[1]
B. Adams, R. Kavanagh, A.E. Hassan, and D.M. German. An empirical study of integration activities in distributions of open source software. Empirical Software Engineering, 21(3):960–1001, 2016. (doi:10.1007/s10664-015-9371-y)
[2]
D. Adebanjo, M. Tickle, Y. Lin, and M. Bourlakis. E-business capabilities in developed and developing countries: Different or the same? In 2016 IEEE International Conference on Management of Innovation and Technology, ICMIT 2016, pages 19–24. Institute of Electrical and Electronics Engineers Inc., 2016. (doi:10.1109/ICMIT.2016.7605001)
[3]
A. Adewumi, S. Misra, N. Omoregbe, B. Crawford, and R. Soto. A systematic literature review of open source software quality assessment models. SpringerPlus, 5(1), 2016. (doi:10.1186/s40064-016-3612-4)
[4]
K. Agrawal, M. Aschauer, T. Thonhofer, S. Bala, A. Rogge-Solti, and N. Tomsich. Resource classification from version control system logs. In 20th IEEE International Enterprise Distributed Object Computing Workshop, EDOCW 2016, volume 2016-September, pages 249–258. Institute of Electrical and Electronics Engineers Inc., 2016. (doi:10.1109/EDOCW.2016.7584383)
[5]
M. Allamanis, H. Peng, and C. Sutton. A convolutional attention network for extreme summarization of source code. In 33rd International Conference on Machine Learning, ICML 2016, volume 5, pages 3043–3052. International Machine Learning Society (IMLS), 2016.
[6]
Nicholas John Allen, Padmanabhan Krishnan, and Bernhard Friedrich Scholz. Combining type-analysis with points-to analysis for analyzing library source-code. United States Patent 9,336,397, May 2016. Assignee: Oracle International Corporation (Redwood Shores, CA).
[7]
S. Almagor, U. Boker, and O. Kupferman. Formally reasoning about quality. Journal of the ACM, 63(3), 2016. (doi:10.1145/2875421)
[8]
S.S. Alqahtani, E.E. Eghan, and J. Rilling. Tracing known security vulnerabilities in software repositories — a semantic web enabled modeling approach. Science of Computer Programming, 121:153–175, 2016. (doi:10.1016/j.scico.2016.01.005)
[9]
I.I. Androulidakis. Mobile phone security and forensics: A practical approach, second edition. Springer International Publishing, 2016. (doi:10.1007/978-3-319-29742-2)
[10]
E. Anstead, S. Benford, and R. Houghton. Marath on multi screen: Group television watching and interaction in a viewing ecology. In 19th ACM Conference on Computer-Supported Cooperative Work and Social Computing, CSCW 2016, volume 27, pages 405–417. Association for Computing Machinery, 2016. (doi:10.1145/2818048.2820003)
[11]
Ö.F. Arar and K. Ayan. Deriving thresholds of software metrics to predict faults on open source software: Replicated case studies. Expert Systems with Applications, 61:106–121, 2016. (doi:10.1016/j.eswa.2016.05.018)
[12]
M.T. Aras and Y.E. Selcuk. Metric and rule based automated detection of antipatterns in object-oriented software systems. In 7th International Conference on Computer Science and Information Technology, CSIT 2016. Institute of Electrical and Electronics Engineers Inc., 2016. (doi:10.1109/CSIT.2016.7549470)
[13]
F. Arcelli Fontana, M.V. Mäntylä, M. Zanoni, and A. Marino. Comparing and experimenting machine learning techniques for code smell detection. Empirical Software Engineering, 21(3):1143–1191, 2016. (doi:10.1007/s10664-015-9378-4)
[14]
A. Arunachalam and O. Sornil. Minimizing redundant messages and improving search efficiency under highly dynamic mobile P2P network. Journal of Engineering Science and Technology Review, 9(1):23–35, 2016.
[15]
B.S. Barn. Do you own a Volkswagen? values as non-functional requirements. IFIP WG 13.2/13.5 Joint 6th International Conference on Human-Centered Software Engineering, HCSE 2016 and 8th International Conference on Human Error, Safety, and System Development, HESSD 2016, 9856 LNCS:151–162, 2016. (doi:10.1007/978-3-319-44902-9_10)
[16]
M. Barrantes and A. Martınez. Evaluando la creación de pruebas unitarias para un sistema legado mediante Microsoft fakes y dobles de prueba. In 19th Ibero-American Conference on Software Engineering, CIBSE 2016, pages 468–477. Universidad de las Fuerzas Armadas ESPE, 2016.
[17]
Andrea Basso, Lee Begeja, David C. Gibbon, Zhu Liu, Bernard S. Renger, and Behzad Shahraray. System and method for temporally adaptive media playback. United States Patent 9,392,345, July 2016. Assignee: AT&T Intellectual Property I, L.P. (Atlanta, GA).
[18]
S.M. Bellovin, M. Blaze, and S. Landau. Insecure surveillance: Technical issues with remote computer searches. Computer, 49(3):14–24, 2016. (doi:10.1109/MC.2016.68)
[19]
S. Ben Sassi. Towards a semantic search engine for open source software. 15th International Conference on Software Reuse, ICSR 2016, 9679:300–314, 2016. (doi:10.1007/978-3-319-35122-3_20)
[20]
R.J. Bille, Y. Lin, and S.K. Chalup. RTCSS: A framework for developing real-time peer-to-peer web applications. In Australasian Computer Science Week Multiconference, ACSW 2016, volume 01-05-February-2016. Association for Computing Machinery, 2016. (doi:10.1145/2843043.2843377)
[21]
K. Blincoe, J. Sheoran, S. Goggins, E. Petakovic, and D. Damian. Understanding the popular users: Following, affiliation influence and leadership on GitHub. Information and Software Technology, 70:30–39, 2016. (doi:10.1016yj/infsof.2015.10.002)
[22]
I. Bluemke and A. Stepień. Selection of metrics for the defect prediction. 11th International Conference on Dependability and Complex Systems, DepCoS-RELCOMEX 2016, 470:39–50, 2016. (doi:10.1007/978-3-319-39639-2_4)
[23]
J. Borstler and B. Paech. The role of method chains and comments in software readability and comprehension-an experiment. IEEE Transactions on Software Engineering, 42(9):886–898, 2016. (doi:10.1109/TSE.2016.2527791)
[24]
A. Bottcher, V. Thurner, K. Schlierkamp, and D. Zehetmeier. Debugging students' debugging process. In 46th Annual Frontiers in Education Conference, FIE 2016, volume 2016-November. Institute of Electrical and Electronics Engineers Inc., 2016. (doi:10.1109/FIE.2016.7757447)
[25]
W. Bouaynaya. Getting theoretical perspective of security built in coupling cloud computing — open source. In 21st Symposium of the Association Information and Management 2016, AIM 2016. Association Information and Management, 2016.
[26]
Z. Bougroun, A. Zeearaoui, and T. Bouchentouf. Comparative study of the quality assessment tools based on a model: Sonar, Squale, EvalMetrics. Journal of Computer Science, 12(1):39–47, 2016. (doi:10.3844/jcssp.2016.39.47)
[27]
David D. Brandt, Kenwood Hall, Mark Burton Anderson, Craig D. Anderson, and George Bradford Collins. System and methodology providing automation security analysis and network intrusion protection in an industrial environment. United States Patent 9,412,073, August 2016. Assignee: ROCKWELL AUTOMATION TECHNOLOGIES, INC. (Mayfield Heights, OH).
[28]
G. Canfora, A. Di Sorbo, F. Mercaldo, and C.A. Visaggio. Exploring mobile user experience through code quality metrics. 17th International Conference on Product-Focused Software Process Improvement, PROFES 2016, 10027 LNCS:705–712, 2016. (doi:10.1007/978-3-319-49094-6_59)
[29]
S. Carattini and A. Tavoni. How green are green economists? Economics Bulletin, 36(4):2311–2323, 2016.
[30]
Casparus Cate, James J. Fitzgibbon, Robert R. Keller, Jr., James Scott Murray, Cory Sorice, and Gregory John Stanek. Barrier operator feature enhancement. United States Patent 9,376,851, June 2016. Assignee: The Chamberlain Group, Inc. (Elmhurst, IL).
[31]
W. Cazzola and E. Vacchi. Language components for modular DSLs using traits. Computer Languages, Systems and Structures, 45:16–34, 2016. (doi:10.1016/j.cl.2015.12.001)
[32]
M. Challenger, G. Kardas, and B. Tekinerdogan. A systematic approach to evaluating domain-specific modeling language environments for multi-agent systems. Software Quality Journal, 24(3):755–795, 2016. (doi:10.1007/s11219-015-9291-5)
[33]
M. Challenger, M. Mernik, G. Kardas, and T. Kosar. Declarative specifications for the development of multi-agent systems. Computer Standards and Interfaces, 43:91–115, 2016. (doi:10.1016/j.csi.2015.08.012)
[34]
A. Chatzigeorgiou, T.L. Theodorou, G.E. Violettas, and S. Xinogalos. Blending an Android development course with software engineering concepts. Education and Information Technologies, 21(6):1847–1875, 2016. (doi:10.1007/s10639-015-9423-3)
[35]
M.K. Chawla and I. Chhabra. A quantitative framework for integrated software quality measurement in multi-versions systems. In 2016 International Conference on Internet of Things and Applications, IOTA 2016, pages 310–315. Institute of Electrical and Electronics Engineers Inc., 2016. (doi:10.1109/IOTA.2016.7562743)
[36]
X.-F. Chen and S.-Z. Yu. CIPA: A collaborative intrusion prevention architecture for programmable network and SDN. Computers and Security, 58:1–19, 2016. (doi:10.1016/j.cose.2015.11.008)
[37]
M. Chen, T. Wang, C. Yang, Q. Fan, G. Yin, and H. Wang. Social computing in open source community: A study of software reuse. 2nd International Conference on Young Computer Scientists, Engineers and Educators, ICYCSEE 2016, 623:621–631, 2016. (doi:10.1007/978-981-10-2053-7_55)
[38]
Y.C. Cheng, J.-S. Jwo, and C.-T. Tsai. A leading indicator of post-release defect density in refactoring-based software maintenance: A case study. Journal of Internet Technology, 17(3):589–597, 2016. (doi:10.6138/JIT.2016.17.3.20151110d)
[39]
S. Cherbal, A. Boukerram, and A. Boubetra. A survey of DHT solutions in fixed and mobile networks. International Journal of Communication Networks and Distributed Systems, 17(1):14–42, 2016. (doi:10.1504/IJCNDS.2016.077938)
[40]
Hana Chockler, Oded Margalit, Dmitry Pidan, and Sitvanit Ruah. Directing verification towards bug-prone portions. United States Patent 9,389,984, July 2016. Assignee: International Business Machines Corporation (Armonk, NY).
[41]
S. Chodarev and J. Kollar. Extensible host language for domain-specific languages. Computing and Informatics, 35(1):84–110, 2016.
[42]
T. Choeikiwong and P. Vateekul. Two stage model to detect and rank software defects on imbalanced and scarcity data sets. IAENG International Journal of Computer Science, 43(3):344–355, 2016.
[43]
J. Cohen. Renaming global variables in C mechanically proved correct. In 4th International Workshop on Verification and Program Transformation, VPT 2016, volume 216, pages 50–64. Open Publishing Association, 2016. (doi:10.4204/EPTCS.216.3)
[44]
V. Cosentino, J. Luis, C. Izquierdo, and J. Cabot. Findings from GitHub: Methods, datasets and limitations. In 13th Working Conference on Mining Software Repositories, MSR 2016, pages 137–141. Association for Computing Machinery, Inc, 2016. (doi:10.1145/2901739.2901776)
[45]
Ang Cui and Salvatore J. Stolfo. Methods, systems, and media for inhibiting attacks on embedded devices. United States Patent 9,392,017, July 2016. Assignee: The Trustees of Columbia University in the City of New York (New York, NY).
[46]
J. Cunha, J. Paulo Fernandes, P. Martins, J. Mendes, R. Pereira, and J. Saraiva. Evaluating refactorings for spreadsheet models. Journal of Systems and Software, 118:234–250, 2016. (doi:10.1016/j.jss.2016.04.043)
[47]
Robert Daniel-Wayman, James Scott Murray, and Cory Jon Sorice. Remote guest access to a secured premises. United States Patent 9,396,598, July 2016. Assignee: The Chamberlain Group, Inc. (Elmhurst, IL).
[48]
S. Delbruel, D. Frey, and F. Taïani. Mignon: A fast decentralized content consumption estimation in large-scale distributed systems. 16th IFIP WG 6.1 International Conference on Distributed Applications and Interoperable Systems, DAIS 2016 Held as Part of the 11th International Federated Conference on Distributed Computing Techniques, DisCoTec 2016, 9687:32–46, 2016. (doi:10.1007/978-3-319-39577-7_3)
[49]
K. Deltouzos, I. Gkortsilas, N. Efthymiopoulos, M. Efthymiopoulou, and S. Denazis. SeekStream: Adapting to dynamic user behavior in P2P video-on-demand. International Journal of Communication Systems, 29(8):1365–1394, 2016. (doi:10.1002/dac.3105)
[50]
S. Desiere. The carbon footprint of academic conferences: Evidence from the 14th EAAE congress in slovenia. EuroChoices, 15(2):56–61, 2016. (doi:10.1111/1746-692X.12106)
[51]
G. Destefanis, M. Ortu, S. Porru, S. Swift, and M. Marchesi. A statistical comparison of Java and python software metric properties. In 7th International Workshop on Emerging Trends in Software Metrics, WETSoM 2016, pages 22–28. Association for Computing Machinery, Inc, 2016. (doi:10.1145/2897695.2897697)
[52]
T. Diamantopoulos, K. Thomopoulos, and A. Symeonidis. QualBoa: Reusability-aware recommendations of source code components. In 13th Working Conference on Mining Software Repositories, MSR 2016, pages 488–491. Association for Computing Machinery, Inc, 2016. (doi:10.1145/2901739.2903492)
[53]
L.N.Q. Do, M. Eichberg, and E. Bodden. Toward an automated benchmark management system. In 5th ACM SIGPLAN International Workshop on State Of the Art in Program Analysis, SOAP 2016, pages 13–17. Association for Computing Machinery, Inc, 2016. (doi:10.1145/2931021.2931023)
[54]
P.M. Durai Raj Vincent. Secured healthcare date exchange using proposed security scheme. International Journal of Pharmacy and Technology, 8(2):12144–12154, 2016.
[55]
C. Ebert, G. Gallardo, J. Hernantes, and N. Serrano. DevOps. IEEE Software, 33(3):94–100, 2016. (doi:10.1109/MS.2016.68)
[56]
G. Einziger, R. Friedman, and Y. Kantor. Shades: Expediting kademlia's lookup process. Computer Networks, 99:37–50, 2016. (doi:10.1016/j.comnet.2016.01.014)
[57]
A. Elbanna and S. Sarker. The risks of agile software development: Learning from adopters. IEEE Software, 33(5):72–79, 2016. (doi:10.1109/MS.2015.150)
[58]
H. Ergin, E. Syriani, and J. Gray. Design pattern oriented development of model transformations. Computer Languages, Systems and Structures, 46:106–139, 2016. (doi:10.1016/j.cl.2016.07.004)
[59]
E. Erturk and E. Akcapinar Sezer. Iterative software fault prediction with a hybrid approach. Applied Soft Computing Journal, 49:1020–1033, 2016. (doi:10.1016/j.asoc.2016.08.025)
[60]
D.P. Evangeline and P. AnandhaKumar. From P2P to cloud based P2P for live media streaming — a survey. In 7th International Conference on Advanced Computing, ICoAC 2015. Institute of Electrical and Electronics Engineers Inc., 2016. (doi:10.1109/ICoAC.2015.7562809)
[61]
Patrick B. Evans and Edward Sullivan. Access control operator diagnostic control. United States Patent 9,449,449, September 2016. Assignee: The Chamberlain Group, Inc. (Elmhurst, IL).
[62]
O. Fendt, M. Jaeger, and R.J. Serrano. Industrial experience with open source software process management. In 2016 IEEE 40th Annual Computer Software and Applications Conference, COMPSAC 2016, volume 2, pages 180–185. IEEE Computer Society, 2016. (doi:10.1109/COMPSAC.2016.138)
[63]
James J. Fitzgibbon. System interaction with a movable barrier operator method and apparatus. United States Patent 9,495,815, November 2016. Assignee: The Chamberlain Group, Inc. (Elmhurst, IL).
[64]
M. Fois, A. Cuena-Lombraña, T. Fristoe, G. Fenu, and G. Bacchetta. Reconsidering alternative transportation systems to reach academic conferences and to convey an example to reduce greenhouse gas emissions. History and Philosophy of the Life Sciences, 38(4), 2016. (doi:10.1007/s40656-016-0126-x)
[65]
F.A. Fontana, R. Roveda, S. Vittori, A. Metelli, S. Saldarini, and F. Mazzei. On evaluating the impact of the refactoring of architectural problems on software quality. In XP 2016 Scientific Workshops, volume 24-May-2016. Association for Computing Machinery, 2016. (doi:10.1145/2962695.2962716)
[66]
V. Garci'a-Di'az, J.P. Espada, E.R. Nunez-Valdez, B.C.P. G-Bustelo, and J.M.C. Lovelle. Combining the continuous integration practice and the model-driven engineering approach. Computing and Informatics, 35(2):299–337, 2016.
[67]
D. Geneiatakis. Minimizing databases attack surface against SQL injection attacks. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 9543:1–9, 2016. (doi:10.1007/978-3-319-29814-6_1)
[68]
O. Georgiou, G. Kalogridis, H. Yassine, and S. Denic. Connectivity of cooperative ad hoc networks. In 2016 IEEE International Conference on Communications, ICC 2016. Institute of Electrical and Electronics Engineers Inc., 2016. (doi:10.1109/ICC.2016.7510982)
[69]
M. Gómez, R. Rouvoy, B. Adams, and L. Seinturier. Reproducing context-sensitive crashes of mobile apps using crowdsourced monitoring. In IEEE/ACM International Conference on Mobile Software Engineering and Systems, MobileSoft 2016, pages 88–99. Association for Computing Machinery, Inc, 2016. (doi:10.1145/2897073.2897088)
[70]
M.K. Gopal. Design quality metrics on the package maintainability and reliability of open source software. International Journal of Intelligent Engineering and Systems, 9(4):195–204, 2016. (doi:10.22266/ijies2016.1231.21)
[71]
J. Guo, M. Rahimi, J. Cleland-Huang, A. Rasin, J.H. Hayes, and M. Vierhauser. Cold-start software analytics. In 13th Working Conference on Mining Software Repositories, MSR 2016, pages 142–153. Association for Computing Machinery, Inc, 2016. (doi:10.1145/2901739.2901740)
[72]
O. Hanappi, W. Hummer, and S. Dustdar. Asserting reliable convergence for configuration management scripts. In 2016 ACM SIGPLAN International Conference on Object-Oriented Programming, Systems, Languages, and Applications, OOPSLA 2016, volume 02-04-November-2016, pages 328–343. Association for Computing Machinery, 2016. (doi:10.1145/2983990.2984000)
[73]
E. Harjula, A. Gurtov, T. Koskela, T. Ojala, and M. Ylianttila. Energy-aware load monitoring for improving battery life of mobile peer-to-peer nodes. Sustainable Computing: Informatics and Systems, 12:43–54, 2016. (doi:10.1016/j.suscom.2016.09.002)
[74]
Y. Hassanzadeh-Nazarabadi, A. Küpçü, and O. Özkasap. LARAS: Locality aware replication algorithm for the skip graph. In 2016 IEEE/IFIP Network Operations and Management Symposium, NOMS 2016, pages 324–332. Institute of Electrical and Electronics Engineers Inc., 2016. (doi:10.1109/NOMS.2016.7502828)
[75]
R. Hebig, T.H. Quang, M.R.V. Chaudron, G. Robles, and M.A. Fernandez. The quest for open source projects that use UML: Mining GitHub. In 19th ACM/IEEE International Conference on Model Driven Engineering Languages and Systems, MODELS 2016, pages 173–183. Association for Computing Machinery, Inc, 2016. (doi:10.1145/2976767.2976778)
[76]
B. Hoisl and S. Sobernig. Open-source development tools for domain-specific modeling: Results from a systematic literature review. In 49th Annual Hawaii International Conference on System Sciences, HICSS 2016, volume 2016-March, pages 5001–5010. IEEE Computer Society, 2016. (doi:10.1109/HICSS.2016.620)
[77]
J. Hong, H. Kim, W. Lee, and G. Lee. TouchRoller: A touch-sensitive cylindrical input device for GUI manipulation of interactive TVs. Interacting with Computers, 28(3):293–310, 2016. (doi:10.1093/iwc/iwv006)
[78]
S. Hongqiao. A research into the ways of innovation of business model under the internet mindset. Gummi, Fasern, Kunststoffe, 69(14):1522–1526, 2016.
[79]
D. Honsel, V. Honsel, M. Welter, S. Waack, and J. Grabowski. Monitoring software quality by means of simulation methods. In 10th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement, ESEM 2016, volume 08-09-September-2016. IEEE Computer Society, 2016. (doi:10.1145/2961111.2962617)
[80]
C. Hunsen, B. Zhang, J. Siegmund, C. Kästner, O. Leßenich, M. Becker, and S. Apel. Preprocessor-based variability in open-source and industrial software systems: An empirical study. Empirical Software Engineering, 21(2):449–482, 2016. (doi:10.1007/s10664-015-9360-1)
[81]
A. Ioannou and S. Weber. A survey of caching policies and forwarding mechanisms in information-centric networking. IEEE Communications Surveys and Tutorials, 18(4):2847–2886, 2016. (doi:10.1109/COMST.2016.2565541)
[82]
A. Ismail and W. Kastner. Co-operative peer-to-peer systems for industrial middleware. In 12th IEEE World Conference on Factory Communication Systems, WFCS 2016, volume 2016-June. Institute of Electrical and Electronics Engineers Inc., 2016. (doi:10.1109/WFCS.2016.7496497)
[83]
R. Jabangwe, D. Šmite, and E. Hessbo. Distributed software development in an offshore outsourcing project: A case study of source code evolution and quality. Information and Software Technology, 72:125–136, 2016. (doi:10.1016/j.infsof.2015.12.005)
[84]
R. Jabbari, N.B. Ali, K. Petersen, and B. Tanveer. What is DevOps? a systematic mapping study on definitions and practices. In XP 2016 Scientific Workshops, volume 24-May-2016. Association for Computing Machinery, 2016. (doi:10.1145/2962695.2962707)
[85]
G. Jaideep and B.P. Battula. Survey on the present state-of-the-art of P2P networks, their security issues and counter measures. International Journal of Applied Engineering Research, 11(1):616–620, 2016.
[86]
A. Jain, S. Tarwani, and A. Chug. An empirical investigation of evolutionary algorithm for software maintainability prediction. In 2016 IEEE Students' Conference on Electrical, Electronics and Computer Science, SCEECS 2016. Institute of Electrical and Electronics Engineers Inc., 2016. (doi:10.1109/SCEECS.2016.7509314)
[87]
M. Jankowski-Lorek, S. Jaroszewicz, Ł. Ostrowski, and A. Wierzbicki. Verifying social network models of Wikipedia knowledge community. Information Sciences, 339:158–174, 2016. (doi:10.1016/j.ins.2015.12.015)
[88]
Y. Jiang, D. Wu, and P. Liu. JRed: Program customization and bloatware mitigation based on static analysis. In 2016 IEEE 40th Annual Computer Software and Applications Conference, COMPSAC 2016, volume 1, pages 12–21. IEEE Computer Society, 2016. (doi:10.1109/COMPSAC.2016.146)
[89]
E. Kalliamvakou, J. Weber, and A. Knauss. Certification of open source software – a scoping review. 12th IFIP WG 2.13 International Conference on Open Source Systems: Integrating Communities, OSS 2016, 472:111–122, 2016. (doi:10.1007/978-3-319-39225-7_9)
[90]
N. Kapre and S. Bayliss. Survey of domain-specific languages for FPGA computing. In 26th International Conference on Field-Programmable Logic and Applications, FPL 2016. Institute of Electrical and Electronics Engineers Inc., 2016. (doi:10.1109/FPL.2016.7577380)
[91]
P. Kathiravelu and L. Veiga. SENDIM for incremental development of cloud networks: Simulation, emulation and deployment integration middleware. In 4th IEEE Annual International Conference on Cloud Engineering, IC2E 2016, pages 143–146. Institute of Electrical and Electronics Engineers Inc., 2016. (doi:10.1109/IC2E.2016.22)
[92]
A. Kaur, K. Kaur, and S. Jain. Predicting software change-proneness with code smells and class imbalance learning. In 5th International Conference on Advances in Computing, Communications and Informatics, ICACCI 2016, pages 746–754. Institute of Electrical and Electronics Engineers Inc., 2016. (doi:10.1109/ICACCI.2016.7732136)
[93]
A. Kaur, K. Kaur, and H. Kaur. Application of machine learning on process metrics for defect prediction in mobile application. 3rd International Conference on Information Systems Design and Intelligent Applications, INDIA 2016, 433:81–98, 2016. (doi:10.1007/978-81-322-2755-7_10)
[94]
Angelos D. Keromytis and Salvatore J. Stolfo. Systems, methods, and media for generating bait information for trap-based defenses. United States Patent 9,356,957, May 2016. Assignee: The Trustees of Columbia University in the City of New York (New York, NY).
[95]
Angelos D. Keromytis and Salvatore J. Stolfo. Methods, media, and systems for detecting an anomalous sequence of function calls. United States Patent 9,450,979, September 2016. Assignee: The Trustees of Columbia University in the City of New York (New York, NY).
[96]
M. Kessel and C. Atkinson. Ranking software components for reuse based on non-functional properties. Information Systems Frontiers, 18(5):825–853, 2016. (doi:10.1007/s10796-016-9685-3)
[97]
Y. Khrishe and M. Alshayeb. An empirical study on the effect of the order of applying software refactoring. In 7th International Conference on Computer Science and Information Technology, CSIT 2016. Institute of Electrical and Electronics Engineers Inc., 2016. (doi:10.1109/CSIT.2016.7549471)
[98]
D.J. Kim, M.-S. Yim, V. Sugumaran, and H.R. Rao. Web assurance seal services, trust and consumers' concerns: An investigation of e-commerce transaction intentions across two nations. European Journal of Information Systems, 25(3):252–273, 2016. (doi:10.1057/ejis.2015.16)
[99]
Brendan Kitts, Brian Burdick, Dyng Au, and Tyson Roberts. Method and system for automatically determining demographics of media assets for targeting advertisements. United States Patent 9,426,511, August 2016. Assignee: ADAP.TV, Inc. (Dulles, VA).
[100]
Brendan Kitts, Brian Burdick, Dyng Au, and Tyson Roberts. Method and system for automatically targeting ads to television media using demographic similarity. United States Patent 9,432,714, August 2016. Assignee: ADAP.TV, Inc. (Dulles, VA).
[101]
Y. Koroglu, A. Sen, D. Kutluay, A. Bayraktar, Y. Tosun, M. Cinar, and H. Kaya. Defect prediction on a legacy industrial software: A case study on software with few defects. In 4th International Workshop on Conducting Empirical Studies in Industry, CESI 2016 - 38th International Conference on Software Engineering, ICSE 2016, volume 17-May-2016, pages 14–20. IEEE Computer Society, 2016. (doi:10.1145/2896839.2896843)
[102]
T. Kosar, S. Bohra, and M. Mernik. Domain-specific languages: A systematic mapping study. Information and Software Technology, 71:77–91, 2016. (doi:10.1016/j.infsof.2015.11.001)
[103]
G. Kour and P. Singh. Using Lehman's laws to validate the software evolution of agile projects. In 2016 International Conference on Computational Techniques in Information and Communication Technologies, ICCTICT 2016, pages 90–96. Institute of Electrical and Electronics Engineers Inc., 2016. (doi:10.1109/ICCTICT.2016.7514558)
[104]
T. Kowark, C. Matthies, M. Uflacker, and H. Plattner. Lightweight collection and storage of software repository data with datarover. In 31st IEEE/ACM International Conference on Automated Software Engineering, ASE 2016, pages 810–815. Association for Computing Machinery, Inc, 2016. (doi:10.1145/2970276.2970286)
[105]
K. Kravari and N. Bassiliades. DISARM: A social distributed agent reputation model based on defeasible logic. Journal of Systems and Software, 117:130–152, 2016. (doi:10.1016/j.jss.2016.02.016)
[106]
O. Kupferman. On high-quality synthesis. 11th International Computer Science Symposium in Russia, CSR 2016, 9691:1–15, 2016. (doi:10.1007/978-3-319-34171-2_1)
[107]
S. Lampa, J. Alvarsson, and O. Spjuth. Towards agile large-scale predictive modelling in drug discovery with flow-based programming design principles. Journal of Cheminformatics, 8(1), 2016. (doi:10.1186/s13321-016-0179-6)
[108]
S. Landau. The real security issues of the iphone case: Law enforcement needs 21st-century investigative savvy. Science, 352(6292):1398–1399, 2016. (doi:10.1126/science.aaf7708)
[109]
Giovanni Lanfranchi, Scot Maclellan, Claudio Marinelli, and Luigi Pichetti. Management of mobile devices leveraging location based cooperation. United States Patent 9,480,086, October 2016. Assignee: International Business Machines Corporation (Armonk, NY).
[110]
Giovanni Lanfranchi, Scot Maclellan, Claudio Marinelli, and Luigi Pichetti. Management of mobile devices leveraging location based cooperation. United States Patent 9,485,786, November 2016. Assignee: International Business Machines Corporation (Armonk, NY).
[111]
M. Leppanen, S. Lahtinen, and P. Ihantola. Hammer and nails-crucial practices and tools in ad hoc student teams. In 29th IEEE Conference on Software Engineering Education and Training, CSEEandT 2016, pages 142–146. Institute of Electrical and Electronics Engineers Inc., 2016. (doi:10.1109/CSEET.2016.38)
[112]
L. Li, Y. Qian, K. Du, and Y. Yang. Analysis of approximately balanced production lines. International Journal of Production Research, 54(3):647–664, 2016. (doi:10.1080/00207543.2015.1015750)
[113]
L. Li, Y. Qian, Y. Yang, and K. Du. A common model for the approximate analysis of tandem queueing systems with blocking. IEEE Transactions on Automatic Control, 61(7):1780–1793, 2016. (doi:10.1109/TAC.2015.2478127)
[114]
L. Li, Y. Qian, Y.M. Yang, and K. Du. A fast algorithm for buffer allocation problem. International Journal of Production Research, 54(11):3243–3255, 2016. (doi:10.1080/00207543.2015.1092612)
[115]
Y. Li, Z.-Q. Huang, Y. Wang, and B.-W. Fang. New approach of cross-project defect prediction based on multi-source data. Jilin Daxue Xuebao (Gongxueban)/Journal of Jilin University (Engineering and Technology Edition), 46(6):2034–2041, 2016. (doi:10.13229/j.cnki.jdxbgxb201606037)
[116]
Z. Li, T. Wang, Y. Zhang, Y. Zhan, and G. Yin. Query reformulation by leveraging crowd wisdom for scenario-based software search. In 8th Asia-Pacific Symposium on Internetware, Internetware 2016, volume 18-September-2016, pages 36–44. Association for Computing Machinery, 2016. (doi:10.1145/2993717.2993723)
[117]
I.-C. Liao, Y.-S. Deng, and H.-C. You. The emotion and personality user perception in multi-screen interaction. 5th International Conference on Design, User Experience, and Usability, DUXU 2016 Held as Part of 18th International Conference on Human-Computer Interaction, HCI International 2016, 9747:34–45, 2016. (doi:10.1007/978-3-319-40355-7_4)
[118]
C.-S. Lin and J.-W. Lin. UR-aware: Streaming videos over BitTorrent with balanced playback urgency and rareness distribution. Peer-to-Peer Networking and Applications, 9(6):1114–1125, 2016. (doi:10.1007/s12083-015-0399-y)
[119]
Y. Lu, H. Li, and G. Sun. Distributed microblog crawler system based on P2P. Jiangsu Daxue Xuebao (Ziran Kexue Ban)/Journal of Jiangsu University (Natural Science Edition), 37(3):296–301, 2016. (doi:10.3969/j.issn.1671-7775.2016.03.008)
[120]
L.E. Lwakatare, P. Kuvaja, and M. Oivo. Relationship of devops to agile, lean and continuous deployment: A multivocal literature review study. 17th International Conference on Product-Focused Software Process Improvement, PROFES 2016, 10027 LNCS:399–415, 2016. (doi:10.1007/978-3-319-49094-6_27)
[121]
Robert Scott MacGregor and Milagrino Jose C. Ong. Virtual currency system. United States Patent 9,398,018, July 2016. Assignee: NTRUST TECHNOLOGY SOLUTIONS CORP. (Vancouver, CA).
[122]
Serguei Makarov. Regular expression support in instrumentation languages using kernel-mode executable code. United States Patent 9,405,652, August 2016. Assignee: RED HAT, INC. (Raleigh, NC).
[123]
S. Mäkinen, M. Leppänen, T. Kilamo, A.-L. Mattila, E. Laukkanen, M. Pagels, and T. Männistö. Improving the delivery cycle: A multiple-case study of the toolchains in Finnish software intensive enterprises. Information and Software Technology, 80:1339–1351, 2016. (doi:10.1016/j.infsof.2016.09.001)
[124]
R. Malhotra and A. Chug. An empirical study to assess the effects of refactoring on software maintainability. In 5th International Conference on Advances in Computing, Communications and Informatics, ICACCI 2016, pages 110–117. Institute of Electrical and Electronics Engineers Inc., 2016. (doi:10.1109/ICACCI.2016.7732033)
[125]
R. Malhotra and A. Chug. Software maintainability: Systematic literature review and current trends. International Journal of Software Engineering and Knowledge Engineering, 26(8):1221–1253, 2016. (doi:10.1142/S0218194016500431)
[126]
K. Manikas. Revisiting software ecosystems research: A longitudinal literature study. Journal of Systems and Software, 117:84–103, 2016. (doi:10.1016/j.jss.2016.02.003)
[127]
T. Maqsood, O. Khalid, R. Irfan, S.A. Madani, and S.U. Khan. Scalability issues in online social networks. ACM Computing Surveys, 49(2), 2016. (doi:10.1145/2968216)
[128]
S. Matsumoto, K. Okimoto, T. Kashima, and S. Yamagishi. Automatic generation of C source code for novice programming education. 18th International Conference on Human-Computer Interaction, HCI International 2016, 9731:65–76, 2016. (doi:10.1007/978-3-319-39510-4_7)
[129]
T. Matsushita, S. Yamanaka, and F. Zhao. A peer-to-peer content-distribution scheme resilient to key leakage. IEICE Transactions on Information and Systems, E99D(12):2956–2967, 2016. (doi:10.1587/transinf.2016PAP0018)
[130]
A. Matta and F. Simone. Analysis of two-machine lines with finite buffer, operation-dependent and time-dependent failure modes. International Journal of Production Research, 54(6):1850–1862, 2016. (doi:10.1080/00207543.2015.1085654)
[131]
T. McNamara, S. Shaaban, and S. Hudson. Fifty years of the bowl phenomenon. Journal of Manufacturing Systems, 41:1–7, 2016. (doi:10.1016/j.jmsy.2016.07.003)
[132]
L. Meneses, S. Jayarathna, R. Furuta, and F. Shipman. Analyzing the perceptions of change in a distributed collection of web documents. In 27th ACM Conference on Hypertext and Social Media, HT 2016, pages 273–278. Association for Computing Machinery, Inc, 2016. (doi:10.1145/2914586.2914628)
[133]
Ronald Mraz and James Hope. Enterprise cross-domain solution having configurable data filters. United States Patent 9,380,023, June 2016. Assignee: Owl Computing Technologies, Inc. (Ridgefield, CT).
[134]
S.J. Murdoch. Insecure by design: Protocols for encrypted phone calls. Computer, 49(3):25–33, 2016. (doi:10.1109/MC.2016.70)
[135]
Raman Narayanan, Ming Liu, and Paresh S. Suthar. Enabling access to rich data by intercepting paste operations. United States Patent 9,417,933, August 2016. Assignee: Microsoft Technology Licensing, LLC (Redmond, WA).
[136]
P.-W. Ng. Rapid agile transformation at a large IT organization. Emerging Innovations in Agile Software Development, pages 85–102, 2016. (doi:10.4018/978-1-4666-9858-1.ch005)
[137]
T. Nguyen, P.C. Rigby, A.T. Nguyen, M. Karanfil, and T.N. Nguyen. T2API: Synthesizing API code usage templates from english texts with statistical translation. In 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering, FSE 2016, volume 13-18-November-2016, pages 1013–1017. Association for Computing Machinery, 2016. (doi:10.1145/2950290.2983931)
[138]
P. Nicolaescu, K. Jahns, M. Derntl, and R. Klamma. Near real-time peer-to-peer shared editing on extensible data types. In 19th ACM International Conference on Supporting Group Work, GROUP 2016, volume 13-16-November-2016, pages 39–49. Association for Computing Machinery, 2016. (doi:10.1145/2957276.2957310)
[139]
A.S. Nunez-Varela, H.G. Perez-Gonzalez, F.E. Martinez-Perez, and J. Cuevas-Tello. Building a user oriented application for generic source code metrics extraction from a metrics framework. In 4th International Conference in Software Engineering Research and Innovation, CONISOFT 2016, pages 27–32. Institute of Electrical and Electronics Engineers Inc., 2016. (doi:10.1109/CONISOFT.2016.13)
[140]
S. Nutbrown and C. Higgins. Static analysis of programming exercises: Fairness, usefulness and a method for application. Computer Science Education, 26(2-3):104–128, 2016. (doi:10.1080/08993408.2016.1179865)
[141]
Dan R. Olsen, Jr. Interactive viewing of sports video. United States Patent 9,432,629, August 2016. Assignee: Brigham Young University (Provo, UT).
[142]
N.N. Oosterhof, A.C. Connolly, and J.V. Haxby. CoSMoMVPA: Multi-modal multivariate pattern analysis of neuroimaging data in matlab/GNU octave. Frontiers in Neuroinformatics, 10(JUL), 2016. (doi:10.3389/fninf.2016.00027)
[143]
M. Orrú and M. Marchesi. Assessment of approaches for the analysis of refactoring activity on software repositories an empirical study. In XP 2016 Scientific Workshops, volume 24-May-2016. Association for Computing Machinery, 2016. (doi:10.1145/2962695.2962717)
[144]
N. Palsetia, G. Deepa, F. Ahmed Khan, P.S. Thilagam, and A.R. Pais. Securing native XML database-driven web applications from XQuery injection vulnerabilities. Journal of Systems and Software, 122:93–109, 2016. (doi:10.1016/j.jss.2016.08.094)
[145]
M. Papamichail, T. Diamantopoulos, and A. Symeonidis. User-perceived source code quality estimation based on static analysis metrics. In 2nd IEEE International Conference on Software Quality, Reliability and Security, QRS 2016, pages 100–107. Institute of Electrical and Electronics Engineers Inc., 2016. (doi:10.1109/QRS.2016.22)
[146]
P. Pape and D. Hamilton. Better reliability verification in open-source software using efficient test cases. CrossTalk, 29(1):31–36, 2016.
[147]
B. Pechaz, M.V. Jahan, and M. Jalali. Malware detection using hidden markov model based on markov blanket feature selection method. In 2nd International Congress on Technology, Communication and Knowledge, ICTCK 2015, pages 558–563. Institute of Electrical and Electronics Engineers Inc., 2016. (doi:10.1109/ICTCK.2015.7582729)
[148]
A. Pereira, M.F. Abreu, D. Silva, A.C. Alves, J.A. Oliveira, I. Lopes, and M.C. Figueiredo. Reconfigurable standardized work in a lean company — a case study. In 6th International Conference on Changeable, Agile, Reconfigurable and Virtual Production, CARV 2016, volume 52, pages 239–244. Elsevier B.V., 2016. (doi:10.1016/j.procir.2016.07.019)
[149]
E. Perel and U. Yechiali. FINITE TWO LAYERED QUEUEING SYSTEMS. Probability in the Engineering and Informational Sciences, 30(3):492–513, 2016. (doi:10.1017/S0269964816000139)
[150]
A. Perisic, M. Lazic, and B. Perisic. The extensible orchestration framework approach to collaborative design in architectural, urban and construction engineering. Automation in Construction, 71(Part 2):210–225, 2016. (doi:10.1016/j.autcon.2016.08.005)
[151]
K. Petridis, A. Chatzigeorgiou, and E. Stiakakis. A spatiotemporal data envelopment analysis (S-T DEA) approach: the need to assess evolving units. Annals of Operations Research, 238(1-2):475–496, 2016. (doi:10.1007/s10479-015-2045-8)
[152]
A. Pino. Augmentative and alternative communication systems for the motor disabled. In Leadership and Personnel Management: Concepts, Methodologies, Tools, and Applications, volume 2, pages 680–727. IGI Global, 2016. (doi:10.4018/978-1-4666-9624-2.ch031)
[153]
Michalis Polychronakis and Angelos Keromytis. Detecting return-oriented programming payloads by evaluating data for a gadget address space address and determining whether operations associated with instructions beginning at the address indicate a return-oriented programming payload. United States Patent 9,495,541, November 2016. Assignee: The Trustees of Columbia University in the City of New York (New York, NY).
[154]
P. Qin, B. Dai, G. Xu, K. Wu, and B. Huang. Taking a free ride for routing topology inference in peer-to-peer networks. Peer-to-Peer Networking and Applications, 9(6):1047–1059, 2016. (doi:10.1007/s12083-015-0380-9)
[155]
D. Qiu, B. Li, and H. Leung. Understanding the API usage in Java. Information and Software Technology, 73:81–100, 2016. (doi:10.1016/j.infsof.2016.01.011)
[156]
K. Raja, A. Deivasigamani, and V. Ravi. A reliant certificate revocation of malicious nodes in MANETs. Wireless Personal Communications, 90(2):435–455, 2016. (doi:10.1007/s11277-015-3016-8)
[157]
B. Reaves, N. Scaife, D. Tian, L. Blue, P. Traynor, and K.R.B. Butler. Sending out an SMS: Characterizing the security of the SMS ecosystem with public gateways. In 2016 IEEE Symposium on Security and Privacy, SP 2016, pages 339–356. Institute of Electrical and Electronics Engineers Inc., 2016. (doi:10.1109/SP.2016.28)
[158]
K.A. Reilley, S.J. Edwardsy, R.S. Peakz, and D.N. Mavris. Methodologies for modeling and simulation in model-based systems engineering tools. In AIAA Space and Astronautics Forum and Exposition, SPACE 2016. American Institute of Aeronautics and Astronautics Inc, AIAA, 2016.
[159]
M.P. Robillard and N. Medvidovic. Disseminating architectural knowledge on open-source projects a case study of the book architecture of open-source applications. In 2016 IEEE/ACM 38th IEEE International Conference on Software Engineering, ICSE 2016, volume 14-22-May-2016, pages 476–487. IEEE Computer Society, 2016. (doi:10.1145/2884781.2884792)
[160]
J.M.B. Rocamora and J.R.I. Pedrasa. Evaluation of hierarchical DHTs to mitigate churn effects in mobile networks. Computer Communications, 85:41–57, 2016. (doi:10.1016/j.comcom.2016.02.003)
[161]
D. Roosan, G. Del Fiol, J. Butler, Y. Livnat, J. Mayer, M. Samore, M. Jones, and C. Weir. Feasibility of population health analytics and data visualization for decision support in the infectious diseases domain: A pilot study. Applied Clinical Informatics, 7(2):604–623, 2016. (doi:10.4338/ACI-2015-12-RA-0182)
[162]
J.L. Rrushi. NIC displays to thwart malware attacks mounted from within the OS. Computers and Security, 61:59–71, 2016. (doi:10.1016/j.cose.2016.05.002)
[163]
J. Ruohonen, S. Hyrynsalmi, and V. Leppänen. Exploring the use of deprecated PHP releases in the wild internet: Still a LAMP issue? In 6th International Conference on Web Intelligence, Mining and Semantics, WIMS 2016, volume 13-15-June-2016. Association for Computing Machinery, 2016. (doi:10.1145/2912845.2912851)
[164]
D. Russo. Benefits of open source software in defense environments. 4th International Conference in Software Engineering for Defence Applications, SEDA 2015, 422:123–131, 2016. (doi:10.1007/978-3-319-27896-4_11)
[165]
A. Santos Olmo Parra, L.E. Sanchez Crespo, E. Alvarez, M. Huerta, and E. Fernandez Medina Paton. Methodology for dynamic analysis and risk management on ISO27001. IEEE Latin America Transactions, 14(6):2897–2911, 2016. (doi:10.1109/TLA.2016.7555273)
[166]
S. Scalabrino, M. Linares-Vasquez, D. Poshyvanyk, and R. Oliveto. Improving code readability models with textual features. In 24th IEEE International Conference on Program Comprehension, ICPC 2016, volume 2016-July. IEEE Computer Society, 2016. (doi:10.1109/ICPC.2016.7503707)
[167]
S. Schmid, T. Richner, S. Mangold, and T.R. Gross. EnLighting: An indoor visible light communication system based on networked light bulbs. In 13th Annual IEEE International Conference on Sensing, Communication, and Networking, SECON 2016. Institute of Electrical and Electronics Engineers Inc., 2016. (doi:10.1109/SAHCN.2016.7732989)
[168]
J. Schneider, M. Karrenbauer, M.R. Crippa, and H.D. Schotten. Efficient spectrum sharing in heterogeneous wireless environments. Frequenz, 70(5-6):261–279, 2016. (doi:10.1515/freq-2015-0144)
[169]
I. Scholtes, P. Mavrodiev, and F. Schweitzer. From Aristotle to Ringelmann: a large-scale analysis of team productivity and coordination in open source software projects. Empirical Software Engineering, 21(2):642–683, 2016. (doi:10.1007/s10664-015-9406-4)
[170]
S. Seifermann and H. Groenda. Survey on textual notations for the Unified Modeling Language. In 4th International Conference on Model-Driven Engineering and Software Development, MODELSWARD 2016, pages 28–39. SciTePress, 2016.
[171]
Behzad Shahraray, Andrea Basso, Lee Begeja, David C. Gibbon, Zhu Liu, and Bernard S. Renger. System and method for adaptive media playback based on destination. United States Patent 9,390,757, July 2016. Assignee: AT&T Intellectual Property I, L.P. (Atlanta, GA).
[172]
P. Shedden, A. Ahmad, W. Smith, H. Tscherning, and R. Scheepers. Asset identification in information security risk assessment: A business practice approach. Communications of the Association for Information Systems, 39(1):297–320, 2016.
[173]
C. Shi and S.B. Gershwin. A segmentation approach for solving buffer allocation problems in large production systems. International Journal of Production Research, 54(20):6121–6141, 2016. (doi:10.1080/00207543.2014.991842)
[174]
A.P. Shree Madhan, S.B. Athreya, N. Srinivasan, and C. Lakshmi. Balancing workload of cloud and dynamic request redirection for cloud based video services using CDN and data centers. Research Journal of Pharmaceutical, Biological and Chemical Sciences, 7(6):1406–1411, 2016.
[175]
F. Siegmund, A.H.C. Ng, and K. Deb. Hybrid dynamic resampling algorithms for evolutionary multi-objective optimization of invariant-noise problems. 19th European Conference on Applications of Evolutionary Computation, EvoApplications 2016, 9598:311–326, 2016. (doi:10.1007/978-3-319-31153-1_21)
[176]
H.M. Sneed and C. Verhoef. From software development to software assembly. IEEE Software, 33(5):80–85, 2016. (doi:10.1109/MS.2015.78)
[177]
S. Sobernig, S. Apel, S. Kolesnikov, and N. Siegmund. Quantifying structural attributes of system decompositions in 28 feature-oriented software product lines: An exploratory study. Empirical Software Engineering, 21(4):1670–1705, 2016. (doi:10.1007/s10664-014-9336-6)
[178]
S. Sobernig, B. Hoisl, and M. Strembeck. Extracting reusable design decisions for UML-based domain-specific languages: A multi-method study. Journal of Systems and Software, 113:140–172, 2016. (doi:10.1016/j.jss.2015.11.037)
[179]
D.M. Souza, K.R. Felizardo, and E.F. Barbosa. A systematic literature review of assessment tools for programming assignments. In 29th IEEE Conference on Software Engineering Education and Training, CSEEandT 2016, pages 147–156. Institute of Electrical and Electronics Engineers Inc., 2016. (doi:10.1109/CSEET.2016.48)
[180]
R.V. Steiner and E. Lupu. Attestation in wireless sensor networks: A survey. ACM Computing Surveys, 49(3), 2016. (doi:10.1145/2988546)
[181]
Salvatore J. Stolfo, Malek Ben Salem, and Shlomo Hershkop. Methods, systems, and media for masquerade attack detection by monitoring computer user behavior. United States Patent 9,311,476, April 2016. Assignee: The Trustees of Columbia University in the City of New York (New York, NY).
[182]
Salvatore J. Stolfo, Angelos D. Keromytis, Brian M. Bowen, Shlomo Hershkop, Vasileios P. Kemerlis, Pratap V. Prabhu, and Malek Ben Salem. Methods, systems, and media for baiting inside attackers. United States Patent 9,501,639, November 2016. Assignee: The Trustees of Columbia University in the City of New York (New York, NY).
[183]
Edward Sullivan. Control device access method and apparatus. United States Patent 9,367,978, June 2016. Assignee: The Chamberlain Group, Inc. (Elmhurst, IL).
[184]
P. Szalachowski, L. Chuat, and A. Perrig. PKI safety net (PKISN): Addressing the too-big-to-be-revoked problem of the TLS ecosystem. In 1st IEEE European Symposium on Security and Privacy, EURO S and P 2016, pages 407–422. Institute of Electrical and Electronics Engineers Inc., 2016. (doi:10.1109/EuroSP.2016.38)
[185]
S. Tarwani and A. Chug. Sequencing of refactoring techniques by greedy algorithm for maximizing maintainability. In 5th International Conference on Advances in Computing, Communications and Informatics, ICACCI 2016, pages 1397–1403. Institute of Electrical and Electronics Engineers Inc., 2016. (doi:10.1109/ICACCI.2016.7732243)
[186]
Michael Thomas and Gerald Donald Baulier. Resource server providing a rapidly changing resource. United States Patent 9,369,406, June 2016. Assignee: SAS Institute Inc. (Cary, NC).
[187]
Y. Thomas, G. Xylomenos, C. Tsilopoulos, and G.C. Polyzos. Multi-flow congestion control with network assistance. In 2016 IFIP Networking Conference (IFIP Networking) and Workshops, IFIP Networking 2016, pages 440–448. Institute of Electrical and Electronics Engineers Inc., 2016. (doi:10.1109/IFIPNetworking.2016.7497200)
[188]
J.-P. Tolvanen and S. Kelly. Model-driven development challenges and solutions: Experiences with domain-specific modelling in industry. In 4th International Conference on Model-Driven Engineering and Software Development, MODELSWARD 2016, pages 711–719. SciTePress, 2016.
[189]
A. Tran Tan, J. Falcou, D. Etiemble, and H. Kaiser. Automatic task-based code generation for high performance domain specific embedded language. International Journal of Parallel Programming, 44(3):449–465, 2016. (doi:10.1007/s10766-015-0354-9)
[190]
F. Trautsch, S. Herbold, P. Makedonski, and J. Grabowski. Adressing problems with external validity of repository mining studies through a smart data platform. In 13th Working Conference on Mining Software Repositories, MSR 2016, pages 97–108. Association for Computing Machinery, Inc, 2016. (doi:10.1145/2901739.2901753)
[191]
Hirofumi Ueda and Norihito Fujita. Information sharing system, communication apparatus, control method and computer program. United States Patent 9,432,877, August 2016. Assignee: NEC CORPORATION (Tokyo, JP).
[192]
E. Ufuktepe and T. Tuglular. Automation architecture for bayesian network based test case prioritization and execution. In 2016 IEEE 40th Annual Computer Software and Applications Conference, COMPSAC 2016, volume 2, pages 52–57. IEEE Computer Society, 2016. (doi:10.1109/COMPSAC.2016.71)
[193]
United States House of Representatives. Committee on Energy and Commerce. Subcommittee on Oversight and Investigations. Hearing on: ``deciphering the debate over encryption: Industry and law enforcement perspectives''. testimony of Dr. Matthew Blaze. Available online http://docs.house.gov/meetings/IF/IF02/20160419/104812/HHRG-114-IF02-Wstate-BlazeM-20160419-U3.pdf, April 2016.
[194]
B. Vasilescu, K. Blincoe, Q. Xuan, C. Casalnuovo, D. Damian, P. Devanbu, and V. Filkov. The sky is not the limit: Multitasking across github projects. In 2016 IEEE/ACM 38th IEEE International Conference on Software Engineering, ICSE 2016, volume 14-22-May-2016, pages 994–1005. IEEE Computer Society, 2016. (doi:10.1145/2884781.2884875)
[195]
R. Vásquez-Ramırez, M. Bustos-Lopez, G. Alor-Hernández, C. Sanchez-Ramırez, and J.L. Garcıa-Alcaraz. Athenacloud: A cloud-based platform for multi-device educational software generation. Computer Science and Information Systems, 13(3):957–981, 2016. (doi:10.2298/CSIS160807037V)
[196]
L. Veado, G. Vale, E. Fernandes, and E. Figueiredo. TDTool: Threshold derivation tool. In 20th International Conference on Evaluation and Assessment in Software Engineering, EASE 2016, volume 01-03-June-2016. Association for Computing Machinery, 2016. (doi:10.1145/2915970.2916014)
[197]
A. Viticchié, C. Basile, A. Avancini, M. Ceccato, B. Abrath, and B. Coppens. Reactive attestation: Automatic detection and reaction to software tampering attacks. In 2nd International Workshop on Software PROtection, SPRO 2016, pages 73–84. Association for Computing Machinery, Inc, 2016. (doi:10.1145/2995306.2995315)
[198]
V. Šešum Čavić, E. Kühn, and D. Kanev. Bio-inspired search algorithms for unstructured P2P overlay networks. Swarm and Evolutionary Computation, 29:73–93, 2016. (doi:10.1016/j.swevo.2016.03.002)
[199]
Z. Wang and D.E. Perry. Role distribution and transformation in open source software project teams. In 22nd Asia-Pacific Software Engineering Conference, APSEC 2015, volume 2016-May, pages 119–126. IEEE Computer Society, 2016. (doi:10.1109/APSEC.2015.12)
[200]
Rui Wang, Yuchen Zhou, Shuo Chen, Shaz Qadeer, and Yuri Gurevich. Identifying implicit assumptions associated with a software product. United States Patent 9,372,785, June 2016. Assignee: Microsoft Technology Licensing, LLC (Redmond, WA).
[201]
H. Wang, Z. Chen, G. Xiao, and Z. Zheng. Network of networks in Linux operating system. Physica A: Statistical Mechanics and its Applications, 447:520–526, 2016. (doi:10.1016/j.physa.2015.12.084)
[202]
E. Wittern, P. Suter, and S. Rajagopalan. A look at the dynamics of the JavaScript package ecosystem. In 13th Working Conference on Mining Software Repositories, MSR 2016, pages 351–361. Association for Computing Machinery, Inc, 2016. (doi:10.1145/2901739.2901743)
[203]
Y. Xie, Y. Wang, H. He, Y. Xiang, S. Yu, and X. Liu. A general collaborative framework for modeling and perceiving distributed network behavior. IEEE/ACM Transactions on Networking, 24(5):3162–3176, 2016. (doi:10.1109/TNET.2015.2512609)
[204]
K. Yamashita, C. Huang, M. Nagappan, Y. Kamei, A. Mockus, A.E. Hassan, and N. Ubayashi. Thresholds for size and complexity metrics: A case study from the perspective of defect density. In 2nd IEEE International Conference on Software Quality, Reliability and Security, QRS 2016, pages 191–201. Institute of Electrical and Electronics Engineers Inc., 2016. (doi:10.1109/QRS.2016.31)
[205]
N. Yilmaz and K. Dinçer. Açik kaynak yazilim seçimi için iki boyutlu de v gerlendirme metodu. In 10th Turkish National Software Engineering Symposium, UYMS 2016, volume 1721, pages 325–336. CEUR-WS, 2016.
[206]
N. Yoshida, T. Saika, E. Choi, A. Ouni, and K. Inoue. Revisiting the relationship between code smells and refactoring. In 24th IEEE International Conference on Program Comprehension, ICPC 2016, volume 2016-July. IEEE Computer Society, 2016. (doi:10.1109/ICPC.2016.7503738)
[207]
A.Z. Yu, S. Ronen, K. Hu, T. Lu, and C.A. Hidalgo. Pantheon 1.0, a manually verified dataset of globally famous biographies. Scientific Data, 3, 2016. (doi:10.1038/sdata.2015.75)
[208]
L. Yu, Z. Guan, and S. Ramaswamy. The effect of time zone difference on asynchronous communications in global software development. International Journal of Computer Applications in Technology, 53(3):213–225, 2016. (doi:10.1504/IJCAT.2016.075523)
[209]
F. Zalila, X. Creguty, and M. Pantely. A DSL to feedback formal verification results. In 13th Workshop on Model-Driven Engineering, Verification and Validation, MoDeVVa 2016, volume 1713, pages 30–39. CEUR-WS, 2016.
[210]
F. Zhang, A.E. Hassan, S. McIntosh, and Y. Zou. The use of summation to aggregate software metrics hinders the performance of defect prediction models. IEEE Transactions on Software Engineering, PP(99), 2016. (doi:10.1109/TSE.2016.2599161)
[211]
Y. Zhang, Y. Jiang, C. Xu, X. Ma, and P. Yu. ABC: Accelerated building of C/C++ projects. In 22nd Asia-Pacific Software Engineering Conference, APSEC 2015, volume 2016-May, pages 182–189. IEEE Computer Society, 2016. (doi:10.1109/APSEC.2015.27)
[212]
J. Zhao, G. Shi, and D. Meng. A survey on the studies of security guard technology for process. Harbin Gongye Daxue Xuebao/Journal of Harbin Institute of Technology, 48(5):77–84, 2016. (doi:10.11918/j.issn.0367-6234.2016.05.012)
[213]
Yu Zheng, Yin Lou, Chengyang Zhang, and Xing Xie. Route computation based on route-oriented vehicle trajectories. United States Patent 9,261,376, February 2016. Assignee: MICROSOFT TECHNOLOGY LICENSING, LLC (Redmond, WA).
[214]
Yu Zheng, Chang Sheng, and Xing Xie. Recommending points of interests in a region. United States Patent 9,501,577, November 2016. Assignee: Microsoft Technology Licensing, LLC (Redmond, WA).
[215]
J. Zheng, Y. Liu, and J. Lin. Exploring DevOps for data analytical system with essential demands elicitation. In 28th International Conference on Software Engineering and Knowledge Engineering, SEKE 2016, volume 2016-January, pages 255–260. Knowledge Systems Institute Graduate School, 2016. (doi:10.18293/SEKE2016-220)
[216]
B. Zhou and J. Yu. Buffer allocation method of serial production lines based on improved ant colony optimization algorithm. High Technology Letters, 22(2):113–119, 2016. (doi:10.3772/j.issn.1006-6748.2016.02.001)
[1]
United States House of Representatives. Committee on Energy and Commerce. Subcommittee on Oversight and Investigations. Hearing on: ``deciphering the debate over encryption: Industry and law enforcement perspectives''. testimony of dr. matthew blaze. Available online http://docs.house.gov/meetings/IF/IF02/20160419/104812/HHRG-114-IF02-Wstate-BlazeM-20160419-U3.pdf, April 2016.