


default search action
Journal of Systems and Software, Volume 137
Volume 137, March 2018
- Enyo José Tavares Gonçalves, Jaelson Castro

, João Araújo
, Tiago Heineck:
A Systematic Literature Review of iStar extensions. 1-33
- W. K. Chan

, Xiaodong Liu, Hridesh Rajan
:
Special issue on software engineering technology and applications. 34-35
- Hyeongboo Baek, Jinkyu Lee, Insik Shin:

Multi-level contention-free policy for real-time multiprocessor scheduling. 36-49 - Jari Vanhanen, Timo O. A. Lehtinen, Casper Lassenius:

Software engineering problems and their relationship to perceived learning and customer satisfaction on a software capstone project. 50-66 - Ruibo Yan, Xi Xiao, Guangwu Hu, Sancheng Peng, Yong Jiang:

New deep learning method to detect code injection attacks on hybrid applications. 67-77 - Mohammad Khanbabaei

, Farzad Movahedi Sobhani, Mahmood Alborzi, Reza Radfar
:
Developing an integrated framework for using data mining techniques and ontology concepts for process improvement. 78-95 - Muhammad Ovais Ahmad

, Denis Dennehy, Kieran Conboy
, Markku Oivo:
Kanban in software engineering: A systematic mapping study. 96-113 - Antonia Bertolino

, Antonello Calabrò
, Francesca Lonetti
, Eda Marchetti
, Breno Miranda
:
A categorization scheme for software engineering conference papers and its application. 114-129 - Manziba Akanda Nishi, Kostadin Damevski

:
Scalable code clone detection and search based on adaptive prefix filtering. 130-142 - Fabio Palomba

, Mario Linares Vásquez
, Gabriele Bavota
, Rocco Oliveto, Massimiliano Di Penta, Denys Poshyvanyk
, Andrea De Lucia
:
Crowdsourcing user reviews to support the evolution of mobile apps. 143-162 - Phyllipe Lima

, Eduardo Guerra
, Paulo Meirelles
, Lucas Kanashiro, Hélio Silva, Fábio Fagundes Silveira
:
A Metrics Suite for code annotation assessment. 163-183 - Przemyslaw Pospieszny, Beata Czarnacka-Chrobot, Andrzej Kobylinski

:
An effective approach for software project effort and duration estimation with machine learning algorithms. 184-196 - Galen E. Mullins, Paul G. Stankiewicz, R. Chad Hawthorne, Satyandra K. Gupta:

Adaptive generation of challenging scenarios for testing and evaluation of autonomous vehicles. 197-215
- Eduardo Santana de Almeida, Georgia M. Kapitsaki:

Introduction to the special issue on "Software Reuse". 216
- Emmanouela Stachtiari, Panagiotis Katsaros

:
Compositional execution semantics for business process verification. 217-238 - Carlo Bernaschina, Sara Comai

, Piero Fraternali:
Formal semantics of OMG's Interaction Flow Modeling Language (IFML) for mobile and rich-client application model driven development. 239-260
- Erwan Bousse

, Dorian Leroy, Benoît Combemale, Manuel Wimmer, Benoit Baudry:
Omniscient debugging for executable DSLs. 261-288
- Nelly Condori-Fernández

, Patricia Lago
:
Characterizing the contribution of quality requirements to software sustainability. 289-305
- Gleison Brito, André C. Hora

, Marco Túlio Valente
, Romain Robbes:
On the use of replacement messages in API deprecation: An empirical study. 306-321 - Seyedeh Aso Tafsiri, Saleh Yousefi:

Combinatorial double auction-based resource allocation mechanism in cloud computing market. 322-334 - Dimas C. Nascimento

, Carlos Eduardo Santos Pires
, Demetrio Gomes Mestre:
Heuristic-based approaches for speeding up incremental record linkage. 335-354
- Eric Abuta, Jeff Tian:

Reliability over consecutive releases of a semiconductor Optical Endpoint Detection software system developed in a small company. 355-365
- Amadeu Silveira Campanelli, Ronaldo Darwich Camilo, Fernando Silva Parreiras

:
The impact of tailoring criteria on agile practices adoption: A survey with novice agile practitioners in Brazil. 366-379 - Ziqing Guo, Hua Zhang, Caijun Sun

, Qiaoyan Wen, Wenmin Li:
Secure multi-keyword ranked search over encrypted cloud data for multiple data owners. 380-395
- Marco Vieira

, Katinka Wolter:
Introduction to the special issue on software reliability engineering. 396-398
- Lijie Xu, Wensheng Dou, Feng Zhu, Chushu Gao

, Jie Liu, Jun Wei:
Characterizing and diagnosing out of memory errors in MapReduce applications. 399-414 - Wael Khreich

, Syed Shariyar Murtaza, Abdelwahab Hamou-Lhadj
, Chamseddine Talhi:
Combining heterogeneous anomaly detectors for improved software security. 415-429 - Mohamed Elsabagh

, Daniel Barbará, Dan Fleck
, Angelos Stavrou
:
On early detection of application-level resource exhaustion and starvation. 430-447 - Jie Wang, Wensheng Dou, Chushu Gao

, Jun Wei:
JSTrace: Fast reproducing web application errors. 448-462 - Jia-Ju Bai, Yu-Ping Wang

, Shi-Min Hu:
Automated and reliable resource release in device drivers based on dynamic analysis. 463-479
- Xianglong Kong

, Lingming Zhang, W. Eric Wong, Bixin Li:
The impacts of techniques, programs and tests on automated program repair: An empirical study. 480-496 - Otávio Augusto Lazzarini Lemos, Fábio Fagundes Silveira

, Fabiano Cutigi Ferrari
, Alessandro Garcia:
The impact of Software Testing education on code reliability: An empirical assessment. 497-511 - Caio Augusto R. Dos Santos

, Rivalino Matias:
Failure patterns in operating systems: An exploratory and observational study. 512-530 - Mostafa Farshchi, Jean-Guy Schneider

, Ingo Weber
, John Grundy
:
Metric selection and anomaly detection for cloud operations using log and metric correlation analysis. 531-549 - Ajay Kumar Jha, Woo Jin Lee:

An empirical study of collaborative model and its security risk in Android. 550-562
- Yunja Choi:

A configurable V&V framework using formal behavioral patterns for OSEK/VDX operating systems. 563-579 - Xiaomin Wei

, Yunwei Dong, Xue-Lin Li
, W. Eric Wong:
Architecture-level hazard analysis using AADL. 580-604 - Megha Bhushan

, Shivani Goel, Karamjit Kaur
:
Analyzing inconsistencies in software product lines using an ontological rule-based approach. 605-617 - Mahdi Eslamimehr, Mohsen Lesani, George Edwards:

Efficient detection and validation of atomicity violations in concurrent programs. 618-635 - Xiaoli Lian, Li Zhang, Jing Jiang, William Goss:

An approach for optimized feature selection in large-scale software product lines. 636-651
- João Ricardo Lourenço, Bruno Cabral

, Jorge Bernardino
:
PreX: A predictive model to prevent exceptions. 652-668 - Teerat Pitakrat, Dusan Okanovic, André van Hoorn, Lars Grunske

:
Hora: Architecture-aware online failure prediction. 669-685 - Lov Kumar

, Saikrishna Sripada, Ashish Sureka, Santanu Ku. Rath
:
Effective fault prediction model developed using Least Square Support Vector Machine (LSSVM). 686-712 - Naghmeh Ramezani Ivaki

, Nuno Laranjeiro
, Filipe Araújo
:
A survey on reliable distributed communication. 713-732
- Sabrina Souto, Marcelo d'Amorim:

Time-space efficient regression testing for configurable systems. 733-746 - Manuel Quintela-Pumares

, Daniel Fernández Lanvin
, Alberto Manuel Fernández Álvarez
:
Domain model slicing and constraint classification for local validation on rich clients. 747-765 - Julian Thomé, Lwin Khin Shar

, Domenico Bianculli
, Lionel C. Briand:
Security slicing for auditing common injection vulnerabilities. 766-783 - Lorena Gutiérrez-Madronal

, Inmaculada Medina-Bulo, Juan José Domínguez-Jiménez
:
IoT-TEG: Test event generator system. 784-803

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














