Остановите войну!
for scientists:
default search action
Norman Wilde
- > Home > Persons > Norman Wilde
Publications
- 2021
- [j24]Amitabh Mishra, Achraf Cohen, Thomas Reichherzer, Norman Wilde:
Detection of data anomalies at the edge of pervasive IoT systems. Computing 103(8): 1657-1675 (2021) - 2020
- [j23]Amitabh Mishra, Thomas Reichherzer, Ezhil Kalaimannan, Norman Wilde, Ruben Ramirez:
Trade-offs involved in the choice of cloud service configurations when building secure, scalable, and efficient Internet-of-Things networks. Int. J. Distributed Sens. Networks 16(2) (2020) - 2017
- [c33]Brian P. Eddy, Norman Wilde, Nathan A. Cooper, Bhavyansh Mishra, Valeria S. Gamboa, Khyati N. Patel, Keenal M. Shah:
CDEP: Continuous Delivery Educational Pipeline. ACM Southeast Regional Conference 2017: 55-62 - [c32]Brian P. Eddy, Norman Wilde, Nathan A. Cooper, Bhavyansh Mishra, Valeria S. Gamboa, Keenal M. Shah, Adrian M. Deleon, Nikolai A. Shields:
A Pilot Study on Introducing Continuous Integration and Delivery into Undergraduate Software Engineering Courses. CSEE&T 2017: 47-56 - 2016
- [j22]John W. Coffey, Thomas Reichherzer, Norman Wilde, Arthur B. Baskin:
A Semi-Automated Approach to the Recovery of SOA System Structure from Low-Level Artifacts. Int. J. Softw. Eng. Knowl. Eng. 26(1): 41-62 (2016) - [p1]Norman Wilde, Bilal Gonen, Eman El-Sheikh, Alfred Zimmermann:
Approaches to the Evolution of SOA Systems. Emerging Trends in the Evolution of Service-Oriented and Enterprise Architectures 2016: 5-21 - 2014
- [c31]Alfred Zimmermann, Bilal Gonen, Rainer Schmidt, Eman El-Sheikh, Sikha Bagui, Norman Wilde:
Adaptable Enterprise Architectures for Software Evolution of SmartLife Ecosystems. EDOC Workshops 2014: 316-323 - [c30]Bilal Gonen, Xingang Fang, Eman El-Sheikh, Sikha Bagui, Norman Wilde, Alfred Zimmermann, Ilia Petrov:
Maintaining SOA Systems of the Future - How Can Ontological Modeling Help?. KEOD 2014: 376-381 - 2013
- [j21]Laura J. White, Thomas Reichherzer, John W. Coffey, Norman Wilde, Sharon Simmons:
Maintenance of service oriented architecture composite applications: static and dynamic support. J. Softw. Evol. Process. 25(1): 97-109 (2013) - [c29]Steven Case, Sherry K. Schneider, Laura J. White, Steven J. Kass, Kelly Manning, Norman Wilde:
Integrating globally distributed team projects into software engineering courses. CTGDSD@ICSE 2013: 25-29 - 2012
- [c28]Laura J. White, Norman Wilde, Thomas Reichherzer, Eman El-Sheikh, George Goehring, Arthur B. Baskin, Ben Hartmann, Mircea Manea:
Understanding Interoperable Systems: Challenges for the Maintenance of SOA Applications. HICSS 2012: 2199-2206 - [c27]Norman Wilde, John W. Coffey, Thomas Reichherzer, Laura J. White:
Open SOALab: Case study artifacts for SOA research and education. PESOS@ICSE 2012: 59-60 - 2011
- [c25]Thomas Reichherzer, Eman El-Sheikh, Norman Wilde, Laura J. White, John W. Coffey, Sharon Simmons:
Towards intelligent search support for web services evolution identifying the right abstractions. WSE 2011: 53-58 - 2010
- [c24]John W. Coffey, Laura J. White, Norman Wilde, Sharon Simmons:
Locating Software Features in a SOA Composite Application. ECOWS 2010: 99-106 - [c23]John W. Coffey, Norman Wilde, Sharon Simmons, Anthony Pinto, Eric Daniels:
Creating a Technically-oriented Course in Web Services and SOA: Successes, Failures, and Lessons Learned. FECS 2010: 150-155 - 2009
- [c22]Dennis Edwards, Norman Wilde, Sharon Simmons, Eric Golden:
Instrumenting time-sensitive software for feature location. ICPC 2009: 130-137 - 2008
- [c21]Norman Wilde, Sharon Simmons, Michael Pressel, Joseph Vandeville:
Understanding features in SOA: some experiences from distributed systems. SDSOA@ICSE 2008: 59-62 - 2007
- [c20]Dennis Edwards, Sharon Simmons, Norman Wilde:
Prevention, Detection and Recovery from Cyber-Attacks Using a Multilevel Agent Architecture. SoSE 2007: 1-6 - 2006
- [j20]Dennis Edwards, Sharon Simmons, Norman Wilde:
An approach to feature location in distributed systems. J. Syst. Softw. 79(1): 57-68 (2006) - [j19]Sharon Simmons, Dennis Edwards, Norman Wilde, Josh Homan, Michael Groble:
Industrial tools for the feature location problem: an exploratory study. J. Softw. Maintenance Res. Pract. 18(6): 457-474 (2006) - [c19]Michael Jiang, Michael Groble, Sharon Simmons, Dennis Edwards, Norman Wilde:
Software Feature Understanding in an Industrial Setting. ICSM 2006: 66-67 - [c18]Laurence R. Phillips, David A. Cartes, Wenxin Liu, Daniel Cox, Tom Davis, Sharon Simmons, Dennis Edwards, Norman Wilde:
Agents and islands: managing a power system before, during, and after transition to the islanded state. SoSE 2006: 1-6 - [c17]Sharon Simmons, Dennis Edwards, Norman Wilde, Jiri Just, Mahidhar Satyanarayana:
Preventing unauthorized islanding: cyber-threat analysis. SoSE 2006: 1-5 - 2004
- [c16]Sharon Simmons, Dennis Edwards, Norman Wilde:
Locating Features in Distributed Systems. Software Engineering Research and Practice 2004: 462-467 - 2003
- [c15]Norman Wilde, Laura J. White, Lorn B. Kerr, Darsi D. Ewing, Eischelle A. Krueger:
Some Experiences with Evolution and Process-Focused Projects. CSEE&T 2003: 242-250 - 2001
- [c12]Laura J. White, Norman Wilde:
Dynamic analysis for locating product features in Ada code. SIGAda 2001: 99-106 - 1998
- [j12]Norman Wilde, Christopher Casey, Joseph Vandeville, Gary P. Trio, Dick Hotz:
Reverse engineering of software threads: A design recovery technique for large multi-process systems. J. Syst. Softw. 43(1): 11-17 (1998) - 1996
- [c9]Norman Wilde, Christopher Casey:
Early field experience with the Software Reconnaissance technique for program comprehension. ICSM 1996: 312-318 - [c8]Norman Wilde, Christopher Casey:
Early Field Experience with the Software Recounaissance Technique for Program Comprehension. WCRE 1996: 270-276
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 02:43 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint