Evaluation of Novel Approaches to Software Engineering: 14th International Conference, ENASE 2019, Heraklion, Crete, Greece, May 4–5, 2019, Revised Selected Papers
暂无分享,去创建一个
Krishna M. Sivalingam | Alfredo Cuzzocrea | Simone Diniz Junqueira Barbosa | Phoebe Chen | Xiaoyong Du | Orhun Kara | Ting Liu | Dominik Ślęzak | Takashi Washio | Leszek A. Maciaszek | Xiaokang Yang | Junsong Yuan | Ernesto Damiani | George Spanoudakis | T. Washio | G. Spanoudakis | D. Ślęzak | Simone Diniz Junqueira Barbosa | Phoebe Chen | A. Cuzzocrea | Xiaoyong Du | Orhun Kara | Ting Liu | K. Sivalingam | Xiaokang Yang | Junsong Yuan | L. Maciaszek | E. Damiani
[1] Anas N. Al-Rabadi,et al. A comparison of modified reconstructability analysis and Ashenhurst‐Curtis decomposition of Boolean functions , 2004 .
[2] Maurice H. Halstead,et al. Elements of software science , 1977 .
[3] Barbara G. Ryder,et al. Constructing the Call Graph of a Program , 1979, IEEE Transactions on Software Engineering.
[4] Roger S. Pressman,et al. Software Engineering: A Practitioner's Approach , 1982 .
[5] Tom DeMarco,et al. Controlling Software Projects: Management, Measurement, and Estimates , 1986 .
[6] G. Guyatt,et al. Clinical Prediction Rules , 2004 .
[7] David Harel,et al. Statecharts: A Visual Formalism for Complex Systems , 1987, Sci. Comput. Program..
[8] Gautam Mitra,et al. Mathematical Models for Decision Support , 1987, NATO ASI Series.
[9] Amnon Naamad,et al. Statemate: a working environment for the development of complex reactive systems , 1988, ICSE '88.
[10] Tadao Murata,et al. Petri nets: Properties, analysis and applications , 1989, Proc. IEEE.
[11] Steven L. Tanimoto,et al. VIVA: A visual language for image processing , 1990, J. Vis. Lang. Comput..
[12] M. Field,et al. Guidelines for Clinical Practice: From Development to Use , 1992 .
[13] Sallie M. Henry,et al. Maintenance metrics for the object oriented paradigm , 1993, [1993] Proceedings First International Software Metrics Symposium.
[14] Michael Löwe,et al. Algebraic Approach to Single-Pushout Graph Transformation , 1993, Theor. Comput. Sci..
[15] Chris F. Kemerer,et al. A Metrics Suite for Object Oriented Design , 2015, IEEE Trans. Software Eng..
[16] Michael von der Beeck,et al. A Comparison of Statecharts Variants , 1994, FTRTFT.
[17] Olly Gotel,et al. An analysis of the requirements traceability problem , 1994, Proceedings of IEEE International Conference on Requirements Engineering.
[18] Martin Hitz,et al. Measuring coupling and cohesion in object-oriented systems , 1995 .
[19] H.-M. Hanisch,et al. Net condition/event systems with multiple condition outputs , 1995, Proceedings 1995 INRIA/IEEE Symposium on Emerging Technologies and Factory Automation. ETFA'95.
[20] Victor R. Basili,et al. A Validation of Object-Oriented Design Metrics as Quality Indicators , 1996, IEEE Trans. Software Eng..
[21] H.-M. Hanisch,et al. Modeling of PLC behavior by means of timed net condition/event systems , 1997, 1997 IEEE 6th International Conference on Emerging Technologies and Factory Automation Proceedings, EFTA '97.
[22] Martín Abadi,et al. A calculus for cryptographic protocols: the spi calculus , 1997, CCS '97.
[23] Third Expert Panel on theDiagnosis,et al. Expert Panel Report 3: Guidelines for the Diagnosis and Management of Asthma , 1997 .
[24] R. Fitzpatrick,et al. The Parkinson's Disease Questionnaire (PDQ-39): development and validation of a Parkinson's disease summary index score. , 1997, Age and ageing.
[25] Victor R. Basili,et al. Measuring the Impact of Reuse on Quality and Productivity in Object-Oriented Systems , 1998 .
[26] René L. Krikhaar,et al. A relational approach to support software architecture analysis , 1998, Softw. Pract. Exp..
[27] James Riely,et al. Resource Access Control in Systems of Mobile Agents , 2002, HLCL.
[28] Eric Badouel,et al. Reconfigurable Nets, a Class of High Level Petri Nets Supporting Dynamic Changes , 1998 .
[29] Rob Pooley,et al. The unified modelling language , 1999, IEE Proc. Softw..
[30] Paulo César Masiero,et al. Mutation testing applied to validate specifications based on statecharts , 1999, Proceedings 10th International Symposium on Software Reliability Engineering (Cat. No.PR00443).
[31] M. Cabana,et al. Why don't physicians follow clinical practice guidelines? A framework for improvement. , 1999, JAMA.
[32] J. Wootton. Clinical practice guidelines. , 1999, Journal of women's health & gender-based medicine.
[33] Luca Cardelli,et al. Secrecy and Group Creation , 2000, CONCUR.
[34] Norman E. Fenton,et al. Software metrics: roadmap , 2000, ICSE '00.
[35] S. Marriott,et al. Disseminating healthcare information: getting the message across , 2000, Quality in health care : QHC.
[36] M. Cabana,et al. Barriers pediatricians face when using asthma practice guidelines. , 2000, Archives of pediatrics & adolescent medicine.
[37] Paramvir Bahl,et al. RADAR: an in-building RF-based user location and tracking system , 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064).
[38] Stephan Merz,et al. Model Checking , 2000 .
[39] Andrew W. Moore,et al. X-means: Extending K-means with Efficient Estimation of the Number of Clusters , 2000, ICML.
[40] Nick Mitchell,et al. Visualizing the Execution of Java Programs , 2001, Software Visualization.
[41] William G. Griswold,et al. An Overview of AspectJ , 2001, ECOOP.
[42] Alastair Baker,et al. Crossing the Quality Chasm: A New Health System for the 21st Century , 2001, BMJ : British Medical Journal.
[43] Rudolf K. Keller,et al. Software visualization tools: survey and analysis , 2001, Proceedings 9th International Workshop on Program Comprehension. IWPC 2001.
[44] Nagraj Balakrishnan,et al. Introduction to configuration management , 2001 .
[45] Jean Bézivin,et al. Towards a precise definition of the OMG/MDA framework , 2001, Proceedings 16th Annual International Conference on Automated Software Engineering (ASE 2001).
[46] Khaled El Emam,et al. The Confounding Effect of Class Size on the Validity of Object-Oriented Metrics , 2001, IEEE Trans. Software Eng..
[47] Giuliano Antoniol,et al. Recovering Traceability Links between Code and Documentation , 2002, IEEE Trans. Software Eng..
[48] S. Krishnan,et al. 2 XLANG : Web Services for Business Process Design , 2002 .
[49] Joseph S. Dumas,et al. Usability in practice: formative usability evaluations - evolution and revolution , 2002, CHI Extended Abstracts.
[50] Christopher S. G. Khoo,et al. The Many Facets of the Cause-Effect Relation , 2002 .
[51] Jan Jürjens,et al. UMLsec: Extending UML for Secure Systems Development , 2002, UML.
[52] Miro Samek,et al. Practical statecharts in C/C++: Quantum programming for embedded systems , 2002 .
[53] Roberto Battiti,et al. Location-aware computing: a neural network model for determining location in wireless LANs , 2002 .
[54] Anna Derezinska. Object-oriented mutation to assess the quality of tests , 2003, 2003 Proceedings 29th Euromicro Conference.
[55] Kent L. Beck,et al. Test-driven Development - by example , 2002, The Addison-Wesley signature series.
[56] Mitchel Resnick,et al. Real-time programming and the big ideas of computational literacy , 2003 .
[57] Stéphane Ducasse,et al. Polymetric Views - A Lightweight Visual Approach to Reverse Engineering , 2003, IEEE Trans. Software Eng..
[58] Bart Du Bois,et al. Describing the impact of refactoring on internal program quality , 2003 .
[59] J. L. Roux. An Introduction to the Kalman Filter , 2003 .
[60] W. Lim,et al. Defining community acquired pneumonia severity on presentation to hospital: an international derivation and validation study , 2003, Thorax.
[61] Rainer Koschke,et al. Journal of Software Maintenance and Evolution: Research and Practice Software Visualization in Software Maintenance, Reverse Engineering, and Re-engineering: a Research Survey , 2022 .
[62] Richard N. Shiffman,et al. Model Formulation: Bridging the Guideline Implementation Gap: A Systematic, Document-Centered Approach to Guideline Implementation , 2004, J. Am. Medical Informatics Assoc..
[63] Kim G. Larsen,et al. A Tutorial on Uppaal , 2004, SFM.
[64] Michele Lanza. CodeCrawler - polymetric views in action , 2004, Proceedings. 19th International Conference on Automated Software Engineering, 2004..
[65] Yann-Gaël Guéhéneuc,et al. A reverse engineering tool for precise class diagrams , 2004, CASCON.
[66] Taghi M. Khoshgoftaar,et al. Unsupervised learning for expert-based software quality estimation , 2004, Eighth IEEE International Symposium on High Assurance Systems Engineering, 2004. Proceedings..
[67] Taghi M. Khoshgoftaar,et al. Analyzing software measurement data with clustering techniques , 2004, IEEE Intelligent Systems.
[68] Tibor Gyimóthy,et al. Empirical validation of object-oriented metrics on open source software for fault prediction , 2005, IEEE Transactions on Software Engineering.
[69] M Mernik,et al. When and how to develop domain-specific languages , 2005, CSUR.
[70] Michael Havey,et al. Essential business process modeling , 2005 .
[71] Julian Rathke,et al. safeDpi: a language for controlling mobile code , 2005, Acta Informatica.
[72] Jean-Marc Jézéquel,et al. Code generation from UML models with semantic variation points , 2005, MoDELS'05.
[73] Janice Singer,et al. NavTracks: supporting navigation in software maintenance , 2005, 21st IEEE International Conference on Software Maintenance (ICSM'05).
[74] Radu Marinescu,et al. Measurement and Quality in Object-Oriented Design , 2005, ICSM.
[75] A. Wasowski. Code Generation and Model Driven Development for Constrained Embedded Sotware , 2005 .
[76] Greg Hamerly,et al. PG-means: learning the number of clusters in data , 2006, NIPS.
[77] M. Kosinski,et al. Asthma Control Test: reliability, validity, and responsiveness in patients not previously followed by asthma specialists. , 2006, The Journal of allergy and clinical immunology.
[78] Ståle Walderhaug,et al. Towards a Generic Solution for Traceability in MDD , 2006 .
[79] Xavier Franch,et al. Extending the ISO/IEC 9126-1 quality model with non-technical factors for COTS components selection , 2006, WoSQ '06.
[80] Daniele Gorla,et al. Role-based access control for a distributed calculus , 2006, J. Comput. Secur..
[81] Julia Rubin,et al. Model traceability , 2006, IBM Syst. J..
[82] Douglas C. Schmidt,et al. Guest Editor's Introduction: Model-Driven Engineering , 2006, Computer.
[83] René Santaolaya Salgado,et al. The Conceptual Coupling Metrics for Object-Oriented Systems , 2006, 2006 22nd IEEE International Conference on Software Maintenance.
[84] Rocco Moretti,et al. Model Driven Architecture (MDA) , 2007 .
[85] M. Trakhtenbrot,et al. New Mutations for Evaluation of Specification and Implementation Levels of Adequacy in Testing of Statecharts Models , 2007, Testing: Academic and Industrial Conference Practice and Research Techniques - MUTATION (TAICPART-MUTATION 2007).
[86] Andrew D. Gordon,et al. A Type Discipline for Authorization in Distributed Systems , 2007, 20th IEEE Computer Security Foundations Symposium (CSF'07).
[87] Matthew Hennessy,et al. A distributed Pi-calculus , 2007 .
[88] Anna Derezińska,et al. Code Generation and Execution Framework for UML 2.0 Classes and State Machines , 2007 .
[89] Joost Visser,et al. A Practical Model for Measuring Maintainability , 2007, 6th International Conference on the Quality of Information and Communications Technology (QUATIC 2007).
[90] Yan Zhang,et al. System Modification Case Studies , 2007, 31st Annual International Computer Software and Applications Conference (COMPSAC 2007).
[91] R. Smith,et al. An Overview of the Tesseract OCR Engine , 2007, Ninth International Conference on Document Analysis and Recognition (ICDAR 2007).
[92] Ajay Chander,et al. JavaScript instrumentation for browser security , 2007, POPL '07.
[93] Erika Asnina,et al. Computation Independent Modeling within the MDA , 2007, IEEE International Conference on Software-Science, Technology & Engineering (SwSTE'07).
[94] Barbara G. Ryder,et al. Heuristic ranking of java program edits for fault localization , 2007, ISSTA '07.
[95] Frederick P. Brooks,et al. "No silver bullet" reloaded: retrospective on "essence and accidents of software engineering" , 2007, OOPSLA '07.
[96] Henrik Kniberg,et al. Scrum and XP from the Trenches: Enterprise Software Development , 2007 .
[97] Philippe Dugerdil,et al. EvoSpaces: 3D Visualization of Software Architecture , 2007, SEKE.
[98] Yan Zhang,et al. CTL Model Update for System Modifications , 2011, J. Artif. Intell. Res..
[99] A. Laukaitis,et al. Investigation of Electromagnetic Wave Absorber Based on Carbon Fiber Reinforced Aerated Concrete, Using Time-Domain Method , 2008 .
[100] Ayse Basar Bener,et al. Software Defect Prediction Using Call Graph Based Ranking (CGBR) Framework , 2008, 2008 34th Euromicro Conference Software Engineering and Advanced Applications.
[101] Christel Baier,et al. Principles of model checking , 2008 .
[102] Adriana B. Compagnoni,et al. Role-based access control for boxed ambients , 2008, Theor. Comput. Sci..
[103] Stefanos Gritzalis,et al. Addressing privacy requirements in system design: the PriS method , 2008, Requirements Engineering.
[104] Enrico Biermann,et al. Independence Analysis of Firing and Rule-based Net Transformations in Reconfigurable Object Nets , 2008, Electron. Commun. Eur. Assoc. Softw. Sci. Technol..
[105] Vitus S. W. Lam. On pi-Calculus Semantics as a Formal Basis for UML Activity Diagrams , 2008, Int. J. Softw. Eng. Knowl. Eng..
[106] J. Jankovic,et al. Movement Disorder Society‐sponsored revision of the Unified Parkinson's Disease Rating Scale (MDS‐UPDRS): Scale presentation and clinimetric testing results , 2008, Movement disorders : official journal of the Movement Disorder Society.
[107] Anneke Kleppe,et al. Software Language Engineering: Creating Domain-Specific Languages Using Metamodels , 2008 .
[108] Rüdiger Lincke,et al. Comparing software metrics tools , 2008, ISSTA '08.
[109] Andrew D. Gordon,et al. Refinement Types for Secure Implementations , 2008, 2008 21st IEEE Computer Security Foundations Symposium.
[110] Michael Backes,et al. Type-checking zero-knowledge , 2008, CCS.
[111] Iakovos S. Venieris,et al. Model-driven development of composite web applications , 2008, iiWAS.
[112] Iakovos S. Venieris,et al. PCP: privacy-aware context profile towards context-aware application development , 2008, iiWAS.
[113] Nicolas Anquetil,et al. A model-driven traceability framework for software product lines , 2010, Software & Systems Modeling.
[114] John Mylopoulos,et al. Design Requirements Engineering: A Ten-Year Perspective , 2009 .
[115] Frank Budinsky,et al. EMF: Eclipse Modeling Framework 2.0 , 2009 .
[116] Randy H. Katz,et al. Above the Clouds: A Berkeley View of Cloud Computing , 2009 .
[117] Yngve Lamo,et al. Dynamic Content Manager - A New Conceptual Model for E-Learning , 2009, WISM.
[118] Benjamin Livshits,et al. GATEKEEPER: Mostly Static Enforcement of Security and Reliability Policies for JavaScript Code , 2009, USENIX Security Symposium.
[119] Jin-hua Li,et al. Mutation Analysis for Testing Finite State Machines , 2009, 2009 Second International Symposium on Electronic Commerce and Security.
[120] Patricia Bouyer,et al. Model-checking Timed Temporal Logics , 2009, M4M.
[121] Patrick Ogao,et al. Evaluation of software visualization tools: Lessons learned , 2009, 2009 5th IEEE International Workshop on Visualizing Software for Understanding and Analysis.
[122] Welf Löwe,et al. Quantitative Evaluation of Software Quality Metrics in Open-Source Projects , 2009, 2009 International Conference on Advanced Information Networking and Applications Workshops.
[123] Ilka Philippow,et al. Getting back to basics: Promoting the use of a traceability information model in practice , 2009, 2009 ICSE Workshop on Traceability in Emerging Forms of Software Engineering.
[124] Anna Derezinska,et al. Interpretation of History Pseudostates in Orthogonal States of UML State Machines , 2009, NGITS.
[125] A. Hasman,et al. Effect of guideline based computerised decision support on decision making of multidisciplinary teams: cluster randomised trial in cardiac rehabilitation , 2009, BMJ : British Medical Journal.
[126] Eric S. K. Yu,et al. A vulnerability-centric requirements engineering framework: analyzing security attacks, countermeasures, and requirements based on vulnerabilities , 2010, Requirements Engineering.
[127] Jeffrey P. Landry,et al. A Risk Assessment Model for Voting Systems using Threat Trees and Monte Carlo Simulation , 2009, 2009 First International Workshop on Requirements Engineering for e-Voting Systems.
[128] Anna Derezinska,et al. Object-Oriented Testing Capabilities and Performance Evaluation of the C# Mutation System , 2009, CEE-SET.
[129] Adrian Rutle,et al. A Diagrammatic Formalisation of MOF-Based Modelling Languages , 2009, TOOLS.
[130] Peter Thiemann,et al. Type Analysis for JavaScript , 2009, SAS.
[131] Michele Bugliesi,et al. A type system for Discretionary Access Control , 2009, Math. Struct. Comput. Sci..
[132] Martin Kardos,et al. Analytical method of CIM to PIM transformation in Model Driven Architecture (MDA) , 2010 .
[133] Tharam S. Dillon,et al. Cloud Computing: Issues and Challenges , 2010, 2010 24th IEEE International Conference on Advanced Information Networking and Applications.
[134] Alexander Sahm,et al. Assisting engineers in switching artifacts by using task semantic and interaction history , 2010, RSSE '10.
[135] Mariangiola Dezani-Ciancaglini,et al. Types for Role-Based Access Control of Dynamic Web Data , 2010, WFLP.
[136] Nancy A. Day,et al. Code generation for a family of executable modelling notations , 2010, Software & Systems Modeling.
[137] Mark B. Trakhtenbrot. Implementation-Oriented Mutation Testing of Statechart Models , 2010, 2010 Third International Conference on Software Testing, Verification, and Validation Workshops.
[138] Evangelos Theodoridis,et al. Code Quality Evaluation Methodology Using The ISO/IEC 9126 Standard , 2010, ArXiv.
[139] Scott R. Klemmer,et al. What would other programmers do: suggesting solutions to error messages , 2010, CHI.
[140] Richard N. Taylor,et al. Software traceability with topic modeling , 2010, 2010 ACM/IEEE 32nd International Conference on Software Engineering.
[141] Lionel C. Briand,et al. An object-oriented high-level design-based class cohesion metric , 2010, Inf. Softw. Technol..
[142] Xiaowei Yang,et al. CloudCmp: comparing public cloud providers , 2010, IMC '10.
[143] Peter Kapec. Visualizing software artifacts using hypergraphs , 2010, SCCG.
[144] John A. Clark,et al. Semantic Mutation Testing , 2010, 2010 Third International Conference on Software Testing, Verification, and Validation Workshops.
[145] Diane J. Cook,et al. Human Activity Recognition and Pattern Discovery , 2010, IEEE Pervasive Computing.
[146] Mohamed Khalgui. NCES-based modelling and CTL-based verification of reconfigurable embedded control systems , 2010, Comput. Ind..
[147] Armands Slihte,et al. Transforming Textual use Cases to a Computation Independent Model , 2010, MDA/MTDD.
[148] Geoffrey E. Hinton,et al. Rectified Linear Units Improve Restricted Boltzmann Machines , 2010, ICML.
[149] Erika Asnina,et al. Computation Independent Models: Bridging Problem and Solution Domains , 2010, MDA/MTDD.
[150] Adrian Rutle,et al. Diagram predicate framework: A formal approach to MDE , 2010 .
[151] Cong Jin,et al. Applications of Support Vector Mathine and Unsupervised Learning for Predicting Maintainability Using Object-Oriented Metrics , 2010, 2010 Second International Conference on Multimedia and Information Technology.
[152] Barbara Kitchenham,et al. What's up with software metrics? - A preliminary mapping study , 2010, J. Syst. Softw..
[153] Ketil Stølen,et al. Model-Driven Risk Analysis - The CORAS Approach , 2010 .
[154] Michael Carl Tschantz,et al. On the Semantics of Purpose Requirements in Privacy Policies , 2011, ArXiv.
[155] Zhiwu Li,et al. Reconfigurable Multiagent Embedded Control Systems: From Modeling to Implementation , 2011, IEEE Transactions on Computers.
[156] Peter A. Dinda,et al. Indoor localization without infrastructure using the acoustic background spectrum , 2011, MobiSys '11.
[157] Gaël Varoquaux,et al. Scikit-learn: Machine Learning in Python , 2011, J. Mach. Learn. Res..
[158] Shahid Ali,et al. Improved Estimation of Trilateration Distances for Indoor Wireless Intrusion Detection , 2011, J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl..
[159] Christine Julien,et al. Comparative evaluation of Received Signal-Strength Index (RSSI) based indoor localization techniques for construction jobsites , 2011, Adv. Eng. Informatics.
[160] Laurie A. Williams,et al. Evaluating Complexity, Code Churn, and Developer Activity Metrics as Indicators of Software Vulnerabilities , 2011, IEEE Transactions on Software Engineering.
[161] Francesco Benzi,et al. Electricity Smart Meters Interfacing the Households , 2011, IEEE Transactions on Industrial Electronics.
[162] P. Mell,et al. The NIST Definition of Cloud Computing , 2011 .
[163] P. Densen. Challenges and opportunities facing medical education. , 2011, Transactions of the American Clinical and Climatological Association.
[164] Mark Harman,et al. An Analysis and Survey of the Development of Mutation Testing , 2011, IEEE Transactions on Software Engineering.
[165] Armands Slihte,et al. Knowledge Integration for Domain Modeling , 2011, MDA/MDSD.
[166] Lingfeng Wang,et al. Smart meters for power grid — Challenges, issues, advantages and status , 2011, 2011 IEEE/PES Power Systems Conference and Exposition.
[167] Erika Asnina,et al. Topological Functioning Model as a CIM-Business Model , 2011, Model-Driven Domain Analysis and Software Development.
[168] H. Klocker,et al. Importance of prostate volume in the European Randomised Study of Screening for Prostate Cancer (ERSPC) risk calculators: results from the prostate biopsy collaborative group , 2011, World Journal of Urology.
[169] Rajkumar Buyya,et al. Cloud Computing Principles and Paradigms , 2011 .
[170] Erika Asnina,et al. Is Modeling a Treatment for the Weakness of Software Engineering? , 2011, Model-Driven Domain Analysis and Software Development.
[171] Zhang Kun,et al. Automatic meter reading system , 2011 .
[172] Mohamed Khalgui,et al. Automatic NCES-based specification and SESA-based verification of feasible control components in benchmark production systems , 2011, Int. J. Model. Identif. Control..
[173] Håkan Burden,et al. Executable and Translatable UML -- How Difficult Can it Be? , 2011, 2011 18th Asia-Pacific Software Engineering Conference.
[174] Taghi M. Khoshgoftaar,et al. Choosing software metrics for defect prediction: an investigation on feature selection techniques , 2011, Softw. Pract. Exp..
[175] I. Rubinstein. Regulating Privacy by Design , 2011 .
[176] Reihaneh Safavi-Naini,et al. Towards defining semantic foundations for purpose-based privacy policies , 2011, CODASPY '11.
[177] Ken W. Collier,et al. Agile Analytics: A Value-Driven Approach to Business Intelligence and Data Warehousing , 2011 .
[178] E. Höfig,et al. Interpretation of Behaviour Models at Runtime: Performance Benchmark and Case Studies , 2011 .
[179] Lennart E. Nacke,et al. From game design elements to gamefulness: defining "gamification" , 2011, MindTrek.
[180] Erika Asnina,et al. Topological Modeling for Model-Driven Domain Analysis and Software Development: Functions and Architectures , 2011, Model-Driven Domain Analysis and Software Development.
[181] Suhaimi Ibrahim,et al. An evaluation of requirements management and traceability tools , 2011 .
[182] José R. Casar,et al. An energy-efficient strategy for combined RSS-PDR indoor localization , 2011, 2011 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops).
[183] Kenton O'Hara,et al. Gamification. using game-design elements in non-gaming contexts , 2011, CHI Extended Abstracts.
[184] Hoon-Jae Lee,et al. Indoor Location Tracking Using Received Signal Strength Indicator , 2011 .
[185] Yajnaseni Dash,et al. Maintainability Prediction of Object Oriented Software System by Using Artificial Neural Network Approach , 2012 .
[186] Eladio Domínguez,et al. A systematic review of code generation proposals from state machine specifications , 2012, Inf. Softw. Technol..
[187] Walid Maalej,et al. Automatically detecting developer activities and problems in software development work , 2012, 2012 34th International Conference on Software Engineering (ICSE).
[188] Erika Asnina,et al. System Thinking for Formal Analysis of Domain Functioning in the Computation Independent Model , 2012, ENASE.
[189] Anna Dereziska,et al. Interpretation Problems in Code Generation from UML State Machines - a Comparative Study , 2012 .
[190] N. S. A. A. Bakar,et al. Validation of measurement tools to extract metrics from open source projects , 2012, 2012 IEEE Conference on Open Systems.
[191] Michael Carl Tschantz,et al. Formalizing and Enforcing Purpose Restrictions in Privacy Policies , 2012, 2012 IEEE Symposium on Security and Privacy.
[192] Tom Mens,et al. On the Complexity of Software Systems , 2012, Computer.
[193] G. Thompson. Clinical Scoring Systems in the Management of Suspected Appendicitis in Children , 2012 .
[194] Ammar Ahmed E. Elhadi,et al. Malware detection based on hybrid signature behavior application programming interface call graph , 2012 .
[195] Adrian Rutle,et al. A formal approach to the specification and transformation of constraints in MDE , 2012, J. Log. Algebraic Methods Program..
[196] Martin Schäf,et al. Grey-box GUI Testing: Efficient Generation of Event Sequences , 2012, ArXiv.
[197] Qian Dong,et al. Evaluation of the reliability of RSSI for indoor localization , 2012, 2012 International Conference on Wireless Communications in Underground and Confined Areas.
[198] Cheng-Long Chuang,et al. High-Precision RSSI-based Indoor Localization Using a Transmission Power Adjustment Strategy for Wireless Sensor Networks , 2012, 2012 IEEE 14th International Conference on High Performance Computing and Communication & 2012 IEEE 9th International Conference on Embedded Software and Systems.
[199] Gareth Halfacree,et al. Raspberry Pi User Guide , 2012 .
[200] Yang Li,et al. Which Traceability Visualization Is Suitable in This Context? A Comparative Study , 2012, REFSQ.
[201] Mike Loukides,et al. What is DevOps , 2012 .
[202] John W. Rice,et al. The Gamification of Learning and Instruction: Game-Based Methods and Strategies for Training and Education , 2012, Int. J. Gaming Comput. Mediat. Simulations.
[203] T. Soni Madhulatha,et al. An Overview on Clustering Methods , 2012, ArXiv.
[204] Dana Petcu,et al. MODAClouds: A model-driven approach for the design and execution of applications on multiple Clouds , 2012, 2012 4th International Workshop on Modeling in Software Engineering (MISE).
[205] Silvia Santini,et al. Occupancy Detection from Electricity Consumption Data , 2013, BuildSys@SenSys.
[206] Yi Zhang,et al. Strategic Traceability for Safety-Critical Projects , 2013, IEEE Software.
[207] Ana R. Cavalli,et al. Using passive testing based on symbolic execution and slicing techniques: Application to the validation of communication protocols , 2013, Comput. Networks.
[208] Arie van Deursen,et al. Evaluating usefulness of software metrics: An industrial experience report , 2013, 2013 35th International Conference on Software Engineering (ICSE).
[209] Hannes Schwarz,et al. Model-Driven Software Development , 2013 .
[210] Li Lin,et al. Smart Meters in Smart Grid: An Overview , 2013, 2013 IEEE Green Technologies Conference (GreenTech).
[211] N. Malik,et al. Experimental study and design of smart energy meter for the smart grid , 2013, 2013 International Renewable and Sustainable Energy Conference (IRSEC).
[212] H. Vincent Poor,et al. Increasing Smart Meter Privacy Through Energy Harvesting and Storage Devices , 2013, IEEE Journal on Selected Areas in Communications.
[213] Hamid Sharif,et al. An efficient security protocol for advanced metering infrastructure in smart grid , 2013, IEEE Network.
[214] Olfa Mosbahi,et al. R-TNCES: A Novel Formalism for Reconfigurable Discrete Event Control Systems , 2013, IEEE Transactions on Systems, Man, and Cybernetics: Systems.
[215] Nan Niu,et al. Supporting requirements traceability through refactoring , 2013, 2013 21st IEEE International Requirements Engineering Conference (RE).
[216] Sean McDirmid,et al. Usable live programming , 2013, Onward!.
[217] Yang Xiao,et al. Exploring Malicious Meter Inspection in Neighborhood Area Smart Grids , 2013, IEEE Transactions on Smart Grid.
[218] Nataliia Bielova. Survey on JavaScript security policies and their enforcement mechanisms in a web browser , 2013, J. Log. Algebraic Methods Program..
[219] Benjamin Livshits,et al. Practical static analysis of JavaScript applications in the presence of frameworks and libraries , 2013, ESEC/FSE 2013.
[220] Bernd Brügge,et al. Monitoring user interactions for supporting failure reproduction , 2013, 2013 21st International Conference on Program Comprehension (ICPC).
[221] Bernhard Turban,et al. Tool-Based Requirement Traceability between Requirement and Design Artifacts , 2013, Springer Fachmedien Wiesbaden.
[222] Anna Derezińska,et al. Towards C# Application Development Using UML State Machines: A Case Study , 2013 .
[223] Jorge Cabral,et al. Path loss exponent analysis in Wireless Sensor Networks: Experimental evaluation , 2013, 2013 11th IEEE International Conference on Industrial Informatics (INDIN).
[224] Ariel Farkash,et al. A Model-Driven Approach to Clinical Practice Guidelines Representation and Evaluation Using Standards , 2013, MedInfo.
[225] Eelco Visser,et al. DSL Engineering - Designing, Implementing and Using Domain-Specific Languages , 2013 .
[226] Konrad Rieck,et al. Structural detection of android malware using embedded call graphs , 2013, AISec.
[227] Empirical Characterization of Propagation Path Loss and Performance Evaluation for Co-Site Urban Environment , 2013 .
[228] Hamid Sharif,et al. A Survey on Smart Grid Communication Infrastructures: Motivations, Requirements and Challenges , 2013, IEEE Communications Surveys & Tutorials.
[229] Lionel C. Briand,et al. Environment modeling and simulation for automated testing of soft real-time embedded software , 2013, Software & Systems Modeling.
[230] Frank Tip,et al. Efficient construction of approximate call graphs for JavaScript IDE services , 2013, 2013 35th International Conference on Software Engineering (ICSE).
[231] Steven L. Tanimoto,et al. A perspective on the evolution of live programming , 2013, 2013 1st International Workshop on Live Programming (LIVE).
[232] H. Vincent Poor,et al. Smart Meter Privacy: A Theoretical Framework , 2013, IEEE Transactions on Smart Grid.
[233] Ibrahim Tekin,et al. Indoor positioning based on global positioning system signals , 2013 .
[234] Ram Rajagopal,et al. Smart Meter Driven Segmentation: What Your Consumption Says About You , 2013, IEEE Transactions on Power Systems.
[235] Prashant J. Shenoy,et al. Non-Intrusive Occupancy Monitoring using Smart Meters , 2013, BuildSys@SenSys.
[236] Wilhelm Hasselbring,et al. Live trace visualization for comprehending large software landscapes: The ExplorViz approach , 2013, 2013 First IEEE Working Conference on Software Visualization (VISSOFT).
[237] C. Meijer,et al. The effect of population aging on health expenditure growth: a critical review , 2013, European Journal of Ageing.
[238] Robert Dabrowski,et al. Magnify - A new tool for software visualization , 2013, 2013 Federated Conference on Computer Science and Information Systems.
[239] Lisa Rajbhandari. Consideration of Opportunity and Human Factor: Required Paradigm Shift for Information Security Risk Management , 2013, 2013 European Intelligence and Security Informatics Conference.
[240] Saifur Rahman,et al. Communication network requirements for major smart grid applications in HAN, NAN and WAN , 2014, Comput. Networks.
[241] Mani B. Srivastava,et al. Inferring occupancy from opportunistically available sensor data , 2014, 2014 IEEE International Conference on Pervasive Computing and Communications (PerCom).
[242] Patrick Mäder,et al. Software traceability: trends and future directions , 2014, FOSE.
[243] Timothy Lethbridge,et al. Enhanced code generation from UML composite state machines , 2014, 2014 2nd International Conference on Model-Driven Engineering and Software Development (MODELSWARD).
[244] Tarcísio da Rocha,et al. Model-based Approach to Automatic Software Deployment in Cloud , 2014, CLOSER.
[245] Mihai Surdeanu,et al. The Stanford CoreNLP Natural Language Processing Toolkit , 2014, ACL.
[246] Tajkia Rahman Toma,et al. An efficient mechanism of generating call graph for JavaScript using dynamic analysis in web application , 2014, 2014 International Conference on Informatics, Electronics & Vision (ICIEV).
[247] Ulises Martinez-Araiza,et al. A CTL model repair method for Petri Nets , 2014, 2014 World Automation Congress (WAC).
[248] Yngve Lamo,et al. Co-ordination of Multiple Metamodels, with Application to Healthcare Systems , 2014, EUSPN/ICTH.
[249] Thomas Fritz,et al. Collecting and Processing Interaction Data for Recommendation Systems , 2014, Recommendation Systems in Software Engineering.
[250] Michael J. Kavis,et al. Architecting the Cloud: Design Decisions for Cloud Computing Service Models (Saas, Paas, and Iaas) , 2014 .
[251] Alexander Serebrenik,et al. Empirical Analysis of the Relationship between CC and SLOC in a Large Corpus of Java Methods , 2014, 2014 IEEE International Conference on Software Maintenance and Evolution.
[252] Prashant J. Shenoy,et al. Combined heat and privacy: Preventing occupancy detection from smart meters , 2014, 2014 IEEE International Conference on Pervasive Computing and Communications (PerCom).
[253] Anjana Gosain,et al. A Survey of Dynamic Program Analysis Techniques and Tools , 2014, FICTA.
[254] Feng Tian,et al. Critical review of vendor lock-in and its impact on adoption of cloud computing , 2014, International Conference on Information Society (i-Society 2014).
[255] David A. Rosenblueth,et al. CTL update of Kripke models through protections , 2014, Artif. Intell..
[256] Leszek . Borzemski. Information systems architecture and technology : contemporary approaches to design and evaluation of information systems , 2014 .
[257] Alexander Egyed,et al. Do developers benefit from requirements traceability when evolving and maintaining a software system? , 2014, Empirical Software Engineering.
[258] Tracy Hall,et al. Researcher Bias: The Use of Machine Learning in Software Defect Prediction , 2014, IEEE Transactions on Software Engineering.
[259] Toni Mastelic,et al. Towards Uniform Management of Cloud Services by Applying Model-Driven Development , 2014, 2014 IEEE 38th Annual Computer Software and Applications Conference.
[260] Zabih Ghassemlooy,et al. Visible light communications: real time 10 Mb/s link with a low bandwidth polymer light-emitting diode. , 2014, Optics express.
[261] Indika Perera,et al. Establishing traceability links among software artefacts , 2014, 2014 14th International Conference on Advances in ICT for Emerging Regions (ICTer).
[262] Nassim Masoudifar,et al. Monitoring occupancy and office equipment energy consumption using real-time location system and wireless energy meters , 2014, Proceedings of the Winter Simulation Conference 2014.
[263] Silvia Santini,et al. Revealing Household Characteristics from Smart Meter Data , 2014 .
[264] Elias Yaacoub,et al. Automatic meter reading in the smart grid using contention based random access over the free cellular spectrum , 2014, Comput. Networks.
[265] Yang Xiao,et al. Robust Localization Algorithm Based on the RSSI Ranging Scope , 2015, Int. J. Distributed Sens. Networks.
[266] Sofiène Tahar,et al. Formal Verification Methods , 2015 .
[267] Allaoua Chaoui,et al. An automatic approach to transform BPMN models to Pi-Calculus , 2015, 2015 IEEE/ACS 12th International Conference of Computer Systems and Applications (AICCSA).
[268] Valeriy Vyatkin,et al. Synthesis of Safety Controllers for Distributed Automation Systems on the Basis of Reverse Safe Net Condition/Event Systems , 2015, 2015 IEEE Trustcom/BigDataSE/ISPA.
[269] P. Schauer,et al. Development of a sleeve gastrectomy risk calculator. , 2015, Surgery for obesity and related diseases : official journal of the American Society for Bariatric Surgery.
[270] Ryo Yanase,et al. Formal verification of dynamically reconfigurable systems , 2015, 2015 IEEE 4th Global Conference on Consumer Electronics (GCCE).
[271] Chiara Ghidini,et al. A Declarative Framework for Specifying and Enforcing Purpose-Aware Policies , 2015, STM.
[272] Anna Derezinska,et al. Mutation Testing Process Combined with Test-Driven Development in .NET Environment , 2015, DepCoS-RELCOMEX.
[273] Weidong Xiao,et al. The meter tells you are at home! Non-intrusive occupancy detection via load curve data , 2015, 2015 IEEE International Conference on Smart Grid Communications (SmartGridComm).
[274] Olfa Mosbahi,et al. GR-TNCES: New extensions of R-TNCES for modelling and verification of flexible systems under energy and memory constraints , 2015, 2015 10th International Joint Conference on Software Technologies (ICSOFT).
[275] Dominik Engel,et al. Influence of Data Granularity on Smart Meter Privacy , 2015, IEEE Transactions on Smart Grid.
[276] Ulises Martinez-Araiza,et al. CTL model repair for bounded and deadlock free Petri nets , 2015 .
[277] Andrija Bernik,et al. Gamification in E-Learning: Introducing Gamified Design Elements into E-Learning Systems , 2015, J. Comput. Sci..
[278] Mohsen Vakilian,et al. A Practical Guide to Analyzing IDE Usage Data , 2015, The Art and Science of Analyzing Software Data.
[279] Wassim Mohamed Boussahel,et al. Modeling and Verification of Reconfigurable and Energy-Efficient Manufacturing Systems , 2015 .
[280] James Lyke,et al. An Introduction to Reconfigurable Systems , 2015, Proceedings of the IEEE.
[281] Olfa Mosbahi,et al. Reconfigurable Coordination of Distributed Discrete Event Control Systems , 2015, IEEE Transactions on Control Systems Technology.
[282] Josune Hernantes,et al. Infrastructure as a Service and Cloud Technologies , 2015, IEEE Software.
[283] Nobuko Yoshida,et al. Protocols by Default - Safe MPI Code Generation Based on Session Types , 2015, CC.
[284] Melanie Swan,et al. Blockchain: Blueprint for a New Economy , 2015 .
[285] Jie Liu,et al. A realistic evaluation and comparison of indoor location technologies: experiences and lessons learned , 2015, IPSN.
[286] Wilhelm Hasselbring,et al. Exploring software cities in virtual reality , 2015, 2015 IEEE 3rd Working Conference on Software Visualization (VISSOFT).
[287] Mohammad Alshayeb,et al. Software defect prediction using ensemble learning on selected features , 2015, Inf. Softw. Technol..
[288] Andrea Bondavalli,et al. Towards a UML Profile for Privacy-Aware Applications , 2015, 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing.
[289] Jimmy Ba,et al. Adam: A Method for Stochastic Optimization , 2014, ICLR.
[290] Frank Tip,et al. Static analysis of event-driven Node.js JavaScript applications , 2015, OOPSLA.
[291] J. F. Avila-Tomas,et al. Effectiveness of a game-based educational strategy e-EDUCAGUIA for implementing antimicrobial clinical practice guidelines in family medicine residents in Spain: a randomized clinical trial by cluster , 2022, BMC medical education.
[292] Prashant J. Shenoy,et al. Preventing Occupancy Detection From Smart Meters , 2015, IEEE Transactions on Smart Grid.
[293] Chris Parnin,et al. Virtual Reality in Software Engineering: Affordances, Applications, and Challenges , 2015, 2015 IEEE/ACM 37th IEEE International Conference on Software Engineering.
[294] J. Antonio García-Macías,et al. Abnormal Behavioral Patterns Detection from Activity Records of Institutionalized Older Adults , 2015, HBU.
[295] Valeriy Vyatkin,et al. Counterexample-guided simulation framework for formal verification of flexible automation systems , 2015, 2015 IEEE 13th International Conference on Industrial Informatics (INDIN).
[296] Christian Neureiter,et al. Privacy-relevant smart metering use cases , 2015, 2015 IEEE International Conference on Industrial Technology (ICIT).
[297] Zhenyu Na,et al. Extended Kalman Filter for Real Time Indoor Localization by Fusing WiFi and Smartphone Inertial Sensors , 2015, Micromachines.
[298] Anurag Dwivedi,et al. An approach for estimating cyber attack level of effort , 2015, 2015 Annual IEEE Systems Conference (SysCon) Proceedings.
[299] Maria Spichkova,et al. Enhancing learning experience by collaborative industrial projects , 2016 .
[300] Joanna Strug. Applying mutation testing for assessing test suites quality at model level , 2016, 2016 Federated Conference on Computer Science and Information Systems (FedCSIS).
[301] Matthes Elstermann,et al. Automatic Tool Support Possibilities for the Text-Based S-BPM Process Modelling Methodology , 2016, S-BPM ONE.
[302] Yunsick Sung. RSSI-Based Distance Estimation Framework Using a Kalman Filter for Sustainable Indoor Computing Environments , 2016 .
[303] Jaspaljeet Singh Dhillon,et al. A systematic review of factors influencing the effective use of mHealth apps for self-care , 2016, 2016 3rd International Conference on Computer and Information Sciences (ICCOINS).
[304] Willem F. G. Haselager,et al. Human SLAM, Indoor Localisation of Devices and Users , 2016, 2016 IEEE First International Conference on Internet-of-Things Design and Implementation (IoTDI).
[305] Fevzi Belli,et al. Model-based mutation testing - Approach and case studies , 2016, Sci. Comput. Program..
[306] Mohamed Khalgui,et al. ZiZo: A Complete Tool Chain for the Modeling and Verification of Reconfigurable Function Blocks , 2016 .
[307] Bayu Hendradjaya,et al. Reverse engineering of source code to sequence diagram using abstract syntax tree , 2016, 2016 International Conference on Data and Software Engineering (ICoDSE).
[308] Roel Wieringa,et al. ArgueSecure: Out-of-the-Box Security Risk Assessment , 2016, 2016 IEEE 24th International Requirements Engineering Conference Workshops (REW).
[309] R. Simon,et al. Improvement in Asthma Control Using a Minimally Burdensome and Proactive Smartphone Application. , 2016, The journal of allergy and clinical immunology. In practice.
[310] Reiner R. Dumke,et al. Big Data Benefits for the Software Measurement Community , 2016, 2016 Joint Conference of the International Workshop on Software Measurement and the International Conference on Software Process and Product Measurement (IWSM-MENSURA).
[311] Mohamed Khalgui,et al. Verification of Reconfigurable NoC under Quality of Service Constraints , 2016, 2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC).
[312] Guigang Zhang,et al. Deep Learning , 2016, Int. J. Semantic Comput..
[313] Xi Wang,et al. Dynamic Multiple-Period Reconfiguration of Real-Time Scheduling Based on Timed DES Supervisory Control , 2016, IEEE Transactions on Industrial Informatics.
[314] Sean McDirmid. The Promise of Live Programming , 2016 .
[315] Martin J. Tunnicliffe,et al. A layered defense mechanism for a social engineering aware perimeter , 2016, 2016 SAI Computing Conference (SAI).
[316] Mohamed Yassine Haouam,et al. Towards Automated Traceability Maintenance in Model Driven Engineering , 2016 .
[317] Philip Samuel,et al. Object Oriented Method to Implement the Hierarchical and Concurrent States in UML State Chart Diagrams , 2016 .
[318] Jason Jianjun Gu,et al. Deep Neural Networks for wireless localization in indoor and outdoor environments , 2016, Neurocomputing.
[319] Bashar Nuseibeh,et al. Privacy-by-Design Framework for Assessing Internet of Things Applications and Platforms , 2016, IOT.
[320] Rahul Dev Garg,et al. Regional electricity consumption analysis for consumers using data mining techniques and consumer meter reading data , 2016 .
[321] Nesreen I. Ziedan,et al. Effects of Walls and Floors in Indoor Localization Using Tracking Algorithm , 2016 .
[322] David S. Linthicum. Understanding Complex Cloud Patterns , 2016, IEEE Cloud Computing.
[323] Bram Adams,et al. Who Needs Release and DevOps Engineers, and Why? , 2016, 2016 IEEE/ACM International Workshop on Continuous Software Evolution and Delivery (CSED).
[324] Kristin Decker,et al. Uml Distilled A Brief Guide To The Standard Object Modeling Language , 2016 .
[325] Chokri Ben Amar,et al. Models and mechanisms for implementing playful scenarios , 2016, 2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA).
[326] Fritz Solms,et al. Synchronized Agile , 2016, SAICSIT '16.
[327] Tetiana Hovorushchenko,et al. Evaluation of mutual influences of software quality characteristics based ISO 25010:2011 , 2016, 2016 XIth International Scientific and Technical Conference Computer Sciences and Information Technologies (CSIT).
[328] Jörgen Hansson,et al. Model-based engineering in the embedded systems domain: an industrial survey on the state-of-practice , 2018, Software & Systems Modeling.
[329] Ernesto López-Mellado,et al. CTL Model Repair for Inter-organizational Business Processes Modelled as oWFN , 2016 .
[330] Abram Hindle,et al. Visualizing Project Evolution through Abstract Syntax Tree Analysis , 2016, 2016 IEEE Working Conference on Software Visualization (VISSOFT).
[331] Cesare Bartolini,et al. Software Testing Techniques Revisited for OWL Ontologies , 2016, MODELSWARD.
[332] Lionel M. Ni,et al. A Survey on Wireless Indoor Localization from the Device Perspective , 2016, ACM Comput. Surv..
[333] Padma Iyenghar,et al. A model-based framework encompassing a complete workflow from specification until validation of timing requirements in embedded software systems , 2016, Software Quality Journal.
[334] Tomas Olovsson,et al. A Risk Assessment Framework for Automotive Embedded Systems , 2016, CPSS@AsiaCCS.
[335] Mohamed Talea,et al. Automation in code generation: Tertiary and systematic mapping review , 2016, 2016 4th IEEE International Colloquium on Information Science and Technology (CiSt).
[336] Lech Madeyski,et al. Factors influencing user story estimations: an industrial interview and a conceptual model , 2016 .
[337] Samir Bourekkache,et al. Designing reconfigurable manufacturing systems using reconfigurable object Petri nets , 2016, Int. J. Comput. Integr. Manuf..
[338] K. Harald Gjermundrød,et al. privacyTracker: A Privacy-by-Design GDPR-Compliant Framework with Verifiable Data Traceability Controls , 2016, ICWE Workshops.
[339] Mirko Perkusich,et al. A systematic review on the use of Definition of Done on agile software development projects , 2017, EASE.
[340] N. Pereira-Azevedo,et al. Rotterdam Prostate Cancer Risk Calculator: Development and Usability Testing of the Mobile Phone App , 2017, JMIR cancer.
[341] Mark B. Trakhtenbrot. Mutation Patterns for Temporal Requirements of Reactive Systems , 2017, 2017 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW).
[342] Andrei Vasilateanu,et al. Cyber-physical system for assisted living and home monitoring , 2017, 2017 13th IEEE International Conference on Intelligent Computer Communication and Processing (ICCP).
[343] Christian Wimmer,et al. Practical partial evaluation for high-performance dynamic language runtimes , 2017, PLDI.
[344] Bernhard K. Aichernig,et al. Statistical Model Checking Meets Property-Based Testing , 2017, 2017 IEEE International Conference on Software Testing, Verification and Validation (ICST).
[345] Mohammad Ghafari,et al. CityVR: Gameful Software Visualization , 2017, 2017 IEEE International Conference on Software Maintenance and Evolution (ICSME).
[346] Dimitrios Kouzapas,et al. Privacy by typing in the π-calculus , 2017, Log. Methods Comput. Sci..
[347] Shashikala Tapaswi,et al. RSSI based adaptive indoor location tracker , 2017 .
[348] Erika Nazaruka,et al. Meaning of Cause-and-effect Relations of the Topological Functioning Model in the UML Analysis Model , 2017, ENASE.
[349] D. A. Meedeniya,et al. Tool support for traceability management of software artefacts with DevOps practices , 2017, 2017 Moratuwa Engineering Research Conference (MERCon).
[350] Johannes Schneider,et al. Mining Sequences of Developer Interactions in Visual Studio for Usage Smells , 2017, IEEE Transactions on Software Engineering.
[351] Olfa Mosbahi,et al. New Verification Approach for Reconfigurable Distributed Systems , 2017, ICSOFT.
[352] Vitaly Herasevich,et al. Automating Clinical Score Calculation within the Electronic Health Record , 2017, Applied Clinical Informatics.
[353] Torgeir Dingsøyr,et al. Emerging research themes and updated research agenda for large-scale agile development: a summary of the 5th international workshop at XP2017 , 2017, XP Workshops.
[354] Milan Simic,et al. Autonomous Systems Research Embedded in Teaching , 2018, IIMSS.
[355] Deepak L. Bhatt,et al. Individualized Metabolic Surgery Score: Procedure Selection Based on Diabetes Severity , 2017, Annals of surgery.
[356] Olfa Mosbahi,et al. BROMETH: Methodology to design safe reconfigurable medical robotic systems , 2017, The international journal of medical robotics + computer assisted surgery : MRCAS.
[358] Francesco Ricci,et al. A context model for IDE-based recommendation systems , 2017, J. Syst. Softw..
[359] Jean-Marc Jézéquel,et al. Model Driven Engineering , 2017, Encyclopedia of GIS.
[360] Jungho Kim,et al. Machine Learning Frameworks for Automated Software Testing Tools : A Study , 2017 .
[361] Simona Motogna,et al. Discovering maintainability changes in large software systems , 2017, IWSM-Mensura.
[362] Matthew Ormsby,et al. A Standardized Procedure to Conceptualizing and Completing User Stories , 2017, 2017 International Conference on Computational Science and Computational Intelligence (CSCI).
[363] Mike Hintze,et al. Meeting Upcoming GDPR Requirements While Maximizing the Full Value of Data Analytics , 2017 .
[364] Antonius Rachmat Chrismanto,et al. Recurrent neural networks model for WiFi-based indoor positioning system , 2017, 2017 International Conference on Smart Cities, Automation & Intelligent Computing Systems (ICON-SONICS).
[365] P. Schauer,et al. Who Should Get Extended Thromboprophylaxis After Bariatric Surgery?: A Risk Assessment Tool to Guide Indications for Post-discharge Pharmacoprophylaxis , 2015, Annals of surgery.
[366] Dominik Huth,et al. A Pattern Catalog for GDPR Compliant Data Protection , 2017, PoEM Doctoral Consortium.
[367] Fabio Massacci,et al. On the Equivalence Between Graphical and Tabular Representations for Security Risk Assessment , 2017, REFSQ.
[368] Chunhui Wang,et al. System Testing of Timing Requirements Based on Use Cases and Timed Automata , 2017, 2017 IEEE International Conference on Software Testing, Verification and Validation (ICST).
[369] Paolo Giorgini,et al. Toward GDPR-Compliant Socio-Technical Systems: Modeling Language and Reasoning Framework , 2017, PoEM.
[370] Patrick Mäder,et al. Preventing Defects: The Impact of Requirements Traceability Completeness on Software Quality , 2017, IEEE Transactions on Software Engineering.
[371] Mikhail A. Dziadzko,et al. Towards automated calculation of evidence-based clinical scores , 2017, World journal of methodology.
[372] Ramón F. Brena,et al. Evolution of Indoor Positioning Technologies: A Survey , 2017, J. Sensors.
[373] Oliver E. Theel,et al. An Improved BLE Indoor Localization with Kalman-Based Fusion: An Experimental Study , 2017, Sensors.
[374] Paolo Arcaini,et al. Formal Design and Verification of Self-Adaptive Systems with Decentralized Control , 2017, ACM Trans. Auton. Adapt. Syst..
[375] Maria Spichkova,et al. Modelling and Implementation of Humanoid Robot Behaviour , 2017, KES.
[376] Janis Osis,et al. Joint Usage of Frames and the Topological Functioning Model for Domain Knowledge Presentation and Analysis , 2017, ENASE.
[377] Max Mühlhäuser,et al. Systemic Risk Analysis Through SE Methods And Techniques , 2017, CIISE.
[378] Jan Pries-Heje,et al. The SAFe way to the agile organization , 2017, XP Workshops.
[379] Silvia Mara Abrahão,et al. An Infrastructure Modelling Tool for Cloud Provisioning , 2017, 2017 IEEE International Conference on Services Computing (SCC).
[380] Andrei Vasilateanu,et al. A Quantitative Research to Decide the User Requirements for the i-Light System , 2017, 2017 21st International Conference on Control Systems and Computer Science (CSCS).
[381] Fatemeh Ghassemi,et al. Purpose-Based Policy Enforcement in Actor-Based Systems , 2017, FSEN.
[382] Fernando Castor Filho,et al. Visualizing Swift Projects as Cities , 2017, 2017 IEEE/ACM 39th International Conference on Software Engineering Companion (ICSE-C).
[383] Marina Md Din,et al. An improved indoor location technique using Kalman Filter , 2018 .
[384] Maritta Heisel,et al. A Systematic Method to Describe and Identify Security Threats Based on Functional Requirements , 2018, CRiSIS.
[385] A. Samková,et al. Improving Electromagnetic Shielding Ability of Plaster-Based Composites by Addition of Carbon Fibers , 2018, Advances in Materials Science and Engineering.
[386] Zibin Zheng,et al. Blockchain challenges and opportunities: a survey , 2018, Int. J. Web Grid Serv..
[387] Sebastian Herold,et al. Exploring the suitability of source code metrics for indicating architectural inconsistencies , 2018, Software Quality Journal.
[388] Dong Wang,et al. Enhancing the user experience with vertical transportation solutions , 2018, KES.
[389] Yu Pang,et al. Indoor Positioning Algorithm Based on the Improved RSSI Distance Model , 2018, Sensors.
[390] Yuwei Zhang,et al. Software Development for Autonomous and Social Robotics Systems , 2018, IIMSS.
[391] Maria Spichkova,et al. Automated Analysis of the Impact of Weather Conditions on Medicine Consumption , 2018, 2018 25th Australasian Software Engineering Conference (ASWEC).
[392] Anna Derezinska,et al. Approaches to Semantic Mutation of Behavioral State Machines in Model-Driven Software Development , 2018, 2018 Federated Conference on Computer Science and Information Systems (FedCSIS).
[393] George D. Magoulas,et al. The cloudUPDRS app: A medical device for the clinical assessment of Parkinson's Disease , 2018, Pervasive Mob. Comput..
[394] Haiyang Sun,et al. Efficient dynamic analysis for Node.js , 2018, CC.
[395] Søren Debois,et al. On Purpose and by Necessity: Compliance Under the GDPR , 2018, Financial Cryptography.
[396] Kai Petersen,et al. A Preliminary Checklist for Capturing Baseline Situations in Studying the Impacts of Agile Practices Introduction , 2018, 2018 IEEE/ACM 6th International Workshop on Conducting Empirical Studies in Industry (CESI).
[397] Haralambos Mouratidis,et al. Risk-aware decision support with constrained goal models , 2018, Inf. Comput. Secur..
[398] Sudeep Pasricha,et al. Adapting Convolutional Neural Networks for Indoor Localization with Smart Mobile Devices , 2018, ACM Great Lakes Symposium on VLSI.
[399] Ting Qu,et al. Analysis and Control of Dynamic Reconfiguration Processes of Manufacturing Systems , 2018, IEEE Access.
[400] Janis Osis,et al. Determination of Natural Language Processing Tasks and Tools for Topological Functioning Modelling , 2018, ENASE.
[401] Andreas Unterweger,et al. Detecting Swimming Pools in 15-Minute Load Data , 2018, 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE).
[402] João Pascoal Faria,et al. A Reactive and Model-Based Approach for Developing Internet-of-Things Systems , 2018, 2018 11th International Conference on the Quality of Information and Communications Technology (QUATIC).
[403] Mohamed Khalgui,et al. Automatic Properties Classification Approach for Guiding the Verification of Complex Reconfigurable Systems , 2018, ICSOFT.
[404] Julia Padberg,et al. Overview of Reconfigurable Petri Nets , 2018, Graph Transformation, Specifications, and Nets.
[405] Andrija Bernik,et al. Measurement of the effects of e-learning courses gamification on motivation and satisfaction of students , 2018, 2018 41st International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO).
[406] Pietro Ferrara,et al. Static Analysis for GDPR Compliance , 2018, ITASEC.
[407] Thomas A. Henzinger,et al. Handbook of Model Checking , 2018, Springer International Publishing.
[408] Xing Zhao,et al. SMI: Stack Management Interface , 2018, 2018 23rd International Conference on Engineering of Complex Computer Systems (ICECCS).
[409] Dominik Engel,et al. Unsupervised Holiday Detection from Low-resolution Smart Metering Data , 2018, ICISSP.
[410] Jan Jürjens,et al. Supporting privacy impact assessment by model-based privacy analysis , 2018, SAC.
[411] Olfa Mosbahi,et al. Multiagent Architecture for Distributed Adaptive Scheduling of Reconfigurable Real-Time Tasks With Energy Harvesting Constraints , 2018, IEEE Access.
[412] Georgia M. Kapitsaki,et al. Linked USDL Privacy: Describing Privacy Policies for Services , 2018, 2018 IEEE International Conference on Web Services (ICWS).
[413] Beatriz A. Sanchez. Context-aware traceability across heterogeneous modelling environments , 2018, MoDELS Companion.
[414] Janis Osis,et al. Verification of Causality in the Frame System based on the Topological Functioning Modelling , 2018, ENASE.
[415] Agustí Verde Parera,et al. General data protection regulation , 2018 .
[416] Ross MacDonald,et al. Software Defect Prediction from Code Quality Measurements via Machine Learning , 2018, Canadian Conference on AI.
[417] Markus Endler,et al. Deklaer: An Ontology-Driven Framework for Generating IoT Applications using ContextNet , 2018, 2018 IEEE Symposium on Computers and Communications (ISCC).
[418] Constantinos Patsakis,et al. Forgetting personal data and revoking consent under the GDPR: Challenges and proposed solutions , 2018, J. Cybersecur..
[419] Stéphane Maag,et al. A Novel Formal Approach to Automatically Suggest Metrics in Software Measurement Plans , 2018, ENASE.
[420] Lihua Xie,et al. Building occupancy estimation and detection: A review , 2018, Energy and Buildings.
[421] Iuliana Marin,et al. i-Light—Intelligent Luminaire Based Platform for Home Monitoring and Assisted Living , 2018, Electronics.
[422] Petros Spachos,et al. RSSI-Based Indoor Localization With the Internet of Things , 2018, IEEE Access.
[423] Duarte Pinto,et al. Dynamic Allocation of Serverless Functions in IoT Environments , 2018, 2018 IEEE 16th International Conference on Embedded and Ubiquitous Computing (EUC).
[424] Ke Huang,et al. A Hybrid Method to Improve the BLE-Based Indoor Positioning in a Dense Bluetooth Environment , 2019, Sensors.
[425] Xiaohui Liang,et al. Energy Theft Detection With Energy Privacy Preservation in the Smart Grid , 2019, IEEE Internet of Things Journal.
[426] Benjamin Sovacool,et al. Further reflections on vulnerability and resistance in the United Kingdom's smart meter transition , 2019, Energy Policy.
[427] Mohamed Khalgui,et al. On Improved Verification of Reconfigurable Real-Time Systems , 2019, ENASE.
[428] Zoltán Herczeg,et al. Evaluation and Comparison of Dynamic Call Graph Generators for JavaScript , 2019, ENASE.
[429] Maria Spichkova,et al. Industry-Oriented Project-Based Learning of Software Engineering , 2019, 2019 24th International Conference on Engineering of Complex Computer Systems (ICECCS).
[430] Matthew Ormsby,et al. Scaling a Standardized Procedure to Conceptualizing and Completing User Stories across Scrum Teams and Industries , 2019, ENASE.
[431] Maria Spichkova,et al. Easy Mobile Meter Reading for Non-smart Meters: Comparison of AWS Rekognition and Google Cloud Vision Approaches , 2019, ENASE.
[432] Takuro Yonezawa,et al. Basic Study of BLE Indoor Localization using LSTM-based Neural Network (poster) , 2019, MobiSys.
[433] G. Kurdi,et al. Ontology-Based Generation of Medical, Multi-term MCQs , 2019, International Journal of Artificial Intelligence in Education.
[434] Ademar Aguiar,et al. Live Software Development Environment for Java using Virtual Reality , 2019, ENASE.
[435] R. Stedman,et al. A synthetic view of acceptance and engagement with smart meters in the United States , 2019, Energy Research & Social Science.
[436] Janis Osis,et al. Extracting Core Elements of TFM Functional Characteristics from Stanford CoreNLP Application Outcomes , 2019, ENASE.
[437] Maria-Iuliana Bocicor,et al. Indoor Localisation with Intelligent Luminaires for Home Monitoring , 2019, ENASE.
[438] Davi Viana,et al. A Domain-Specific Modeling Language for Specification of Clinical Scores in Mobile Health , 2019, ENASE.
[439] Yuntian Brian Bai,et al. A New Approach for Wi-Fi-Based People Localization in a Long Narrow Space , 2019, Wirel. Commun. Mob. Comput..
[440] Joel J. P. C. Rodrigues,et al. Energy meters evolution in smart grids: A review , 2019, Journal of Cleaner Production.
[441] Ademar Aguiar,et al. CloudCity: A Live Environment for the Management of Cloud Infrastructures , 2019, ENASE.
[442] Alberto Sillitti,et al. Analyzing Load Profiles of Energy Consumption to Infer Household Characteristics Using Smart Meters , 2019, Energies.
[443] Dimitrios Kouzapas,et al. A Formal Modeling Scheme for Analyzing a Software System Design against the GDPR , 2019, ENASE.
[444] Yngve Lamo,et al. A Model Driven Approach to the Development of Gamified Interactive Clinical Practice Guidelines , 2019, ENASE.
[445] Yves Le Traon,et al. Chapter Six - Mutation Testing Advances: An Analysis and Survey , 2019, Adv. Comput..
[446] Mohamed Khalgui,et al. Multiobjective Optimization Approach for a Portable Development of Reconfigurable Real-Time Systems: From Specification to Implementation , 2019, IEEE Transactions on Systems, Man, and Cybernetics: Systems.
[447] Stéphane Maag,et al. Suggesting Software Measurement Plans with Unsupervised Learning Data Analysis , 2019, ENASE.
[448] Maritta Heisel,et al. CVSS-based Estimation and Prioritization for Security Risks , 2019, ENASE.
[449] Nidhi Chawla,et al. Automated gathering and analysis of cannabinoids treatment data , 2019, KES.
[450] Maria Spichkova,et al. Voice-activated solutions for agile retrospective sessions , 2019, KES.
[451] Mohamed Khalgui,et al. On Improving R-TNCES Rebuilding for Reconfigurable Real-Time Systems , 2019, ENASE.
[452] Anna Derezinska,et al. Mutating UML State Machine Behavior with Semantic Mutation Operators , 2019, ENASE.
[453] Mohamed Khalgui,et al. R-TNCES Rebuilding: A New Method of CTL Model Update for Reconfigurable Systems , 2019, ENASE.
[454] Elke Pulvermüller,et al. Using Developer-tool-Interactions to Expand Tracing Capabilities , 2019, ENASE.
[455] Ademar Aguiar,et al. Live software development: tightening the feedback loops , 2019, Programming.
[456] Ting Qu,et al. On Methodology for the Verification of Reconfigurable Timed Net Condition/Event Systems , 2020, IEEE Transactions on Systems, Man, and Cybernetics: Systems.
[457] Xiangyu Wang,et al. Deep Convolutional Neural Networks for Indoor Localization with CSI Images , 2020, IEEE Transactions on Network Science and Engineering.