


default search action
Journal of Systems and Software, Volume 117
Volume 117, July 2016
- Wookhyun Han, Hoon Sung Chwa

, Hwidong Bae, Hyosu Kim, Insik Shin:
GPU-SAM: Leveraging multi-GPU split-and-merge execution for system-wide real-time support. 1-14 - Mahmoud Al-Ayyoub, Yaser Jararweh

, Ahmad Doulat, Haythem Ahmad Bany Salameh
, Ahmad Al Abed Al Aziz, Mohammad A. Alsmirat
, Abdallah Khreishah
:
Virtualization-based Cognitive Radio Networks. 15-29 - Suthat Ronglong, Chonlameth Arpnikanondt

:
Signal: An open-source cross-platform universal messaging system with feedback support. 30-54 - Unai Alegre Ibarra, Juan Carlos Augusto, Tony Clark

:
Engineering context-aware systems and applications: A survey. 55-83 - Konstantinos Manikas

:
Revisiting software ecosystems Research: A longitudinal literature study. 84-103 - Chen-Yi Lin

:
A reversible data transform algorithm using integer transform for privacy-preserving data mining. 104-112 - Kleber Vieira Cardoso, Sand Luz Correa, José Ferreira de Rezende

, Bruno Soares da Silva, Micael O. M. C. de Mello, Mario Augusto da Cruz:
Using traffic filtering rules and OpenFlow devices for transparent flow switching and automatic dynamic-circuit creation in hybrid networks. 113-128 - Claes Wohlin

:
Erratum to "A General Theory of Software Engineering: Balancing Human, Social and Organizational Capitals" [The Journal of Systems & Software 109c (2015) 229-242]. 129 - Kalliopi Kravari

, Nick Bassiliades
:
DISARM: A social distributed agent reputation model based on defeasible logic. 130-152 - Silvana Teodoro, Andriele Busatto do Carmo, Daniel Couto Adornes, Luiz Gustavo Fernandes

:
A comparative study of energy-aware scheduling algorithms for computational grids. 153-165 - Tao Zhang

, Jiachi Chen
, Geunseok Yang, Byungjeong Lee, Xiapu Luo
:
Towards more accurate severity prediction and fixer recommendation of software bugs. 166-184 - Giuseppe Procaccianti

, Héctor Fernández-Fernández, Patricia Lago:
Empirical evaluation of two best practices for energy-efficient software development. 185-198 - Seonah Lee

, Sungwon Kang:
What situational information would help developers when using a graphical code recommender? 199-217 - Syed Shariyar Murtaza, Wael Khreich

, Abdelwahab Hamou-Lhadj
, Ayse Basar Bener
:
Mining trends and patterns of software vulnerabilities. 218-228 - Rakesh Rana

, Miroslaw Staron
, Christian Berger, Jörgen Hansson, Martin Nilsson, Wilhelm Meding:
Analyzing defect inflow distribution and applying Bayesian inference method for software defect prediction in large software projects. 229-244 - Rashina Hoda

, Latha Karthigaa Murugesan:
Multi-level agile project management challenges: A self-organizing team perspective. 245-257 - Marta Olszewska

, Jeanette Heidenberg, Max Weijola, Kirsi Mikkonen, Ivan Porres
:
Quantitatively measuring a large-scale agile transformation. 258-273 - Magne Jørgensen:

Unit effects in software project effort estimation: Work-hours gives lower effort estimates than workdays. 274-281 - Zhen Li, Rohit Atre

, Zia Ul Huda
, Ali Jannesari
, Felix Wolf:
Unveiling parallelization opportunities in sequential programs. 282-295 - Yasuhiro Saito, Tadashi Dohi

:
Predicting software reliability via completely monotone nonparametric estimator with grouped data. 296-306 - Cagri Sahin

, Lori L. Pollock, James Clause:
From benchmarks to real apps: Exploring the energy impacts of performance-directed changes. 307-316 - Pedro Sánchez-Palma

, Bárbara Álvarez
, José Miguel Morales, Diego Alonso
, Andrés Iborra
:
An approach to modeling and developing teleo-reactive systems considering timing constraints. 317-333 - Samer Zein, Norsaremah Salleh

, John Grundy
:
A systematic mapping study of mobile application testing techniques. 334-356 - Humaira Afzal, Irfan Awan, Mohammed Rafiq Mufti, Ray E. Sheriff

:
Performance analysis of contending customer equipment in wireless networks. 357-365 - Tomasz Tajmajer, Spyros Lalis

, Manos Koutsoubelias, Aleksander Pruszkowski, Jaroslaw Domaszewicz, Michele Nati
, Alexander Gluhak:
Node/Proxy portability: Designing for the two lives of your next WSAN middleware. 366-383 - A. Charan Kumari

, K. Srinivas
:
Hyper-heuristic approach for multi-objective software module clustering. 384-401 - Sikandar Ali

, Siffat Ullah Khan
:
Software outsourcing partnership model: An evaluation framework for vendor organizations. 402-425 - Anneliese Amschler Andrews, Philip Beaver, Joseph Lucente

:
Towards better help desk planning: Predicting incidents and required effort. 426-449 - Konstantinos Triantafyllidis

, Waqar Aslam, Egor Bondarev, Johan J. Lukkien, Peter H. N. de With:
ProMARTES: Accurate network and computation delay prediction for component-based distributed systems. 450-470 - Sudhaman Parthasarathy

, Maya Daneva
:
An approach to estimation of degree of customization for ERP projects using prioritized requirements. 471-487 - Stephany García, Oscar Romero

, Ruth Raventós:
DSS from an RE Perspective: A systematic mapping. 488-507 - G. G. Md. Nawaz Ali, Peter Han Joo Chong

, Syeda Khairunnesa Samantha, Edward Chan:
Efficient data dissemination in cooperative multi-RSU Vehicular Ad Hoc Networks (VANETs). 508-527 - Johan Fabry, Coen De Roover

, Carlos Noguera, Steffen Zschaler
, Awais Rashid
, Viviane Jonckers
:
AspectJ code analysis and verification with GASR. 528-544 - Veronika Bauer

, Antonio Vetrò
:
Comparing reuse practices in two large software-producing companies. 545-582 - Fabio Petroni, Leonardo Querzoni

, Roberto Beraldi
, Mario Paolucci:
LCBM: a fast and lightweight collaborative filtering algorithm for binary ratings. 583-594 - Ali Idri, Ibtissam Abnane, Alain Abran

:
Missing data techniques in analogy-based software development effort estimation. 595-611 - Fábio Paulo Basso

, Raquel Mainardi Pillat
, Toacy Cavalcante de Oliveira
, Fabricia Roos-Frantz
, Rafael Z. Frantz
:
Automated design of multi-layered web information systems. 612-637 - Hans van Vliet, Antony Tang

:
Decision making in software architecture. 638-644 - David Würfel, Rainer Lutz, Stephan Diehl

:
Grounded requirements engineering: An approach to use case driven requirements engineering. 645-657

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














