


default search action
Journal of Systems and Software, Volume 187
Volume 187, May 2022
- Premathas Somasekaram
, Radu Calinescu
, Rajkumar Buyya:
High-availability clusters: A taxonomy, survey, and future directions. 111208 - Marwa Thabet
, Brahim Hnich
, Mouhebeddine Berrima:
A sampling-based online Co-Location-Resistant Virtual Machine placement strategy. 111215 - Rafael Parizi
, Matheus Prestes
, Sabrina Marczak
, Tayana Conte
:
How has design thinking being used and integrated into software development activities? A systematic mapping. 111217 - Jiaojiao Yu, Kunsong Zhao, Jin Liu, Xiao Liu
, Zhou Xu
, Xin Wang:
Exploiting gated graph neural network for detecting and explaining self-admitted technical debts. 111219 - Mahnoosh Shahidi, Mehrdad Ashtiani
, Morteza Zakeri Nasrabadi
:
An automated extract method refactoring approach to correct the long method code smell. 111221 - Sofia A. M. Silveira
, Luciana A. M. Zaina
, Leobino N. Sampaio
, Fábio L. Verdi
:
On the evaluation of usability design guidelines for improving network monitoring tools interfaces. 111223
- Matteo Camilli
, Andrea Janes
, Barbara Russo:
Automated test-based learning and verification of performance models for microservices systems. 111225
- Chunlin Li, Jun Liu, Min Wang, Youlong Luo:
Fault-tolerant scheduling and data placement for scientific workflow processing in geo-distributed clouds. 111227
- Md. Nadim
, Manishankar Mondal, Chanchal K. Roy, Kevin A. Schneider:
Evaluating the performance of clone detection tools in detecting cloned co-change candidates. 111229
- Hong Zhu, Ian Bayley:
Discovering boundary values of feature-based machine learning classifiers through exploratory datamorphic testing. 111231
- Alejandro Mazuera-Rozo
, Camilo Escobar-Velásquez
, Juan Espitia-Acero, David Vega-Guzmán
, Catia Trubiani
, Mario Linares-Vásquez
, Gabriele Bavota
:
Taxonomy of security weaknesses in Java and Kotlin Android apps. 111233
- Jin Wu
, Jian Dong
, Ruili Fang, Wen Zhang
, Wenwen Wang, Decheng Zuo:
WDBT: Non-volatile memory wear characterization and mitigation for DBT systems. 111247 - Jhih-Sin Lin, Chin-Yu Huang
, Chih-Chiang Fang:
Analysis and assessment of software reliability modeling with preemptive priority queueing policy. 111249
- Giorgio Audrito
, Ferruccio Damiani, Volker Stolz, Gianluca Torta
, Mirko Viroli:
Distributed runtime verification by past-CTL and the field calculus. 111251

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.