default search action
James Miller 0001
Person information
- affiliation: University of Alberta, Department of Electrical and Computer Engineering, Edmonton, AB, Canada
- affiliation (PhD): University of Strathclyde, Glasgow, UK
Other persons with the same name
- James Miller — disambiguation page
- James Miller 0002 — GE Global Research, Niskayuna, NY, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j116]Mahsa Panahandeh, Abdelwahab Hamou-Lhadj, Mohammad Hamdaqa, James Miller:
ServiceAnomaly: An anomaly detection approach in microservices using distributed traces and profiling metrics. J. Syst. Softw. 209: 111917 (2024) - [j115]Mona Nashaat, James Miller:
Towards Efficient Fine-Tuning of Language Models With Organizational Data for Automated Software Review. IEEE Trans. Software Eng. 50(9): 2240-2253 (2024) - [c55]Mahsa Panahandeh, Naser Ezzati-Jivan, Abdelwahab Hamou-Lhadj, James Miller:
Context-aware Root Cause Localization in Distributed Traces Using Social Network Analysis (Work In Progress paper). ICPE (Companion) 2024: 1-6 - [c54]Mahsa Panahandeh, Naser Ezzati-Jivan, Abdelwahab Hamou-Lhadj, James Miller:
Efficient Unsupervised Latency Culprit Ranking in Distributed Traces with GNN and Critical Path Analysis. ICPE (Companion) 2024: 62-66 - 2023
- [i2]Mojtaba Yeganejou, Kimia Honari, Ryan Kluzinski, Scott Dick, Michael Lipsett, James Miller:
DCNFIS: Deep Convolutional Neuro-Fuzzy Inference System. CoRR abs/2308.06378 (2023) - 2022
- [j114]Saeedeh Sadat Sajjadi Ghaemmaghami, Seyedeh Sepideh Emam, James Miller:
Automatically inferring user behavior models in large-scale web applications. Inf. Softw. Technol. 141: 106704 (2022) - [j113]Saeedeh Sadat Sajjadi Ghaemmaghami, James Miller:
Integrated-Block: A New Combination Model to Improve Web Page Segmentation. J. Web Eng. 21(4): 1103-1144 (2022) - [j112]Mona Nashaat, Aindrila Ghosh, James Miller, Shaikh Quader:
Semi-Supervised Ensemble Learning for Dealing with Inaccurate and Incomplete Supervision. ACM Trans. Knowl. Discov. Data 16(3): 43:1-43:33 (2022) - [j111]Aindrila Ghosh, Mona Nashaat, James Miller, Shaikh Quader:
Interpretation of Structural Preservation in Low-Dimensional Embeddings. IEEE Trans. Knowl. Data Eng. 34(5): 2227-2240 (2022) - [j110]Aindrila Ghosh, Mona Nashaat, James Miller, Shaikh Quader:
VisExPreS: A Visual Interactive Toolkit for User-Driven Evaluations of Embeddings. IEEE Trans. Vis. Comput. Graph. 28(7): 2791-2807 (2022) - [c53]Kimia Honari, Xiaotian Zhou, Sara Rouhani, Scott Dick, Hao Liang, Yunwei Li, James Miller:
A Scalable Blockchain-based Smart Contract Model for Decentralized Voltage Stability Using Sharding Technique. Blockchain 2022: 124-131 - [c52]Mojtaba Yeganejou, Ryan Kluzinski, Scott Dick, James Miller:
An End-to-End Trainable Deep Convolutional Neuro-Fuzzy Classifier. FUZZ-IEEE 2022: 1-7 - [i1]Kimia Honari, Xiaotian Zhou, Sara Rouhani, Scott Dick, Hao Liang, Yunwei Li, James Miller:
A Scalable Blockchain-based Smart Contract Model for Decentralized Voltage Stability Using Sharding Technique. CoRR abs/2206.13776 (2022) - 2021
- [j109]Saeedeh Sajjadi-Ghaem-Maghami, James Miller:
A New Semantic Approach to Improve Webpage Segmentation. J. Web Eng. 20(4): 963-992 (2021) - [j108]Mona Nashaat, Aindrila Ghosh, James Miller, Shaikh Quader:
TabReformer: Unsupervised Representation Learning for Erroneous Data Detection. Trans. Data Sci. 2(3): 18:1-18:29 (2021) - [j107]Aindrila Ghosh, Mona Nashaat, James Miller, Shaikh Quader:
Context-Based Evaluation of Dimensionality Reduction Algorithms - Experiments and Statistical Significance Analysis. ACM Trans. Knowl. Discov. Data 15(2): 24:1-24:40 (2021) - [c51]Mona Nashaat, James Miller:
Improving News Popularity Estimation via Weak Supervision and Meta-active Learning. HICSS 2021: 1-10 - 2020
- [j106]Mona Nashaat, Aindrila Ghosh, James Miller, Shaikh Quader:
Asterisk: Generating Large Training Datasets with Automatic Active Supervision. Trans. Data Sci. 1(2): 13:1-13:25 (2020) - [j105]Mojtaba Yeganejou, Scott Dick, James Miller:
Interpretable Deep Convolutional Fuzzy Classifier. IEEE Trans. Fuzzy Syst. 28(7): 1407-1419 (2020) - [c50]James Miller:
Towards A Lean Innovative Approach to Rethinking Employees Turnover. Surviving with Less-Knowledge, but not Knowledge-less: A Case Study. HICSS 2020: 1-10 - [c49]Mona Nashaat, Aindrila Ghosh, James Miller, Shaikh Quader:
WeSAL: Applying Active Supervision to Find High-quality Labels at Industrial Scale. HICSS 2020: 1-10
2010 – 2019
- 2019
- [j104]Aindrila Ghosh, Mona Nashaat, James Miller:
The current state of software license renewals in the I.T. industry. Inf. Softw. Technol. 108: 139-152 (2019) - [j103]Mona Nashaat, Aindrila Ghosh, James Miller, Shaikh Quader, Chad Marston:
M-Lean: An end-to-end development framework for predictive models in B2B scenarios. Inf. Softw. Technol. 113: 131-145 (2019) - [j102]Fadwa Estuka, James Miller:
A Pure Visual Approach for Automatically Extracting and Aligning Structured Web Data. ACM Trans. Internet Techn. 19(4): 51:1-51:26 (2019) - [j101]Osama Al-Baik, James Miller:
Integrative Double Kaizen Loop (IDKL): Towards a Culture of Continuous Learning and Sustainable Improvements for Software Organizations. IEEE Trans. Software Eng. 45(12): 1189-1210 (2019) - [c48]Seyedeh Sepideh Emam, James Miller:
Automated Testing of Motion-based Events in Mobile Applications. HICSS 2019: 1-10 - 2018
- [j100]Ali Shahbazi, Mahsa Panahandeh, James Miller:
Black-box tree test case generation through diversity. Autom. Softw. Eng. 25(3): 531-568 (2018) - [j99]Zhen Xu, James Miller:
Cross-Browser Differences Detection Based on an Empirical Metric for Web Page Visual Similarity. ACM Trans. Internet Techn. 18(3): 34:1-34:23 (2018) - [j98]Seyedeh Sepideh Emam, James Miller:
Inferring Extended Probabilistic Finite-State Automaton Models from Software Executions. ACM Trans. Softw. Eng. Methodol. 27(1): 4:1-4:39 (2018) - [j97]Aindrila Ghosh, Mona Nashaat, James Miller, Shaikh Quader, Chad Marston:
A comprehensive review of tools for exploratory analysis of tabular industrial datasets. Vis. Informatics 2(4): 235-253 (2018) - [c47]Mona Nashaat, Aindrila Ghosh, James Miller, Shaikh Quader, Chad Marston, Jean-François Puget:
Hybridization of Active Learning and Data Programming for Labeling Large Industrial Datasets. IEEE BigData 2018: 46-55 - 2017
- [j96]Jason M. Morawski, Torin Stepan, Scott Dick, James Miller:
A Fuzzy Recommender System for Public Library Catalogs. Int. J. Intell. Syst. 32(10): 1062-1084 (2017) - [j95]Abhimanyu Panwar, Iosif-Viorel Onut, Michael Smith, James Miller:
On the Concept of Automatic User Behavior Profiling of Websites. Int. J. Syst. Serv. Oriented Eng. 7(1): 1-20 (2017) - [j94]James Miller, Abhimanyu Panwar, Iosif-Viorel Onut:
Towards Building a New Age Commercial Contextual Advertising System. Int. J. Syst. Serv. Oriented Eng. 7(3): 1-14 (2017) - [j93]Zhen Xu, James Miller:
Estimating similarity of rich internet pages using visual information. Int. J. Web Eng. Technol. 12(2): 97-119 (2017) - [j92]Alejandro Felix, Andrew F. Tappenden, Michael R. Smith, James Miller:
Automated policy generation for testing access control software. Inf. Secur. J. A Glob. Perspect. 26(1): 17-38 (2017) - [j91]Narges Roshanbin, James Miller:
A comparative study of the performance of local feature-based pattern recognition algorithms. Pattern Anal. Appl. 20(4): 1145-1156 (2017) - [j90]Adel Khaled, James Miller:
Using π-calculus for Formal Modeling and Verification of WS-CDL Choreographies. IEEE Trans. Serv. Comput. 10(2): 316-327 (2017) - [c46]Osama Al-Baik, James Miller, Daniel R. Greening:
Towards an Innovative Validation-Driven Approach to Lean Product Development. HICSS 2017: 1-10 - [c45]Mona Nashaat, Karim Ali, James Miller:
Detecting Security Vulnerabilities in Object-Oriented PHP Programs. SCAM 2017: 159-164 - 2016
- [j89]Narges Roshanbin, James Miller:
ADAMAS: Interweaving unicode and color to enhance CAPTCHA security. Future Gener. Comput. Syst. 55: 289-310 (2016) - [j88]Narges Roshanbin, James Miller:
Enhancing CAPTCHA Security Using Interactivity, Dynamism, and Mouse Movement Patterns. Int. J. Syst. Serv. Oriented Eng. 6(1): 17-36 (2016) - [j87]Teh-Chung Chen, Torin Stepan, Scott Dick, James Miller:
An investigation of implicit features in compression-based learning for comparing webpages. Pattern Anal. Appl. 19(2): 397-410 (2016) - [j86]Torin Stepan, Jason M. Morawski, Scott Dick, James Miller:
Incorporating Spatial, Temporal, and Social Context in Recommendations for Location-Based Social Networks. IEEE Trans. Comput. Soc. Syst. 3(4): 164-175 (2016) - [j85]Ali Shahbazi, James Miller:
Black-Box String Test Case Generation through a Multi-Objective Optimization. IEEE Trans. Software Eng. 42(4): 361-378 (2016) - [j84]Zhen Xu, James Miller:
Identifying semantic blocks in Web pages using Gestalt laws of grouping. World Wide Web 19(5): 957-978 (2016) - [c44]Osama Al-Baik, James Miller:
Kaizen Cookbook: The Success Recipe for Continuous Learning and Improvements. HICSS 2016: 5388-5397 - [c43]Alejandro Felix, Andrew F. Tappenden, James Miller:
Policy Generator (PG): A Heuristic-Based Fuzzer. HICSS 2016: 5535-5544 - 2015
- [j83]Osama Al-Baik, James Miller:
The kanban approach, between agility and leanness: a systematic review. Empir. Softw. Eng. 20(6): 1861-1897 (2015) - [j82]Seyedeh Sepideh Emam, James Miller:
Test Case Prioritization Using Extended Digraphs. ACM Trans. Softw. Eng. Methodol. 25(1): 6:1-6:41 (2015) - [j81]Michael R. Smith, Dongcheng Deng, Syed Islam, James Miller:
Enhancing Hardware Assisted Test Insertion Capabilities on Embedded Processors using an FPGA-based Agile Test Support Co-processor. J. Signal Process. Syst. 79(3): 285-298 (2015) - [c42]Guy-Vincent Jourdan, Gregor von Bochmann, Ettore Merlo, James Miller, Vio Onut, Lin Tan:
Workshop on the application of security and testing to rich internet applications. CASCON 2015: 320-322 - [c41]Zhen Xu, James Miller:
A New Webpage Classification Model Based on Visual Information Using Gestalt Laws of Grouping. WISE (2) 2015: 225-232 - 2014
- [j80]Osama Al-Baik, James Miller:
Waste identification and elimination in information technology organizations. Empir. Softw. Eng. 19(6): 2019-2061 (2014) - [j79]Scott Dick, Omolbanin Yazdanbakhsh, Xiuli Tang, Toan Huynh, James Miller:
An empirical investigation of Web session workloads: Can self-similarity be explained by deterministic chaos? Inf. Process. Manag. 50(1): 41-53 (2014) - [j78]Teh-Chung Chen, Torin Stepan, Scott Dick, James Miller:
An Anti-Phishing System Employing Diffused Information. ACM Trans. Inf. Syst. Secur. 16(4): 16 (2014) - [j77]Ali Shahbazi, James Miller:
Extended Subtree: A New SimilarityFunction for Tree Structured Data. IEEE Trans. Knowl. Data Eng. 26(4): 864-877 (2014) - [j76]Andrew F. Tappenden, James Miller:
Automated cookie collection testing. ACM Trans. Softw. Eng. Methodol. 23(1): 3:1-3:40 (2014) - [c40]Abhimanyu Panwar, Iosif-Viorel Onut, James Miller:
Towards Real Time Contextual Advertising. WISE (2) 2014: 445-459 - 2013
- [j75]Ian Reay, Patricia Beatty, Scott Dick, James Miller:
Privacy policies and national culture on the internet. Inf. Syst. Frontiers 15(2): 279-292 (2013) - [j74]Ming Ying, James Miller:
Refactoring legacy AJAX applications to improve the efficiency of the data exchange component. J. Syst. Softw. 86(1): 72-88 (2013) - [j73]Ejike Ofuonye, James Miller:
Securing web-clients with instrumented code and dynamic runtime monitoring. J. Syst. Softw. 86(6): 1689-1711 (2013) - [j72]Narges Roshanbin, James Miller:
A Survey and Analysis of Current CAPTCHA Approaches. J. Web Eng. 12(1&2): 1-40 (2013) - [j71]Ali Shahbazi, Andrew F. Tappenden, James Miller:
Centroidal Voronoi Tessellations - A New Approach to Random Testing. IEEE Trans. Software Eng. 39(2): 163-183 (2013) - [c39]Joshua Charles Campbell, Chenlei Zhang, Zhen Xu, Abram Hindle, James Miller:
Deficient documentation detection: a methodology to locate deficient project documentation using topic analysis. MSR 2013: 57-60 - 2012
- [j70]Eric Luong, Toan Huynh, James Miller:
On Spam Susceptibility and Browser Updating. Int. J. Syst. Serv. Oriented Eng. 3(1): 44-57 (2012) - [j69]Toan Huynh, James Miller:
AIWAS: The Automatic Identification of Web Attacks System. Int. J. Syst. Serv. Oriented Eng. 3(1): 73-91 (2012) - [j68]Ming Ying, James Miller:
Refactoring Flash Embedding Methods. Int. J. Syst. Serv. Oriented Eng. 3(3): 26-40 (2012) - [j67]Mohamed El-Attar, Ravi Inder Singh, James Miller:
Embracing Composite Metrics in Software Experiments. J. Softw. 7(7): 1664-1676 (2012) - [j66]Mohamed El-Attar, Mahmoud O. Elish, Sajjad Mahmood, James Miller:
Is In-Depth Object-Oriented Knowledge Necessary to Develop Quality Robustness Diagrams? J. Softw. 7(11): 2538-2552 (2012) - [j65]Mohamed El-Attar, James Miller:
Constructing high quality use case models: a systematic review of current practices. Requir. Eng. 17(3): 187-201 (2012) - 2011
- [j64]Patricia Beatty, Ian Reay, Scott Dick, James Miller:
Consumer trust in e-commerce web sites: A meta-study. ACM Comput. Surv. 43(3): 14:1-14:46 (2011) - [j63]John Charles Gyorffy, Andrew F. Tappenden, James Miller:
Token-based graphical password authentication. Int. J. Inf. Sec. 10(6): 321-336 (2011) - [j62]Ming Ying, James Miller:
ART-Improving Execution Time for Flash Applications. Int. J. Syst. Serv. Oriented Eng. 2(1): 1-20 (2011) - [j61]Ming Ying, James Miller:
FTT: A System to Refactor Traditional Forms into Ajax-Enabled Forms. Int. J. Syst. Serv. Oriented Eng. 2(4): 1-20 (2011) - [j60]Ravi I. Singh, Manasa Sumeeth, James Miller:
A user-centric evaluation of the readability of privacy policies in popular web sites. Inf. Syst. Frontiers 13(4): 501-514 (2011) - [j59]James Miller, James E. Prieger:
The Broadcasters' Transition Date Roulette: Strategic Aspects of the DTV Transition. J. Telecommun. High Technol. Law 9(2): 437-500 (2011) - [c38]Ming Ying, James Miller:
Refactoring Traditional Forms into Ajax-enabled Forms. WCRE 2011: 367-371 - [c37]Narges Roshanbin, James Miller:
Finding Homoglyphs - A Step towards Detecting Unicode-Based Visual Spoofing Attacks. WISE 2011: 1-14 - 2010
- [j58]Ravi I. Singh, James Miller:
Empirical Knowledge Discovery by Triangulation in Computer Science. Adv. Comput. 80: 163-190 (2010) - [j57]Toan Huynh, James Miller:
An empirical investigation into open source web applications' implementation vulnerabilities. Empir. Softw. Eng. 15(5): 556-576 (2010) - [j56]Adel Khaled, James Miller:
Chronological fault-based mutation processes for WS-BPEL 2.0 programs. Int. J. Web Eng. Technol. 6(2): 141-170 (2010) - [j55]James Miller, Toan Huynh:
Practical Elimination of External Interaction Vulnerabilities in Web Applications. J. Web Eng. 9(1): 1-24 (2010) - [j54]James Miller, Toan Huynh:
Investigating the Distributional Property of the Session Workload. J. Web Eng. 9(1): 25-47 (2010) - [j53]Ejike Ofuonye, Patricia Beatty, Scott Dick, James Miller:
Prevalence and classification of web page defects. Online Inf. Rev. 34(1): 160-174 (2010) - [j52]Mohamed El-Attar, James Miller:
Developing comprehensive acceptance tests from use cases and robustness diagrams. Requir. Eng. 15(3): 285-306 (2010) - [j51]Mohamed El-Attar, James Miller:
Improving the quality of use case models using antipatterns. Softw. Syst. Model. 9(2): 141-160 (2010) - [j50]Teh-Chung Chen, Scott Dick, James Miller:
Detecting visually similar Web pages: Application to phishing detection. ACM Trans. Internet Techn. 10(2): 5:1-5:38 (2010) - [c36]Ming Ying, James Miller:
Refactoring ActionScript for Improving Application Execution Time. WISE Workshops 2010: 268-281
2000 – 2009
- 2009
- [j49]Toan Huynh, James Miller:
Another viewpoint on "evaluating web software reliability based on workload and failure data extracted from server logs". Empir. Softw. Eng. 14(4): 371-396 (2009) - [j48]Mohamed El-Attar, James Miller:
A subject-based empirical evaluation of SSUCD's performance in reducing inconsistencies in use case models. Empir. Softw. Eng. 14(5): 477-512 (2009) - [j47]Ian Reay, Patricia Beatty, Scott Dick, James Miller:
Do You Know Where Your Data Is? A Study of the Effect of Enforcement Strategies on Privacy Policies. Int. J. Inf. Secur. Priv. 3(4): 68-95 (2009) - [j46]Toan Huynh, James Miller:
Empirical observations on the session timeout threshold. Inf. Process. Manag. 45(5): 513-528 (2009) - [j45]Ian Reay, Scott Dick, James Miller:
An analysis of privacy signals on the World Wide Web: Past, present and future. Inf. Sci. 179(8): 1102-1115 (2009) - [j44]Jiang Yu, Andrew F. Tappenden, James Miller, Michael R. Smith:
A Scalable Testing Framework for Location-Based Services. J. Comput. Sci. Technol. 24(2): 386-404 (2009) - [j43]Andrew F. Tappenden, James Miller:
A Survey of Cookie Technology Adoption Amongst Nations. J. Web Eng. 8(3): 211-244 (2009) - [j42]Michael R. Smith, James Miller, Lily Huang, Albert Tran:
A More Agile Approach to Embedded System Development. IEEE Softw. 26(3): 50-57 (2009) - [j41]Andrew F. Tappenden, James Miller:
A Novel Evolutionary Approach for Adaptive Random Testing. IEEE Trans. Reliab. 58(4): 619-633 (2009) - [j40]Ian Reay, Scott Dick, James Miller:
A large-scale empirical study of P3P privacy policies: Stated actions vs. legal obligations. ACM Trans. Web 3(2): 6:1-6:34 (2009) - [j39]Andrew F. Tappenden, James Miller:
Cookies: A deployment study and the testing implications. ACM Trans. Web 3(3): 9:1-9:49 (2009) - [j38]Michael R. Smith, James Miller, Steven Daeninck:
A Test-oriented Embedded System Production Methodology. J. Signal Process. Syst. 56(1): 69-89 (2009) - 2008
- [j37]James Miller:
Triangulation as a basis for knowledge discovery in software engineering. Empir. Softw. Eng. 13(2): 223-228 (2008) - [j36]James Miller, L. Zhang, Ejike Ofuonye, Michael R. Smith:
The Theory and Implementation of InputValidator: A Semi-Automated Value-Level Bypass Testing Tool. Int. J. Inf. Technol. Web Eng. 3(3): 28-45 (2008) - [j35]Patricia Beatty, Scott Dick, James Miller:
Is HTML in a Race to the Bottom? A Large-Scale Survey and Analysis of Conformance to W3C Standards. IEEE Internet Comput. 12(2): 76-80 (2008) - [j34]Marek Z. Reformat, Xinwei Chai, James Miller:
On the possibilities of (pseudo-) software cloning from external interactions. Soft Comput. 12(1): 29-49 (2008) - [j33]Ejike Ofuonye, Patricia Beatty, Ian Reay, Scott Dick, James Miller:
How Do We Build Trust into E-commerce Web Sites? IEEE Softw. 25(5): 7-9 (2008) - [j32]Mohamed El-Attar, James Miller:
Producing robust use case diagrams via reverse engineering of use case descriptions. Softw. Syst. Model. 7(1): 67-83 (2008) - [c35]Adel Khaled, Yongsheng Ma, James Miller:
A Service Oriented Architecture for CAX concurrent collaboration. CASE 2008: 650-655 - [c34]Andrew F. Tappenden, James Miller:
A Three-Tiered Testing Strategy for Cookies. ICST 2008: 131-140 - [c33]Ejike Ofuonye, James Miller:
Resolving JavaScript Vulnerabilities in the Browser Runtime. ISSRE 2008: 57-66 - [c32]Lily Huang, Michael R. Smith, Albert Tran, James Miller:
E-RACE, A Hardware-Assisted Approach to Lockset-Based Data Race Detection for Embedded Products. ISSRE 2008: 277-278 - [c31]Albert Tran, Michael R. Smith, James Miller:
A Hardware-Assisted Tool for Fast, Full Code Coverage Analysis. ISSRE 2008: 321-322 - [p1]Andy Brooks, Marc Roper, Murray Wood, John W. Daly, James Miller:
Replication's Role in Software Engineering. Guide to Advanced Empirical Software Engineering 2008: 365-379 - 2007
- [j31]Mohamed El-Attar, James Miller:
A User-Centered Approach to Modeling BPEL Business Processes Using SUCD Use Cases. e Informatica Softw. Eng. J. 1(1): 59-76 (2007) - [j30]Man Xiao, Mohamed El-Attar, Marek Z. Reformat, James Miller:
Empirical evaluation of optimization algorithms when used in goal-oriented automated test data generation techniques. Empir. Softw. Eng. 12(2): 183-239 (2007) - [j29]Ping Li, Toan Huynh, Marek Z. Reformat, James Miller:
A practical approach to testing GUI systems. Empir. Softw. Eng. 12(4): 331-357 (2007) - [j28]John D. Ferguson, James Miller:
Modeling Defects In E-Projects. Int. J. Inf. Technol. Web Eng. 2(3): 1-16 (2007) - [j27]Patricia Beatty, Ian Reay, Scott Dick, James Miller:
P3P Adoption on E-Commerce Web sites: A Survey and Analysis. IEEE Internet Comput. 11(2): 65-71 (2007) - [j26]Ian Reay, Patricia Beatty, Scott Dick, James Miller:
A Survey and Analysis of the P3P Protocol's Agents, Adoption, Maintenance, and Future. IEEE Trans. Dependable Secur. Comput. 4(2): 151-164 (2007) - [c30]James Miller, Michael R. Smith:
A TDD approach to introducing students to embedded programming. ITiCSE 2007: 33-37 - 2006
- [j25]Andrew F. Tappenden, Toan Huynh, James Miller, Adam Geras, Michael R. Smith:
Agile Development of Secure Web-Based Applications. Int. J. Inf. Technol. Web Eng. 1(2): 1-24 (2006) - [j24]James Miller, Marek Z. Reformat, Howard Zhang:
Automatic test data generation using genetic algorithm and program dependence graphs. Inf. Softw. Technol. 48(7): 586-605 (2006) - [j23]James Miller, Hean Chin Yeoh:
COTS acquisition process: incorporating business factors into COTS vendor evaluation taxonomies. Softw. Process. Improv. Pract. 11(6): 601-626 (2006) - [c29]Toan Huynh, James Miller:
Developing Secure Web-Based Applications. ISSSE 2006 - [c28]Mohamed El-Attar, James Miller:
Matching Antipatterns to Improve the Quality of Use Case Models. RE 2006: 96-105 - [c27]Mohamed El-Attar, James Miller:
AGADUC: Towards a More Precise Presentation of Functional Requirement in Use Case Mod. SERA 2006: 346-353 - [c26]James Miller, Michael R. Smith, Steven Daeninck, Jingwen Chen, Juan Qiao, Fang Huang, Andrew K. C. Kwan, Marc Roper:
An XP Inspired Test-Oriented Life-Cycle Production Strategy for Building Embedded Biomedical Applications. TAIC PART 2006: 95-106 - [c25]Adam Geras, Michael R. Smith, James Miller:
Configuring Hybrid Agile-Traditional Software Processes. XP 2006: 104-113 - [c24]Jingwen Chen, Michael R. Smith, Adam Geras, James Miller:
Making Fit / FitNesse Appropriate for Biomedical Engineering Research. XP 2006: 186-190 - [c23]Steven Daeninck, Michael R. Smith, James Miller, Linda Ko:
Extending the Embedded System E-TDDunit Test Driven Development Tool for Development of a Real Time Video Security System Prototype. XP 2006: 200-201 - 2005
- [j22]James Miller:
Replicating software engineering experiments: a poisoned chalice or the Holy Grail. Inf. Softw. Technol. 47(4): 233-244 (2005) - [c22]Andrew F. Tappenden, Patricia Beatty, James Miller:
Agile Security Testing of Web-Based Systems via HTTPUnit. AGILE 2005: 29-38 - [c21]Jian Bing Li, James Miller:
Testing the Semantics of W3C XML Schema. COMPSAC (1) 2005: 443-448 - [c20]Toan Huynh, James Miller:
Further investigations into evaluating Web site reliability. ISESE 2005: 162-171 - [c19]Adam Geras, James Miller, Michael R. Smith, James Love:
A Survey of Test Notations and Tools for Customer Testing. XP 2005: 109-117 - [c18]Michael R. Smith, Andrew K. C. Kwan, Alan Martin, James Miller:
E-TDD - Embedded Test Driven Development a Tool for Hardware-Software Co-design Projects. XP 2005: 145-153 - [c17]Jiang Yu, Andrew F. Tappenden, Adam Geras, Michael R. Smith, James Miller:
Agile Testing of Location Based Services. XP 2005: 239-242 - 2004
- [j21]Zhichao Yin, Alastair Dunsmore, James Miller:
Self-assessment of performance in software inspection processes. Inf. Softw. Technol. 46(3): 185-194 (2004) - [j20]James Miller:
Statistical significance testing--a panacea for software technology experiments? . J. Syst. Softw. 73: 183-192 (2004) - [j19]Bengee Lee, James Miller:
Multi-project software engineering analysis using systems thinking. Softw. Process. Improv. Pract. 9(3): 173-214 (2004) - [j18]Bengee Lee, James Miller:
Multi-Project Management in Software Engineering Using Simulation Modelling. Softw. Qual. J. 12(1): 59-82 (2004) - [j17]James Miller, Zhichao Yin:
A Cognitive-Based Mechanism for Constructing Software Inspection Teams. IEEE Trans. Software Eng. 30(11): 811-825 (2004) - [c16]Hean Chin Yeoh, James Miller:
COTS Acquisition Process: Incorporating Business Factors in COTS Vendor Evaluation Taxonomy. IEEE METRICS 2004: 84-95 - [c15]Adam Geras, Michael R. Smith, James Miller:
A Prototype Empirical Evaluation of Test Driven Development. IEEE METRICS 2004: 405-416 - 2003
- [j16]Giancarlo Succi, Witold Pedrycz, Milorad Stefanovic, James Miller:
Practical assessment of the models for identification of defect-prone classes in object-oriented commercial systems using design metrics. J. Syst. Softw. 65(1): 1-12 (2003) - [c14]James Miller, Zhichao Yin:
Adding Diversity to Software Inspections. IEEE ICCI 2003: 81-88 - [c13]Marek Z. Reformat, Xinwei Chai, James Miller:
Experiments in Automatic Programming for General Purposes. ICTAI 2003: 366-373 - 2002
- [j15]James Miller, Fraser MacDonald, John D. Ferguson:
ASSISTing Management Decisions in the Software Inspection Process. Inf. Technol. Manag. 3(1-2): 67-83 (2002) - 2000
- [j14]James Miller:
Applying meta-analytical procedures to software engineering experiments. J. Syst. Softw. 54(1): 29-39 (2000) - [c12]John D. Ferguson, James Miller, George R. S. Weir:
Design and Deployment Decisions within an E-Commerce Environment. WebNet 2000: 176-180 - [c11]George R. S. Weir, John D. Ferguson, James Miller:
Managing Educational Web-dependence. WebNet 2000: 575-580
1990 – 1999
- 1999
- [j13]Fraser MacDonald, James Miller:
A Comparison of Computer Support Systems for Software Inspection. Autom. Softw. Eng. 6(3): 291-313 (1999) - [j12]Murray Wood, John W. Daly, James Miller, Marc Roper:
Multi-method research: An empirical investigation of object-oriented technology. J. Syst. Softw. 48(1): 13-26 (1999) - [j11]James Miller:
Estimating the Number of Remaining Defects after Inspection. Softw. Test. Verification Reliab. 9(3): 167-189 (1999) - [c10]James Miller:
Can Results from Software Engineering Experiments be Safely Combined? IEEE METRICS 1999: 152-158 - [c9]James Miller, John D. Ferguson, Paul Murphy:
Groupware support for asynchronous document review. SIGDOC 1999: 185-192 - [c8]John D. Ferguson, James Miller, George R. S. Weir:
Estimating the Number of Defects at a WWW Site. WebNet 1999: 377-381 - 1998
- [j10]James Miller, Murray Wood, Marc Roper:
Further Experiences with Scenarios and Checklists. Empir. Softw. Eng. 3(1): 37-64 (1998) - [c7]James Miller, Fraser MacDonald:
ASSISTing Exit Decisions in Software Inspection. ASE 1998: 281-284 - 1997
- [j9]James Miller, John W. Daly, Murray Wood, Marc Roper, Andrew Brooks:
Statistical power and its subcomponents - missing and misunderstood concepts in empirical software engineering research. Inf. Softw. Technol. 39(4): 285-295 (1997) - [j8]Marc Roper, Murray Wood, James Miller:
An empirical evaluation of defect detection techniques. Inf. Softw. Technol. 39(11): 763-775 (1997) - [j7]Fraser MacDonald, James Miller:
A Software Inspection Process Definition Language and Prototype Support Tool. Softw. Test. Verification Reliab. 7(2): 99-128 (1997) - [c6]Murray Wood, Marc Roper, Andrew Brooks, James Miller:
Comparing and Combining Software Defect Detection Techniques: A Replicated Empirical Study. ESEC / SIGSOFT FSE 1997: 262-277 - 1996
- [j6]Fraser MacDonald, James Miller, Andrew Brooks, Marc Roper, Murray Wood:
Automating the Software Inspection Process. Autom. Softw. Eng. 3(3/4): 193-218 (1996) - [j5]John W. Daly, Andrew Brooks, James Miller, Marc Roper, Murray Wood:
Evaluating inheritance depth on the maintainability of object-oriented software. Empir. Softw. Eng. 1(2): 109-132 (1996) - [j4]James Miller, John W. Daly, Murray Wood, Andrew Brooks, Marc Roper:
Electronic bulletin board distributed questionnaires for exploratory research. J. Inf. Sci. 22(2): 107-115 (1996) - [j3]Fraser MacDonald, James Miller, Andrew Brooks, Marc Roper, Murray Wood:
Applying Inspection to Object-Oriented Code. Softw. Test. Verification Reliab. 6(2): 61-82 (1996) - 1995
- [j2]James Miller, Marc Roper, Murray Wood, Andrew Brooks:
Towards a benchmark for the evaluation of software testing techniques. Inf. Softw. Technol. 37(1): 5-13 (1995) - [c5]John W. Daly, James Miller, Andrew Brooks, Marc Roper, Murray Wood:
A Survey of Experiences amongst Object-Oriented Practitioners. APSEC 1995: 137- - [c4]John W. Daly, Andrew Brooks, James Miller, Marc Roper, Murray Wood:
The effect of inheritance on the maintainability of object-oriented software: an empirical study. ICSM 1995: 20- - 1994
- [c3]James Miller, Murray Wood, Andrew Brooks, Marc Roper:
Applying object-oriented construction to fault tolerant systems. APSEC 1994: 22-28 - [c2]John W. Daly, Andrew Brooks, James Miller, Marc Roper, Murray Wood:
Verification of Results in Software Maintenance Through External Replication. ICSM 1994: 50-57 - [c1]James Miller, Gerald Darroch, Murray Wood, Andrew Brooks, Marc Roper:
Changing Programming Paradigm - An Empirical Investigation. Software Quality and Productivity 1994: 62-65
1980 – 1989
- 1985
- [j1]Andrew J. T. Colin, Jin-Cheng Dong, James Miller:
Retrofitting machine tools with computer control. Microprocess. Microsystems 9(8): 378-385 (1985)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:19 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint