[1]
H. Li, F.-H. Li, J. Cao, B. Niu, W.-H. Sun, and K. Geng. Survey on security and privacy preserving for mobile internet service. Tongxin Xuebao/Journal on Communications, 35(11):1–11, 2014. (doi:10.3969/j.issn.1000-436x.2014.11.001)
[2]
Y. Yu, G. Yin, H. Wang, and T. Wang. Exploring the patterns of social behavior in Github. In 1st International Workshop on Crowd-Based Software Development Methods and Technologies, CrowdSoft 2014, pages 31–36. Association for Computing Machinery, Inc, 2014. (doi:10.1145/2666539.2666571)
[3]
H. Li, L.-Y. Hao, R. Chen, X. Ge, and H. Zhao. Symmetric preferential attachment for new vertices attaching to software networks. New Generation Computing, 32(3-4):271–296, 2014. (doi:10.1007/s00354-014-0405-6)
[4]
L. Li, L. Wang, J. Chen, R. Wang, and Z. Zhang. Fairness analysis for multiparty nonrepudiation protocols based on improved strand space. Discrete Dynamics in Nature and Society, 2014, 2014. (doi:10.1155/2014/904717)
[5]
Y. Yu, W. Rong, and W. Zhijun. SSNF: Shared datacenter mechanism for inter-datacenter bulk transfer. In 2nd International Conference on Advanced Cloud and Big Data, CBD 2014, pages 184–189. Institute of Electrical and Electronics Engineers Inc., 2014. (doi:10.1109/CBD.2014.31)
[6]
Q. Gu, S.J. Xiong, and D.X. Chen. Correlations between characteristics of maximum influence and degree distributions in software networks. Science China Information Sciences, 57(7):1–12, 2014. (doi:10.1007/s11432-013-5047-7)
[7]
T.-S. Lo, H.-P. Lu, and H.-L. Wei. New service development model: A user experience-oriented design. In 2014 18th IEEE International Conference on Computer Supported Cooperative Work in Design, CSCWD 2014, pages 710–715. IEEE Computer Society, 2014. (doi:10.1109/CSCWD.2014.6846932)
[8]
Z.X. Ng, A. Ahmad, and S.B. Maynard. Information security management: Factors that influence security investments in SMES. In 11th Australian Information Security Management Conference, ISM 2013, pages 60–74. Edith Cowan University, 2014.
[9]
C. Su and A. Xu. Buffer allocation for hybrid manufacturing/remanufacturing system considering quality grading. International Journal of Production Research, 52(5):1269–1284, 2014. (doi:10.1080/00207543.2013.828165)
[10]
R. An and J.Z. Guo. An empirical research on e-marketplace basic functions. 3rd International Conference on Manufacturing Engineering and Process, ICMEP 2014, 548-549:1510–1523, 2014. (doi:10.4028/www.scientific.net/AMM.548-549.1510)
[11]
Gaurav S. Kc and Alfred V. Aho. Methods, systems, and media for detecting and preventing malcode execution. United States Patent 8,925,090, December 2014. Assignee: The Trustees of Columbia University in the City of New York (New York, NY).
[12]
L. Li and H. Leung. Bayesian prediction of fault-proneness of agile-developed object-oriented system. 15th International Conference on Enterprise Information Systems, ICEIS 2013, 190:209–225, 2014. (doi:10.1007/978-3-319-09492-2_13)
[13]
J. De Lara, E. Guerra, and J.S. Cuadrado. When and how to use multilevel modelling. ACM Transactions on Software Engineering and Methodology, 24(2), 2014. (doi:10.1145/2685615)
[14]
B. De Smet, L. Lempereur, Z. Sharafi, Y.-G. Guéhéneuc, G. Antoniol, and N. Habra. Taupe: Visualizing and analyzing eye-tracking data. Science of Computer Programming, 79:260–278, 2014. (doi:10.1016/j.scico.2012.01.004)
[15]
A.A. De Melo, M. Hinz, G. Scheibel, C. Diacui Medeiros Berkenbrock, I. Gasparini, and F. Baldo. Version control system gamification: A proposal to encourage the engagement of developers to collaborate in software projects. 6th International Conference on Social Computing and Social Media, SCSM 2014 - Held as Part of 16th International Conference on Human-Computer Interaction, HCI International 2014, 8531 LNCS:550–558, 2014. (doi:10.1007/978-3-319-07632-4-52)
[16]
K.R. Da Hora Rodrigues, C.A.C. Teixeira, and V.P. De Almeida Neris. Heuristics for assessing emotional response of viewers during the interaction with TV programs. 16th International Conference on Human-Computer Interaction: Theories, Methods, and Tools, HCI International 2014, 8510 LNCS(PART 1):577–588, 2014. (doi:10.1007/978-3-319-07233-3_53)
[17]
D.A. Da Costa, U. Kulesza, E. Aranha, and R. Coelho. Unveiling developers contributions behind code commits: An exploratory study. In 29th Annual ACM Symposium on Applied Computing, SAC 2014, pages 1152–1157. Association for Computing Machinery, 2014. (doi:10.1145/2554850.2555030)
[18]
T.M. El-Sakka and M. Zaki. Using predicate-based model checker for verifying e-commerce protocols. International Journal of Network Security, 16(2):90–101, 2014.
[19]
J. Al Dallal and S. Morasca. Predicting object-oriented class reuse-proneness using internal quality attributes. Empirical Software Engineering, 19(4):775–821, 2014. (doi:10.1007/s10664-012-9239-3)
[20]
H. Ren, W. Mo, G. Zhao, D. Ren, and S. Liu. Breadth first search based cosine software code framework automation algorithm. In ASME 2014 Power Conference, POWER 2014, volume 2. American Society of Mechanical Engineers (ASME), 2014. (doi:10.1115/POWER2014-32014)
[21]
Y. Xia, G. Yan, and H. Zhang. Analyzing the significance of process metrics for TT&c software defect prediction. In 2014 5th IEEE International Conference on Software Engineering and Service Science, ICSESS 2014, pages 77–81. IEEE Computer Society, 2014. (doi:10.1109/ICSESS.2014.6933517)
[22]
L. Han, M. Qian, X. Xu, C. Fu, and H. Kwisaba. Malicious code detection model based on behavior association. Tsinghua Science and Technology, 19(5):508–515, 2014. (doi:10.1109/TST.2014.6919827)
[23]
H. Luo, Y. Dong, Y. Ng, and S. Wang. VertexRank: Importance rank for software network vertices. In 38th Annual IEEE Computer Software and Applications Conference, COMPSAC 2014, pages 251–260. IEEE Computer Society, 2014. (doi:10.1109/COMPSAC.2014.34)
[24]
J. Bai, J. Wang, and G. Zou. A malware detection scheme based on mining format information. Scientific World Journal, 2014, 2014. (doi:10.1155/2014/260905)
[25]
M. Dai, B. Shen, T. Zhang, and M. Zhao. Impact of consecutive changes on later file versions. In 2014 3rd International Workshop on Evidential Assessment of Software Technologies, EAST 2014, pages 17–24. Association for Computing Machinery, 2014. (doi:10.1145/2627508.2627512)
[26]
J. Liu, S.Y. Chen, M.W. Lin, and H. Liu. A reliable file protection system based on transparent encryption. International Journal of Security and its Applications, 8(1):123–132, 2014. (doi:10.14257/ijsia.2014.8.1.12)
[27]
N. Neu, K.B. Kent, C. Gracie, and A. Hinkenjann. Automatic application performance improvements through VM parameter modification after runtime behavior analysis. In 8th International Conference on Performance Evaluation Methodologies and Tools, VALUETOOLS 2014, pages 147–152. ICST, 2014. (doi:10.4108/icst.valuetools.2014.258196)
[28]
Y. Gao, Z. Zheng, and F. Qin. Analysis of Linux kernel as a complex network. Chaos, Solitons and Fractals, 69:246–252, 2014. (doi:10.1016/j.chaos.2014.10.008)
[29]
M. Jin, D. Zheng, and P. Ren. Application of RFID based low-carbon scenic integrated management system in jiuzhaigou area. 7th International Conference on Management Science and Engineering Management, ICMSEM 2013, 242 LNEE(VOL. 2):1269–1280, 2014. (doi:10.1007/978-3-642-40081-0_108)
[30]
S. Gul, I. Mahajan, and A. Ali. The growth and decay of URLs citation: A case of an online library & information science journal. Malaysian Journal of Library and Information Science, 19(3):27–39, 2014.
[31]
J. Roy, C. Contini, F. Brodeur, N. Diouf, and W. Suryn. Method for the evaluation of open source software quality from an IT untrained user perspective. In 2014 7th International C Conference on Computer Science and Software Engineering, C3S2E 2014, pages 148–153. Association for Computing Machinery, 2014. (doi:10.1145/2641483.2641525)
[32]
Jie Lin, Jian Ni, and Andres Quiroz Hernandez. Two-level structured overlay design for cluster management in a peer-to-peer network. United States Patent 8,756,253, June 2014. Assignee: Xerox Corporation (Norwalk, CT).
[33]
C.-S. Lin and M.-J. Yan. Dynamic peer buffer adjustment to improve service availability on peer-to-peer on-demand streaming networks. Peer-to-Peer Networking and Applications, 7(1):1–15, 2014. (doi:10.1007/s12083-012-0138-6)
[34]
C.-S. Lin and J.-W. Lin. Streaming videos over BitTorrent by balancing playback continuity and distribution of piece rareness. In 2014 23rd International Conference on Computer Communication and Networks, ICCCN 2014. Institute of Electrical and Electronics Engineers Inc., 2014. (doi:10.1109/ICCCN.2014.6911868)
[35]
J.-S. Lee and D.-H. Shin. The relationship between human and smart TVs based on emotion recognition in HCI. 14th International Conference on Computational Science and Its Applications, ICCSA 2014, 8582 LNCS(PART 4):652–667, 2014. (doi:10.1007/978-3-319-09147-1_47)
[36]
S.O. Kim and Y.J. Choi. Firmware development process for food refrigeration system. Food Science and Biotechnology, 23(4):1159–1167, 2014. (doi:10.1007/s10068-014-0158-5)
[37]
L.K.H. Lai and K.S. Chin. Development of a failure mode and effects analysis based risk assessment tool for information security. Industrial Engineering and Management Systems, 13(1):87–100, 2014. (doi:10.7232/iems.2014.13.1.087)
[38]
D. Koll, J. Li, and X. Fu. SOUP: An online social network by the people, for the people. In 15th International Middleware Conference, Middleware 2014, pages 193–204. Association for Computing Machinery, Inc, 2014. (doi:10.1145/2663165.2663324)
[39]
Z. Liao, S. Liu, and S. Xi. An improved multipoint relaying scheme for message propagation in distributed peer-to-peer system. International Journal of Distributed Sensor Networks, 2014, 2014. (doi:10.1155/2014/792814)
[40]
Z. Dong, Y. Liu, G. Luo, and S. Diao. A smart-driver based method for preventing SQL injection attacks. International Journal of Security and its Applications, 8(2):67–76, 2014. (doi:10.14257/ijsia.2014.8.2.07)
[41]
J. Ruan, Y. Shi, and T. Samatsu. A similarity-based M(1,2,3) approach for rating the security of network systems. In 2014 Joint 7th International Conference on Soft Computing and Intelligent Systems, SCIS 2014 and 15th International Symposium on Advanced Intelligent Systems, ISIS 2014, pages 1078–1084. Institute of Electrical and Electronics Engineers Inc., 2014. (doi:10.1109/SCIS-ISIS.2014.7044737)
[42]
S. Choy, B. Wong, G. Simon, and C. Rosenberg. A hybrid edge-cloud architecture for reducing on-demand gaming latency. Multimedia Systems, 20(5):503–519, 2014. (doi:10.1007/s00530-014-0367-z)
[43]
A. Kaur, K. Kaur, and K. Pathak. Software maintainability prediction by data mining of software code metrics. In 2014 International Conference on Data Mining and Intelligent Computing, ICDMIC 2014. Institute of Electrical and Electronics Engineers Inc., 2014. (doi:10.1109/ICDMIC.2014.6954262)
[44]
I. Rhiu, Y.L. Rhie, G.-W. Kim, and M.H. Yun. Observing the smart tv-viewing experience by a diary-based observation method. In 58th International Annual Meeting of the Human Factors and Ergonomics Society, HFES 2014, volume 2014-January, pages 1209–1213. Human Factors an Ergonomics Society Inc., 2014. (doi:10.1177/1541931214581252)
[45]
L. Kong, G. Bauer, and J. Hale. Location-based device grouping for function restriction. In 9th Annual Cyber and Information Security Research Conference, CISRC 2014, pages 113–116. Association for Computing Machinery, 2014. (doi:10.1145/2602087.2602099)
[46]
A. Lima, L. Rossi, and M. Musolesi. Coding together at scale: GitHub as a collaborative social network. In 8th International Conference on Weblogs and Social Media, ICWSM 2014, pages 295–304. The AAAI Press, 2014.
[47]
H. Yang, R. Sawhney, G. Zhang, L. Marella, and Z. Han. Using smart kitchen for grocery purchase prediction. In IIE Annual Conference and Expo 2014, pages 2504–2511. Institute of Industrial Engineers, 2014.
[48]
J. Swan, J. Woodward, E. Özcan, G. Kendall, and E. Burke. Searching the hyper-heuristic design space. Cognitive Computation, 6(1):66–73, 2014. (doi:10.1007/s12559-013-9201-8)
[49]
S. Alam, R.N. Horspool, and I. Traore. MARD: A framework for metamorphic malware analysis and real-time detection. In 28th IEEE International Conference on Advanced Information Networking and Applications, IEEE AINA 2014, pages 480–489. Institute of Electrical and Electronics Engineers Inc., 2014. (doi:10.1109/AINA.2014.59)
[50]
B. Zhou, D. Llewellyn-Jones, D. Lamb, M. Asim, Q. Shi, and M. Merabti. A heuristic approach for secure service composition adaptation. In Cyberpatterns: Unifying Design Patterns with Security and Attack Patterns, pages 97–105. Springer International Publishing, 2014. (doi:10.1007/978-3-319-04447-7_8)
[51]
X.-J. Shen, L. Liu, Z.-J. Zha, P.-Y. Gu, Z.-Q. Jiang, J.-M. Chen, and J. Panneerselvam. Achieving dynamic load balancing through mobile agents in small world P2P networks. Computer Networks, PartA:134–148, 2014. (doi:10.1016/j.comnet.2014.05.003)
[52]
H.-Q. Wang, X.-M. Xue, and W.-Y. Lv. Improved degraded ceiling algorithm for optimal buffer allocation in unreliable production lines. Kongzhi yu Juece/Control and Decision, 29(8):1424–1428, 2014. (doi:10.13195/j.kzyjc.2013.0770)
[53]
S.K. Sowe, A. Cerone, and D. Settas. An empirical study of FOSS developers patterns of contribution: Challenges for data linkage and analysis. Science of Computer Programming, 91(PART B):249–265, 2014. (doi:10.1016/j.scico.2013.11.033)
[54]
Girish Maskeri Rama, Basavara Raju Muddu, and Avinash Kak. Systems, methods, and computer-readable media for measuring quality of application programming interfaces. United States Patent 8,656,365, February 2014. Assignee: Infosys Limited (Bangalore, IN).
[55]
P. Yang and Y.-P. Li. On the complementary binary future internet architecture. Complex Systems and Complexity Science, 11(1):53–59, 2014. (doi:10.13306/j.1672-3813.2014.01.007)
[56]
W.-C. Shin and J. Rho. Implementation of software refactoring operation using a code model. International Journal of Software Engineering and its Applications, 8(6):17–30, 2014. (doi:10.14257/ijseia.2014.8.6.02)
[57]
J. Vila and D. Ribeiro-Soriano. An overview of web 2.0 social capital: A cross-cultural approach. Service Business, 8(3):399–404, 2014. (doi:10.1007/s11628-014-0245-y)
[58]
A. Kaur and K. Kaur. Performance analysis of ensemble learning for predicting defects in open source software. In 3rd International Conference on Advances in Computing, Communications and Informatics, ICACCI 2014, pages 219–225. Institute of Electrical and Electronics Engineers Inc., 2014. (doi:10.1109/ICACCI.2014.6968438)
[59]
D. Rusk and Y. Coady. Location-based analysis of developers and technologies on GitHub. In 28th IEEE International Conference on Advanced Information Networking and Applications Workshops, IEEE WAINA 2014, pages 681–685. IEEE Computer Society, 2014. (doi:10.1109/WAINA.2014.110)
[60]
Rod Cope and Eric Weidner. Tools for software stacks. United States Patent 8,832,647, September 2014. Assignee: OpenLogic, Inc. (Broomfield, CO).
[61]
Jonathan Salz and Richard S. Tibbetts. Data parallelism and parallel operations in stream processing. United States Patent 8,769,485, July 2014. Assignee: TIBCO Software, Inc. (Palo Alto, CA).
[62]
M. Azab and M. Eltoweissy. Bio-inspired evolutionary sensory system for cyber-physical system security. Intelligent Systems Reference Library, 70:39–69, 2014. (doi:10.1007/978-3-662-43616-5_2)
[63]
M. Azab and M. Eltoweissy. CyPhyMASC: Evolutionary monitoring, analysis, sharing and control platform for SmartGrid defense. In 15th IEEE International Conference on Information Reuse and Integration, IEEE IRI 2014, pages 639–645. Institute of Electrical and Electronics Engineers Inc., 2014. (doi:10.1109/IRI.2014.7051950)
[64]
D. Dıaz-Sánchez, F. Almenarez, A. Marın, R. Sánchez-Guerrero, and P. Arias. Media gateway: Bringing privacy to private multimedia cloud connections. Telecommunication Systems, 55(2):315–330, 2014. (doi:10.1007/s11235-013-9783-1)
[65]
Y. Zhang, G. Yin, Y. Yu, and H. Wang. A exploratory study of @-mention in GitHub's pull-requests. In 21st Asia-Pacific Software Engineering Conference, APSEC 2014, volume 1, pages 343–350. IEEE Computer Society, 2014. (doi:10.1109/APSEC.2014.58)
[66]
Y. Zhang, G. Yin, Y. Yu, and H. Wang. Investigating social media in GitHub's pull-requests: A case study on ruby on rails. In 1st International Workshop on Crowd-Based Software Development Methods and Technologies, CrowdSoft 2014, pages 37–41. Association for Computing Machinery, Inc, 2014. (doi:10.1145/2666539.2666572)
[67]
L. Zhang, Y. Zou, B. Xie, and Z. Zhu. Recommending relevant projects via user behaviour: An exploratory study on Github. In 1st International Workshop on Crowd-Based Software Development Methods and Technologies, CrowdSoft 2014, pages 25–30. Association for Computing Machinery, Inc, 2014. (doi:10.1145/2666539.2666570)
[68]
M. Klein, H. Van De Sompel, R. Sanderson, H. Shankar, L. Balakireva, K. Zhou, and R. Tobin. Scholarly context not found: One in five articles suffers from reference rot. PLoS ONE, 9(12), 2014. (doi:10.1371/journal.pone.0115253)
[69]
G. Szoke, C. Nagy, R. Ferenc, and T. Gyimóthy. A case study of refactoring large-scale industrial systems to efficiently improve source code quality. 14th International Conference on Computational Science and Its Applications, ICCSA 2014, 8583 LNCS(PART 5):524–540, 2014. (doi:10.1007/978-3-319-09156-3_37)
[70]
S. Ouhbi, A. Idri, J.L.F. Aleman, and A. Toval. Evaluating software product quality: A systematic mapping study. In Joint Conference of the 24th International Workshop on Software Measurement, IWSM 2014 and the 9th International Conference on Software Process and Product Measurement, Mensura 2014, pages 141–151. Institute of Electrical and Electronics Engineers Inc., 2014. (doi:10.1109/IWSM.Mensura.2014.30)
[71]
G. Szoke, G. Antal, C. Nagy, R. Ferenc, and T. Gyimothy. Bulk fixing coding issues and its effects on software quality: Is it worth refactoring? In 14th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2014, pages 95–104. Institute of Electrical and Electronics Engineers Inc., 2014. (doi:10.1109/SCAM.2014.18)
[72]
G. Dévai, D. Leskó, and M. Tejfel. Language design and implementation via the combination of embedding and parsing. Communications in Computer and Information Science, 457:131–147, 2014. (doi:10.1007/978-3-662-44920-2_9)
[73]
S. Gupta, H.K. Singh, R.D. Venkatasubramanyam, and U. Uppili. SCQAM: A scalable structured code quality assessment method for industrial software. In 22nd International Conference on Program Comprehension, ICPC 2014, pages 244–252. Association for Computing Machinery, Inc, 2014. (doi:10.1145/2597008.2597806)
[74]
T. Kosar, M. Mernik, J. Gray, and T. Kos. Debugging measurement systems using a domain-specific modeling language. Computers in Industry, 65(4):622–635, 2014. (doi:10.1016/j.compind.2014.01.013)
[75]
R. Dévai, L. Vidács, R. Ferenc, and T. Gyimóthy. Service layer for IDE integration of C/C++ preprocessor related analysis. 14th International Conference on Computational Science and Its Applications, ICCSA 2014, 8583 LNCS(PART 5):402–417, 2014. (doi:10.1007/978-3-319-09156-3_29)
[76]
L. Demir, S. Tunali, and D.T. Eliiyi. The state of the art on buffer allocation problem: A comprehensive survey. Journal of Intelligent Manufacturing, 25(3):371–392, 2014. (doi:10.1007/s10845-012-0687-9)
[77]
M. Alias, D.D.H. Miriam, and C.R. Rene Robin. An ontology-based domain model to enhance the software development process. International Journal of Metadata, Semantics and Ontologies, 9(3):204–214, 2014. (doi:10.1504/IJMSO.2014.063132)
[78]
B. Gueye, O. Flauzac, C. Rabat, and I. Niang. A self-adaptive structuring for P2P-based grid. In 14th International Conference on Innovations for Community Services, I4CS 2014, pages 121–128. IEEE Computer Society, 2014. (doi:10.1109/I4CS.2014.6860564)
[79]
V. Saini, H. Sajnani, J. Ossher, and C.V. Lopes. A dataset for Maven artifacts and bug patterns found in them. In 11th International Working Conference on Mining Software Repositories, MSR 2014, pages 416–419. Association for Computing Machinery, Inc, 2014. (doi:10.1145/2597073.2597134)
[80]
V. Urovi, A.C. Olivieri, A.B. De La Torre, S. Bromuri, N. Fornara, and M. Schumacher. Secure P2P cross-community health record exchange in IHE compatible systems. International Journal on Artificial Intelligence Tools, 23(1), 2014. (doi:10.1142/S0218213014400065)
[81]
T. Clark, C. Gonzalez-Perez, and B. Henderson-Sellers. Foundation for multi-level modelling. In Workshop on Multi-Level Modelling, MULTI 2014, Co-located with ACM/IEEE 17th International Conference on Model Driven Engineering Languages and Systems, MoDELS 2014, volume 1286, pages 43–52. CEUR-WS, 2014.
[82]
S. Getir, M. Challenger, and G. Kardas. The formal semantics of a domain-specific modeling language for semantic web enabled multi-agent systems. International Journal of Cooperative Information Systems, 23(3), 2014. (doi:10.1142/S0218843014500051)
[83]
M.-O. Stehr, M. Kim, and C. Talcott. Partially ordered knowledge sharing and fractionated systems in the context of other models for distributed computing. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 8373:402–433, 2014. (doi:10.1007/978-3-642-54624-2-20)
[84]
Y.N. Zhang, L. Han, and X. Cao. Design of network information security system. 4th International Conference on Information Science, Automation and Material System, ISAM 2014, 1022:257–260, 2014. (doi:10.4028/www.scientific.net/AMR.1022.257)
[85]
N.K. Saini, V.K. Sihag, and R.C. Yadav. A reactive approach for detection of collusion attacks in P2P trust and reputation systems. In 2014 4th IEEE International Advance Computing Conference, IACC 2014, pages 312–317. IEEE Computer Society, 2014. (doi:10.1109/IAdCC.2014.6779340)
[86]
Yu Zheng, Wencheng Zheng, and Xing Xie. Collaborative location and activity recommendations. United States Patent 8,719,198, May 2014. Assignee: Microsoft Corporation (Redmond, WA).
[87]
O.A.L. Lemos, A.C. De Paula, F.C. Zanichelli, and C.V. Lopes. Thesaurus-based automatic query expansion for interface-driven code search. In 11th International Working Conference on Mining Software Repositories, MSR 2014, pages 212–221. Association for Computing Machinery, Inc, 2014. (doi:10.1145/2597073.2597087)
[88]
Eyal Koren, Golan Hallel, and Asaf Dafner. Running injected code prior to execution of an application. United States Patent 8,745,598, June 2014. Assignee: BMC Software, Inc. (Houston, TX).
[89]
Brendan Kitts, Brian Burdick, Dyng Au, Liang Wei, and Amanda Powter. System and method for attributing multi-channel conversion events and subsequent activity to multi-channel media sources. United States Patent 8,768,770, July 2014. Assignee: Lucid Commerce, Inc. (Seattle, WA).
[90]
Brendan Kitts, Brian Burdick, Dyng Au, and Tyson Roberts. Method and system for automatically targeting ads to television media using demographic similarity. United States Patent 8,627,359, January 2014. Assignee: Lucid Commerce, Inc. (Seattle, WA).
[91]
Brendan Kitts, Brian Burdick, Dyng Au, and Tyson Roberts. Targeting television ads using keywords. United States Patent 8,789,092, July 2014. Assignee: Lucid Commerce, Inc. (Seattle, WA).
[92]
Raymond E. Ozzie, Jack E. Ozzie, Paresh S. Suthar, and Raman Narayanan. Synchronization associated duplicate data resolution. United States Patent 8,751,442, June 2014. Assignee: Microsoft Corporation (Redmond, WA).
[93]
J. Akoka and I. Comyn-Wattiau. Business intelligence. Ingenierie des Systemes d'Information, 19(5):9–43, 2014. (doi:10.3166/ISI.19.5.9-43)
[94]
M. Alias and C.R.R. Robin. An ontology-based software development environment using upgraded functionalities of Clojure. International Conference on Advanced Computing, Networking and Informatics, ICACNI 2013, 243:619–625, 2014. (doi:10.1007/978-81-322-1665-0_61)
[95]
I. Dávid and L. Gönczy. Ontology-supported design of domain-specific languages: A complex event processing case study. In Computational Linguistics: Concepts, Methodologies, Tools, and Applications, volume 1-3, pages 324–351. IGI Global, 2014. (doi:10.4018/978-1-4666-6042-7.ch016)
[96]
M. Klein and M.L. Nelson. Moved but not gone: An evaluation of real-time methods for discovering replacement web pages. International Journal on Digital Libraries, 14(1-2):17–38, 2014. (doi:10.1007/s00799-014-0108-0)
[97]
J.M.G. Smith and R. Barnes. Optimal server allocation in closed finite queueing networks. Flexible Services and Manufacturing Journal, 27(1):58–85, 2014. (doi:10.1007/s10696-014-9202-2)
[98]
P. Clase and P. Lombard. Web communication: A juniortukkie approach to successfully recruit and retain quality students for the University of Pretoria. In International Conferences on ICT, Society and Human Beings 2014, Web Based Communities and Social Media 2014, e-Commerce 2014, Information Systems Post-Implementation and Change Management 2014 and e-Health 2014, pages 143–151. IADIS, 2014.
[99]
T. Clark and J. Willans. Software language engineering with XMF and XModeler. In Computational Linguistics: Concepts, Methodologies, Tools, and Applications, volume 2-3, pages 866–896. IGI Global, 2014. (doi:10.4018/978-1-4666-6042-7.ch042)
[100]
V. Urovi and M.I. Schumacher. The present and future of dynamic e-health interoperability in switzerland: Results of an online questionnaire. In 7th International Conference on Health Informatics, HEALTHINF 2014 - Part of 7th International Joint Conference on Biomedical Engineering Systems and Technologies, BIOSTEC 2014, pages 244–249. SciTePress, 2014.
[101]
J. Li. Dynamic visiting coordination problem based on multi-agent for large-scale crowds' activities. International Journal of Industrial and Systems Engineering, 17(1):115–131, 2014. (doi:10.1504/IJISE.2014.060830)
[102]
P. Narang, S. Ray, C. Hota, and V. Venkatakrishnan. PeerShark: Detecting peer-to-peer botnets by tracking conversations. In 2014 IEEE Computer Society's Security and Privacy Workshops, SPW 2014, volume 2014-January, pages 108–115. Institute of Electrical and Electronics Engineers Inc., 2014. (doi:10.1109/SPW.2014.25)
[103]
P. Narang, C. Hota, and V.N. Venkatakrishnan. PeerShark: flow-clustering and conversation-generation for malicious peer-to-peer traffic identification. Tijdschrift voor Urologie, 2014(1):1–12, 2014. (doi:10.1186/s13635-014-0015-3)
[104]
G. Concas, C. Monni, M. Orrù, M. Ortu, and R. Tonelli. Refactoring clustering in Java software networks. Lecture Notes in Business Information Processing, 199:121–135, 2014.
[105]
F. Sohail, J. Ahmed, and Z. Habib. PKI based cryptographic module. In 17th IEEE International Multi Topic Conference, IEEE INMIC 2014, pages 87–91. Institute of Electrical and Electronics Engineers Inc., 2014. (doi:10.1109/INMIC.2014.7097317)
[106]
J. Finlay, R. Pears, and A.M. Connor. Data stream mining for predicting software build outcomes using source code metrics. Information and Software Technology, 56(2):183–198, 2014. (doi:10.1016/j.infsof.2013.09.001)
[107]
H. Babaei, M. Fathy, and M. Romoozi. Modeling and optimizing random walk content discovery protocol over mobile ad-hoc networks. Performance Evaluation, 74:18–29, 2014. (doi:10.1016/j.peva.2013.12.002)
[108]
A. Bergel, S. Maass, S. Ducasse, and T. Girba. A domain-specific language for visualizing software dependencies as a graph. In 2nd IEEE International Working Conference on Software Visualization, VISSOFT 2014, pages 45–49. Institute of Electrical and Electronics Engineers Inc., 2014. (doi:10.1109/VISSOFT.2014.17)
[109]
H. Babaei, M. Fathy, R. Berangi, and M. Romoozi. The impact of mobility models on the performance of P2P content discovery protocols over mobile ad hoc networks. Peer-to-Peer Networking and Applications, 7(1):66–85, 2014. (doi:10.1007/s12083-012-0184-0)
[110]
S. Harrer, G. Wirtz, F. Nizamic, and A. Lazovik. Towards a robustness evaluation framework for BPEL engines. In 7th IEEE International Conference on Service-Oriented Computing and Applications, SOCA 2014, pages 199–206. Institute of Electrical and Electronics Engineers Inc., 2014. (doi:10.1109/SOCA.2014.40)
[111]
M. Arzoky, S. Swift, S. Counsell, and J. Cain. A measure of the modularisation of sequential software versions using random graph theory. Lecture Notes in Business Information Processing, 199:105–120, 2014.
[112]
M. Crasso, C. Mateos, A. Zunino, and M. Campo. EasySOC: Making web service outsourcing easier. Information Sciences, 259:452–473, 2014. (doi:10.1016/j.ins.2010.01.013)
[113]
C. Mateos, M. Crasso, A. Zunino, and M. Campo. A software support to initiate systems engineering students in service-oriented computing. Computer Applications in Engineering Education, 22(2):252–265, 2014. (doi:10.1002/cae.20551)
[114]
N. Burles, S. O'Keefe, J. Austin, and S. Hobson. ENAMeL: A language for binary correlation matrix memories: Reducing the memory constraints of matrix memories. Neural Processing Letters, 40(1):1–23, 2014. (doi:10.1007/s11063-013-9307-8)
[115]
A. Hindle, A. Wilson, K. Rasmussen, E.J. Barlow, J.C. Campbell, and S. Romansky. GreenMiner: A hardware based mining software repositories software energy consumption framework. In 11th International Working Conference on Mining Software Repositories, MSR 2014, pages 12–21. Association for Computing Machinery, Inc, 2014. (doi:10.1145/2597073.2597097)
[116]
M. Avalle, A. Pironti, and R. Sisto. Formal verification of security protocol implementations: A survey. Formal Aspects of Computing, 26(1):99–123, 2014. (doi:10.1007/s00165-012-0269-9)
[117]
C. Faragó, P. Hegedus, and R. Ferenc. The impact of version control operations on the quality change of the source code. 14th International Conference on Computational Science and Its Applications, ICCSA 2014, 8583 LNCS(PART 5):353–369, 2014. (doi:10.1007/978-3-319-09156-3_26)
[118]
F. Loukos, H. Karatza, and V. Kalogeraki. Real-time data dissemination in mobile peer-to-peer networks. Journal of Systems and Software, 90(1):179–190, 2014. (doi:10.1016/j.jss.2013.11.1122)
[119]
D. Thakur, B. Beckert, I. Bortagaray, R. Brouwer, M.P. Falcão, and L. Brito. Turning technology on its head: The distributional dynamics of open-source software. In Innovation and Inequality: Emerging Technologies in an Unequal World, pages 147–176. Edward Elgar Publishing Ltd., 2014. (doi:10.4337/9781781951675.00015)
[120]
G. Robles, J.M. González-Barahona, C. Cervigón, A. Capiluppi, and D. Izquierdo-Cortázar. Estimating development effort in free/open source software projects by mining software repositories: A case study of OpenStack. In 11th International Working Conference on Mining Software Repositories, MSR 2014, pages 222–231. Association for Computing Machinery, Inc, 2014. (doi:10.1145/2597073.2597107)
[121]
D. Pletea, B. Vasilescu, and A. Serebrenik. Security and emotion: Sentiment analysis of security discussions on GitHub. In 11th International Working Conference on Mining Software Repositories, MSR 2014, pages 348–351. Association for Computing Machinery, Inc, 2014. (doi:10.1145/2597073.2597117)
[122]
J. Müller, C.A. Shoemaker, and R. Piché. SO-i: A surrogate model algorithm for expensive nonlinear integer programming problems including global optimization applications. Journal of Global Optimization, 59(4):865–889, 2014. (doi:10.1007/s10898-013-0101-y)
[123]
Y. Thomas, C. Tsilopoulos, G. Xylomenos, and G.C. Polyzos. Accelerating file downloads in publish subscribe internetworking with multisource and multipath transfers. In World Telecommunications Congress 2014, WTC 2014. Institute of Electrical and Electronics Engineers Inc., 2014.
[124]
S. Validi, A. Bhattacharya, and P.J. Byrne. Integrated low-carbon distribution system for the demand side of a product distribution supply chain: A DoE-guided MOPSO optimiser-based solution approach. International Journal of Production Research, 52(10):3074–3096, 2014. (doi:10.1080/00207543.2013.864054)
[125]
E. Loukis, Y. Charalabidis, and A. Androutsopoulou. A study of multiple social media use in the european parliament from an innovation perspective. In 18th Panhellenic Conference on Informatics, PCI 2014, volume 02-04-October-2014. Association for Computing Machinery, 2014. (doi:10.1145/2645791.2645840)
[126]
H.-C. Estler, M. Nordio, C.A. Furia, B. Meyer, and J. Schneider. Agile vs. structured distributed software development: A case study. Empirical Software Engineering, 19(5):1197–1224, 2014. (doi:10.1007/s10664-013-9271-y)
[127]
P.J. Clarke, Y. Wu, A.A. Allen, F. Hernandez, M. Allison, and R. France. Towards dynamic semantics for synthesizing interpreted DSMLs. In Computational Linguistics: Concepts, Methodologies, Tools, and Applications, volume 3-3, pages 1439–1466. IGI Global, 2014. (doi:10.4018/978-1-4666-6042-7.ch071)
[128]
M.A. Ismail, S.H. Mirza, and T. Altaf. "logn+1" and "logn" model: A binary tree based multi-level cache system for multi-core processors. Computer Systems Science and Engineering, 29(2):131–151, 2014.
[129]
D.T. Nguyen, Q.B. Duong, E. Zamai, and M.K. Shahzad. Dynamic structure identification of Bayesian network model for fault diagnosis of FMS. In 40th Annual Conference of the IEEE Industrial Electronics Society, IECON 2014, pages 119–125. Institute of Electrical and Electronics Engineers Inc., 2014. (doi:10.1109/IECON.2014.7048487)
[130]
M.C. Olesen, R.R. Hansen, J.L. Lawall, and N. Palix. Coccinelle: Tool support for automated CERT C secure coding standard certification. Science of Computer Programming, 91(PART B):141–160, 2014. (doi:10.1016/j.scico.2012.10.011)
[131]
A.C. Santos, J.M.P. Cardoso, P.C. Diniz, D.R. Ferreira, and Z. Petrov. A DSL for specifying run-time adaptations for embedded systems: an application to vehicle stereo navigation. Journal of Supercomputing, 70(3):1218–1248, 2014. (doi:10.1007/s11227-014-1192-z)
[132]
Asaf Dafner, Sigal Korczyn, Yelena Langleyben, and Shiri Semo Judelman. Recording method calls that led to an unforeseen problem. United States Patent 8,762,952, June 2014. Assignee: BMC Software, Inc. (Houston, TX).
[133]
David D. Brandt, Kenwood Hall, Mark Burton Anderson, Craig D. Anderson, and George Bradford Collins. System and methodology providing automation security analysis, validation, and learning in an industrial controller environment. United States Patent 8,909,926, December 2014. Assignee: Rockwell Automation Technologies, Inc. (Mayfield Heights, OH).
[134]
Salvatore J. Stolfo, Malek Ben Salem, and Shlomo Hershkop. Methods, systems, and media for masquerade attack detection by monitoring computer user behavior. United States Patent 8,769,684, July 2014. Assignee: The Trustees of Columbia University in the City of New York (New York, NY).
[135]
T. Chusho and J. Li. Conceptual modeling for web applications and definitions of business logic for end-user-initiative development. In 7th IADIS International Conference on Information Systems, IS 2014, pages 184–192. IADIS, 2014.
[136]
M.Y. Allaho and W.-C. Lee. Trends and behavior of developers in open collaborative software projects. In 2014 1st IEEE International Conference on Behavioral, Economic, Socio-Cultural Computing, BESC 2014. Institute of Electrical and Electronics Engineers Inc., 2014. (doi:10.1109/BESC.2014.7059515)
[137]
A. Tiwana and A.A. Bush. Spotting lemons in platform markets: A conjoint experiment on signaling. IEEE Transactions on Engineering Management, 61(3):393–405, 2014. (doi:10.1109/TEM.2014.2311074)
[138]
Elissa E. S. Murphy and John D. Mehr. Intelligent tiers of backup data. United States Patent 8,769,049, July 2014. Assignee: Microsoft Corporation (Redmond, WA).
[139]
Elissa E. S. Murphy and Navjot Virk. Distributed backup and versioning. United States Patent 8,769,055, July 2014. Assignee: Microsoft Corporation (Redmond, WA).
[140]
O. Mamavi and O. Meier. L'attachement préférentiel dans la formation d'alliances stratégiques. Revue Francaise de Gestion, 241(4):79–91, 2014. (doi:10.3166/RFG.241.79-91)
[141]
O. Mizuno and Y. Hirata. A cross-project evaluation of text-based fault-prone module prediction. In 2014 6th International Workshop on Empirical Software Engineering in Practice, IWESEP 2014, pages 43–48. Institute of Electrical and Electronics Engineers Inc., 2014. (doi:10.1109/IWESEP.2014.9)
[142]
R. Mishra and A. Sureka. Mining peer code review system for computing effort and contribution metrics for patch reviewers. In 2014 4th IEEE Workshop on Mining Unstructured Data, MUD 2014, pages 11–15. Institute of Electrical and Electronics Engineers Inc., 2014. (doi:10.1109/MUD.2014.11)
[143]
B. Braatz and C. Brandt. A framework for families of domain-specific modelling languages. Software and Systems Modeling, 13(1):109–132, 2014. (doi:10.1007/s10270-012-0271-y)
[144]
D. Korzun and A. Gurtov. Hierarchical architectures in structured peer-to-peer overlay networks. Peer-to-Peer Networking and Applications, 7(4):359–395, 2014. (doi:10.1007/s12083-013-0200-z)
[145]
M. Sarrab and O.M.H. Rehman. Empirical study of open source software selection for adoption, based on software quality characteristics. Advances in Engineering Software, 69:1–11, 2014. (doi:10.1016/j.advengsoft.2013.12.001)
[146]
M.A. Harris and K.P. Patten. Mobile device security considerations for small- and medium-sized enterprise business mobility. Information Management and Computer Security, 22(1):97–114, 2014. (doi:10.1108/IMCS-03-2013-0019)
[147]
R. Ramler and J. Gmeiner. Practical challenges in test environment management. In 7th IEEE International Conference on Software Testing, Verification and Validation Workshops, ICSTW 2014, pages 358–359. IEEE Computer Society, 2014. (doi:10.1109/ICSTW.2014.41)
[148]
A.V. Uzunov and E.B. Fernandez. An extensible pattern-based library and taxonomy of security threats for distributed systems. Computer Standards and Interfaces, 36(4):734–747, 2014. (doi:10.1016/j.csi.2013.12.008)
[149]
M. Weiher and R. Hirschfeld. Polymorphic identifiers: Uniform resource access in objective-smalltalk. ACM SIGPLAN Notices, 49(2):61–71, 2014.
[150]
K. Lee. How collective intelligence emerges: Knowledge creation process in Wikipedia from microscopic viewpoint. In 2014 12th International Working Conference on Advanced Visual Interfaces, AVI 2014, pages 373–374. Association for Computing Machinery, 2014. (doi:10.1145/2598153.2600040)
[151]
I. Teixidó, F. Sebé, J. Conde, and F. Solsona. MPI-based implementation of an enhanced algorithm to solve the LPN problem in a memory-constrained environment. Parallel Computing, 40(5-6):100–112, 2014. (doi:10.1016/j.parco.2014.04.002)
[152]
S. Bellomo, N. Ernst, R. Nord, and R. Kazman. Toward design decisions to enable deployability: Empirical study of three projects reaching for the continuous delivery holy grail. In 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2014, pages 702–707. Institute of Electrical and Electronics Engineers Inc., 2014. (doi:10.1109/DSN.2014.104)
[153]
H. Sajnani, V. Saini, J. Ossher, and C.V. Lopes. Is popularity a measure of quality? an analysis of maven components. In 30th International Conference on Software Maintenance and Evolution, ICSME 2014, pages 231–240. Institute of Electrical and Electronics Engineers Inc., 2014. (doi:10.1109/ICSME.2014.45)
[154]
M. Romoozi, M. Fathy, and R. Berangi. Performance analysis and improvement content discovery protocols over vehicular networks. Wireless Personal Communications, 75(2):857–899, 2014. (doi:10.1007/s11277-013-1395-2)
[155]
V. Ivanova, B. Sedov, Y. Sheynin, and A. Syschikov. Domain-specific languages for embedded systems portable software development. In 16th Conference of Open Innovations Association, FRUCT 2014, volume 2014-December, pages 24–30. IEEE Computer Society, 2014. (doi:10.1109/FRUCT.2014.7000923)
[156]
E. Franchi, A. Poggi, and M. Tomaiuolo. Multi-agent active services for online social networks. In Handbook of Research on Demand-Driven Web Services: Theory, Technologies, and Applications, pages 84–100. IGI Global, 2014. (doi:10.4018/978-1-4666-5884-4.ch004)
[157]
S. Almagor, U. Boker, and O. Kupferman. Discounting in LTL. 20th International Conference on Tools and Algorithms for the Construction and Analysis of Systems, TACAS 2014 - Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2014, 8413 LNCS:424–439, 2014. (doi:10.1007/978-3-642-54862-8_37)
[158]
J. Porubän, J. Kollár, and M. Sabo. Abstraction of computer language patterns: The inference of textual notation for a DSL. In Computational Linguistics: Concepts, Methodologies, Tools, and Applications, volume 3-3, pages 1401–1421. IGI Global, 2014. (doi:10.4018/978-1-4666-6042-7.ch069)
[159]
A. Qureshi, D. Megıas, and H. Rifà-Pous. Framework for preserving security and privacy in peer-to-peer content distribution systems. Expert Systems with Applications, 42(3):1391–1408, 2014. (doi:10.1016/j.eswa.2014.08.053)
[160]
F. Armetta, M. Haddad, S. Hassas, and H. Kheddouci. A self-organized system improving inner topology for data sharing efficiency. Evolving Systems, 5(2):109–119, 2014. (doi:10.1007/s12530-013-9087-4)
[161]
L. Quesada, F. Berzal, and J.-C. Cubero. ModelCC — a pragmatic parser generator. International Journal of Software Engineering and Knowledge Engineering, 24(8):1177–1195, 2014. (doi:10.1142/S0218194014500375)
[162]
P. Estérie, J. Falcou, M. Gaunard, and J.-T. Lapresté. Boost.SIMD: Generic programming for portable SIMDization. In 2014 1st ACM SIGPLAN Workshop on Programming Models for SIMD/Vector Processing, WPMVP 2014 - Co-located with PPoPP 2014, pages 1–7. Association for Computing Machinery, 2014. (doi:10.1145/2568058.2568060)
[163]
P. Estérie, J. Falcou, M. Gaunard, J.-T. Lapresté, and L. Lacassagne. The numerical template toolbox: A modern C++ design for scientific computing. Journal of Parallel and Distributed Computing, 74(12):3240–3253, 2014. (doi:10.1016/j.jpdc.2014.07.002)
[164]
R. Queiroz, L. Passos, M.T. Valente, S. Apel, and K. Czarnecki. Does feature scattering follow power-law distributions? an investigation of five pre-processor-based systems. In 6th International Workshop on Feature-Oriented Software Development, FOSD 2014, pages 23–29. Association for Computing Machinery, September 2014. (doi:10.1145/2660190.2662114)
[165]
A. Wiggins, D. Gurzick, S. Goggins, and B. Butler. Quality hackathon: Evaluating the products of online co-production systems. In 18th ACM International Conference on Supporting Group Work, GROUP 2014, pages 321–323. Association for Computing Machinery, 2014. (doi:10.1145/2660398.2660429)
[166]
Y. Ouazene, A. Yalaoui, F. Yalaoui, and H. Chehade. Non-linear programming method for buffer allocation in unreliable production lines. 21st International Conference on Analytical and Stochastic Modelling Techniques and Applications, ASMTA 2014, 8499 LNCS:80–94, 2014. (doi:10.1007/978-3-319-08219-6_6)
[167]
S. Kollias, V. Vlachos, A. Papanikolaou, P. Chatzimisios, C. Ilioudis, and K. Metaxiotis. A global-local approach for estimating the internet's threat level. Journal of Communications and Networks, 16(4):407–414, 2014. (doi:10.1109/JCN.2014.000070)
[168]
S. Kollias, V. Vlachos, A. Papanikolaou, P. Chatzimisios, C. Ilioudis, and K. Metaxiotis. Measuring the internet's threat level: A global-local approach. In ISCC 2014 Workshop - 5th IEEE International Workshop on Performance Evaluation of Communications in Distributed Systems and Web based Service Architectures, PEDISWESA 2014, volume Workshops. Institute of Electrical and Electronics Engineers Inc., 2014. (doi:10.1109/ISCC.2014.6912624)
[169]
S. Gholami, M.R. Meybodi, and A.M. Saghiri. A learning automata-based version of SG-1 protocol for super-peer selection in peer-to-peer networks. 10th International Conference on Computing and Information Technology, IC2IT 2014, 265 AISC:189–201, 2014. (doi:10.1007/978-3-319-06538-0_19)
[170]
E. Harjula, T. Leppanen, T. Ojala, and M. Ylianttila. ADHT: Agent-based DHT architecture for constrained devices. In 2014 IEEE Global Communications Conference, GLOBECOM 2014, pages 2763–2769. Institute of Electrical and Electronics Engineers Inc., 2014. (doi:10.1109/GLOCOM.2014.7037226)
[171]
M. Cataldo, I. Scholtes, and G. Valetto. A complex networks perspective on collaborative software engineering. Advances in Complex Systems, 17(7-8), 2014. (doi:10.1142/S0219525914300011)
[172]
M. Taeumel, M. Perscheid, B. Steinert, J. Lincke, and R. Hirschfeld. Interleaving of modification and use in data-driven tool development. In 2014 ACM International Symposium on New Ideas, New Paradigms, and Reflections on Programming and Software, Onward! 2014 -Part of SPLASH 2014, pages 185–200. Association for Computing Machinery, Inc, 2014. (doi:10.1145/2661136.2661150)
[173]
N. Madrane, S.J. Andaloussi, and A. Sekkaki. Capsid framework: Towards next-generation network of distributed content. In 2014 5th International Conference on Next Generation Networks and Services, NGNS 2014, pages 69–72. IEEE Computer Society, 2014. (doi:10.1109/NGNS.2014.6990230)
[174]
L.M. Muriana, C. Maciel, and A.C.B. Garcia. Development of open source software, a qualitative view in a knowledge management approach. In 16th International Conference on Enterprise Information Systems, ICEIS 2014, volume 2, pages 391–399. SciTePress, 2014.
[175]
O.M. Awoleye, B. Ojuloge, and M.O. Ilori. Web application vulnerability assessment and policy direction towards a secure smart government. Government Information Quarterly, 31(S1):S118–S125, 2014. (doi:10.1016/j.giq.2014.01.012)
[176]
C.C. Machado, L.Z. Granville, A. Schaeffer-Filho, and J.A. Wickboldt. Towards SLA policy refinement for QoS management in software-defined networking. In 28th IEEE International Conference on Advanced Information Networking and Applications, IEEE AINA 2014, pages 397–404. Institute of Electrical and Electronics Engineers Inc., 2014. (doi:10.1109/AINA.2014.148)
[177]
R.C. Juliano, B.A.N. Travençolo, and M.S. Soares. Detection of software anomalies using object-oriented metrics. In 16th International Conference on Enterprise Information Systems, ICEIS 2014, volume 2, pages 241–248. SciTePress, 2014.
[178]
H.A.L. Barbosa, G.B. Caldas, and F.R.B. Da Cruz. A DOE-based proposal for performance analysis of M/G/c/K queueing network optimization algoritms. Producao, 24(1):13–25, 2014. (doi:10.1590/S0103-65132013005000043)
[179]
T. Haitzer and U. Zdun. Semi-automated architectural abstraction specifications for supporting software evolution. Science of Computer Programming, 90(PART B):135–160, 2014. (doi:10.1016/j.scico.2013.10.004)
[180]
M. Alenezi and K. Magel. Empirical evaluation of a new coupling metric: Combining structural and semantic coupling. International Journal of Computers and Applications, 36(1):34–44, 2014. (doi:10.2316/Journal.202.2014.1.202-3902)
[181]
A. Rastogi and A. Sureka. Samikshaviz: A panoramic view to measure contribution and performance of software maintenance professionals by mining bug archives. In 7th India Software Engineering Conference, ISEC 2014. Association for Computing Machinery, 2014. (doi:10.1145/2590748.2590750)
[182]
H.B. Saritas and G. Kardas. A model driven architecture for the development of smart card software. Computer Languages, Systems and Structures, 40(2):53–72, 2014. (doi:10.1016/j.cl.2014.02.001)
[183]
V. Thurner and A. Böttcher. An 'objects first, tests second' approach for software engineering education. In 2015 IEEE Frontiers in Education Conference, FIE 2015, volume 2014. Institute of Electrical and Electronics Engineers Inc., 2014. (doi:10.1109/FIE.2015.7344027)
[184]
A. Soltani Panah and S. Khorsandi. A dynamic coalition formation game for search efficient adaptive overlay construction in unstructured peer-to-peer networks. Peer-to-Peer Networking and Applications, 7(1):86–99, 2014. (doi:10.1007/s12083-012-0185-z)
[185]
R. Vásquez-Ramırez, G. Alor-Hernández, C. Sánchez-Ramırez, J. Guzmán-Luna, R. Zatarain-Cabada, and M.-L. Barrón-Estrada. AthenaTV: An authoring tool of educational applications for TV using android-based interface design patterns. New Review of Hypermedia and Multimedia, 20(3):251–280, 2014. (doi:10.1080/13614568.2014.925004)
[186]
D.R. Delgado Sobrino, R. Holubek, P. Košťál, and R. Ružarovský. Layout redesign and material flow analysis at a flexible assembly cell supported by the use of simulation. Applied Mechanics and Materials, 693:22–29, 2014. (doi:10.4028/www.scientific.net/AMM.693.22)
[187]
A. Pino. Free assistive technology software for persons with motor disabilities. Open Source Technology: Concepts, Methodologies, Tools, and Applications, 1-4:462–505, 2014. (doi:10.4018/978-1-4666-7230-7.ch027)
[188]
N. Nóra. Áttekerjük vagy nem? a digitális videorögzıto technológiák elfogadása és terjedése. Informacios Tarsadalom, 4:46–61, 2014.
[189]
J.C. Tang. Application of code generation technology in software projects. 2014 International Conference on Advances in Materials Science and Information Technologies in Industry, AMSITI 2014, 513-517:2090–2093, 2014. (doi:10.4028/www.scientific.net/AMM.513-517.2090)
[190]
Anthony Rose. Filter for a distributed network. United States Patent 8,775,508, July 2014. Assignee: Altnet, Inc. (Studio City, CA).
[191]
J. Eyolfson, L. Tan, and P. Lam. Correlations between bugginess and time-based commit characteristics. Empirical Software Engineering, 19(4):1009–1039, 2014. (doi:10.1007/s10664-013-9245-0)
[192]
R. Malhotra, N. Pritam, and Y. Singh. On the applicability of evolutionary computation for software defect prediction. In 3rd International Conference on Advances in Computing, Communications and Informatics, ICACCI 2014, pages 2249–2257. Institute of Electrical and Electronics Engineers Inc., 2014. (doi:10.1109/ICACCI.2014.6968592)
[193]
A. Bergmayr, M. Wimmer, G. Kappel, and M. Grossniklaus. Cloud modeling languages by example. In 7th IEEE International Conference on Service-Oriented Computing and Applications, SOCA 2014, pages 137–146. Institute of Electrical and Electronics Engineers Inc., 2014. (doi:10.1109/SOCA.2014.56)
[194]
N. Donnelly, K. Irving, and M. Roantree. Cooperation across multiple healthcare clinics on the cloud. 14th IFIP WG 6.1 International Conference on Distributed Applications and Interoperable Systems, DAIS 2014 - Held as Part of the 9th International Federated Conference on Distributed Computing Techniques, DisCoTec 2014, 8460 LNCS:82–88, 2014. (doi:10.1007/978-3-662-43352-2_7)
[195]
M. Ghorbani, M. Jooyan, and M. Safarpour. ISA: An intelligent search algorithm for peer-to-peer networks. International Conference on Advanced Computing, Networking and Informatics, ICACNI 2013, 243:463–472, 2014. (doi:10.1007/978-81-322-1665-0_44)
[196]
M. Foucault, M. Palyart, J.-R. Falleri, and X. Blanc. Computing contextual metric thresholds. In 29th Annual ACM Symposium on Applied Computing, SAC 2014, pages 1120–1125. Association for Computing Machinery, 2014. (doi:10.1145/2554850.2554997)
[197]
P. Oliveira, M.T. Valente, and F.P. Lima. Extracting relative thresholds for source code metrics. In 2014 1st Software Evolution Week - IEEE Conference on Software Maintenance, Reengineering, and Reverse Engineering, CSMR-WCRE 2014, pages 254–263. IEEE Computer Society, 2014. (doi:10.1109/CSMR-WCRE.2014.6747177)
[198]
G. Einziger, R. Friedman, and Y. Kantor. Shades: Expediting Kademlia's lookup process. 20th International Conference on Parallel Processing, Euro-Par 2014, 8632 LNCS:391–402, 2014. (doi:10.1007/978-3-319-09873-9-33)
[199]
S. Resendes, P. Carreira, and A.C. Santos. Conflict detection and resolution in home and building automation systems: a literature review. Journal of Ambient Intelligence and Humanized Computing, 5(5):699–715, 2014. (doi:10.1007/s12652-013-0184-9)
[200]
A.B. Martınez, J. De Andrés, and J. Garcıa. Determinants of the web accessibility of European banks. Information Processing and Management, 50(1):69–86, 2014. (doi:10.1016/j.ipm.2013.08.001)
[201]
J.R. Williams, D. Di Ruscio, N. Matragkas, J. Di Rocco, and D.S. Kolovos. Models of OSS project meta-information: A dataset of three forges. In 11th International Working Conference on Mining Software Repositories, MSR 2014, pages 408–411. Association for Computing Machinery, Inc, 2014. (doi:10.1145/2597073.2597132)
[202]
K.V. Katsaros, W.K. Chai, B. Vieira, and G. Pavlou. Supporting smart electric vehicle charging with information-centric networking. In 10th International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness, QSHINE 2014, pages 174–179. Institute of Electrical and Electronics Engineers Inc., 2014. (doi:10.1109/QSHINE.2014.6928683)
[203]
J.M. Monteiro, R.S. Cruz, C.Z. Patrikakis, N.C. Papaoulakis, C.T. Calafate, and M.S. Nunes. Peer-to-peer video streaming. Digital Arts and Entertainment: Concepts, Methodologies, Tools, and Applications, 1:169–228, 2014. (doi:10.4018/978-1-4666-6114-1.ch008)
[204]
A.F. Nogueira, J.C.B. Ribeiro, and M.A. Zenha-Rela. On the evaluation of software maintainability using automatic test case generation. In 9th International Conference on the Quality of Information and Communications Technology, QUATIC 2014, pages 300–305. Institute of Electrical and Electronics Engineers Inc., 2014. (doi:10.1109/QUATIC.2014.48)
[205]
R.G. Garroppo, G. Nencioni, L. Tavanti, and B. Gendron. The greening potential of content delivery in residential community networks. Computer Networks, 73:256–267, 2014. (doi:10.1016/j.comnet.2014.08.016)
[206]
J.S. Cuadrado, J.L.C. Izquierdo, and J.G. Molina. Comparison between internal and external DSLs via RubyTL and Gra2MoL. In Computational Linguistics: Concepts, Methodologies, Tools, and Applications, volume 2-3, pages 816–838. IGI Global, 2014. (doi:10.4018/978-1-4666-6042-7.ch040)
[207]
Valery Golender, Ido Ben Moshe, and Shlomo Wygodny. System and method for troubleshooting software configuration problems using application tracing. United States Patent 8,762,958, June 2014. Assignee: Identify Software, Ltd. (Petach-Tikva, IL).
[208]
H. Kurhinen and M. Lampi. Micro-services based distributable workflow for digital archives. In Archiving 2014, pages 47–51. Society for Imaging Science and Technology, 2014.
[209]
N. Bicocchi and M. Mamei. Investigating ride sharing opportunities through mobility data analysis. Pervasive and Mobile Computing, 14:83–94, 2014. (doi:10.1016/j.pmcj.2014.05.010)
[210]
Paul Gazzillo and Robert Grimm. Configuration-preserving preprocessor and configuration-preserving parser. United States Patent 8,806,456, August 2014. Assignee: New York University (New York, NY).
[211]
Christoph Schnelle and Geoffrey John Nolan. Mapping of data from XML to SQL. United States Patent 8,738,667, May 2014. Assignee: Timebase Pty Limited (Sydney, AU).
[212]
M. Abdullah and M. Othman. Simulated annealing approach to cost-based multi-quality of service job scheduling in cloud computing enviroment. American Journal of Applied Sciences, 11(6):872–877, 2014. (doi:10.3844/ajassp.2014.872.877)
[213]
R. Malhotra and A.J. Bansal. Cross project change prediction using open source projects. In 3rd International Conference on Advances in Computing, Communications and Informatics, ICACCI 2014, pages 201–207. Institute of Electrical and Electronics Engineers Inc., 2014. (doi:10.1109/ICACCI.2014.6968347)
[214]
K. Rajkumar and D. Sowbakya. A study on peer-to-peer (P2P) systems and its live streaming design issues. International Journal of Applied Engineering Research, 9(7):743–753, 2014.
[215]
G. Einziger and R. Friedman. Postman: An elastic highly resilient publish/subscribe framework for self sustained service independent P2P networks. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 8756:78–92, 2014.
[216]
S. Sobernig and M. Strembeck. DSL-based architecting and DSL-based architectures. In 8th European Conference on Software Architecture Workshops, ECSAW 2014. Association for Computing Machinery, 2014. (doi:10.1145/2642803.2642818)
[217]
P. Lengauer and H. Mössenböck. The taming of the shrew: Increasing performance by automatic parameter tuning for Java garbage collectors. In 5th ACM/SPEC International Conference on Performance Engineering, ICPE 2014, pages 111–122. Association for Computing Machinery, 2014. (doi:10.1145/2568088.2568091)
[218]
A. Johanson and W. Hasselbring. Sprat: Hierarchies of domain-specific languages for marine ecosystem simulation engineering (work in progress). In 2014 Symposium on Theory of Modeling and Simulation - DEVS Integrative M and S Symposium, DEVS 2014; 2014 Spring Simulation Multi-Conference, SpringSim 2014, volume 46, pages 187–192. The Society for Modeling and Simulation International, 2014.
[219]
A.N. Johanson and W. Hasselbring. Hierarchical combination of internal and external domain-specific languages for scientific computing. In 8th European Conference on Software Architecture Workshops, ECSAW 2014. Association for Computing Machinery, 2014. (doi:10.1145/2642803.2642820)
[220]
J.L. Ordiales Coscia, C. Mateos, M. Crasso, and A. Zunino. Refactoring code-first web services for early avoiding WSDL anti-patterns: Approach and comprehensive assessment. Science of Computer Programming, 89(PART C):374–407, 2014. (doi:10.1016/j.scico.2014.03.015)
[221]
J.M. Gonzalez-Barahona, G. Robles, I. Herraiz, and F. Ortega. Studying the laws of software evolution in a long-lived FLOSS project. Journal of Software: Evolution and Process, 26(7):589–612, 2014. (doi:10.1002/smr.1615)
[222]
K.R. Islam. A peer-to-peer network architecture for emerging applications. In 15th IEEE International Conference on Information Reuse and Integration, IEEE IRI 2014, pages 520–524. Institute of Electrical and Electronics Engineers Inc., 2014. (doi:10.1109/IRI.2014.7051933)
[223]
E.J. Eckel. Textual appropriation and attribution in engineering theses and dissertations: An exploratory study. In 121st ASEE Annual Conference and Exposition: 360 Degrees of Engineering Education. American Society for Engineering Education, 2014.
[224]
S. Deshpande, Y. Park, and M. Stamp. Eigenvalue analysis for metamorphic detection. Journal in Computer Virology, 10(1):53–65, 2014. (doi:10.1007/s11416-013-0193-4)
[225]
T. Chaikalis, E. Ligu, G. Melas, and A. Chatzigeorgiou. SEAgle: Effortless software evolution analysis. In 30th International Conference on Software Maintenance and Evolution, ICSME 2014, pages 581–584. Institute of Electrical and Electronics Engineers Inc., 2014. (doi:10.1109/ICSME.2014.100)
[226]
F. Erculiani, L. Abeni, and L. Palopoli. UBuild: Automated testing and performance evaluation of embedded linux systems. 27th International Conference on Architecture of Computing Systems, ARCS 2014, 8350 LNCS:123–134, 2014. (doi:10.1007/978-3-319-04891-8-11)
[227]
C. Galbusera, S. Perini, G. Tavola, M. Taisch, I. Karvonen, K. Jansson, and O. Kettunen. Definition and deployment of a verification and validation package in complex industrial environments. In 2014 International Conference on Engineering, Technology and Innovation, ICE 2014. IEEE Computer Society, 2014. (doi:10.1109/ICE.2014.6871622)
[228]
C. Escoffier, O. Günalp, and P. Lalanda. Requirements to pervasive system continuous deployment. 2013 International Conference on Service-Oriented Computing,ICSOC 2013, 8377 LNCS:457–468, 2014. (doi:10.1007/978-3-319-06859-6_40)
[229]
F. Fagerholm, A.S. Guinea, J. Münch, and J. Borenstein. The role of mentoring and project characteristics for onboarding in open source software projects. In 8th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement, ESEM 2014. IEEE Computer Society, 2014. (doi:10.1145/2652524.2652540)
[230]
A. Syschikov, Y. Sheynin, B. Sedov, and V. Ivanova. Domain-specific programming environment for heterogeneous multicore embedded systems. International Journal of Embedded and Real-Time Communication Systems, 5(4):1–23, 2014. (doi:10.4018/IJERTCS.2014100101)
[231]
C. Escoffier, S. Chollet, and P. Lalanda. Lessons learned in building pervasive platforms. In 2014 IEEE 11th Consumer Communications and Networking Conference, CCNC 2014, pages 7–12. IEEE Computer Society, 2014. (doi:10.1109/CCNC.2014.6866540)
[232]
C. Brindescu, M. Codoban, S. Shmarkatiuk, and D. Dig. How do centralized and distributed version control systems impact software changes? In 36th International Conference on Software Engineering, ICSE 2014, pages 322–333. IEEE Computer Society, 2014. (doi:10.1145/2568225.2568322)
[233]
M. Benedetti, V. Cesarotti, A. Giuiusa, and V. Introna. Buffer size design in pharmaceutical packaging lines: An analytical methodology proposal and case study. International Journal of Engineering Business Management, 6(1):1–10, 2014. (doi:10.5772/58938)
[234]
S. Ekanayake, R. Tennekoon, and A. Atukorale. Decentralized reputation based trust model for peer-to-peer content distribution networks. In 2014 7th International Conference on Information and Automation for Sustainability, ICIAfS 2014. Institute of Electrical and Electronics Engineers Inc., 2014. (doi:10.1109/ICIAFS.2014.7069556)
[235]
B. Vasilescu, A. Serebrenik, M. Goeminne, and T. Mens. On the variation and specialisation of workload — a case study of the Gnome ecosystem community. Empirical Software Engineering, 19(4):955–1008, 2014. (doi:10.1007/s10664-013-9244-1)
[236]
T.N. Gutiérrez, L. Ciarletta, and V. Chevrier. A control architecture of complex systems based on multi-agent models. 12th International Conference on Advances in Practical Applications of Heterogeneous Multi-Agent Systems: The PAAMS Collection, PAAMS 2014, 8473 LNAI:207–218, 2014. (doi:10.1007/978-3-319-07551-8_18)
[237]
T.J. Gandomani and M.Z. Nafchi. Agility assessment model to measure agility degree of agile software companies. Indian Journal of Science and Technology, 7(7):955–959, 2014.
[238]
Angelos D. Keromytis and Salvatore J. Stolfo. Methods, media, and systems for detecting an anomalous sequence of function calls. United States Patent 8,694,833, April 2014. Assignee: The Trustees of Columbia University in the City of New York (New York, NY).
[239]
Angelos D. Keromytis and Salvatore J. Stolfo. Systems, methods, and media for generating bait information for trap-based defenses. United States Patent 8,819,825, August 2014. Assignee: The Trustees of Columbia University in the City of New York (New York, NY).
[240]
M. Scheidgen and J. Fischer. Model-based mining of source code repositories. 8th International Conference on System Analysis and Modeling: Models and Reusability, SAM 2014, 8769:239–254, 2014.
[241]
A. Samydurai and A. Shanmugam. Efficient tree-based caching for effective QoS peer-to-peer file sharing. In 2013 International Conference on Information Engineering, ICIE 2013, volume 49, pages 707–714. WITPress, 2014. (doi:10.2495/ICIE130832)
[242]
C. Mettouris and G.A. Papadopoulos. Ubiquitous recommender systems. Computing, 96(3):223–257, 2014. (doi:10.1007/s00607-013-0351-z)
[243]
D. Schall. Who to follow recommendation in large-scale online development communities. Information and Software Technology, 56(12):1543–1555, 2014. (doi:10.1016/j.infsof.2013.12.003)
[244]
M. Mattus. The anyone-can-edit syndrome: Intercreation stories of three featured articles on wikipedia. Nordicom Review, 35:189–204, 2014.
[245]
B. Favaro. A carbon code of conduct for science. Science, 344(6191):1461, 2014. (doi:10.1126/science.344.6191.1461)
[246]
L. Hatton. Conservation of information: Software's hidden clockwork? IEEE Transactions on Software Engineering, 40(5):450–460, 2014. (doi:10.1109/TSE.2014.2316158)
[247]
W.G. Tuohey. Lessons from practices and standards in safety-critical and regulated sectors. In Handbook of Research on Emerging Advancements and Technologies in Software Engineering, pages 369–391. IGI Global, 2014. (doi:10.4018/978-1-4666-6026-7.ch016)
[248]
P.G. Armour. The business of software owning and using on vital and supporting systems. Communications of the ACM, 57(6):29–30, 2014. (doi:10.1145/2602322)
[249]
C. Harrington, N. Dahl, P. Sestoft, and D.R. Christiansen. Pension reserve computations on GPUs. In 3rd ACM SIGPLAN Workshop on Functional High-Performance Computing, FHPC 2014, pages 3–10. Association for Computing Machinery, 2014. (doi:10.1145/2636228.2636230)
[250]
M. Challenger, S. Demirkol, S. Getir, M. Mernik, G. Kardas, and T. Kosar. On the use of a domain-specific modeling language in the development of multiagent systems. Engineering Applications of Artificial Intelligence, 28:111–141, 2014. (doi:10.1016/j.engappai.2013.11.012)
[251]
T. Zahariadis, A. Papadakis, F. Alvarez, J. Gonzalez, F. Lopez, F. Facca, and Y. Al-Hazmi. FIWARE lab: Managing resources and services in a cloud federation supporting future internet applications. In 7th IEEE/ACM International Conference on Utility and Cloud Computing, UCC 2014, pages 792–799. Institute of Electrical and Electronics Engineers Inc., 2014. (doi:10.1109/UCC.2014.129)
[252]
V.A. Pourghadim, M.Y. Noordin, and K.Y. Wong. Effect of buffer size variation on remanufacturing environment. 1st International Materials, Industrial, and Manufacturing Engineering Conference, MIMEC 2013, 845:755–759, 2014. (doi:10.4028/www.scientific.net/AMR.845.755)
[253]
K.R. Prithviraj and B.T. Sampath Kumar. Corrosion of URLs: Implications for electronic publishing. IFLA Journal, 40(1):35–47, 2014. (doi:10.1177/0340035214526529)
[254]
P. Ciancarini and S. Russo. Teaching software architecture in industrial and academic contexts: Similarities and differences. In Overcoming Challenges in Software Engineering Education: Delivering Non-Technical Knowledge and Skills, pages 397–412. IGI Global, 2014. (doi:10.4018/978-1-4666-5800-4.ch020)
[255]
J. Feigenbaum and J. Koenig. On the feasibility of a technological response to the surveillance morass. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 8809:239–252, 2014.
[256]
M. Kalverkamp and C. Gorldt. Iot service development via adaptive interfaces: Improving utilization of cyber-physical systems by competence based user interfaces. In 2014 International Conference on Engineering, Technology and Innovation, ICE 2014. IEEE Computer Society, 2014. (doi:10.1109/ICE.2014.6871591)
[257]
S. Günther. Design patterns and design principles for internal domain-specific languages. In Computational Linguistics: Concepts, Methodologies, Tools, and Applications, volume 1-3, pages 352–410. IGI Global, 2014. (doi:10.4018/978-1-4666-6042-7.ch017)
[258]
D. Bjørner. Domain endurants an analysis and description process model. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 8373:1–34, 2014. (doi:10.1007/978-3-642-54624-2-1)
[259]
Z. Herczeg. Extending the PCRE library with static backtracking based just-in-time compilation support. In 12th ACM/IEEE International Symposium on Code Generation and Optimization, CGO 2014, pages 306–315, 2014. (doi:10.1145/2544137.2544146)
[260]
D.K. Hanirex. An adaptive language approach for domain analysis. Middle - East Journal of Scientific Research, 19(7):908–912, 2014. (doi:10.5829/idosi.mejsr.2014.19.7.1469)
[261]
S. Bajracharya, J. Ossher, and C. Lopes. Sourcerer: An infrastructure for large-scale collection and analysis of open-source code. Science of Computer Programming, 79:241–259, 2014. (doi:10.1016/j.scico.2012.04.008)
[262]
M. Lindberg. Analysis of a feedback-based energy conserving content distribution mechanism for mobile networks. In 19th IFAC World Congress on International Federation of Automatic Control, IFAC 2014, volume 19, pages 8749–8755. IFAC Secretariat, 2014.
[263]
R. Shatnawi. Empirical study of fault prediction for open-source systems using the chidamber and kemerer metrics. IET Software, 8(3):113–119, 2014. (doi:10.1049/iet-sen.2013.0008)
[264]
I. Stamelos. Management and coordination of free/open source projects. Software Project Management in a Changing World, pages 321–341, 2014. (doi:10.1007/978-3-642-55035-5_13)
[265]
M. Kechagia. Improvement of applications' stability through robust APIs. In 29th ACM/IEEE International Conference on Automated Software Engineering, ASE 2014, pages 907–910. Association for Computing Machinery, Inc, 2014. (doi:10.1145/2642937.2653473)
[266]
S.M. Bellovin. By any means possible: How intelligence agencies have gotten their data. IEEE Security and Privacy, 12(4):80–84, 2014. (doi:10.1109/MSP.2014.63)
[267]
M.S. Nikabadi. A framework for technology-based factors for knowledge management in supply chain of auto industry. VINE, 44(3):375–393, 2014. (doi:10.1108/VINE-09-2013-0057)
[268]
M. Langheinrich, R. Finn, V. Coroama, and D. Wright. Quo vadis smart surveillance? how smart technologies combine and challenge democratic oversight. In Reloading Data Protection: Multidisciplinary Insights and Contemporary Challenges, pages 151–182. Springer Netherlands, 2014. (doi:10.1007/978-94-007-7540-4_9)
[269]
P. Bhattacharya, I. Neamtiu, and M. Faloutsos. Determining developers' expertise and role: A graph hierarchy-based approach. In 30th International Conference on Software Maintenance and Evolution, ICSME 2014, pages 11–20. Institute of Electrical and Electronics Engineers Inc., 2014. (doi:10.1109/ICSME.2014.23)
[270]
E. Constantinou, A. Ampatzoglou, and I. Stamelos. Quantifying reuse in OSS: A large-scale empirical study. International Journal of Open Source Software and Processes, 5(3):1–19, 2014. (doi:10.4018/IJOSSP.2014070101)
[271]
P.M. Papadopoulos, I.G. Stamelos, and A. Cerone. Using open source projects in higher education: A two-way certification framework. 10th International Conference on Software Engineering and Formal Methods, SEFM 2012, 1st International Symposium on InSuEdu 2012, 1st International Symposium on MoKMaSD 2012, 6th International Workshop on Foundations and Techniques for OpenCert 2012, 7991 LNCS:274–280, 2014. (doi:10.1007/978-3-642-54338-8-22)
[272]
B. Vasilescu. Human aspects, gamification, and social media in collaborative software engineering. In 36th International Conference on Software Engineering, ICSE 2014, pages 646–649. Association for Computing Machinery, 2014. (doi:10.1145/2591062.2591091)
[273]
S.T. Piantadosi. Zipf's word frequency law in natural language: A critical review and future directions. Psychonomic Bulletin and Review, 21(5):1112–1130, 2014. (doi:10.3758/s13423-014-0585-6)
[274]
C. Christoforidis, V. Vlachos, and I. Androulidakis. A crowdsourcing approach to protect against novel malware threats. In 22nd Telecommunications Forum, TELFOR 2014, pages 1063–1066. Institute of Electrical and Electronics Engineers Inc., 2014. (doi:10.1109/TELFOR.2014.7034590)
[275]
A. Chatzigeorgioiu. Guidelines for the application of data envelopment analysis to assess evolving software. 10th International Conference on Software Engineering and Formal Methods, SEFM 2012, 1st International Symposium on InSuEdu 2012, 1st International Symposium on MoKMaSD 2012, 6th International Workshop on Foundations and Techniques for OpenCert 2012, 7991 LNCS:281–287, 2014. (doi:10.1007/978-3-642-54338-8-23)
[1]
M. Abdullah and M. Othman. Simulated annealing approach to cost-based multi-quality of service job scheduling in cloud computing enviroment. American Journal of Applied Sciences, 11(6):872–877, 2014. (doi:10.3844/ajassp.2014.872.877)

[2]
J. Al Dallal and S. Morasca. Predicting object-oriented class reuse-proneness using internal quality attributes. Empirical Software Engineering, 19(4):775–821, 2014. (doi:10.1007/s10664-012-9239-3)

[3]
S. Alam, R.N. Horspool, and I. Traore. MARD: A framework for metamorphic malware analysis and real-time detection. In 28th IEEE International Conference on Advanced Information Networking and Applications, IEEE AINA 2014, pages 480–489. Institute of Electrical and Electronics Engineers Inc., 2014. (doi:10.1109/AINA.2014.59)

[4]
M. Alenezi and K. Magel. Empirical evaluation of a new coupling metric: Combining structural and semantic coupling. International Journal of Computers and Applications, 36(1):34–44, 2014. (doi:10.2316/Journal.202.2014.1.202-3902)

[5]
M. Alias, D.D.H. Miriam, and C.R. Rene Robin. An ontology-based domain model to enhance the software development process. International Journal of Metadata, Semantics and Ontologies, 9(3):204–214, 2014. (doi:10.1504/IJMSO.2014.063132)

[6]
S. Almagor, U. Boker, and O. Kupferman. Discounting in LTL. 20th International Conference on Tools and Algorithms for the Construction and Analysis of Systems, TACAS 2014 - Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2014, 8413 LNCS:424–439, 2014. (doi:10.1007/978-3-642-54862-8_37)

[7]
R. An and J.Z. Guo. An empirical research on e-marketplace basic functions. 3rd International Conference on Manufacturing Engineering and Process, ICMEP 2014, 548-549:1510–1523, 2014. (doi:10.4028/www.scientific.net/AMM.548-549.1510)

[8]
F. Armetta, M. Haddad, S. Hassas, and H. Kheddouci. A self-organized system improving inner topology for data sharing efficiency. Evolving Systems, 5(2):109–119, 2014. (doi:10.1007/s12530-013-9087-4)

[9]
P.G. Armour. The business of software owning and using on vital and supporting systems. Communications of the ACM, 57(6):29–30, 2014. (doi:10.1145/2602322)

[10]
M. Avalle, A. Pironti, and R. Sisto. Formal verification of security protocol implementations: A survey. Formal Aspects of Computing, 26(1):99–123, 2014. (doi:10.1007/s00165-012-0269-9)

[11]
H. Babaei, M. Fathy, R. Berangi, and M. Romoozi. The impact of mobility models on the performance of P2P content discovery protocols over mobile ad hoc networks. Peer-to-Peer Networking and Applications, 7(1):66–85, 2014. (doi:10.1007/s12083-012-0184-0)

[12]
H. Babaei, M. Fathy, and M. Romoozi. Modeling and optimizing random walk content discovery protocol over mobile ad-hoc networks. Performance Evaluation, 74:18–29, 2014. (doi:10.1016/j.peva.2013.12.002)

[13]
J. Bai, J. Wang, and G. Zou. A malware detection scheme based on mining format information. Scientific World Journal, 2014, 2014. (doi:10.1155/2014/260905)

[14]
S. Bajracharya, J. Ossher, and C. Lopes. Sourcerer: An infrastructure for large-scale collection and analysis of open-source code. Science of Computer Programming, 79:241–259, 2014. (doi:10.1016/j.scico.2012.04.008)

[15]
H.A.L. Barbosa, G.B. Caldas, and F.R.B. Da Cruz. A DOE-based proposal for performance analysis of M/G/c/K queueing network optimization algoritms. Producao, 24(1):13–25, 2014. (doi:10.1590/S0103-65132013005000043)

[16]
S.M. Bellovin. By any means possible: How intelligence agencies have gotten their data. IEEE Security and Privacy, 12(4):80–84, 2014. (doi:10.1109/MSP.2014.63)

[17]
D. Bjørner. Domain endurants an analysis and description process model. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 8373:1–34, 2014. (doi:10.1007/978-3-642-54624-2-1)

[18]
B. Braatz and C. Brandt. A framework for families of domain-specific modelling languages. Software and Systems Modeling, 13(1):109–132, 2014. (doi:10.1007/s10270-012-0271-y)

[19]
N. Burles, S. O'Keefe, J. Austin, and S. Hobson. ENAMeL: A language for binary correlation matrix memories: Reducing the memory constraints of matrix memories. Neural Processing Letters, 40(1):1–23, 2014. (doi:10.1007/s11063-013-9307-8)

[20]
M. Challenger, S. Demirkol, S. Getir, M. Mernik, G. Kardas, and T. Kosar. On the use of a domain-specific modeling language in the development of multiagent systems. Engineering Applications of Artificial Intelligence, 28:111–141, 2014. (doi:10.1016/j.engappai.2013.11.012)

[21]
A. Chatzigeorgioiu. Guidelines for the application of data envelopment analysis to assess evolving software. 10th International Conference on Software Engineering and Formal Methods, SEFM 2012, 1st International Symposium on InSuEdu 2012, 1st International Symposium on MoKMaSD 2012, 6th International Workshop on Foundations and Techniques for OpenCert 2012, 7991 LNCS:281–287, 2014. (doi:10.1007/978-3-642-54338-8-23)

[22]
Rod Cope and Eric Weidner. Tools for software stacks. United States Patent 8,832,647, September 2014. Assignee: OpenLogic, Inc. (Broomfield, CO).

[23]
M. Crasso, C. Mateos, A. Zunino, and M. Campo. EasySOC: Making web service outsourcing easier. Information Sciences, 259:452–473, 2014. (doi:10.1016/j.ins.2010.01.013)

[24]
D.A. Da Costa, U. Kulesza, E. Aranha, and R. Coelho. Unveiling developers contributions behind code commits: An exploratory study. In 29th Annual ACM Symposium on Applied Computing, SAC 2014, pages 1152–1157. Association for Computing Machinery, 2014. (doi:10.1145/2554850.2555030)

[25]
K.R. Da Hora Rodrigues, C.A.C. Teixeira, and V.P. De Almeida Neris. Heuristics for assessing emotional response of viewers during the interaction with TV programs. 16th International Conference on Human-Computer Interaction: Theories, Methods, and Tools, HCI International 2014, 8510 LNCS(PART 1):577–588, 2014. (doi:10.1007/978-3-319-07233-3_53)

[26]
Asaf Dafner, Sigal Korczyn, Yelena Langleyben, and Shiri Semo Judelman. Recording method calls that led to an unforeseen problem. United States Patent 8,762,952, June 2014. Assignee: BMC Software, Inc. (Houston, TX).

[27]
M. Dai, B. Shen, T. Zhang, and M. Zhao. Impact of consecutive changes on later file versions. In 2014 3rd International Workshop on Evidential Assessment of Software Technologies, EAST 2014, pages 17–24. Association for Computing Machinery, 2014. (doi:10.1145/2627508.2627512)

[28]
A.A. De Melo, M. Hinz, G. Scheibel, C. Diacui Medeiros Berkenbrock, I. Gasparini, and F. Baldo. Version control system gamification: A proposal to encourage the engagement of developers to collaborate in software projects. 6th International Conference on Social Computing and Social Media, SCSM 2014 - Held as Part of 16th International Conference on Human-Computer Interaction, HCI International 2014, 8531 LNCS:550–558, 2014. (doi:10.1007/978-3-319-07632-4-52)

[29]
B. De Smet, L. Lempereur, Z. Sharafi, Y.-G. Guéhéneuc, G. Antoniol, and N. Habra. Taupe: Visualizing and analyzing eye-tracking data. Science of Computer Programming, 79:260–278, 2014. (doi:10.1016/j.scico.2012.01.004)

[30]
L. Demir, S. Tunali, and D.T. Eliiyi. The state of the art on buffer allocation problem: A comprehensive survey. Journal of Intelligent Manufacturing, 25(3):371–392, 2014. (doi:10.1007/s10845-012-0687-9)

[31]
S. Deshpande, Y. Park, and M. Stamp. Eigenvalue analysis for metamorphic detection. Journal in Computer Virology, 10(1):53–65, 2014. (doi:10.1007/s11416-013-0193-4)

[32]
R. Dévai, L. Vidács, R. Ferenc, and T. Gyimóthy. Service layer for IDE integration of C/C++ preprocessor related analysis. 14th International Conference on Computational Science and Its Applications, ICCSA 2014, 8583 LNCS(PART 5):402–417, 2014. (doi:10.1007/978-3-319-09156-3_29)

[33]
D. Dıaz-Sánchez, F. Almenarez, A. Marın, R. Sánchez-Guerrero, and P. Arias. Media gateway: Bringing privacy to private multimedia cloud connections. Telecommunication Systems, 55(2):315–330, 2014. (doi:10.1007/s11235-013-9783-1)

[34]
Z. Dong, Y. Liu, G. Luo, and S. Diao. A smart-driver based method for preventing SQL injection attacks. International Journal of Security and its Applications, 8(2):67–76, 2014. (doi:10.14257/ijsia.2014.8.2.07)

[35]
N. Donnelly, K. Irving, and M. Roantree. Cooperation across multiple healthcare clinics on the cloud. 14th IFIP WG 6.1 International Conference on Distributed Applications and Interoperable Systems, DAIS 2014 - Held as Part of the 9th International Federated Conference on Distributed Computing Techniques, DisCoTec 2014, 8460 LNCS:82–88, 2014. (doi:10.1007/978-3-662-43352-2_7)

[36]
E.J. Eckel. Textual appropriation and attribution in engineering theses and dissertations: An exploratory study. In 121st ASEE Annual Conference and Exposition: 360 Degrees of Engineering Education. American Society for Engineering Education, 2014.

[37]
G. Einziger, R. Friedman, and Y. Kantor. Shades: Expediting Kademlia's lookup process. 20th International Conference on Parallel Processing, Euro-Par 2014, 8632 LNCS:391–402, 2014. (doi:10.1007/978-3-319-09873-9-33)

[38]
T.M. El-Sakka and M. Zaki. Using predicate-based model checker for verifying e-commerce protocols. International Journal of Network Security, 16(2):90–101, 2014.

[39]
F. Erculiani, L. Abeni, and L. Palopoli. UBuild: Automated testing and performance evaluation of embedded linux systems. 27th International Conference on Architecture of Computing Systems, ARCS 2014, 8350 LNCS:123–134, 2014. (doi:10.1007/978-3-319-04891-8-11)

[40]
C. Escoffier, S. Chollet, and P. Lalanda. Lessons learned in building pervasive platforms. In 2014 IEEE 11th Consumer Communications and Networking Conference, CCNC 2014, pages 7–12. IEEE Computer Society, 2014. (doi:10.1109/CCNC.2014.6866540)

[41]
C. Escoffier, O. Günalp, and P. Lalanda. Requirements to pervasive system continuous deployment. 2013 International Conference on Service-Oriented Computing,ICSOC 2013, 8377 LNCS:457–468, 2014. (doi:10.1007/978-3-319-06859-6_40)

[42]
P. Estérie, J. Falcou, M. Gaunard, and J.-T. Lapresté. Boost.SIMD: Generic programming for portable SIMDization. In 2014 1st ACM SIGPLAN Workshop on Programming Models for SIMD/Vector Processing, WPMVP 2014 - Co-located with PPoPP 2014, pages 1–7. Association for Computing Machinery, 2014. (doi:10.1145/2568058.2568060)

[43]
J. Eyolfson, L. Tan, and P. Lam. Correlations between bugginess and time-based commit characteristics. Empirical Software Engineering, 19(4):1009–1039, 2014. (doi:10.1007/s10664-013-9245-0)

[44]
C. Faragó, P. Hegedus, and R. Ferenc. The impact of version control operations on the quality change of the source code. 14th International Conference on Computational Science and Its Applications, ICCSA 2014, 8583 LNCS(PART 5):353–369, 2014. (doi:10.1007/978-3-319-09156-3_26)

[45]
B. Favaro. A carbon code of conduct for science. Science, 344(6191):1461, 2014. (doi:10.1126/science.344.6191.1461)

[46]
J. Finlay, R. Pears, and A.M. Connor. Data stream mining for predicting software build outcomes using source code metrics. Information and Software Technology, 56(2):183–198, 2014. (doi:10.1016/j.infsof.2013.09.001)

[47]
M. Foucault, M. Palyart, J.-R. Falleri, and X. Blanc. Computing contextual metric thresholds. In 29th Annual ACM Symposium on Applied Computing, SAC 2014, pages 1120–1125. Association for Computing Machinery, 2014. (doi:10.1145/2554850.2554997)

[48]
C. Galbusera, S. Perini, G. Tavola, M. Taisch, I. Karvonen, K. Jansson, and O. Kettunen. Definition and deployment of a verification and validation package in complex industrial environments. In 2014 International Conference on Engineering, Technology and Innovation, ICE 2014. IEEE Computer Society, 2014. (doi:10.1109/ICE.2014.6871622)

[49]
Paul Gazzillo and Robert Grimm. Configuration-preserving preprocessor and configuration-preserving parser. United States Patent 8,806,456, August 2014. Assignee: New York University (New York, NY).

[50]
S. Getir, M. Challenger, and G. Kardas. The formal semantics of a domain-specific modeling language for semantic web enabled multi-agent systems. International Journal of Cooperative Information Systems, 23(3), 2014. (doi:10.1142/S0218843014500051)

[51]
S. Gholami, M.R. Meybodi, and A.M. Saghiri. A learning automata-based version of SG-1 protocol for super-peer selection in peer-to-peer networks. 10th International Conference on Computing and Information Technology, IC2IT 2014, 265 AISC:189–201, 2014. (doi:10.1007/978-3-319-06538-0_19)

[52]
Valery Golender, Ido Ben Moshe, and Shlomo Wygodny. System and method for troubleshooting software configuration problems using application tracing. United States Patent 8,762,958, June 2014. Assignee: Identify Software, Ltd. (Petach-Tikva, IL).

[53]
J.M. Gonzalez-Barahona, G. Robles, I. Herraiz, and F. Ortega. Studying the laws of software evolution in a long-lived FLOSS project. Journal of Software: Evolution and Process, 26(7):589–612, 2014. (doi:10.1002/smr.1615)

[54]
Q. Gu, S.J. Xiong, and D.X. Chen. Correlations between characteristics of maximum influence and degree distributions in software networks. Science China Information Sciences, 57(7):1–12, 2014. (doi:10.1007/s11432-013-5047-7)

[55]
B. Gueye, O. Flauzac, C. Rabat, and I. Niang. A self-adaptive structuring for P2P-based grid. In 14th International Conference on Innovations for Community Services, I4CS 2014, pages 121–128. IEEE Computer Society, 2014. (doi:10.1109/I4CS.2014.6860564)

[56]
T.N. Gutiérrez, L. Ciarletta, and V. Chevrier. A control architecture of complex systems based on multi-agent models. 12th International Conference on Advances in Practical Applications of Heterogeneous Multi-Agent Systems: The PAAMS Collection, PAAMS 2014, 8473 LNAI:207–218, 2014. (doi:10.1007/978-3-319-07551-8_18)

[57]
T. Haitzer and U. Zdun. Semi-automated architectural abstraction specifications for supporting software evolution. Science of Computer Programming, 90(PART B):135–160, 2014. (doi:10.1016/j.scico.2013.10.004)

[58]
D.K. Hanirex. An adaptive language approach for domain analysis. Middle - East Journal of Scientific Research, 19(7):908–912, 2014. (doi:10.5829/idosi.mejsr.2014.19.7.1469)

[59]
M.A. Harris and K.P. Patten. Mobile device security considerations for small- and medium-sized enterprise business mobility. Information Management and Computer Security, 22(1):97–114, 2014. (doi:10.1108/IMCS-03-2013-0019)

[60]
L. Hatton. Conservation of information: Software's hidden clockwork? IEEE Transactions on Software Engineering, 40(5):450–460, 2014. (doi:10.1109/TSE.2014.2316158)

[61]
Z. Herczeg. Extending the PCRE library with static backtracking based just-in-time compilation support. In 12th ACM/IEEE International Symposium on Code Generation and Optimization, CGO 2014, pages 306–315, 2014. (doi:10.1145/2544137.2544146)

[62]
M.A. Ismail, S.H. Mirza, and T. Altaf. "logn+1" and "logn" model: A binary tree based multi-level cache system for multi-core processors. Computer Systems Science and Engineering, 29(2):131–151, 2014.

[63]
M. Jin, D. Zheng, and P. Ren. Application of RFID based low-carbon scenic integrated management system in jiuzhaigou area. 7th International Conference on Management Science and Engineering Management, ICMSEM 2013, 242 LNEE(VOL. 2):1269–1280, 2014. (doi:10.1007/978-3-642-40081-0_108)

[64]
A. Johanson and W. Hasselbring. Sprat: Hierarchies of domain-specific languages for marine ecosystem simulation engineering (work in progress). In 2014 Symposium on Theory of Modeling and Simulation - DEVS Integrative M and S Symposium, DEVS 2014; 2014 Spring Simulation Multi-Conference, SpringSim 2014, volume 46, pages 187–192. The Society for Modeling and Simulation International, 2014.

[65]
R.C. Juliano, B.A.N. Travençolo, and M.S. Soares. Detection of software anomalies using object-oriented metrics. In 16th International Conference on Enterprise Information Systems, ICEIS 2014, volume 2, pages 241–248. SciTePress, 2014.

[66]
M. Kalverkamp and C. Gorldt. Iot service development via adaptive interfaces: Improving utilization of cyber-physical systems by competence based user interfaces. In 2014 International Conference on Engineering, Technology and Innovation, ICE 2014. IEEE Computer Society, 2014. (doi:10.1109/ICE.2014.6871591)

[67]
Angelos D. Keromytis and Salvatore J. Stolfo. Methods, media, and systems for detecting an anomalous sequence of function calls. United States Patent 8,694,833, April 2014. Assignee: The Trustees of Columbia University in the City of New York (New York, NY).

[68]
Angelos D. Keromytis and Salvatore J. Stolfo. Systems, methods, and media for generating bait information for trap-based defenses. United States Patent 8,819,825, August 2014. Assignee: The Trustees of Columbia University in the City of New York (New York, NY).

[69]
S.O. Kim and Y.J. Choi. Firmware development process for food refrigeration system. Food Science and Biotechnology, 23(4):1159–1167, 2014. (doi:10.1007/s10068-014-0158-5)

[70]
Brendan Kitts, Brian Burdick, Dyng Au, and Tyson Roberts. Method and system for automatically targeting ads to television media using demographic similarity. United States Patent 8,627,359, January 2014. Assignee: Lucid Commerce, Inc. (Seattle, WA).

[71]
Brendan Kitts, Brian Burdick, Dyng Au, and Tyson Roberts. Targeting television ads using keywords. United States Patent 8,789,092, July 2014. Assignee: Lucid Commerce, Inc. (Seattle, WA).

[72]
Brendan Kitts, Brian Burdick, Dyng Au, Liang Wei, and Amanda Powter. System and method for attributing multi-channel conversion events and subsequent activity to multi-channel media sources. United States Patent 8,768,770, July 2014. Assignee: Lucid Commerce, Inc. (Seattle, WA).

[73]
M. Klein and M.L. Nelson. Moved but not gone: An evaluation of real-time methods for discovering replacement web pages. International Journal on Digital Libraries, 14(1-2):17–38, 2014. (doi:10.1007/s00799-014-0108-0)

[74]
S. Kollias, V. Vlachos, A. Papanikolaou, P. Chatzimisios, C. Ilioudis, and K. Metaxiotis. A global-local approach for estimating the internet's threat level. Journal of Communications and Networks, 16(4):407–414, 2014. (doi:10.1109/JCN.2014.000070)

[75]
L. Kong, G. Bauer, and J. Hale. Location-based device grouping for function restriction. In 9th Annual Cyber and Information Security Research Conference, CISRC 2014, pages 113–116. Association for Computing Machinery, 2014. (doi:10.1145/2602087.2602099)

[76]
Eyal Koren, Golan Hallel, and Asaf Dafner. Running injected code prior to execution of an application. United States Patent 8,745,598, June 2014. Assignee: BMC Software, Inc. (Houston, TX).

[77]
D. Korzun and A. Gurtov. Hierarchical architectures in structured peer-to-peer overlay networks. Peer-to-Peer Networking and Applications, 7(4):359–395, 2014. (doi:10.1007/s12083-013-0200-z)

[78]
T. Kosar, M. Mernik, J. Gray, and T. Kos. Debugging measurement systems using a domain-specific modeling language. Computers in Industry, 65(4):622–635, 2014. (doi:10.1016/j.compind.2014.01.013)

[79]
H. Kurhinen and M. Lampi. Micro-services based distributable workflow for digital archives. In Archiving 2014, pages 47–51. Society for Imaging Science and Technology, 2014.

[80]
J.-S. Lee and D.-H. Shin. The relationship between human and smart TVs based on emotion recognition in HCI. 14th International Conference on Computational Science and Its Applications, ICCSA 2014, 8582 LNCS(PART 4):652–667, 2014. (doi:10.1007/978-3-319-09147-1_47)

[81]
K. Lee. How collective intelligence emerges: Knowledge creation process in Wikipedia from microscopic viewpoint. In 2014 12th International Working Conference on Advanced Visual Interfaces, AVI 2014, pages 373–374. Association for Computing Machinery, 2014. (doi:10.1145/2598153.2600040)

[82]
P. Lengauer and H. Mössenböck. The taming of the shrew: Increasing performance by automatic parameter tuning for Java garbage collectors. In 5th ACM/SPEC International Conference on Performance Engineering, ICPE 2014, pages 111–122. Association for Computing Machinery, 2014. (doi:10.1145/2568088.2568091)

[83]
H. Li, L.-Y. Hao, R. Chen, X. Ge, and H. Zhao. Symmetric preferential attachment for new vertices attaching to software networks. New Generation Computing, 32(3-4):271–296, 2014. (doi:10.1007/s00354-014-0405-6)

[84]
L. Li, L. Wang, J. Chen, R. Wang, and Z. Zhang. Fairness analysis for multiparty nonrepudiation protocols based on improved strand space. Discrete Dynamics in Nature and Society, 2014, 2014. (doi:10.1155/2014/904717)

[85]
J. Li. Dynamic visiting coordination problem based on multi-agent for large-scale crowds' activities. International Journal of Industrial and Systems Engineering, 17(1):115–131, 2014. (doi:10.1504/IJISE.2014.060830)

[86]
Z. Liao, S. Liu, and S. Xi. An improved multipoint relaying scheme for message propagation in distributed peer-to-peer system. International Journal of Distributed Sensor Networks, 2014, 2014. (doi:10.1155/2014/792814)

[87]
C.-S. Lin and M.-J. Yan. Dynamic peer buffer adjustment to improve service availability on peer-to-peer on-demand streaming networks. Peer-to-Peer Networking and Applications, 7(1):1–15, 2014. (doi:10.1007/s12083-012-0138-6)

[88]
Jie Lin, Jian Ni, and Andres Quiroz Hernandez. Two-level structured overlay design for cluster management in a peer-to-peer network. United States Patent 8,756,253, June 2014. Assignee: Xerox Corporation (Norwalk, CT).

[89]
J. Liu, S.Y. Chen, M.W. Lin, and H. Liu. A reliable file protection system based on transparent encryption. International Journal of Security and its Applications, 8(1):123–132, 2014. (doi:10.14257/ijsia.2014.8.1.12)

[90]
T.-S. Lo, H.-P. Lu, and H.-L. Wei. New service development model: A user experience-oriented design. In 2014 18th IEEE International Conference on Computer Supported Cooperative Work in Design, CSCWD 2014, pages 710–715. IEEE Computer Society, 2014. (doi:10.1109/CSCWD.2014.6846932)

[91]
F. Loukos, H. Karatza, and V. Kalogeraki. Real-time data dissemination in mobile peer-to-peer networks. Journal of Systems and Software, 90(1):179–190, 2014. (doi:10.1016/j.jss.2013.11.1122)

[92]
C.C. Machado, L.Z. Granville, A. Schaeffer-Filho, and J.A. Wickboldt. Towards SLA policy refinement for QoS management in software-defined networking. In 28th IEEE International Conference on Advanced Information Networking and Applications, IEEE AINA 2014, pages 397–404. Institute of Electrical and Electronics Engineers Inc., 2014. (doi:10.1109/AINA.2014.148)

[93]
O. Mamavi and O. Meier. L'attachement préférentiel dans la formation d'alliances stratégiques. Revue Francaise de Gestion, 241(4):79–91, 2014. (doi:10.3166/RFG.241.79-91)

[94]
A.B. Martınez, J. De Andrés, and J. Garcıa. Determinants of the web accessibility of European banks. Information Processing and Management, 50(1):69–86, 2014. (doi:10.1016/j.ipm.2013.08.001)

[95]
C. Mateos, M. Crasso, A. Zunino, and M. Campo. A software support to initiate systems engineering students in service-oriented computing. Computer Applications in Engineering Education, 22(2):252–265, 2014. (doi:10.1002/cae.20551)

[96]
M. Mattus. The anyone-can-edit syndrome: Intercreation stories of three featured articles on wikipedia. Nordicom Review, 35:189–204, 2014.

[97]
C. Mettouris and G.A. Papadopoulos. Ubiquitous recommender systems. Computing, 96(3):223–257, 2014. (doi:10.1007/s00607-013-0351-z)

[98]
J. Müller, C.A. Shoemaker, and R. Piché. SO-i: A surrogate model algorithm for expensive nonlinear integer programming problems including global optimization applications. Journal of Global Optimization, 59(4):865–889, 2014. (doi:10.1007/s10898-013-0101-y)

[99]
L.M. Muriana, C. Maciel, and A.C.B. Garcia. Development of open source software, a qualitative view in a knowledge management approach. In 16th International Conference on Enterprise Information Systems, ICEIS 2014, volume 2, pages 391–399. SciTePress, 2014.

[100]
Elissa E. S. Murphy and John D. Mehr. Intelligent tiers of backup data. United States Patent 8,769,049, July 2014. Assignee: Microsoft Corporation (Redmond, WA).

[101]
Elissa E. S. Murphy and Navjot Virk. Distributed backup and versioning. United States Patent 8,769,055, July 2014. Assignee: Microsoft Corporation (Redmond, WA).

[102]
M.C. Olesen, R.R. Hansen, J.L. Lawall, and N. Palix. Coccinelle: Tool support for automated CERT C secure coding standard certification. Science of Computer Programming, 91(PART B):141–160, 2014. (doi:10.1016/j.scico.2012.10.011)

[103]
P. Oliveira, M.T. Valente, and F.P. Lima. Extracting relative thresholds for source code metrics. In 2014 1st Software Evolution Week - IEEE Conference on Software Maintenance, Reengineering, and Reverse Engineering, CSMR-WCRE 2014, pages 254–263. IEEE Computer Society, 2014. (doi:10.1109/CSMR-WCRE.2014.6747177)

[104]
J.L. Ordiales Coscia, C. Mateos, M. Crasso, and A. Zunino. Refactoring code-first web services for early avoiding WSDL anti-patterns: Approach and comprehensive assessment. Science of Computer Programming, 89(PART C):374–407, 2014. (doi:10.1016/j.scico.2014.03.015)

[105]
Y. Ouazene, A. Yalaoui, F. Yalaoui, and H. Chehade. Non-linear programming method for buffer allocation in unreliable production lines. 21st International Conference on Analytical and Stochastic Modelling Techniques and Applications, ASMTA 2014, 8499 LNCS:80–94, 2014. (doi:10.1007/978-3-319-08219-6_6)

[106]
Raymond E. Ozzie, Jack E. Ozzie, Paresh S. Suthar, and Raman Narayanan. Synchronization associated duplicate data resolution. United States Patent 8,751,442, June 2014. Assignee: Microsoft Corporation (Redmond, WA).

[107]
P.M. Papadopoulos, I.G. Stamelos, and A. Cerone. Using open source projects in higher education: A two-way certification framework. 10th International Conference on Software Engineering and Formal Methods, SEFM 2012, 1st International Symposium on InSuEdu 2012, 1st International Symposium on MoKMaSD 2012, 6th International Workshop on Foundations and Techniques for OpenCert 2012, 7991 LNCS:274–280, 2014. (doi:10.1007/978-3-642-54338-8-22)

[108]
V.A. Pourghadim, M.Y. Noordin, and K.Y. Wong. Effect of buffer size variation on remanufacturing environment. 1st International Materials, Industrial, and Manufacturing Engineering Conference, MIMEC 2013, 845:755–759, 2014. (doi:10.4028/www.scientific.net/AMR.845.755)

[109]
K.R. Prithviraj and B.T. Sampath Kumar. Corrosion of URLs: Implications for electronic publishing. IFLA Journal, 40(1):35–47, 2014. (doi:10.1177/0340035214526529)

[110]
K. Rajkumar and D. Sowbakya. A study on peer-to-peer (P2P) systems and its live streaming design issues. International Journal of Applied Engineering Research, 9(7):743–753, 2014.

[111]
Girish Maskeri Rama, Basavara Raju Muddu, and Avinash Kak. Systems, methods, and computer-readable media for measuring quality of application programming interfaces. United States Patent 8,656,365, February 2014. Assignee: Infosys Limited (Bangalore, IN).

[112]
R. Ramler and J. Gmeiner. Practical challenges in test environment management. In 7th IEEE International Conference on Software Testing, Verification and Validation Workshops, ICSTW 2014, pages 358–359. IEEE Computer Society, 2014. (doi:10.1109/ICSTW.2014.41)

[113]
A. Rastogi and A. Sureka. Samikshaviz: A panoramic view to measure contribution and performance of software maintenance professionals by mining bug archives. In 7th India Software Engineering Conference, ISEC 2014. Association for Computing Machinery, 2014. (doi:10.1145/2590748.2590750)

[114]
M. Romoozi, M. Fathy, and R. Berangi. Performance analysis and improvement content discovery protocols over vehicular networks. Wireless Personal Communications, 75(2):857–899, 2014. (doi:10.1007/s11277-013-1395-2)

[115]
Anthony Rose. Filter for a distributed network. United States Patent 8,775,508, July 2014. Assignee: Altnet, Inc. (Studio City, CA).

[116]
J. Roy, C. Contini, F. Brodeur, N. Diouf, and W. Suryn. Method for the evaluation of open source software quality from an IT untrained user perspective. In 2014 7th International C Conference on Computer Science and Software Engineering, C3S2E 2014, pages 148–153. Association for Computing Machinery, 2014. (doi:10.1145/2641483.2641525)

[117]
D. Rusk and Y. Coady. Location-based analysis of developers and technologies on GitHub. In 28th IEEE International Conference on Advanced Information Networking and Applications Workshops, IEEE WAINA 2014, pages 681–685. IEEE Computer Society, 2014. (doi:10.1109/WAINA.2014.110)

[118]
N.K. Saini, V.K. Sihag, and R.C. Yadav. A reactive approach for detection of collusion attacks in P2P trust and reputation systems. In 2014 4th IEEE International Advance Computing Conference, IACC 2014, pages 312–317. IEEE Computer Society, 2014. (doi:10.1109/IAdCC.2014.6779340)

[119]
Jonathan Salz and Richard S. Tibbetts. Data parallelism and parallel operations in stream processing. United States Patent 8,769,485, July 2014. Assignee: TIBCO Software, Inc. (Palo Alto, CA).

[120]
A. Samydurai and A. Shanmugam. Efficient tree-based caching for effective QoS peer-to-peer file sharing. In 2013 International Conference on Information Engineering, ICIE 2013, volume 49, pages 707–714. WITPress, 2014. (doi:10.2495/ICIE130832)

[121]
H.B. Saritas and G. Kardas. A model driven architecture for the development of smart card software. Computer Languages, Systems and Structures, 40(2):53–72, 2014. (doi:10.1016/j.cl.2014.02.001)

[122]
M. Sarrab and O.M.H. Rehman. Empirical study of open source software selection for adoption, based on software quality characteristics. Advances in Engineering Software, 69:1–11, 2014. (doi:10.1016/j.advengsoft.2013.12.001)

[123]
D. Schall. Who to follow recommendation in large-scale online development communities. Information and Software Technology, 56(12):1543–1555, 2014. (doi:10.1016/j.infsof.2013.12.003)

[124]
Christoph Schnelle and Geoffrey John Nolan. Mapping of data from XML to SQL. United States Patent 8,738,667, May 2014. Assignee: Timebase Pty Limited (Sydney, AU).

[125]
R. Shatnawi. Empirical study of fault prediction for open-source systems using the chidamber and kemerer metrics. IET Software, 8(3):113–119, 2014. (doi:10.1049/iet-sen.2013.0008)

[126]
W.-C. Shin and J. Rho. Implementation of software refactoring operation using a code model. International Journal of Software Engineering and its Applications, 8(6):17–30, 2014. (doi:10.14257/ijseia.2014.8.6.02)

[127]
A. Soltani Panah and S. Khorsandi. A dynamic coalition formation game for search efficient adaptive overlay construction in unstructured peer-to-peer networks. Peer-to-Peer Networking and Applications, 7(1):86–99, 2014. (doi:10.1007/s12083-012-0185-z)

[128]
S.K. Sowe, A. Cerone, and D. Settas. An empirical study of FOSS developers patterns of contribution: Challenges for data linkage and analysis. Science of Computer Programming, 91(PART B):249–265, 2014. (doi:10.1016/j.scico.2013.11.033)

[129]
M.-O. Stehr, M. Kim, and C. Talcott. Partially ordered knowledge sharing and fractionated systems in the context of other models for distributed computing. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 8373:402–433, 2014. (doi:10.1007/978-3-642-54624-2-20)

[130]
Salvatore J. Stolfo, Malek Ben Salem, and Shlomo Hershkop. Methods, systems, and media for masquerade attack detection by monitoring computer user behavior. United States Patent 8,769,684, July 2014. Assignee: The Trustees of Columbia University in the City of New York (New York, NY).

[131]
C. Su and A. Xu. Buffer allocation for hybrid manufacturing/remanufacturing system considering quality grading. International Journal of Production Research, 52(5):1269–1284, 2014. (doi:10.1080/00207543.2013.828165)

[132]
J. Swan, J. Woodward, E. Özcan, G. Kendall, and E. Burke. Searching the hyper-heuristic design space. Cognitive Computation, 6(1):66–73, 2014. (doi:10.1007/s12559-013-9201-8)

[133]
G. Szoke, C. Nagy, R. Ferenc, and T. Gyimóthy. A case study of refactoring large-scale industrial systems to efficiently improve source code quality. 14th International Conference on Computational Science and Its Applications, ICCSA 2014, 8583 LNCS(PART 5):524–540, 2014. (doi:10.1007/978-3-319-09156-3_37)

[134]
J.C. Tang. Application of code generation technology in software projects. 2014 International Conference on Advances in Materials Science and Information Technologies in Industry, AMSITI 2014, 513-517:2090–2093, 2014. (doi:10.4028/www.scientific.net/AMM.513-517.2090)

[135]
I. Teixidó, F. Sebé, J. Conde, and F. Solsona. MPI-based implementation of an enhanced algorithm to solve the LPN problem in a memory-constrained environment. Parallel Computing, 40(5-6):100–112, 2014. (doi:10.1016/j.parco.2014.04.002)

[136]
A. Tiwana and A.A. Bush. Spotting lemons in platform markets: A conjoint experiment on signaling. IEEE Transactions on Engineering Management, 61(3):393–405, 2014. (doi:10.1109/TEM.2014.2311074)

[137]
V. Urovi and M.I. Schumacher. The present and future of dynamic e-health interoperability in switzerland: Results of an online questionnaire. In 7th International Conference on Health Informatics, HEALTHINF 2014 - Part of 7th International Joint Conference on Biomedical Engineering Systems and Technologies, BIOSTEC 2014, pages 244–249. SciTePress, 2014.

[138]
V. Urovi, A.C. Olivieri, A.B. De La Torre, S. Bromuri, N. Fornara, and M. Schumacher. Secure P2P cross-community health record exchange in IHE compatible systems. International Journal on Artificial Intelligence Tools, 23(1), 2014. (doi:10.1142/S0218213014400065)

[139]
A.V. Uzunov and E.B. Fernandez. An extensible pattern-based library and taxonomy of security threats for distributed systems. Computer Standards and Interfaces, 36(4):734–747, 2014. (doi:10.1016/j.csi.2013.12.008)

[140]
S. Validi, A. Bhattacharya, and P.J. Byrne. Integrated low-carbon distribution system for the demand side of a product distribution supply chain: A DoE-guided MOPSO optimiser-based solution approach. International Journal of Production Research, 52(10):3074–3096, 2014. (doi:10.1080/00207543.2013.864054)

[141]
B. Vasilescu, A. Serebrenik, M. Goeminne, and T. Mens. On the variation and specialisation of workload — a case study of the Gnome ecosystem community. Empirical Software Engineering, 19(4):955–1008, 2014. (doi:10.1007/s10664-013-9244-1)

[142]
B. Vasilescu. Human aspects, gamification, and social media in collaborative software engineering. In 36th International Conference on Software Engineering, ICSE 2014, pages 646–649. Association for Computing Machinery, 2014. (doi:10.1145/2591062.2591091)

[143]
R. Vásquez-Ramırez, G. Alor-Hernández, C. Sánchez-Ramırez, J. Guzmán-Luna, R. Zatarain-Cabada, and M.-L. Barrón-Estrada. AthenaTV: An authoring tool of educational applications for TV using android-based interface design patterns. New Review of Hypermedia and Multimedia, 20(3):251–280, 2014. (doi:10.1080/13614568.2014.925004)

[144]
J. Vila and D. Ribeiro-Soriano. An overview of web 2.0 social capital: A cross-cultural approach. Service Business, 8(3):399–404, 2014. (doi:10.1007/s11628-014-0245-y)

[145]
H.-Q. Wang, X.-M. Xue, and W.-Y. Lv. Improved degraded ceiling algorithm for optimal buffer allocation in unreliable production lines. Kongzhi yu Juece/Control and Decision, 29(8):1424–1428, 2014. (doi:10.13195/j.kzyjc.2013.0770)

[146]
M. Weiher and R. Hirschfeld. Polymorphic identifiers: Uniform resource access in objective-smalltalk. ACM SIGPLAN Notices, 49(2):61–71, 2014.

[147]
P. Yang and Y.-P. Li. On the complementary binary future internet architecture. Complex Systems and Complexity Science, 11(1):53–59, 2014. (doi:10.13306/j.1672-3813.2014.01.007)

[148]
Y.N. Zhang, L. Han, and X. Cao. Design of network information security system. 4th International Conference on Information Science, Automation and Material System, ISAM 2014, 1022:257–260, 2014. (doi:10.4028/www.scientific.net/AMR.1022.257)

[149]
Yu Zheng, Wencheng Zheng, and Xing Xie. Collaborative location and activity recommendations. United States Patent 8,719,198, May 2014. Assignee: Microsoft Corporation (Redmond, WA).