
and methodology providing automation security analysis and network intrusion
protection in an industrial environment.
United States Patent 9,009,084, April 2015.
Assignee: Rockwell Automation Technologies, Inc. (Mayfield Heights, OH).
- [149]
- Adrian Perrig, Pradeep
Khosla, Arvind Seshadri, Mark Luk, and
Leendert van Doorn.
Verifying
integrity and guaranteeing execution of code on untrusted computer
platform.
United States Patent 9,177,153, November 2015.
Assignee: Carnegie Mellon University (Pittsburg, PA).
- [150]
- Salvatore J. Stolfo,
Angelos D. Keromytis, Brian M. Bowen,
Shlomo Hershkop, Vasileios P. Kemerlis,
Pratap V. Prabhu, and Malek Ben Salem.
Methods,
systems, and media for baiting inside attackers.
United States Patent 9,009,829, April 2015.
Assignee: The Trustees of Columbia University in the City of New York (New
York, NY).
- [151]
- T. Chusho and J. Xu.
Description and implementation of business logic for end-user-initiative
development.
14th International Conference on New Trends in Intelligent Software
Methodology, Tools, and Techniques, SoMeT 2015, 532:355–366, 2015.
(doi:10.1007/978-3-319-22689-7_27)
- [152]
- L. Hatton and G. Warr.
Protein structure and evolution: Are they constrained globally by a principle
derived from information theory?
PLoS ONE, 10(5), 2015.
(doi:10.1371/journal.pone.0125663)
- [153]
- M. Harari and D. Jobin.
International co-operation.
The OECD Convention on Bribery, pages 486–533, 2015.
(doi:10.1007/CBO9781139565332)
- [154]
- G. Burlet and A. Hindle.
An empirical study of end-user programmers in the computer music community.
In 12th Working Conference on Mining Software Repositories, MSR
2015, volume 2015-August, pages 292–302. IEEE Computer Society, 2015.
(doi:10.1109/MSR.2015.34)
- [155]
- J.T.
Stroud and K.J. Feeley.
Responsible academia: Optimizing conference locations to minimize greenhouse
gas emissions.
Ecography, 38(4):402–404, 2015.
(doi:10.1111/ecog.01366)
- [156]
- M.K.
Chawla and I. Chhabra.
SQMMA: Software quality model for maintainability analysis.
In 8th ACM COMPUTE INDIA Conference, Compute 2015, volume
29-31-October-2015, pages 9–17. Association for Computing Machinery, 2015.
(doi:10.1145/2835043.2835062)
- [157]
- Jr.
Girola, F. and J.L.V. Barbosa.
U-deal: A decentralized trail-aware model for business opportunities
identification.
IEEE Latin America Transactions, 13(5):1640–1648, 2015.
(doi:10.1109/TLA.2015.7112026)
- [158]
- A.-K. Hueske and E. Guenther.
What hampers innovation? External stakeholders, the organization, groups and
individuals: a systematic review of empirical barrier research.
Management Review Quarterly, 65(2):113–148, 2015.
(doi:10.1007/s11301-014-0109-5)
- [159]
- Daniel Willis and Gordon
Freedman.
Method
and system supporting audited reporting of advertising impressions from video
games.
United States Patent 9,180,369, November 2015.
Assignee: Google Inc. (Mountain View, CA).
- [160]
- A. Sotelo and S. Takahashi.
GOLD: A graph oriented language implemented using the eclipse xtext
framework.
In Eclipse Technology eXchange Workshop, ETX 2015, pages 19–24.
Association for Computing Machinery, Inc, 2015.
(doi:10.1145/2846650.2846653)
- [161]
- E. Murphy-Hill,
T. Zimmermann, C. Bird, and
N. Nagappan.
The design space of bug fixes and how developers navigate it.
IEEE Transactions on Software Engineering, 41(1):65–81, 2015.
(doi:10.1109/TSE.2014.2357438)
- [162]
- B.F.D. Santos Neto,
M. Ribeiro, V.T. Da Silva,
C. Braga, C.J.P. De Lucena, and
E. De Barros Costa.
AutoRefactoring: A platform to build refactoring agents.
Expert Systems with Applications, 42(3):1652–1664, 2015.
(doi:10.1016/j.eswa.2014.09.022)
- [163]
- O. Franco-Bedoya, D. Ameller,
D. Costal, and X. Franch.
Measuring the quality of open source software ecosystems using QuESo.
9th International Joint Conference on Software Technologies, ICSOFT
2014, 555:39–62, 2015.
(doi:10.1007/978-3-319-25579-8_3)
- [164]
- J. Pan.
Data leakage triage: Quantitative measure of effectiveness of containment
plan.
International Journal of Information and Computer Security,
7(2-4):240–254, 2015.
(doi:10.1504/IJICS.2015.073032)
- [165]
- C. Sanders, A. Shah, and
S. Zhang.
Comprehensive analysis of the Android google play's auto-update policy.
11th International Conference on Information Security Practice and
Experience, ISPEC 2015, 9065:365–377, 2015.
(doi:10.1007/978-3-319-17533-1_25)
- [166]
- F. Chauvel, H. Song,
N. Ferry, and F. Fleurey.
Evaluating robustness of cloud-based systems.
Journal of Cloud Computing, 4(1), 2015.
(doi:10.1186/s13677-015-0043-7)
- [167]
- M. Mesgari, C. Okoli,
M. Mehdi, F.Å. Nielsen, and
A. Lanamäki.
"the sum of all human knowledge": A systematic review of scholarly research
on the content of Wikipedia.
Journal of the Association for Information Science and Technology,
66(2):219–245, 2015.
(doi:10.1002/asi.23172)
- [168]
- A. Adewumi, O. Emebo,
S. Misra, and L. Fernandez.
Tool support for Cascading Style Sheets' complexity metrics.
4th International Conference on Soft Computing, Intelligent Systems and
Information Technology, ICSIIT 2015, 516:551–560, 2015.
(doi:10.1007/978-3-662-46742-8_50)
- [169]
- A. Adewumi, S. Misra, and
N. Omoregbe.
Evaluating open source software quality models against ISO 25010.
In 15th IEEE International Conference on Computer and Information
Technology, CIT 2015, 14th IEEE International Conference on Ubiquitous
Computing and Communications, IUCC 2015, 13th IEEE International Conference
on Dependable, Autonomic and Secure Computing, DASC 2015 and 13th IEEE
International Conference on Pervasive Intelligence and Computing, PICom
2015, pages 872–877. Institute of Electrical and Electronics
Engineers Inc., 2015.
(doi:10.1109/CIT/IUCC/DASC/PICOM.2015.130)
- [170]
- U. Segundo,
J. López-Cuadrado, L. Aldamiz-Echevarria,
T.A. Pérez, D. Buenestado,
A. Iruetaguena, R. Barrena, and
J.M. Pikatza.
Automatic construction of fuzzy inference systems for computerized clinical
guidelines and protocols.
Applied Soft Computing Journal, 26:257–269, 2015.
(doi:10.1016/j.asoc.2014.09.045)
- [171]
- C. Borrego, S. Robles,
A. Fabregues, and A. Sánchez-Carmona.
A mobile code bundle extension for application-defined routing in delay and
disruption tolerant networking.
Computer Networks, 87:59–77, 2015.
(doi:10.1016/j.comnet.2015.05.017)
- [172]
- P. Priller, W. Gruber,
N. Olberding, and D. Peinsipp.
Towards perfectly scalable real-time systems.
International Conference on Computer Safety, Reliability, and Securitym,
SAFECOMP 2015 and held 3rd International Workshop on Assurance Cases for
Software-Intensive Systems ASSURE 2015, Workshop on Dependable Embedded and
Cyber-Physical Systems and Systems-of-Systems, DECSoS 2015, 2nd International
Workshop on the Integration of Safety and Security Engineering, ISSE 2015,
Workshop on Reliability and Security Aspects for Critical Infrastructure
Protection, ReSA4CI 2015, and 4th InternationalWorkshop on NextGeneration of
System Assurance Approaches for Safety-Critical Systems SASSUR, 2015,
9338:212–223, 2015.
(doi:10.1007/978-3-319-24249-1_19)
- [173]
- M. Cadariu, E. Bouwers,
J. Visser, and A. Van Deursen.
Tracking known security vulnerabilities in proprietary software systems.
In 22nd IEEE International Conference on Software Analysis, Evolution,
and Reengineering, SANER 2015, pages 516–519. Institute of Electrical
and Electronics Engineers Inc., 2015.
(doi:10.1109/SANER.2015.7081868)
- [174]
- J. Hintsch, C. Gorling, and
K. Turowski.
Modularization of software as a service products: A case study of the
configuration management tool Puppet.
In 3rd International Conference on Enterprise Systems, ES 2015,
pages 184–191. Institute of Electrical and Electronics Engineers Inc., 2015.
(doi:10.1109/ES.2015.25)
- [175]
- H. Oumarou, N. Anquetil,
A. Etien, S. Ducasse, and K.D.
Taiwe.
Identifying the exact fixing actions of static rule violation.
In 22nd IEEE International Conference on Software Analysis, Evolution,
and Reengineering, SANER 2015, pages 371–379. Institute of Electrical
and Electronics Engineers Inc., 2015.
(doi:10.1109/SANER.2015.7081847)
- [176]
- M. Gatrell, S. Counsell,
S. Swift, R.M. Hierons, and
X. Liu.
Test and production classes of an industrial C# system: A refactoring and
fault perspective.
In 41st Euromicro Conference on Software Engineering and Advanced
Applications, SEAA 2015, pages 35–38. Institute of Electrical and
Electronics Engineers Inc., 2015.
(doi:10.1109/SEAA.2015.40)
- [177]
- T. Buchert, L. Nussbaum, and
J. Gustedt.
Towards complete tracking of provenance in experimental distributed systems
research.
International Workshops on Parallel Processing Workshops, Euro-Par
2015, 9523:604–616, 2015.
(doi:10.1007/978-3-319-27308-2_49)
- [178]
- M. Ceccato, A. Capiluppi,
P. Falcarin, and C. Boldyreff.
A large study on the effect of code obfuscation on the quality of java code.
Empirical Software Engineering, 20(6):1486–1524, 2015.
(doi:10.1007/s10664-014-9321-0)
- [179]
- H. Groenda, S. Seifermann,
K. Müller, and G. Jaworek.
The cooperate assistive teamwork environment for software description
languages.
13th European Conference on the Advancement of Assistive Technology,
AAATE 2015, 217:111–118, 2015.
(doi:10.3233/978-1-61499-566-1-111)
- [180]
- J.L.
Johnson, H. tom Wörden, and K. van Wijk.
PLACE: An open-source Python package for laboratory automation, control,
and experimentation.
Journal of Laboratory Automation, 20(1):10–16, 2015.
(doi:10.1177/2211068214553022)
- [181]
- Z.J.
Estrada, C. Pham, F. Deng,
Z. Kalbarczyk, R.K. Iyer, and
L. Yan.
Dynamic VM dependability monitoring using hypervisor probes.
In 11th European Dependable Computing Conference, EDCC 2015, pages
61–72. Institute of Electrical and Electronics Engineers Inc., 2015.
(doi:10.1109/EDCC.2015.9)
- [182]
- F.A.
Fontana, V. Ferme, M. Zanoni, and
A. Yamashita.
Automatic metric thresholds derivation for code smell detection.
In 6th International Workshop on Emerging Trends in Software Metrics,
WETSoM 2015, volume 2015-August, pages 44–53. IEEE Computer Society,
2015.
(doi:10.1109/WETSoM.2015.14)
- [183]
- Q.D.
Soetens, J. Pérez, S. Demeyer, and
A. Zaidman.
Circumventing refactoring masking using fine-grained change recording.
In 14th International Workshop on Principles of Software Evolution, IWPSE
2015, volume 30-Aug-2015, pages 9–18. Institute of Electrical and
Electronics Engineers Inc., 2015.
(doi:10.1145/2804360.2804362)
- [184]
- Abha Lessing, Christophe
Schnelle, Paul William Leslie, and
Geoffrey John Nolan.
MALTweb
multi-axis viewing interface and higher level scoping.
United States Patent 8,972,846, March 2015.
Assignee: Timebase Pty Limited (Sydney NSW, AU).
- [185]
- Abha Lessing, Christophe
Schnelle, and Peter Mariani.
Maltweb
multi-axis viewing interface and higher level scoping.
United States Patent 8,983,955, March 2015.
Assignee: Timebase PTY Limited (Sydney NSW, AU).
- [186]
- K. Blincoe and D. Damian.
Implicit coordination: A case study of the rails OSS project.
11th IFIP WG 2.13 International Conference on Open Source Systems, OSS
2015, 451:35–44, 2015.
(doi:10.1007/978-3-319-17837-0_4)
- [187]
- M. Alenezi and M. Zarour.
Modularity measurement and evolution in object-oriented open-source projects.
In 2015 International Conference on Engineering and MIS, ICEMIS
2015, volume 24-26-September-2015. Association for Computing
Machinery, 2015.
(doi:10.1145/2832987.2833013)
- [188]
- Z. Mushtaq and G. Rasool.
Multilingual source code analysis: State of the art and challenges.
In 9th International Conference on Open Source Systems and Technologies,
ICOSST 2015, pages 170–175. Institute of Electrical and Electronics
Engineers Inc., 2015.
(doi:10.1109/ICOSST.2015.7396422)
- [189]
- I. Bluemke and
A. StepieŃ.
Experiment on defect prediction.
10th International Conference on Dependability and Complex Systems,
DepCoS-RELCOMEX 2015, 365:25–34, 2015.
(doi:10.1007/978-3-319-19216-1_3)
- [190]
- M. Gatrell and S. Counsell.
The effect of refactoring on change and fault-proneness in commercial C#
software.
Science of Computer Programming, 102:44–56, 2015.
(doi:10.1016/j.scico.2014.12.002)
- [191]
- M. Konôpka and
M. Bieliková.
Software developer activity as a source for identifying hidden source code
dependencies.
41st International Conference on Current Trends in Theory and Practice of
Computer Science, SOFSEM 2015, 8939:449–462, 2015.
- [192]
- T. Galinac Grbac and
D. Huljenić.
On the probability distribution of faults in complex software systems.
Information and Software Technology, 58:250–258, 2015.
(doi:10.1016/j.infsof.2014.06.014)
- [193]
- B.T. Sampath Kumar and K.R.
Prithviraj.
Bringing life to dead: Role of Wayback Machine in retrieving vanished
URLs.
Journal of Information Science, 41(1):71–81, 2015.
(doi:10.1177/0165551514552752)
- [194]
- M. Dolores Gallego, S. Bueno,
F. José Racero, and J. Noyes.
Open source software: The effects of training on acceptance.
Computers in Human Behavior, 49:390–399, 2015.
(doi:10.1016/j.chb.2015.03.029)
- [195]
- N. Senthil Madasamy and
T. Revathi.
Secure concurrent communication predicament with solutions in peer-to-peer
network.
ARPN Journal of Engineering and Applied Sciences,
10(9):4097–4104, 2015.
- [196]
- N. Shah.
Sluts 'r' us: Intersections of gender, protocol and agency in the digital
age.
First Monday, 20(4), 2015.
(doi:10.5210/fm.v20i4.5463)
- [197]
- I. Sila.
The state of empirical research on the adoption and diffusion of
business-to-business e-commerce.
International Journal of Electronic Business, 12(3):258–301,
2015.
(doi:10.1504/IJEB.2015.071386)
- [198]
- E. Jung.
A persistent web data architecture with named data networking.
Lecture Notes in Electrical Engineering, 373:153–158, 2015.
(doi:10.1007/978-981-10-0281-6_22)
- [199]
- Rod Cope.
Analyzing
content using abstractable interchangeable elements.
United States Patent 9,092,487, July 2015.
Assignee: OpenLogic, Inc. (Broomfield, CO).
- [200]
- Anthony
Rose.
Filter
for a distributed network.
United States Patent 9,098,683, August 2015.
Assignee: Global File Systems Holdings, LLC (Sherman Oaks, CA).
- [201]
- S. Delbruel, D. Frey, and
F. Taïani.
Decentralized view prediction for global content placement.
In 14th Workshop on Adaptive and Reflective Middleware, ARM 2015.
Association for Computing Machinery, Inc, 2015.
(doi:10.1145/2834965.2834974)
- [202]
- R. Malhotra, A. Chug, and
P. Khosla.
Prioritization of classes for refactoring: A step towards improvement in
software quality.
In 3rd International Symposium on Women in Computing and Informatics, WCI
2015, volume 10-13-August-2015, pages 228–234. Association for
Computing Machinery, 2015.
(doi:10.1145/2791405.2791463)
- [203]
- M. Waterman, J. Noble, and
G. Allan.
How much up-front? a grounded theory of agile architecture.
In 37th IEEE/ACM International Conference on Software Engineering, ICSE
2015, volume 1, pages 347–357. IEEE Computer Society, 2015.
(doi:10.1109/ICSE.2015.54)
- [204]
- H. Uchimiya, S. Ogata, and
K. Kaijiri.
Method mining in experimental software engineering.
In 2014 2nd International Conference on Systems and Informatics, ICSAI
2014, pages 1012–1016. Institute of Electrical and Electronics
Engineers Inc., 2015.
(doi:10.1109/ICSAI.2014.7009433)
- [205]
- D. Holstein, T.W. Cease, and
M.G. Seewald.
Application and management of cybersecurity measures for protection and
control.
In 7th International Conference on Cyber-Enabled Distributed Computing
and Knowledge Discovery, CyberC 2015, pages 76–83. Institute of
Electrical and Electronics Engineers Inc., 2015.
(doi:10.1109/CyberC.2015.80)
- [206]
- T. Hartmann, A. Moawad,
F. Fouquet, G. Nain, J. Klein,
and Y. Le Traon.
Stream my models: Reactive peer-to-peer distributed models@run.time.
In 18th ACM/IEEE International Conference on Model Driven Engineering
Languages and Systems, MODELS 2015, pages 80–89. Institute of
Electrical and Electronics Engineers Inc., 2015.
(doi:10.1109/MODELS.2015.7338238)
- [207]
- F. Medeiros, C. Kästner,
M. Ribeiro, S. Nadi, and
R. Gheyi.
The love/hate relationship with the C preprocessor: An interview study.
In 29th European Conference on Object-Oriented Programming, ECOOP
2015, volume 37, pages 495–518. Schloss Dagstuhl- Leibniz-Zentrum fur
Informatik GmbH, Dagstuhl Publishing, 2015.
(doi:10.4230/LIPIcs.ECOOP.2015.495)
- [208]
- M. Teixeira, R. Ribeiro,
M. Barbosa, F. Enembreck, and
R. Massa.
A modeling architecture for the orchestration of service components in factory
automation.
In 20th IEEE International Conference on Emerging Technologies and
Factory Automation, ETFA 2015, volume 2015-October. Institute of
Electrical and Electronics Engineers Inc., 2015.
(doi:10.1109/ETFA.2015.7301446)
- [209]
- R. Jabangwe, J. Börstler,
and K. Petersen.
Handover of managerial responsibilities in global software development: a case
study of source code evolution and quality.
Software Quality Journal, 23(4):539–566, 2015.
(doi:10.1007/s11219-014-9247-1)
- [210]
- A. Pescador, A. Garmendia,
E. Guerra, J.S. Sánchez Cuadrado, and
J. De Lara.
Pattern-based development of domain-specific modelling languages.
In 18th ACM/IEEE International Conference on Model Driven Engineering
Languages and Systems, MODELS 2015, pages 166–175. Institute of
Electrical and Electronics Engineers Inc., 2015.
(doi:10.1109/MODELS.2015.7338247)
- [211]
- R. Karthika, M. Anandaraj,
and K.P. Vijayakumar.
Efficient content distribution mechanism in peer to peer networks.
International Journal of Applied Engineering Research,
10(49):334–339, 2015.
- [212]
- J. Ruohonen, S. Hyrynsalmi,
and V. Leppänen.
Software evolution and time series volatility: An empirical exploration.
In 14th International Workshop on Principles of Software Evolution, IWPSE
2015, volume 30-Aug-2015, pages 56–65. Institute of Electrical and
Electronics Engineers Inc., 2015.
(doi:10.1145/2804360.2804367)
- [213]
- J. Ruohonen, S. Hyrynsalmi,
and V. Leppänen.
Exploring the stability of software with time-series cross-sectional data.
In 2nd International Workshop on Software Architecture and Metrics, SAM
2015, pages 41–47. Institute of Electrical and Electronics Engineers
Inc., 2015.
(doi:10.1109/SAM.2015.13)
- [214]
- J.-P.
Tolvanen, V. Djukić, and A. Popovic.
Metamodeling for medical devices: Code generation, model-debugging and
run-time synchronization.
In 6th International Conference on Emerging Ubiquitous Systems and
Pervasive Networks, EUSPN 2015, volume 63, pages 539–544. Elsevier,
2015.
(doi:10.1016/j.procs.2015.08.382)
- [215]
- S.A.
Licorish, C.W. Lee, B.T.R. Savarimuthu,
P. Patel, and S.G. Macdonell.
They'll know it when they see it: Analyzing post-release feedback from the
Android community.
In 21st Americas Conference on Information Systems, AMCIS 2015.
Americas Conference on Information Systems, 2015.
- [216]
- A.M.
Bejarano, L.E. Garcıa, and E.E. Zurek.
Detection of source code similitude in academic environments.
Computer Applications in Engineering Education, 23(1):13–22,
2015.
(doi:10.1002/cae.21571)
- [217]
- M.M.
Ferreira, K.A.M. Ferreira, and H.T.
Marques-Neto.
Mapping the potential change impact in object-oriented software.
In 30th Annual ACM Symposium on Applied Computing, SAC 2015,
volume 13-17-April-2015, pages 1654–1656. Association for Computing
Machinery, 2015.
(doi:10.1145/2695664.2696043)
- [218]
- A.L.
Nicolini, A.G. Maguitman, and C.I.
Chesñevar.
ArgP2P: An argumentative approach for intelligent query routing in P2P
networks.
3rd International Workshop on Theory and Applications of Formal
Argumentation, TAFA 2015, 9524:194–210, 2015.
(doi:10.1007/978-3-319-28460-6_12)
- [219]
- M. Ebrahimi and S.M.T.
Rouhani Rankoohi.
An ant-based approach to cluster peers in P2P database systems.
Knowledge and Information Systems, 43(1):219–247, 2015.
(doi:10.1007/s10115-014-0743-1)
- [220]
- K. Haribabu and C. Hota.
Analysis of floating index caching technique for P2P overlay index
propagation.
In 16th International Conference on Distributed Computing and Networking,
ICDCN 2015, volume 04-07-January-2015. Association for Computing
Machinery, 2015.
(doi:10.1145/2684464.2684489)
- [221]
- W.N.
Robinson and T. Deng.
Data mining behavioral transitions in open source repositories.
In 48th Annual Hawaii International Conference on System Sciences, HICSS
2015, volume 2015-March, pages 5280–5289. IEEE Computer Society,
2015.
(doi:10.1109/HICSS.2015.622)
- [222]
- R. Malhotra and A.J. Bansal.
Fault prediction considering threshold effects of object-oriented metrics.
Expert Systems, 32(2):203–219, 2015.
(doi:10.1111/exsy.12078)
- [223]
- M.H. Almomani and F. Ababneh.
The expected opportunity cost and selecting the optimal subset.
Applied Mathematical Sciences, 9(131):6507–6519, 2015.
(doi:10.12988/ams.2015.58561)
- [224]
- D.Ó. Coileáin and
D. O'Mahony.
Accounting and accountability in content distribution architectures: A
survey.
ACM Computing Surveys, 47(4), 2015.
(doi:10.1145/2723701)
- [225]
- V.M. Deshmukh and G.R.
Bamnote.
An empirical study of XML parsers across applications.
In 1st International Conference on Computing, Communication, Control and
Automation, ICCUBEA 2015, pages 396–401. Institute of Electrical and
Electronics Engineers Inc., 2015.
(doi:10.1109/ICCUBEA.2015.83)
- [226]
- V.M. Deshmukh and G.R.
Bamnote.
An empirical evaluation of optimization parameters in XML parsing for
performance enhancement.
In IEEE International Conference on Computer, Communication and Control,
IC4 2015. Institute of Electrical and Electronics Engineers Inc.,
2015.
(doi:10.1109/IC4.2015.7375582)
- [227]
- M. Jureczko and L. Madeyski.
Cross-project defect prediction with respect to code ownership model: An
empirical study.
E-Informatica Software Engineering Journal, 9(1):21–35, 2015.
(doi:10.5277/e-Inf150102)
- [228]
- L. Madeyski and M. Jureczko.
Which process metrics can significantly improve defect prediction models? an
empirical study.
Software Quality Journal, 23(3):393–422, 2015.
(doi:10.1007/s11219-014-9241-7)
- [229]
- V. Suganthi and S. Duraisamy.
An efficient method for quality estimation in open sourcesoftware using
improved particle swarm optimization.
International Journal of Applied Engineering Research,
10(1):1791–1806, 2015.
- [230]
- L. Aversano and
M. Tortorella.
Analysing the reliability of open source software projects.
In 10th International Conference on Software Engineering and
Applications, ICSOFT-EA 2015, pages 348–357. SciTePress, 2015.
- [231]
- T. Clark.
XPL: A language for modular homogeneous language embedding.
Science of Computer Programming, 98:589–616, 2015.
(doi:10.1016/j.scico.2014.08.005)
- [232]
- M.C. Huang.
Using SOA and web 2.0 in web service applications.
In International Conference on Network Security and Communication
Engineering, NSCE 2014, pages 339–342. CRC Press/Balkema, 2015.
- [233]
- J.M.G. Smith.
Optimal workload allocation in closed queueing networks with state dependent
queues.
Annals of Operations Research, 231(1):157–183, 2015.
(doi:10.1007/s10479-013-1418-0)
- [234]
- Michael H.
Ficco.
Distributed
media-protection systems and methods to operate the same.
United States Patent 9,178,693, November 2015.
Assignee: The DIRECTV Group, Inc. (El Segundo, CA).
- [235]
- Michael H.
Ficco.
Distributed
media-aggregation systems and methods to operate the same.
United States Patent 9,225,761, December 2015.
Assignee: The DIRECTV Group, Inc. (El Segundo, CA).
- [236]
- Archana Vidya Menon.
Method
and system for managing display of personalized advertisements in a user
interface (UI) of an on-screen interactive program (IPG).
United States Patent 9,106,942, August 2015.
- [237]
- E. Gebennini, A. Grassi, and
C. Fantuzzi.
The two-machine one-buffer continuous time model with restart policy.
Annals of Operations Research, 231(1):33–64, 2015.
(doi:10.1007/s10479-013-1373-9)
- [238]
- M. Bačıková,
J. Porubän, S. Chodarev, and
M. Nosál'.
Bootstrapping DSLs from user interfaces.
In 30th Annual ACM Symposium on Applied Computing, SAC 2015,
volume 13-17-April-2015, pages 2115–2118. Association for Computing
Machinery, 2015.
(doi:10.1145/2695664.2695994)
- [239]
- A. Heikkinen, T. Koskela, and
M. Ylianttila.
Performance evaluation of distributed data delivery on mobile devices using
WebRTC.
In 11th International Wireless Communications and Mobile Computing
Conference, IWCMC 2015, pages 1036–1042. Institute of Electrical and
Electronics Engineers Inc., 2015.
(doi:10.1109/IWCMC.2015.7289225)
- [240]
- M. Rodriguez, M. Piattini,
and C.M. Fernandez.
A hard look at software quality: Pilot program uses ISO/IEC 25000 family
to evaluate, improve and certify software products.
Quality Progress, 48(9):30–36, 2015.
- [241]
- M. Rodrıguez,
O. Pedreira, and C.M. Fernández.
Certification of the maintainability of software product. a case study.
In XI Jornadas Iberoamericanas de Ingenieria de Software e Ingenieria del
Conocimiento, JIISIC 2015 - 11th Ibero-American Conference on Software
Engineering and Knowledge Engineering, JIISIC 2015, pages 93–105.
Escuela Superior Politecnica de Chimborazo, 2015.
- [242]
- V. Cosentino, J.L.C.
Izquierdo, and J. Cabot.
Gitana: A SQL-based Git repository inspector.
34th International Conference on Conceptual Modeling, ER 2015,
9381:329–343, 2015.
(doi:10.1007/978-3-319-25264-3_24)
- [243]
- D. Villatoro, G. Andrighetto,
R. Conte, and J. Sabater-Mir.
Self-policing through norm internalization: A cognitive solution to the
tragedy of the digital commons in social networks.
JASSS, 18(2):1–28, 2015.
- [244]
- J. Augustine,
G. Pandurangan, P. Robinson, and
E. Upfal.
Distributed agreement in dynamic peer-to-peer networks.
Journal of Computer and System Sciences, 81(7):1088–1109, 2015.
(doi:10.1016/j.jcss.2014.10.005)
- [245]
- J. Augustine,
G. Pandurangan, P. Robinson,
S. Roche, and E. Upfal.
Enabling robust and efficient distributed computation in dynamic peer-to-peer
networks.
In 56th IEEE Annual Symposium on Foundations of Computer Science, FOCS
2015, volume 2015-December, pages 350–369. IEEE Computer Society,
2015.
(doi:10.1109/FOCS.2015.29)
- [246]
- O. Stecklina,
P. Langendörfer, F. Vater,
T. Kranz, and G. Leander.
Intrinsic code attestation by instruction chaining for embedded devices.
11th International Conference Security and Privacy in Communication
Networks, SecureComm 2015, 164:97–115, 2015.
(doi:10.1007/978-3-319-28865-9_6)
- [247]
- S.R.
Choudhary, A. Gorla, and A. Orso.
Automated test input generation for android: Are we there yet?
In 30th IEEE/ACM International Conference on Automated Software
Engineering, ASE 2015, pages 429–440. Institute of Electrical and
Electronics Engineers Inc., 2015.
(doi:10.1109/ASE.2015.89)
- [248]
- L.E.
Lwakatare, P. Kuvaja, and M. Oivo.
Dimensions of devops.
16th International Conference on Agile Software Development, XP
2015, 212:212–217, 2015.
(doi:10.1007/978-3-319-18612-2_19)
- [249]
- R.K.
Mahapatra, R. Manzar, and V.S. Bhadauria.
Adoption and use of open source infrastructure software by large corporations:
The case of MySQL.
Journal of Database Management, 26(4):1–17, 2015.
(doi:10.4018/JDM.2015100101)
- [250]
- G.M.
Kapitsaki, N.D. Tselikas, and I.E. Foukarakis.
An insight into license tools for open source software systems.
Journal of Systems and Software, 102:72–87, 2015.
(doi:10.1016/j.jss.2014.12.050)
- [251]
- T.F. Bissyandé,
L. Réveillère, J.L. Lawall,
Y.-D. Bromberg, and G. Muller.
Implementing an embedded compiler using program transformation rules.
Software - Practice and Experience, 45(2):177–196, 2015.
(doi:10.1002/spe.2225)
- [252]
- Behzad Shahraray, Andrea
Basso, Lee Begeja, David C. Gibbon,
Zhu Liu, and Bernard S. Renger.
System
and method for adaptive playback based on destination.
United States Patent 9,026,555, May 2015.
Assignee: AT&T Intellectual Property I, L.P. (Atlanta, GA).
- [253]
- A.H. Ghapanchi and M. Tavana.
A longitudinal study of the impact of open source software project
characteristics on positive outcomes.
Information Systems Management, 32(4):285–298, 2015.
(doi:10.1080/10580530.2015.1079999)
- [254]
- Michael Eddington and Adam
Cecchetti.
Metaphor
based language fuzzing of computer code.
United States Patent 9,098,352, August 2015.
Assignee: DEJA VU SECURITY, LLC (Seattle, WA).
- [255]
- T. Chaikalis and
A. Chatzigeorgiou.
Forecasting java software evolution trends employing network models.
IEEE Transactions on Software Engineering, 41(6):582–602, 2015.
(doi:10.1109/TSE.2014.2381249)
- [256]
- R. Josephine Grace Rexilla and
P. Shanthi.
Optimizing cloud bandwidth and cost using content aware chunk prediction to
improve efficiency of retrieval.
Indian Journal of Science and Technology, 8(16), 2015.
(doi:10.17485/ijst/2015/v8i16/61966)
- [257]
- A. Hindle.
Green mining: a methodology of relating software change and configuration to
power consumption.
Empirical Software Engineering, 20(2):374–409, 2015.
(doi:10.1007/s10664-013-9276-6)
- [258]
- D. Schall.
Social Network-Based Recommender Systems.
Springer International Publishing, 2015.
(doi:10.1007/978-3-319-22735-1)
- [259]
- T. Chusho.
The classification of matching applications for end-user-initiative
development.
In International MultiConference of Engineers and Computer Scientists
2015, IMECS 2015, volume 1, pages 476–481. Newswood Limited,
2015.
- [260]
- S. Karumanchi, J. Li, and
A. Squicciarini.
Securing resource discovery in content hosting networks.
Lecture Notes of the Institute for Computer Sciences, Social-Informatics
and Telecommunications Engineering, LNICST, 152:153–173, 2015.
(doi:10.1007/978-3-319-23829-6_12)
- [261]
- F. Felisberto, R. Laza,
F. Fdez-Riverola, and A. Pereira.
A distributed multiagent system architecture for body area networks applied to
healthcare monitoring.
BioMed Research International, 2015, 2015.
(doi:10.1155/2015/192454)
- [262]
- S. Campanelli, P. Foglia, and
C.A. Prete.
An architecture to integrate IEC 61131-3 systems in an IEC 61499
distributed solution.
Computers in Industry, 72:47–67, 2015.
(doi:10.1016/j.compind.2015.04.002)
- [263]
- H. Heitkötter, H. Kuchen,
and T.A. Majchrzak.
Extending a model-driven cross-platform development approach for business apps.
Science of Computer Programming, 97(P1):31–36, 2015.
(doi:10.1016/j.scico.2013.11.013)
- [264]
- C. Casalnuovo, B. Vasilescu,
P. Devanbu, and V. Filkov.
Developer on boarding in GitHub: The role of prior social links and
language experience.
In 10th Joint Meeting of the European Software Engineering Conference and
the ACM SIGSOFT Symposium on the Foundations of Software Engineering,
ESEC/FSE 2015, pages 817–828. Association for Computing Machinery,
Inc, 2015.
(doi:10.1145/2786805.2786854)
- [265]
- J.E.
Marynowski, A.O. Santin, and A.R. Pimentel.
Method for testing the fault tolerance of MapReduce frameworks.
Computer Networks, 86:1–13, 2015.
(doi:10.1016/j.comnet.2015.04.009)
- [266]
- D.M.C. Nascimento,
R. Almeida Bittencourt, and C. Chavez.
Open source projects in software engineering education: a mapping study.
Computer Science Education, 25(1):67–114, 2015.
(doi:10.1080/08993408.2015.1033159)
- [267]
- Kumar Rangarajan, Jonathan M.
Sanders, and Tanuj Vohra.
Error
detection on the stack.
United States Patent 9,183,114, November 2015.
Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION (Armonk, NY).
- [268]
- Stylianos Sidiroglou,
Angelos D. Keromytis, and Salvatore J. Stolfo.
Systems,
methods, and media protecting a digital data processing device from
attack.
United States Patent 9,143,518, September 2015.
Assignee: The Trustees of Columbia University in the City of New York (New
York, NY).
- [269]
- L. Ramanathan and S.K. Iyer.
A qualitative study on the adoption of open source software in information
technology outsourcing organizations.
11th IFIP WG 2.13 International Conference on Open Source Systems, OSS
2015, 451:103–113, 2015.
(doi:10.1007/978-3-319-17837-0_10)
- [270]
- L. Ramanathan and
S. Krishnan.
An empirical investigation into the adoption of open source software in
information technology outsourcing organizations.
Journal of Systems and Information Technology, 17(2):167–192,
2015.
(doi:10.1108/JSIT-10-2014-0070)
- [271]
- A. Nazarov.
Can you afford to ignore open source software?
In 36th Hydrology and Water Resources Symposium: The Art and Science of
Water, HWRS 2015, pages 1404–1412. Engineers Australia, 2015.
- [272]
- V. Zaytsev.
Taxonomy of flexible linguistic commitments.
In 1st Workshop on Flexible Model Driven Engineering, FlexMDE 2015 -
co-located with ACM/IEEE 18th International Conference on Model Driven
Engineering Languages and Systems, MoDELS 2015, volume 1470, pages
42–50. CEUR-WS, 2015.
- [273]
- A. Rastogi.
Contributor's performance, participation intentions, its influencers and
project performance.
In 37th IEEE/ACM International Conference on Software Engineering, ICSE
2015, volume 2, pages 919–922. IEEE Computer Society, 2015.
(doi:10.1109/ICSE.2015.292)
- [274]
- Y. Kashiwabara, T. Ishio,
H. Hata, and K. Inoue.
Method verb recommendation using association rule mining in a set of existing
projects.
IEICE Transactions on Information and Systems, E98D(3):627–636,
2015.
(doi:10.1587/transinf.2014EDP7276)
- [275]
- M. Gharehyazie, D. Posnett,
B. Vasilescu, and V. Filkov.
Developer initiation and social interactions in OSS: A case study of the
Apache software foundation.
Empirical Software Engineering, 20(5):1318–1353, 2015.
(doi:10.1007/s10664-014-9332-x)
- [276]
- K.L. Narasimhamu,
V. Venugopal Reddy, and C.S. Rao.
Optimization of buffer allocation in manufacturing system using particle swarm
optimization.
International Review on Modelling and Simulations, 8(2):212–222,
2015.
- [277]
- R.S. Alkhawaldeh and J.M.
Jose.
Experimental study on semi-structured peer-to-peer information retrieval
network.
6th International Conference on Labs of the Evaluation Forum, CLEF
2015, 9283:3–14, 2015.
(doi:10.1007/978-3-319-24027-5_1)
- [278]
- J. Teixeira.
On the openness of digital platforms/ecosystems.
In 11th International Symposium on Open Collaboration, OPENSYM
2015. Association for Computing Machinery, Inc, 2015.
(doi:10.1145/2788993.2789829)
- [279]
- M. Marchesi.
15 years of application of statistical physics methods to the study of software
systems.
In 6th International Workshop on Emerging Trends in Software Metrics,
WETSoM 2015, volume 2015-August, pages 1–2. IEEE Computer Society,
2015.
(doi:10.1109/WETSoM.2015.9)
- [280]
- K. Kasemsap.
The role of e-business adoption in the business world.
Strategic Infrastructure Development for Economic Growth and Social
Change, pages 51–63, 2015.
(doi:10.4018/978-1-4666-7470-7.ch005)
- [281]
- A. Malatras.
State-of-the-art survey on P2P overlay networks in pervasive computing
environments.
Journal of Network and Computer Applications, 55:1–23, 2015.
(doi:10.1016/j.jnca.2015.04.014)
- [282]
- M. Bruntink.
Towards base rates in software analytics: Early results and challenges from
studying Ohloh.
Science of Computer Programming, 97(P1):135–142, 2015.
(doi:10.1016/j.scico.2013.11.023)
- [283]
- R. Shatnawi.
Deriving metrics thresholds using log transformation.
Journal of Software: Evolution and Process, 27(2):95–113, 2015.
(doi:10.1002/smr.1702)
- [284]
- A. Safarkhanlou, A. Souri,
M. Norouzi, and S.E.H. Sardroud.
Formalizing and verification of an antivirus protection service using model
checking.
In 3rd International Conference on Recent Trends in Computing, ICRTC
2015, volume 57, pages 1324–1331. Elsevier, 2015.
(doi:10.1016/j.procs.2015.07.443)
- [285]
- S. Mukherjee.
Video Games and Storytelling: Reading Games and Playing Books.
Palgrave Macmillan, 2015.
(doi:10.1057/9781137525055)
- [286]
- Y. Radziwill.
Cyber-attacks and the exploitable imperfections of international
law.
Brill, 2015.
(doi:10.1163/9789004298309)
- [287]
- R.A.
Abouhogail.
Network security and metrology: A survey.
International Journal of Security and its Applications,
9(11):251–270, 2015.
(doi:10.14257/ijsia.2015.9.11.24)
- [288]
- P. Chakraborty.
Fifty years of peephole optimization.
Current Science, 108(12):2186–2190, 2015.
- [289]
- E. Vasilomanolakis,
S. Karuppayah, M. Muhlhauser, and
M. Fischer.
Taxonomy and survey of collaborative intrusion detection.
ACM Computing Surveys, 47(4), 2015.
(doi:10.1145/2716260)