- [1]
- B. Adams, R. Kavanagh,
A.E. Hassan, and D.M. German.
An empirical study of integration activities in distributions of open source
software.
Empirical Software Engineering, 21(3):960–1001, 2016.
(doi:10.1007/s10664-015-9371-y)
- [2]
- D. Adebanjo, M. Tickle,
Y. Lin, and M. Bourlakis.
E-business capabilities in developed and developing countries: Different or
the same?
In 2016 IEEE International Conference on Management of Innovation and
Technology, ICMIT 2016, pages 19–24. Institute of Electrical and
Electronics Engineers Inc., 2016.
(doi:10.1109/ICMIT.2016.7605001)
- [3]
- A. Adewumi, S. Misra,
N. Omoregbe, B. Crawford, and
R. Soto.
A systematic literature review of open source software quality assessment
models.
SpringerPlus, 5(1), 2016.
(doi:10.1186/s40064-016-3612-4)
- [4]
- K. Agrawal, M. Aschauer,
T. Thonhofer, S. Bala,
A. Rogge-Solti, and N. Tomsich.
Resource classification from version control system logs.
In 20th IEEE International Enterprise Distributed Object Computing
Workshop, EDOCW 2016, volume 2016-September, pages 249–258. Institute
of Electrical and Electronics Engineers Inc., 2016.
(doi:10.1109/EDOCW.2016.7584383)
- [5]
- M. Allamanis, H. Peng, and
C. Sutton.
A convolutional attention network for extreme summarization of source code.
In 33rd International Conference on Machine Learning, ICML 2016,
volume 5, pages 3043–3052. International Machine Learning Society (IMLS),
2016.
- [6]
- Nicholas John Allen,
Padmanabhan Krishnan, and Bernhard Friedrich
Scholz.
Combining
type-analysis with points-to analysis for analyzing library source-code.
United States Patent 9,336,397, May 2016.
Assignee: Oracle International Corporation (Redwood Shores, CA).
- [7]
- S. Almagor, U. Boker, and
O. Kupferman.
Formally reasoning about quality.
Journal of the ACM, 63(3), 2016.
(doi:10.1145/2875421)
- [8]
- S.S.
Alqahtani, E.E. Eghan, and J. Rilling.
Tracing known security vulnerabilities in software repositories — a semantic
web enabled modeling approach.
Science of Computer Programming, 121:153–175, 2016.
(doi:10.1016/j.scico.2016.01.005)
- [9]
- I.I.
Androulidakis.
Mobile phone security and forensics: A practical approach, second
edition.
Springer International Publishing, 2016.
(doi:10.1007/978-3-319-29742-2)
- [10]
- E. Anstead, S. Benford, and
R. Houghton.
Marath on multi screen: Group television watching and interaction in a
viewing ecology.
In 19th ACM Conference on Computer-Supported Cooperative Work and Social
Computing, CSCW 2016, volume 27, pages 405–417. Association for
Computing Machinery, 2016.
(doi:10.1145/2818048.2820003)
- [11]
- Ö.F.
Arar and K. Ayan.
Deriving thresholds of software metrics to predict faults on open source
software: Replicated case studies.
Expert Systems with Applications, 61:106–121, 2016.
(doi:10.1016/j.eswa.2016.05.018)
- [12]
- M.T.
Aras and Y.E. Selcuk.
Metric and rule based automated detection of antipatterns in object-oriented
software systems.
In 7th International Conference on Computer Science and Information
Technology, CSIT 2016. Institute of Electrical and Electronics
Engineers Inc., 2016.
(doi:10.1109/CSIT.2016.7549470)
- [13]
- F. Arcelli Fontana, M.V.
Mäntylä, M. Zanoni, and A. Marino.
Comparing and experimenting machine learning techniques for code smell
detection.
Empirical Software Engineering, 21(3):1143–1191, 2016.
(doi:10.1007/s10664-015-9378-4)
- [14]
- A. Arunachalam and O. Sornil.
Minimizing redundant messages and improving search efficiency under highly
dynamic mobile P2P network.
Journal of Engineering Science and Technology Review, 9(1):23–35,
2016.
- [15]
- B.S. Barn.
Do you own a Volkswagen? values as non-functional requirements.
IFIP WG 13.2/13.5 Joint 6th International Conference on Human-Centered
Software Engineering, HCSE 2016 and 8th International Conference on Human
Error, Safety, and System Development, HESSD 2016, 9856 LNCS:151–162,
2016.
(doi:10.1007/978-3-319-44902-9_10)
- [16]
- M. Barrantes and
A. Martınez.
Evaluando la creación de pruebas unitarias para un sistema legado mediante
Microsoft fakes y dobles de prueba.
In 19th Ibero-American Conference on Software Engineering, CIBSE
2016, pages 468–477. Universidad de las Fuerzas Armadas ESPE,
2016.
- [17]
- Andrea Basso, Lee Begeja,
David C. Gibbon, Zhu Liu,
Bernard S. Renger, and Behzad Shahraray.
System
and method for temporally adaptive media playback.
United States Patent 9,392,345, July 2016.
Assignee: AT&T Intellectual Property I, L.P. (Atlanta, GA).
- [18]
- S.M.
Bellovin, M. Blaze, and S. Landau.
Insecure surveillance: Technical issues with remote computer searches.
Computer, 49(3):14–24, 2016.
(doi:10.1109/MC.2016.68)
- [19]
- S. Ben Sassi.
Towards a semantic search engine for open source software.
15th International Conference on Software Reuse, ICSR 2016,
9679:300–314, 2016.
(doi:10.1007/978-3-319-35122-3_20)
- [20]
- R.J.
Bille, Y. Lin, and S.K. Chalup.
RTCSS: A framework for developing real-time peer-to-peer web applications.
In Australasian Computer Science Week Multiconference, ACSW 2016,
volume 01-05-February-2016. Association for Computing Machinery, 2016.
(doi:10.1145/2843043.2843377)
- [21]
- K. Blincoe, J. Sheoran,
S. Goggins, E. Petakovic, and
D. Damian.
Understanding the popular users: Following, affiliation influence and
leadership on GitHub.
Information and Software Technology, 70:30–39, 2016.
(doi:10.1016yj/infsof.2015.10.002)
- [22]
- I. Bluemke and
A. Stepień.
Selection of metrics for the defect prediction.
11th International Conference on Dependability and Complex Systems,
DepCoS-RELCOMEX 2016, 470:39–50, 2016.
(doi:10.1007/978-3-319-39639-2_4)
- [23]
- J. Borstler and B. Paech.
The role of method chains and comments in software readability and
comprehension-an experiment.
IEEE Transactions on Software Engineering, 42(9):886–898, 2016.
(doi:10.1109/TSE.2016.2527791)
- [24]
- A. Bottcher, V. Thurner,
K. Schlierkamp, and D. Zehetmeier.
Debugging students' debugging process.
In 46th Annual Frontiers in Education Conference, FIE 2016, volume
2016-November. Institute of Electrical and Electronics Engineers Inc., 2016.
(doi:10.1109/FIE.2016.7757447)
- [25]
- W. Bouaynaya.
Getting theoretical perspective of security built in coupling cloud computing
— open source.
In 21st Symposium of the Association Information and Management 2016, AIM
2016. Association Information and Management, 2016.
- [26]
- Z. Bougroun, A. Zeearaoui,
and T. Bouchentouf.
Comparative study of the quality assessment tools based on a model: Sonar,
Squale, EvalMetrics.
Journal of Computer Science, 12(1):39–47, 2016.
(doi:10.3844/jcssp.2016.39.47)
- [27]
- David D. Brandt, Kenwood
Hall, Mark Burton Anderson, Craig D. Anderson,
and George Bradford Collins.
System
and methodology providing automation security analysis and network intrusion
protection in an industrial environment.
United States Patent 9,412,073, August 2016.
Assignee: ROCKWELL AUTOMATION TECHNOLOGIES, INC. (Mayfield Heights, OH).
- [28]
- G. Canfora, A. Di Sorbo,
F. Mercaldo, and C.A. Visaggio.
Exploring mobile user experience through code quality metrics.
17th International Conference on Product-Focused Software Process
Improvement, PROFES 2016, 10027 LNCS:705–712, 2016.
(doi:10.1007/978-3-319-49094-6_59)
- [29]
- S. Carattini and A. Tavoni.
How green are green economists?
Economics Bulletin, 36(4):2311–2323, 2016.
- [30]
- Casparus Cate, James J.
Fitzgibbon, Robert R. Keller, Jr., James Scott
Murray, Cory Sorice, and Gregory John Stanek.
Barrier
operator feature enhancement.
United States Patent 9,376,851, June 2016.
Assignee: The Chamberlain Group, Inc. (Elmhurst, IL).
- [31]
- W. Cazzola and E. Vacchi.
Language components for modular DSLs using traits.
Computer Languages, Systems and Structures, 45:16–34, 2016.
(doi:10.1016/j.cl.2015.12.001)
- [32]
- M. Challenger, G. Kardas,
and B. Tekinerdogan.
A systematic approach to evaluating domain-specific modeling language
environments for multi-agent systems.
Software Quality Journal, 24(3):755–795, 2016.
(doi:10.1007/s11219-015-9291-5)
- [33]
- M. Challenger, M. Mernik,
G. Kardas, and T. Kosar.
Declarative specifications for the development of multi-agent systems.
Computer Standards and Interfaces, 43:91–115, 2016.
(doi:10.1016/j.csi.2015.08.012)
- [34]
- A. Chatzigeorgiou, T.L.
Theodorou, G.E. Violettas, and S. Xinogalos.
Blending an Android development course with software engineering concepts.
Education and Information Technologies, 21(6):1847–1875, 2016.
(doi:10.1007/s10639-015-9423-3)
- [35]
- M.K.
Chawla and I. Chhabra.
A quantitative framework for integrated software quality measurement in
multi-versions systems.
In 2016 International Conference on Internet of Things and Applications,
IOTA 2016, pages 310–315. Institute of Electrical and Electronics
Engineers Inc., 2016.
(doi:10.1109/IOTA.2016.7562743)
- [36]
- X.-F. Chen
and S.-Z. Yu.
CIPA: A collaborative intrusion prevention architecture for programmable
network and SDN.
Computers and Security, 58:1–19, 2016.
(doi:10.1016/j.cose.2015.11.008)
- [37]
- M. Chen, T. Wang,
C. Yang, Q. Fan, G. Yin, and
H. Wang.
Social computing in open source community: A study of software reuse.
2nd International Conference on Young Computer Scientists, Engineers and
Educators, ICYCSEE 2016, 623:621–631, 2016.
(doi:10.1007/978-981-10-2053-7_55)
- [38]
- Y.C.
Cheng, J.-S. Jwo, and C.-T. Tsai.
A leading indicator of post-release defect density in refactoring-based
software maintenance: A case study.
Journal of Internet Technology, 17(3):589–597, 2016.
(doi:10.6138/JIT.2016.17.3.20151110d)
- [39]
- S. Cherbal, A. Boukerram, and
A. Boubetra.
A survey of DHT solutions in fixed and mobile networks.
International Journal of Communication Networks and Distributed
Systems, 17(1):14–42, 2016.
(doi:10.1504/IJCNDS.2016.077938)
- [40]
- Hana Chockler, Oded Margalit,
Dmitry Pidan, and Sitvanit Ruah.
Directing
verification towards bug-prone portions.
United States Patent 9,389,984, July 2016.
Assignee: International Business Machines Corporation (Armonk, NY).
- [41]
- S. Chodarev and J. Kollar.
Extensible host language for domain-specific languages.
Computing and Informatics, 35(1):84–110, 2016.
- [42]
- T. Choeikiwong and
P. Vateekul.
Two stage model to detect and rank software defects on imbalanced and scarcity
data sets.
IAENG International Journal of Computer Science, 43(3):344–355,
2016.
- [43]
- J. Cohen.
Renaming global variables in C mechanically proved correct.
In 4th International Workshop on Verification and Program Transformation,
VPT 2016, volume 216, pages 50–64. Open Publishing Association, 2016.
(doi:10.4204/EPTCS.216.3)
- [44]
- V. Cosentino, J. Luis,
C. Izquierdo, and J. Cabot.
Findings from GitHub: Methods, datasets and limitations.
In 13th Working Conference on Mining Software Repositories, MSR
2016, pages 137–141. Association for Computing Machinery, Inc, 2016.
(doi:10.1145/2901739.2901776)
- [45]
- Ang
Cui and Salvatore J. Stolfo.
Methods,
systems, and media for inhibiting attacks on embedded devices.
United States Patent 9,392,017, July 2016.
Assignee: The Trustees of Columbia University in the City of New York (New
York, NY).
- [46]
- J. Cunha, J. Paulo Fernandes,
P. Martins, J. Mendes,
R. Pereira, and J. Saraiva.
Evaluating refactorings for spreadsheet models.
Journal of Systems and Software, 118:234–250, 2016.
(doi:10.1016/j.jss.2016.04.043)
- [47]
- Robert Daniel-Wayman,
James Scott Murray, and Cory Jon Sorice.
Remote
guest access to a secured premises.
United States Patent 9,396,598, July 2016.
Assignee: The Chamberlain Group, Inc. (Elmhurst, IL).
- [48]
- S. Delbruel, D. Frey, and
F. Taïani.
Mignon: A fast decentralized content consumption estimation in large-scale
distributed systems.
16th IFIP WG 6.1 International Conference on Distributed Applications and
Interoperable Systems, DAIS 2016 Held as Part of the 11th International
Federated Conference on Distributed Computing Techniques, DisCoTec
2016, 9687:32–46, 2016.
(doi:10.1007/978-3-319-39577-7_3)
- [49]
- K. Deltouzos, I. Gkortsilas,
N. Efthymiopoulos, M. Efthymiopoulou, and
S. Denazis.
SeekStream: Adapting to dynamic user behavior in P2P video-on-demand.
International Journal of Communication Systems, 29(8):1365–1394,
2016.
(doi:10.1002/dac.3105)
- [50]
- S. Desiere.
The carbon footprint of academic conferences: Evidence from the 14th EAAE
congress in slovenia.
EuroChoices, 15(2):56–61, 2016.
(doi:10.1111/1746-692X.12106)
- [51]
- G. Destefanis, M. Ortu,
S. Porru, S. Swift, and
M. Marchesi.
A statistical comparison of Java and python software metric properties.
In 7th International Workshop on Emerging Trends in Software Metrics,
WETSoM 2016, pages 22–28. Association for Computing Machinery, Inc,
2016.
(doi:10.1145/2897695.2897697)
- [52]
- T. Diamantopoulos,
K. Thomopoulos, and A. Symeonidis.
QualBoa: Reusability-aware recommendations of source code components.
In 13th Working Conference on Mining Software Repositories, MSR
2016, pages 488–491. Association for Computing Machinery, Inc, 2016.
(doi:10.1145/2901739.2903492)
- [53]
- L.N.Q. Do,
M. Eichberg, and E. Bodden.
Toward an automated benchmark management system.
In 5th ACM SIGPLAN International Workshop on State Of the Art in Program
Analysis, SOAP 2016, pages 13–17. Association for Computing
Machinery, Inc, 2016.
(doi:10.1145/2931021.2931023)
- [54]
- P.M.
Durai Raj Vincent.
Secured healthcare date exchange using proposed security scheme.
International Journal of Pharmacy and Technology,
8(2):12144–12154, 2016.
- [55]
- C. Ebert, G. Gallardo,
J. Hernantes, and N. Serrano.
DevOps.
IEEE Software, 33(3):94–100, 2016.
(doi:10.1109/MS.2016.68)
- [56]
- G. Einziger, R. Friedman, and
Y. Kantor.
Shades: Expediting kademlia's lookup process.
Computer Networks, 99:37–50, 2016.
(doi:10.1016/j.comnet.2016.01.014)
- [57]
- A. Elbanna and S. Sarker.
The risks of agile software development: Learning from adopters.
IEEE Software, 33(5):72–79, 2016.
(doi:10.1109/MS.2015.150)
- [58]
- H. Ergin, E. Syriani, and
J. Gray.
Design pattern oriented development of model transformations.
Computer Languages, Systems and Structures, 46:106–139, 2016.
(doi:10.1016/j.cl.2016.07.004)
- [59]
- E. Erturk and
E. Akcapinar Sezer.
Iterative software fault prediction with a hybrid approach.
Applied Soft Computing Journal, 49:1020–1033, 2016.
(doi:10.1016/j.asoc.2016.08.025)
- [60]
- D.P. Evangeline and
P. AnandhaKumar.
From P2P to cloud based P2P for live media streaming — a survey.
In 7th International Conference on Advanced Computing, ICoAC 2015.
Institute of Electrical and Electronics Engineers Inc., 2016.
(doi:10.1109/ICoAC.2015.7562809)
- [61]
- Patrick B. Evans and Edward
Sullivan.
Access
control operator diagnostic control.
United States Patent 9,449,449, September 2016.
Assignee: The Chamberlain Group, Inc. (Elmhurst, IL).
- [62]
- O. Fendt, M. Jaeger, and
R.J. Serrano.
Industrial experience with open source software process management.
In 2016 IEEE 40th Annual Computer Software and Applications Conference,
COMPSAC 2016, volume 2, pages 180–185. IEEE Computer Society, 2016.
(doi:10.1109/COMPSAC.2016.138)
- [63]
- James J. Fitzgibbon.
System
interaction with a movable barrier operator method and apparatus.
United States Patent 9,495,815, November 2016.
Assignee: The Chamberlain Group, Inc. (Elmhurst, IL).
- [64]
- M. Fois,
A. Cuena-Lombraña, T. Fristoe,
G. Fenu, and G. Bacchetta.
Reconsidering alternative transportation systems to reach academic conferences
and to convey an example to reduce greenhouse gas emissions.
History and Philosophy of the Life Sciences, 38(4), 2016.
(doi:10.1007/s40656-016-0126-x)
- [65]
- F.A.
Fontana, R. Roveda, S. Vittori,
A. Metelli, S. Saldarini, and
F. Mazzei.
On evaluating the impact of the refactoring of architectural problems on
software quality.
In XP 2016 Scientific Workshops, volume 24-May-2016. Association
for Computing Machinery, 2016.
(doi:10.1145/2962695.2962716)
- [66]
- V. Garci'a-Di'az, J.P.
Espada, E.R. Nunez-Valdez, B.C.P. G-Bustelo,
and J.M.C. Lovelle.
Combining the continuous integration practice and the model-driven engineering
approach.
Computing and Informatics, 35(2):299–337, 2016.
- [67]
- D. Geneiatakis.
Minimizing databases attack surface against SQL injection attacks.
Lecture Notes in Computer Science (including subseries Lecture Notes in
Artificial Intelligence and Lecture Notes in Bioinformatics),
9543:1–9, 2016.
(doi:10.1007/978-3-319-29814-6_1)
- [68]
- O. Georgiou, G. Kalogridis,
H. Yassine, and S. Denic.
Connectivity of cooperative ad hoc networks.
In 2016 IEEE International Conference on Communications, ICC 2016.
Institute of Electrical and Electronics Engineers Inc., 2016.
(doi:10.1109/ICC.2016.7510982)
- [69]
- M. Gómez, R. Rouvoy,
B. Adams, and L. Seinturier.
Reproducing context-sensitive crashes of mobile apps using crowdsourced
monitoring.
In IEEE/ACM International Conference on Mobile Software Engineering and
Systems, MobileSoft 2016, pages 88–99. Association for Computing
Machinery, Inc, 2016.
(doi:10.1145/2897073.2897088)
- [70]
- M.K. Gopal.
Design quality metrics on the package maintainability and reliability of open
source software.
International Journal of Intelligent Engineering and Systems,
9(4):195–204, 2016.
(doi:10.22266/ijies2016.1231.21)
- [71]
- J. Guo,
M. Rahimi, J. Cleland-Huang,
A. Rasin, J.H. Hayes, and
M. Vierhauser.
Cold-start software analytics.
In 13th Working Conference on Mining Software Repositories, MSR
2016, pages 142–153. Association for Computing Machinery, Inc, 2016.
(doi:10.1145/2901739.2901740)
- [72]
- O. Hanappi, W. Hummer, and
S. Dustdar.
Asserting reliable convergence for configuration management scripts.
In 2016 ACM SIGPLAN International Conference on Object-Oriented
Programming, Systems, Languages, and Applications, OOPSLA 2016, volume
02-04-November-2016, pages 328–343. Association for Computing Machinery,
2016.
(doi:10.1145/2983990.2984000)
- [73]
- E. Harjula, A. Gurtov,
T. Koskela, T. Ojala, and
M. Ylianttila.
Energy-aware load monitoring for improving battery life of mobile peer-to-peer
nodes.
Sustainable Computing: Informatics and Systems, 12:43–54, 2016.
(doi:10.1016/j.suscom.2016.09.002)
- [74]
- Y. Hassanzadeh-Nazarabadi,
A. Küpçü, and O. Özkasap.
LARAS: Locality aware replication algorithm for the skip graph.
In 2016 IEEE/IFIP Network Operations and Management Symposium, NOMS
2016, pages 324–332. Institute of Electrical and Electronics
Engineers Inc., 2016.
(doi:10.1109/NOMS.2016.7502828)
- [75]
- R. Hebig, T.H. Quang,
M.R.V. Chaudron, G. Robles, and
M.A. Fernandez.
The quest for open source projects that use UML: Mining GitHub.
In 19th ACM/IEEE International Conference on Model Driven Engineering
Languages and Systems, MODELS 2016, pages 173–183. Association for
Computing Machinery, Inc, 2016.
(doi:10.1145/2976767.2976778)
- [76]
- B. Hoisl and S. Sobernig.
Open-source development tools for domain-specific modeling: Results from a
systematic literature review.
In 49th Annual Hawaii International Conference on System Sciences, HICSS
2016, volume 2016-March, pages 5001–5010. IEEE Computer Society,
2016.
(doi:10.1109/HICSS.2016.620)
- [77]
- J. Hong,
H. Kim, W. Lee, and G. Lee.
TouchRoller: A touch-sensitive cylindrical input device for GUI
manipulation of interactive TVs.
Interacting with Computers, 28(3):293–310, 2016.
(doi:10.1093/iwc/iwv006)
- [78]
- S. Hongqiao.
A research into the ways of innovation of business model under the internet
mindset.
Gummi, Fasern, Kunststoffe, 69(14):1522–1526, 2016.
- [79]
- D. Honsel, V. Honsel,
M. Welter, S. Waack, and
J. Grabowski.
Monitoring software quality by means of simulation methods.
In 10th ACM/IEEE International Symposium on Empirical Software
Engineering and Measurement, ESEM 2016, volume 08-09-September-2016.
IEEE Computer Society, 2016.
(doi:10.1145/2961111.2962617)
- [80]
- C. Hunsen, B. Zhang,
J. Siegmund, C. Kästner,
O. Leßenich, M. Becker, and
S. Apel.
Preprocessor-based variability in open-source and industrial software systems:
An empirical study.
Empirical Software Engineering, 21(2):449–482, 2016.
(doi:10.1007/s10664-015-9360-1)
- [81]
- A. Ioannou and S. Weber.
A survey of caching policies and forwarding mechanisms in information-centric
networking.
IEEE Communications Surveys and Tutorials, 18(4):2847–2886, 2016.
(doi:10.1109/COMST.2016.2565541)
- [82]
- A. Ismail and W. Kastner.
Co-operative peer-to-peer systems for industrial middleware.
In 12th IEEE World Conference on Factory Communication Systems, WFCS
2016, volume 2016-June. Institute of Electrical and Electronics
Engineers Inc., 2016.
(doi:10.1109/WFCS.2016.7496497)
- [83]
- R. Jabangwe, D. Šmite,
and E. Hessbo.
Distributed software development in an offshore outsourcing project: A case
study of source code evolution and quality.
Information and Software Technology, 72:125–136, 2016.
(doi:10.1016/j.infsof.2015.12.005)
- [84]
- R. Jabbari, N.B. Ali,
K. Petersen, and B. Tanveer.
What is DevOps? a systematic mapping study on definitions and practices.
In XP 2016 Scientific Workshops, volume 24-May-2016. Association
for Computing Machinery, 2016.
(doi:10.1145/2962695.2962707)
- [85]
- G. Jaideep and B.P. Battula.
Survey on the present state-of-the-art of P2P networks, their security issues
and counter measures.
International Journal of Applied Engineering Research,
11(1):616–620, 2016.
- [86]
- A. Jain,
S. Tarwani, and A. Chug.
An empirical investigation of evolutionary algorithm for software
maintainability prediction.
In 2016 IEEE Students' Conference on Electrical, Electronics and Computer
Science, SCEECS 2016. Institute of Electrical and Electronics
Engineers Inc., 2016.
(doi:10.1109/SCEECS.2016.7509314)
- [87]
- M. Jankowski-Lorek,
S. Jaroszewicz, Ł. Ostrowski, and
A. Wierzbicki.
Verifying social network models of Wikipedia knowledge community.
Information Sciences, 339:158–174, 2016.
(doi:10.1016/j.ins.2015.12.015)
- [88]
- Y. Jiang, D. Wu, and
P. Liu.
JRed: Program customization and bloatware mitigation based on static
analysis.
In 2016 IEEE 40th Annual Computer Software and Applications Conference,
COMPSAC 2016, volume 1, pages 12–21. IEEE Computer Society, 2016.
(doi:10.1109/COMPSAC.2016.146)
- [89]
- E. Kalliamvakou, J. Weber,
and A. Knauss.
Certification of open source software – a scoping review.
12th IFIP WG 2.13 International Conference on Open Source Systems:
Integrating Communities, OSS 2016, 472:111–122, 2016.
(doi:10.1007/978-3-319-39225-7_9)
- [90]
- N. Kapre and S. Bayliss.
Survey of domain-specific languages for FPGA computing.
In 26th International Conference on Field-Programmable Logic and
Applications, FPL 2016. Institute of Electrical and Electronics
Engineers Inc., 2016.
(doi:10.1109/FPL.2016.7577380)
- [91]
- P. Kathiravelu and L. Veiga.
SENDIM for incremental development of cloud networks: Simulation, emulation
and deployment integration middleware.
In 4th IEEE Annual International Conference on Cloud Engineering, IC2E
2016, pages 143–146. Institute of Electrical and Electronics
Engineers Inc., 2016.
(doi:10.1109/IC2E.2016.22)
- [92]
- A. Kaur,
K. Kaur, and S. Jain.
Predicting software change-proneness with code smells and class imbalance
learning.
In 5th International Conference on Advances in Computing, Communications
and Informatics, ICACCI 2016, pages 746–754. Institute of Electrical
and Electronics Engineers Inc., 2016.
(doi:10.1109/ICACCI.2016.7732136)
- [93]
- A. Kaur,
K. Kaur, and H. Kaur.
Application of machine learning on process metrics for defect prediction in
mobile application.
3rd International Conference on Information Systems Design and
Intelligent Applications, INDIA 2016, 433:81–98, 2016.
(doi:10.1007/978-81-322-2755-7_10)
- [94]
- Angelos D. Keromytis and
Salvatore J. Stolfo.
Systems,
methods, and media for generating bait information for trap-based
defenses.
United States Patent 9,356,957, May 2016.
Assignee: The Trustees of Columbia University in the City of New York (New
York, NY).
- [95]
- Angelos D. Keromytis and
Salvatore J. Stolfo.
Methods,
media, and systems for detecting an anomalous sequence of function calls.
United States Patent 9,450,979, September 2016.
Assignee: The Trustees of Columbia University in the City of New York (New
York, NY).
- [96]
- M. Kessel and C. Atkinson.
Ranking software components for reuse based on non-functional properties.
Information Systems Frontiers, 18(5):825–853, 2016.
(doi:10.1007/s10796-016-9685-3)
- [97]
- Y. Khrishe and M. Alshayeb.
An empirical study on the effect of the order of applying software refactoring.
In 7th International Conference on Computer Science and Information
Technology, CSIT 2016. Institute of Electrical and Electronics
Engineers Inc., 2016.
(doi:10.1109/CSIT.2016.7549471)
- [98]
- D.J. Kim,
M.-S. Yim, V. Sugumaran, and H.R.
Rao.
Web assurance seal services, trust and consumers' concerns: An investigation
of e-commerce transaction intentions across two nations.
European Journal of Information Systems, 25(3):252–273, 2016.
(doi:10.1057/ejis.2015.16)
- [99]
- Brendan Kitts, Brian
Burdick, Dyng Au, and Tyson Roberts.
Method
and system for automatically determining demographics of media assets for
targeting advertisements.
United States Patent 9,426,511, August 2016.
Assignee: ADAP.TV, Inc. (Dulles, VA).
- [100]
- Brendan Kitts, Brian
Burdick, Dyng Au, and Tyson Roberts.
Method
and system for automatically targeting ads to television media using
demographic similarity.
United States Patent 9,432,714, August 2016.
Assignee: ADAP.TV, Inc. (Dulles, VA).
- [101]
- Y. Koroglu, A. Sen,
D. Kutluay, A. Bayraktar,
Y. Tosun, M. Cinar, and H. Kaya.
Defect prediction on a legacy industrial software: A case study on software
with few defects.
In 4th International Workshop on Conducting Empirical Studies in
Industry, CESI 2016 - 38th International Conference on Software Engineering,
ICSE 2016, volume 17-May-2016, pages 14–20. IEEE Computer Society,
2016.
(doi:10.1145/2896839.2896843)
- [102]
- T. Kosar, S. Bohra, and
M. Mernik.
Domain-specific languages: A systematic mapping study.
Information and Software Technology, 71:77–91, 2016.
(doi:10.1016/j.infsof.2015.11.001)
- [103]
- G. Kour
and P. Singh.
Using Lehman's laws to validate the software evolution of agile projects.
In 2016 International Conference on Computational Techniques in
Information and Communication Technologies, ICCTICT 2016, pages
90–96. Institute of Electrical and Electronics Engineers Inc., 2016.
(doi:10.1109/ICCTICT.2016.7514558)
- [104]
- T. Kowark, C. Matthies,
M. Uflacker, and H. Plattner.
Lightweight collection and storage of software repository data with datarover.
In 31st IEEE/ACM International Conference on Automated Software
Engineering, ASE 2016, pages 810–815. Association for Computing
Machinery, Inc, 2016.
(doi:10.1145/2970276.2970286)
- [105]
- K. Kravari and
N. Bassiliades.
DISARM: A social distributed agent reputation model based on defeasible
logic.
Journal of Systems and Software, 117:130–152, 2016.
(doi:10.1016/j.jss.2016.02.016)
- [106]
- O. Kupferman.
On high-quality synthesis.
11th International Computer Science Symposium in Russia, CSR 2016,
9691:1–15, 2016.
(doi:10.1007/978-3-319-34171-2_1)
- [107]
- S. Lampa, J. Alvarsson, and
O. Spjuth.
Towards agile large-scale predictive modelling in drug discovery with
flow-based programming design principles.
Journal of Cheminformatics, 8(1), 2016.
(doi:10.1186/s13321-016-0179-6)
- [108]
- S. Landau.
The real security issues of the iphone case: Law enforcement needs
21st-century investigative savvy.
Science, 352(6292):1398–1399, 2016.
(doi:10.1126/science.aaf7708)
- [109]
- Giovanni Lanfranchi, Scot
Maclellan, Claudio Marinelli, and Luigi
Pichetti.
Management
of mobile devices leveraging location based cooperation.
United States Patent 9,480,086, October 2016.
Assignee: International Business Machines Corporation (Armonk, NY).
- [110]
- Giovanni Lanfranchi, Scot
Maclellan, Claudio Marinelli, and Luigi
Pichetti.
Management
of mobile devices leveraging location based cooperation.
United States Patent 9,485,786, November 2016.
Assignee: International Business Machines Corporation (Armonk, NY).
- [111]
- M. Leppanen, S. Lahtinen, and
P. Ihantola.
Hammer and nails-crucial practices and tools in ad hoc student teams.
In 29th IEEE Conference on Software Engineering Education and Training,
CSEEandT 2016, pages 142–146. Institute of Electrical and Electronics
Engineers Inc., 2016.
(doi:10.1109/CSEET.2016.38)
- [112]
- L. Li,
Y. Qian, K. Du, and Y. Yang.
Analysis of approximately balanced production lines.
International Journal of Production Research, 54(3):647–664,
2016.
(doi:10.1080/00207543.2015.1015750)
- [113]
- L. Li,
Y. Qian, Y. Yang, and K. Du.
A common model for the approximate analysis of tandem queueing systems with
blocking.
IEEE Transactions on Automatic Control, 61(7):1780–1793, 2016.
(doi:10.1109/TAC.2015.2478127)
- [114]
- L. Li,
Y. Qian, Y.M. Yang, and K. Du.
A fast algorithm for buffer allocation problem.
International Journal of Production Research, 54(11):3243–3255,
2016.
(doi:10.1080/00207543.2015.1092612)
- [115]
- Y. Li,
Z.-Q. Huang, Y. Wang, and B.-W.
Fang.
New approach of cross-project defect prediction based on multi-source data.
Jilin Daxue Xuebao (Gongxueban)/Journal of Jilin University (Engineering
and Technology Edition), 46(6):2034–2041, 2016.
(doi:10.13229/j.cnki.jdxbgxb201606037)
- [116]
- Z. Li,
T. Wang, Y. Zhang, Y. Zhan, and
G. Yin.
Query reformulation by leveraging crowd wisdom for scenario-based software
search.
In 8th Asia-Pacific Symposium on Internetware, Internetware 2016,
volume 18-September-2016, pages 36–44. Association for Computing Machinery,
2016.
(doi:10.1145/2993717.2993723)
- [117]
- I.-C.
Liao, Y.-S. Deng, and H.-C. You.
The emotion and personality user perception in multi-screen interaction.
5th International Conference on Design, User Experience, and Usability,
DUXU 2016 Held as Part of 18th International Conference on Human-Computer
Interaction, HCI International 2016, 9747:34–45, 2016.
(doi:10.1007/978-3-319-40355-7_4)
- [118]
- C.-S. Lin
and J.-W. Lin.
UR-aware: Streaming videos over BitTorrent with balanced playback urgency
and rareness distribution.
Peer-to-Peer Networking and Applications, 9(6):1114–1125, 2016.
(doi:10.1007/s12083-015-0399-y)
- [119]
- Y. Lu,
H. Li, and G. Sun.
Distributed microblog crawler system based on P2P.
Jiangsu Daxue Xuebao (Ziran Kexue Ban)/Journal of Jiangsu University
(Natural Science Edition), 37(3):296–301, 2016.
(doi:10.3969/j.issn.1671-7775.2016.03.008)
- [120]
- L.E.
Lwakatare, P. Kuvaja, and M. Oivo.
Relationship of devops to agile, lean and continuous deployment: A multivocal
literature review study.
17th International Conference on Product-Focused Software Process
Improvement, PROFES 2016, 10027 LNCS:399–415, 2016.
(doi:10.1007/978-3-319-49094-6_27)
- [121]
- Robert Scott MacGregor and
Milagrino Jose C. Ong.
Virtual
currency system.
United States Patent 9,398,018, July 2016.
Assignee: NTRUST TECHNOLOGY SOLUTIONS CORP. (Vancouver, CA).
- [122]
- Serguei
Makarov.
Regular
expression support in instrumentation languages using kernel-mode executable
code.
United States Patent 9,405,652, August 2016.
Assignee: RED HAT, INC. (Raleigh, NC).
- [123]
- S. Mäkinen,
M. Leppänen, T. Kilamo, A.-L.
Mattila, E. Laukkanen, M. Pagels, and
T. Männistö.
Improving the delivery cycle: A multiple-case study of the toolchains in
Finnish software intensive enterprises.
Information and Software Technology, 80:1339–1351, 2016.
(doi:10.1016/j.infsof.2016.09.001)
- [124]
- R. Malhotra and A. Chug.
An empirical study to assess the effects of refactoring on software
maintainability.
In 5th International Conference on Advances in Computing, Communications
and Informatics, ICACCI 2016, pages 110–117. Institute of Electrical
and Electronics Engineers Inc., 2016.
(doi:10.1109/ICACCI.2016.7732033)
- [125]
- R. Malhotra and A. Chug.
Software maintainability: Systematic literature review and current trends.
International Journal of Software Engineering and Knowledge
Engineering, 26(8):1221–1253, 2016.
(doi:10.1142/S0218194016500431)
- [126]
- K. Manikas.
Revisiting software ecosystems research: A longitudinal literature study.
Journal of Systems and Software, 117:84–103, 2016.
(doi:10.1016/j.jss.2016.02.003)
- [127]
- T. Maqsood, O. Khalid,
R. Irfan, S.A. Madani, and S.U.
Khan.
Scalability issues in online social networks.
ACM Computing Surveys, 49(2), 2016.
(doi:10.1145/2968216)
- [128]
- S. Matsumoto, K. Okimoto,
T. Kashima, and S. Yamagishi.
Automatic generation of C source code for novice programming education.
18th International Conference on Human-Computer Interaction, HCI
International 2016, 9731:65–76, 2016.
(doi:10.1007/978-3-319-39510-4_7)
- [129]
- T. Matsushita, S. Yamanaka,
and F. Zhao.
A peer-to-peer content-distribution scheme resilient to key leakage.
IEICE Transactions on Information and Systems,
E99D(12):2956–2967, 2016.
(doi:10.1587/transinf.2016PAP0018)
- [130]
- A. Matta and F. Simone.
Analysis of two-machine lines with finite buffer, operation-dependent and
time-dependent failure modes.
International Journal of Production Research, 54(6):1850–1862,
2016.
(doi:10.1080/00207543.2015.1085654)
- [131]
- T. McNamara, S. Shaaban, and
S. Hudson.
Fifty years of the bowl phenomenon.
Journal of Manufacturing Systems, 41:1–7, 2016.
(doi:10.1016/j.jmsy.2016.07.003)
- [132]
- L. Meneses, S. Jayarathna,
R. Furuta, and F. Shipman.
Analyzing the perceptions of change in a distributed collection of web
documents.
In 27th ACM Conference on Hypertext and Social Media, HT 2016,
pages 273–278. Association for Computing Machinery, Inc, 2016.
(doi:10.1145/2914586.2914628)
- [133]
- Ronald Mraz and James Hope.
Enterprise
cross-domain solution having configurable data filters.
United States Patent 9,380,023, June 2016.
Assignee: Owl Computing Technologies, Inc. (Ridgefield, CT).
- [134]
- S.J. Murdoch.
Insecure by design: Protocols for encrypted phone calls.
Computer, 49(3):25–33, 2016.
(doi:10.1109/MC.2016.70)
- [135]
- Raman Narayanan, Ming Liu,
and Paresh S. Suthar.
Enabling
access to rich data by intercepting paste operations.
United States Patent 9,417,933, August 2016.
Assignee: Microsoft Technology Licensing, LLC (Redmond, WA).
- [136]
- P.-W. Ng.
Rapid agile transformation at a large IT organization.
Emerging Innovations in Agile Software Development, pages 85–102,
2016.
(doi:10.4018/978-1-4666-9858-1.ch005)
- [137]
- T. Nguyen, P.C. Rigby,
A.T. Nguyen, M. Karanfil, and
T.N. Nguyen.
T2API: Synthesizing API code usage templates from english texts with
statistical translation.
In 24th ACM SIGSOFT International Symposium on Foundations of Software
Engineering, FSE 2016, volume 13-18-November-2016, pages 1013–1017.
Association for Computing Machinery, 2016.
(doi:10.1145/2950290.2983931)
- [138]
- P. Nicolaescu, K. Jahns,
M. Derntl, and R. Klamma.
Near real-time peer-to-peer shared editing on extensible data types.
In 19th ACM International Conference on Supporting Group Work, GROUP
2016, volume 13-16-November-2016, pages 39–49. Association for
Computing Machinery, 2016.
(doi:10.1145/2957276.2957310)
- [139]
- A.S. Nunez-Varela, H.G.
Perez-Gonzalez, F.E. Martinez-Perez, and
J. Cuevas-Tello.
Building a user oriented application for generic source code metrics extraction
from a metrics framework.
In 4th International Conference in Software Engineering Research and
Innovation, CONISOFT 2016, pages 27–32. Institute of Electrical and
Electronics Engineers Inc., 2016.
(doi:10.1109/CONISOFT.2016.13)
- [140]
- S. Nutbrown and C. Higgins.
Static analysis of programming exercises: Fairness, usefulness and a method
for application.
Computer Science Education, 26(2-3):104–128, 2016.
(doi:10.1080/08993408.2016.1179865)
- [141]
- Dan R.
Olsen, Jr.
Interactive
viewing of sports video.
United States Patent 9,432,629, August 2016.
Assignee: Brigham Young University (Provo, UT).
- [142]
- N.N.
Oosterhof, A.C. Connolly, and J.V. Haxby.
CoSMoMVPA: Multi-modal multivariate pattern analysis of neuroimaging data
in matlab/GNU octave.
Frontiers in Neuroinformatics, 10(JUL), 2016.
(doi:10.3389/fninf.2016.00027)
- [143]
- M. Orrú and M. Marchesi.
Assessment of approaches for the analysis of refactoring activity on software
repositories an empirical study.
In XP 2016 Scientific Workshops, volume 24-May-2016. Association
for Computing Machinery, 2016.
(doi:10.1145/2962695.2962717)
- [144]
- N. Palsetia, G. Deepa,
F. Ahmed Khan, P.S. Thilagam, and
A.R. Pais.
Securing native XML database-driven web applications from XQuery injection
vulnerabilities.
Journal of Systems and Software, 122:93–109, 2016.
(doi:10.1016/j.jss.2016.08.094)
- [145]
- M. Papamichail,
T. Diamantopoulos, and A. Symeonidis.
User-perceived source code quality estimation based on static analysis metrics.
In 2nd IEEE International Conference on Software Quality, Reliability and
Security, QRS 2016, pages 100–107. Institute of Electrical and
Electronics Engineers Inc., 2016.
(doi:10.1109/QRS.2016.22)
- [146]
- P. Pape and D. Hamilton.
Better reliability verification in open-source software using efficient test
cases.
CrossTalk, 29(1):31–36, 2016.
- [147]
- B. Pechaz, M.V. Jahan, and
M. Jalali.
Malware detection using hidden markov model based on markov blanket feature
selection method.
In 2nd International Congress on Technology, Communication and Knowledge,
ICTCK 2015, pages 558–563. Institute of Electrical and Electronics
Engineers Inc., 2016.
(doi:10.1109/ICTCK.2015.7582729)
- [148]
- A. Pereira, M.F. Abreu,
D. Silva, A.C. Alves, J.A.
Oliveira, I. Lopes, and M.C. Figueiredo.
Reconfigurable standardized work in a lean company — a case study.
In 6th International Conference on Changeable, Agile, Reconfigurable and
Virtual Production, CARV 2016, volume 52, pages 239–244. Elsevier
B.V., 2016.
(doi:10.1016/j.procir.2016.07.019)
- [149]
- E. Perel and U. Yechiali.
FINITE TWO LAYERED QUEUEING SYSTEMS.
Probability in the Engineering and Informational Sciences,
30(3):492–513, 2016.
(doi:10.1017/S0269964816000139)
- [150]
- A. Perisic, M. Lazic, and
B. Perisic.
The extensible orchestration framework approach to collaborative design in
architectural, urban and construction engineering.
Automation in Construction, 71(Part 2):210–225, 2016.
(doi:10.1016/j.autcon.2016.08.005)
- [151]
- K. Petridis,
A. Chatzigeorgiou, and E. Stiakakis.
A spatiotemporal data envelopment analysis (S-T DEA) approach: the need to
assess evolving units.
Annals of Operations Research, 238(1-2):475–496, 2016.
(doi:10.1007/s10479-015-2045-8)
- [152]
- A. Pino.
Augmentative and alternative communication systems for the motor disabled.
In Leadership and Personnel Management: Concepts, Methodologies, Tools,
and Applications, volume 2, pages 680–727. IGI Global, 2016.
(doi:10.4018/978-1-4666-9624-2.ch031)
- [153]
- Michalis Polychronakis and
Angelos Keromytis.
Detecting
return-oriented programming payloads by evaluating data for a gadget address
space address and determining whether operations associated with instructions
beginning at the address indicate a return-oriented programming payload.
United States Patent 9,495,541, November 2016.
Assignee: The Trustees of Columbia University in the City of New York (New
York, NY).
- [154]
- P. Qin,
B. Dai, G. Xu, K. Wu, and
B. Huang.
Taking a free ride for routing topology inference in peer-to-peer networks.
Peer-to-Peer Networking and Applications, 9(6):1047–1059, 2016.
(doi:10.1007/s12083-015-0380-9)
- [155]
- D. Qiu,
B. Li, and H. Leung.
Understanding the API usage in Java.
Information and Software Technology, 73:81–100, 2016.
(doi:10.1016/j.infsof.2016.01.011)
- [156]
- K. Raja,
A. Deivasigamani, and V. Ravi.
A reliant certificate revocation of malicious nodes in MANETs.
Wireless Personal Communications, 90(2):435–455, 2016.
(doi:10.1007/s11277-015-3016-8)
- [157]
- B. Reaves, N. Scaife,
D. Tian, L. Blue, P. Traynor,
and K.R.B. Butler.
Sending out an SMS: Characterizing the security of the SMS ecosystem with
public gateways.
In 2016 IEEE Symposium on Security and Privacy, SP 2016, pages
339–356. Institute of Electrical and Electronics Engineers Inc., 2016.
(doi:10.1109/SP.2016.28)
- [158]
- K.A.
Reilley, S.J. Edwardsy, R.S. Peakz, and
D.N. Mavris.
Methodologies for modeling and simulation in model-based systems engineering
tools.
In AIAA Space and Astronautics Forum and Exposition, SPACE 2016.
American Institute of Aeronautics and Astronautics Inc, AIAA, 2016.
- [159]
- M.P. Robillard and
N. Medvidovic.
Disseminating architectural knowledge on open-source projects a case study of
the book architecture of open-source applications.
In 2016 IEEE/ACM 38th IEEE International Conference on Software
Engineering, ICSE 2016, volume 14-22-May-2016, pages 476–487. IEEE
Computer Society, 2016.
(doi:10.1145/2884781.2884792)
- [160]
- J.M.B. Rocamora and J.R.I.
Pedrasa.
Evaluation of hierarchical DHTs to mitigate churn effects in mobile networks.
Computer Communications, 85:41–57, 2016.
(doi:10.1016/j.comcom.2016.02.003)
- [161]
- D. Roosan, G. Del Fiol,
J. Butler, Y. Livnat, J. Mayer,
M. Samore, M. Jones, and
C. Weir.
Feasibility of population health analytics and data visualization for decision
support in the infectious diseases domain: A pilot study.
Applied Clinical Informatics, 7(2):604–623, 2016.
(doi:10.4338/ACI-2015-12-RA-0182)
- [162]
- J.L. Rrushi.
NIC displays to thwart malware attacks mounted from within the OS.
Computers and Security, 61:59–71, 2016.
(doi:10.1016/j.cose.2016.05.002)
- [163]
- J. Ruohonen, S. Hyrynsalmi,
and V. Leppänen.
Exploring the use of deprecated PHP releases in the wild internet: Still a
LAMP issue?
In 6th International Conference on Web Intelligence, Mining and
Semantics, WIMS 2016, volume 13-15-June-2016. Association for
Computing Machinery, 2016.
(doi:10.1145/2912845.2912851)
- [164]
- D. Russo.
Benefits of open source software in defense environments.
4th International Conference in Software Engineering for Defence
Applications, SEDA 2015, 422:123–131, 2016.
(doi:10.1007/978-3-319-27896-4_11)
- [165]
- A. Santos Olmo Parra, L.E.
Sanchez Crespo, E. Alvarez, M. Huerta, and
E. Fernandez Medina Paton.
Methodology for dynamic analysis and risk management on ISO27001.
IEEE Latin America Transactions, 14(6):2897–2911, 2016.
(doi:10.1109/TLA.2016.7555273)
- [166]
- S. Scalabrino,
M. Linares-Vasquez, D. Poshyvanyk, and
R. Oliveto.
Improving code readability models with textual features.
In 24th IEEE International Conference on Program Comprehension, ICPC
2016, volume 2016-July. IEEE Computer Society, 2016.
(doi:10.1109/ICPC.2016.7503707)
- [167]
- S. Schmid, T. Richner,
S. Mangold, and T.R. Gross.
EnLighting: An indoor visible light communication system based on networked
light bulbs.
In 13th Annual IEEE International Conference on Sensing, Communication,
and Networking, SECON 2016. Institute of Electrical and Electronics
Engineers Inc., 2016.
(doi:10.1109/SAHCN.2016.7732989)
- [168]
- J. Schneider, M. Karrenbauer,
M.R. Crippa, and H.D. Schotten.
Efficient spectrum sharing in heterogeneous wireless environments.
Frequenz, 70(5-6):261–279, 2016.
(doi:10.1515/freq-2015-0144)
- [169]
- I. Scholtes, P. Mavrodiev,
and F. Schweitzer.
From Aristotle to Ringelmann: a large-scale analysis of team productivity
and coordination in open source software projects.
Empirical Software Engineering, 21(2):642–683, 2016.
(doi:10.1007/s10664-015-9406-4)
- [170]
- S. Seifermann and H. Groenda.
Survey on textual notations for the Unified Modeling Language.
In 4th International Conference on Model-Driven Engineering and Software
Development, MODELSWARD 2016, pages 28–39. SciTePress, 2016.
- [171]
- Behzad Shahraray, Andrea
Basso, Lee Begeja, David C. Gibbon,
Zhu Liu, and Bernard S. Renger.
System
and method for adaptive media playback based on destination.
United States Patent 9,390,757, July 2016.
Assignee: AT&T Intellectual Property I, L.P. (Atlanta, GA).
- [172]
- P. Shedden, A. Ahmad,
W. Smith, H. Tscherning, and
R. Scheepers.
Asset identification in information security risk assessment: A business
practice approach.
Communications of the Association for Information Systems,
39(1):297–320, 2016.
- [173]
- C. Shi and S.B. Gershwin.
A segmentation approach for solving buffer allocation problems in large
production systems.
International Journal of Production Research, 54(20):6121–6141,
2016.
(doi:10.1080/00207543.2014.991842)
- [174]
- A.P. Shree Madhan, S.B.
Athreya, N. Srinivasan, and C. Lakshmi.
Balancing workload of cloud and dynamic request redirection for cloud based
video services using CDN and data centers.
Research Journal of Pharmaceutical, Biological and Chemical
Sciences, 7(6):1406–1411, 2016.
- [175]
- F. Siegmund, A.H.C. Ng, and
K. Deb.
Hybrid dynamic resampling algorithms for evolutionary multi-objective
optimization of invariant-noise problems.
19th European Conference on Applications of Evolutionary Computation,
EvoApplications 2016, 9598:311–326, 2016.
(doi:10.1007/978-3-319-31153-1_21)
- [176]
- H.M.
Sneed and C. Verhoef.
From software development to software assembly.
IEEE Software, 33(5):80–85, 2016.
(doi:10.1109/MS.2015.78)
- [177]
- S. Sobernig, S. Apel,
S. Kolesnikov, and N. Siegmund.
Quantifying structural attributes of system decompositions in 28
feature-oriented software product lines: An exploratory study.
Empirical Software Engineering, 21(4):1670–1705, 2016.
(doi:10.1007/s10664-014-9336-6)
- [178]
- S. Sobernig, B. Hoisl, and
M. Strembeck.
Extracting reusable design decisions for UML-based domain-specific languages:
A multi-method study.
Journal of Systems and Software, 113:140–172, 2016.
(doi:10.1016/j.jss.2015.11.037)
- [179]
- D.M.
Souza, K.R. Felizardo, and E.F. Barbosa.
A systematic literature review of assessment tools for programming assignments.
In 29th IEEE Conference on Software Engineering Education and Training,
CSEEandT 2016, pages 147–156. Institute of Electrical and Electronics
Engineers Inc., 2016.
(doi:10.1109/CSEET.2016.48)
- [180]
- R.V.
Steiner and E. Lupu.
Attestation in wireless sensor networks: A survey.
ACM Computing Surveys, 49(3), 2016.
(doi:10.1145/2988546)
- [181]
- Salvatore J. Stolfo, Malek
Ben Salem, and Shlomo Hershkop.
Methods,
systems, and media for masquerade attack detection by monitoring computer
user behavior.
United States Patent 9,311,476, April 2016.
Assignee: The Trustees of Columbia University in the City of New York (New
York, NY).
- [182]
- Salvatore J. Stolfo,
Angelos D. Keromytis, Brian M. Bowen,
Shlomo Hershkop, Vasileios P. Kemerlis,
Pratap V. Prabhu, and Malek Ben Salem.
Methods,
systems, and media for baiting inside attackers.
United States Patent 9,501,639, November 2016.
Assignee: The Trustees of Columbia University in the City of New York (New
York, NY).
- [183]
- Edward
Sullivan.
Control
device access method and apparatus.
United States Patent 9,367,978, June 2016.
Assignee: The Chamberlain Group, Inc. (Elmhurst, IL).
- [184]
- P. Szalachowski, L. Chuat,
and A. Perrig.
PKI safety net (PKISN): Addressing the too-big-to-be-revoked problem of
the TLS ecosystem.
In 1st IEEE European Symposium on Security and Privacy, EURO S and P
2016, pages 407–422. Institute of Electrical and Electronics
Engineers Inc., 2016.
(doi:10.1109/EuroSP.2016.38)
- [185]
- S. Tarwani and A. Chug.
Sequencing of refactoring techniques by greedy algorithm for maximizing
maintainability.
In 5th International Conference on Advances in Computing, Communications
and Informatics, ICACCI 2016, pages 1397–1403. Institute of
Electrical and Electronics Engineers Inc., 2016.
(doi:10.1109/ICACCI.2016.7732243)
- [186]
- Michael Thomas and
Gerald Donald Baulier.
Resource
server providing a rapidly changing resource.
United States Patent 9,369,406, June 2016.
Assignee: SAS Institute Inc. (Cary, NC).
- [187]
- Y. Thomas, G. Xylomenos,
C. Tsilopoulos, and G.C. Polyzos.
Multi-flow congestion control with network assistance.
In 2016 IFIP Networking Conference (IFIP Networking) and Workshops, IFIP
Networking 2016, pages 440–448. Institute of Electrical and
Electronics Engineers Inc., 2016.
(doi:10.1109/IFIPNetworking.2016.7497200)
- [188]
- J.-P. Tolvanen and S. Kelly.
Model-driven development challenges and solutions: Experiences with
domain-specific modelling in industry.
In 4th International Conference on Model-Driven Engineering and Software
Development, MODELSWARD 2016, pages 711–719. SciTePress, 2016.
- [189]
- A. Tran Tan, J. Falcou,
D. Etiemble, and H. Kaiser.
Automatic task-based code generation for high performance domain specific
embedded language.
International Journal of Parallel Programming, 44(3):449–465,
2016.
(doi:10.1007/s10766-015-0354-9)
- [190]
- F. Trautsch, S. Herbold,
P. Makedonski, and J. Grabowski.
Adressing problems with external validity of repository mining studies through
a smart data platform.
In 13th Working Conference on Mining Software Repositories, MSR
2016, pages 97–108. Association for Computing Machinery, Inc, 2016.
(doi:10.1145/2901739.2901753)
- [191]
- Hirofumi Ueda and Norihito
Fujita.
Information
sharing system, communication apparatus, control method and computer
program.
United States Patent 9,432,877, August 2016.
Assignee: NEC CORPORATION (Tokyo, JP).
- [192]
- E. Ufuktepe and T. Tuglular.
Automation architecture for bayesian network based test case prioritization and
execution.
In 2016 IEEE 40th Annual Computer Software and Applications Conference,
COMPSAC 2016, volume 2, pages 52–57. IEEE Computer Society, 2016.
(doi:10.1109/COMPSAC.2016.71)
- [193]
- United States House of Representatives.
Committee on Energy and Commerce. Subcommittee on Oversight and
Investigations.
Hearing
on: ``deciphering the debate over encryption: Industry and law enforcement
perspectives''. testimony of Dr. Matthew Blaze.
Available online
http://docs.house.gov/meetings/IF/IF02/20160419/104812/HHRG-114-IF02-Wstate-BlazeM-20160419-U3.pdf,
April 2016.
- [194]
- B. Vasilescu, K. Blincoe,
Q. Xuan, C. Casalnuovo,
D. Damian, P. Devanbu, and
V. Filkov.
The sky is not the limit: Multitasking across github projects.
In 2016 IEEE/ACM 38th IEEE International Conference on Software
Engineering, ICSE 2016, volume 14-22-May-2016, pages 994–1005. IEEE
Computer Society, 2016.
(doi:10.1145/2884781.2884875)
- [195]
- R. Vásquez-Ramırez,
M. Bustos-Lopez, G. Alor-Hernández,
C. Sanchez-Ramırez, and J.L.
Garcıa-Alcaraz.
Athenacloud: A cloud-based platform for multi-device educational software
generation.
Computer Science and Information Systems, 13(3):957–981, 2016.
(doi:10.2298/CSIS160807037V)
- [196]
- L. Veado, G. Vale,
E. Fernandes, and E. Figueiredo.
TDTool: Threshold derivation tool.
In 20th International Conference on Evaluation and Assessment in Software
Engineering, EASE 2016, volume 01-03-June-2016. Association for
Computing Machinery, 2016.
(doi:10.1145/2915970.2916014)
- [197]
- A. Viticchié, C. Basile,
A. Avancini, M. Ceccato,
B. Abrath, and B. Coppens.
Reactive attestation: Automatic detection and reaction to software tampering
attacks.
In 2nd International Workshop on Software PROtection, SPRO 2016,
pages 73–84. Association for Computing Machinery, Inc, 2016.
(doi:10.1145/2995306.2995315)
- [198]
- V. Šešum Čavić,
E. Kühn, and D. Kanev.
Bio-inspired search algorithms for unstructured P2P overlay networks.
Swarm and Evolutionary Computation, 29:73–93, 2016.
(doi:10.1016/j.swevo.2016.03.002)
- [199]
- Z. Wang
and D.E. Perry.
Role distribution and transformation in open source software project teams.
In 22nd Asia-Pacific Software Engineering Conference, APSEC 2015,
volume 2016-May, pages 119–126. IEEE Computer Society, 2016.
(doi:10.1109/APSEC.2015.12)
- [200]
- Rui
Wang, Yuchen Zhou, Shuo Chen,
Shaz Qadeer, and Yuri Gurevich.
Identifying
implicit assumptions associated with a software product.
United States Patent 9,372,785, June 2016.
Assignee: Microsoft Technology Licensing, LLC (Redmond, WA).
- [201]
- H. Wang,
Z. Chen, G. Xiao, and Z. Zheng.
Network of networks in Linux operating system.
Physica A: Statistical Mechanics and its Applications,
447:520–526, 2016.
(doi:10.1016/j.physa.2015.12.084)
- [202]
- E. Wittern, P. Suter, and
S. Rajagopalan.
A look at the dynamics of the JavaScript package ecosystem.
In 13th Working Conference on Mining Software Repositories, MSR
2016, pages 351–361. Association for Computing Machinery, Inc, 2016.
(doi:10.1145/2901739.2901743)
- [203]
- Y. Xie,
Y. Wang, H. He, Y. Xiang,
S. Yu, and X. Liu.
A general collaborative framework for modeling and perceiving distributed
network behavior.
IEEE/ACM Transactions on Networking, 24(5):3162–3176, 2016.
(doi:10.1109/TNET.2015.2512609)
- [204]
- K. Yamashita, C. Huang,
M. Nagappan, Y. Kamei,
A. Mockus, A.E. Hassan, and
N. Ubayashi.
Thresholds for size and complexity metrics: A case study from the perspective
of defect density.
In 2nd IEEE International Conference on Software Quality, Reliability and
Security, QRS 2016, pages 191–201. Institute of Electrical and
Electronics Engineers Inc., 2016.
(doi:10.1109/QRS.2016.31)
- [205]
- N. Yilmaz and K. Dinçer.
Açik kaynak yazilim seçimi için iki boyutlu de v gerlendirme
metodu.
In 10th Turkish National Software Engineering Symposium, UYMS
2016, volume 1721, pages 325–336. CEUR-WS, 2016.
- [206]
- N. Yoshida, T. Saika,
E. Choi, A. Ouni, and K. Inoue.
Revisiting the relationship between code smells and refactoring.
In 24th IEEE International Conference on Program Comprehension, ICPC
2016, volume 2016-July. IEEE Computer Society, 2016.
(doi:10.1109/ICPC.2016.7503738)
- [207]
- A.Z. Yu,
S. Ronen, K. Hu, T. Lu, and
C.A. Hidalgo.
Pantheon 1.0, a manually verified dataset of globally famous biographies.
Scientific Data, 3, 2016.
(doi:10.1038/sdata.2015.75)
- [208]
- L. Yu,
Z. Guan, and S. Ramaswamy.
The effect of time zone difference on asynchronous communications in global
software development.
International Journal of Computer Applications in Technology,
53(3):213–225, 2016.
(doi:10.1504/IJCAT.2016.075523)
- [209]
- F. Zalila, X. Creguty, and
M. Pantely.
A DSL to feedback formal verification results.
In 13th Workshop on Model-Driven Engineering, Verification and
Validation, MoDeVVa 2016, volume 1713, pages 30–39. CEUR-WS,
2016.
- [210]
- F. Zhang, A.E. Hassan,
S. McIntosh, and Y. Zou.
The use of summation to aggregate software metrics hinders the performance of
defect prediction models.
IEEE Transactions on Software Engineering, PP(99), 2016.
(doi:10.1109/TSE.2016.2599161)
- [211]
- Y. Zhang, Y. Jiang,
C. Xu, X. Ma, and P. Yu.
ABC: Accelerated building of C/C++ projects.
In 22nd Asia-Pacific Software Engineering Conference, APSEC 2015,
volume 2016-May, pages 182–189. IEEE Computer Society, 2016.
(doi:10.1109/APSEC.2015.27)
- [212]
- J. Zhao,
G. Shi, and D. Meng.
A survey on the studies of security guard technology for process.
Harbin Gongye Daxue Xuebao/Journal of Harbin Institute of
Technology, 48(5):77–84, 2016.
(doi:10.11918/j.issn.0367-6234.2016.05.012)
- [213]
- Yu Zheng, Yin Lou,
Chengyang Zhang, and Xing Xie.
Route
computation based on route-oriented vehicle trajectories.
United States Patent 9,261,376, February 2016.
Assignee: MICROSOFT TECHNOLOGY LICENSING, LLC (Redmond, WA).
- [214]
- Yu Zheng, Chang Sheng, and
Xing Xie.
Recommending
points of interests in a region.
United States Patent 9,501,577, November 2016.
Assignee: Microsoft Technology Licensing, LLC (Redmond, WA).
- [215]
- J. Zheng, Y. Liu, and
J. Lin.
Exploring DevOps for data analytical system with essential demands
elicitation.
In 28th International Conference on Software Engineering and Knowledge
Engineering, SEKE 2016, volume 2016-January, pages 255–260. Knowledge
Systems Institute Graduate School, 2016.
(doi:10.18293/SEKE2016-220)
- [216]
- B. Zhou
and J. Yu.
Buffer allocation method of serial production lines based on improved ant
colony optimization algorithm.
High Technology Letters, 22(2):113–119, 2016.
(doi:10.3772/j.issn.1006-6748.2016.02.001)