- [1]
- M. Abdullah and M. Othman.
Simulated annealing approach to cost-based multi-quality of service job
scheduling in cloud computing enviroment.
American Journal of Applied Sciences, 11(6):872–877, 2014.
(doi:10.3844/ajassp.2014.872.877)
- [2]
- J. Akoka and
I. Comyn-Wattiau.
Business intelligence.
Ingenierie des Systemes d'Information, 19(5):9–43, 2014.
(doi:10.3166/ISI.19.5.9-43)
- [3]
- J. Al Dallal and S. Morasca.
Predicting object-oriented class reuse-proneness using internal quality
attributes.
Empirical Software Engineering, 19(4):775–821, 2014.
(doi:10.1007/s10664-012-9239-3)
- [4]
- S. Alam,
R.N. Horspool, and I. Traore.
MARD: A framework for metamorphic malware analysis and real-time detection.
In 28th IEEE International Conference on Advanced Information Networking
and Applications, IEEE AINA 2014, pages 480–489. Institute of
Electrical and Electronics Engineers Inc., 2014.
(doi:10.1109/AINA.2014.59)
- [5]
- M. Alenezi and K. Magel.
Empirical evaluation of a new coupling metric: Combining structural and
semantic coupling.
International Journal of Computers and Applications, 36(1):34–44,
2014.
(doi:10.2316/Journal.202.2014.1.202-3902)
- [6]
- M. Alias and C.R.R. Robin.
An ontology-based software development environment using upgraded
functionalities of Clojure.
International Conference on Advanced Computing, Networking and
Informatics, ICACNI 2013, 243:619–625, 2014.
(doi:10.1007/978-81-322-1665-0_61)
- [7]
- M. Alias, D.D.H. Miriam, and
C.R. Rene Robin.
An ontology-based domain model to enhance the software development process.
International Journal of Metadata, Semantics and Ontologies,
9(3):204–214, 2014.
(doi:10.1504/IJMSO.2014.063132)
- [8]
- M.Y.
Allaho and W.-C. Lee.
Trends and behavior of developers in open collaborative software projects.
In 2014 1st IEEE International Conference on Behavioral, Economic,
Socio-Cultural Computing, BESC 2014. Institute of Electrical and
Electronics Engineers Inc., 2014.
(doi:10.1109/BESC.2014.7059515)
- [9]
- S. Almagor, U. Boker, and
O. Kupferman.
Discounting in LTL.
20th International Conference on Tools and Algorithms for the
Construction and Analysis of Systems, TACAS 2014 - Held as Part of the
European Joint Conferences on Theory and Practice of Software, ETAPS
2014, 8413 LNCS:424–439, 2014.
(doi:10.1007/978-3-642-54862-8_37)
- [10]
- R. An and
J.Z. Guo.
An empirical research on e-marketplace basic functions.
3rd International Conference on Manufacturing Engineering and Process,
ICMEP 2014, 548-549:1510–1523, 2014.
(doi:10.4028/www.scientific.net/AMM.548-549.1510)
- [11]
- F. Armetta, M. Haddad,
S. Hassas, and H. Kheddouci.
A self-organized system improving inner topology for data sharing efficiency.
Evolving Systems, 5(2):109–119, 2014.
(doi:10.1007/s12530-013-9087-4)
- [12]
- P.G. Armour.
The business of software owning and using on vital and supporting systems.
Communications of the ACM, 57(6):29–30, 2014.
(doi:10.1145/2602322)
- [13]
- M. Arzoky, S. Swift,
S. Counsell, and J. Cain.
A measure of the modularisation of sequential software versions using random
graph theory.
Lecture Notes in Business Information Processing, 199:105–120,
2014.
- [14]
- M. Avalle, A. Pironti, and
R. Sisto.
Formal verification of security protocol implementations: A survey.
Formal Aspects of Computing, 26(1):99–123, 2014.
(doi:10.1007/s00165-012-0269-9)
- [15]
- O.M.
Awoleye, B. Ojuloge, and M.O. Ilori.
Web application vulnerability assessment and policy direction towards a secure
smart government.
Government Information Quarterly, 31(S1):S118–S125, 2014.
(doi:10.1016/j.giq.2014.01.012)
- [16]
- M. Azab and M. Eltoweissy.
Bio-inspired evolutionary sensory system for cyber-physical system security.
Intelligent Systems Reference Library, 70:39–69, 2014.
(doi:10.1007/978-3-662-43616-5_2)
- [17]
- M. Azab and M. Eltoweissy.
CyPhyMASC: Evolutionary monitoring, analysis, sharing and control platform
for SmartGrid defense.
In 15th IEEE International Conference on Information Reuse and
Integration, IEEE IRI 2014, pages 639–645. Institute of Electrical
and Electronics Engineers Inc., 2014.
(doi:10.1109/IRI.2014.7051950)
- [18]
- H. Babaei, M. Fathy,
R. Berangi, and M. Romoozi.
The impact of mobility models on the performance of P2P content discovery
protocols over mobile ad hoc networks.
Peer-to-Peer Networking and Applications, 7(1):66–85, 2014.
(doi:10.1007/s12083-012-0184-0)
- [19]
- H. Babaei, M. Fathy, and
M. Romoozi.
Modeling and optimizing random walk content discovery protocol over mobile
ad-hoc networks.
Performance Evaluation, 74:18–29, 2014.
(doi:10.1016/j.peva.2013.12.002)
- [20]
- J. Bai,
J. Wang, and G. Zou.
A malware detection scheme based on mining format information.
Scientific World Journal, 2014, 2014.
(doi:10.1155/2014/260905)
- [21]
- S. Bajracharya, J. Ossher,
and C. Lopes.
Sourcerer: An infrastructure for large-scale collection and analysis of
open-source code.
Science of Computer Programming, 79:241–259, 2014.
(doi:10.1016/j.scico.2012.04.008)
- [22]
- H.A.L.
Barbosa, G.B. Caldas, and F.R.B. Da Cruz.
A DOE-based proposal for performance analysis of M/G/c/K queueing network
optimization algoritms.
Producao, 24(1):13–25, 2014.
(doi:10.1590/S0103-65132013005000043)
- [23]
- S. Bellomo, N. Ernst,
R. Nord, and R. Kazman.
Toward design decisions to enable deployability: Empirical study of three
projects reaching for the continuous delivery holy grail.
In 44th Annual IEEE/IFIP International Conference on Dependable Systems
and Networks, DSN 2014, pages 702–707. Institute of Electrical and
Electronics Engineers Inc., 2014.
(doi:10.1109/DSN.2014.104)
- [24]
- S.M.
Bellovin.
By any means possible: How intelligence agencies have gotten their data.
IEEE Security and Privacy, 12(4):80–84, 2014.
(doi:10.1109/MSP.2014.63)
- [25]
- M. Benedetti, V. Cesarotti,
A. Giuiusa, and V. Introna.
Buffer size design in pharmaceutical packaging lines: An analytical
methodology proposal and case study.
International Journal of Engineering Business Management,
6(1):1–10, 2014.
(doi:10.5772/58938)
- [26]
- A. Bergel, S. Maass,
S. Ducasse, and T. Girba.
A domain-specific language for visualizing software dependencies as a graph.
In 2nd IEEE International Working Conference on Software Visualization,
VISSOFT 2014, pages 45–49. Institute of Electrical and Electronics
Engineers Inc., 2014.
(doi:10.1109/VISSOFT.2014.17)
- [27]
- A. Bergmayr, M. Wimmer,
G. Kappel, and M. Grossniklaus.
Cloud modeling languages by example.
In 7th IEEE International Conference on Service-Oriented Computing and
Applications, SOCA 2014, pages 137–146. Institute of Electrical and
Electronics Engineers Inc., 2014.
(doi:10.1109/SOCA.2014.56)
- [28]
- P. Bhattacharya, I. Neamtiu,
and M. Faloutsos.
Determining developers' expertise and role: A graph hierarchy-based approach.
In 30th International Conference on Software Maintenance and Evolution,
ICSME 2014, pages 11–20. Institute of Electrical and Electronics
Engineers Inc., 2014.
(doi:10.1109/ICSME.2014.23)
- [29]
- N. Bicocchi and M. Mamei.
Investigating ride sharing opportunities through mobility data analysis.
Pervasive and Mobile Computing, 14:83–94, 2014.
(doi:10.1016/j.pmcj.2014.05.010)
- [30]
- D. Bjørner.
Domain endurants an analysis and description process model.
Lecture Notes in Computer Science (including subseries Lecture Notes in
Artificial Intelligence and Lecture Notes in Bioinformatics),
8373:1–34, 2014.
(doi:10.1007/978-3-642-54624-2-1)
- [31]
- B. Braatz and C. Brandt.
A framework for families of domain-specific modelling languages.
Software and Systems Modeling, 13(1):109–132, 2014.
(doi:10.1007/s10270-012-0271-y)
- [32]
- David D. Brandt, Kenwood
Hall, Mark Burton Anderson, Craig D. Anderson,
and George Bradford Collins.
System
and methodology providing automation security analysis, validation, and
learning in an industrial controller environment.
United States Patent 8,909,926, December 2014.
Assignee: Rockwell Automation Technologies, Inc. (Mayfield Heights, OH).
- [33]
- C. Brindescu, M. Codoban,
S. Shmarkatiuk, and D. Dig.
How do centralized and distributed version control systems impact software
changes?
In 36th International Conference on Software Engineering, ICSE
2014, pages 322–333. IEEE Computer Society, 2014.
(doi:10.1145/2568225.2568322)
- [34]
- N. Burles, S. O'Keefe,
J. Austin, and S. Hobson.
ENAMeL: A language for binary correlation matrix memories: Reducing the
memory constraints of matrix memories.
Neural Processing Letters, 40(1):1–23, 2014.
(doi:10.1007/s11063-013-9307-8)
- [35]
- M. Cataldo, I. Scholtes, and
G. Valetto.
A complex networks perspective on collaborative software engineering.
Advances in Complex Systems, 17(7-8), 2014.
(doi:10.1142/S0219525914300011)
- [36]
- T. Chaikalis, E. Ligu,
G. Melas, and A. Chatzigeorgiou.
SEAgle: Effortless software evolution analysis.
In 30th International Conference on Software Maintenance and Evolution,
ICSME 2014, pages 581–584. Institute of Electrical and Electronics
Engineers Inc., 2014.
(doi:10.1109/ICSME.2014.100)
- [37]
- M. Challenger, S. Demirkol,
S. Getir, M. Mernik, G. Kardas,
and T. Kosar.
On the use of a domain-specific modeling language in the development of
multiagent systems.
Engineering Applications of Artificial Intelligence, 28:111–141,
2014.
(doi:10.1016/j.engappai.2013.11.012)
- [38]
- A. Chatzigeorgioiu.
Guidelines for the application of data envelopment analysis to assess evolving
software.
10th International Conference on Software Engineering and Formal Methods,
SEFM 2012, 1st International Symposium on InSuEdu 2012, 1st International
Symposium on MoKMaSD 2012, 6th International Workshop on Foundations and
Techniques for OpenCert 2012, 7991 LNCS:281–287, 2014.
(doi:10.1007/978-3-642-54338-8-23)
- [39]
- S. Choy,
B. Wong, G. Simon, and
C. Rosenberg.
A hybrid edge-cloud architecture for reducing on-demand gaming latency.
Multimedia Systems, 20(5):503–519, 2014.
(doi:10.1007/s00530-014-0367-z)
- [40]
- C. Christoforidis,
V. Vlachos, and I. Androulidakis.
A crowdsourcing approach to protect against novel malware threats.
In 22nd Telecommunications Forum, TELFOR 2014, pages 1063–1066.
Institute of Electrical and Electronics Engineers Inc., 2014.
(doi:10.1109/TELFOR.2014.7034590)
- [41]
- T. Chusho and J. Li.
Conceptual modeling for web applications and definitions of business logic for
end-user-initiative development.
In 7th IADIS International Conference on Information Systems, IS
2014, pages 184–192. IADIS, 2014.
- [42]
- P. Ciancarini and S. Russo.
Teaching software architecture in industrial and academic contexts:
Similarities and differences.
In Overcoming Challenges in Software Engineering Education: Delivering
Non-Technical Knowledge and Skills, pages 397–412. IGI Global, 2014.
(doi:10.4018/978-1-4666-5800-4.ch020)
- [43]
- T. Clark and J. Willans.
Software language engineering with XMF and XModeler.
In Computational Linguistics: Concepts, Methodologies, Tools, and
Applications, volume 2-3, pages 866–896. IGI Global, 2014.
(doi:10.4018/978-1-4666-6042-7.ch042)
- [44]
- T. Clark, C. Gonzalez-Perez,
and B. Henderson-Sellers.
Foundation for multi-level modelling.
In Workshop on Multi-Level Modelling, MULTI 2014, Co-located with
ACM/IEEE 17th International Conference on Model Driven Engineering Languages
and Systems, MoDELS 2014, volume 1286, pages 43–52. CEUR-WS,
2014.
- [45]
- P.J.
Clarke, Y. Wu, A.A. Allen,
F. Hernandez, M. Allison, and
R. France.
Towards dynamic semantics for synthesizing interpreted DSMLs.
In Computational Linguistics: Concepts, Methodologies, Tools, and
Applications, volume 3-3, pages 1439–1466. IGI Global, 2014.
(doi:10.4018/978-1-4666-6042-7.ch071)
- [46]
- P. Clase and P. Lombard.
Web communication: A juniortukkie approach to successfully recruit and retain
quality students for the University of Pretoria.
In International Conferences on ICT, Society and Human Beings 2014, Web
Based Communities and Social Media 2014, e-Commerce 2014, Information Systems
Post-Implementation and Change Management 2014 and e-Health 2014,
pages 143–151. IADIS, 2014.
- [47]
- G. Concas, C. Monni,
M. Orrù, M. Ortu, and
R. Tonelli.
Refactoring clustering in Java software networks.
Lecture Notes in Business Information Processing, 199:121–135,
2014.
- [48]
- E. Constantinou,
A. Ampatzoglou, and I. Stamelos.
Quantifying reuse in OSS: A large-scale empirical study.
International Journal of Open Source Software and Processes,
5(3):1–19, 2014.
(doi:10.4018/IJOSSP.2014070101)
- [49]
- Rod Cope and Eric Weidner.
Tools
for software stacks.
United States Patent 8,832,647, September 2014.
Assignee: OpenLogic, Inc. (Broomfield, CO).
- [50]
- M. Crasso, C. Mateos,
A. Zunino, and M. Campo.
EasySOC: Making web service outsourcing easier.
Information Sciences, 259:452–473, 2014.
(doi:10.1016/j.ins.2010.01.013)
- [51]
- J.S.
Cuadrado, J.L.C. Izquierdo, and J.G. Molina.
Comparison between internal and external DSLs via RubyTL and Gra2MoL.
In Computational Linguistics: Concepts, Methodologies, Tools, and
Applications, volume 2-3, pages 816–838. IGI Global, 2014.
(doi:10.4018/978-1-4666-6042-7.ch040)
- [52]
- D.A.
Da Costa, U. Kulesza, E. Aranha, and
R. Coelho.
Unveiling developers contributions behind code commits: An exploratory study.
In 29th Annual ACM Symposium on Applied Computing, SAC 2014, pages
1152–1157. Association for Computing Machinery, 2014.
(doi:10.1145/2554850.2555030)
- [53]
- K.R. Da Hora Rodrigues, C.A.C.
Teixeira, and V.P. De Almeida Neris.
Heuristics for assessing emotional response of viewers during the interaction
with TV programs.
16th International Conference on Human-Computer Interaction: Theories,
Methods, and Tools, HCI International 2014, 8510 LNCS(PART
1):577–588, 2014.
(doi:10.1007/978-3-319-07233-3_53)
- [54]
- Asaf
Dafner, Sigal Korczyn, Yelena Langleyben, and
Shiri Semo Judelman.
Recording
method calls that led to an unforeseen problem.
United States Patent 8,762,952, June 2014.
Assignee: BMC Software, Inc. (Houston, TX).
- [55]
- M. Dai,
B. Shen, T. Zhang, and M. Zhao.
Impact of consecutive changes on later file versions.
In 2014 3rd International Workshop on Evidential Assessment of Software
Technologies, EAST 2014, pages 17–24. Association for Computing
Machinery, 2014.
(doi:10.1145/2627508.2627512)
- [56]
- I. Dávid and
L. Gönczy.
Ontology-supported design of domain-specific languages: A complex event
processing case study.
In Computational Linguistics: Concepts, Methodologies, Tools, and
Applications, volume 1-3, pages 324–351. IGI Global, 2014.
(doi:10.4018/978-1-4666-6042-7.ch016)
- [57]
- J. De Lara, E. Guerra, and
J.S. Cuadrado.
When and how to use multilevel modelling.
ACM Transactions on Software Engineering and Methodology, 24(2),
2014.
(doi:10.1145/2685615)
- [58]
- A.A.
De Melo, M. Hinz, G. Scheibel,
C. Diacui Medeiros Berkenbrock, I. Gasparini,
and F. Baldo.
Version control system gamification: A proposal to encourage the engagement
of developers to collaborate in software projects.
6th International Conference on Social Computing and Social Media, SCSM
2014 - Held as Part of 16th International Conference on Human-Computer
Interaction, HCI International 2014, 8531 LNCS:550–558, 2014.
(doi:10.1007/978-3-319-07632-4-52)
- [59]
- B. De Smet, L. Lempereur,
Z. Sharafi, Y.-G. Guéhéneuc,
G. Antoniol, and N. Habra.
Taupe: Visualizing and analyzing eye-tracking data.
Science of Computer Programming, 79:260–278, 2014.
(doi:10.1016/j.scico.2012.01.004)
- [60]
- D.R. Delgado Sobrino,
R. Holubek, P. Košťál, and
R. Ružarovský.
Layout redesign and material flow analysis at a flexible assembly cell
supported by the use of simulation.
Applied Mechanics and Materials, 693:22–29, 2014.
(doi:10.4028/www.scientific.net/AMM.693.22)
- [61]
- L. Demir, S. Tunali, and
D.T. Eliiyi.
The state of the art on buffer allocation problem: A comprehensive survey.
Journal of Intelligent Manufacturing, 25(3):371–392, 2014.
(doi:10.1007/s10845-012-0687-9)
- [62]
- S. Deshpande, Y. Park, and
M. Stamp.
Eigenvalue analysis for metamorphic detection.
Journal in Computer Virology, 10(1):53–65, 2014.
(doi:10.1007/s11416-013-0193-4)
- [63]
- G. Dévai, D. Leskó,
and M. Tejfel.
Language design and implementation via the combination of embedding and
parsing.
Communications in Computer and Information Science, 457:131–147,
2014.
(doi:10.1007/978-3-662-44920-2_9)
- [64]
- R. Dévai, L. Vidács,
R. Ferenc, and T. Gyimóthy.
Service layer for IDE integration of C/C++ preprocessor related analysis.
14th International Conference on Computational Science and Its
Applications, ICCSA 2014, 8583 LNCS(PART 5):402–417, 2014.
(doi:10.1007/978-3-319-09156-3_29)
- [65]
- D. Dıaz-Sánchez,
F. Almenarez, A. Marın,
R. Sánchez-Guerrero, and P. Arias.
Media gateway: Bringing privacy to private multimedia cloud connections.
Telecommunication Systems, 55(2):315–330, 2014.
(doi:10.1007/s11235-013-9783-1)
- [66]
- Z. Dong,
Y. Liu, G. Luo, and S. Diao.
A smart-driver based method for preventing SQL injection attacks.
International Journal of Security and its Applications,
8(2):67–76, 2014.
(doi:10.14257/ijsia.2014.8.2.07)
- [67]
- N. Donnelly, K. Irving, and
M. Roantree.
Cooperation across multiple healthcare clinics on the cloud.
14th IFIP WG 6.1 International Conference on Distributed Applications and
Interoperable Systems, DAIS 2014 - Held as Part of the 9th International
Federated Conference on Distributed Computing Techniques, DisCoTec
2014, 8460 LNCS:82–88, 2014.
(doi:10.1007/978-3-662-43352-2_7)
- [68]
- E.J. Eckel.
Textual appropriation and attribution in engineering theses and dissertations:
An exploratory study.
In 121st ASEE Annual Conference and Exposition: 360 Degrees of
Engineering Education. American Society for Engineering Education,
2014.
- [69]
- G. Einziger and R. Friedman.
Postman: An elastic highly resilient publish/subscribe framework for self
sustained service independent P2P networks.
Lecture Notes in Computer Science (including subseries Lecture Notes in
Artificial Intelligence and Lecture Notes in Bioinformatics),
8756:78–92, 2014.
- [70]
- G. Einziger, R. Friedman, and
Y. Kantor.
Shades: Expediting Kademlia's lookup process.
20th International Conference on Parallel Processing, Euro-Par
2014, 8632 LNCS:391–402, 2014.
(doi:10.1007/978-3-319-09873-9-33)
- [71]
- S. Ekanayake, R. Tennekoon,
and A. Atukorale.
Decentralized reputation based trust model for peer-to-peer content
distribution networks.
In 2014 7th International Conference on Information and Automation for
Sustainability, ICIAfS 2014. Institute of Electrical and Electronics
Engineers Inc., 2014.
(doi:10.1109/ICIAFS.2014.7069556)
- [72]
- T.M.
El-Sakka and M. Zaki.
Using predicate-based model checker for verifying e-commerce protocols.
International Journal of Network Security, 16(2):90–101,
2014.
- [73]
- F. Erculiani, L. Abeni, and
L. Palopoli.
UBuild: Automated testing and performance evaluation of embedded linux
systems.
27th International Conference on Architecture of Computing Systems, ARCS
2014, 8350 LNCS:123–134, 2014.
(doi:10.1007/978-3-319-04891-8-11)
- [74]
- C. Escoffier, S. Chollet,
and P. Lalanda.
Lessons learned in building pervasive platforms.
In 2014 IEEE 11th Consumer Communications and Networking Conference, CCNC
2014, pages 7–12. IEEE Computer Society, 2014.
(doi:10.1109/CCNC.2014.6866540)
- [75]
- C. Escoffier, O. Günalp,
and P. Lalanda.
Requirements to pervasive system continuous deployment.
2013 International Conference on Service-Oriented Computing,ICSOC
2013, 8377 LNCS:457–468, 2014.
(doi:10.1007/978-3-319-06859-6_40)
- [76]
- P. Estérie, J. Falcou,
M. Gaunard, and J.-T. Lapresté.
Boost.SIMD: Generic programming for portable SIMDization.
In 2014 1st ACM SIGPLAN Workshop on Programming Models for SIMD/Vector
Processing, WPMVP 2014 - Co-located with PPoPP 2014, pages 1–7.
Association for Computing Machinery, 2014.
(doi:10.1145/2568058.2568060)
- [77]
- P. Estérie, J. Falcou,
M. Gaunard, J.-T. Lapresté, and
L. Lacassagne.
The numerical template toolbox: A modern C++ design for scientific
computing.
Journal of Parallel and Distributed Computing, 74(12):3240–3253,
2014.
(doi:10.1016/j.jpdc.2014.07.002)
- [78]
- H.-C.
Estler, M. Nordio, C.A. Furia,
B. Meyer, and J. Schneider.
Agile vs. structured distributed software development: A case study.
Empirical Software Engineering, 19(5):1197–1224, 2014.
(doi:10.1007/s10664-013-9271-y)
- [79]
- J. Eyolfson, L. Tan, and
P. Lam.
Correlations between bugginess and time-based commit characteristics.
Empirical Software Engineering, 19(4):1009–1039, 2014.
(doi:10.1007/s10664-013-9245-0)
- [80]
- F. Fagerholm, A.S. Guinea,
J. Münch, and J. Borenstein.
The role of mentoring and project characteristics for onboarding in open source
software projects.
In 8th ACM/IEEE International Symposium on Empirical Software Engineering
and Measurement, ESEM 2014. IEEE Computer Society, 2014.
(doi:10.1145/2652524.2652540)
- [81]
- C. Faragó, P. Hegedus,
and R. Ferenc.
The impact of version control operations on the quality change of the source
code.
14th International Conference on Computational Science and Its
Applications, ICCSA 2014, 8583 LNCS(PART 5):353–369, 2014.
(doi:10.1007/978-3-319-09156-3_26)
- [82]
- B. Favaro.
A carbon code of conduct for science.
Science, 344(6191):1461, 2014.
(doi:10.1126/science.344.6191.1461)
- [83]
- J. Feigenbaum and J. Koenig.
On the feasibility of a technological response to the surveillance morass.
Lecture Notes in Computer Science (including subseries Lecture Notes in
Artificial Intelligence and Lecture Notes in Bioinformatics),
8809:239–252, 2014.
- [84]
- J. Finlay, R. Pears, and
A.M. Connor.
Data stream mining for predicting software build outcomes using source code
metrics.
Information and Software Technology, 56(2):183–198, 2014.
(doi:10.1016/j.infsof.2013.09.001)
- [85]
- M. Foucault, M. Palyart,
J.-R. Falleri, and X. Blanc.
Computing contextual metric thresholds.
In 29th Annual ACM Symposium on Applied Computing, SAC 2014, pages
1120–1125. Association for Computing Machinery, 2014.
(doi:10.1145/2554850.2554997)
- [86]
- E. Franchi, A. Poggi, and
M. Tomaiuolo.
Multi-agent active services for online social networks.
In Handbook of Research on Demand-Driven Web Services: Theory,
Technologies, and Applications, pages 84–100. IGI Global, 2014.
(doi:10.4018/978-1-4666-5884-4.ch004)
- [87]
- C. Galbusera, S. Perini,
G. Tavola, M. Taisch,
I. Karvonen, K. Jansson, and
O. Kettunen.
Definition and deployment of a verification and validation package in complex
industrial environments.
In 2014 International Conference on Engineering, Technology and
Innovation, ICE 2014. IEEE Computer Society, 2014.
(doi:10.1109/ICE.2014.6871622)
- [88]
- T.J. Gandomani and M.Z.
Nafchi.
Agility assessment model to measure agility degree of agile software companies.
Indian Journal of Science and Technology, 7(7):955–959,
2014.
- [89]
- Y. Gao,
Z. Zheng, and F. Qin.
Analysis of Linux kernel as a complex network.
Chaos, Solitons and Fractals, 69:246–252, 2014.
(doi:10.1016/j.chaos.2014.10.008)
- [90]
- R.G.
Garroppo, G. Nencioni, L. Tavanti, and
B. Gendron.
The greening potential of content delivery in residential community networks.
Computer Networks, 73:256–267, 2014.
(doi:10.1016/j.comnet.2014.08.016)
- [91]
- Paul Gazzillo and Robert
Grimm.
Configuration-preserving
preprocessor and configuration-preserving parser.
United States Patent 8,806,456, August 2014.
Assignee: New York University (New York, NY).
- [92]
- S. Getir, M. Challenger, and
G. Kardas.
The formal semantics of a domain-specific modeling language for semantic web
enabled multi-agent systems.
International Journal of Cooperative Information Systems, 23(3),
2014.
(doi:10.1142/S0218843014500051)
- [93]
- S. Gholami, M.R. Meybodi, and
A.M. Saghiri.
A learning automata-based version of SG-1 protocol for super-peer selection
in peer-to-peer networks.
10th International Conference on Computing and Information Technology,
IC2IT 2014, 265 AISC:189–201, 2014.
(doi:10.1007/978-3-319-06538-0_19)
- [94]
- M. Ghorbani, M. Jooyan, and
M. Safarpour.
ISA: An intelligent search algorithm for peer-to-peer networks.
International Conference on Advanced Computing, Networking and
Informatics, ICACNI 2013, 243:463–472, 2014.
(doi:10.1007/978-81-322-1665-0_44)
- [95]
- Valery Golender, Ido Ben
Moshe, and Shlomo Wygodny.
System
and method for troubleshooting software configuration problems using
application tracing.
United States Patent 8,762,958, June 2014.
Assignee: Identify Software, Ltd. (Petach-Tikva, IL).
- [96]
- J.M. Gonzalez-Barahona,
G. Robles, I. Herraiz, and
F. Ortega.
Studying the laws of software evolution in a long-lived FLOSS project.
Journal of Software: Evolution and Process, 26(7):589–612, 2014.
(doi:10.1002/smr.1615)
- [97]
- Q. Gu,
S.J. Xiong, and D.X. Chen.
Correlations between characteristics of maximum influence and degree
distributions in software networks.
Science China Information Sciences, 57(7):1–12, 2014.
(doi:10.1007/s11432-013-5047-7)
- [98]
- B. Gueye, O. Flauzac,
C. Rabat, and I. Niang.
A self-adaptive structuring for P2P-based grid.
In 14th International Conference on Innovations for Community Services,
I4CS 2014, pages 121–128. IEEE Computer Society, 2014.
(doi:10.1109/I4CS.2014.6860564)
- [99]
- S. Gul,
I. Mahajan, and A. Ali.
The growth and decay of URLs citation: A case of an online library &
information science journal.
Malaysian Journal of Library and Information Science,
19(3):27–39, 2014.
- [100]
- S. Günther.
Design patterns and design principles for internal domain-specific languages.
In Computational Linguistics: Concepts, Methodologies, Tools, and
Applications, volume 1-3, pages 352–410. IGI Global, 2014.
(doi:10.4018/978-1-4666-6042-7.ch017)
- [101]
- S. Gupta, H.K. Singh,
R.D. Venkatasubramanyam, and U. Uppili.
SCQAM: A scalable structured code quality assessment method for industrial
software.
In 22nd International Conference on Program Comprehension, ICPC
2014, pages 244–252. Association for Computing Machinery, Inc, 2014.
(doi:10.1145/2597008.2597806)
- [102]
- T.N. Gutiérrez,
L. Ciarletta, and V. Chevrier.
A control architecture of complex systems based on multi-agent models.
12th International Conference on Advances in Practical Applications of
Heterogeneous Multi-Agent Systems: The PAAMS Collection, PAAMS 2014,
8473 LNAI:207–218, 2014.
(doi:10.1007/978-3-319-07551-8_18)
- [103]
- T. Haitzer and U. Zdun.
Semi-automated architectural abstraction specifications for supporting software
evolution.
Science of Computer Programming, 90(PART B):135–160, 2014.
(doi:10.1016/j.scico.2013.10.004)
- [104]
- L. Han,
M. Qian, X. Xu, C. Fu, and
H. Kwisaba.
Malicious code detection model based on behavior association.
Tsinghua Science and Technology, 19(5):508–515, 2014.
(doi:10.1109/TST.2014.6919827)
- [105]
- D.K. Hanirex.
An adaptive language approach for domain analysis.
Middle - East Journal of Scientific Research, 19(7):908–912,
2014.
(doi:10.5829/idosi.mejsr.2014.19.7.1469)
- [106]
- E. Harjula, T. Leppanen,
T. Ojala, and M. Ylianttila.
ADHT: Agent-based DHT architecture for constrained devices.
In 2014 IEEE Global Communications Conference, GLOBECOM 2014,
pages 2763–2769. Institute of Electrical and Electronics Engineers Inc.,
2014.
(doi:10.1109/GLOCOM.2014.7037226)
- [107]
- S. Harrer, G. Wirtz,
F. Nizamic, and A. Lazovik.
Towards a robustness evaluation framework for BPEL engines.
In 7th IEEE International Conference on Service-Oriented Computing and
Applications, SOCA 2014, pages 199–206. Institute of Electrical and
Electronics Engineers Inc., 2014.
(doi:10.1109/SOCA.2014.40)
- [108]
- C. Harrington, N. Dahl,
P. Sestoft, and D.R. Christiansen.
Pension reserve computations on GPUs.
In 3rd ACM SIGPLAN Workshop on Functional High-Performance Computing,
FHPC 2014, pages 3–10. Association for Computing Machinery, 2014.
(doi:10.1145/2636228.2636230)
- [109]
- M.A.
Harris and K.P. Patten.
Mobile device security considerations for small- and medium-sized enterprise
business mobility.
Information Management and Computer Security, 22(1):97–114, 2014.
(doi:10.1108/IMCS-03-2013-0019)
- [110]
- L. Hatton.
Conservation of information: Software's hidden clockwork?
IEEE Transactions on Software Engineering, 40(5):450–460, 2014.
(doi:10.1109/TSE.2014.2316158)
- [111]
- Z. Herczeg.
Extending the PCRE library with static backtracking based just-in-time
compilation support.
In 12th ACM/IEEE International Symposium on Code Generation and
Optimization, CGO 2014, pages 306–315, 2014.
(doi:10.1145/2544137.2544146)
- [112]
- A. Hindle, A. Wilson,
K. Rasmussen, E.J. Barlow, J.C.
Campbell, and S. Romansky.
GreenMiner: A hardware based mining software repositories software energy
consumption framework.
In 11th International Working Conference on Mining Software Repositories,
MSR 2014, pages 12–21. Association for Computing Machinery, Inc,
2014.
(doi:10.1145/2597073.2597097)
- [113]
- K.R. Islam.
A peer-to-peer network architecture for emerging applications.
In 15th IEEE International Conference on Information Reuse and
Integration, IEEE IRI 2014, pages 520–524. Institute of Electrical
and Electronics Engineers Inc., 2014.
(doi:10.1109/IRI.2014.7051933)
- [114]
- M.A.
Ismail, S.H. Mirza, and T. Altaf.
"logn+1" and "logn" model: A binary tree based multi-level cache system for
multi-core processors.
Computer Systems Science and Engineering, 29(2):131–151,
2014.
- [115]
- V. Ivanova, B. Sedov,
Y. Sheynin, and A. Syschikov.
Domain-specific languages for embedded systems portable software development.
In 16th Conference of Open Innovations Association, FRUCT 2014,
volume 2014-December, pages 24–30. IEEE Computer Society, 2014.
(doi:10.1109/FRUCT.2014.7000923)
- [116]
- M. Jin,
D. Zheng, and P. Ren.
Application of RFID based low-carbon scenic integrated management system in
jiuzhaigou area.
7th International Conference on Management Science and Engineering
Management, ICMSEM 2013, 242 LNEE(VOL. 2):1269–1280, 2014.
(doi:10.1007/978-3-642-40081-0_108)
- [117]
- A. Johanson and
W. Hasselbring.
Sprat: Hierarchies of domain-specific languages for marine ecosystem
simulation engineering (work in progress).
In 2014 Symposium on Theory of Modeling and Simulation - DEVS Integrative
M and S Symposium, DEVS 2014; 2014 Spring Simulation Multi-Conference,
SpringSim 2014, volume 46, pages 187–192. The Society for Modeling
and Simulation International, 2014.
- [118]
- A.N. Johanson and
W. Hasselbring.
Hierarchical combination of internal and external domain-specific languages for
scientific computing.
In 8th European Conference on Software Architecture Workshops, ECSAW
2014. Association for Computing Machinery, 2014.
(doi:10.1145/2642803.2642820)
- [119]
- R.C.
Juliano, B.A.N. Travençolo, and M.S.
Soares.
Detection of software anomalies using object-oriented metrics.
In 16th International Conference on Enterprise Information Systems, ICEIS
2014, volume 2, pages 241–248. SciTePress, 2014.
- [120]
- M. Kalverkamp and C. Gorldt.
Iot service development via adaptive interfaces: Improving utilization of
cyber-physical systems by competence based user interfaces.
In 2014 International Conference on Engineering, Technology and
Innovation, ICE 2014. IEEE Computer Society, 2014.
(doi:10.1109/ICE.2014.6871591)
- [121]
- K.V.
Katsaros, W.K. Chai, B. Vieira, and
G. Pavlou.
Supporting smart electric vehicle charging with information-centric networking.
In 10th International Conference on Heterogeneous Networking for Quality,
Reliability, Security and Robustness, QSHINE 2014, pages 174–179.
Institute of Electrical and Electronics Engineers Inc., 2014.
(doi:10.1109/QSHINE.2014.6928683)
- [122]
- A. Kaur
and K. Kaur.
Performance analysis of ensemble learning for predicting defects in open source
software.
In 3rd International Conference on Advances in Computing, Communications
and Informatics, ICACCI 2014, pages 219–225. Institute of Electrical
and Electronics Engineers Inc., 2014.
(doi:10.1109/ICACCI.2014.6968438)
- [123]
- A. Kaur,
K. Kaur, and K. Pathak.
Software maintainability prediction by data mining of software code metrics.
In 2014 International Conference on Data Mining and Intelligent
Computing, ICDMIC 2014. Institute of Electrical and Electronics
Engineers Inc., 2014.
(doi:10.1109/ICDMIC.2014.6954262)
- [124]
- Gaurav S. Kc and Alfred V.
Aho.
Methods,
systems, and media for detecting and preventing malcode execution.
United States Patent 8,925,090, December 2014.
Assignee: The Trustees of Columbia University in the City of New York (New
York, NY).
- [125]
- M. Kechagia.
Improvement of applications' stability through robust APIs.
In 29th ACM/IEEE International Conference on Automated Software
Engineering, ASE 2014, pages 907–910. Association for Computing
Machinery, Inc, 2014.
(doi:10.1145/2642937.2653473)
- [126]
- Angelos D. Keromytis and
Salvatore J. Stolfo.
Methods,
media, and systems for detecting an anomalous sequence of function calls.
United States Patent 8,694,833, April 2014.
Assignee: The Trustees of Columbia University in the City of New York (New
York, NY).
- [127]
- Angelos D. Keromytis and
Salvatore J. Stolfo.
Systems,
methods, and media for generating bait information for trap-based
defenses.
United States Patent 8,819,825, August 2014.
Assignee: The Trustees of Columbia University in the City of New York (New
York, NY).
- [128]
- S.O. Kim
and Y.J. Choi.
Firmware development process for food refrigeration system.
Food Science and Biotechnology, 23(4):1159–1167, 2014.
(doi:10.1007/s10068-014-0158-5)
- [129]
- Brendan Kitts, Brian Burdick,
Dyng Au, and Tyson Roberts.
Method
and system for automatically targeting ads to television media using
demographic similarity.
United States Patent 8,627,359, January 2014.
Assignee: Lucid Commerce, Inc. (Seattle, WA).
- [130]
- Brendan Kitts, Brian
Burdick, Dyng Au, and Tyson Roberts.
Targeting
television ads using keywords.
United States Patent 8,789,092, July 2014.
Assignee: Lucid Commerce, Inc. (Seattle, WA).
- [131]
- Brendan Kitts, Brian
Burdick, Dyng Au, Liang Wei, and
Amanda Powter.
System
and method for attributing multi-channel conversion events and subsequent
activity to multi-channel media sources.
United States Patent 8,768,770, July 2014.
Assignee: Lucid Commerce, Inc. (Seattle, WA).
- [132]
- M. Klein and M.L. Nelson.
Moved but not gone: An evaluation of real-time methods for discovering
replacement web pages.
International Journal on Digital Libraries, 14(1-2):17–38, 2014.
(doi:10.1007/s00799-014-0108-0)
- [133]
- M. Klein, H. Van De Sompel,
R. Sanderson, H. Shankar,
L. Balakireva, K. Zhou, and
R. Tobin.
Scholarly context not found: One in five articles suffers from reference rot.
PLoS ONE, 9(12), 2014.
(doi:10.1371/journal.pone.0115253)
- [134]
- D. Koll,
J. Li, and X. Fu.
SOUP: An online social network by the people, for the people.
In 15th International Middleware Conference, Middleware 2014,
pages 193–204. Association for Computing Machinery, Inc, 2014.
(doi:10.1145/2663165.2663324)
- [135]
- S. Kollias, V. Vlachos,
A. Papanikolaou, P. Chatzimisios,
C. Ilioudis, and K. Metaxiotis.
A global-local approach for estimating the internet's threat level.
Journal of Communications and Networks, 16(4):407–414, 2014.
(doi:10.1109/JCN.2014.000070)
- [136]
- S. Kollias, V. Vlachos,
A. Papanikolaou, P. Chatzimisios,
C. Ilioudis, and K. Metaxiotis.
Measuring the internet's threat level: A global-local approach.
In ISCC 2014 Workshop - 5th IEEE International Workshop on Performance
Evaluation of Communications in Distributed Systems and Web based Service
Architectures, PEDISWESA 2014, volume Workshops. Institute of
Electrical and Electronics Engineers Inc., 2014.
(doi:10.1109/ISCC.2014.6912624)
- [137]
- L. Kong,
G. Bauer, and J. Hale.
Location-based device grouping for function restriction.
In 9th Annual Cyber and Information Security Research Conference, CISRC
2014, pages 113–116. Association for Computing Machinery, 2014.
(doi:10.1145/2602087.2602099)
- [138]
- Eyal
Koren, Golan Hallel, and Asaf Dafner.
Running
injected code prior to execution of an application.
United States Patent 8,745,598, June 2014.
Assignee: BMC Software, Inc. (Houston, TX).
- [139]
- D. Korzun and A. Gurtov.
Hierarchical architectures in structured peer-to-peer overlay networks.
Peer-to-Peer Networking and Applications, 7(4):359–395, 2014.
(doi:10.1007/s12083-013-0200-z)
- [140]
- T. Kosar, M. Mernik,
J. Gray, and T. Kos.
Debugging measurement systems using a domain-specific modeling language.
Computers in Industry, 65(4):622–635, 2014.
(doi:10.1016/j.compind.2014.01.013)
- [141]
- H. Kurhinen and M. Lampi.
Micro-services based distributable workflow for digital archives.
In Archiving 2014, pages 47–51. Society for Imaging Science and
Technology, 2014.
- [142]
- L.K.H.
Lai and K.S. Chin.
Development of a failure mode and effects analysis based risk assessment tool
for information security.
Industrial Engineering and Management Systems, 13(1):87–100,
2014.
(doi:10.7232/iems.2014.13.1.087)
- [143]
- M. Langheinrich, R. Finn,
V. Coroama, and D. Wright.
Quo vadis smart surveillance? how smart technologies combine and challenge
democratic oversight.
In Reloading Data Protection: Multidisciplinary Insights and Contemporary
Challenges, pages 151–182. Springer Netherlands, 2014.
(doi:10.1007/978-94-007-7540-4_9)
- [144]
- J.-S. Lee
and D.-H. Shin.
The relationship between human and smart TVs based on emotion recognition in
HCI.
14th International Conference on Computational Science and Its
Applications, ICCSA 2014, 8582 LNCS(PART 4):652–667, 2014.
(doi:10.1007/978-3-319-09147-1_47)
- [145]
- K. Lee.
How collective intelligence emerges: Knowledge creation process in
Wikipedia from microscopic viewpoint.
In 2014 12th International Working Conference on Advanced Visual
Interfaces, AVI 2014, pages 373–374. Association for Computing
Machinery, 2014.
(doi:10.1145/2598153.2600040)
- [146]
- O.A.L.
Lemos, A.C. De Paula, F.C. Zanichelli, and
C.V. Lopes.
Thesaurus-based automatic query expansion for interface-driven code search.
In 11th International Working Conference on Mining Software Repositories,
MSR 2014, pages 212–221. Association for Computing Machinery, Inc,
2014.
(doi:10.1145/2597073.2597087)
- [147]
- P. Lengauer and
H. Mössenböck.
The taming of the shrew: Increasing performance by automatic parameter tuning
for Java garbage collectors.
In 5th ACM/SPEC International Conference on Performance Engineering, ICPE
2014, pages 111–122. Association for Computing Machinery, 2014.
(doi:10.1145/2568088.2568091)
- [148]
- L. Li
and H. Leung.
Bayesian prediction of fault-proneness of agile-developed object-oriented
system.
15th International Conference on Enterprise Information Systems, ICEIS
2013, 190:209–225, 2014.
(doi:10.1007/978-3-319-09492-2_13)
- [149]
- H. Li,
L.-Y. Hao, R. Chen, X. Ge, and
H. Zhao.
Symmetric preferential attachment for new vertices attaching to software
networks.
New Generation Computing, 32(3-4):271–296, 2014.
(doi:10.1007/s00354-014-0405-6)
- [150]
- H. Li,
F.-H. Li, J. Cao, B. Niu,
W.-H. Sun, and K. Geng.
Survey on security and privacy preserving for mobile internet service.
Tongxin Xuebao/Journal on Communications, 35(11):1–11, 2014.
(doi:10.3969/j.issn.1000-436x.2014.11.001)
- [151]
- L. Li,
L. Wang, J. Chen, R. Wang, and
Z. Zhang.
Fairness analysis for multiparty nonrepudiation protocols based on improved
strand space.
Discrete Dynamics in Nature and Society, 2014, 2014.
(doi:10.1155/2014/904717)
- [152]
- J. Li.
Dynamic visiting coordination problem based on multi-agent for large-scale
crowds' activities.
International Journal of Industrial and Systems Engineering,
17(1):115–131, 2014.
(doi:10.1504/IJISE.2014.060830)
- [153]
- Z. Liao,
S. Liu, and S. Xi.
An improved multipoint relaying scheme for message propagation in distributed
peer-to-peer system.
International Journal of Distributed Sensor Networks, 2014, 2014.
(doi:10.1155/2014/792814)
- [154]
- A. Lima,
L. Rossi, and M. Musolesi.
Coding together at scale: GitHub as a collaborative social network.
In 8th International Conference on Weblogs and Social Media, ICWSM
2014, pages 295–304. The AAAI Press, 2014.
- [155]
- C.-S. Lin
and J.-W. Lin.
Streaming videos over BitTorrent by balancing playback continuity and
distribution of piece rareness.
In 2014 23rd International Conference on Computer Communication and
Networks, ICCCN 2014. Institute of Electrical and Electronics
Engineers Inc., 2014.
(doi:10.1109/ICCCN.2014.6911868)
- [156]
- C.-S. Lin
and M.-J. Yan.
Dynamic peer buffer adjustment to improve service availability on peer-to-peer
on-demand streaming networks.
Peer-to-Peer Networking and Applications, 7(1):1–15, 2014.
(doi:10.1007/s12083-012-0138-6)
- [157]
- Jie
Lin, Jian Ni, and Andres Quiroz Hernandez.
Two-level
structured overlay design for cluster management in a peer-to-peer
network.
United States Patent 8,756,253, June 2014.
Assignee: Xerox Corporation (Norwalk, CT).
- [158]
- M. Lindberg.
Analysis of a feedback-based energy conserving content distribution mechanism
for mobile networks.
In 19th IFAC World Congress on International Federation of Automatic
Control, IFAC 2014, volume 19, pages 8749–8755. IFAC Secretariat,
2014.
- [159]
- J. Liu,
S.Y. Chen, M.W. Lin, and H. Liu.
A reliable file protection system based on transparent encryption.
International Journal of Security and its Applications,
8(1):123–132, 2014.
(doi:10.14257/ijsia.2014.8.1.12)
- [160]
- T.-S. Lo,
H.-P. Lu, and H.-L. Wei.
New service development model: A user experience-oriented design.
In 2014 18th IEEE International Conference on Computer Supported
Cooperative Work in Design, CSCWD 2014, pages 710–715. IEEE Computer
Society, 2014.
(doi:10.1109/CSCWD.2014.6846932)
- [161]
- E. Loukis, Y. Charalabidis,
and A. Androutsopoulou.
A study of multiple social media use in the european parliament from an
innovation perspective.
In 18th Panhellenic Conference on Informatics, PCI 2014, volume
02-04-October-2014. Association for Computing Machinery, 2014.
(doi:10.1145/2645791.2645840)
- [162]
- F. Loukos, H. Karatza, and
V. Kalogeraki.
Real-time data dissemination in mobile peer-to-peer networks.
Journal of Systems and Software, 90(1):179–190, 2014.
(doi:10.1016/j.jss.2013.11.1122)
- [163]
- H. Luo,
Y. Dong, Y. Ng, and S. Wang.
VertexRank: Importance rank for software network vertices.
In 38th Annual IEEE Computer Software and Applications Conference,
COMPSAC 2014, pages 251–260. IEEE Computer Society, 2014.
(doi:10.1109/COMPSAC.2014.34)
- [164]
- C.C.
Machado, L.Z. Granville, A. Schaeffer-Filho,
and J.A. Wickboldt.
Towards SLA policy refinement for QoS management in software-defined
networking.
In 28th IEEE International Conference on Advanced Information Networking
and Applications, IEEE AINA 2014, pages 397–404. Institute of
Electrical and Electronics Engineers Inc., 2014.
(doi:10.1109/AINA.2014.148)
- [165]
- N. Madrane, S.J. Andaloussi,
and A. Sekkaki.
Capsid framework: Towards next-generation network of distributed content.
In 2014 5th International Conference on Next Generation Networks and
Services, NGNS 2014, pages 69–72. IEEE Computer Society, 2014.
(doi:10.1109/NGNS.2014.6990230)
- [166]
- R. Malhotra and A.J. Bansal.
Cross project change prediction using open source projects.
In 3rd International Conference on Advances in Computing, Communications
and Informatics, ICACCI 2014, pages 201–207. Institute of Electrical
and Electronics Engineers Inc., 2014.
(doi:10.1109/ICACCI.2014.6968347)
- [167]
- R. Malhotra, N. Pritam, and
Y. Singh.
On the applicability of evolutionary computation for software defect
prediction.
In 3rd International Conference on Advances in Computing, Communications
and Informatics, ICACCI 2014, pages 2249–2257. Institute of
Electrical and Electronics Engineers Inc., 2014.
(doi:10.1109/ICACCI.2014.6968592)
- [168]
- O. Mamavi and O. Meier.
L'attachement préférentiel dans la formation d'alliances
stratégiques.
Revue Francaise de Gestion, 241(4):79–91, 2014.
(doi:10.3166/RFG.241.79-91)
- [169]
- A.B. Martınez,
J. De Andrés, and J. Garcıa.
Determinants of the web accessibility of European banks.
Information Processing and Management, 50(1):69–86, 2014.
(doi:10.1016/j.ipm.2013.08.001)
- [170]
- C. Mateos, M. Crasso,
A. Zunino, and M. Campo.
A software support to initiate systems engineering students in service-oriented
computing.
Computer Applications in Engineering Education, 22(2):252–265,
2014.
(doi:10.1002/cae.20551)
- [171]
- M. Mattus.
The anyone-can-edit syndrome: Intercreation stories of three featured
articles on wikipedia.
Nordicom Review, 35:189–204, 2014.
- [172]
- C. Mettouris and G.A.
Papadopoulos.
Ubiquitous recommender systems.
Computing, 96(3):223–257, 2014.
(doi:10.1007/s00607-013-0351-z)
- [173]
- R. Mishra and A. Sureka.
Mining peer code review system for computing effort and contribution metrics
for patch reviewers.
In 2014 4th IEEE Workshop on Mining Unstructured Data, MUD 2014,
pages 11–15. Institute of Electrical and Electronics Engineers Inc., 2014.
(doi:10.1109/MUD.2014.11)
- [174]
- O. Mizuno and Y. Hirata.
A cross-project evaluation of text-based fault-prone module prediction.
In 2014 6th International Workshop on Empirical Software Engineering in
Practice, IWESEP 2014, pages 43–48. Institute of Electrical and
Electronics Engineers Inc., 2014.
(doi:10.1109/IWESEP.2014.9)
- [175]
- J.M. Monteiro, R.S. Cruz,
C.Z. Patrikakis, N.C. Papaoulakis,
C.T. Calafate, and M.S. Nunes.
Peer-to-peer video streaming.
Digital Arts and Entertainment: Concepts, Methodologies, Tools, and
Applications, 1:169–228, 2014.
(doi:10.4018/978-1-4666-6114-1.ch008)
- [176]
- J. Müller, C.A.
Shoemaker, and R. Piché.
SO-i: A surrogate model algorithm for expensive nonlinear integer
programming problems including global optimization applications.
Journal of Global Optimization, 59(4):865–889, 2014.
(doi:10.1007/s10898-013-0101-y)
- [177]
- L.M.
Muriana, C. Maciel, and A.C.B. Garcia.
Development of open source software, a qualitative view in a knowledge
management approach.
In 16th International Conference on Enterprise Information Systems, ICEIS
2014, volume 2, pages 391–399. SciTePress, 2014.
- [178]
- Elissa E. S. Murphy and
John D. Mehr.
Intelligent
tiers of backup data.
United States Patent 8,769,049, July 2014.
Assignee: Microsoft Corporation (Redmond, WA).
- [179]
- Elissa E. S. Murphy and Navjot
Virk.
Distributed
backup and versioning.
United States Patent 8,769,055, July 2014.
Assignee: Microsoft Corporation (Redmond, WA).
- [180]
- P. Narang, C. Hota, and
V.N. Venkatakrishnan.
PeerShark: flow-clustering and conversation-generation for malicious
peer-to-peer traffic identification.
Tijdschrift voor Urologie, 2014(1):1–12, 2014.
(doi:10.1186/s13635-014-0015-3)
- [181]
- P. Narang, S. Ray,
C. Hota, and V. Venkatakrishnan.
PeerShark: Detecting peer-to-peer botnets by tracking conversations.
In 2014 IEEE Computer Society's Security and Privacy Workshops, SPW
2014, volume 2014-January, pages 108–115. Institute of Electrical and
Electronics Engineers Inc., 2014.
(doi:10.1109/SPW.2014.25)
- [182]
- N. Neu,
K.B. Kent, C. Gracie, and
A. Hinkenjann.
Automatic application performance improvements through VM parameter
modification after runtime behavior analysis.
In 8th International Conference on Performance Evaluation Methodologies
and Tools, VALUETOOLS 2014, pages 147–152. ICST, 2014.
(doi:10.4108/icst.valuetools.2014.258196)
- [183]
- Z.X. Ng,
A. Ahmad, and S.B. Maynard.
Information security management: Factors that influence security investments
in SMES.
In 11th Australian Information Security Management Conference, ISM
2013, pages 60–74. Edith Cowan University, 2014.
- [184]
- D.T.
Nguyen, Q.B. Duong, E. Zamai, and
M.K. Shahzad.
Dynamic structure identification of Bayesian network model for fault
diagnosis of FMS.
In 40th Annual Conference of the IEEE Industrial Electronics Society,
IECON 2014, pages 119–125. Institute of Electrical and Electronics
Engineers Inc., 2014.
(doi:10.1109/IECON.2014.7048487)
- [185]
- M.S.
Nikabadi.
A framework for technology-based factors for knowledge management in supply
chain of auto industry.
VINE, 44(3):375–393, 2014.
(doi:10.1108/VINE-09-2013-0057)
- [186]
- A.F.
Nogueira, J.C.B. Ribeiro, and M.A. Zenha-Rela.
On the evaluation of software maintainability using automatic test case
generation.
In 9th International Conference on the Quality of Information and
Communications Technology, QUATIC 2014, pages 300–305. Institute of
Electrical and Electronics Engineers Inc., 2014.
(doi:10.1109/QUATIC.2014.48)
- [187]
- N. Nóra.
Áttekerjük vagy nem? a digitális videorögzıto
technológiák elfogadása és terjedése.
Informacios Tarsadalom, 4:46–61, 2014.
- [188]
- M.C.
Olesen, R.R. Hansen, J.L. Lawall, and
N. Palix.
Coccinelle: Tool support for automated CERT C secure coding standard
certification.
Science of Computer Programming, 91(PART B):141–160, 2014.
(doi:10.1016/j.scico.2012.10.011)
- [189]
- P. Oliveira, M.T. Valente,
and F.P. Lima.
Extracting relative thresholds for source code metrics.
In 2014 1st Software Evolution Week - IEEE Conference on Software
Maintenance, Reengineering, and Reverse Engineering, CSMR-WCRE 2014,
pages 254–263. IEEE Computer Society, 2014.
(doi:10.1109/CSMR-WCRE.2014.6747177)
- [190]
- J.L. Ordiales Coscia,
C. Mateos, M. Crasso, and
A. Zunino.
Refactoring code-first web services for early avoiding WSDL anti-patterns:
Approach and comprehensive assessment.
Science of Computer Programming, 89(PART C):374–407, 2014.
(doi:10.1016/j.scico.2014.03.015)
- [191]
- Y. Ouazene, A. Yalaoui,
F. Yalaoui, and H. Chehade.
Non-linear programming method for buffer allocation in unreliable production
lines.
21st International Conference on Analytical and Stochastic Modelling
Techniques and Applications, ASMTA 2014, 8499 LNCS:80–94, 2014.
(doi:10.1007/978-3-319-08219-6_6)
- [192]
- S. Ouhbi, A. Idri,
J.L.F. Aleman, and A. Toval.
Evaluating software product quality: A systematic mapping study.
In Joint Conference of the 24th International Workshop on Software
Measurement, IWSM 2014 and the 9th International Conference on Software
Process and Product Measurement, Mensura 2014, pages 141–151.
Institute of Electrical and Electronics Engineers Inc., 2014.
(doi:10.1109/IWSM.Mensura.2014.30)
- [193]
- Raymond E. Ozzie, Jack E.
Ozzie, Paresh S. Suthar, and Raman Narayanan.
Synchronization
associated duplicate data resolution.
United States Patent 8,751,442, June 2014.
Assignee: Microsoft Corporation (Redmond, WA).
- [194]
- P.M. Papadopoulos, I.G.
Stamelos, and A. Cerone.
Using open source projects in higher education: A two-way certification
framework.
10th International Conference on Software Engineering and Formal Methods,
SEFM 2012, 1st International Symposium on InSuEdu 2012, 1st International
Symposium on MoKMaSD 2012, 6th International Workshop on Foundations and
Techniques for OpenCert 2012, 7991 LNCS:274–280, 2014.
(doi:10.1007/978-3-642-54338-8-22)
- [195]
- S.T.
Piantadosi.
Zipf's word frequency law in natural language: A critical review and future
directions.
Psychonomic Bulletin and Review, 21(5):1112–1130, 2014.
(doi:10.3758/s13423-014-0585-6)
- [196]
- A. Pino.
Free assistive technology software for persons with motor disabilities.
Open Source Technology: Concepts, Methodologies, Tools, and
Applications, 1-4:462–505, 2014.
(doi:10.4018/978-1-4666-7230-7.ch027)
- [197]
- D. Pletea, B. Vasilescu, and
A. Serebrenik.
Security and emotion: Sentiment analysis of security discussions on GitHub.
In 11th International Working Conference on Mining Software Repositories,
MSR 2014, pages 348–351. Association for Computing Machinery, Inc,
2014.
(doi:10.1145/2597073.2597117)
- [198]
- J. Porubän,
J. Kollár, and M. Sabo.
Abstraction of computer language patterns: The inference of textual notation
for a DSL.
In Computational Linguistics: Concepts, Methodologies, Tools, and
Applications, volume 3-3, pages 1401–1421. IGI Global, 2014.
(doi:10.4018/978-1-4666-6042-7.ch069)
- [199]
- V.A.
Pourghadim, M.Y. Noordin, and K.Y. Wong.
Effect of buffer size variation on remanufacturing environment.
1st International Materials, Industrial, and Manufacturing Engineering
Conference, MIMEC 2013, 845:755–759, 2014.
(doi:10.4028/www.scientific.net/AMR.845.755)
- [200]
- K.R. Prithviraj and B.T.
Sampath Kumar.
Corrosion of URLs: Implications for electronic publishing.
IFLA Journal, 40(1):35–47, 2014.
(doi:10.1177/0340035214526529)
- [201]
- R. Queiroz, L. Passos,
M.T. Valente, S. Apel, and
K. Czarnecki.
Does feature scattering follow power-law distributions? an investigation of
five pre-processor-based systems.
In 6th International Workshop on Feature-Oriented Software Development,
FOSD 2014, pages 23–29. Association for Computing Machinery,
September 2014.
(doi:10.1145/2660190.2662114)
- [202]
- L. Quesada, F. Berzal, and
J.-C. Cubero.
ModelCC — a pragmatic parser generator.
International Journal of Software Engineering and Knowledge
Engineering, 24(8):1177–1195, 2014.
(doi:10.1142/S0218194014500375)
- [203]
- A. Qureshi, D. Megıas,
and H. Rifà-Pous.
Framework for preserving security and privacy in peer-to-peer content
distribution systems.
Expert Systems with Applications, 42(3):1391–1408, 2014.
(doi:10.1016/j.eswa.2014.08.053)
- [204]
- K. Rajkumar and D. Sowbakya.
A study on peer-to-peer (P2P) systems and its live streaming design issues.
International Journal of Applied Engineering Research,
9(7):743–753, 2014.
- [205]
- Girish Maskeri Rama,
Basavara Raju Muddu, and Avinash Kak.
Systems,
methods, and computer-readable media for measuring quality of application
programming interfaces.
United States Patent 8,656,365, February 2014.
Assignee: Infosys Limited (Bangalore, IN).
- [206]
- R. Ramler and J. Gmeiner.
Practical challenges in test environment management.
In 7th IEEE International Conference on Software Testing, Verification
and Validation Workshops, ICSTW 2014, pages 358–359. IEEE Computer
Society, 2014.
(doi:10.1109/ICSTW.2014.41)
- [207]
- A. Rastogi and A. Sureka.
Samikshaviz: A panoramic view to measure contribution and performance of
software maintenance professionals by mining bug archives.
In 7th India Software Engineering Conference, ISEC 2014.
Association for Computing Machinery, 2014.
(doi:10.1145/2590748.2590750)
- [208]
- H. Ren,
W. Mo, G. Zhao, D. Ren, and
S. Liu.
Breadth first search based cosine software code framework automation algorithm.
In ASME 2014 Power Conference, POWER 2014, volume 2. American
Society of Mechanical Engineers (ASME), 2014.
(doi:10.1115/POWER2014-32014)
- [209]
- S. Resendes, P. Carreira, and
A.C. Santos.
Conflict detection and resolution in home and building automation systems: a
literature review.
Journal of Ambient Intelligence and Humanized Computing,
5(5):699–715, 2014.
(doi:10.1007/s12652-013-0184-9)
- [210]
- I. Rhiu,
Y.L. Rhie, G.-W. Kim, and M.H.
Yun.
Observing the smart tv-viewing experience by a diary-based observation method.
In 58th International Annual Meeting of the Human Factors and Ergonomics
Society, HFES 2014, volume 2014-January, pages 1209–1213. Human
Factors an Ergonomics Society Inc., 2014.
(doi:10.1177/1541931214581252)
- [211]
- G. Robles, J.M.
González-Barahona, C. Cervigón,
A. Capiluppi, and D. Izquierdo-Cortázar.
Estimating development effort in free/open source software projects by mining
software repositories: A case study of OpenStack.
In 11th International Working Conference on Mining Software Repositories,
MSR 2014, pages 222–231. Association for Computing Machinery, Inc,
2014.
(doi:10.1145/2597073.2597107)
- [212]
- M. Romoozi, M. Fathy, and
R. Berangi.
Performance analysis and improvement content discovery protocols over vehicular
networks.
Wireless Personal Communications, 75(2):857–899, 2014.
(doi:10.1007/s11277-013-1395-2)
- [213]
- Anthony
Rose.
Filter
for a distributed network.
United States Patent 8,775,508, July 2014.
Assignee: Altnet, Inc. (Studio City, CA).
- [214]
- J. Roy,
C. Contini, F. Brodeur,
N. Diouf, and W. Suryn.
Method for the evaluation of open source software quality from an IT
untrained user perspective.
In 2014 7th International C Conference on Computer Science and Software
Engineering, C3S2E 2014, pages 148–153. Association for Computing
Machinery, 2014.
(doi:10.1145/2641483.2641525)
- [215]
- J. Ruan,
Y. Shi, and T. Samatsu.
A similarity-based M(1,2,3) approach for rating the security of network
systems.
In 2014 Joint 7th International Conference on Soft Computing and
Intelligent Systems, SCIS 2014 and 15th International Symposium on Advanced
Intelligent Systems, ISIS 2014, pages 1078–1084. Institute of
Electrical and Electronics Engineers Inc., 2014.
(doi:10.1109/SCIS-ISIS.2014.7044737)
- [216]
- D. Rusk
and Y. Coady.
Location-based analysis of developers and technologies on GitHub.
In 28th IEEE International Conference on Advanced Information Networking
and Applications Workshops, IEEE WAINA 2014, pages 681–685. IEEE
Computer Society, 2014.
(doi:10.1109/WAINA.2014.110)
- [217]
- N.K.
Saini, V.K. Sihag, and R.C. Yadav.
A reactive approach for detection of collusion attacks in P2P trust and
reputation systems.
In 2014 4th IEEE International Advance Computing Conference, IACC
2014, pages 312–317. IEEE Computer Society, 2014.
(doi:10.1109/IAdCC.2014.6779340)
- [218]
- V. Saini, H. Sajnani,
J. Ossher, and C.V. Lopes.
A dataset for Maven artifacts and bug patterns found in them.
In 11th International Working Conference on Mining Software Repositories,
MSR 2014, pages 416–419. Association for Computing Machinery, Inc,
2014.
(doi:10.1145/2597073.2597134)
- [219]
- H. Sajnani, V. Saini,
J. Ossher, and C.V. Lopes.
Is popularity a measure of quality? an analysis of maven components.
In 30th International Conference on Software Maintenance and Evolution,
ICSME 2014, pages 231–240. Institute of Electrical and Electronics
Engineers Inc., 2014.
(doi:10.1109/ICSME.2014.45)
- [220]
- Jonathan Salz and Richard S.
Tibbetts.
Data
parallelism and parallel operations in stream processing.
United States Patent 8,769,485, July 2014.
Assignee: TIBCO Software, Inc. (Palo Alto, CA).
- [221]
- A. Samydurai and
A. Shanmugam.
Efficient tree-based caching for effective QoS peer-to-peer file sharing.
In 2013 International Conference on Information Engineering, ICIE
2013, volume 49, pages 707–714. WITPress, 2014.
(doi:10.2495/ICIE130832)
- [222]
- A.C.
Santos, J.M.P. Cardoso, P.C. Diniz,
D.R. Ferreira, and Z. Petrov.
A DSL for specifying run-time adaptations for embedded systems: an
application to vehicle stereo navigation.
Journal of Supercomputing, 70(3):1218–1248, 2014.
(doi:10.1007/s11227-014-1192-z)
- [223]
- H.B.
Saritas and G. Kardas.
A model driven architecture for the development of smart card software.
Computer Languages, Systems and Structures, 40(2):53–72, 2014.
(doi:10.1016/j.cl.2014.02.001)
- [224]
- M. Sarrab and O.M.H. Rehman.
Empirical study of open source software selection for adoption, based on
software quality characteristics.
Advances in Engineering Software, 69:1–11, 2014.
(doi:10.1016/j.advengsoft.2013.12.001)
- [225]
- D. Schall.
Who to follow recommendation in large-scale online development communities.
Information and Software Technology, 56(12):1543–1555, 2014.
(doi:10.1016/j.infsof.2013.12.003)
- [226]
- M. Scheidgen and J. Fischer.
Model-based mining of source code repositories.
8th International Conference on System Analysis and Modeling: Models and
Reusability, SAM 2014, 8769:239–254, 2014.
- [227]
- Christoph Schnelle and
Geoffrey John Nolan.
Mapping
of data from XML to SQL.
United States Patent 8,738,667, May 2014.
Assignee: Timebase Pty Limited (Sydney, AU).
- [228]
- R. Shatnawi.
Empirical study of fault prediction for open-source systems using the chidamber
and kemerer metrics.
IET Software, 8(3):113–119, 2014.
(doi:10.1049/iet-sen.2013.0008)
- [229]
- X.-J.
Shen, L. Liu, Z.-J. Zha, P.-Y.
Gu, Z.-Q. Jiang, J.-M. Chen, and
J. Panneerselvam.
Achieving dynamic load balancing through mobile agents in small world P2P
networks.
Computer Networks, PartA:134–148, 2014.
(doi:10.1016/j.comnet.2014.05.003)
- [230]
- W.-C.
Shin and J. Rho.
Implementation of software refactoring operation using a code model.
International Journal of Software Engineering and its
Applications, 8(6):17–30, 2014.
(doi:10.14257/ijseia.2014.8.6.02)
- [231]
- J.M.G.
Smith and R. Barnes.
Optimal server allocation in closed finite queueing networks.
Flexible Services and Manufacturing Journal, 27(1):58–85, 2014.
(doi:10.1007/s10696-014-9202-2)
- [232]
- S. Sobernig and M. Strembeck.
DSL-based architecting and DSL-based architectures.
In 8th European Conference on Software Architecture Workshops, ECSAW
2014. Association for Computing Machinery, 2014.
(doi:10.1145/2642803.2642818)
- [233]
- F. Sohail, J. Ahmed, and
Z. Habib.
PKI based cryptographic module.
In 17th IEEE International Multi Topic Conference, IEEE INMIC
2014, pages 87–91. Institute of Electrical and Electronics Engineers
Inc., 2014.
(doi:10.1109/INMIC.2014.7097317)
- [234]
- A. Soltani Panah and
S. Khorsandi.
A dynamic coalition formation game for search efficient adaptive overlay
construction in unstructured peer-to-peer networks.
Peer-to-Peer Networking and Applications, 7(1):86–99, 2014.
(doi:10.1007/s12083-012-0185-z)
- [235]
- S.K.
Sowe, A. Cerone, and D. Settas.
An empirical study of FOSS developers patterns of contribution: Challenges
for data linkage and analysis.
Science of Computer Programming, 91(PART B):249–265, 2014.
(doi:10.1016/j.scico.2013.11.033)
- [236]
- I. Stamelos.
Management and coordination of free/open source projects.
Software Project Management in a Changing World, pages 321–341,
2014.
(doi:10.1007/978-3-642-55035-5_13)
- [237]
- M.-O.
Stehr, M. Kim, and C. Talcott.
Partially ordered knowledge sharing and fractionated systems in the context of
other models for distributed computing.
Lecture Notes in Computer Science (including subseries Lecture Notes in
Artificial Intelligence and Lecture Notes in Bioinformatics),
8373:402–433, 2014.
(doi:10.1007/978-3-642-54624-2-20)
- [238]
- Salvatore J. Stolfo, Malek Ben
Salem, and Shlomo Hershkop.
Methods,
systems, and media for masquerade attack detection by monitoring computer
user behavior.
United States Patent 8,769,684, July 2014.
Assignee: The Trustees of Columbia University in the City of New York (New
York, NY).
- [239]
- C. Su and
A. Xu.
Buffer allocation for hybrid manufacturing/remanufacturing system considering
quality grading.
International Journal of Production Research, 52(5):1269–1284,
2014.
(doi:10.1080/00207543.2013.828165)
- [240]
- J. Swan, J. Woodward,
E. Özcan, G. Kendall, and
E. Burke.
Searching the hyper-heuristic design space.
Cognitive Computation, 6(1):66–73, 2014.
(doi:10.1007/s12559-013-9201-8)
- [241]
- A. Syschikov, Y. Sheynin,
B. Sedov, and V. Ivanova.
Domain-specific programming environment for heterogeneous multicore embedded
systems.
International Journal of Embedded and Real-Time Communication
Systems, 5(4):1–23, 2014.
(doi:10.4018/IJERTCS.2014100101)
- [242]
- G. Szoke, G. Antal,
C. Nagy, R. Ferenc, and
T. Gyimothy.
Bulk fixing coding issues and its effects on software quality: Is it worth
refactoring?
In 14th IEEE International Working Conference on Source Code Analysis and
Manipulation, SCAM 2014, pages 95–104. Institute of Electrical and
Electronics Engineers Inc., 2014.
(doi:10.1109/SCAM.2014.18)
- [243]
- G. Szoke, C. Nagy,
R. Ferenc, and T. Gyimóthy.
A case study of refactoring large-scale industrial systems to efficiently
improve source code quality.
14th International Conference on Computational Science and Its
Applications, ICCSA 2014, 8583 LNCS(PART 5):524–540, 2014.
(doi:10.1007/978-3-319-09156-3_37)
- [244]
- M. Taeumel, M. Perscheid,
B. Steinert, J. Lincke, and
R. Hirschfeld.
Interleaving of modification and use in data-driven tool development.
In 2014 ACM International Symposium on New Ideas, New Paradigms, and
Reflections on Programming and Software, Onward! 2014 -Part of SPLASH
2014, pages 185–200. Association for Computing Machinery, Inc, 2014.
(doi:10.1145/2661136.2661150)
- [245]
- J.C. Tang.
Application of code generation technology in software projects.
2014 International Conference on Advances in Materials Science and
Information Technologies in Industry, AMSITI 2014, 513-517:2090–2093,
2014.
(doi:10.4028/www.scientific.net/AMM.513-517.2090)
- [246]
- I. Teixidó, F. Sebé,
J. Conde, and F. Solsona.
MPI-based implementation of an enhanced algorithm to solve the LPN problem
in a memory-constrained environment.
Parallel Computing, 40(5-6):100–112, 2014.
(doi:10.1016/j.parco.2014.04.002)
- [247]
- D. Thakur, B. Beckert,
I. Bortagaray, R. Brouwer, M.P.
Falcão, and L. Brito.
Turning technology on its head: The distributional dynamics of open-source
software.
In Innovation and Inequality: Emerging Technologies in an Unequal
World, pages 147–176. Edward Elgar Publishing Ltd., 2014.
(doi:10.4337/9781781951675.00015)
- [248]
- Y. Thomas, C. Tsilopoulos,
G. Xylomenos, and G.C. Polyzos.
Accelerating file downloads in publish subscribe internetworking with
multisource and multipath transfers.
In World Telecommunications Congress 2014, WTC 2014. Institute of
Electrical and Electronics Engineers Inc., 2014.
- [249]
- V. Thurner and
A. Böttcher.
An 'objects first, tests second' approach for software engineering education.
In 2015 IEEE Frontiers in Education Conference, FIE 2015, volume
2014. Institute of Electrical and Electronics Engineers Inc., 2014.
(doi:10.1109/FIE.2015.7344027)
- [250]
- A. Tiwana and A.A. Bush.
Spotting lemons in platform markets: A conjoint experiment on signaling.
IEEE Transactions on Engineering Management, 61(3):393–405, 2014.
(doi:10.1109/TEM.2014.2311074)
- [251]
- W.G. Tuohey.
Lessons from practices and standards in safety-critical and regulated sectors.
In Handbook of Research on Emerging Advancements and Technologies in
Software Engineering, pages 369–391. IGI Global, 2014.
(doi:10.4018/978-1-4666-6026-7.ch016)
- [252]
- V. Urovi and M.I. Schumacher.
The present and future of dynamic e-health interoperability in switzerland:
Results of an online questionnaire.
In 7th International Conference on Health Informatics, HEALTHINF 2014 -
Part of 7th International Joint Conference on Biomedical Engineering Systems
and Technologies, BIOSTEC 2014, pages 244–249. SciTePress, 2014.
- [253]
- V. Urovi, A.C. Olivieri,
A.B. De La Torre, S. Bromuri,
N. Fornara, and M. Schumacher.
Secure P2P cross-community health record exchange in IHE compatible
systems.
International Journal on Artificial Intelligence Tools, 23(1),
2014.
(doi:10.1142/S0218213014400065)
- [254]
- A.V. Uzunov and E.B.
Fernandez.
An extensible pattern-based library and taxonomy of security threats for
distributed systems.
Computer Standards and Interfaces, 36(4):734–747, 2014.
(doi:10.1016/j.csi.2013.12.008)
- [255]
- S. Validi, A. Bhattacharya,
and P.J. Byrne.
Integrated low-carbon distribution system for the demand side of a product
distribution supply chain: A DoE-guided MOPSO optimiser-based solution
approach.
International Journal of Production Research, 52(10):3074–3096,
2014.
(doi:10.1080/00207543.2013.864054)
- [256]
- B. Vasilescu, A. Serebrenik,
M. Goeminne, and T. Mens.
On the variation and specialisation of workload — a case study of the Gnome
ecosystem community.
Empirical Software Engineering, 19(4):955–1008, 2014.
(doi:10.1007/s10664-013-9244-1)
- [257]
- B. Vasilescu.
Human aspects, gamification, and social media in collaborative software
engineering.
In 36th International Conference on Software Engineering, ICSE
2014, pages 646–649. Association for Computing Machinery, 2014.
(doi:10.1145/2591062.2591091)
- [258]
- R. Vásquez-Ramırez,
G. Alor-Hernández,
C. Sánchez-Ramırez,
J. Guzmán-Luna, R. Zatarain-Cabada, and
M.-L. Barrón-Estrada.
AthenaTV: An authoring tool of educational applications for TV using
android-based interface design patterns.
New Review of Hypermedia and Multimedia, 20(3):251–280, 2014.
(doi:10.1080/13614568.2014.925004)
- [259]
- J. Vila and
D. Ribeiro-Soriano.
An overview of web 2.0 social capital: A cross-cultural approach.
Service Business, 8(3):399–404, 2014.
(doi:10.1007/s11628-014-0245-y)
- [260]
- H.-Q.
Wang, X.-M. Xue, and W.-Y. Lv.
Improved degraded ceiling algorithm for optimal buffer allocation in unreliable
production lines.
Kongzhi yu Juece/Control and Decision, 29(8):1424–1428, 2014.
(doi:10.13195/j.kzyjc.2013.0770)
- [261]
- M. Weiher and R. Hirschfeld.
Polymorphic identifiers: Uniform resource access in objective-smalltalk.
ACM SIGPLAN Notices, 49(2):61–71, 2014.
- [262]
- A. Wiggins, D. Gurzick,
S. Goggins, and B. Butler.
Quality hackathon: Evaluating the products of online co-production systems.
In 18th ACM International Conference on Supporting Group Work, GROUP
2014, pages 321–323. Association for Computing Machinery, 2014.
(doi:10.1145/2660398.2660429)
- [263]
- J.R.
Williams, D. Di Ruscio, N. Matragkas,
J. Di Rocco, and D.S. Kolovos.
Models of OSS project meta-information: A dataset of three forges.
In 11th International Working Conference on Mining Software Repositories,
MSR 2014, pages 408–411. Association for Computing Machinery, Inc,
2014.
(doi:10.1145/2597073.2597132)
- [264]
- Y. Xia,
G. Yan, and H. Zhang.
Analyzing the significance of process metrics for TT&c software defect
prediction.
In 2014 5th IEEE International Conference on Software Engineering and
Service Science, ICSESS 2014, pages 77–81. IEEE Computer Society,
2014.
(doi:10.1109/ICSESS.2014.6933517)
- [265]
- P. Yang
and Y.-P. Li.
On the complementary binary future internet architecture.
Complex Systems and Complexity Science, 11(1):53–59, 2014.
(doi:10.13306/j.1672-3813.2014.01.007)
- [266]
- H. Yang, R. Sawhney,
G. Zhang, L. Marella, and
Z. Han.
Using smart kitchen for grocery purchase prediction.
In IIE Annual Conference and Expo 2014, pages 2504–2511.
Institute of Industrial Engineers, 2014.
- [267]
- Y. Yu,
W. Rong, and W. Zhijun.
SSNF: Shared datacenter mechanism for inter-datacenter bulk transfer.
In 2nd International Conference on Advanced Cloud and Big Data, CBD
2014, pages 184–189. Institute of Electrical and Electronics
Engineers Inc., 2014.
(doi:10.1109/CBD.2014.31)
- [268]
- Y. Yu,
G. Yin, H. Wang, and T. Wang.
Exploring the patterns of social behavior in Github.
In 1st International Workshop on Crowd-Based Software Development Methods
and Technologies, CrowdSoft 2014, pages 31–36. Association for
Computing Machinery, Inc, 2014.
(doi:10.1145/2666539.2666571)
- [269]
- T. Zahariadis, A. Papadakis,
F. Alvarez, J. Gonzalez,
F. Lopez, F. Facca, and
Y. Al-Hazmi.
FIWARE lab: Managing resources and services in a cloud federation
supporting future internet applications.
In 7th IEEE/ACM International Conference on Utility and Cloud Computing,
UCC 2014, pages 792–799. Institute of Electrical and Electronics
Engineers Inc., 2014.
(doi:10.1109/UCC.2014.129)
- [270]
- L. Zhang, Y. Zou,
B. Xie, and Z. Zhu.
Recommending relevant projects via user behaviour: An exploratory study on
Github.
In 1st International Workshop on Crowd-Based Software Development Methods
and Technologies, CrowdSoft 2014, pages 25–30. Association for
Computing Machinery, Inc, 2014.
(doi:10.1145/2666539.2666570)
- [271]
- Y. Zhang, G. Yin,
Y. Yu, and H. Wang.
A exploratory study of @-mention in GitHub's pull-requests.
In 21st Asia-Pacific Software Engineering Conference, APSEC 2014,
volume 1, pages 343–350. IEEE Computer Society, 2014.
(doi:10.1109/APSEC.2014.58)
- [272]
- Y. Zhang, G. Yin,
Y. Yu, and H. Wang.
Investigating social media in GitHub's pull-requests: A case study on ruby
on rails.
In 1st International Workshop on Crowd-Based Software Development Methods
and Technologies, CrowdSoft 2014, pages 37–41. Association for
Computing Machinery, Inc, 2014.
(doi:10.1145/2666539.2666572)
- [273]
- Y.N.
Zhang, L. Han, and X. Cao.
Design of network information security system.
4th International Conference on Information Science, Automation and
Material System, ISAM 2014, 1022:257–260, 2014.
(doi:10.4028/www.scientific.net/AMR.1022.257)
- [274]
- Yu Zheng, Wencheng Zheng, and
Xing Xie.
Collaborative
location and activity recommendations.
United States Patent 8,719,198, May 2014.
Assignee: Microsoft Corporation (Redmond, WA).
- [275]
- B. Zhou, D. Llewellyn-Jones,
D. Lamb, M. Asim, Q. Shi, and
M. Merabti.
A heuristic approach for secure service composition adaptation.
In Cyberpatterns: Unifying Design Patterns with Security and Attack
Patterns, pages 97–105. Springer International Publishing, 2014.
(doi:10.1007/978-3-319-04447-7_8)