callback( { "result":{ "query":":facetid:toc:\"db/journals/jss/jss139.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"199.51" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"12", "@dc":"12", "@oc":"12", "@id":"43459119", "text":":facetid:toc:db/journals/jss/jss139.bht" } }, "hits":{ "@total":"12", "@computed":"12", "@sent":"12", "@first":"0", "hit":[{ "@score":"1", "@id":"2446134", "info":{"authors":{"author":[{"@pid":"268/9405","text":"Hamzeh Alabool"},{"@pid":"297/0887","text":"Ahmad Kamil"},{"@pid":"216/9314","text":"Noreen Arshad"},{"@pid":"216/9225","text":"Deemah Alarabiat"}]},"title":"Cloud service evaluation method-based Multi-Criteria Decision-Making: A systematic literature review.","venue":"J. Syst. Softw.","volume":"139","pages":"161-188","year":"2018","type":"Journal Articles","access":"closed","key":"journals/jss/AlaboolMAA18","doi":"10.1016/J.JSS.2018.01.038","ee":"https://doi.org/10.1016/j.jss.2018.01.038","url":"https://dblp.org/rec/journals/jss/AlaboolMAA18"}, "url":"URL#2446134" }, { "@score":"1", "@id":"2446145", "info":{"authors":{"author":[{"@pid":"198/7526","text":"Noor Bajunaid"},{"@pid":"m/DAMenasce","text":"Daniel A. Menascé"}]},"title":"Efficient modeling and optimizing of checkpointing in concurrent component-based software systems.","venue":"J. Syst. Softw.","volume":"139","pages":"1-13","year":"2018","type":"Journal Articles","access":"closed","key":"journals/jss/BajunaidM18","doi":"10.1016/J.JSS.2018.01.032","ee":"https://doi.org/10.1016/j.jss.2018.01.032","url":"https://dblp.org/rec/journals/jss/BajunaidM18"}, "url":"URL#2446145" }, { "@score":"1", "@id":"2446164", "info":{"authors":{"author":[{"@pid":"b/AntonioBrogi","text":"Antonio Brogi"},{"@pid":"165/6055","text":"Andrea Canciani"},{"@pid":"138/8241","text":"Jacopo Soldani"}]},"title":"Fault-aware management protocols for multi-component applications.","venue":"J. Syst. Softw.","volume":"139","pages":"189-210","year":"2018","type":"Journal Articles","access":"closed","key":"journals/jss/BrogiCS18","doi":"10.1016/J.JSS.2018.02.005","ee":"https://doi.org/10.1016/j.jss.2018.02.005","url":"https://dblp.org/rec/journals/jss/BrogiCS18"}, "url":"URL#2446164" }, { "@score":"1", "@id":"2446165", "info":{"authors":{"author":[{"@pid":"142/8784-1","text":"Jens Bürger 0001"},{"@pid":"46/11388-1","text":"Daniel Strüber 0001"},{"@pid":"99/3033-1","text":"Stefan Gärtner 0001"},{"@pid":"79/3186","text":"Thomas Ruhroth"},{"@pid":"j/JanJurjens","text":"Jan Jürjens"},{"@pid":"s/KurtSchneider","text":"Kurt Schneider"}]},"title":"A framework for semi-automated co-evolution of security knowledge and system models.","venue":"J. Syst. Softw.","volume":"139","pages":"142-160","year":"2018","type":"Journal Articles","access":"closed","key":"journals/jss/BurgerSGRJS18","doi":"10.1016/J.JSS.2018.02.003","ee":"https://doi.org/10.1016/j.jss.2018.02.003","url":"https://dblp.org/rec/journals/jss/BurgerSGRJS18"}, "url":"URL#2446165" }, { "@score":"1", "@id":"2446185", "info":{"authors":{"author":[{"@pid":"185/3261","text":"Karina Curcio"},{"@pid":"216/9382","text":"Tiago Navarro"},{"@pid":"82/191","text":"Andreia Malucelli"},{"@pid":"05/2483","text":"Sheila S. Reinehr"}]},"title":"Requirements engineering: A systematic mapping study in agile software development.","venue":"J. Syst. Softw.","volume":"139","pages":"32-50","year":"2018","type":"Journal Articles","access":"closed","key":"journals/jss/CurcioNMR18","doi":"10.1016/J.JSS.2018.01.036","ee":"https://doi.org/10.1016/j.jss.2018.01.036","url":"https://dblp.org/rec/journals/jss/CurcioNMR18"}, "url":"URL#2446185" }, { "@score":"1", "@id":"2446194", "info":{"authors":{"author":[{"@pid":"120/1808","text":"Hamid Reza Faragardi"},{"@pid":"11/65","text":"Björn Lisper"},{"@pid":"54/6162","text":"Kristian Sandström"},{"@pid":"33/4193","text":"Thomas Nolte"}]},"title":"A resource efficient framework to run automotive embedded software on multi-core ECUs.","venue":"J. Syst. Softw.","volume":"139","pages":"64-83","year":"2018","type":"Journal Articles","access":"closed","key":"journals/jss/FaragardiLSN18","doi":"10.1016/J.JSS.2018.01.040","ee":"https://doi.org/10.1016/j.jss.2018.01.040","url":"https://dblp.org/rec/journals/jss/FaragardiLSN18"}, "url":"URL#2446194" }, { "@score":"1", "@id":"2446211", "info":{"authors":{"author":[{"@pid":"172/1923","text":"Ines Hajri"},{"@pid":"44/4521","text":"Arda Goknil"},{"@pid":"93/1501","text":"Lionel C. Briand"},{"@pid":"172/2009","text":"Thierry Stephany"}]},"title":"Change impact analysis for evolving configuration decisions in product line use case models.","venue":"J. Syst. Softw.","volume":"139","pages":"211-237","year":"2018","type":"Journal Articles","access":"closed","key":"journals/jss/HajriGBS18","doi":"10.1016/J.JSS.2018.02.021","ee":"https://doi.org/10.1016/j.jss.2018.02.021","url":"https://dblp.org/rec/journals/jss/HajriGBS18"}, "url":"URL#2446211" }, { "@score":"1", "@id":"2446240", "info":{"authors":{"author":[{"@pid":"01/5820","text":"Yifeng Luo"},{"@pid":"197/1766","text":"Junshi Guo"},{"@pid":"197/1745","text":"Jiaye Zhu"},{"@pid":"89/2685","text":"Jihong Guan"},{"@pid":"52/6744","text":"Shuigeng Zhou"}]},"title":"Towards efficiently supporting database as a service with QoS guarantees.","venue":"J. Syst. Softw.","volume":"139","pages":"51-63","year":"2018","type":"Journal Articles","access":"closed","key":"journals/jss/LuoGZGZ18","doi":"10.1016/J.JSS.2018.01.034","ee":"https://doi.org/10.1016/j.jss.2018.01.034","url":"https://dblp.org/rec/journals/jss/LuoGZGZ18"}, "url":"URL#2446240" }, { "@score":"1", "@id":"2446269", "info":{"authors":{"author":[{"@pid":"49/690","text":"Ingo Pill"},{"@pid":"w/FranzWotawa","text":"Franz Wotawa"}]},"title":"Automated generation of (F)LTL oracles for testing and debugging.","venue":"J. Syst. Softw.","volume":"139","pages":"124-141","year":"2018","type":"Journal Articles","access":"closed","key":"journals/jss/PillW18","doi":"10.1016/J.JSS.2018.02.002","ee":"https://doi.org/10.1016/j.jss.2018.02.002","url":"https://dblp.org/rec/journals/jss/PillW18"}, "url":"URL#2446269" }, { "@score":"1", "@id":"2446291", "info":{"authors":{"author":[{"@pid":"156/4712","text":"Carla Sauvanaud"},{"@pid":"k/MohamedKaaniche","text":"Mohamed Kaâniche"},{"@pid":"20/2895","text":"Karama Kanoun"},{"@pid":"130/8462","text":"Kahina Lazri"},{"@pid":"03/8298","text":"Guthemberg Silvestre"}]},"title":"Anomaly detection and diagnosis for cloud services: Practical experiments and lessons learned.","venue":"J. Syst. Softw.","volume":"139","pages":"84-106","year":"2018","type":"Journal Articles","access":"closed","key":"journals/jss/SauvanaudKKLS18","doi":"10.1016/J.JSS.2018.01.039","ee":"https://doi.org/10.1016/j.jss.2018.01.039","url":"https://dblp.org/rec/journals/jss/SauvanaudKKLS18"}, "url":"URL#2446291" }, { "@score":"1", "@id":"2446328", "info":{"authors":{"author":[{"@pid":"94/3104-38","text":"Ying Wang 0038"},{"@pid":"55/1401-1","text":"Zhiliang Zhu 0001"},{"@pid":"46/999","text":"Bo Yang"},{"@pid":"154/6298","text":"Fangda Guo"},{"@pid":"22/4635-1","text":"Hai Yu 0001"}]},"title":"Using reliability risk analysis to prioritize test cases.","venue":"J. Syst. Softw.","volume":"139","pages":"14-31","year":"2018","type":"Journal Articles","access":"closed","key":"journals/jss/WangZYGY18","doi":"10.1016/J.JSS.2018.01.033","ee":"https://doi.org/10.1016/j.jss.2018.01.033","url":"https://dblp.org/rec/journals/jss/WangZYGY18"}, "url":"URL#2446328" }, { "@score":"1", "@id":"2446343", "info":{"authors":{"author":[{"@pid":"10/2381","text":"Yan Zheng"},{"@pid":"71/7089","text":"Zan Wang"},{"@pid":"31/11104","text":"Xiangyu Fan"},{"@pid":"64/3062-5","text":"Xiang Chen 0005"},{"@pid":"97/3485-6","text":"Zijiang Yang 0006"}]},"title":"Localizing multiple software faults based on evolution algorithm.","venue":"J. Syst. Softw.","volume":"139","pages":"107-123","year":"2018","type":"Journal Articles","access":"closed","key":"journals/jss/ZhengWFCY18","doi":"10.1016/J.JSS.2018.02.001","ee":"https://doi.org/10.1016/j.jss.2018.02.001","url":"https://dblp.org/rec/journals/jss/ZhengWFCY18"}, "url":"URL#2446343" } ] } } } )