- [1]
- T. Abdou and P. Kamthan.
A knowledge management approach for testing open source software systems.
In 33rd IEEE International Performance Computing and Communications
Conference, IPCCC 2014. Institute of Electrical and Electronics
Engineers Inc., 2015.
(doi:10.1109/PCCC.2014.7017022)
- [2]
- R.A.
Abouhogail.
Network security and metrology: A survey.
International Journal of Security and its Applications,
9(11):251–270, 2015.
(doi:10.14257/ijsia.2015.9.11.24)
- [3]
- A. Adewumi, O. Emebo,
S. Misra, and L. Fernandez.
Tool support for Cascading Style Sheets' complexity metrics.
4th International Conference on Soft Computing, Intelligent Systems and
Information Technology, ICSIIT 2015, 516:551–560, 2015.
(doi:10.1007/978-3-662-46742-8_50)
- [4]
- A. Adewumi, S. Misra, and
N. Omoregbe.
Evaluating open source software quality models against ISO 25010.
In 15th IEEE International Conference on Computer and Information
Technology, CIT 2015, 14th IEEE International Conference on Ubiquitous
Computing and Communications, IUCC 2015, 13th IEEE International Conference
on Dependable, Autonomic and Secure Computing, DASC 2015 and 13th IEEE
International Conference on Pervasive Intelligence and Computing, PICom
2015, pages 872–877. Institute of Electrical and Electronics
Engineers Inc., 2015.
(doi:10.1109/CIT/IUCC/DASC/PICOM.2015.130)
- [5]
- R.N.
Akram, K. Markantonakis, and K. Mayes.
Enhancing java runtime environment for smart cards against runtime attacks.
20th European Symposium on Research in Computer Security, ESORICS
2015, 9327:541–560, 2015.
(doi:10.1007/978-3-319-24177-7_27)
- [6]
- A.B. Al-Badareen, J.-M.
Desharnais, and A. Abran.
A suite of rules for developing and evaluating software quality models.
25th International Workshop on Software Measurement, IWSM 2015 and 10th
International Conference on Software Process and Product Measurement, Mensura
2015, 230:1–13, 2015.
(doi:10.1007/978-3-319-24285-9_1)
- [7]
- J. Al Dallal.
Accounting for data encapsulation in the measurement of object-oriented class
cohesion.
Journal of Software: Evolution and Process, 27(5):373–400, 2015.
(doi:10.1002/smr.1714)
- [8]
- Z. Al-Mousa and Q. Nasir.
cl-CIDPS: A cloud computing based cooperative intrusion detection and
prevention system framework.
1st International Conference on Future Network Systems and Security, FNSS
2015, 523:181–194, 2015.
(doi:10.1007/978-3-319-19210-9_13)
- [9]
- M. Alenezi and M. Zarour.
Modularity measurement and evolution in object-oriented open-source projects.
In 2015 International Conference on Engineering and MIS, ICEMIS
2015, volume 24-26-September-2015. Association for Computing
Machinery, 2015.
(doi:10.1145/2832987.2833013)
- [10]
- R.S. Alkhawaldeh and J.M.
Jose.
Experimental study on semi-structured peer-to-peer information retrieval
network.
6th International Conference on Labs of the Evaluation Forum, CLEF
2015, 9283:3–14, 2015.
(doi:10.1007/978-3-319-24027-5_1)
- [11]
- N. Allen, P. Krishnan, and
B. Scholz.
Combining type-analysis with points-to analysis for analyzing Java library
source-code.
In 4th ACM SIGPLAN International Workshop on State of the Art in Program
Analysis, SOAP 2015, pages 13–18. Association for Computing
Machinery, Inc, 2015.
(doi:10.1145/2771284.2771287)
- [12]
- M.H. Almomani and F. Ababneh.
The expected opportunity cost and selecting the optimal subset.
Applied Mathematical Sciences, 9(131):6507–6519, 2015.
(doi:10.12988/ams.2015.58561)
- [13]
- S. Amann, S. Beyer,
K. Kevic, and H. Gall.
Software mining studies: Goals, approaches, artifacts, and replicability.
10th LASER Summer School on Software Engineering: Software for the Cloud
and Big Data, LASER 2013–2014, 8987:121–158, 2015.
(doi:10.1007/978-3-319-28406-4_5)
- [14]
- L. Amorim, E. Costa,
N. Antunes, B. Fonseca, and
M. Ribeiro.
Experience report: Evaluating the effectiveness of decision trees for
detecting code smells.
In 26th IEEE International Symposium on Software Reliability Engineering,
ISSRE 2015, pages 261–269. Institute of Electrical and Electronics
Engineers Inc., 2015.
(doi:10.1109/ISSRE.2015.7381819)
- [15]
- M. Aram and G. Neumann.
Multilayered analysis of co-development of business information systems.
Journal of Internet Services and Applications, 6(1), 2015.
(doi:10.1186/s13174-015-0030-8)
- [16]
- J. Augustine,
G. Pandurangan, P. Robinson,
S. Roche, and E. Upfal.
Enabling robust and efficient distributed computation in dynamic peer-to-peer
networks.
In 56th IEEE Annual Symposium on Foundations of Computer Science, FOCS
2015, volume 2015-December, pages 350–369. IEEE Computer Society,
2015.
(doi:10.1109/FOCS.2015.29)
- [17]
- J. Augustine,
G. Pandurangan, P. Robinson, and
E. Upfal.
Distributed agreement in dynamic peer-to-peer networks.
Journal of Computer and System Sciences, 81(7):1088–1109, 2015.
(doi:10.1016/j.jcss.2014.10.005)
- [18]
- L. Aversano and
M. Tortorella.
Analysing the reliability of open source software projects.
In 10th International Conference on Software Engineering and
Applications, ICSOFT-EA 2015, pages 348–357. SciTePress, 2015.
- [19]
- E. Azadi Marand,
E. Azadi Marand, and M. Challenger.
DSML4CP: A domain-specific modeling language for concurrent programming.
Computer Languages, Systems and Structures, 44:319–341, 2015.
(doi:10.1016/j.cl.2015.09.002)
- [20]
- P. Bahr,
J. Berthold, and M. Elsman.
Certified symbolic management of financial multi-party contracts.
In 20th ACM SIGPLAN International Conference on Functional Programming,
ICFP 2015, volume 2015-August, pages 315–327. Association for
Computing Machinery, 2015.
(doi:10.1145/2784731.2784747)
- [21]
- Y. Bai,
G. Yin, and H. Wang.
Multi-dimensions of developer trustworthiness assessment in OSS community.
In 13th IEEE International Conference on Trust, Security and Privacy in
Computing and Communications, TrustCom 2014, pages 75–81. Institute
of Electrical and Electronics Engineers Inc., 2015.
(doi:10.1109/TrustCom.2014.14)
- [22]
- G. Bajwa, M. Fazeen,
R. Dantu, and S. Tanpure.
Unintentional bugs to vulnerability mapping in Android applications.
In 13th IEEE International Conference on Intelligence and Security
Informatics, ISI 2015, pages 176–178. Institute of Electrical and
Electronics Engineers Inc., 2015.
(doi:10.1109/ISI.2015.7165966)
- [23]
- A. Bates, K.R.B. Butler,
M. Sherr, C. Shields,
P. Traynor, and D. Wallach.
Accountable wiretapping-or-i know they can hear you now.
Journal of Computer Security, 23(2):167–195, 2015.
(doi:10.3233/JCS-140515)
- [24]
- M. Bačıková,
J. Porubän, S. Chodarev, and
M. Nosál'.
Bootstrapping DSLs from user interfaces.
In 30th Annual ACM Symposium on Applied Computing, SAC 2015,
volume 13-17-April-2015, pages 2115–2118. Association for Computing
Machinery, 2015.
(doi:10.1145/2695664.2695994)
- [25]
- G. Bavota, A. De Lucia,
M. Di Penta, R. Oliveto, and
F. Palomba.
An experimental investigation on the innate relationship between quality and
refactoring.
Journal of Systems and Software, 107:1–14, 2015.
(doi:10.1016/j.jss.2015.05.024)
- [26]
- S. Bayati, D. Parsons,
T. Susnjak, and M. Heidary.
Big data analytics on large-scale socio-technical software engineering
archives.
In 3rd International Conference on Information and Communication
Technology, ICoICT 2015, pages 65–69. Institute of Electrical and
Electronics Engineers Inc., 2015.
(doi:10.1109/ICoICT.2015.7231398)
- [27]
- A.M.
Bejarano, L.E. Garcıa, and E.E. Zurek.
Detection of source code similitude in academic environments.
Computer Applications in Engineering Education, 23(1):13–22,
2015.
(doi:10.1002/cae.21571)
- [28]
- E. Berndt, D. Furniss, and
A. Blandford.
Learning contextual inquiry and distributed cognition: a case study on
technology use in anaesthesia.
Cognition, Technology and Work, 17(3):431–449, 2015.
(doi:10.1007/s10111-014-0314-y)
- [29]
- C. Biray and F. Buzluca.
A learning-based method for detecting defective classes in object-oriented
systems.
In 2015 8th IEEE International Conference on Software Testing,
Verification and Validation Workshops, ICSTW 2015. Institute of
Electrical and Electronics Engineers Inc., 2015.
(doi:10.1109/ICSTW.2015.7107477)
- [30]
- T.F. Bissyandé,
L. Réveillère, J.L. Lawall,
Y.-D. Bromberg, and G. Muller.
Implementing an embedded compiler using program transformation rules.
Software - Practice and Experience, 45(2):177–196, 2015.
(doi:10.1002/spe.2225)
- [31]
- K. Blincoe and D. Damian.
Implicit coordination: A case study of the rails OSS project.
11th IFIP WG 2.13 International Conference on Open Source Systems, OSS
2015, 451:35–44, 2015.
(doi:10.1007/978-3-319-17837-0_4)
- [32]
- I. Bluemke and
A. StepieŃ.
Experiment on defect prediction.
10th International Conference on Dependability and Complex Systems,
DepCoS-RELCOMEX 2015, 365:25–34, 2015.
(doi:10.1007/978-3-319-19216-1_3)
- [33]
- C. Borrego, S. Robles,
A. Fabregues, and A. Sánchez-Carmona.
A mobile code bundle extension for application-defined routing in delay and
disruption tolerant networking.
Computer Networks, 87:59–77, 2015.
(doi:10.1016/j.comnet.2015.05.017)
- [34]
- David D. Brandt, Kenwood
Hall, Mark Burton Anderson, Craig D. Anderson,
and George Bradford Collins.
System
and methodology providing automation security analysis and network intrusion
protection in an industrial environment.
United States Patent 9,009,084, April 2015.
Assignee: Rockwell Automation Technologies, Inc. (Mayfield Heights, OH).
- [35]
- M. Bruntink.
Towards base rates in software analytics: Early results and challenges from
studying Ohloh.
Science of Computer Programming, 97(P1):135–142, 2015.
(doi:10.1016/j.scico.2013.11.023)
- [36]
- B. Bryant, J.-M.
Jézéquel, R. Lämmel, M. Mernik,
M. Schindler, F. Steinmann, J.-P.
Tolvanen, A. Vallecillo, and M. Völter.
Globalized domain specific language engineering.
International Dagstuhl Seminar on Globalizing Domain-Specific Languages,
2014, 9400:43–69, 2015.
(doi:10.1007/978-3-319-26172-0_4)
- [37]
- T. Buchert, L. Nussbaum, and
J. Gustedt.
Towards complete tracking of provenance in experimental distributed systems
research.
International Workshops on Parallel Processing Workshops, Euro-Par
2015, 9523:604–616, 2015.
(doi:10.1007/978-3-319-27308-2_49)
- [38]
- G. Burlet and A. Hindle.
An empirical study of end-user programmers in the computer music community.
In 12th Working Conference on Mining Software Repositories, MSR
2015, volume 2015-August, pages 292–302. IEEE Computer Society, 2015.
(doi:10.1109/MSR.2015.34)
- [39]
- M. Cadariu, E. Bouwers,
J. Visser, and A. Van Deursen.
Tracking known security vulnerabilities in proprietary software systems.
In 22nd IEEE International Conference on Software Analysis, Evolution,
and Reengineering, SANER 2015, pages 516–519. Institute of Electrical
and Electronics Engineers Inc., 2015.
(doi:10.1109/SANER.2015.7081868)
- [40]
- F. Camilo, A. Meneely, and
M. Nagappan.
Do bugs foreshadow vulnerabilities? a study of the Chromium project.
In 12th Working Conference on Mining Software Repositories, MSR
2015, volume 2015-August, pages 269–279. IEEE Computer Society, 2015.
(doi:10.1109/MSR.2015.32)
- [41]
- S. Campanelli, P. Foglia, and
C.A. Prete.
An architecture to integrate IEC 61131-3 systems in an IEC 61499
distributed solution.
Computers in Industry, 72:47–67, 2015.
(doi:10.1016/j.compind.2015.04.002)
- [42]
- C. Casalnuovo, B. Vasilescu,
P. Devanbu, and V. Filkov.
Developer on boarding in GitHub: The role of prior social links and
language experience.
In 10th Joint Meeting of the European Software Engineering Conference and
the ACM SIGSOFT Symposium on the Foundations of Software Engineering,
ESEC/FSE 2015, pages 817–828. Association for Computing Machinery,
Inc, 2015.
(doi:10.1145/2786805.2786854)
- [43]
- Casparus Cate, James J.
Fitzgibbon, Robert R. Keller, Jr.,
Sapta Gireesh Pudipeddi, and Cory Sorice.
Barrier
operator feature enhancement.
United States Patent 9,141,099, September 2015.
Assignee: The Chamberlain Group, Inc. (Elmhurst, IL).
- [44]
- Casparus Cate, James J.
Fitzgibbon, Robert R. Keller, Jr., Cory
Sorice, James Scott Murray, Gregory John
Stanek, and Colin Barns Willmott.
Barrier
operator feature enhancement.
United States Patent 9,122,254, September 2015.
Assignee: The Chamberlain Group, Inc. (Elmhurst, IL).
- [45]
- M. Ceccato, A. Capiluppi,
P. Falcarin, and C. Boldyreff.
A large study on the effect of code obfuscation on the quality of java code.
Empirical Software Engineering, 20(6):1486–1524, 2015.
(doi:10.1007/s10664-014-9321-0)
- [46]
- T. Chaikalis and
A. Chatzigeorgiou.
Forecasting java software evolution trends employing network models.
IEEE Transactions on Software Engineering, 41(6):582–602, 2015.
(doi:10.1109/TSE.2014.2381249)
- [47]
- P. Chakraborty.
Fifty years of peephole optimization.
Current Science, 108(12):2186–2190, 2015.
- [48]
- R.-I.
Chang, T.-T. Wei, and C.-H. Wang.
A cost-effective key distribution of P2P IPTV DRM over opportunistic
multicast overlay for e-commerce systems.
Electronic Commerce Research, 15(1):49–71, 2015.
(doi:10.1007/s10660-015-9176-5)
- [49]
- H. Chanti, L. Thiry,
M. Hassenforder, E. Blanchard, and
P. Fromy.
Fire safety DSL based algebra.
In 3rd International Conference on Control, Engineering and Information
Technology, CEIT 2015. Institute of Electrical and Electronics
Engineers Inc., 2015.
(doi:10.1109/CEIT.2015.7233083)
- [50]
- F. Chauvel, H. Song,
N. Ferry, and F. Fleurey.
Evaluating robustness of cloud-based systems.
Journal of Cloud Computing, 4(1), 2015.
(doi:10.1186/s13677-015-0043-7)
- [51]
- M.K.
Chawla and I. Chhabra.
SQMMA: Software quality model for maintainability analysis.
In 8th ACM COMPUTE INDIA Conference, Compute 2015, volume
29-31-October-2015, pages 9–17. Association for Computing Machinery, 2015.
(doi:10.1145/2835043.2835062)
- [52]
- L. Chen, B. Fang,
Z. Shang, and Y. Tang.
Negative samples reduction in cross-company software defects prediction.
Information and Software Technology, 62(1):67–77, 2015.
(doi:10.1016/j.infsof.2015.01.014)
- [53]
- X. Chen, G. Sime,
C. Lutteroth, and G. Weber.
OAuthHub-a service for consolidating authentication services.
In 19th IEEE International Enterprise Distributed Object Computing
Conference Workshps and Demonstrations, EDOCW 2015, volume
2015-November, pages 201–210. Institute of Electrical and Electronics
Engineers Inc., 2015.
(doi:10.1109/EDOC.2015.36)
- [54]
- Y.C.
Cheng, J.-S. Jwo, and C.-T. Tsai.
A leading indicator of post-release defect density in refactoring-based
software maintenance — a case study.
International Computer Symposium, ICS 2014, 274:1815–1821, 2015.
(doi:10.3233/978-1-61499-484-8-1815)
- [55]
- N. Choi and J.A. Pruett.
The characteristics and motivations of library open source software developers:
An empirical study.
Library and Information Science Research, 37(2):109–117, 2015.
(doi:10.1016/j.lisr.2015.02.007)
- [56]
- C.Y.
Chong and S.P. Lee.
Analyzing maintainability and reliability of object-oriented software using
weighted complex network.
Journal of Systems and Software, 110:28–53, 2015.
(doi:10.1016/j.jss.2015.08.014)
- [57]
- S.R.
Choudhary, A. Gorla, and A. Orso.
Automated test input generation for android: Are we there yet?
In 30th IEEE/ACM International Conference on Automated Software
Engineering, ASE 2015, pages 429–440. Institute of Electrical and
Electronics Engineers Inc., 2015.
(doi:10.1109/ASE.2015.89)
- [58]
- T. Chusho and J. Xu.
Description and implementation of business logic for end-user-initiative
development.
14th International Conference on New Trends in Intelligent Software
Methodology, Tools, and Techniques, SoMeT 2015, 532:355–366, 2015.
(doi:10.1007/978-3-319-22689-7_27)
- [59]
- T. Chusho.
The classification of matching applications for end-user-initiative
development.
In International MultiConference of Engineers and Computer Scientists
2015, IMECS 2015, volume 1, pages 476–481. Newswood Limited,
2015.
- [60]
- T. Clark.
XPL: A language for modular homogeneous language embedding.
Science of Computer Programming, 98:589–616, 2015.
(doi:10.1016/j.scico.2014.08.005)
- [61]
- D.Ó. Coileáin and
D. O'Mahony.
Accounting and accountability in content distribution architectures: A
survey.
ACM Computing Surveys, 47(4), 2015.
(doi:10.1145/2723701)
- [62]
- Rod Cope.
Analyzing
content using abstractable interchangeable elements.
United States Patent 9,092,487, July 2015.
Assignee: OpenLogic, Inc. (Broomfield, CO).
- [63]
- V. Cosentino, J.L.C.
Izquierdo, and J. Cabot.
Gitana: A SQL-based Git repository inspector.
34th International Conference on Conceptual Modeling, ER 2015,
9381:329–343, 2015.
(doi:10.1007/978-3-319-25264-3_24)
- [64]
- A. Costa, A. Alfieri,
A. Matta, and S. Fichera.
A parallel tabu search for solving the primal buffer allocation problem in
serial production systems.
Computers and Operations Research, 64:97–112, 2015.
(doi:10.1016/j.cor.2015.05.013)
- [65]
- L.D.
Couto, P.W.V. Tran-Jorgensen, J.W. Coleman,
and K. Lausdahl.
Migrating to an extensible architecture for abstract syntax trees.
In 12th Working IEEE/IFIP Conference on Software Architecture, WICSA
2015, pages 145–154. Institute of Electrical and Electronics
Engineers Inc., 2015.
(doi:10.1109/WICSA.2015.10)
- [66]
- M. De Bayser, L.G. Azevedo,
and R. Cerqueira.
ResearchOps: The case for DevOps in scientific applications.
In 14th IFIP/IEEE International Symposium on Integrated Network
Management, IM 2015, pages 1398–1404. Institute of Electrical and
Electronics Engineers Inc., 2015.
(doi:10.1109/INM.2015.7140503)
- [67]
- S. De Kinderen and Q. Ma.
Requirements engineering for the design of conceptual modeling languages.
Applied Ontology, 10(1):7–24, 2015.
(doi:10.3233/AO-150139)
- [68]
- A. Decan, T. Mens,
M. Claes, and P. Grosjean.
On the development and distribution of r packages: An empirical analysis of
the r ecosystem.
In European Conference on Software Architecture Workshops, ECSAW
2015, volume 07-11-September-2015. Association for Computing
Machinery, 2015.
(doi:10.1145/2797433.2797476)
- [69]
- S. Delbruel, D. Frey, and
F. Taïani.
Decentralized view prediction for global content placement.
In 14th Workshop on Adaptive and Reflective Middleware, ARM 2015.
Association for Computing Machinery, Inc, 2015.
(doi:10.1145/2834965.2834974)
- [70]
- V.M. Deshmukh and G.R.
Bamnote.
An empirical evaluation of optimization parameters in XML parsing for
performance enhancement.
In IEEE International Conference on Computer, Communication and Control,
IC4 2015. Institute of Electrical and Electronics Engineers Inc.,
2015.
(doi:10.1109/IC4.2015.7375582)
- [71]
- V.M. Deshmukh and G.R.
Bamnote.
An empirical study of XML parsers across applications.
In 1st International Conference on Computing, Communication, Control and
Automation, ICCUBEA 2015, pages 396–401. Institute of Electrical and
Electronics Engineers Inc., 2015.
(doi:10.1109/ICCUBEA.2015.83)
- [72]
- G. Dèvai, D. Leskò,
and M. Tejfel.
The EDSL's struggle for their sources.
Lecture Notes in Computer Science (including subseries Lecture Notes in
Artificial Intelligence and Lecture Notes in Bioinformatics),
8606:300–335, 2015.
(doi:10.1007/978-3-319-15940-9_7)
- [73]
- D. Di Ruscio, D.S. Kolovos,
I. Korkontzelos, N. Matragkas, and
J.J. Vinju.
OSSMETER: A software measurement platform for automatically analysing open
source software projects.
In 10th Joint Meeting of the European Software Engineering Conference and
the ACM SIGSOFT Symposium on the Foundations of Software Engineering,
ESEC/FSE 2015, pages 970–973. Association for Computing Machinery,
Inc, 2015.
(doi:10.1145/2786805.2803186)
- [74]
- Q. Do,
B. Martini, and K.-K.R. Choo.
Exfiltrating data from Android devices.
Computers and Security, 48:74–91, 2015.
(doi:10.1016/j.cose.2014.10.016)
- [75]
- M. Dolores Gallego, S. Bueno,
F. José Racero, and J. Noyes.
Open source software: The effects of training on acceptance.
Computers in Human Behavior, 49:390–399, 2015.
(doi:10.1016/j.chb.2015.03.029)
- [76]
- R. Dyer,
H.A. Nguyen, H. Rajan, and T.N.
Nguyen.
Boa: Ultra-large-scale software repository and source-code mining.
ACM Transactions on Software Engineering and Methodology, 25(1),
2015.
(doi:10.1145/2803171)
- [77]
- F. Ebert, F. Castor, and
A. Serebrenik.
An exploratory study on exception handling bugs in Java programs.
Journal of Systems and Software, 106:82–101, 2015.
(doi:10.1016/j.jss.2015.04.066)
- [78]
- M. Ebrahimi and S.M.T.
Rouhani Rankoohi.
An ant-based approach to cluster peers in P2P database systems.
Knowledge and Information Systems, 43(1):219–247, 2015.
(doi:10.1007/s10115-014-0743-1)
- [79]
- Michael Eddington and Adam
Cecchetti.
Metaphor
based language fuzzing of computer code.
United States Patent 9,098,352, August 2015.
Assignee: DEJA VU SECURITY, LLC (Seattle, WA).
- [80]
- Z.J.
Estrada, C. Pham, F. Deng,
Z. Kalbarczyk, R.K. Iyer, and
L. Yan.
Dynamic VM dependability monitoring using hypervisor probes.
In 11th European Dependable Computing Conference, EDCC 2015, pages
61–72. Institute of Electrical and Electronics Engineers Inc., 2015.
(doi:10.1109/EDCC.2015.9)
- [81]
- Q. Fan,
H. Wang, G. Yin, and T. Wang.
Ranking open source software based on crowd wisdom.
In 6th IEEE International Conference on Software Engineering and Service
Science, ICSESS 2015, volume 2015-November, pages 966–972. IEEE
Computer Society, 2015.
(doi:10.1109/ICSESS.2015.7339215)
- [82]
- F. Felisberto, R. Laza,
F. Fdez-Riverola, and A. Pereira.
A distributed multiagent system architecture for body area networks applied to
healthcare monitoring.
BioMed Research International, 2015, 2015.
(doi:10.1155/2015/192454)
- [83]
- M.M.
Ferreira, K.A.M. Ferreira, and H.T.
Marques-Neto.
Mapping the potential change impact in object-oriented software.
In 30th Annual ACM Symposium on Applied Computing, SAC 2015,
volume 13-17-April-2015, pages 1654–1656. Association for Computing
Machinery, 2015.
(doi:10.1145/2695664.2696043)
- [84]
- Michael H.
Ficco.
Distributed
media-protection systems and methods to operate the same.
United States Patent 9,178,693, November 2015.
Assignee: The DIRECTV Group, Inc. (El Segundo, CA).
- [85]
- Michael H.
Ficco.
Distributed
media-aggregation systems and methods to operate the same.
United States Patent 9,225,761, December 2015.
Assignee: The DIRECTV Group, Inc. (El Segundo, CA).
- [86]
- F.F.
Filho, M.G. Perin, C. Treude,
S. Marczak, L. Melo, I.M.
da Silva, and L.B. dos Santos.
A study on the geographical distribution of Brazil's prestigious software
developers.
Journal of Internet Services and Applications, 6(1), 2015.
(doi:10.1186/s13174-015-0032-6)
- [87]
- E. Flores, A. Barrõn
Cedeño, L. Moreno, and P. Rosso.
Uncovering source code reuse in large-scale academic environments.
Computer Applications in Engineering Education, 23(3):383–390,
2015.
(doi:10.1002/cae.21608)
- [88]
- F.A.
Fontana, V. Ferme, M. Zanoni, and
A. Yamashita.
Automatic metric thresholds derivation for code smell detection.
In 6th International Workshop on Emerging Trends in Software Metrics,
WETSoM 2015, volume 2015-August, pages 44–53. IEEE Computer Society,
2015.
(doi:10.1109/WETSoM.2015.14)
- [89]
- X. Franch, R.S. Kenett,
A. Susi, N. Galanis, R. Glott,
and F. Mancinelli.
Community data for OSS adoption risk management.
The Art and Science of Analyzing Software Data, pages 377–409,
2015.
(doi:10.1016/B978-0-12-411519-4.00014-8)
- [90]
- O. Franco-Bedoya, D. Ameller,
D. Costal, and X. Franch.
Measuring the quality of open source software ecosystems using QuESo.
9th International Joint Conference on Software Technologies, ICSOFT
2014, 555:39–62, 2015.
(doi:10.1007/978-3-319-25579-8_3)
- [91]
- L. Fürst, M. Mernik, and
V. Mahnič.
Converting metamodels to graph grammars: doing without advanced graph grammar
features.
Software and Systems Modeling, 14(3):1297–1317, 2015.
(doi:10.1007/s10270-013-0380-2)
- [92]
- T. Galinac Grbac and
D. Huljenić.
On the probability distribution of faults in complex software systems.
Information and Software Technology, 58:250–258, 2015.
(doi:10.1016/j.infsof.2014.06.014)
- [93]
- M. Gatrell and S. Counsell.
The effect of refactoring on change and fault-proneness in commercial C#
software.
Science of Computer Programming, 102:44–56, 2015.
(doi:10.1016/j.scico.2014.12.002)
- [94]
- M. Gatrell, S. Counsell,
S. Swift, R.M. Hierons, and
X. Liu.
Test and production classes of an industrial C# system: A refactoring and
fault perspective.
In 41st Euromicro Conference on Software Engineering and Advanced
Applications, SEAA 2015, pages 35–38. Institute of Electrical and
Electronics Engineers Inc., 2015.
(doi:10.1109/SEAA.2015.40)
- [95]
- E. Gebennini, A. Grassi, and
C. Fantuzzi.
The two-machine one-buffer continuous time model with restart policy.
Annals of Operations Research, 231(1):33–64, 2015.
(doi:10.1007/s10479-013-1373-9)
- [96]
- S.M.
Ghanem, M.A. Ismail, and S.G. Omar.
VITAL: Structured and clustered super-peer network for similarity search.
Peer-to-Peer Networking and Applications, 8(6):965–991, 2015.
(doi:10.1007/s12083-014-0304-0)
- [97]
- A.H. Ghapanchi and M. Tavana.
A longitudinal study of the impact of open source software project
characteristics on positive outcomes.
Information Systems Management, 32(4):285–298, 2015.
(doi:10.1080/10580530.2015.1079999)
- [98]
- M. Gharehyazie, D. Posnett,
B. Vasilescu, and V. Filkov.
Developer initiation and social interactions in OSS: A case study of the
Apache software foundation.
Empirical Software Engineering, 20(5):1318–1353, 2015.
(doi:10.1007/s10664-014-9332-x)
- [99]
- Y. Gil, F. Michel,
V. Ratnakar, M. Hauder,
C. Duffy, H. Dugan, and
P. Hanson.
A task-centered framework for computationally-grounded science collaborations.
In 11th IEEE International Conference on eScience, eScience 2015,
pages 352–361. Institute of Electrical and Electronics Engineers Inc., 2015.
(doi:10.1109/eScience.2015.76)
- [100]
- Jr.
Girola, F. and J.L.V. Barbosa.
U-deal: A decentralized trail-aware model for business opportunities
identification.
IEEE Latin America Transactions, 13(5):1640–1648, 2015.
(doi:10.1109/TLA.2015.7112026)
- [101]
- G. Godena, T. Lukman,
M. Heričko, and S. Strmčnik.
The experience of implementing model-driven engineering tools in the process
control domain.
Information Technology and Control, 44(2):135–147, 2015.
(doi:10.5755/j01.itc.44.2.6258)
- [102]
- H. Groenda, S. Seifermann,
K. Müller, and G. Jaworek.
The cooperate assistive teamwork environment for software description
languages.
13th European Conference on the Advancement of Assistive Technology,
AAATE 2015, 217:111–118, 2015.
(doi:10.3233/978-1-61499-566-1-111)
- [103]
- L. Gui,
R. Shen, Y. Yu, D. Feng,
Y. Peng, and W. Liu.
DLG-hypertree: A low-diameter, server-centric datacenter network
architecture.
In 8th IEEE International Conference on Cloud Computing, CLOUD
2015, pages 1077–1080. Institute of Electrical and Electronics
Engineers Inc., 2015.
(doi:10.1109/CLOUD.2015.156)
- [104]
- O. Günalp, C. Escoffier,
and P. Lalanda.
Demo abstract: Reproducible deployment of pervasive applications.
In 13th IEEE International Conference on Pervasive Computing and
Communication, PerCom Workshops 2015, pages 211–213. Institute of
Electrical and Electronics Engineers Inc., 2015.
(doi:10.1109/PERCOMW.2015.7134025)
- [105]
- O. Günalp, C. Escoffier,
and P. Lalanda.
Rondo: A tool suite for continuous deployment in dynamic environments.
In IEEE International Conference on Services Computing, SCC 2015,
pages 720–727. Institute of Electrical and Electronics Engineers Inc., 2015.
(doi:10.1109/SCC.2015.102)
- [106]
- Satya V. Gupta and Prashant
Shenoy.
System
and methods for run time detection and correction of memory corruption.
United States Patent 8,966,312, February 2015.
Assignee: Virsec Systems, Inc. (Acton, MA).
- [107]
- N. Gupta, D. Singh, and
A. Sharma.
Identifying effective software metrics for categorical defect prediction using
structural equation modeling.
In 3rd International Symposium on Women in Computing and Informatics, WCI
2015, volume 10-13-August-2015, pages 59–65. Association for
Computing Machinery, 2015.
(doi:10.1145/2791405.2791484)
- [108]
- V. Gupta, N. Ganeshan, and
T.K. Singhal.
Determining the root causes of various software bugs throughsoftware metrics.
In 2nd International Conference on Computing for Sustainable Global
Development, INDIACom 2015, pages 1211–1215. Institute of Electrical
and Electronics Engineers Inc., 2015.
- [109]
- S. Hai-Jew.
Conducting semantic-based network analyses from social media data: Extracted
insights about the data leakage movement.
In Design Strategies and Innovations in Multimedia Presentations,
pages 369–427. IGI Global, 2015.
(doi:10.4018/978-1-4666-8696-0.ch011)
- [110]
- M.M.
Hall, C.B. Jones, and P. Smart.
Spatial natural language generation for location description in photo captions.
12th International Conference on Spatial Information Theory, COSIT
2015, 9368:196–223, 2015.
(doi:10.1007/978-3-319-23374-1_10)
- [111]
- M. Harari and D. Jobin.
International co-operation.
The OECD Convention on Bribery, pages 486–533, 2015.
(doi:10.1007/CBO9781139565332)
- [112]
- K. Haribabu and C. Hota.
Analysis of floating index caching technique for P2P overlay index
propagation.
In 16th International Conference on Distributed Computing and Networking,
ICDCN 2015, volume 04-07-January-2015. Association for Computing
Machinery, 2015.
(doi:10.1145/2684464.2684489)
- [113]
- T. Hartmann, A. Moawad,
F. Fouquet, G. Nain, J. Klein,
and Y. Le Traon.
Stream my models: Reactive peer-to-peer distributed models@run.time.
In 18th ACM/IEEE International Conference on Model Driven Engineering
Languages and Systems, MODELS 2015, pages 80–89. Institute of
Electrical and Electronics Engineers Inc., 2015.
(doi:10.1109/MODELS.2015.7338238)
- [114]
- John M. Harvey, Michael David
Atella, Thomas Francis Doyle, Loyie H. Sims,
III, and Satish N. Ram.
Digital
over-the-air keying system.
United States Patent 9,165,416, October 2015.
Assignee: OMNITRACS, LLC (Dallas, TX).
- [115]
- L. Hatton and G. Warr.
Protein structure and evolution: Are they constrained globally by a principle
derived from information theory?
PLoS ONE, 10(5), 2015.
(doi:10.1371/journal.pone.0125663)
- [116]
- P. He,
B. Li, X. Liu, J. Chen, and
Y. Ma.
An empirical study on software defect prediction with a simplified metric set.
Information and Software Technology, 59:170–190, 2015.
(doi:10.1016/j.infsof.2014.11.006)
- [117]
- A. Heikkinen, T. Koskela, and
M. Ylianttila.
Performance evaluation of distributed data delivery on mobile devices using
WebRTC.
In 11th International Wireless Communications and Mobile Computing
Conference, IWCMC 2015, pages 1036–1042. Institute of Electrical and
Electronics Engineers Inc., 2015.
(doi:10.1109/IWCMC.2015.7289225)
- [118]
- H. Heitkötter, H. Kuchen,
and T.A. Majchrzak.
Extending a model-driven cross-platform development approach for business apps.
Science of Computer Programming, 97(P1):31–36, 2015.
(doi:10.1016/j.scico.2013.11.013)
- [119]
- S.M.
Hemam and O. Hioual.
Load balancing by requests redistribution in failure nodes context.
In International Conference on Intelligent Information Processing,
Security and Advanced Communication, IPAC 2015, volume
23-25-November-2015. Association for Computing Machinery, 2015.
(doi:10.1145/2816839.2816847)
- [120]
- A. Hindle.
Green mining: a methodology of relating software change and configuration to
power consumption.
Empirical Software Engineering, 20(2):374–409, 2015.
(doi:10.1007/s10664-013-9276-6)
- [121]
- J. Hintsch, C. Gorling, and
K. Turowski.
Modularization of software as a service products: A case study of the
configuration management tool Puppet.
In 3rd International Conference on Enterprise Systems, ES 2015,
pages 184–191. Institute of Electrical and Electronics Engineers Inc., 2015.
(doi:10.1109/ES.2015.25)
- [122]
- B. Hoisl and S. Sobernig.
Consistency rules for uml-based domain-specific language models: A literature
review.
In 8th Joint International Workshop on Model-Based Architecting of
Cyber-Physical and Embedded Systems and 1st International Workshop on UML
Consistency Rules, ACES-MB 2015 and WUCOR 2015, volume 1508, pages
29–36. CEUR-WS, 2015.
- [123]
- D. Holstein, T.W. Cease, and
M.G. Seewald.
Application and management of cybersecurity measures for protection and
control.
In 7th International Conference on Cyber-Enabled Distributed Computing
and Knowledge Discovery, CyberC 2015, pages 76–83. Institute of
Electrical and Electronics Engineers Inc., 2015.
(doi:10.1109/CyberC.2015.80)
- [124]
- F.-M.
Huang, Y.H. Huang, C. Szu,
A.Y.S. Su, M.C. Chen, and Y.S.
Sun.
A study of a life logging smartphone app and its power consumption observation
in location-based service scenario.
In 3rd IEEE International Conference on Mobile Services, MS 2015,
pages 225–232. Institute of Electrical and Electronics Engineers Inc., 2015.
(doi:10.1109/MobServ.2015.40)
- [125]
- X. Huang, T. Zhao, and
Y. Cao.
PIR: A domain specific language for multimedia information retrieval.
In Web Design and Development: Concepts, Methodologies, Tools, and
Applications, volume 2-3, pages 748–771. IGI Global, 2015.
(doi:10.4018/978-1-4666-8619-9.ch035)
- [126]
- M.C. Huang.
Using SOA and web 2.0 in web service applications.
In International Conference on Network Security and Communication
Engineering, NSCE 2014, pages 339–342. CRC Press/Balkema, 2015.
- [127]
- A.-K. Hueske and E. Guenther.
What hampers innovation? External stakeholders, the organization, groups and
individuals: a systematic review of empirical barrier research.
Management Review Quarterly, 65(2):113–148, 2015.
(doi:10.1007/s11301-014-0109-5)
- [128]
- A.-K.
Hueske, J. Endrikat, and E. Guenther.
External environment, the innovating organization, and its individuals: A
multilevel model for identifying innovation barriers accounting for social
uncertainties.
Journal of Engineering and Technology Management - JET-M,
35:45–70, 2015.
(doi:10.1016/j.jengtecman.2014.10.001)
- [129]
- R. Jabangwe, J. Börstler,
and K. Petersen.
Handover of managerial responsibilities in global software development: a case
study of source code evolution and quality.
Software Quality Journal, 23(4):539–566, 2015.
(doi:10.1007/s11219-014-9247-1)
- [130]
- M. Jarke and C.R. Prause.
Gamification for enforcing coding conventions.
In 10th Joint Meeting of the European Software Engineering Conference and
the ACM SIGSOFT Symposium on the Foundations of Software Engineering,
ESEC/FSE 2015, pages 649–660. Association for Computing Machinery,
Inc, 2015.
(doi:10.1145/2786805.2786806)
- [131]
- K. Jezek and J. Ambroz.
Detecting incompatibilities concealed in duplicated software libraries.
In 41st Euromicro Conference on Software Engineering and Advanced
Applications, SEAA 2015, pages 233–240. Institute of Electrical and
Electronics Engineers Inc., 2015.
(doi:10.1109/SEAA.2015.17)
- [132]
- D. Jing
and H. Yang.
Creative computing for bespoke ideation.
In 2015 IEEE 39th Annual Computer Software and Applications Conference -
Stephen S. Yau Academic Symposium, COMPSAC 2015, volume 1, pages
34–43. IEEE Computer Society, 2015.
(doi:10.1109/COMPSAC.2015.203)
- [133]
- J.L.
Johnson, H. tom Wörden, and K. van Wijk.
PLACE: An open-source Python package for laboratory automation, control,
and experimentation.
Journal of Laboratory Automation, 20(1):10–16, 2015.
(doi:10.1177/2211068214553022)
- [134]
- R. Josephine Grace Rexilla and
P. Shanthi.
Optimizing cloud bandwidth and cost using content aware chunk prediction to
improve efficiency of retrieval.
Indian Journal of Science and Technology, 8(16), 2015.
(doi:10.17485/ijst/2015/v8i16/61966)
- [135]
- E. Jung.
A persistent web data architecture with named data networking.
Lecture Notes in Electrical Engineering, 373:153–158, 2015.
(doi:10.1007/978-981-10-0281-6_22)
- [136]
- M. Jureczko and L. Madeyski.
Cross-project defect prediction with respect to code ownership model: An
empirical study.
E-Informatica Software Engineering Journal, 9(1):21–35, 2015.
(doi:10.5277/e-Inf150102)
- [137]
- G.M.
Kapitsaki, N.D. Tselikas, and I.E. Foukarakis.
An insight into license tools for open source software systems.
Journal of Systems and Software, 102:72–87, 2015.
(doi:10.1016/j.jss.2014.12.050)
- [138]
- R. Karthika, M. Anandaraj,
and K.P. Vijayakumar.
Efficient content distribution mechanism in peer to peer networks.
International Journal of Applied Engineering Research,
10(49):334–339, 2015.
- [139]
- S. Karumanchi, J. Li, and
A. Squicciarini.
Securing resource discovery in content hosting networks.
Lecture Notes of the Institute for Computer Sciences, Social-Informatics
and Telecommunications Engineering, LNICST, 152:153–173, 2015.
(doi:10.1007/978-3-319-23829-6_12)
- [140]
- K. Kasemsap.
The role of e-business adoption in the business world.
Strategic Infrastructure Development for Economic Growth and Social
Change, pages 51–63, 2015.
(doi:10.4018/978-1-4666-7470-7.ch005)
- [141]
- Y. Kashiwabara, T. Ishio,
H. Hata, and K. Inoue.
Method verb recommendation using association rule mining in a set of existing
projects.
IEICE Transactions on Information and Systems, E98D(3):627–636,
2015.
(doi:10.1587/transinf.2014EDP7276)
- [142]
- A. Kaur,
K. Kaur, and H. Kaur.
An investigation of the accuracy of code and process metrics for defect
prediction of mobile applications.
In 4th International Conference on Reliability, Infocom Technologies and
Optimization, ICRITO 2015. Institute of Electrical and Electronics
Engineers Inc., 2015.
(doi:10.1109/ICRITO.2015.7359220)
- [143]
- A. Kaur,
K. Kaur, and K. Pathak.
A proposed new model for maintainability index of open source software.
In 2014 3rd International Conference on Reliability, Infocom Technologies
and Optimization, ICRITO 2014. Institute of Electrical and Electronics
Engineers Inc., 2015.
(doi:10.1109/ICRITO.2014.7014758)
- [144]
- S. Kaur, K. Kaur, and
N. Kaur.
An empirical investigation of relationship between software metrics.
In 2nd IEEE International Conference on Advances in Computing and
Communication Engineering, ICACCE 2015, pages 639–643. Institute of
Electrical and Electronics Engineers Inc., 2015.
(doi:10.1109/ICACCE.2015.23)
- [145]
- M. Kaya and S.A. Özel.
Integrating an online compiler and a plagiarism detection tool into the
Moodle distance education system for easy assessment of programming
assignments.
Computer Applications in Engineering Education, 23(3):363–373,
2015.
(doi:10.1002/cae.21606)
- [146]
- R. Kikas, M. Dumas, and
D. Pfahl.
Issue dynamics in github projects.
16th International Conference on Product-Focused Software Process
Improvement, PROFES 2015, 9459:295–310, 2015.
(doi:10.1007/978-3-319-26844-6_22)
- [147]
- Brendan Kitts, Brian Burdick,
Dyng Au, and Tyson Roberts.
Method
and system for automatically targeting ads to television media using
demographic similarity.
United States Patent 9,088,833, July 2015.
Assignee: LUCID COMMERCE, INC. (Seattle, WA).
- [148]
- Brendan Kitts, Brian Burdick,
Dyng Au, and Tyson Roberts.
Targeting
television ads using keywords.
United States Patent 9,161,099, October 2015.
Assignee: Lucid Commerce, Inc. (Seattle, WA).
- [149]
- L. Kong,
G. Bauer, and J. Hale.
Robust wireless signal indoor localization.
Concurrency Computation, 27(11):2839–2850, 2015.
(doi:10.1002/cpe.3443)
- [150]
- M. Konôpka and
M. Bieliková.
Software developer activity as a source for identifying hidden source code
dependencies.
41st International Conference on Current Trends in Theory and Practice of
Computer Science, SOFSEM 2015, 8939:449–462, 2015.
- [151]
- S.Y.
Kose and O. Kilincci.
Analyzing buffer allocations using utilization-based search methods.
In 45th International Conference on Computers and Industrial Engineering,
CIE 2015. Universite de Lorraine, 2015.
- [152]
- S.Y. Kose and O. Kilincci.
Hybrid approach for buffer allocation in open serial production lines.
Computers and Operations Research, 60:67–78A, 2015.
(doi:10.1016/j.cor.2015.01.009)
- [153]
- S.Y.
Köse, L. Demir, S. Tunal, and
D.T. Eliiyi.
Capacity improvement using simulation optimization approaches: A case study
in the thermotechnology industry.
Engineering Optimization, 47(2):149–164, 2015.
(doi:10.1080/0305215X.2013.875166)
- [154]
- B.T.S.
Kumar, D.V. Kumar, and K.R. Prithviraj.
Wayback machine: Reincarnation to vanished online citations.
Program, 49(2):205–223, 2015.
(doi:10.1108/PROG-07-2013-0039)
- [155]
- O.A.L.
Lemos, A.C. De Paula, H. Sajnani, and
C.V. Lopes.
Can the use of types and query expansion help improve large-scale code search?
In IEEE 15th International Working Conference on Source Code Analysis and
Manipulation, SCAM 2015, pages 41–50. Institute of Electrical and
Electronics Engineers Inc., 2015.
(doi:10.1109/SCAM.2015.7335400)
- [156]
- Abha Lessing, Christophe
Schnelle, Paul William Leslie, and
Geoffrey John Nolan.
MALTweb
multi-axis viewing interface and higher level scoping.
United States Patent 8,972,846, March 2015.
Assignee: Timebase Pty Limited (Sydney NSW, AU).
- [157]
- Abha Lessing, Christophe
Schnelle, and Peter Mariani.
Maltweb
multi-axis viewing interface and higher level scoping.
United States Patent 8,983,955, March 2015.
Assignee: Timebase PTY Limited (Sydney NSW, AU).
- [158]
- L. Li,
J. Wang, and Y. Hui.
ReliableTrust: Trust model based on professional knowledge node of local
knowledge for a reliable request.
Journal of Computational Information Systems, 11(18):6589–6596,
2015.
(doi:10.12733/jcis15354)
- [159]
- W. Li,
W. Guo, and E. Franzinelli.
Achieving dynamic workload balancing for P2P volunteer computing.
In 44th Annual Conference of the International Conference on Parallel
Processing Workshops, ICPPW 2015, volume 2015-January, pages 240–249.
Institute of Electrical and Electronics Engineers Inc., 2015.
(doi:10.1109/ICPPW.2015.34)
- [160]
- Y. Li,
Y. Cheng, V. Gligor, and
A. Perrig.
Establishing software-only root of trust on embedded systems: Facts and
fiction.
23rd International Workshop on Security Protocols, 2015,
9379:50–68, 2015.
(doi:10.1007/978-3-319-26096-9_7)
- [161]
- S.A.
Licorish, C.W. Lee, B.T.R. Savarimuthu,
P. Patel, and S.G. Macdonell.
They'll know it when they see it: Analyzing post-release feedback from the
Android community.
In 21st Americas Conference on Information Systems, AMCIS 2015.
Americas Conference on Information Systems, 2015.
- [162]
- J. Liebig, A. Janker,
F. Garbe, S. Apel, and
C. Lengauer.
Morpheus: Variability-aware refactoring in the wild.
In 37th IEEE/ACM International Conference on Software Engineering, ICSE
2015, volume 1, pages 380–391. IEEE Computer Society, 2015.
(doi:10.1109/ICSE.2015.57)
- [163]
- J. Lima,
C. Treude, F.F. Filho, and
U. Kulesza.
Assessing developer contribution with repository mining-based metrics.
In 31st IEEE International Conference on Software Maintenance and
Evolution, ICSME 2015, pages 536–540. Institute of Electrical and
Electronics Engineers Inc., 2015.
(doi:10.1109/ICSM.2015.7332509)
- [164]
- Z. Lin and J. Whitehead.
Why power laws? an explanation from fine-grained code changes.
In 12th Working Conference on Mining Software Repositories, MSR
2015, volume 2015-August, pages 68–75. IEEE Computer Society, 2015.
(doi:10.1109/MSR.2015.14)
- [165]
- J. Lin,
W.-T. Zhu, Q. Wang, N. Zhang,
J. Jing, and N. Gao.
RIKE+: Using revocable identities to support key escrow in public key
infrastructures with flexibility.
IET Information Security, 9(2):136–147, 2015.
(doi:10.1049/iet-ifs.2013.0552)
- [166]
- C.V.
Lopes and J. Ossher.
How scale affects structure in Java programs.
In 2015 ACM SIGPLAN International Conference on Object-Oriented
Programming, Systems, Languages, and Applications, OOPSLA 2015, volume
25-30-Oct-2015, pages 675–694. Association for Computing Machinery, 2015.
(doi:10.1145/2814270.2814300)
- [167]
- E. Loukis, Y. Charalabidis,
and A. Androutsopoulou.
Evaluating a passive social media citizensourcing innovation.
14th IFIP WG 8.5 International Conference on Electronic Government, EGOV
2015, 9248:305–320, 2015.
(doi:10.1007/978-3-319-22479-4_23)
- [168]
- L.E.
Lwakatare, P. Kuvaja, and M. Oivo.
Dimensions of devops.
16th International Conference on Agile Software Development, XP
2015, 212:212–217, 2015.
(doi:10.1007/978-3-319-18612-2_19)
- [169]
- H.J.
Macho, G. Robles, and J.M.
González-Barahona.
Evaluation of FLOSS by analyzing its software evolution: An example using
the moodle platform.
Journal of Information Technology Research, 8(1):62–81, 2015.
(doi:10.4018/JITR.2015010105)
- [170]
- L. Madeyski and M. Jureczko.
Which process metrics can significantly improve defect prediction models? an
empirical study.
Software Quality Journal, 23(3):393–422, 2015.
(doi:10.1007/s11219-014-9241-7)
- [171]
- R.K.
Mahapatra, R. Manzar, and V.S. Bhadauria.
Adoption and use of open source infrastructure software by large corporations:
The case of MySQL.
Journal of Database Management, 26(4):1–17, 2015.
(doi:10.4018/JDM.2015100101)
- [172]
- A. Malatras.
State-of-the-art survey on P2P overlay networks in pervasive computing
environments.
Journal of Network and Computer Applications, 55:1–23, 2015.
(doi:10.1016/j.jnca.2015.04.014)
- [173]
- R. Malhotra and A.J. Bansal.
Fault prediction considering threshold effects of object-oriented metrics.
Expert Systems, 32(2):203–219, 2015.
(doi:10.1111/exsy.12078)
- [174]
- R. Malhotra, A. Chug, and
P. Khosla.
Prioritization of classes for refactoring: A step towards improvement in
software quality.
In 3rd International Symposium on Women in Computing and Informatics, WCI
2015, volume 10-13-August-2015, pages 228–234. Association for
Computing Machinery, 2015.
(doi:10.1145/2791405.2791463)
- [175]
- M. Marchesi.
15 years of application of statistical physics methods to the study of software
systems.
In 6th International Workshop on Emerging Trends in Software Metrics,
WETSoM 2015, volume 2015-August, pages 1–2. IEEE Computer Society,
2015.
(doi:10.1109/WETSoM.2015.9)
- [176]
- J.E.
Marynowski, A.O. Santin, and A.R. Pimentel.
Method for testing the fault tolerance of MapReduce frameworks.
Computer Networks, 86:1–13, 2015.
(doi:10.1016/j.comnet.2015.04.009)
- [177]
- C. Mateos, M. Crasso,
A. Zunino, and J.L. Ordiales Coscia.
A stitch in time saves nine: Early improving code-first web services
discoverability.
International Journal of Cooperative Information Systems, 24(2),
2015.
(doi:10.1142/S0218843015500045)
- [178]
- P. Mayer, J. Velasco,
A. Klarl, R. Hennicker,
M. Puviani, F. Tiezzi,
R. Pugliese, J. Keznikl, and
T. Bureš.
The autonomic cloud.
Lecture Notes in Computer Science (including subseries Lecture Notes in
Artificial Intelligence and Lecture Notes in Bioinformatics),
8998:495–512, 2015.
- [179]
- F. Medeiros, C. Kästner,
M. Ribeiro, S. Nadi, and
R. Gheyi.
The love/hate relationship with the C preprocessor: An interview study.
In 29th European Conference on Object-Oriented Programming, ECOOP
2015, volume 37, pages 495–518. Schloss Dagstuhl- Leibniz-Zentrum fur
Informatik GmbH, Dagstuhl Publishing, 2015.
(doi:10.4230/LIPIcs.ECOOP.2015.495)
- [180]
- John D. Mehr, Elissa E. S.
Murphy, Navjot Virk, and Lara M. Sosnosky.
Hybrid
distributed and cloud backup architecture.
United States Patent 8,935,366, January 2015.
Assignee: Microsoft Corporation (Redmond, WA).
- [181]
- P. Mehta, J. Sharda, and
M.L. Das Maniklal.
Sqlshield: Preventing SQL injection attacks by modifying user input data.
11th International Conference on Information Systems Security, ICISS
2015, 9478:192–206, 2015.
(doi:10.1007/978-3-319-26961-0_12)
- [182]
- Archana Vidya Menon.
Method
and system for managing display of personalized advertisements in a user
interface (UI) of an on-screen interactive program (IPG).
United States Patent 9,106,942, August 2015.
- [183]
- M. Mesgari, C. Okoli,
M. Mehdi, F.Å. Nielsen, and
A. Lanamäki.
"the sum of all human knowledge": A systematic review of scholarly research
on the content of Wikipedia.
Journal of the Association for Information Science and Technology,
66(2):219–245, 2015.
(doi:10.1002/asi.23172)
- [184]
- F. Michel, V. Ratnakar,
Y. Gil, and M. Hauder.
A virtual crowdsourcing community for open collaboration in science processes.
In 21st Americas Conference on Information Systems, AMCIS 2015.
Americas Conference on Information Systems, 2015.
- [185]
- W. Mo,
B. Shen, Y. He, and H. Zhong.
GEMiner: Mining social and programming behaviors to identify experts in
GitHub.
In 7th Asia-Pacific Symposium on Internetware, Internetware 2015,
volume 06-November-2015, pages 93–101. Association for Computing Machinery,
2015.
(doi:10.1145/2875913.2875924)
- [186]
- A. Muñoz, M. Urueña,
R. Aparicio, and G. Rodrıguez De
Los Santos.
Digital wiretap warrant: Improving the security of ETSI lawful
interception.
Digital Investigation, 14:1–16, 2015.
(doi:10.1016/j.diin.2015.04.005)
- [187]
- S. Mukherjee.
Video Games and Storytelling: Reading Games and Playing Books.
Palgrave Macmillan, 2015.
(doi:10.1057/9781137525055)
- [188]
- E. Murphy-Hill,
T. Zimmermann, C. Bird, and
N. Nagappan.
The design space of bug fixes and how developers navigate it.
IEEE Transactions on Software Engineering, 41(1):65–81, 2015.
(doi:10.1109/TSE.2014.2357438)
- [189]
- Z. Mushtaq and G. Rasool.
Multilingual source code analysis: State of the art and challenges.
In 9th International Conference on Open Source Systems and Technologies,
ICOSST 2015, pages 170–175. Institute of Electrical and Electronics
Engineers Inc., 2015.
(doi:10.1109/ICOSST.2015.7396422)
- [190]
- N. Nahas and M. Nourelfath.
Buffer allocation, machine selection and preventive maintenance optimization in
unreliable production lines.
In International Conference on Industrial Engineering and Systems
Management, IEEE IESM 2015, pages 1028–1033. Institute of Electrical
and Electronics Engineers Inc., 2015.
(doi:10.1109/IESM.2015.7380281)
- [191]
- K.L. Narasimhamu,
V. Venugopal Reddy, and C.S. Rao.
Optimization of buffer allocation in manufacturing system using particle swarm
optimization.
International Review on Modelling and Simulations, 8(2):212–222,
2015.
- [192]
- D.M.C. Nascimento,
R. Almeida Bittencourt, and C. Chavez.
Open source projects in software engineering education: a mapping study.
Computer Science Education, 25(1):67–114, 2015.
(doi:10.1080/08993408.2015.1033159)
- [193]
- S. Naval, V. Laxmi,
M. Rajarajan, M.S. Gaur, and
M. Conti.
Employing program semantics for malware detection.
IEEE Transactions on Information Forensics and Security,
10(12):2591–2604, 2015.
(doi:10.1109/TIFS.2015.2469253)
- [194]
- A. Nazarov.
Can you afford to ignore open source software?
In 36th Hydrology and Water Resources Symposium: The Art and Science of
Water, HWRS 2015, pages 1404–1412. Engineers Australia, 2015.
- [195]
- D.T.
Nguyen, Q.B. Duong, E. Zamai, and
M.K. Shahzad.
Fault diagnosis for the complex manufacturing system.
Proceedings of the Institution of Mechanical Engineers, Part O: Journal
of Risk and Reliability, 230(2):178–194, 2015.
(doi:10.1177/1748006X15623089)
- [196]
- Jian
Ni and Jie Lin.
Two-level
structured overlay design for cluster management in a peer-to-peer
network.
United States Patent 9,026,628, May 2015.
Assignee: Xerox Corporation (Norwalk, CT).
- [197]
- Jian
Ni, Jie Lin, Steven J. Harrington, and
Naveen Sharma.
Two-level
structured overlay design for cluster management in a peer-to-peer
network.
United States Patent 9,015,342, April 2015.
Assignee: Xerox Corporation (Norwalk, CT).
- [198]
- A.L.
Nicolini, A.G. Maguitman, and C.I.
Chesñevar.
ArgP2P: An argumentative approach for intelligent query routing in P2P
networks.
3rd International Workshop on Theory and Applications of Formal
Argumentation, TAFA 2015, 9524:194–210, 2015.
(doi:10.1007/978-3-319-28460-6_12)
- [199]
- H. Oumarou, N. Anquetil,
A. Etien, S. Ducasse, and K.D.
Taiwe.
Identifying the exact fixing actions of static rule violation.
In 22nd IEEE International Conference on Software Analysis, Evolution,
and Reengineering, SANER 2015, pages 371–379. Institute of Electrical
and Electronics Engineers Inc., 2015.
(doi:10.1109/SANER.2015.7081847)
- [200]
- Raymond E. Ozzie, Jack E.
Ozzie, George P. Moromisato, Paresh S. Suthar,
Raman Narayanan, and Matthew S. Augustine.
Data
synchronization and sharing relationships.
United States Patent 9,203,786, December 2015.
Assignee: Microsoft Technology Licensing, LLC (Redmond, WA).
- [201]
- J. Pan.
Data leakage triage: Quantitative measure of effectiveness of containment
plan.
International Journal of Information and Computer Security,
7(2-4):240–254, 2015.
(doi:10.1504/IJICS.2015.073032)
- [202]
- T. Peng, C.-H. Chi,
A. Chiasera, G. Armellin,
M. Ronchetti, and C. Matteotti.
Modeling and composition of environment-as-a-service.
In IEEE International Conference on Services Computing, SCC 2015,
pages 443–450. Institute of Electrical and Electronics Engineers Inc., 2015.
(doi:10.1109/SCC.2015.67)
- [203]
- Adrian Perrig, Pradeep
Khosla, Arvind Seshadri, Mark Luk, and
Leendert van Doorn.
Verifying
integrity and guaranteeing execution of code on untrusted computer
platform.
United States Patent 9,177,153, November 2015.
Assignee: Carnegie Mellon University (Pittsburg, PA).
- [204]
- A. Pescador, A. Garmendia,
E. Guerra, J.S. Sánchez Cuadrado, and
J. De Lara.
Pattern-based development of domain-specific modelling languages.
In 18th ACM/IEEE International Conference on Model Driven Engineering
Languages and Systems, MODELS 2015, pages 166–175. Institute of
Electrical and Electronics Engineers Inc., 2015.
(doi:10.1109/MODELS.2015.7338247)
- [205]
- I. Polato, D. Barbosa,
A. Hindle, and F. Kon.
Hadoop branching: Architectural impacts on energy and performance.
In 6th International Green and Sustainable Computing Conference, IGSC
2015. Institute of Electrical and Electronics Engineers Inc., 2015.
(doi:10.1109/IGCC.2015.7393709)
- [206]
- P. Priller, W. Gruber,
N. Olberding, and D. Peinsipp.
Towards perfectly scalable real-time systems.
International Conference on Computer Safety, Reliability, and Securitym,
SAFECOMP 2015 and held 3rd International Workshop on Assurance Cases for
Software-Intensive Systems ASSURE 2015, Workshop on Dependable Embedded and
Cyber-Physical Systems and Systems-of-Systems, DECSoS 2015, 2nd International
Workshop on the Integration of Safety and Security Engineering, ISSE 2015,
Workshop on Reliability and Security Aspects for Critical Infrastructure
Protection, ReSA4CI 2015, and 4th InternationalWorkshop on NextGeneration of
System Assurance Approaches for Safety-Critical Systems SASSUR, 2015,
9338:212–223, 2015.
(doi:10.1007/978-3-319-24249-1_19)
- [207]
- D. Qiu,
S. Wang, and D. Xu.
Application of cache in P2P systems.
In Proceedings - 2015 IEEE 12th International Conference on Ubiquitous
Intelligence and Computing, 2015 IEEE 12th International Conference on
Advanced and Trusted Computing, 2015 IEEE 15th International Conference on
Scalable Computing and Communications, 2015 IEEE International Conference on
Cloud and Big Data Computing, 2015 IEEE International Conference on Internet
of People and Associated Symposia/Workshops, UIC-ATC-ScalCom-CBDCom-IoP
2015, pages 1461–1465. Institute of Electrical and Electronics
Engineers Inc., 2015.
(doi:10.1109/UIC-ATC-ScalCom-CBDCom-IoP.2015.263)
- [208]
- Y. Qiu,
W. Zhang, W. Zou, J. Liu, and
Q. Liu.
An empirical study of developer quality.
In IEEE International Conference on Software Quality, Reliability and
Security-Companion, QRS-C 2015, pages 202–209. Institute of
Electrical and Electronics Engineers Inc., 2015.
(doi:10.1109/QRS-C.2015.33)
- [209]
- Y. Qu,
X. Guan, Q. Zheng, T. Liu,
L. Wang, Y. Hou, and Z. Yang.
Exploring community structure of software call graph and its applications in
class cohesion measurement.
Journal of Systems and Software, 108:193–210, 2015.
(doi:10.1016/j.jss.2015.06.015)
- [210]
- Y. Radziwill.
Cyber-attacks and the exploitable imperfections of international
law.
Brill, 2015.
(doi:10.1163/9789004298309)
- [211]
- G.M. Rama
and A. Kak.
Some structural measures of API usability.
Software - Practice and Experience, 45(1):75–110, 2015.
(doi:10.1002/spe.2215)
- [212]
- L. Ramanathan and S.K. Iyer.
A qualitative study on the adoption of open source software in information
technology outsourcing organizations.
11th IFIP WG 2.13 International Conference on Open Source Systems, OSS
2015, 451:103–113, 2015.
(doi:10.1007/978-3-319-17837-0_10)
- [213]
- L. Ramanathan and
S. Krishnan.
An empirical investigation into the adoption of open source software in
information technology outsourcing organizations.
Journal of Systems and Information Technology, 17(2):167–192,
2015.
(doi:10.1108/JSIT-10-2014-0070)
- [214]
- Kumar Rangarajan, Jonathan M.
Sanders, and Tanuj Vohra.
Error
detection on the stack.
United States Patent 9,183,114, November 2015.
Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION (Armonk, NY).
- [215]
- J. Rasley, E. Gessiou,
T. Ohmann, Y. Brun,
S. Krishnamurthi, and J. Cappos.
Detecting latent cross-platform API violations.
In 26th IEEE International Symposium on Software Reliability Engineering,
ISSRE 2015, pages 484–495. Institute of Electrical and Electronics
Engineers Inc., 2015.
(doi:10.1109/ISSRE.2015.7381841)
- [216]
- A. Rastogi.
Contributor's performance, participation intentions, its influencers and
project performance.
In 37th IEEE/ACM International Conference on Software Engineering, ICSE
2015, volume 2, pages 919–922. IEEE Computer Society, 2015.
(doi:10.1109/ICSE.2015.292)
- [217]
- B.R.
Reddy, S. Khurana, and A. Ojha.
Software maintainability estimation made easy — a comprehensive tool COIN.
In 6th International Conference on Computer and Communication Technology,
ICCCT 2015, volume 25-27-September-2015, pages 68–72. Association for
Computing Machinery, 2015.
(doi:10.1145/2818567.2818580)
- [218]
- H. Ren,
W. Mo, G. Zhao, D. Ren, and
S. Liu.
Breadth first search based cosine software code framework automation algorithm.
In ASME 2015 Power Conference, POWER 2015, collocated with the ASME 2015
9th International Conference on Energy Sustainability, the ASME 2015 13th
International Conference on Fuel Cell Science, Engineering and Technology,
and the ASME 2015 Nuclear Forum, volume 2015-January. American Society
of Mechanical Engineers (ASME), 2015.
(doi:10.1115/POWER201549855)
- [219]
- R. Robbes,
D. Röthlisberger, and É. Tanter.
Object-oriented software extensions in practice.
Empirical Software Engineering, 20(3):745–782, 2015.
(doi:10.1007/s10664-013-9298-0)
- [220]
- W.N.
Robinson and T. Deng.
Data mining behavioral transitions in open source repositories.
In 48th Annual Hawaii International Conference on System Sciences, HICSS
2015, volume 2015-March, pages 5280–5289. IEEE Computer Society,
2015.
(doi:10.1109/HICSS.2015.622)
- [221]
- M. Rodrıguez,
O. Pedreira, and C.M. Fernández.
Certification of the maintainability of software product. a case study.
In XI Jornadas Iberoamericanas de Ingenieria de Software e Ingenieria del
Conocimiento, JIISIC 2015 - 11th Ibero-American Conference on Software
Engineering and Knowledge Engineering, JIISIC 2015, pages 93–105.
Escuela Superior Politecnica de Chimborazo, 2015.
- [222]
- M. Rodriguez, M. Piattini,
and C.M. Fernandez.
A hard look at software quality: Pilot program uses ISO/IEC 25000 family
to evaluate, improve and certify software products.
Quality Progress, 48(9):30–36, 2015.
- [223]
- Anthony
Rose.
Filter
for a distributed network.
United States Patent 9,098,683, August 2015.
Assignee: Global File Systems Holdings, LLC (Sherman Oaks, CA).
- [224]
- J. Ruan,
T. Samatsu, and Y. Shi.
A similarity-based M(1,2,3) approach and its application in rating the
security of network systems.
International Journal of Innovative Computing, Information and
Control, 11(6):2177–2191, 2015.
- [225]
- J. Ruohonen, S. Hyrynsalmi,
and V. Leppänen.
Exploring the stability of software with time-series cross-sectional data.
In 2nd International Workshop on Software Architecture and Metrics, SAM
2015, pages 41–47. Institute of Electrical and Electronics Engineers
Inc., 2015.
(doi:10.1109/SAM.2015.13)
- [226]
- J. Ruohonen, S. Hyrynsalmi,
and V. Leppänen.
Software evolution and time series volatility: An empirical exploration.
In 14th International Workshop on Principles of Software Evolution, IWPSE
2015, volume 30-Aug-2015, pages 56–65. Institute of Electrical and
Electronics Engineers Inc., 2015.
(doi:10.1145/2804360.2804367)
- [227]
- A. Safarkhanlou, A. Souri,
M. Norouzi, and S.E.H. Sardroud.
Formalizing and verification of an antivirus protection service using model
checking.
In 3rd International Conference on Recent Trends in Computing, ICRTC
2015, volume 57, pages 1324–1331. Elsevier, 2015.
(doi:10.1016/j.procs.2015.07.443)
- [228]
- Jonathan Salz and Richard S.
Tibbetts.
Stream
processor with compiled programs.
United States Patent 9,038,041, May 2015.
Assignee: TIBCO Software, Inc. (Palo Alto, CA).
- [229]
- B.T. Sampath Kumar and K.R.
Prithviraj.
Bringing life to dead: Role of Wayback Machine in retrieving vanished
URLs.
Journal of Information Science, 41(1):71–81, 2015.
(doi:10.1177/0165551514552752)
- [230]
- C. Sanders, A. Shah, and
S. Zhang.
Comprehensive analysis of the Android google play's auto-update policy.
11th International Conference on Information Security Practice and
Experience, ISPEC 2015, 9065:365–377, 2015.
(doi:10.1007/978-3-319-17533-1_25)
- [231]
- H. Santos, J.F. Pimentel,
V. Torres Da Silva, and L. Murta.
Software rejuvenation via a multi-agent approach.
Journal of Systems and Software, 104:41–59, 2015.
(doi:10.1016/j.jss.2015.02.017)
- [232]
- B.F.D. Santos Neto,
M. Ribeiro, V.T. Da Silva,
C. Braga, C.J.P. De Lucena, and
E. De Barros Costa.
AutoRefactoring: A platform to build refactoring agents.
Expert Systems with Applications, 42(3):1652–1664, 2015.
(doi:10.1016/j.eswa.2014.09.022)
- [233]
- M. Savić and
M. Ivanović.
Validation of static program analysis tools by self-application: A case
study.
In 4th Workshop on Software Quality Analysis, Monitoring, Improvement,
and Applications, SQAMIA 2015, volume 1375, pages 61–68. CEUR-WS,
2015.
- [234]
- D. Schall.
Social Network-Based Recommender Systems.
Springer International Publishing, 2015.
(doi:10.1007/978-3-319-22735-1)
- [235]
- U. Segundo,
J. López-Cuadrado, L. Aldamiz-Echevarria,
T.A. Pérez, D. Buenestado,
A. Iruetaguena, R. Barrena, and
J.M. Pikatza.
Automatic construction of fuzzy inference systems for computerized clinical
guidelines and protocols.
Applied Soft Computing Journal, 26:257–269, 2015.
(doi:10.1016/j.asoc.2014.09.045)
- [236]
- N. Senthil Madasamy and
T. Revathi.
Secure concurrent communication predicament with solutions in peer-to-peer
network.
ARPN Journal of Engineering and Applied Sciences,
10(9):4097–4104, 2015.
- [237]
- N. Shah.
Sluts 'r' us: Intersections of gender, protocol and agency in the digital
age.
First Monday, 20(4), 2015.
(doi:10.5210/fm.v20i4.5463)
- [238]
- Behzad Shahraray, Andrea
Basso, Lee Begeja, David C. Gibbon,
Zhu Liu, and Bernard S. Renger.
System
and method for adaptive playback based on destination.
United States Patent 9,026,555, May 2015.
Assignee: AT&T Intellectual Property I, L.P. (Atlanta, GA).
- [239]
- R. Shatnawi.
Deriving metrics thresholds using log transformation.
Journal of Software: Evolution and Process, 27(2):95–113, 2015.
(doi:10.1002/smr.1702)
- [240]
- E. Shaw,
A. Shaw, and D. Umphress.
Mining Android apps to predict market ratings.
In 2014 6th International Conference on Mobile Computing, Applications
and Services, MobiCASE 2014, pages 166–167. Institute of Electrical
and Electronics Engineers Inc., 2015.
(doi:10.4108/icst.mobicase.2014.257773)
- [241]
- W. Shi and A. Afanasyev.
RepoSync: Combined action-based and data-based synchronization model in
named data network.
In IEEE Conference on Computer Communications Workshops, INFOCOM WKSHPS
2015, volume 2015-August, pages 275–280. Institute of Electrical and
Electronics Engineers Inc., 2015.
(doi:10.1109/INFCOMW.2015.7179397)
- [242]
- R.G.
Shirey, K.M. Hopkinson, K.E. Stewart,
D.D. Hodson, and B.J. Borghetti.
Analysis of implementations to secure git for use as an encrypted distributed
version control system.
In 48th Annual Hawaii International Conference on System Sciences, HICSS
2015, volume 2015-March, pages 5310–5319. IEEE Computer Society,
2015.
(doi:10.1109/HICSS.2015.625)
- [243]
- Stylianos Sidiroglou,
Angelos D. Keromytis, and Salvatore J. Stolfo.
Systems,
methods, and media protecting a digital data processing device from
attack.
United States Patent 9,143,518, September 2015.
Assignee: The Trustees of Columbia University in the City of New York (New
York, NY).
- [244]
- I. Sila.
The state of empirical research on the adoption and diffusion of
business-to-business e-commerce.
International Journal of Electronic Business, 12(3):258–301,
2015.
(doi:10.1504/IJEB.2015.071386)
- [245]
- L.H.
Silva, M. Ramos, M.T. Valente,
A. Bergel, and N. Anquetil.
Does JavaScript software embrace classes?
In 22nd IEEE International Conference on Software Analysis, Evolution,
and Reengineering, SANER 2015, pages 73–82. Institute of Electrical
and Electronics Engineers Inc., 2015.
(doi:10.1109/SANER.2015.7081817)
- [246]
- J. Smeds, K. Nybom, and
I. Porres.
DevOps: A definition and perceived adoption impediments.
16th International Conference on Agile Software Development, XP
2015, 212:166–177, 2015.
(doi:10.1007/978-3-319-18612-2_14)
- [247]
- J.M.G. Smith.
Optimal workload allocation in closed queueing networks with state dependent
queues.
Annals of Operations Research, 231(1):157–183, 2015.
(doi:10.1007/s10479-013-1418-0)
- [248]
- Q.D.
Soetens, J. Pérez, S. Demeyer, and
A. Zaidman.
Circumventing refactoring masking using fine-grained change recording.
In 14th International Workshop on Principles of Software Evolution, IWPSE
2015, volume 30-Aug-2015, pages 9–18. Institute of Electrical and
Electronics Engineers Inc., 2015.
(doi:10.1145/2804360.2804362)
- [249]
- A. Sotelo and S. Takahashi.
GOLD: A graph oriented language implemented using the eclipse xtext
framework.
In Eclipse Technology eXchange Workshop, ETX 2015, pages 19–24.
Association for Computing Machinery, Inc, 2015.
(doi:10.1145/2846650.2846653)
- [250]
- O. Stecklina,
P. Langendörfer, F. Vater,
T. Kranz, and G. Leander.
Intrinsic code attestation by instruction chaining for embedded devices.
11th International Conference Security and Privacy in Communication
Networks, SecureComm 2015, 164:97–115, 2015.
(doi:10.1007/978-3-319-28865-9_6)
- [251]
- Salvatore J. Stolfo,
Angelos D. Keromytis, Brian M. Bowen,
Shlomo Hershkop, Vasileios P. Kemerlis,
Pratap V. Prabhu, and Malek Ben Salem.
Methods,
systems, and media for baiting inside attackers.
United States Patent 9,009,829, April 2015.
Assignee: The Trustees of Columbia University in the City of New York (New
York, NY).
- [252]
- J.T.
Stroud and K.J. Feeley.
Responsible academia: Optimizing conference locations to minimize greenhouse
gas emissions.
Ecography, 38(4):402–404, 2015.
(doi:10.1111/ecog.01366)
- [253]
- V. Suganthi and S. Duraisamy.
An efficient method for quality estimation in open sourcesoftware using
improved particle swarm optimization.
International Journal of Applied Engineering Research,
10(1):1791–1806, 2015.
- [254]
- B. Suri and S. Singhal.
Investigating the OO characteristics of software using CKJM metrics.
In 4th International Conference on Reliability, Infocom Technologies and
Optimization, ICRITO 2015. Institute of Electrical and Electronics
Engineers Inc., 2015.
(doi:10.1109/ICRITO.2015.7359254)
- [255]
- G. Szoke, C. Nagy,
P. Hegedus, R. Ferenc, and
T. Gyimothy.
Do automatic refactorings improve maintainability? an industrial case study.
In 31st IEEE International Conference on Software Maintenance and
Evolution, ICSME 2015, pages 429–438. Institute of Electrical and
Electronics Engineers Inc., 2015.
(doi:10.1109/ICSM.2015.7332494)
- [256]
- K. Tabata, H. Tanno, and
M. Oinuma.
Helping testers by fault-prone functionality prediction.
In 10th Asia-Pacific Symposium on Information and Telecommunication
Technologies, APSITT 2015, pages 94–96. Institute of Electrical and
Electronics Engineers Inc., 2015.
(doi:10.1109/APSITT.2015.7217084)
- [257]
- M. Teixeira, R. Ribeiro,
M. Barbosa, F. Enembreck, and
R. Massa.
A modeling architecture for the orchestration of service components in factory
automation.
In 20th IEEE International Conference on Emerging Technologies and
Factory Automation, ETFA 2015, volume 2015-October. Institute of
Electrical and Electronics Engineers Inc., 2015.
(doi:10.1109/ETFA.2015.7301446)
- [258]
- J. Teixeira.
On the openness of digital platforms/ecosystems.
In 11th International Symposium on Open Collaboration, OPENSYM
2015. Association for Computing Machinery, Inc, 2015.
(doi:10.1145/2788993.2789829)
- [259]
- Y. Tian,
M. Nagappan, D. Lo, and A.E.
Hassan.
What are the characteristics of high-rated apps? a case study on free Android
applications.
In 31st IEEE International Conference on Software Maintenance and
Evolution, ICSME 2015, pages 301–310. Institute of Electrical and
Electronics Engineers Inc., 2015.
(doi:10.1109/ICSM.2015.7332476)
- [260]
- J.-P.
Tolvanen, V. Djukić, and A. Popovic.
Metamodeling for medical devices: Code generation, model-debugging and
run-time synchronization.
In 6th International Conference on Emerging Ubiquitous Systems and
Pervasive Networks, EUSPN 2015, volume 63, pages 539–544. Elsevier,
2015.
(doi:10.1016/j.procs.2015.08.382)
- [261]
- H.M. Tran and
J. Schönwälder.
DisCaRia — distributed case-based reasoning system for fault management.
IEEE Transactions on Network and Service Management,
12(4):540–553, 2015.
(doi:10.1109/TNSM.2015.2496224)
- [262]
- H. Uchimiya, S. Ogata, and
K. Kaijiri.
Method mining in experimental software engineering.
In 2014 2nd International Conference on Systems and Informatics, ICSAI
2014, pages 1012–1016. Institute of Electrical and Electronics
Engineers Inc., 2015.
(doi:10.1109/ICSAI.2014.7009433)
- [263]
- B. Urban and B.C. Greyling.
Open source software adoption and links to innovation performance.
International Journal of Technological Learning, Innovation and
Development, 7(3):261–278, 2015.
(doi:10.1504/IJTLID.2015.070379)
- [264]
- G. Vale and E. Figueiredo.
A method to derive metric thresholds for software product lines.
In 29th Brazilian Symposium on Software Engineering, SBES 2015,
pages 110–119. Institute of Electrical and Electronics Engineers Inc., 2015.
(doi:10.1109/SBES.2015.9)
- [265]
- G. Vale,
D. Albuquerque, E. Figueiredo, and
A. Garcia.
Defining metric thresholds for software product lines: A comparative study.
In 19th International Software Product Line Conference, SPLC 2015,
volume 20-24-July-2015, pages 176–185. Association for Computing Machinery,
2015.
(doi:10.1145/2791060.2791078)
- [266]
- T. Van Der Storm and J.J.
Vinju.
Towards multilingual programming environments.
Science of Computer Programming, 97(P1):143–149, 2015.
(doi:10.1016/j.scico.2013.11.041)
- [267]
- E. Vasilomanolakis,
S. Karuppayah, M. Muhlhauser, and
M. Fischer.
Taxonomy and survey of collaborative intrusion detection.
ACM Computing Surveys, 47(4), 2015.
(doi:10.1145/2716260)
- [268]
- D. Villatoro, G. Andrighetto,
R. Conte, and J. Sabater-Mir.
Self-policing through norm internalization: A cognitive solution to the
tragedy of the digital commons in social networks.
JASSS, 18(2):1–28, 2015.
- [269]
- C. Vitolo, Y. Elkhatib,
D. Reusser, C.J.A. Macleod, and
W. Buytaert.
Web technologies for environmental big data.
Environmental Modelling and Software, 63:185–198, 2015.
(doi:10.1016/j.envsoft.2014.10.007)
- [270]
- T. Voigt, S. Flad, and
P. Struss.
Model-based fault localization in bottling plants.
Advanced Engineering Informatics, 29(1):101–114, 2015.
(doi:10.1016/j.aei.2014.09.007)
- [271]
- S. Wagner, A. Goeb,
L. Heinemann, M. Kläs,
C. Lampasona, K. Lochmann,
A. Mayr, R. Plösch,
A. Seidl, J. Streit, and
A. Trendowicz.
Operationalised product quality models and assessment: The Quamoco
approach.
Information and Software Technology, 62(1):101–123, 2015.
(doi:10.1016/j.infsof.2015.02.009)
- [272]
- W. Wang,
B. Li, and P. He.
An analysis of the evolution of developers' role in open-source software
community.
Complex Systems and Complexity Science, 12(1):1–7, 2015.
(doi:10.13306/j.1672-3813.2015.01.001)
- [273]
- W. Wang, N. Niu,
H. Liu, and Y. Wu.
Tagging in assisted tracing.
In 8th IEEE/ACM International Symposium on Software and Systems
Traceability, SST 2015, pages 8–14. Institute of Electrical and
Electronics Engineers Inc., 2015.
(doi:10.1109/SST.2015.9)
- [274]
- W. Wang, G. Poo-Caamaño,
E. Wilde, and D.M. German.
What is the GIST? understanding the use of public gists on GitHub.
In 12th Working Conference on Mining Software Repositories, MSR
2015, volume 2015-August, pages 314–323. IEEE Computer Society, 2015.
(doi:10.1109/MSR.2015.36)
- [275]
- X. Wang, N.L. Or,
Z. Lu, and D. Pao.
Hardware accelerator to detect multi-segment virus patterns.
Computer Journal, 58(10):2443–2460, 2015.
(doi:10.1093/comjnl/bxu079)
- [276]
- M. Waterman, J. Noble, and
G. Allan.
How much up-front? a grounded theory of agile architecture.
In 37th IEEE/ACM International Conference on Software Engineering, ICSE
2015, volume 1, pages 347–357. IEEE Computer Society, 2015.
(doi:10.1109/ICSE.2015.54)
- [277]
- S. Weiss and R. Stolletz.
Buffer allocation in stochastic flow lines via sample-based optimization with
initial bounds.
OR Spectrum, 37(4):869–902, 2015.
(doi:10.1007/s00291-015-0393-z)
- [278]
- Daniel Willis and Gordon
Freedman.
Method
and system supporting audited reporting of advertising impressions from video
games.
United States Patent 9,180,369, November 2015.
Assignee: Google Inc. (Mountain View, CA).
- [279]
- T.-Y. Wu,
J.-S. Pan, C.-M. Chen, and C.-W.
Lin.
Towards SQL injection attacks detection mechanism using parse tree.
8th International Conference on Genetic and Evolutionary Computing, ICGEC
2014, 329:371–380, 2015.
(doi:10.1007/978-3-319-12286-1_38)
- [280]
- B. Wulff, A. Wilson,
B. Jost, and M. Ketterl.
An adopter centric API and visual programming interface for the definition of
strategies for automated camera tracking.
In 17th IEEE International Symposium on Multimedia, ISM 2015,
pages 587–592. Institute of Electrical and Electronics Engineers Inc., 2015.
(doi:10.1109/ISM.2015.106)
- [281]
- B. Xu and
D. Li.
An empirical study of the motivations for content contribution and community
participation in Wikipedia.
Information and Management, 52(3):275–286, 2015.
(doi:10.1016/j.im.2014.12.003)
- [282]
- L. Yang
and C.L. Henry.
How ARL academic libraries present open web resources — a proposed solution
to address discoverability.
Journal of Academic Librarianship, 41(5):629–635, 2015.
(doi:10.1016/j.acalib.2015.06.018)
- [283]
- V. Zaytsev.
Taxonomy of flexible linguistic commitments.
In 1st Workshop on Flexible Model Driven Engineering, FlexMDE 2015 -
co-located with ACM/IEEE 18th International Conference on Model Driven
Engineering Languages and Systems, MoDELS 2015, volume 1470, pages
42–50. CEUR-WS, 2015.
- [284]
- Y. Zhao
and S.S.M. Chow.
Privacy preserving collaborative filtering from asymmetric randomized encoding.
19th International Conference on Financial Cryptography and Data
Security, FC 2015, 8975:459–477, 2015.
(doi:10.1007/978-3-662-47854-7_28)
- [285]
- X. Zhao,
Z. Wang, X. Fan, and Z. Wang.
A clustering-bayesian network based approach for test case prioritization.
In 39th IEEE Annual Computer Software and Applications Conference
Workshops, COMPSACW 2015, volume 3, pages 542–547. IEEE Computer
Society, 2015.
(doi:10.1109/COMPSAC.2015.154)
- [286]
- Yu Zheng, Chang Sheng, and
Xing Xie.
Recommending
points of interests in a region.
United States Patent 9,009,177, April 2015.
Assignee: Microsoft Corporation (Redmond, WA).
- [287]
- Yu Zheng, Jianqiao Feng,
Xing Xie, and Wei-Ying Ma.
Detecting
spatial outliers in a location entity dataset.
United States Patent 9,063,226, June 2015.
Assignee: Microsoft Technology Licensing, LLC (Redmond, WA).
- [288]
- X. Zhou
and Z. Yu.
A novel approach for the selection of super peers in P2P networks.
ICIC Express Letters, 9(2):551–556, 2015.
- [289]
- X. Zhu,
L. Zhong, H. Zong, C. Hou, and
N. Zhang.
Understanding of the component-based software evolution by using similarity
measurement.
In 5th International Conference on Computer Engineering and Networks,
CENet 2015, volume 12-13-September-2015. Proceedings of Science (PoS),
2015.