- [1]
- T. Abdou, P. Grogono, and
P. Kamthan.
Managing corrective actions to closure in open source software test process.
In 25th International Conference on Software Engineering and Knowledge
Engineering, SEKE 2013, pages 306–311. Knowledge Systems Institute
Graduate School, January 2013.
- [2]
- E. Abdullah and S. Fujita.
Reputation-based colluder detection schemes for peer-to-peer content delivery
networks''.
IEICE Transactions on Information and Systems,
E96-D(12):2696–2703, 2013.
(doi:10.1587/transinf.E96.D.2696)
- [3]
- R. Agarwal and Y. Pradeep.
Bridging the gap between traditional and online shopping methods for Indian
customers through digital interactive experience.
In 2013 2nd International Conference on Advances in Computing,
Communications and Informatics, ICACCI 2013, pages 1184–1189, 2013.
(doi:10.1109/ICACCI.2013.6637345)
- [4]
- M.I. Ahmed and M. Abo-Rizka.
Remote internet voting: Security and performance issues.
In 2013 World Congress on Internet Security, WorldCIS 2013, pages
56–64. IEEE Computer Society, 2013.
(doi:10.1109/WorldCIS.2013.6751017)
- [5]
- J. Al Dallal.
Incorporating transitive relations in low-level design-based class cohesion
measurement.
Software - Practice and Experience, 43(6):685–704, 2013.
- [6]
- J. Al Dallal.
Object-oriented class maintainability prediction using internal quality
attributes.
Information and Software Technology, 55(11):2028–2048, 2013.
(doi:10.1016/j.infsof.2013.07.005)
- [7]
- S. Alhusain, S. Coupland,
R. John, and M. Kavanagh.
Design pattern recognition by using adaptive neuro fuzzy inference system.
In 25th IEEE International Conference on Tools with Artificial
Intelligence, ICTAI 2013, pages 581–587, 2013.
(doi:10.1109/ICTAI.2013.92)
- [8]
- S. Alhusain, S. Coupland,
R. John, and M. Kavanagh.
Towards machine learning based design pattern recognition.
In 2013 13th UK Workshop on Computational Intelligence, UKCI 2013,
pages 244–251, 2013.
(doi:10.1109/UKCI.2013.6651312)
- [9]
- M.Y.
Allaho and W.-C. Lee.
Analyzing the social ties and structure of contributors in open source software
community.
In 2013 IEEE/ACM International Conference on Advances in Social Networks
Analysis and Mining, ASONAM 2013, pages 56–60. Association for
Computing Machinery, 2013.
(doi:10.1145/2492517.2492627)
- [10]
- M. Allamanis and C. Sutton.
Mining source code repositories at massive scale using language modeling.
In 10th International Working Conference on Mining Software Repositories,
MSR 2013, pages 207–216, 2013.
(doi:10.1109/MSR.2013.6624029)
- [11]
- S. Almugrin, W. Albattah, and
A. Melton.
Frequent pattern mining in software engineering.
In 22nd International Conference on Software Engineering and Data
Engineering, SEDE 2013, pages 97–104, 2013.
- [12]
- S. Astromskis, A. Janes,
A. Sillitti, and G. Succi.
Supporting governance in disciplined agile delivery using noninvasive
measurement and process mining.
Cutter IT Journal, 26(11):25–29, 2013.
- [13]
- I. Astrova, A. Koschel,
L. Renners, T. Rossow, and
M. Schaaf.
Integrating structured peer-to-peer networks into OM4SPACE project.
In 27th International Conference on Advanced Information Networking and
Applications Workshops, WAINA 2013, pages 1211–1216, 2013.
(doi:10.1109/WAINA.2013.88)
- [14]
- H.U. Asuncion, M. Shonle,
R. Porter, K. Potts, N. Duncan,
and Jr. Matthies, W.J.
Using change entries to collect software project information.
In 25th International Conference on Software Engineering and Knowledge
Engineering, SEKE 2013, pages 184–189. Knowledge Systems Institute
Graduate School, January 2013.
- [15]
- I.N. Athanasiadis and
F. Villa.
A roadmap to domain specific programming languages for environmental modeling:
Key requirements and concepts.
In 2013 13th ACM Workshop on Domain-Specific Modeling, DSM 2013,
pages 27–32. Association for Computing Machinery, 2013.
(doi:10.1145/2541928.2541934)
- [16]
- J. Augustine, A.R. Molla,
E. Morsy, G. Pandurangan,
P. Robinson, and E. Upfal.
Storage and search in dynamic peer-to-peer networks.
In 25th ACM Symposium on Parallelism in Algorithms and Architectures,
SPAA 2013, pages 53–62, 2013.
- [17]
- L. Aversano and
M. Tortorella.
Quality evaluation of floss projects: Application to ERP systems.
Information and Software Technology, 55(7):1260–1276, 2013.
- [18]
- S. Banani and
K. Wipusitwarakun.
A multipath routing protocol over chord-based internet indirection
infrastructure (13).
Information Technology Journal, 12(1):1–14, 2013.
(doi:10.3923/itj.2013.1.14)
- [19]
- H.M.N.D. Bandara and A.P.
Jayasumana.
Community-based caching for enhanced lookup performance in P2P systems.
IEEE Transactions on Parallel and Distributed Systems,
24(9):1752–1762, 2013.
(doi:10.1109/TPDS.2012.270)
- [20]
- A. Barham.
The emergence of quality assurance practices in free/libre open source
software: A case study.
9th IFIP WG 2.13 International Conference on Open Source Software, OSS
2013, 404:271–276, 2013.
- [21]
- D. Bell and S.R. Shirzad.
Social media business intelligence: A pharmaceutical domain analysis study.
International Journal of Sociotechnology and Knowledge
Development, 5(3):51–73, 2013.
(doi:10.4018/ijskd.2013070104)
- [22]
- S.M.
Bellovin, M. Blaze, S. Clark, and
S. Landau.
Going bright: Wiretapping without weakening communications infrastructure.
IEEE Security and Privacy, 11(1):62–72, 2013.
(doi:10.1109/MSP.2012.138)
- [23]
- M.V.
Belmonte, M. Dıaz, and A. Reyna.
Improving file sharing experience with incentive based coalitions.
3rd International Conference on Agents and Artificial Intelligence,
ICAART 2011, 271:287–301, 2013.
(doi:10.1007/978-3-642-29966-7_19)
- [24]
- X. Ben,
S. Beijun, and Y. Weicheng.
Mining developer contribution in open source software using visualization
techniques.
In Proceedings of the 2013 3rd International Conference on Intelligent
System Design and Engineering Applications, ISDEA 2013, pages
934–937, 2013.
- [25]
- T.F. Bissyandé, F. Thung,
D. Lo, L. Jiang, and
L. Réveillère.
Orion: A software project search engine with integrated diverse software
artifacts.
In 18th International Conference on Engineering of Complex Computer
Systems, ICECCS 2013, pages 242–245, 2013.
(doi:10.1109/ICECCS.2013.42)
- [26]
- F. Blanchet-Sadri, B. Chen,
and S. Munteanu.
A note on constructing infinite binary words with polynomial subword
complexity.
RAIRO - Theoretical Informatics and Applications, 47(2):171–180,
2013.
- [27]
- I. Bluemke and R. Roguski.
Metrics in assessing the quality and evolution of jEdit.
Lecture Notes in Electrical Engineering, 151 LNEE:717–727, 2013.
(doi:10.1007/978-1-4614-3558-7_61)
- [28]
- X. Bonnaire.
Fixed interval nodes estimation: An accurate and low cost algorithm to estimate
the number of nodes in distributed hash tables.
Information Sciences, 218:165–181, 2013.
(doi:10.1016/j.ins.2012.06.004)
- [29]
- S. Boonkrong.
A more secure and efficient Andrew secure RPC protocol.
Security and Communication Networks, 7(11):2063–2077, 2013.
(doi:10.1002/sec.918)
- [30]
- Brian M. Bowen, Pratap V.
Prabhu, Vasileios P. Kemerlis, Stylianos
Sidiroglou, Salvatore J. Stolfo, and Angelos D.
Keromytis.
Methods,
systems, and media for detecting covert malware.
United States Patent 8,528,091, September 2013.
Assignee: The Trustees of Columbia University in the City of New York (New
York, NY).
- [31]
- M. Brandtner.
Fostering software quality assessment.
In 2013 35th International Conference on Software Engineering, ICSE
2013, pages 1393–1396, 2013.
(doi:10.1109/ICSE.2013.6606725)
- [32]
- David Broman, Jonathan Keljo,
Vance Morrison, Sean Selitrennikoff, and
Hsu-chieh Yuan.
Detaching
profilers.
United States Patent 8,601,445, December 2013.
Assignee: Microsoft Corporation (Redmond, WA).
- [33]
- D. Bueno, K.J. Compton,
K.A. Sakallah, and M. Bailey.
Detecting traditional packers, decisively.
16th International Symposium on Research in Attacks, Intrusions, and
Defenses, RAID 2013, 8145 LNCS:184–203, 2013.
(doi:10.1007/978-3-642-41284-4_10)
- [34]
- T. Busjahn and C. Schulte.
The use of code reading in teaching programming.
In 13th Koli Calling International Conference on Computing Education
Research, Koli Calling 2013, pages 3–11, 2013.
(doi:10.1145/2526968.2526969)
- [35]
- C.G.
Cegielski, D.M. Bourrie, and B.T. Hazen.
Evaluating adoption of emerging IT for corporate IT strategy: Developing
a model using a qualitative method.
Information Systems Management, 30(3):235–249, 2013.
(doi:10.1080/10580530.2013.794632)
- [36]
- K.K.
Chaturvedi, V.B. Sing, and P. Singh.
Tools in mining software repositories.
In 2013 13th International Conference on Computational Science and Its
Applications, ICCSA 2013, pages 89–98. IEEE Computer Society, 2013.
(doi:10.1109/ICCSA.2013.22)
- [37]
- A. Chatzigeorgiou and
E. Stiakakis.
Combining metrics for software evolution assessment by means of data
envelopment analysis.
Journal of software: Evolution and Process, 25(3):303–324,
2013.
- [38]
- C. Chen, P. Wang,
Y. Liu, G. Wu, and P. Wang.
Impacts of government website information on social sciences and humanities in
China: A citation analysis.
Government Information Quarterly, 30(4):450–463, 2013.
(doi:10.1016/j.giq.2013.05.008)
- [39]
- V. Chiprianov, Y. Kermarrec,
and S. Rouvrais.
Integrating DSLs into a software engineering process: Application to
collaborative construction of telecom services.
Software Design and Development: Concepts, Methodologies, Tools, and
Applications, 2-4:570–595, 2013.
(doi:10.4018/978-1-4666-4301-7.ch028)
- [40]
- B. Choi.
Multiagent social computing.
IGI Global, 2013.
(doi:10.4018/978-1-4666-2779-6.ch018)
- [41]
- T. Clark and B.S. Barn.
Domain engineering for software tools.
In Domain Engineering: Product Lines, Languages, and Conceptual
Models, pages 187–209. Springer Berlin Heidelberg, 2013.
(doi:10.1007/978-3-642-36654-3_8)
- [42]
- M. Colledani, G. Pedrielli,
W. Terkaj, and M. Urgo.
Integrated virtual platform for manufacturing systems design.
In 46th CIRP Conference on Manufacturing Systems, CIRP CMS 2013,
volume 7, pages 425–430, 2013.
(doi:10.1016/j.procir.2013.06.010)
- [43]
- M. Colledani.
Performance evaluation of two-stage buffered production systems with discrete
general Markovian machines.
In 7th IFAC Conference on Manufacturing Modelling, Management, and
Control, MIM 2013, pages 1638–1643, 2013.
(doi:10.3182/20130619-3-RU-3018.00516)
- [44]
- Rod Cope.
Noise
reduction for content matching analysis results for protectable content.
United States Patent 8,498,982, July 2013.
Assignee: OpenLogic, Inc. (Broomfield, CO).
- [45]
- H.K.
Cora, H. Turgut Uyar, and A. Şima
Etaner-Uyar.
HH-DSL: A domain specific language for selection hyper-heuristics.
In 15th Annual Conference on Genetic and Evolutionary Computation, GECCO
2013, pages 1317–1324, 2013.
(doi:10.1145/2464576.2482711)
- [46]
- E. Costello.
Opening up to open source: Looking at how moodle was adopted in higher
education.
Open Learning, 28(3):187–200, 2013.
(doi:10.1080/02680513.2013.856289)
- [47]
- J.J. Cusick.
Durable ideas in software engineering: Concepts, methods and approaches
from my virtual toolbox.
Bentham Science Publishers Ltd., 2013.
(doi:10.2174/97816080547631130101)
- [48]
- Z. Czirkos and G. Hosszú.
Solution for the broadcasting in the Kademlia peer-to-peer overlay.
Computer Networks, 57(8):1853–1862, 2013.
- [49]
- I. Dávid and
L. Gönczy.
Ontology-supported design of domain-specific languages: A complex event
processing case study.
Advances and Applications in Model-Driven Engineering, pages
106–133, 2013.
(doi:10.4018/978-1-4666-4494-6.ch006)
- [50]
- F. De Asıs López-Fuentes.
An incentives model based on reputation for P2P systems.
Journal of Telecommunications and Information Technology,
2013(4):92–101, 2013.
- [51]
- R.A. De Carvalho and
B. Johansson.
Key aspects of free and open source enterprise resource planning systems.
Enterprise Resource Planning: Concepts, Methodologies, Tools, and
Applications, 1-3:35–51, 2013.
(doi:10.4018/978-1-4666-4153-2.ch004)
- [52]
- P. De Filippi.
Ubiquitous computing in the cloud: User empowerment vs. user obsequity.
User Behavior in Ubiquitous Online Environments, pages 44–63,
2013.
(doi:10.4018/978-1-4666-4566-0.ch003)
- [53]
- W.K. Dédzoé,
P. Lamarre, R. Akbarinia, and
P. Valduriez.
As-soon-as-possible top-k query processing in P2P systems.
Lecture Notes in Computer Science (including subseries Lecture Notes in
Artificial Intelligence and Lecture Notes in Bioinformatics),
7980:1–27, 2013.
(doi:10.1007/978-3-642-40069-8-1)
- [54]
- D.R. Delgado Sobrino and
P. Koštál.
A few analysis and customization issues of a new iCIM 3000 system: The case
of the material flow, its complexity and a few issues to improve.
Academic Journal of Manufacturing Engineering, 11(4):36–41,
2013.
- [55]
- T. Delot and M. Thilliez.
Data access and ambient computing.
Computer Science and Ambient Intelligence, pages 121–134, 2013.
(doi:10.1002/9781118580974.ch7)
- [56]
- L. Demir, A. Diamantidis,
D.T. Eliiyi, M.E.J. O'Kelly, C.T.
Papadopoulos, A.K. Tsadiras, and S. Tunali.
A comparison of three search algorithms for solving the buffer allocation
problem in reliable production lines.
In 7th IFAC Conference on Manufacturing Modelling, Management, and
Control, MIM 2013, pages 1626–1631, 2013.
(doi:10.3182/20130619-3-RU-3018.00345)
- [57]
- L. Demir,
S. Tunali, D.T. Eliiyi, and
A. Løkketangen.
Two approaches for solving the buffer allocation problem in unreliable
production lines.
Computers and Operations Research, 40(10):2556–2563, 2013.
- [58]
- G. Dévai, D. Leskó,
and M. Tejfel.
Embedding and parsing combined for efficient language design.
In 8th International Joint conference on Software Technologies, ICSOFT
2013, pages 244–250, 2013.
- [59]
- S. Dey,
Y. Liu, S. Wang, and Y. Lu.
Addressing response time of cloud-based mobile applications.
In 1st International Workshop on Mobile Cloud Computing and Networking,
MobileCloud 2013, pages 3–10, 2013.
(doi:10.1145/2492348.2492359)
- [60]
- W. Djoleto.
Electronic commerce and organizational leadership: Perspectives and
methodologies.
IGI Global, 2013.
(doi:10.4018/978-1-4666-2982-0)
- [61]
- A.F. Dragoni.
Health services through digital terrestrial television.
Telehealth Networks for Hospital Services: New Methodologies,
pages 207–227, 2013.
(doi:10.4018/978-1-4666-2979-0.ch014)
- [62]
- H. E,
X. Jin, J. Tong, M. Song, and
X. Zhu.
Measure method and metrics for network characteristics in service systems.
Lecture Notes in Computer Science (including subseries Lecture Notes in
Artificial Intelligence and Lecture Notes in Bioinformatics), 7719
LNCS:180–193, 2013.
- [63]
- P. Eeles.
Building a platform for innovation: Architecture and agile as key enablers.
Agile Software Architecture: Aligning Agile Processes and Software
Architectures, pages 315–333, 2013.
(doi:10.1016/B978-0-12-407772-0.00012-5)
- [64]
- G. Einziger, R. Friedman, and
E. Kibbar.
Kaleidoscope: Adding colors to Kademlia.
In 13th IEEE International Conference on Peer-to-Peer Computing, IEEE P2P
2013. IEEE Computer Society, 2013.
(doi:10.1109/P2P.2013.6688703)
- [65]
- G. Epelde, E. Carrasco,
G. Zimmermann, J. Alexandersson,
R. Neßelrath, and M. Dubielzig.
Universal remote console-based next-generation accessible television.
Universal Access in the Information Society, 12(1):73–87,
2013.
- [66]
- G. Epelde, X. Valencia,
E. Carrasco, J. Posada,
J. Abascal, U. Diaz-Orueta,
I. Zinnikus, and C. Husodo-Schulz.
Providing universally accessible interactive services through TV sets:
Implementation and validation with elderly users.
Multimedia Tools and Applications, 67(2):497–528, 2013.
(doi:10.1007/s11042-011-0949-0)
- [67]
- J. Fang,
Y. Han, and Z. Zhao.
A hierarchical service community model for cross-organizational service
management.
In 2013 International Conference on Service Science, ICSS 2013,
pages 84–89, 2013.
(doi:10.1109/ICSS.2013.57)
- [68]
- M. Farooq-i Azam and M.N.
Ayyaz.
Embedded systems security.
Software Design and Development: Concepts, Methodologies, Tools, and
Applications, 2-4:980–998, 2013.
(doi:10.4018/978-1-4666-4301-7.ch047)
- [69]
- J. Feigenspan,
C. Kästner, S. Apel,
J. Liebig, M. Schulze,
R. Dachselt, M. Papendieck,
T. Leich, and G. Saake.
Do background colors improve program comprehension in the #ifdef hell?
Empirical Software Engineering, 18(4):699–745, 2013.
(doi:10.1007/s10664-012-9208-x)
- [70]
- J.B. Fernández, B.S.
De Abajo, J.M. Ramirez, E.G. Salcines, and
C. de Castro Lozano.
How the user behavior is affected by the use of secondary screens on
interactive television: An affective usability dimension.
Communications in Computer and Information Science, 278:557–562,
2013.
(doi:10.1007/978-3-642-35879-1_70)
- [71]
- L.P.
Ferreira, E.A. Gómez, G.P. Lourido, and
B. Tjahjono.
Modeling a complex production line using virtual cells.
Lecture Notes in Electrical Engineering, 130 LNEE:361–373, 2013.
(doi:10.1007/978-1-4614-2317-1_30)
- [72]
- J. Ferrer, F. Chicano, and
E. Alba.
Estimating software testing complexity.
Information and Software Technology, 55(12):2125–2139, 2013.
(doi:10.1016/j.infsof.2013.07.007)
- [73]
- C. Fieseler and M. Fleck.
The pursuit of empowerment through social media: Structural social capital
dynamics in CSR-blogging.
Journal of Business Ethics, 118(4):759–775, 2013.
(doi:10.1007/s10551-013-1959-9)
- [74]
- J. Fitsanakis.
Digital Sparta: Information operations and cyber-warfare in Greece.
Cyber Conflict: Competing National Perspectives, pages 135–164,
2013.
(doi:10.1002/9781118562666.ch4)
- [75]
- S. Frey,
W. Hasselbring, and B. Schnoor.
Automatic conformance checking for migrating software systems to cloud
infrastructures and platforms.
Journal of software: Evolution and Process, 25(10):1089–1115,
2013.
(doi:10.1002/smr.582)
- [76]
- J. Gao
and W. Ding.
A sensory data integrating bus under the intelligent transportation
environment.
In 2013 10th Web Information System and Application Conference, WISA
2013, pages 328–332. IEEE Computer Society, 2013.
(doi:10.1109/WISA.2013.68)
- [77]
- M. Gardner, P. Sathre,
W.-C. Feng, and G. Martinez.
Characterizing the challenges and evaluating the efficacy of a
CUDA-to-OpenCL translator.
Parallel Computing, 39(12):769–786, 2013.
(doi:10.1016/j.parco.2013.09.003)
- [78]
- A. Garrido and R. Johnson.
Embracing the C preprocessor during refactoring.
Journal of software: Evolution and Process, 25(12):1285–1304,
2013.
(doi:10.1002/smr.1603)
- [79]
- T. Gavrielides and
V. Artinopoulou.
Restorative justice and violence against women: Comparing greece and the united
kingdom.
Asian Journal of Criminology, 8(1):25–40, 2013.
- [80]
- E. Gebennini, A. Grassi,
C. Fantuzzi, S.B. Gershwin, and
I.C. Schick.
Discrete time model for two-machine one-buffer transfer lines with restart
policy.
Annals of Operations Research, 209(1):41–65, 2013.
(doi:10.1007/s10479-011-0868-5)
- [81]
- M. Geva and A. Herzberg.
DOT-COM: Decentralized online trading and commerce.
8th International Workshop on Security and Trust Management, STM
2012, 7783 LNCS:177–192, 2013.
(doi:10.1007/978-3-642-38004-4_12)
- [82]
- H.R.
Ghaeini, B. Akbari, and B. Barekatain.
An adaptive packet loss recovery method for peer-to-peer video streaming over
wireless mesh network.
Lecture Notes in Electrical Engineering, 236 LNEE:713–721,
2013.
- [83]
- G. Ghezzi and H.C. Gall.
Replicating mining studies with SOFAS.
In 10th International Working Conference on Mining Software Repositories,
MSR 2013, pages 363–372, 2013.
(doi:10.1109/MSR.2013.6624050)
- [84]
- M. Ghorbani, M.R. Meybodi,
and A.M. Saghiri.
A new version of k-random walks algorithm in peer-to-peer networks utilizing
learning automata.
In 2013 5th Conference on Information and Knowledge Technology, IKT
2013, pages 1–6, 2013.
(doi:10.1109/IKT.2013.6620028)
- [85]
- M. Ghorbani, M.R. Meybodi,
and A.M. Saghiri.
A novel self-adaptive search algorithm for unstructured peer-to-peer networks
utilizing learning automata.
In 2013 3rd Joint Conference of AI and Robotics and 5th RoboCup Iran Open
International Symposium: Learning, Glorious Future, RIOS 2013, 2013.
(doi:10.1109/RIOS.2013.6595306)
- [86]
- Y. Gil and V. Ratnakar.
Knowledge capture in the wild: A perspective from semantic wiki communities.
In 7th International Conference on Knowledge Capture: "Knowledge Capture
in the Age of Massive Web Data", K-CAP 2013, 2013.
(doi:10.1145/2479832.2479858)
- [87]
- Y. Gil,
A. Knight, K. Zhang, L. Zhang,
V. Ratnakar, and R. Sethi.
The democratization of semantic properties: An analysis of semantic wikis.
In 2013 IEEE 7th International Conference on Semantic Computing, ICSC
2013, pages 206–211, 2013.
(doi:10.1109/ICSC.2013.44)
- [88]
- M. Gligoric, F. Behrang,
Y. Li, J. Overbey, M. Hafiz, and
D. Marinov.
Systematic testing of refactoring engines on real software projects.
27th European Conference on Object-Oriented Programming, ECOOP
2013, 7920 LNCS:629–653, 2013.
(doi:10.1007/978-3-642-39038-8-26)
- [89]
- M. Goeminne, M. Claes, and
T. Mens.
A historical dataset for the GNOME ecosystem.
In 10th International Working Conference on Mining Software Repositories,
MSR 2013, pages 225–228, 2013.
(doi:10.1109/MSR.2013.6624032)
- [90]
- Valery Golender, Ido Ben
Moshe, and Shlomo Wygodny.
System
and method for software diagnostics using a combination of visual and dynamic
tracing.
United States Patent 8,504,994, August 2013.
Assignee: Identify Software, Ltd. (Petach-Tikva, IL).
- [91]
- J.M. Gonzalez-Barahona,
D. Izquierdo-Cortazar, S. Maffulli, and
G. Robles.
Understanding how companies interact with free software communities.
IEEE Software, 30(5):38–45, 2013.
(doi:10.1109/MS.2013.95)
- [92]
- L.Z.
Granville.
Peer-to-peer (P2P)-based network management.
Network-Embedded Management and Applications: Understanding Programmable
Networking Infrastructure, pages 291–315, 2013.
(doi:10.1007/978-1-4419-6769-5_14)
- [93]
- J. Gu,
W. Wang, A. Huang, and H. Shan.
Proactive storage at caching-enable base stations in cellular networks.
In 2013 IEEE 24th Annual International Symposium on Personal, Indoor, and
Mobile Radio Communications, PIMRC 2013, pages 1543–1547, 2013.
(doi:10.1109/PIMRC.2013.6666387)
- [94]
- Y. Guo,
Z.-X. Zhao, and W. Wang.
Complexity analysis of software based on function-call graph.
In 19th International Conference on Industrial Engineering and
Engineering Management, pages 269–277, 2013.
(doi:10.1007/978-3-642-37270-4_26)
- [95]
- Satya V. Gupta and Prashant
Shenoy.
System
and methods for run time detection and correction of memory corruption.
United States Patent 8,510,596, August 2013.
Assignee: Virsec Systems, Inc. (Acton, MA).
- [96]
- T.N.
Gutierrez, L. Ciarletta, and V. Chevrier.
Multi-agent simulation based governance of complex systems: Architecture and
example implementation on free-riding.
In 2013 Mexican International Conference on Computer Science, ENC
2013, pages 89–98. IEEE Computer Society, 2013.
(doi:10.1109/ENC.2013.19)
- [97]
- M. Hammad, M. Hammad, and
H. Bani-Salameh.
Identifying designers and their design knowledge.
International Journal of Software Engineering and its
Applications, 7(6):277–288, 2013.
(doi:10.14257/ijseia.2013.7.6.23)
- [98]
- A. Hannemann, M. Hackstein,
R. Klamma, and M. Jarke.
An adaptive filter-framework for the quality improvement of open-source
software analysis.
In 2013 Conference on Software Engineering, SE 2013, volume P-213,
pages 143–156. Gesellschaft fur Informatik (GI), 2013.
- [99]
- S. Harrer, J. Lenhard, and
G. Wirtz.
Open source versus proprietary software in service-orientation: The case of
BPEL engines.
11th International Conference on Service-Oriented Computing, ICSOC
2013, 8274 LNCS:99–113, 2013.
(doi:10.1007/978-3-642-45005-1_8)
- [100]
- T. Hasegawa.
A survey of the research on future internet and network architectures.
IEICE Transactions on Communications, E96-B(6):1385–1401,
2013.
- [101]
- S. Haun and
A. Nürnberger.
Towards persistent identification of resources in personal information
management.
In 3rd International Workshop on Semantic Digital Archives, SDA 2013 -
Co-located with 17th International Conference on Theory and Practice of
Digital Libraries, TPDL 2013, volume 1091, pages 73–80. CEUR-WS,
2013.
- [102]
- K.A. Hawick.
Fluent interfaces to a java-based internal domain-specific languages for graph
generation and analysis.
In IASTED Multiconferences - Proceedings of the IASTED International
Conference on Software Engineering, SE 2013, pages 752–759,
2013.
- [103]
- E.C.S.
Hayashi, L.S.G. Piccolo, and M.C.C.
Baranauskas.
Perspectives on the evaluation of affective quality in social software.
International Journal of Web Based Communities, 9(4):519–534,
2013.
(doi:10.1504/IJWBC.2013.057217)
- [104]
- P. He,
B. Li, Y. Ma, and L. He.
Using software dependency to bug prediction.
Mathematical Problems in Engineering, 2013, 2013.
(doi:10.1155/2013/869356)
- [105]
- Q. He,
Y. Wang, Y. Linlin, and Q.K.
Key.
P2PRPIPS: A P2P and reverse proxy based web intrusion protection system.
Research Journal of Applied Sciences, Engineering and Technology,
5(7):2439–2444, 2013.
- [106]
- B. Henderson-Sellers,
T. Clark, and C. Gonzalez-Perez.
On the search for a level-agnostic modelling language.
25th International Conference on Advanced Information Systems
Engineering, CAiSE 2013, 7908 LNCS:240–255, 2013.
(doi:10.1007/978-3-642-38709-8_16)
- [107]
- I.M.T. Hernandez, A.M.
Viveros, and E.H. Rubio.
Analysis for the design of open applications on mobile devices.
In 23rd International Conference on Electronics, Communications and
Computing, CONIELECOMP 2013, pages 126–131, 2013.
(doi:10.1109/CONIELECOMP.2013.6525772)
- [108]
- I. Herraiz, D. Rodriguez,
G. Robles, and J.M. Gonzalez-Barahona.
The evolution of the laws of software evolution: A discussion based on a
systematic literature review.
ACM Computing Surveys, 46(2), 2013.
(doi:10.1145/2543581.2543595)
- [109]
- B. Hoisl,
S. Sobernig, and M. Strembeck.
Higher-order rewriting of model-to-text templates for integrating
domain-specific modeling languages.
In MODELSWARD 2013 - Proceedings of the 1st International Conference on
Model-Driven Engineering and Software Development, pages 49–61,
2013.
- [110]
- H. Holm,
M. Ekstedt, and T. Sommestad.
Effort estimates on web application vulnerability discovery.
In Proceedings of the Annual Hawaii International Conference on System
Sciences, pages 5029–5038, 2013.
- [111]
- Z.-K. Hu,
X.-L. Zheng, Y.-F. Wu, and D.-R.
Chen.
Product recommendation algorithm based on users' reviews mining.
Zhejiang Daxue Xuebao (Gongxue Ban)/Journal of Zhejiang University
(Engineering Science), 47(8):1475–1485, 2013.
(doi:10.3785/j.issn.1008-973X.2013.08.023)
- [112]
- H. Huang, J. Xiao,
Q. Yang, Q. Wang, and H. Wu.
Creating process-agents incrementally by mining process asset library.
Information Sciences, 233:183–199, 2013.
- [113]
- X. Huang, X. Ding,
C.P. Lee, T. Lu, and N. Gu.
Meanings and boundaries of scientific software sharing.
In Proceedings of the ACM Conference on Computer Supported Cooperative
Work, CSCW, pages 423–434, 2013.
- [114]
- X. Huang, T. Lu,
X. Ding, T. Liu, and N. Gu.
A provenance-based solution for software selection in scientific software
sharing.
In 2013 IEEE 17th International Conference on Computer Supported
Cooperative Work in Design, CSCWD 2013, pages 172–177, 2013.
(doi:10.1109/CSCWD.2013.6580958)
- [115]
- X. Huang, T. Zhao, and
Y. Cao.
PIR: A domain specific language for multimedia retrieval.
In 15th IEEE International Symposium on Multimedia, ISM 2013,
pages 359–363, 2013.
(doi:10.1109/ISM.2013.68)
- [116]
- W. Hummer, P. Gaubatz,
M. Strembeck, U. Zdun, and
S. Dustdar.
Enforcement of entailment constraints in distributed service-based business
processes.
Information and Software Technology, 55(11):1884–1903, 2013.
(doi:10.1016/j.infsof.2013.05.001)
- [117]
- M.A.
Ismail, T. Altaf, and S.H. Mirza.
MCSMC: A new parallel multi-level cache simulator for multi-core
processors.
In 2013 Saudi International Electronics, Communications and Photonics
Conference, SIECPC 2013, 2013.
(doi:10.1109/SIECPC.2013.6550746)
- [118]
- M. Jankowski-Lorek,
L. Ostrowski, P. Turek, and
A. Wierzbicki.
Modeling Wikipedia admin elections using multidimensional behavioral social
networks.
Social Network Analysis and Mining, 3(4):787–801, 2013.
(doi:10.1007/s13278-012-0092-6)
- [119]
- B. Jay
and J. Vergara.
Growing a language in pattern calculus.
In 2013 International Symposium on Theoretical Aspects of Software
Engineering, TASE 2013, pages 233–240, 2013.
(doi:10.1109/TASE.2013.37)
- [120]
- J. Jiang, L. Zhang, and
L. Li.
Understanding project dissemination on a social coding site.
In 20th Working Conference on Reverse Engineering, WCRE 2013,
pages 132–141, 2013.
(doi:10.1109/WCRE.2013.6671288)
- [121]
- M. Jin,
L. Huang, and P. Ren.
RFID based space-time navigation scheduling for low-carbon ecotourism
management system.
International Journal of Applied Environmental Sciences,
8(20):2533–2546, 2013.
- [122]
- T. Johanndeiter,
A. Goldstein, and U. Frank.
Towards business process models at runtime.
In 8th Workshop on Models @ Run.time, MRT 2013 - Co-located with 16th
International Conference on Model Driven Engineering Languages and Systems,
MODELS 2013, volume 1079, pages 13–25. CEUR-WS, 2013.
- [123]
- M. Johnson.
Buy-side barriers to e-business technology in the healthcare sector.
International Journal of Healthcare Technology and Management,
14(1-2):110–142, 2013.
(doi:10.1504/IJHTM.2013.055090)
- [124]
- M. Johnson.
Critical success factors for B2B e-markets: A strategic fit perspective.
Marketing Intelligence and Planning, 31(4):337–366, 2013.
- [125]
- M. Johnson.
Critical success factors for B2B e-markets: A strategic fit perspective.
Marketing Intelligence and Planning, 31(6):698–727, 2013.
(doi:10.1108/MIP-10-2013-001)
- [126]
- G. Kakarontzas,
E. Constantinou, A. Ampatzoglou, and
I. Stamelos.
Layer assessment of object-oriented software: A metric facilitating white-box
reuse.
Journal of Systems and Software, 86(2):349–366, 2013.
(doi:10.1016/j.jss.2012.08.041)
- [127]
- S.H. Kannangara and W.M.J.I.
Wijayanayake.
Impact of refactoring on external code quality improvement: An empirical
evaluation.
In 2013 International Conference on Advances in ICT for Emerging Regions,
ICTer 2, pages 60–67. IEEE Computer Society, 2013.
(doi:10.1109/ICTer.2013.6761156)
- [128]
- P. Karmakar and R. Roy.
Evolution of trust and formation of preference clusters in distributed
networked structure.
Studies in Virtual Communities, Blogs, and Modern Social Networking:
Measurements, Analysis, and Investigations, pages 62–96, 2013.
(doi:10.4018/978-1-4666-4022-1.ch006)
- [129]
- M. Kas,
L. Richard Carley, and K.M. Carley.
Monitoring social centrality for peer-to-peer network protection.
IEEE Communications Magazine, 51(12):155–161, 2013.
(doi:10.1109/MCOM.2013.6685771)
- [130]
- A. Kasoju,
K. Petersen, and M.V. Mäntylä.
Analyzing an automotive testing process with evidence-based software
engineering.
Information and Software Technology, 55(7):1237–1259, 2013.
- [131]
- R. Kawahara, K. Ono,
T. Nakada, H. Okabayashi,
K. Hisazumi, T. Nakanishi,
A. Fukuda, Y. Sakamoto, and
T. Nagano.
A model transformation method for evaluation of non-functional requirements of
an embedded system architecture.
Computer Software, 30(1):203–210, 2013.
- [132]
- D. Kelly, D. Hook, and
R. Sanders.
A framework for testing code in computational applications.
Software Design and Development: Concepts, Methodologies, Tools, and
Applications, 1-4:479–505, 2013.
(doi:10.4018/978-1-4666-4301-7.ch024)
- [133]
- Angelos D. Keromytis and
Salvatore J. Stolfo.
Methods,
media, and systems for detecting an anomalous sequence of function calls.
United States Patent 8,489,931, July 2013.
Assignee: The Trustees of Columbia University in the City of New York (New
York, NY).
- [134]
- Z. Khanam and S.A.M. Rizvi.
An evaluative study of software refactoring in procedural programming.
In 2013 World Congress on Engineering and Computer Science, WCECS
2013, volume 1, pages 102–107. Newswood Limited, 2013.
- [135]
- V.Y.
Kharitonov.
A software architecture for high-level development of component-based
distributed virtual reality systems.
In 2013 IEEE 27th International Parallel and Distributed Processing
Symposium Workshops and PhD Forum, IPDPSW 2013, pages 696–705, 2013.
(doi:10.1109/COMPSAC.2013.111)
- [136]
- S. Khatoon, G. Li, and
A. Mahmood.
Comparison and evaluation of source code mining tools and techniques: A
qualitative approach.
Intelligent Data Analysis, 17(3):459–484, 2013.
- [137]
- J. Kim and
S. Lee.
Efficient and flexible storage visualization system based on distributed hash
tables.
Information (Japan), 16(1 A):383–392, 2013.
- [138]
- B. Kitts, D. Au, and
B. Burdick.
A high-dimensional set top box ad targeting algorithm including experimental
comparisons to traditional tv algorithms.
In 13th IEEE International Conference on Data Mining, ICDM 2013,
pages 370–378, 2013.
(doi:10.1109/ICDM.2013.169)
- [139]
- M. Klotzbücher and
H. Bruyninckx.
A lightweight, composable metamodelling language for specification and
validation of internal domain specific languages.
8th International Workshop on Model-Based Methodologies for Pervasive and
Embedded Software, MOMPES 2012, 7706 LNCS:58–68, 2013.
(doi:10.1007/978-3-642-38209-3_4)
- [140]
- E. Kocaguneli, T. Zimmermann,
C. Bird, N. Nagappan, and
T. Menzies.
Distributed development considered harmful?
In 2013 35th International Conference on Software Engineering, ICSE
2013, pages 882–890, 2013.
(doi:10.1109/ICSE.2013.6606637)
- [141]
- S.S.
Kolesnikov, S. Apel, N. Siegmund,
S. Sobernig, C. Kästner, and
S. Senkaya.
Predicting quality attributes of software product lines using software and
network measures and sampling.
In ACM International Conference Proceeding Series, 2013.
- [142]
- K. Kolomvatsos, G. Valkanas,
P. Patelis, and S. Hadjiefthymiades.
Creating, debugging, and testing mobile applications with the IPAC
application creation environment.
Software Design and Development: Concepts, Methodologies, Tools, and
Applications, 2-4:695–718, 2013.
(doi:10.4018/978-1-4666-4301-7.ch033)
- [143]
- T. Koskela, O. Kassinen,
E. Harjula, and M. Ylianttila.
P2P group management systems: A conceptual analysis.
ACM Computing Surveys, 45(2), 2013.
- [144]
- S.D.
Larson and M.E. Martone.
Neurolex.org: An online framework for neuroscience knowledge.
Frontiers in Neuroinformatics, 7(AUG), 2013.
(doi:10.3389/fninf.2013.00018)
- [145]
- K.M.
Lavassani, B. Movahedi, and V. Kumar.
From integration to social media: Understanding electronic marketplace.
Trends in E-Business, E-Services, and E-Commerce: Impact of Technology on
Goods, Services, and Business Transactions, pages 1–19, 2013.
(doi:10.4018/978-1-4666-4510-3.ch001)
- [146]
- H.J. Lee,
B.-K. Seo, and E. Seo.
A git source repository analysis tool based on a novel branch-oriented
approach.
In 2013 4th International Conference on Information Science and
Applications, ICISA 2013, 2013.
(doi:10.1109/ICISA.2013.6579457)
- [147]
- M.B.
Lehmann, R.S. Antunes, and M.P. Barcellos.
Exploring your neighborhood: Comparing connection strategies in swarming
networks through evolving graphs.
In 13th IEEE International Conference on Peer-to-Peer Computing, IEEE P2P
2013. IEEE Computer Society, 2013.
(doi:10.1109/P2P.2013.6688701)
- [148]
- T.S.
Lendvay, B. Hannaford, and R.M. Satava.
Future of robotic surgery.
Cancer Journal (United States), 19(2):109–119, 2013.
- [149]
- J. Lenhard, S. Harrer, and
G. Wirtz.
Measuring the installability of service orchestrations using the SQuaRE
method.
In 6th IEEE International Conference on Service-Oriented Computing and
Applications, SOCA 2013, pages 118–125. IEEE Computer Society, 2013.
(doi:10.1109/SOCA.2013.30)
- [150]
- Nicola Jane Lessing,
Christophe Schnelle, and Peter Mariani.
Maltweb
multi-axis viewing interface and higher level scoping.
United States Patent 8,386,484, February 2013.
Assignee: TimeBase Pty Limited (Sydney, New South Wales, AU).
- [151]
- L. Li and
H. Leung.
Predicting fault-proneness of object-oriented system developed with agile
process using learned bayesian network.
In 15th International Conference on Enterprise Information Systems, ICEIS
2013, volume 2, pages 5–16, 2013.
- [152]
- W. Li,
Y. Meng, and L.-F. Kwok.
Enhancing trust evaluation using intrusion sensitivity in collaborative
intrusion detection networks: Feasibility and challenges.
In 9th International Conference on Computational Intelligence and
Security, CIS 2013, pages 518–522, 2013.
(doi:10.1109/CIS.2013.115)
- [153]
- Y. Li,
H.M. Jiang, and T. Hu.
A study on distributed license authorization system based on threshold secret
sharing.
2013 International Conference on Vehicle and Mechanical Engineering and
Information Technology, VMEIT 2013, 380-384:2749–2752, 2013.
(doi:10.4028/www.scientific.net/AMM.380-384.2749)
- [154]
- Y. Li,
C.-H. Tan, and X. Yang.
It is all about what we have: A discriminant analysis of organizations'
decision to adopt open source software.
Decision Support Systems, 56(1):56–62, 2013.
(doi:10.1016/j.dss.2013.05.006)
- [155]
- Y. Li,
W. Wang, Y. Zhu, and J. Chen.
What accounts for organizations' different usage of B2B e-marketplaces?
In 17th Pacific Asia Conference on Information Systems, PACIS
2013. Pacific Asia Conference on Information Systems, 2013.
- [156]
- C.-Y. Lien,
T.-L. Yang, C.-H. Hsiao, and
T. Kao.
Realizing digital signatures for medical imaging and reporting in a PACS
environment.
Journal of Medical Systems, 37(1), 2013.
(doi:10.1007/s10916-012-9924-1)
- [157]
- E. Ligu,
T. Chaikalis, and A. Chatzigeorgiou.
BuCo reporter: Mining software and bug repositories.
In 6th Balkan Conference in Informatics, BCI-LOCAL 2013, volume
1036, pages 121–127. CEUR-WS, 2013.
- [158]
- S.-J.
Lin and W.-H. Chung.
An efficient (n,k) information dispersal algorithm based on fermat number
transforms.
IEEE Transactions on Information Forensics and Security,
8(8):1371–1383, 2013.
(doi:10.1109/TIFS.2013.2270892)
- [159]
- C.-S. Lin.
Balanced dynamic buffering for scalable video-on-demand streaming on
peer-to-peer networks.
Multimedia Tools and Applications, 62(3):701–718, 2013.
(doi:10.1007/s11042-011-0872-4)
- [160]
- M. Lindberg.
Feedback-based cooperative content distribution for mobile networks.
In 8th ACM Int. Workshop on Performance Monitoring, Measurement, and
Evaluation of Heterogeneous Wireless and Wired Networks, PM2HW2N 2013, Held
in Conjunction with the 16th ACM Int. Conf. on MSWiM 2013, pages
107–115, 2013.
(doi:10.1145/2512840.2512855)
- [161]
- M. Liu, T. Leppanen,
E. Harjula, Z. Ou,
A. Ramalingam, M. Ylianttila, and
T. Ojala.
Distributed resource directory architecture in machine-to-machine
communications.
In 2013 IEEE 9th International Conference on Wireless and Mobile
Computing, Networking and Communications, WiMob 2013, pages 319–324,
2013.
(doi:10.1109/WiMOB.2013.6673379)
- [162]
- M. Liu, T. Leppanen,
E. Harjula, Z. Ou,
M. Ylianttila, and T. Ojala.
Distributed resource discovery in the machine-to-machine applications.
In 10th IEEE International Conference on Mobile Ad-Hoc and Sensor
Systems, MASS 2013, pages 411–412, 2013.
(doi:10.1109/MASS.2013.46)
- [163]
- P. Liu,
T.F. LaPorta, and K. Kotapati.
Cellular network security.
In Network and System Security: Second Edition, pages 319–351.
Elsevier Inc., 2013.
(doi:10.1016/B978-0-12-416689-9.00011-3)
- [164]
- P. Liu,
T.F. LaPorta, and K. Kotapati.
Cellular network security.
In Computer and Information Security Handbook, pages 323–343.
Elsevier Inc., 2013.
(doi:10.1016/B978-0-12-394397-2.00017-9)
- [165]
- A. Logvinenko, C. Gremzow,
and D. Tutsch.
RecMIN: A reconfiguration architecture for network on chip.
In 2013 8th International Workshop on Reconfigurable and
Communication-Centric Systems-on-Chip, ReCoSoC 2013, 2013.
(doi:10.1109/ReCoSoC.2013.6581547)
- [166]
- J. Loveland and J. Reagle.
Wikipedia and encyclopedic production.
New Media and Society, 15(8):1294–1311, 2013.
(doi:10.1177/1461444812470428)
- [167]
- G. Lu and
K. Lü.
Logical trees: An essential method of parsing SQL statement with semantic
analysis.
International Journal of Advancements in Computing Technology,
5(1):270–278, 2013.
(doi:10.4156/ijact.vol5.issue1.30)
- [168]
- T. Lukman, G. Godena,
J. Gray, M. Heričko, and
S. Strmčnik.
Model-driven engineering of process control software — beyond device-centric
abstractions.
Control Engineering Practice, 21(8):1078–1096, 2013.
(doi:10.1016/j.conengprac.2013.03.013)
- [169]
- H.J.
Macho and G. Robles.
Preliminary lessons from a software evolution analysis of moodle.
In 1st International Conference on Technological Ecosystem for Enhancing
Multiculturality, TEEM 2013, pages 157–161, 2013.
(doi:10.1145/2536536.2536560)
- [170]
- A. Malatras, F. Peng, and
B.A. Hirsbrunner.
Energy-efficient peer-to-peer networking and overlays.
In Handbook of Green Information and Communication Systems, pages
513–540. Elsevier Inc., 2013.
(doi:10.1016/B978-0-12-415844-3.00020-6)
- [171]
- D. Mancl
and S. Fraser.
Software tools research: SPLASH panel discussion.
IEEE Software, 30(2):16–17, 2013.
- [172]
- S. Mandal, S. Chakraborty,
and S. Karmakar.
Distributed deterministic 1–2 skip list for peer-to-peer system.
Peer-to-Peer Networking and Applications, 8(1):63–86, 2013.
(doi:10.1007/s12083-013-0222-6)
- [173]
- V. Mansilla and M.-C. Marcos.
Experiencia de usuario en televisión conectada: Un estudio con usuarios.
Profesional de la Informacion, 22(2):122–127, 2013.
- [174]
- M. Marchetti and
M. Colajanni.
Cooperative approaches to siem and intrusion detection.
Advances in Security Information Management: Perceptions and
Outcomes, pages 79–116, 2013.
- [175]
- A.H. Mardani and M. Sangari.
An analysis of the availability and persistence of web citations in Iranian
LIS journals.
International Journal of Information Science and Management,
11(1):29–42, 2013.
- [176]
- J. Marlow and L. Dabbish.
Activity traces and signals in software developer recruitment and hiring.
In Proceedings of the ACM Conference on Computer Supported Cooperative
Work, CSCW, pages 145–155, 2013.
- [177]
- J.M. Marquès, D. Lazaro,
A.A. Juan, X. Vilajosana,
M. Domingo, and J. Jorba.
Planetlab@UOC: A real lab over the internet to experiment with distributed
systems.
Computer Applications in Engineering Education, 21(2):265–275,
2013.
- [178]
- M. Martin Bel, O. Dugeon,
J. Fasson, A. Abou El Kalam,
M. Maachaoui, B. Paillassa, F.J.
Ramón Salguero, and W. Werapun.
Service management.
Digital Home Networking, pages 259–307, 2013.
(doi:10.1002/9781118602829.ch8)
- [179]
- C. Mateos, M. Crasso,
A. Zunino, and J.L. Ordiales Coscia.
Revising WSDL documents: Why and how, part 2.
IEEE Internet Computing, 17(5):46–53, 2013.
(doi:10.1109/MIC.2013.4)
- [180]
- C.A. Mattmann.
Computing: A vision for data science.
Nature, 493(7433):473–475, 2013.
(doi:10.1038/493473a)
- [181]
- L. Meneses, H. Barthwal,
S. Singh, R. Furuta, and
F. Shipman.
Restoring semantically incomplete document collections using lexical
signatures.
International Conference on Theory and Practice of Digital Libraries,
TPDL 2013, 8092 LNCS:321–332, 2013.
(doi:10.1007/978-3-642-40501-3_33)
- [182]
- J. Mercadal, Z. Drey, and
C. Consel.
Denotational semantics of a user-oriented, domain-specific language.
In Semantics, Abstract Interpretation, and Reasoning About Programs:
Essays Dedicated to David A. Schmidt on the Occasion of His 60th
Birthday, volume 129, pages 229–249, 2013.
(doi:10.4204/EPTCS.129.14)
- [183]
- M. Mernik.
An object-oriented approach to language compositions for software language
engineering.
Journal of Systems and Software, 86(9):2451–2464, 2013.
(doi:10.1016/j.jss.2013.04.087)
- [184]
- O. Mizuno.
On effects of tokens in source code to accuracy of fault-prone module
prediction.
In 2013 17th International Computer Science and Engineering Conference,
ICSEC 2013, pages 103–108, 2013.
(doi:10.1109/ICSEC.2013.6694761)
- [185]
- H.S.
Moon, Y.H. Cho, and J.K. Kim.
IERMS: An intelligent exhibition rule management system using PMML.
In 17th Pacific Asia Conference on Information Systems, PACIS
2013. Pacific Asia Conference on Information Systems, 2013.
- [186]
- H.S. Moon,
J.K. Kim, and Y.U. Ryu.
A sequence-based filtering method for exhibition booth visit recommendations.
International Journal of Information Management, 33(4):620–626,
2013.
- [187]
- A. Mouhtaropoulos,
P. Dimotikalis, and C.-T. Li.
Applying a digital forensic readiness framework: Three case studies.
In 2013 13th IEEE International Conference on Technologies for Homeland
Security, HST 2013, pages 217–223, 2013.
(doi:10.1109/THS.2013.6699003)
- [188]
- E. Mourtou.
Modeling access control in healthcare organizations.
In IT Policy and Ethics: Concepts, Methodologies, Tools, and
Applications, volume 2-3, pages 835–856. IGI Global, 2013.
(doi:10.4018/978-1-4666-2919-6.ch038)
- [189]
- H. Muhammad, F. Mascarenhas,
and R. Ierusalimschy.
LuaRocks — a declarative and extensible package management system for lua.
17th Brazilian Symposium on Programming Languages, SBLP 2013, 8129
LNCS:16–30, 2013.
(doi:10.1007/978-3-642-40922-6_2)
- [190]
- Elissa E. S. Murphy, Yan V.
Leshinsky, and John D. Mehr.
Dynamic
placement of replica data.
United States Patent 8,560,639, October 2013.
Assignee: Microsoft Corporation (Redmond, WA).
- [191]
- E. Murphy-Hill,
T. Zimmermann, C. Bird, and
N. Nagappan.
The design of bug fixes.
In 2013 35th International Conference on Software Engineering, ICSE
2013, pages 332–341, 2013.
(doi:10.1109/ICSE.2013.6606579)
- [192]
- S. Nadi, C. Dietrich,
R. Tartler, R.C. Holt, and
D. Lohmann.
Linux variability anomalies: What causes them and how do they get fixed?
In 10th International Working Conference on Mining Software Repositories,
MSR 2013, pages 111–120, 2013.
(doi:10.1109/MSR.2013.6624017)
- [193]
- H. Naguib, N. Narayan,
B. Brügge, and D. Helal.
Bug report assignee recommendation using activity profiles.
In 10th International Working Conference on Mining Software Repositories,
MSR 2013, pages 22–30, 2013.
(doi:10.1109/MSR.2013.6623999)
- [194]
- A. Narayanan, Y. Chen,
S. Pang, and B. Tao.
The effects of different representations on static structure analysis of
computer malware signatures.
The Scientific World Journal, 2013, 2013.
(doi:10.1155/2013/671096)
- [195]
- B.S.
Neto, V.T. Da Silva, M. Ribeiro,
E. Costa, and C. Lucena.
Using jason to develop refactoring agents.
In 2nd Brazilian Conference on Intelligent Systems, BRACIS 2013,
pages 44–50. IEEE Computer Society, 2013.
(doi:10.1109/BRACIS.2013.16)
- [196]
- P. Nistala and P. Kumari.
An approach to carry out consistency analysis on requirements: Validating and
tracking requirements through a configuration structure.
In 2013 21st IEEE International Requirements Engineering Conference, RE
2013, pages 320–325. IEEE Computer Society, 2013.
(doi:10.1109/RE.2013.6636737)
- [197]
- R. Olanda, M. Peŕez, and
J.M. Ordunã.
Hybrid P2P schemes for remote terrain interactive visualization systems.
Future Generation Computer Systems, 29(6):1522–1532, 2013.
(doi:10.1016/j.future.2012.11.002)
- [198]
- P. Oliveira, H. Borges,
M.T. Valente, and H.A.X. Costa.
Metrics-based detection of similar software.
In 25th International Conference on Software Engineering and Knowledge
Engineering, SEKE 2013, pages 447–450. Knowledge Systems Institute
Graduate School, January 2013.
- [199]
- J.L. Ordiales Coscia,
C. Mateos, M. Crasso, and
A. Zunino.
Anti-pattern free code-first web services for state-of-the-art Java WSDL
generation tools.
International Journal of Web and Grid Services, 9(2):107–126,
2013.
- [200]
- Raymond E. Ozzie, Jack E.
Ozzie, George P. Moromisato, Paresh S. Suthar,
Raman Narayanan, and Matthew S. Augustine.
Data
synchronization and sharing relationships.
United States Patent 8,370,423, February 2013.
Assignee: Microsoft Corporation (Redmond, WA).
- [201]
- Raymond E. Ozzie, Jack E.
Ozzie, Paresh S. Suthar, Raman Naravanan, and
Matthew S. Augustine.
Clipboard
augmentation with references.
United States Patent 8,453,066, May 2013.
Assignee: Microsoft Corporation (Redmond, WA).
- [202]
- T.Y. Pang
and S. Maslov.
Universal distribution of component frequencies in biological and technological
systems.
Proceedings of the National Academy of Sciences of the United States of
America, 110(15):6235–6239, 2013.
- [203]
- E. Pantano.
Ubiquitous retailing innovative scenario: From the fixed point of sale to the
flexible ubiquitous store.
Journal of Technology Management and Innovation, 8(2):84–92,
2013.
- [204]
- D. Papadimitriou, D. Colle,
P. Audenaert, and P. Demeester.
Geometric information routing.
In 2013 IEEE International Conference on Advanced Networks and
Telecommunications Systems, ANTS 2013. IEEE Computer Society, 2013.
(doi:10.1109/ANTS.2013.6802893)
- [205]
- C.T. Papadopoulos, M.E.J.
Okelly, and A.K. Tsadiras.
A DSS for the buffer allocation of production lines based on a comparative
evaluation of a set of search algorithms.
International Journal of Production Research, 51(14):4175–4199,
2013.
(doi:10.1080/00207543.2012.752585)
- [206]
- P.M.
Papadopoulos, I.G. Stamelos, and A. Meiszner.
Enhancing software engineering education through open source projects: Four
years of students' perspectives.
Education and Information Technologies, 18(2):381–397, 2013.
- [207]
- G. Paschalidou, E. Stiakakis,
and A. Chatzigeorgiou.
An application of data envelopment analysis to software quality assessment.
In 6th Balkan Conference in Informatics, BCI 2013, pages 228–235,
2013.
(doi:10.1145/2490257.2490264)
- [208]
- S. Pavalkis, L. Nemuraite,
and R. Butkiene.
Derived properties: A user friendly approach to improving model traceability.
Information Technology and Control, 42(1):48–60, 2013.
- [209]
- D.J. Pearce.
Sound and complete flow typing with unions, intersections and negations.
14th International Conference on Verification, Model Checking, and
Abstract Interpretation, VMCAI 2013, 7737 LNCS:335–354, 2013.
(doi:10.1007/978-3-642-35873-9_21)
- [210]
- Marcus Peinado and Weidong
Cui.
Malware
investigation by analyzing computer memory.
United States Patent 8,566,944, October 2013.
Assignee: Microsoft Corporation (Redmond, WA).
- [211]
- E. Perel and U. Yechiali.
On customers acting as servers.
Asia-Pacific Journal of Operational Research, 30(5), 2013.
(doi:10.1142/S021759591350019X)
- [212]
- E. Pérez-Cortés and
H. Sato.
On the impact of path redundancy awareness in evolutionary P2P networking.
Journal of Advanced Computational Intelligence and Intelligent
Informatics, 17(6):872–882, 2013.
- [213]
- F. Peters, T. Menzies, and
A. Marcus.
Better cross company defect prediction.
In 10th International Working Conference on Mining Software Repositories,
MSR 2013, pages 409–418, 2013.
(doi:10.1109/MSR.2013.6624057)
- [214]
- A. Pino.
Augmentative and alternative communication systems for the motor disabled.
Disability Informatics and Web Accessibility for Motor
Limitations, pages 105–152, 2013.
(doi:10.4018/978-1-4666-4442-7.ch004)
- [215]
- A. Pino.
Free assistive technology software for persons with motor disabilities.
Assistive Technologies and Computer Access for Motor Disabilities,
pages 110–152, 2013.
(doi:10.4018/978-1-4666-4438-0.ch005)
- [216]
- S. Prstacic and M. Zagar.
A model for web application and web service peer-to-peer hosting network
architecture.
In 35th International Conference on Information Technology Interfaces,
ITI 2013, pages 335–340, 2013.
- [217]
- A.S.M.M. Rahman and
A. El Saddik.
Mobile pointme-based spatial haptic interaction with annotated media for
learning purposes.
Multimedia Systems, 19(2):131–149, 2013.
- [218]
- A. Rastogi and A. Sureka.
Samikshaumbra: Contribution and performance assessment of software
maintenance professionals by mining software repositories.
In 2013 20th Asia-Pacific Software Engineering Conference, APSEC
2013, pages 170–175. IEEE Computer Society, 2013.
(doi:10.1109/APSEC.2013.134)
- [219]
- A. Rastogi, A. Gupta, and
A. Sureka.
Samiksha: Mining issue tracking system for contribution and performance
assessment.
In ACM International Conference Proceeding Series, pages 13–22,
2013.
- [220]
- N. Ratti and P. Kaur.
Case study: Version control in component-based systems.
In Designing, Engineering, and Analyzing Reliable and Efficient
Software, pages 283–297. IGI Global, 2013.
(doi:10.4018/978-1-4666-2958-5.ch016)
- [221]
- A.J.
Reinoso, J.M. Gonzalez-Barahona, R. Muñoz
Mansilla, and I. Herraiz.
Temporal characterization of the requests to Wikipedia.
Studies in Computational Intelligence, 439:71–89, 2013.
(doi:10.1007/978-3-642-31546-6-5)
- [222]
- H. Ren, W. Mo,
S. Liu, D. Li, Y. Sun, and
G. Zhao.
Code automation technology based COSINE software development.
In ASME 2013 Power Conference, POWER 2013, volume 2. American
Society of Mechanical Engineers, 2013.
(doi:10.1115/POWER2013-98109)
- [223]
- H. Ren,
W.-T. Mo, G. Zhao, and S. Liu.
Automation algorithm of COSINE software code framework based on breadth first
search.
Yuanzineng Kexue Jishu/Atomic Energy Science and Technology,
47(SUPPL.):717–720, 2013.
(doi:10.7538/yzk.2013.47.S1.0717)
- [224]
- P. Rivière and O. Rosec.
Model-based interchange formats: A generic set of tools for validating
structured data against a knowledge base.
In 2013 Complex Systems Design and Management Conference, CSDM
2013, volume 1085, pages 127–138. CEUR-WS, 2013.
- [225]
- D. Rodriguez, R. Ruiz,
J.C. Riquelme, and R. Harrison.
A study of subgroup discovery approaches for defect prediction.
Information and Software Technology, 55(10):1810–1822, 2013.
(doi:10.1016/j.infsof.2013.05.002)
- [226]
- C. Ruiz and W. Robinson.
Measuring open source quality: A literature review.
In Open Source Software Dynamics, Processes, and Applications,
pages 189–206. IGI Global, 2013.
(doi:10.4018/978-1-4666-2937-0.ch010)
- [227]
- G. Samarthyam,
G. Suryanarayana, T. Sharma, and
S. Gupta.
MIDAS: A design quality assessment method for industrial software.
In 2013 35th International Conference on Software Engineering, ICSE
2013, pages 911–920, 2013.
(doi:10.1109/ICSE.2013.6606640)
- [228]
- B.T. Sampath Kumar and
D. Vinay Kumar.
HTTP 404-page (not) found: Recovery of decayed url citations.
Journal of Informetrics, 7(1):145–157, 2013.
(doi:10.1016/j.joi.2012.09.007)
- [229]
- L. Sang-Hyun, J.-G. Lee, and
M. Kyung-Il.
Smart home security system using multiple ANFIS.
International Journal of Smart Home, 7(3):121–132, 2013.
- [230]
- M. Sarrab and O.M.H. Rehman.
Selection criteria of open source software: First stage for adoption.
International Journal of Information Processing and Management,
4(4):51–58, 2013.
(doi:10.4156/ijipm.vol4.issue4.6)
- [231]
- J. Schaeffler.
Digital video recorders: DVRs changing TV and advertising
forever.
Taylor and Francis, 2013.
(doi:10.4324/9780080928333)
- [232]
- Christoph Schnelle and
Geoffrey John Nolan.
Mapping
of data from XML to SQL.
United States Patent 8,396,901, March 2013.
Assignee: Timebase Pty Limited (Sydney, New South Wales, AU).
- [233]
- B. Schoenmakers, N. Van
Den Broek, I. Nagy, B. Vasilescu, and
A. Serebrenik.
Assessing the complexity of upgrading software modules.
In 20th Working Conference on Reverse Engineering, WCRE 2013,
pages 433–440, 2013.
(doi:10.1109/WCRE.2013.6671319)
- [234]
- P. Sendın-Raña,
F.J. González-Castaño,
F. Gómez-Cuba, R. Asorey-Cacheda, and
J.M. Pousada-Carballo.
Improving management performance of P2PSIP for mobile sensing in wireless
overlays.
Sensors (Switzerland), 13(11):15364–15384, 2013.
(doi:10.3390/s131115364)
- [235]
- M. Shojafar, J.H. Abawajy,
Z. Delkhah, A. Ahmadi,
Z. Pooranian, and A. Abraham.
An efficient and distributed file search in unstructured peer-to-peer networks.
Peer-to-Peer Networking and Applications, 8(1):120–136, 2013.
(doi:10.1007/s12083-013-0236-0)
- [236]
- S. Shuraida and H. Barki.
The influence of analyst communication in IS projects.
Journal of the Association of Information Systems, 14(9):482–520,
2013.
- [237]
- Stylianos Sidiroglou,
Angelos D. Keromytis, and Salvatore J. Stolfo.
Systems,
methods, and media protecting a digital data processing device from
attack.
United States Patent 8,407,785, March 2013.
Assignee: The Trustees of Columbia University in the City of New York (New
York, NY).
- [238]
- M.S. Sivakumar, J. Murji,
L.D. Jacob, F. Nyange, and
M. Banupriya.
Speech controlled automatic wheelchair.
In 2013 Pan African International Conference on Information Science,
Computing and Telecommunications, PACT 2013, pages 70–73. Institute
of Electrical and Electronics Engineers Inc., 2013.
(doi:10.1109/SCAT.2013.7055093)
- [239]
- Q.D.
Soetens, J. Perez, and S. Demeyer.
An initial investigation into change-based reconstruction of
floss-refactorings.
In 29th IEEE International Conference on Software Maintenance, ICSM
2013, pages 384–387, 2013.
(doi:10.1109/ICSM.2013.53)
- [240]
- A. Solano, C. Collazos,
C. Rusu, and L. Merchán.
Evaluating the usability of interactive digital television applications.
In 2013 10th International Conference on Information Technology: New
Generations, ITNG 2013, pages 127–132, 2013.
(doi:10.1109/ITNG.2013.24)
- [241]
- G. Song, B. Yang,
Z. Wu, J. Chuai, and Y. Zheng.
ROIN: Reputation-oriented inverted indexing for the P2P network.
Journal of Supercomputing, 64(3):968–986, 2013.
(doi:10.1007/s11227-013-0878-y)
- [242]
- M.E. Sosa-Rodrıguez and
E. Pérez-Cortés.
The evolution of cooperation in file sharing P2P systems: First steps.
Lecture Notes in Computer Science (including subseries Lecture Notes in
Artificial Intelligence and Lecture Notes in Bioinformatics), 7630
LNAI(PART 2):151–162, 2013.
- [243]
- David Howard Spencer and
Darla Renae Agard.
Systems,
methods and software for researching statutory information.
United States Patent 8,458,190, June 2013.
Assignee: Thomson Reuters Global Resources (Baar, CH).
- [244]
- Varadarajan Sridhar, Ravi G.
Amur, and Korrapati Kalyane Rao.
System
and method for automated safe reprogramming of software radios.
United States Patent 8,347,108, January 2013.
Assignee: Satyam Computer Services Limited of Mayfair Centre (Secunderabad,
IN).
- [245]
- D. Stingl, C. Groß, and
K. Saller.
Decentralized monitoring in peer-to-peer systems.
Lecture Notes in Computer Science (including subseries Lecture Notes in
Artificial Intelligence and Lecture Notes in Bioinformatics),
7847:81–111, 2013.
(doi:10.1007/978-3-642-38673-2-6)
- [246]
- Salvatore J. Stolfo,
Angelos D. Keromytis, and Stylianos Sidiroglou.
Methods,
media, and systems for detecting anomalous program executions.
United States Patent 8,601,322, December 2013.
Assignee: The Trustees of Columbia University in the City of New York (New
York, NY).
- [247]
- Z. Sun,
S. Pan, Y.C. Su, and P. Zhang.
Headio: Zero-configured heading acquisition for indoor mobile devices through
multimodal context sensing.
In 2013 ACM International Joint Conference on Pervasive and Ubiquitous
Computing, UbiComp 2013, pages 33–42, 2013.
(doi:10.1145/2493432.2493434)
- [248]
- W.D.
Sunindyo, T. Moser, D. Winkler, and
S. Biffl.
Analyzing OSS project health with heterogeneous data sources.
In Open Source Software Dynamics, Processes, and Applications,
pages 207–230. IGI Global, 2013.
(doi:10.4018/978-1-4666-2937-0.ch011)
- [249]
- C.R.
Suthikshn Kumar.
Portable speech encryption based anti-tapping device.
In 135th Audio Engineering Society Convention 2013, pages
523–528. Audio Engineering Society, 2013.
- [250]
- Y. Thomas, C. Tsilopoulos,
G. Xylomenos, and G.C. Polyzos.
Multisource and multipath file transfers through publish-subscribe
internetworking.
In 2013 3rd ACM SIGCOMM Workshop on Information-Centric Networking, ICN
2013, pages 43–44, 2013.
(doi:10.1145/2491224.2491238)
- [251]
- P. Tomas, M.J. Escalona, and
M. Mejias.
Open source tools for measuring the internal quality of Java software
products. a survey.
Computer Standards and Interfaces, 36(1):244–255, 2013.
(doi:10.1016/j.csi.2013.08.006)
- [252]
- S. Treter, N. Perrier,
J.A. Sosa, and S. Roman.
Telementoring: A multi-institutional experience with the introduction of a
novel surgical approach for adrenalectomy.
Annals of Surgical Oncology, 20(8):2754–2758, 2013.
(doi:10.1245/s10434-013-2894-9)
- [253]
- A.K.
Tsadiras, C.T. Papadopoulos, and M.E.J.
O'Kelly.
An artificial neural network based decision support system for solving the
buffer allocation problem in reliable production lines.
Computers and Industrial Engineering, 66(4):1150–1162, 2013.
(doi:10.1016/j.cie.2013.07.024)
- [254]
- E. Tsekleves, R. Whitham,
K. Kondo, and A. Hill.
Investigating pay-as-you-go to address issues of trust, privacy and security
around media use at home.
Universal Access in the Information Society, 12(2):217–231,
2013.
- [255]
- B. Turhan,
A. Tosun Misirli, and A. Bener.
Empirical evaluation of the effects of mixed project data on learning defect
predictors.
Information and Software Technology, 55(6):1101–1118, 2013.
- [256]
- I. Turnu, G. Concas,
M. Marchesi, and R. Tonelli.
The fractal dimension of software networks as a global quality metric.
Information Sciences, 245:290–303, 2013.
(doi:10.1016/j.ins.2013.05.014)
- [257]
- M. Umarji and S.E. Sim.
Archetypal internet-scale source code searching.
Finding Source Code on the Web for Remix and Reuse, pages 35–52,
2013.
(doi:10.1007/978-1-4614-6596-6_3)
- [258]
- V. Urovi,
A.C. Olivieri, S. Bromuri,
N. Fornara, and M.I. Schumacher.
A peer to peer agent coordination framework for IHE based cross-community
health record exchange.
In Proceedings of the ACM Symposium on Applied Computing, pages
1355–1362, 2013.
- [259]
- Ashok Vadekar and Brian
Neill.
Retrofitting
authentication onto firmware.
United States Patent 8,566,791, October 2013.
Assignee: BlackBerry Limited (Waterloo, Ontario, CA).
- [260]
- T. Vaimann, A. Kallaste,
A. Kilk, and A. Belahcen.
Lifecycle-based design and optimization of electrical motor-drives —
challenges and possibilities.
In 2013 3rd International Conference on Electric Power and Energy
Conversion Systems, EPECS 2013, 2013.
(doi:10.1109/EPECS.2013.6713037)
- [261]
- S. Vasilakos, C.D. Stylios,
and J. Garofalakis.
An analytical hierarchy process methodology to evaluate it solutions for
organizations.
In 25th European Modeling and Simulation Symposium, EMSS 2013,
pages 593–600, 2013.
- [262]
- B. Vasilescu, V. Filkov, and
A. Serebrenik.
Stackoverflow and GitHub: Associations between software development and
crowdsourced knowledge.
In 2013 ASE/IEEE Int. Conf. on Social Computing, SocialCom 2013, the 2013
ASE/IEEE Int. Conf. on Big Data, BigData 2013, the 2013 Int. Conf. on
Economic Computing, EconCom 2013, the 2013 PASSAT 2013, and the 2013 ASE/IEEE
Int. Conf. on BioMedCom 2013, pages 188–195, 2013.
(doi:10.1109/SocialCom.2013.35)
- [263]
- M.J.
Villanueva, F. Valverde, and O. Pastor.
Involving end-users in domain-specific languages development experiences from a
bioinformatics SME.
In 8th International Conference on Evaluation of Novel Approaches to
Software Engineering, ENASE 2013, pages 97–108, 2013.
- [264]
- V. Šešum Čavić and
E. Kühn.
Algorithms and framework for comparison of bee-intelligence based peer-to-peer
lookup.
4th International Conference on Advances in Swarm Intelligence, ICSI
2013, 7928 LNCS(PART 1):404–413, 2013.
(doi:10.1007/978-3-642-38703-6_48)
- [265]
- S. Wagner.
Software product quality control.
Springer Berlin Heidelberg, 2013.
(doi:10.1007/978-3-642-38571-1)
- [266]
- C.-S.
Wang, C.-L. Chen, and D.-J. Deng.
P2P-based mobile navigation system with location service.
Peer-to-Peer Networking and Applications, 8(1):22–31, 2013.
(doi:10.1007/s12083-013-0204-8)
- [267]
- J. Wang,
X. Chen, and D. Yang.
A study of important node rank based on KAD network.
Advanced Science Letters, 19(8):2266–2270, 2013.
- [268]
- J. Wang, Z. Zhang,
K. Xu, Y. Yin, and P. Guo.
A research on security and privacy issues for patient related data in medical
organization system.
International Journal of Security and its Applications,
7(4):287–298, 2013.
- [269]
- L. Wang,
P. Yu, Z. Wang, C. Yang, and
Q. Ye.
On the evolution of linux kernels: A complex network perspective.
Journal of software: Evolution and Process, 25(5):439–458,
2013.
- [270]
- T. Wegeler, F. Gutzeit,
A. Destailleur, and B. Dock.
Evaluating the benefits of using domain-specific modeling languages — an
experience report.
In 2013 13th ACM Workshop on Domain-Specific Modeling, DSM 2013,
pages 7–12. Association for Computing Machinery, 2013.
(doi:10.1145/2541928.2541930)
- [271]
- M. Weiher and R. Hirschfeld.
Polymorphic identifiers: Uniform resource access in objective-smalltalk.
In 9th Dynamic Languages Symposium, DLS 2013 - Co-located with the 4th
Annual ACM International Conference on Systems, Programming, Languages, and
Applications: Software for Humanity, SPLASH 2013, pages 61–71.
Association for Computing Machinery, 2013.
(doi:10.1145/2508168.2508169)
- [272]
- F. Wu.
Scale-free characteristic in open source software: An empirical case study.
International Journal of Advancements in Computing Technology,
5(1):792–799, 2013.
(doi:10.4156/ijact.vol5.issue1.88)
- [273]
- H. Xia,
L. Meng, and S. Lou.
Research on spatial image streaming model based on bittorrent.
Cehui Xuebao/Acta Geodaetica et Cartographica Sinica,
42(2):225–232, 2013.
- [274]
- D.-G. Xu,
L.-H. Qin, J.-H. Park, and J.-L.
Zhou.
ODSA: Chord-based object discovery service architecture for the internet of
things.
Wireless Personal Communications, 73(4):1455–1476, 2013.
(doi:10.1007/s11277-013-1260-3)
- [275]
- H. Yamamoto and K. Yamazaki.
LISP-based application-layer multicasting system for a content distribution
network.
Journal of Information Processing, 21(2):226–236, 2013.
- [276]
- H. Yamamoto and K. Yamazaki.
Location-aware optimal resource selection method for P2P-based contents
management and real-time distribution.
IEICE Transactions on Information and Systems, E96-D(2):213–225,
2013.
(doi:10.1587/transinf.E96.D.213)
- [277]
- Q. Yan,
Y. Li, and R.H. Deng.
Malware protection on RFID-enabled supply chain management systems in the
EPCglobal network.
In Advanced Security and Privacy for RFID Technologies, pages
153–175. IGI Global, 2013.
(doi:10.4018/978-1-4666-3685-9.ch010)
- [278]
- Q. Yan,
Y. Li, and R.H. Deng.
Malware protection on RFID-enabled supply chain management systems in the
EPCglobal network.
Crisis Management: Concepts, Methodologies, Tools, and
Applications, 2-3:1166–1188, 2013.
(doi:10.4018/978-1-4666-4707-7.ch058)
- [279]
- M.H.
Yarmand and D.G. Down.
Server allocation for zero buffer tandem queues.
European Journal of Operational Research, 230(3):596–603,
2013.
- [280]
- H. Zafar.
Human resource information systems: Information security concerns for
organizations.
Human Resource Management Review, 23(1):105–113, 2013.
(doi:10.1016/j.hrmr.2012.06.010)
- [281]
- C. Zhai
and H. Liu.
Factors affecting SMEs adoption decision of B2B e-marketplace: A case
study in China.
In 2013 10th International Conference on Service Systems and Service
Management, ICSSSM 2013, pages 262–266, 2013.
(doi:10.1109/ICSSSM.2013.6602643)
- [282]
- F. Zhang, A. Mockus,
Y. Zou, F. Khomh, and A.E.
Hassan.
How does context affect the distribution of software maintainability metrics?
In 29th IEEE International Conference on Software Maintenance, ICSM
2013, pages 350–359, 2013.
(doi:10.1109/ICSM.2013.46)
- [283]
- W. Zhang, S. Wang,
Y. Yang, and Q. Wang.
Heterogeneous network analysis of developer contribution in bug repositories.
In 2013 International Conference on Cloud and Service Computing, CSC
2013, pages 98–105. IEEE Computer Society, 2013.
(doi:10.1109/CSC.2013.23)
- [284]
- Z. Zhao
and Y. Guo.
Scale-free model in software engineering: A new design method.
2013 International Conference on Geo-Informatics in Resource Management
and Sustainable Ecosystem, GRMSE 2013, 399 PART II:346–353, 2013.
(doi:10.1007/978-3-642-41908-9_35)
- [285]
- Y. Zhao, X. Pan,
C.C. Li, G. Yao, J. Wu,
X. Fu, D. Lai, D. Li, and
Q. Zhang.
Modeling and case study of the production line layout system.
Open Automation and Control Systems Journal, 5(1):51–58, 2013.
(doi:10.2174/1874444301305010051)
- [286]
- Y. Zhao,
X.Y. Pan, and C.C. Li.
Modeling and case study of the production line layout system.
9th International Symposium on Linear Drives for Industry Applications,
LDIA 2013, 416-417:1373–1380, 2013.
(doi:10.4028/www.scientific.net/AMM.416-417.1373)
- [287]
- Y. Zhao, X.Y. Pan,
C.C. Li, G.H. Yao, J. Wu,
X. Fu, D. Lai, D. Li, and
Q.W. Zhang.
Optimal production linelayout model based on integer programming.
Advanced Materials Research, 690 693:2896–2900, 2013.
- [288]
- Yu Zheng, Lizhu Zhang, and
Xing Xie.
Mining
correlation between locations using location history.
United States Patent 8,612,134, December 2013.
Assignee: Microsoft Corporation (Redmond, WA).
- [289]
- Z. Zhu and A. Afanasyev.
Let's ChronoSync: Decentralized dataset state synchronization in named data
networking.
In 2013 21st IEEE International Conference on Network Protocols, ICNP
2013. IEEE Computer Society, 2013.
(doi:10.1109/ICNP.2013.6733578)
- [290]
- J. Zhu,
J. He, H. Zhou, and B. Zhao.
EPCache: In-network video caching for LTE core networks.
In 2013 International Conference on Wireless Communications and Signal
Processing, WCSP 2013. IEEE Computer Society, 2013.
(doi:10.1109/WCSP.2013.6677228)
- [291]
- D. Zissis and D. Lekkas.
Trust coercion in the name of usable public key infrastructure.
Security and Communication Networks, 7(11):1734–1745, 2013.
(doi:10.1002/sec.870)