callback( { "result":{ "query":"systematic* framework*", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"1174.37" }, "completions":{ "@total":"2", "@computed":"2", "@sent":"0" }, "hits":{ "@total":"474", "@computed":"474", "@sent":"474", "@first":"0", "hit":[{ "@score":"2", "@id":"6688", "info":{"authors":{"author":[{"@pid":"24/6914","text":"Hong Zhang"},{"@pid":"367/3299","text":"Shiqin Yuan"},{"@pid":"216/2624","text":"Fengjiao Zhang"},{"@pid":"13/1898","text":"Bin Wang"},{"@pid":"61/9133","text":"Xin (Robert) Luo"}]},"title":"A Systematic Literature Review on IT-enabled value Co-creation: Toward an integrative framework.","venue":"Comput. Hum. Behav.","volume":"152","pages":"108015","year":"2024","type":"Journal Articles","access":"closed","key":"journals/chb/ZhangYZWL24","doi":"10.1016/J.CHB.2023.108015","ee":"https://doi.org/10.1016/j.chb.2023.108015","url":"https://dblp.org/rec/journals/chb/ZhangYZWL24"}, "url":"URL#6688" }, { "@score":"2", "@id":"12534", "info":{"authors":{"author":[{"@pid":"15/7850","text":"Antonio Santos-Olmo Parra"},{"@pid":"78/6763","text":"Luís Enrique Sanchez"},{"@pid":"27/6712","text":"David Garcia Rosado"},{"@pid":"61/4664","text":"Manuel A. Serrano"},{"@pid":"11/1097","text":"Carlos Blanco 0001"},{"@pid":"58/5370","text":"Haralambos Mouratidis"},{"@pid":"f/EduardoFernandezMedina","text":"Eduardo Fernández-Medina"}]},"title":"Towards an integrated risk analysis security framework according to a systematic analysis of existing proposals.","venue":"Frontiers Comput. Sci.","volume":"18","number":"3","pages":"183808","year":"2024","type":"Journal Articles","access":"closed","key":"journals/fcsc/ParraSRSBMF24","doi":"10.1007/S11704-023-1582-6","ee":"https://doi.org/10.1007/s11704-023-1582-6","url":"https://dblp.org/rec/journals/fcsc/ParraSRSBMF24"}, "url":"URL#12534" }, { "@score":"2", "@id":"18252", "info":{"authors":{"author":[{"@pid":"364/7775","text":"Nelson Russo"},{"@pid":"51/270","text":"Leonilde Reis"},{"@pid":"69/1468","text":"Maria Clara Silveira"},{"@pid":"217/4594","text":"Henrique S. Mamede"}]},"title":"Towards a Comprehensive Framework for the Multidisciplinary Evaluation of Organizational Maturity on Business Continuity Program Management: A Systematic Literature Review.","venue":"Inf. Secur. J. A Glob. Perspect.","volume":"33","number":"1","pages":"54-72","year":"2024","type":"Journal Articles","access":"closed","key":"journals/isjgp/RussoRSM24","doi":"10.1080/19393555.2023.2195577","ee":"https://doi.org/10.1080/19393555.2023.2195577","url":"https://dblp.org/rec/journals/isjgp/RussoRSM24"}, "url":"URL#18252" }, { "@score":"2", "@id":"18850", "info":{"authors":{"author":[{"@pid":"89/11145","text":"Hang Ding"},{"@pid":"371/0051","text":"Joshua Simmich"},{"@pid":"182/5243","text":"Atiyeh Vaezipour"},{"@pid":"367/6623","text":"Nicole Andrews"},{"@pid":"370/9299","text":"Trevor Russell"}]},"title":"Evaluation framework for conversational agents with artificial intelligence in health interventions: a systematic scoping review.","venue":"J. Am. Medical Informatics Assoc.","volume":"31","number":"3","pages":"746-761","year":"2024","type":"Journal Articles","access":"closed","key":"journals/jamia/DingSVAR24","doi":"10.1093/JAMIA/OCAD222","ee":"https://doi.org/10.1093/jamia/ocad222","url":"https://dblp.org/rec/journals/jamia/DingSVAR24"}, "url":"URL#18850" }, { "@score":"2", "@id":"24661", "info":{"authors":{"author":[{"@pid":"369/8950","text":"Dipika Gupta"},{"@pid":"35/4332","text":"Manish Kumar"},{"@pid":"182/2494","text":"Sachin Chaudhary"}]},"title":"A systematic review of deep learning frameworks for moving object segmentation.","venue":"Multim. Tools Appl.","volume":"83","number":"8","pages":"24715-24748","year":"2024","type":"Journal Articles","access":"closed","key":"journals/mta/GuptaKC24","doi":"10.1007/S11042-023-16417-3","ee":"https://doi.org/10.1007/s11042-023-16417-3","url":"https://dblp.org/rec/journals/mta/GuptaKC24"}, "url":"URL#24661" }, { "@score":"2", "@id":"31797", "info":{"authors":{"author":[{"@pid":"353/0552","text":"Megan R. Ebers"},{"@pid":"155/6024","text":"Katherine M. Steele"},{"@pid":"74/1516","text":"J. Nathan Kutz"}]},"title":"Discrepancy Modeling Framework: Learning Missing Physics, Modeling Systematic Residuals, and Disambiguating between Deterministic and Random Effects.","venue":"SIAM J. Appl. Dyn. Syst.","volume":"23","number":"1","pages":"440-469","year":"2024","type":"Journal Articles","access":"closed","key":"journals/siamads/EbersSK24","doi":"10.1137/22M148375X","ee":"https://doi.org/10.1137/22m148375x","url":"https://dblp.org/rec/journals/siamads/EbersSK24"}, "url":"URL#31797" }, { "@score":"2", "@id":"35681", "info":{"authors":{"author":[{"@pid":"192/7710","text":"Suhyeong Choi"},{"@pid":"37/5841","text":"Jinwook Jung"},{"@pid":"k/AndrewBKahng","text":"Andrew B. Kahng"},{"@pid":"78/661","text":"Minsoo Kim"},{"@pid":"13/1047","text":"Chul-Hong Park"},{"@pid":"234/5542","text":"Bodhisatta Pramanik"},{"@pid":"345/8369","text":"Dooseok Yoon"}]},"title":"PROBE3.0: A Systematic Framework for Design-Technology Pathfinding With Improved Design Enablement.","venue":"IEEE Trans. Comput. Aided Des. Integr. Circuits Syst.","volume":"43","number":"4","pages":"1218-1231","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tcad/ChoiJKKPPY24","doi":"10.1109/TCAD.2023.3334591","ee":"https://doi.org/10.1109/TCAD.2023.3334591","url":"https://dblp.org/rec/journals/tcad/ChoiJKKPPY24"}, "url":"URL#35681" }, { "@score":"2", "@id":"40093", "info":{"authors":{"author":[{"@pid":"243/9714","text":"Zijie Wu"},{"@pid":"90/548-1","text":"Yaonan Wang 0001"},{"@pid":"169/2829","text":"He Xie"},{"@pid":"184/6596","text":"Mingtao Feng"},{"@pid":"145/5323-2","text":"Haotian Wu 0002"},{"@pid":"77/7806","text":"Chao Ding"},{"@pid":"63/807","text":"Ajmal Mian"}]},"title":"A Systematic Point Cloud Edge Detection Framework for Automatic Aircraft Skin Milling.","venue":"IEEE Trans. Ind. Informatics","volume":"20","number":"1","pages":"560-572","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tii/WuWXFWDM24","doi":"10.1109/TII.2023.3268404","ee":"https://doi.org/10.1109/TII.2023.3268404","url":"https://dblp.org/rec/journals/tii/WuWXFWDM24"}, "url":"URL#40093" }, { "@score":"2", "@id":"59920", "info":{"authors":{"author":[{"@pid":"367/2487","text":"Kim-Celine Kahl"},{"@pid":"334/4101","text":"Carsten T. Lüth"},{"@pid":"281/6999","text":"Maximilian Zenk"},{"@pid":"133/0183","text":"Klaus H. Maier-Hein"},{"@pid":"179/4749","text":"Paul F. Jaeger"}]},"title":"ValUES: A Framework for Systematic Validation of Uncertainty Estimation in Semantic Segmentation.","venue":"CoRR","volume":"abs/2401.08501","year":"2024","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-2401-08501","doi":"10.48550/ARXIV.2401.08501","ee":"https://doi.org/10.48550/arXiv.2401.08501","url":"https://dblp.org/rec/journals/corr/abs-2401-08501"}, "url":"URL#59920" }, { "@score":"2", "@id":"61567", "info":{"authors":{"author":[{"@pid":"02/5889","text":"Yu Wang"},{"@pid":"167/9071","text":"Chuili Kong"},{"@pid":"167/3705","text":"Xian Meng"},{"@pid":"143/9632","text":"Hejia Luo"},{"@pid":"231/1940","text":"Ke-Xin Li"},{"@pid":"125/8189","text":"Jun Wang"}]},"title":"Systematic Performance Evaluation Framework for LEO Mega-Constellation Satellite Networks.","venue":"CoRR","volume":"abs/2401.11934","year":"2024","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-2401-11934","doi":"10.48550/ARXIV.2401.11934","ee":"https://doi.org/10.48550/arXiv.2401.11934","url":"https://dblp.org/rec/journals/corr/abs-2401-11934"}, "url":"URL#61567" }, { "@score":"2", "@id":"71655", "info":{"authors":{"author":[{"@pid":"s/DanielSchwabe","text":"Daniel Schwabe"},{"@pid":"305/3155","text":"Katinka Becker"},{"@pid":"371/2789","text":"Martin Seyferth"},{"@pid":"322/4803","text":"Andreas Klaß"},{"@pid":"15/2699","text":"Tobias Schäffter"}]},"title":"The METRIC-framework for assessing data quality for trustworthy AI in medicine: a systematic review.","venue":"CoRR","volume":"abs/2402.13635","year":"2024","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-2402-13635","doi":"10.48550/ARXIV.2402.13635","ee":"https://doi.org/10.48550/arXiv.2402.13635","url":"https://dblp.org/rec/journals/corr/abs-2402-13635"}, "url":"URL#71655" }, { "@score":"2", "@id":"79429", "info":{"authors":{"author":[{"@pid":"285/2344","text":"Mahmood A. Al-Shareeda"},{"@pid":"41/3678","text":"Selvakumar Manickam"}]},"title":"A Systematic Literature Review on Security of Vehicular Ad-Hoc Network (VANET) Based on VEINS Framework.","venue":"IEEE Access","volume":"11","pages":"46218-46228","year":"2023","type":"Journal Articles","access":"open","key":"journals/access/AlShareedaM23","doi":"10.1109/ACCESS.2023.3274774","ee":"https://doi.org/10.1109/ACCESS.2023.3274774","url":"https://dblp.org/rec/journals/access/AlShareedaM23"}, "url":"URL#79429" }, { "@score":"2", "@id":"80018", "info":{"authors":{"author":[{"@pid":"316/3224","text":"Athanasios Bachoumis"},{"@pid":"286/9039","text":"Costas Mylonas"},{"@pid":"316/3031","text":"Konstantinos Plakas"},{"@pid":"36/467","text":"Michael K. Birbas"},{"@pid":"51/3367","text":"Alexios N. Birbas"}]},"title":"Data-Driven Analytics for Reliability in the Buildings-to-Grid Integrated System Framework: A Systematic Text-Mining-Assisted Literature Review and Trend Analysis.","venue":"IEEE Access","volume":"11","pages":"130763-130787","year":"2023","type":"Journal Articles","access":"open","key":"journals/access/BachoumisMPBB23","doi":"10.1109/ACCESS.2023.3335191","ee":"https://doi.org/10.1109/ACCESS.2023.3335191","url":"https://dblp.org/rec/journals/access/BachoumisMPBB23"}, "url":"URL#80018" }, { "@score":"2", "@id":"83240", "info":{"authors":{"author":[{"@pid":"360/3202","text":"Kausar-Nasreen Khattak"},{"@pid":"220/0925","text":"Faiza Qayyum"},{"@pid":"360/2720","text":"Syed Shehryar Ali Naqvi"},{"@pid":"94/8616","text":"Asif Mehmood"},{"@pid":"95/2312","text":"Jungsuk Kim"}]},"title":"A Systematic Framework for Addressing Critical Challenges in Adopting DevOps Culture in Software Development: A PLS-SEM Perspective.","venue":"IEEE Access","volume":"11","pages":"120137-120156","year":"2023","type":"Journal Articles","access":"open","key":"journals/access/KhattakQNMK23","doi":"10.1109/ACCESS.2023.3325325","ee":"https://doi.org/10.1109/ACCESS.2023.3325325","url":"https://dblp.org/rec/journals/access/KhattakQNMK23"}, "url":"URL#83240" }, { "@score":"2", "@id":"84763", "info":{"authors":{"author":[{"@pid":"338/8009","text":"Mohamed Noordin Yusuff Marican"},{"@pid":"01/5942","text":"Shukor Abd Razak"},{"@pid":"91/2951","text":"Ali Selamat"},{"@pid":"83/8212","text":"Siti Hajar Othman"}]},"title":"Cyber Security Maturity Assessment Framework for Technology Startups: A Systematic Literature Review.","venue":"IEEE Access","volume":"11","pages":"5442-5452","year":"2023","type":"Journal Articles","access":"open","key":"journals/access/MaricanRSO23","doi":"10.1109/ACCESS.2022.3229766","ee":"https://doi.org/10.1109/ACCESS.2022.3229766","url":"https://dblp.org/rec/journals/access/MaricanRSO23"}, "url":"URL#84763" }, { "@score":"2", "@id":"86341", "info":{"authors":{"author":[{"@pid":"335/5115","text":"Rita Roy"},{"@pid":"309/0323","text":"Mohammad Dawood Babakerkhell"},{"@pid":"335/5225","text":"Subhodeep Mukherjee"},{"@pid":"03/3416","text":"Debajyoti Pal"},{"@pid":"22/2600","text":"Suree Funilkul"}]},"title":"Development of a Framework for Metaverse in Education: A Systematic Literature Review Approach.","venue":"IEEE Access","volume":"11","pages":"57717-57734","year":"2023","type":"Journal Articles","access":"open","key":"journals/access/RoyBMPF23","doi":"10.1109/ACCESS.2023.3283273","ee":"https://doi.org/10.1109/ACCESS.2023.3283273","url":"https://dblp.org/rec/journals/access/RoyBMPF23"}, "url":"URL#86341" }, { "@score":"2", "@id":"92018", "info":{"authors":{"author":[{"@pid":"289/8936","text":"Fahimeh Hosseinnia Shavaki"},{"@pid":"344/4767","text":"Ali Ebrahimi Ghahnavieh"}]},"title":"Applications of deep learning into supply chain management: a systematic literature review and a framework for future research.","venue":"Artif. Intell. Rev.","volume":"56","number":"5","pages":"4447-4489","year":"2023","type":"Journal Articles","access":"closed","key":"journals/air/ShavakiG23","doi":"10.1007/S10462-022-10289-Z","ee":"https://doi.org/10.1007/s10462-022-10289-z","url":"https://dblp.org/rec/journals/air/ShavakiG23"}, "url":"URL#92018" }, { "@score":"2", "@id":"98986", "info":{"authors":{"author":[{"@pid":"180/5818","text":"Muhammad Azeem Akbar"},{"@pid":"166/2442","text":"Arif Ali Khan"},{"@pid":"264/2970","text":"Saima Rafi"}]},"title":"A systematic decision-making framework for tackling quantum software engineering challenges.","venue":"Autom. Softw. Eng.","volume":"30","number":"2","pages":"22","year":"2023","type":"Journal Articles","access":"open","key":"journals/ase/AkbarKR23","doi":"10.1007/S10515-023-00389-7","ee":"https://doi.org/10.1007/s10515-023-00389-7","url":"https://dblp.org/rec/journals/ase/AkbarKR23"}, "url":"URL#98986" }, { "@score":"2", "@id":"107032", "info":{"authors":{"author":[{"@pid":"363/5749","text":"Adane Kassa"},{"@pid":"141/7208","text":"Daniel Kitaw"},{"@pid":"199/7903","text":"Ulrich Stache"},{"@pid":"154/0724","text":"Birhanu Beshah"},{"@pid":"363/5029","text":"Getachew Degefu"}]},"title":"Artificial intelligence techniques for enhancing supply chain resilience: A systematic literature review, holistic framework, and future research.","venue":"Comput. Ind. Eng.","volume":"186","pages":"109714","year":"2023","type":"Journal Articles","access":"closed","key":"journals/candie/KassaKSBD23","doi":"10.1016/J.CIE.2023.109714","ee":"https://doi.org/10.1016/j.cie.2023.109714","url":"https://dblp.org/rec/journals/candie/KassaKSBD23"}, "url":"URL#107032" }, { "@score":"2", "@id":"109808", "info":{"authors":{"author":[{"@pid":"50/8297","text":"Jaeho Jeon"},{"@pid":"330/5679","text":"Seongyong Lee"},{"@pid":"330/6199","text":"Hohsung Choe"}]},"title":"Beyond ChatGPT: A conceptual framework and systematic review of speech-recognition chatbots for language learning.","venue":"Comput. Educ.","volume":"206","pages":"104898","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ce/JeonLC23","doi":"10.1016/J.COMPEDU.2023.104898","ee":"https://doi.org/10.1016/j.compedu.2023.104898","url":"https://dblp.org/rec/journals/ce/JeonLC23"}, "url":"URL#109808" }, { "@score":"2", "@id":"112256", "info":{"authors":{"author":[{"@pid":"347/4517","text":"Joanna Nicholas"},{"@pid":"347/4816","text":"Brennen Mills"},{"@pid":"347/4903","text":"Sara Hansen"},{"@pid":"347/4543","text":"Stephen J. Bright"},{"@pid":"13/10056","text":"Joseph Scott"},{"@pid":"347/4530","text":"Imogen Ridout"},{"@pid":"347/4683","text":"Jess Watson"},{"@pid":"176/2681","text":"Heather Boyd"},{"@pid":"347/4930","text":"Luke Brook"},{"@pid":"234/4227","text":"Luke Hopper"}]},"title":"Sideffect GamePlan: Development of an alcohol and other drug serious game for high school students using a systematic and iterative user-centred game development framework.","venue":"Comput. Hum. Behav.","volume":"145","pages":"107774","year":"2023","type":"Journal Articles","access":"open","key":"journals/chb/NicholasMHBSRWBBH23","doi":"10.1016/J.CHB.2023.107774","ee":"https://doi.org/10.1016/j.chb.2023.107774","url":"https://dblp.org/rec/journals/chb/NicholasMHBSRWBBH23"}, "url":"URL#112256" }, { "@score":"2", "@id":"118954", "info":{"authors":{"author":[{"@pid":"349/6942","text":"Natnael Gonfa Berihun"},{"@pid":"67/7294","text":"Cyrille Dongmo"},{"@pid":"12/1670","text":"John Andrew van der Poll"}]},"title":"The Applicability of Automated Testing Frameworks for Mobile Application Testing: A Systematic Literature Review.","venue":"Comput.","volume":"12","number":"5","pages":"97","year":"2023","type":"Journal Articles","access":"open","key":"journals/computers/BerihunDP23","doi":"10.3390/COMPUTERS12050097","ee":"https://doi.org/10.3390/computers12050097","url":"https://dblp.org/rec/journals/computers/BerihunDP23"}, "url":"URL#118954" }, { "@score":"2", "@id":"131457", "info":{"authors":{"author":[{"@pid":"261/3991","text":"Hasna Arshad"},{"@pid":"65/5542","text":"Sohail Asghar"},{"@pid":"04/6198","text":"Muhammad Asim Noor"}]},"title":"A framework for eGovernment project success: an exploratory study using systematic literature review and empirical investigation.","venue":"Electron. Gov. an Int. J.","volume":"19","number":"1","pages":"22-54","year":"2023","type":"Journal Articles","access":"closed","key":"journals/eg/ArshadAN23","doi":"10.1504/EG.2022.10040814","ee":"https://doi.org/10.1504/EG.2022.10040814","url":"https://dblp.org/rec/journals/eg/ArshadAN23"}, "url":"URL#131457" }, { "@score":"2", "@id":"131637", "info":{"authors":{"author":[{"@pid":"277/2691","text":"Judith Wewerka"},{"@pid":"r/ManfredReichert","text":"Manfred Reichert"}]},"title":"Robotic process automation - a systematic mapping study and classification framework.","venue":"Enterp. Inf. Syst.","volume":"17","number":"2","year":"2023","type":"Journal Articles","access":"closed","key":"journals/eis/WewerkaR23","doi":"10.1080/17517575.2021.1986862","ee":"https://doi.org/10.1080/17517575.2021.1986862","url":"https://dblp.org/rec/journals/eis/WewerkaR23"}, "url":"URL#131637" }, { "@score":"2", "@id":"134637", "info":{"authors":{"author":[{"@pid":"269/8970","text":"Maria P. Vilas"},{"@pid":"345/3443","text":"Felix Egger"},{"@pid":"269/8549","text":"Matthew P. Adams"},{"@pid":"30/5914","text":"Holger R. Maier"},{"@pid":"62/1535","text":"Barbara J. Robson"},{"@pid":"185/7562","text":"Jonathan Ferrer-Mestres"},{"@pid":"63/3237","text":"Lachlan K. Stewart"},{"@pid":"29/7497","text":"Paul Maxwell"},{"@pid":"269/9061","text":"Katherine R. O'Brien"}]},"title":"TALKS: A systematic framework for resolving model-data discrepancies.","venue":"Environ. Model. Softw.","volume":"163","pages":"105668","year":"2023","type":"Journal Articles","access":"closed","key":"journals/envsoft/VilasEAMRFSMO23","doi":"10.1016/J.ENVSOFT.2023.105668","ee":"https://doi.org/10.1016/j.envsoft.2023.105668","url":"https://dblp.org/rec/journals/envsoft/VilasEAMRFSMO23"}, "url":"URL#134637" }, { "@score":"2", "@id":"140025", "info":{"authors":{"author":[{"@pid":"364/5155","text":"Silvan Hornstein"},{"@pid":"360/2425","text":"Kirsten Zantvoort"},{"@pid":"267/5200","text":"Ulrike Lueken"},{"@pid":"05/527","text":"Burkhardt Funk"},{"@pid":"267/5143","text":"Kevin Hilbert"}]},"title":"Personalization strategies in digital mental health interventions: a systematic review and conceptual framework for depressive symptoms.","venue":"Frontiers Digit. Health","volume":"5","year":"2023","type":"Journal Articles","access":"open","key":"journals/fdgth/HornsteinZLFH23","doi":"10.3389/FDGTH.2023.1170002","ee":"https://doi.org/10.3389/fdgth.2023.1170002","url":"https://dblp.org/rec/journals/fdgth/HornsteinZLFH23"}, "url":"URL#140025" }, { "@score":"2", "@id":"153436", "info":{"authors":{"author":{"@pid":"136/4538","text":"Thembekile O. Mayayise"}},"title":"BYOD security issues and controls framework: an outcome of a systematic literature review.","venue":"Int. J. Inf. Comput. Secur.","volume":"21","number":"1/2","pages":"135-161","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ijics/Mayayise23","doi":"10.1504/IJICS.2023.131095","ee":"https://doi.org/10.1504/IJICS.2023.131095","url":"https://dblp.org/rec/journals/ijics/Mayayise23"}, "url":"URL#153436" }, { "@score":"2", "@id":"154743", "info":{"authors":{"author":[{"@pid":"353/4463","text":"Berioska Contreras Vargas"},{"@pid":"41/4262","text":"Seppo Virtanen"}]},"title":"A cloud-based systematic cyber security teaching and learning framework for high school students.","venue":"Int. J. Knowl. Learn.","volume":"16","number":"3","pages":"316-339","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ijkl/VargasV23","doi":"10.1504/IJKL.2023.132163","ee":"https://doi.org/10.1504/IJKL.2023.132163","url":"https://dblp.org/rec/journals/ijkl/VargasV23"}, "url":"URL#154743" }, { "@score":"2", "@id":"154765", "info":{"authors":{"author":[{"@pid":"362/5253","text":"Katie Logos"},{"@pid":"292/8007","text":"Russell Brewer"},{"@pid":"122/9329","text":"Colette Langos"},{"@pid":"69/10435","text":"Bryce Westlake"}]},"title":"Establishing a framework for the ethical and legal use of web scrapers by cybercrime and cybersecurity researchers: learnings from a systematic review of Australian research.","venue":"Int. J. Law Inf. Technol.","volume":"31","number":"3","pages":"186-212","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ijlit/LogosBLW23","doi":"10.1093/IJLIT/EAAD023","ee":"https://doi.org/10.1093/ijlit/eaad023","url":"https://dblp.org/rec/journals/ijlit/LogosBLW23"}, "url":"URL#154765" }, { "@score":"2", "@id":"161184", "info":{"authors":{"author":[{"@pid":"225/4424","text":"Zoe Hoy"},{"@pid":"12/9027","text":"Mark Xu"}]},"title":"Agile Software Requirements Engineering Challenges-Solutions - A Conceptual Framework from Systematic Literature Review.","venue":"Inf.","volume":"14","number":"6","pages":"322","year":"2023","type":"Journal Articles","access":"open","key":"journals/information/HoyX23","doi":"10.3390/INFO14060322","ee":"https://doi.org/10.3390/info14060322","url":"https://dblp.org/rec/journals/information/HoyX23"}, "url":"URL#161184" }, { "@score":"2", "@id":"162679", "info":{"authors":{"author":[{"@pid":"81/10606","text":"Nisha"},{"@pid":"363/9839","text":"Urvashi"}]},"title":"A systematic literature review of Internet of Video Things: Trends, techniques, datasets, and framework.","venue":"Internet Things","volume":"24","pages":"100906","year":"2023","type":"Journal Articles","access":"closed","key":"journals/iot/NishaU23","doi":"10.1016/J.IOT.2023.100906","ee":"https://doi.org/10.1016/j.iot.2023.100906","url":"https://dblp.org/rec/journals/iot/NishaU23"}, "url":"URL#162679" }, { "@score":"2", "@id":"164107", "info":{"authors":{"author":[{"@pid":"295/9513","text":"Leon Witt"},{"@pid":"320/8197","text":"Mathis Heyer"},{"@pid":"45/10835","text":"Kentaroh Toyoda"},{"@pid":"79/9736","text":"Wojciech Samek"},{"@pid":"48/4185-1","text":"Dan Li 0001"}]},"title":"Decentral and Incentivized Federated Learning Frameworks: A Systematic Literature Review.","venue":"IEEE Internet Things J.","volume":"10","number":"4","pages":"3642-3663","year":"2023","type":"Journal Articles","access":"open","key":"journals/iotj/WittHTSL23","doi":"10.1109/JIOT.2022.3231363","ee":"https://doi.org/10.1109/JIOT.2022.3231363","url":"https://dblp.org/rec/journals/iotj/WittHTSL23"}, "url":"URL#164107" }, { "@score":"2", "@id":"169496", "info":{"authors":{"author":[{"@pid":"24/2900-2","text":"Yogesh Kumar 0002"},{"@pid":"265/2879","text":"Apeksha Koul"},{"@pid":"124/9888","text":"Ruchi Singla"},{"@pid":"224/5113","text":"Muhammad Fazal Ijaz"}]},"title":"Artificial intelligence in disease diagnosis: a systematic literature review, synthesizing framework and future research agenda.","venue":"J. Ambient Intell. Humaniz. Comput.","volume":"14","number":"7","pages":"8459-8486","year":"2023","type":"Journal Articles","access":"closed","key":"journals/jaihc/KumarKSI23","doi":"10.1007/S12652-021-03612-Z","ee":"https://doi.org/10.1007/s12652-021-03612-z","url":"https://dblp.org/rec/journals/jaihc/KumarKSI23"}, "url":"URL#169496" }, { "@score":"2", "@id":"169862", "info":{"authors":{"author":[{"@pid":"45/9410","text":"Rifat Sonmez"},{"@pid":"242/1719","text":"Ferda Özdemir Sönmez"},{"@pid":"349/4943","text":"Salar Ahmadisheykhsarmast"}]},"title":"Blockchain in project management: a systematic review of use cases and a design decision framework.","venue":"J. Ambient Intell. Humaniz. Comput.","volume":"14","number":"7","pages":"8433-8447","year":"2023","type":"Journal Articles","access":"closed","key":"journals/jaihc/SonmezSA23","doi":"10.1007/S12652-021-03610-1","ee":"https://doi.org/10.1007/s12652-021-03610-1","url":"https://dblp.org/rec/journals/jaihc/SonmezSA23"}, "url":"URL#169862" }, { "@score":"2", "@id":"170779", "info":{"authors":{"author":[{"@pid":"215/9176","text":"Anton H. van der Vegt"},{"@pid":"353/0959","text":"Ian A Scott"},{"@pid":"353/1048","text":"Krishna Dermawan"},{"@pid":"353/0207","text":"Rudolf J. Schnetler"},{"@pid":"353/0857","text":"Vikrant R. Kalke"},{"@pid":"313/2229","text":"Paul J. Lane"}]},"title":"Deployment of machine learning algorithms to predict sepsis: systematic review and application of the SALIENT clinical AI implementation framework.","venue":"J. Am. Medical Informatics Assoc.","volume":"30","number":"7","pages":"1349-1361","year":"2023","type":"Journal Articles","access":"open","key":"journals/jamia/VegtSDSKL23","doi":"10.1093/JAMIA/OCAD075","ee":"https://doi.org/10.1093/jamia/ocad075","url":"https://dblp.org/rec/journals/jamia/VegtSDSKL23"}, "url":"URL#170779" }, { "@score":"2", "@id":"180192", "info":{"authors":{"author":[{"@pid":"43/504","text":"Srinath Perera"},{"@pid":"72/9146","text":"Xiao-Hua Jin"},{"@pid":"299/7310","text":"Priyadarshini Das"},{"@pid":"308/1450","text":"Kasun D. B. Gunasekara"},{"@pid":"342/2980","text":"Marini Samaratunga"}]},"title":"A strategic framework for digital maturity of design and construction through a systematic review and application.","venue":"J. Ind. Inf. Integr.","volume":"31","pages":"100413","year":"2023","type":"Journal Articles","access":"closed","key":"journals/jiii/PereraJDGS23","doi":"10.1016/J.JII.2022.100413","ee":"https://doi.org/10.1016/j.jii.2022.100413","url":"https://dblp.org/rec/journals/jiii/PereraJDGS23"}, "url":"URL#180192" }, { "@score":"2", "@id":"181869", "info":{"authors":{"author":[{"@pid":"355/3858","text":"David Eneko Ruiz de Gauna"},{"@pid":"348/4392","text":"Luis Enrique Sánchez"},{"@pid":"66/7423","text":"Almudena Ruiz-Iniesta"},{"@pid":"00/1342","text":"Claudia Villalonga"},{"@pid":"61/4664","text":"Manuel A. Serrano"}]},"title":"Towards an integrated swarm intelligence framework for urban mobility:A systematic review and proposed theoretical model.","venue":"J. King Saud Univ. Comput. Inf. Sci.","volume":"35","number":"10","pages":"101836","year":"2023","type":"Journal Articles","access":"open","key":"journals/jksucis/GaunaSRVS23","doi":"10.1016/J.JKSUCI.2023.101836","ee":"https://doi.org/10.1016/j.jksuci.2023.101836","url":"https://dblp.org/rec/journals/jksucis/GaunaSRVS23"}, "url":"URL#181869" }, { "@score":"2", "@id":"201981", "info":{"authors":{"author":[{"@pid":"159/7108","text":"Wenting Yu"},{"@pid":"354/2765","text":"Brett Payton"},{"@pid":"312/3464","text":"Mengru Sun"},{"@pid":"324/8051","text":"Wufan Jia"},{"@pid":"170/4473","text":"Guanxiong Huang"}]},"title":"Toward an integrated framework for misinformation and correction sharing: A systematic review across domains.","venue":"New Media Soc.","volume":"25","number":"8","pages":"2241-2267","year":"2023","type":"Journal Articles","access":"closed","key":"journals/nms/YuPSJH23","doi":"10.1177/14614448221116569","ee":"https://doi.org/10.1177/14614448221116569","url":"https://dblp.org/rec/journals/nms/YuPSJH23"}, "url":"URL#201981" }, { "@score":"2", "@id":"203444", "info":{"authors":{"author":[{"@pid":"137/8563","text":"Caihua Liu"},{"@pid":"57/215","text":"Didar Zowghi"}]},"title":"Citizen involvement in digital transformation: a systematic review and a framework.","venue":"Online Inf. Rev.","volume":"47","number":"4","pages":"644-660","year":"2023","type":"Journal Articles","access":"closed","key":"journals/oir/LiuZ23","doi":"10.1108/OIR-04-2022-0237","ee":"https://doi.org/10.1108/OIR-04-2022-0237","url":"https://dblp.org/rec/journals/oir/LiuZ23"}, "url":"URL#203444" }, { "@score":"2", "@id":"222648", "info":{"authors":{"author":[{"@pid":"156/9643","text":"Justin L. Hess"},{"@pid":"237/6660","text":"Alison J. Kerr"},{"@pid":"173/1346","text":"Athena Lin"},{"@pid":"59/11411","text":"Andrew Chung"}]},"title":"A Systematic Review of the 2016 National Academy of Engineering Exemplary Ethics Programs: Revisions to a Coding Framework.","venue":"Sci. Eng. Ethics","volume":"29","number":"6","pages":"36","year":"2023","type":"Journal Articles","access":"closed","key":"journals/see/HessKLC23","doi":"10.1007/S11948-023-00456-Y","ee":"https://doi.org/10.1007/s11948-023-00456-y","url":"https://dblp.org/rec/journals/see/HessKLC23"}, "url":"URL#222648" }, { "@score":"2", "@id":"244075", "info":{"authors":{"author":[{"@pid":"360/6509","text":"Liliane de Almeida"},{"@pid":"301/9157","text":"Diego Augusto de Jesus Pacheco"},{"@pid":"134/6564","text":"Carlos Fernando Jung"},{"@pid":"80/10683","text":"Carla Schwengber ten Caten"}]},"title":"Seeing beyond the obvious in Ex-post Evaluation of Science, Technology and Innovation Projects: Systematic Literature Review, Conceptual Framework and Research Agenda.","venue":"Technol. Anal. Strateg. Manag.","volume":"35","number":"11","pages":"1426-1436","year":"2023","type":"Journal Articles","access":"closed","key":"journals/taasm/AlmeidaPJC23","doi":"10.1080/09537325.2021.2009795","ee":"https://doi.org/10.1080/09537325.2021.2009795","url":"https://dblp.org/rec/journals/taasm/AlmeidaPJC23"}, "url":"URL#244075" }, { "@score":"2", "@id":"268829", "info":{"authors":{"author":[{"@pid":"327/9569","text":"Filipe Arantes Fernandes"},{"@pid":"19/8164","text":"Claudia Susie Camargo Rodrigues"},{"@pid":"76/8543","text":"Eldânae Nogueira Teixeira"},{"@pid":"w/CMLWerner","text":"Cláudia M. L. Werner"}]},"title":"Immersive Learning Frameworks: A Systematic Literature Review.","venue":"IEEE Trans. Learn. Technol.","volume":"16","number":"5","pages":"736-747","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tlt/FernandesRTW23","doi":"10.1109/TLT.2023.3242553","ee":"https://doi.org/10.1109/TLT.2023.3242553","url":"https://dblp.org/rec/journals/tlt/FernandesRTW23"}, "url":"URL#268829" }, { "@score":"2", "@id":"279848", "info":{"authors":{"author":[{"@pid":"52/9893","text":"Raj Kishen Moloo"},{"@pid":"54/4637","text":"Kavi Kumar Khedo"},{"@pid":"05/4829","text":"Ravindra Boojhawon"},{"@pid":"359/0432","text":"Tadinada Venkata Prabhakar"}]},"title":"Empirical validation of the OCRAT framework. A holistic and systematic guideline for audio-only instructional design.","venue":"Univers. Access Inf. Soc.","volume":"22","number":"4","pages":"1259-1278","year":"2023","type":"Journal Articles","access":"closed","key":"journals/uais/MolooKBP23","doi":"10.1007/S10209-022-00900-Z","ee":"https://doi.org/10.1007/s10209-022-00900-z","url":"https://dblp.org/rec/journals/uais/MolooKBP23"}, "url":"URL#279848" }, { "@score":"2", "@id":"303718", "info":{"authors":{"author":[{"@pid":"348/7962","text":"Jolanta Graudone"},{"@pid":"53/2482","text":"Marite Kirikova"}]},"title":"Systematic Literature Review of Agile Framework Application for IT System Development in Public Sector.","venue":"Agil-ISE@CAiSE","pages":"10-16","year":"2023","type":"Conference and Workshop Papers","access":"open","key":"conf/caise/GraudoneK23","ee":"https://ceur-ws.org/Vol-3414/paper-2.pdf","url":"https://dblp.org/rec/conf/caise/GraudoneK23"}, "url":"URL#303718" }, { "@score":"2", "@id":"307787", "info":{"authors":{"author":[{"@pid":"310/0996","text":"Christian Mugisho Zagabe"},{"@pid":"34/11047","text":"Alexandre Mauroy"}]},"title":"On Systematic Criteria for the Global Stability of Nonlinear Systems Via the Koopman Operator Framework.","venue":"CDC","pages":"6653-6658","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/cdc/ZagabeM23","doi":"10.1109/CDC49753.2023.10383760","ee":"https://doi.org/10.1109/CDC49753.2023.10383760","url":"https://dblp.org/rec/conf/cdc/ZagabeM23"}, "url":"URL#307787" }, { "@score":"2", "@id":"318737", "info":{"authors":{"author":[{"@pid":"259/7508","text":"Nishanth Laxman"},{"@pid":"207/3538","text":"Daniel Krohmer"},{"@pid":"49/955","text":"Markus Damm"},{"@pid":"88/1927","text":"Reinhard Schwarz"},{"@pid":"51/9989","text":"Pablo Oliveira Antonino"}]},"title":"Understanding Resilience: Looking at Frameworks & Standards - A Systematic Study from Cyber Perspective.","venue":"CSR","pages":"295-300","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/csr2/LaxmanKDSA23","doi":"10.1109/CSR57506.2023.10224958","ee":"https://doi.org/10.1109/CSR57506.2023.10224958","url":"https://dblp.org/rec/conf/csr2/LaxmanKDSA23"}, "url":"URL#318737" }, { "@score":"2", "@id":"345498", "info":{"authors":{"author":[{"@pid":"81/6603","text":"Muzammil Hussain"},{"@pid":"351/6421","text":"Isra Sarfraz"},{"@pid":"52/4917","text":"Abhishek Sharma"}]},"title":"Demystifying the Role of Digital Leadership in the Healthcare Industry: A Systematic Review Towards the Development of a Digital Leadership Framework in the Healthcare Industry.","venue":"HCI","pages":"49-64","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/hci/HussainSS23","doi":"10.1007/978-3-031-35748-0_4","ee":"https://doi.org/10.1007/978-3-031-35748-0_4","url":"https://dblp.org/rec/conf/hci/HussainSS23"}, "url":"URL#345498" }, { "@score":"2", "@id":"345892", "info":{"authors":{"author":[{"@pid":"41/6914","text":"Lian Liu"},{"@pid":"122/4939","text":"Boyuan Zhang"}]},"title":"Research on Systematic Design Framework of Subway Public Art Based on Urban Spirit.","venue":"HCI","pages":"470-477","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/hci/LiuZ23","doi":"10.1007/978-3-031-35998-9_62","ee":"https://doi.org/10.1007/978-3-031-35998-9_62","url":"https://dblp.org/rec/conf/hci/LiuZ23"}, "url":"URL#345892" }, { "@score":"2", "@id":"346789", "info":{"authors":{"author":[{"@pid":"351/4882","text":"Dayou Wu"},{"@pid":"05/7466","text":"Guochao Peng"},{"@pid":"351/4779","text":"Yiwan Ai"},{"@pid":"55/2893","text":"Huan Li"},{"@pid":"187/9213","text":"Shaolan Li"},{"@pid":"340/1270","text":"Yating Peng"}]},"title":"A Systematic and Innovative Six-in-One Evaluation Framework to Drive the Development of Future Hidden Champions.","venue":"HCI","pages":"138-155","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/hci/WuPALLP23","doi":"10.1007/978-3-031-34668-2_10","ee":"https://doi.org/10.1007/978-3-031-34668-2_10","url":"https://dblp.org/rec/conf/hci/WuPALLP23"}, "url":"URL#346789" }, { "@score":"2", "@id":"347817", "info":{"authors":{"author":[{"@pid":"340/2122","text":"Dustin Schwarz"},{"@pid":"91/6113","text":"Roland M. Mueller"},{"@pid":"340/2004","text":"Michael List"}]},"title":"A Framework for the Systematic Evaluation of Data and Analytics Use Cases at an Early Stage.","venue":"HICSS","pages":"5390-5399","year":"2023","type":"Conference and Workshop Papers","access":"open","key":"conf/hicss/SchwarzML23","ee":"https://hdl.handle.net/10125/103292","url":"https://dblp.org/rec/conf/hicss/SchwarzML23"}, "url":"URL#347817" }, { "@score":"2", "@id":"349626", "info":{"authors":{"author":[{"@pid":"364/1174","text":"Camilla Buttura Chrusciak"},{"@pid":"122/2121","text":"Anderson Luis Szejka"},{"@pid":"122/1860","text":"Osíris Canciglieri Júnior"}]},"title":"A Preliminary Digital Transformation Framework to Support Business Management Processes and Human Factors Impacts: Systematic Review and Gap Analysis.","venue":"I3E","pages":"308-329","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/i3e/ChrusciakSJ23","doi":"10.1007/978-3-031-50040-4_23","ee":"https://doi.org/10.1007/978-3-031-50040-4_23","url":"https://dblp.org/rec/conf/i3e/ChrusciakSJ23"}, "url":"URL#349626" }, { "@score":"2", "@id":"351724", "info":{"authors":{"author":[{"@pid":"336/0198","text":"Marcos Espinoza-Mina"},{"@pid":"336/0163","text":"Alejandra Colina Vargas"},{"@pid":"361/0574","text":"Natalia Montero Ramos"}]},"title":"Management Framework of Software Development: a Systematic Review.","venue":"ICAI Workshops","pages":"165-184","year":"2023","type":"Conference and Workshop Papers","access":"open","key":"conf/icai2/Espinoza-MinaVR23","ee":"https://ceur-ws.org/Vol-3520/icaiw_wsm_2.pdf","url":"https://dblp.org/rec/conf/icai2/Espinoza-MinaVR23"}, "url":"URL#351724" }, { "@score":"2", "@id":"360873", "info":{"authors":{"author":[{"@pid":"361/8354","text":"Nishikanta Parida"},{"@pid":"361/8119","text":"Dilip Kumar Dalei"},{"@pid":"214/2061","text":"Narayan Panigrahi"}]},"title":"Mobile based GeoAI Framework for Plant Leaf Classification & Geotagging: A Systematic Analysis.","venue":"ICCCNT","pages":"1-6","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/icccnt/ParidaDP23","doi":"10.1109/ICCCNT56998.2023.10306809","ee":"https://doi.org/10.1109/ICCCNT56998.2023.10306809","url":"https://dblp.org/rec/conf/icccnt/ParidaDP23"}, "url":"URL#360873" }, { "@score":"2", "@id":"374128", "info":{"authors":{"author":[{"@pid":"267/9518","text":"Shengnan An"},{"@pid":"155/4370","text":"Zeqi Lin"},{"@pid":"11/8555","text":"Bei Chen"},{"@pid":"17/1352","text":"Qiang Fu"},{"@pid":"07/256-1","text":"Nanning Zheng 0001"},{"@pid":"37/1917","text":"Jian-Guang Lou"}]},"title":"Does Deep Learning Learn to Abstract? A Systematic Probing Framework.","venue":"ICLR","year":"2023","type":"Conference and Workshop Papers","access":"open","key":"conf/iclr/AnLCF0L23","ee":"https://openreview.net/pdf?id=QB1dMPEXau5","url":"https://dblp.org/rec/conf/iclr/AnLCF0L23"}, "url":"URL#374128" }, { "@score":"2", "@id":"379280", "info":{"authors":{"author":[{"@pid":"221/5965","text":"Qiling Xu"},{"@pid":"09/1171","text":"Kai Sun"},{"@pid":"42/1503","text":"Shuai Wang"},{"@pid":"40/993","text":"Pengpeng Chen"},{"@pid":"130/9834-1","text":"Zhimeng Yin 0001"}]},"title":"SLoRa: A Systematic Framework for Synergic Interference Resilience In LPWAN.","venue":"ICNP","pages":"1-11","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/icnp/XuSWC023","doi":"10.1109/ICNP59255.2023.10355625","ee":"https://doi.org/10.1109/ICNP59255.2023.10355625","url":"https://dblp.org/rec/conf/icnp/XuSWC023"}, "url":"URL#379280" }, { "@score":"2", "@id":"383881", "info":{"authors":{"author":[{"@pid":"371/5116","text":"Elena Molino-Peña"},{"@pid":"94/1835","text":"José María García"}]},"title":"Towards a Systematic Comparison Framework for Cloud Services Customer Agreements.","venue":"ICSOC Workshops","pages":"241-252","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/icsoc/MolinoPenaG23","doi":"10.1007/978-981-97-0989-2_19","ee":"https://doi.org/10.1007/978-981-97-0989-2_19","url":"https://dblp.org/rec/conf/icsoc/MolinoPenaG23"}, "url":"URL#383881" }, { "@score":"2", "@id":"412133", "info":{"authors":{"author":[{"@pid":"358/6233","text":"Jordina Francès de Mas"},{"@pid":"f/JulianaKusterFilipe","text":"Juliana Bowles"}]},"title":"A Novel EGs-Based Framework for Systematic Propositional-Formula Simplification.","venue":"LOPSTR","pages":"169-187","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/lopstr/MasB23","doi":"10.1007/978-3-031-45784-5_11","ee":"https://doi.org/10.1007/978-3-031-45784-5_11","url":"https://dblp.org/rec/conf/lopstr/MasB23"}, "url":"URL#412133" }, { "@score":"2", "@id":"420491", "info":{"authors":{"author":[{"@pid":"199/2423","text":"Jakob Pietron"},{"@pid":"68/4311","text":"Alexander Raschke"},{"@pid":"328/1238","text":"Joeri Exelmans"},{"@pid":"52/733","text":"Matthias Tichy"}]},"title":"Collaboration And Versioning Framework - A Systematic Top-Down Approach.","venue":"MoDELS","pages":"767-777","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/models/PietronRET23","doi":"10.1109/MODELS-C59198.2023.00124","ee":"https://doi.org/10.1109/MODELS-C59198.2023.00124","url":"https://dblp.org/rec/conf/models/PietronRET23"}, "url":"URL#420491" }, { "@score":"2", "@id":"424758", "info":{"authors":{"author":[{"@pid":"334/4101","text":"Carsten T. Lüth"},{"@pid":"334/4062","text":"Till J. Bungert"},{"@pid":"324/2612","text":"Lukas Klein"},{"@pid":"179/4749","text":"Paul Jaeger"}]},"title":"Navigating the Pitfalls of Active Learning Evaluation: A Systematic Framework for Meaningful Performance Assessment.","venue":"NeurIPS","year":"2023","type":"Conference and Workshop Papers","access":"open","key":"conf/nips/LuthBKJ23","ee":"http://papers.nips.cc/paper_files/paper/2023/hash/1ed4723f12853cbd02aecb8160f5e0c9-Abstract-Conference.html","url":"https://dblp.org/rec/conf/nips/LuthBKJ23"}, "url":"URL#424758" }, { "@score":"2", "@id":"444166", "info":{"authors":{"author":[{"@pid":"336/9606","text":"Jia-He Zhou"},{"@pid":"69/4708","text":"Yuming Zhu"},{"@pid":"368/1232","text":"Qing-Qing Zhou"}]},"title":"Understanding Stakeholder Game Relationships and Behaviors to Facilitate Recycled Resource Management: A Systematic Framework.","venue":"SMC","pages":"2202-2207","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/smc/ZhouZZ23","doi":"10.1109/SMC53992.2023.10394299","ee":"https://doi.org/10.1109/SMC53992.2023.10394299","url":"https://dblp.org/rec/conf/smc/ZhouZZ23"}, "url":"URL#444166" }, { "@score":"2", "@id":"449979", "info":{"authors":{"author":[{"@pid":"92/1104","text":"Peng Jiang"},{"@pid":"131/4079","text":"Ruizhe Huang"},{"@pid":"95/7132-1","text":"Ding Li 0001"},{"@pid":"07/6300-1","text":"Yao Guo 0001"},{"@pid":"49/628","text":"Xiangqun Chen"},{"@pid":"330/8010","text":"Jianhai Luan"},{"@pid":"162/7779-1","text":"Yuxin Ren 0001"},{"@pid":"54/7910","text":"Xinwei Hu"}]},"title":"Auditing Frameworks Need Resource Isolation: A Systematic Study on the Super Producer Threat to System Auditing and Its Mitigation.","venue":"USENIX Security Symposium","pages":"355-372","year":"2023","type":"Conference and Workshop Papers","access":"open","key":"conf/uss/JiangH00CLRH23","ee":"https://www.usenix.org/conference/usenixsecurity23/presentation/jiang-peng","url":"https://dblp.org/rec/conf/uss/JiangH00CLRH23"}, "url":"URL#449979" }, { "@score":"2", "@id":"455523", "info":{"authors":{"author":[{"@pid":"68/1980","text":"Zhiwei Zhang"},{"@pid":"181/2597","text":"Ning Zhang"},{"@pid":"26/5469","text":"Jiayi Gu"}]},"title":"A Systematic Literature Review of Digital Transformation of Manufacturing Enterprises: Bibliometric Analysis and Knowledge Framework.","venue":"WHICEB","pages":"144-155","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/whiceb/ZhangZG23","doi":"10.1007/978-3-031-32302-7_13","ee":"https://doi.org/10.1007/978-3-031-32302-7_13","url":"https://dblp.org/rec/conf/whiceb/ZhangZG23"}, "url":"URL#455523" }, { "@score":"2", "@id":"456171", "info":{"authors":{"author":[{"@pid":"46/8560","text":"Tim Geppert"},{"@pid":"359/7139","text":"Alice Dal Fuoco"},{"@pid":"349/8149","text":"Ninja Leikert-Boehm"},{"@pid":"268/5982","text":"Stefan Deml"},{"@pid":"143/5877","text":"David Sturzenegger"},{"@pid":"38/3058","text":"Nico Ebert"}]},"title":"The Data Collaboration Canvas: a Visual Framework for Systematically identifying and Evaluating Organizational Data Collaboration Opportunities.","venue":"Wirtschaftsinformatik","pages":"1","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/wirtschaftsinformatik/GeppertFLDSE23","ee":"https://aisel.aisnet.org/wi2023/1","url":"https://dblp.org/rec/conf/wirtschaftsinformatik/GeppertFLDSE23"}, "url":"URL#456171" }, { "@score":"2", "@id":"457024", "info":{"authors":{"author":[{"@pid":"290/4225","text":"Martin Straesser"},{"@pid":"344/3492","text":"Jonas Mathiasch"},{"@pid":"17/3178","text":"André Bauer 0001"},{"@pid":"k/SamuelKounev","text":"Samuel Kounev"}]},"title":"A Systematic Approach for Benchmarking of Container Orchestration Frameworks.","venue":"ICPE","pages":"187-198","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/wosp/StraesserM0K23","doi":"10.1145/3578244.3583726","ee":"https://doi.org/10.1145/3578244.3583726","url":"https://dblp.org/rec/conf/wosp/StraesserM0K23"}, "url":"URL#457024" }, { "@score":"2", "@id":"474219", "info":{"authors":{"author":[{"@pid":"267/9518","text":"Shengnan An"},{"@pid":"155/4370","text":"Zeqi Lin"},{"@pid":"11/8555","text":"Bei Chen"},{"@pid":"17/1352","text":"Qiang Fu"},{"@pid":"07/256-1","text":"Nanning Zheng 0001"},{"@pid":"37/1917","text":"Jian-Guang Lou"}]},"title":"Does Deep Learning Learn to Abstract? A Systematic Probing Framework.","venue":"CoRR","volume":"abs/2302.11978","year":"2023","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-2302-11978","doi":"10.48550/ARXIV.2302.11978","ee":"https://doi.org/10.48550/arXiv.2302.11978","url":"https://dblp.org/rec/journals/corr/abs-2302-11978"}, "url":"URL#474219" }, { "@score":"2", "@id":"490369", "info":{"authors":{"author":[{"@pid":"192/7710","text":"Suhyeong Choi"},{"@pid":"37/5841","text":"Jinwook Jung"},{"@pid":"k/AndrewBKahng","text":"Andrew B. Kahng"},{"@pid":"78/661","text":"Minsoo Kim"},{"@pid":"13/1047","text":"Chul-Hong Park"},{"@pid":"234/5542","text":"Bodhisatta Pramanik"},{"@pid":"345/8369","text":"Dooseok Yoon"}]},"title":"PROBE3.0: A Systematic Framework for Design-Technology Pathfinding with Improved Design Enablement.","venue":"CoRR","volume":"abs/2304.13215","year":"2023","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-2304-13215","doi":"10.48550/ARXIV.2304.13215","ee":"https://doi.org/10.48550/arXiv.2304.13215","url":"https://dblp.org/rec/journals/corr/abs-2304-13215"}, "url":"URL#490369" }, { "@score":"2", "@id":"497367", "info":{"authors":{"author":[{"@pid":"289/1208","text":"Jordan Meadows"},{"@pid":"212/3533","text":"Marco Valentino"},{"@pid":"62/10068","text":"Damien Teney"},{"@pid":"47/9409","text":"André Freitas"}]},"title":"A Symbolic Framework for Systematic Evaluation of Mathematical Reasoning with Transformers.","venue":"CoRR","volume":"abs/2305.12563","year":"2023","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-2305-12563","doi":"10.48550/ARXIV.2305.12563","ee":"https://doi.org/10.48550/arXiv.2305.12563","url":"https://dblp.org/rec/journals/corr/abs-2305-12563"}, "url":"URL#497367" }, { "@score":"2", "@id":"517391", "info":{"authors":{"author":[{"@pid":"92/1104","text":"Peng Jiang"},{"@pid":"131/4079","text":"Ruizhe Huang"},{"@pid":"95/7132-1","text":"Ding Li 0001"},{"@pid":"07/6300-1","text":"Yao Guo 0001"},{"@pid":"49/628","text":"Xiangqun Chen"},{"@pid":"330/8010","text":"Jianhai Luan"},{"@pid":"162/7779-1","text":"Yuxin Ren 0001"},{"@pid":"54/7910","text":"Xinwei Hu"}]},"title":"Auditing Frameworks Need Resource Isolation: A Systematic Study on the Super Producer Threat to System Auditing and Its Mitigation.","venue":"CoRR","volume":"abs/2307.15895","year":"2023","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-2307-15895","doi":"10.48550/ARXIV.2307.15895","ee":"https://doi.org/10.48550/arXiv.2307.15895","url":"https://dblp.org/rec/journals/corr/abs-2307-15895"}, "url":"URL#517391" }, { "@score":"2", "@id":"527217", "info":{"authors":{"author":[{"@pid":"63/7023","text":"Wenlong Zhang"},{"@pid":"92/3956","text":"Xiaohui Li"},{"@pid":"84/7543","text":"Xiangyu Chen"},{"@pid":"q/YuQiao1","text":"Yu Qiao 0001"},{"@pid":"98/2898-3","text":"Xiao-Ming Wu 0003"},{"@pid":"16/1278","text":"Chao Dong"}]},"title":"SEAL: A Framework for Systematic Evaluation of Real-World Super-Resolution.","venue":"CoRR","volume":"abs/2309.03020","year":"2023","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-2309-03020","doi":"10.48550/ARXIV.2309.03020","ee":"https://doi.org/10.48550/arXiv.2309.03020","url":"https://dblp.org/rec/journals/corr/abs-2309-03020"}, "url":"URL#527217" }, { "@score":"2", "@id":"530597", "info":{"authors":{"author":[{"@pid":"08/8604-2","text":"Umar Iqbal 0002"},{"@pid":"k/TadayoshiKohno","text":"Tadayoshi Kohno"},{"@pid":"23/2758","text":"Franziska Roesner"}]},"title":"LLM Platform Security: Applying a Systematic Evaluation Framework to OpenAI's ChatGPT Plugins.","venue":"CoRR","volume":"abs/2309.10254","year":"2023","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-2309-10254","doi":"10.48550/ARXIV.2309.10254","ee":"https://doi.org/10.48550/arXiv.2309.10254","url":"https://dblp.org/rec/journals/corr/abs-2309-10254"}, "url":"URL#530597" }, { "@score":"2", "@id":"536279", "info":{"authors":{"author":[{"@pid":"313/2276","text":"Dennis Klau"},{"@pid":"208/7681","text":"Marc-André Zöller"},{"@pid":"309/9678","text":"Christian Tutschku"}]},"title":"Bringing Quantum Algorithms to Automated Machine Learning: A Systematic Review of AutoML Frameworks Regarding Extensibility for QML Algorithms.","venue":"CoRR","volume":"abs/2310.04238","year":"2023","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-2310-04238","doi":"10.48550/ARXIV.2310.04238","ee":"https://doi.org/10.48550/arXiv.2310.04238","url":"https://dblp.org/rec/journals/corr/abs-2310-04238"}, "url":"URL#536279" }, { "@score":"2", "@id":"542612", "info":{"authors":{"author":[{"@pid":"351/4604","text":"Ronald Schnitzer"},{"@pid":"95/4756","text":"Andreas Hapfelmeier"},{"@pid":"206/6435","text":"Sven Gaube"},{"@pid":"25/227","text":"Sonja Zillner"}]},"title":"AI Hazard Management: A framework for the systematic management of root causes for AI risks.","venue":"CoRR","volume":"abs/2310.16727","year":"2023","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-2310-16727","doi":"10.48550/ARXIV.2310.16727","ee":"https://doi.org/10.48550/arXiv.2310.16727","url":"https://dblp.org/rec/journals/corr/abs-2310-16727"}, "url":"URL#542612" }, { "@score":"2", "@id":"549330", "info":{"authors":{"author":[{"@pid":"361/1321","text":"Kaisei Fukaya"},{"@pid":"19/10808","text":"Damon Daylamani-Zad"},{"@pid":"98/2805","text":"Harry W. Agius"}]},"title":"Intelligent Generation of Graphical Game Assets: A Conceptual Framework and Systematic Review of the State of the Art.","venue":"CoRR","volume":"abs/2311.10129","year":"2023","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-2311-10129","doi":"10.48550/ARXIV.2311.10129","ee":"https://doi.org/10.48550/arXiv.2311.10129","url":"https://dblp.org/rec/journals/corr/abs-2311-10129"}, "url":"URL#549330" }, { "@score":"2", "@id":"549771", "info":{"authors":{"author":[{"@pid":"266/8964","text":"Elham Nasarian"},{"@pid":"124/3117","text":"Roohallah Alizadehsani"},{"@pid":"01/4732","text":"U. Rajendra Acharya"},{"@pid":"06/5615","text":"Kwok-Leung Tsui"}]},"title":"Designing Interpretable ML System to Enhance Trustworthy AI in Healthcare: A Systematic Review of the Last Decade to A Proposed Robust Framework.","venue":"CoRR","volume":"abs/2311.11055","year":"2023","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-2311-11055","doi":"10.48550/ARXIV.2311.11055","ee":"https://doi.org/10.48550/arXiv.2311.11055","url":"https://dblp.org/rec/journals/corr/abs-2311-11055"}, "url":"URL#549771" }, { "@score":"2", "@id":"566955", "info":{"authors":{"author":{"@pid":"217/4819","text":"Julian Jabs"}},"title":"A Dualities-Consolidating Framework to Support Systematic Programming Language Design.","year":"2022","type":"Books and Theses","access":"closed","key":"phd/dnb/Jabs22","doi":"10.15496/PUBLIKATION-73448","ee":"https://publikationen.uni-tuebingen.de/xmlui/handle/10900/132092/","url":"https://dblp.org/rec/phd/dnb/Jabs22"}, "url":"URL#566955" }, { "@score":"2", "@id":"567925", "info":{"authors":{"author":{"@pid":"202/8233","text":"George Tsakalidis"}},"title":"A framework for systematic evaluation of Business Process Redesign (BPR) initiatives using the notion of model plasticity","year":"2022","type":"Books and Theses","access":"closed","key":"phd/gr/Tsakalidis22","ee":"http://hdl.handle.net/10442/hedi/52832","url":"https://dblp.org/rec/phd/gr/Tsakalidis22"}, "url":"URL#567925" }, { "@score":"2", "@id":"573003", "info":{"authors":{"author":[{"@pid":"266/7965","text":"Ahmad H. Eid"},{"@pid":"22/167","text":"Francisco G. Montoya"}]},"title":"A Systematic and Comprehensive Geometric Framework for Multiphase Power Systems Analysis and Computing in Time Domain.","venue":"IEEE Access","volume":"10","pages":"132725-132741","year":"2022","type":"Journal Articles","access":"open","key":"journals/access/EidM22","doi":"10.1109/ACCESS.2022.3230915","ee":"https://doi.org/10.1109/ACCESS.2022.3230915","url":"https://dblp.org/rec/journals/access/EidM22"}, "url":"URL#573003" }, { "@score":"2", "@id":"574002", "info":{"authors":{"author":[{"@pid":"235/2984","text":"Ahmad Fathan Hidayatullah"},{"@pid":"142/7030","text":"Atika Qazi"},{"@pid":"01/10054","text":"Daphne Teck Ching Lai"},{"@pid":"335/1571","text":"Rosyzie Anna Apong"}]},"title":"A Systematic Review on Language Identification of Code-Mixed Text: Techniques, Data Availability, Challenges, and Framework Development.","venue":"IEEE Access","volume":"10","pages":"122812-122831","year":"2022","type":"Journal Articles","access":"open","key":"journals/access/HidayatullahQLA22","doi":"10.1109/ACCESS.2022.3223703","ee":"https://doi.org/10.1109/ACCESS.2022.3223703","url":"https://dblp.org/rec/journals/access/HidayatullahQLA22"}, "url":"URL#574002" }, { "@score":"2", "@id":"576400", "info":{"authors":{"author":[{"@pid":"12/1489","text":"Manuel Domínguez-Dorado"},{"@pid":"04/7289","text":"Javier Carmona-Murillo"},{"@pid":"42/7439","text":"David Cortés-Polo"},{"@pid":"31/5831","text":"Francisco J. Rodríguez-Pérez"}]},"title":"CyberTOMP: A Novel Systematic Framework to Manage Asset-Focused Cybersecurity From Tactical and Operational Levels.","venue":"IEEE Access","volume":"10","pages":"122454-122485","year":"2022","type":"Journal Articles","access":"open","key":"journals/access/ManuelCCR22","doi":"10.1109/ACCESS.2022.3223440","ee":"https://doi.org/10.1109/ACCESS.2022.3223440","url":"https://dblp.org/rec/journals/access/ManuelCCR22"}, "url":"URL#576400" }, { "@score":"2", "@id":"578075", "info":{"authors":{"author":[{"@pid":"314/4279","text":"Rahul Manohar Samant"},{"@pid":"295/3137","text":"Mrinal Rahul Bachute"},{"@pid":"239/3195","text":"Shilpa Gite"},{"@pid":"66/1119","text":"Ketan Kotecha"}]},"title":"Framework for Deep Learning-Based Language Models Using Multi-Task Learning in Natural Language Understanding: A Systematic Literature Review and Future Directions.","venue":"IEEE Access","volume":"10","pages":"17078-17097","year":"2022","type":"Journal Articles","access":"open","key":"journals/access/SamantBGK22","doi":"10.1109/ACCESS.2022.3149798","ee":"https://doi.org/10.1109/ACCESS.2022.3149798","url":"https://dblp.org/rec/journals/access/SamantBGK22"}, "url":"URL#578075" }, { "@score":"2", "@id":"578451", "info":{"authors":{"author":[{"@pid":"324/6067","text":"Shahbaz Siddiqui"},{"@pid":"63/10608","text":"Sufian Hameed"},{"@pid":"240/6902","text":"Syed Attique Shah"},{"@pid":"65/5314-1","text":"Ijaz Ahmad 0001"},{"@pid":"05/1405","text":"Adel Aneiba"},{"@pid":"d/DirkDraheim","text":"Dirk Draheim"},{"@pid":"d/SDustdar","text":"Schahram Dustdar"}]},"title":"Toward Software-Defined Networking-Based IoT Frameworks: A Systematic Literature Review, Taxonomy, Open Challenges and Prospects.","venue":"IEEE Access","volume":"10","pages":"70850-70901","year":"2022","type":"Journal Articles","access":"open","key":"journals/access/SiddiquiHS0ADD22","doi":"10.1109/ACCESS.2022.3188311","ee":"https://doi.org/10.1109/ACCESS.2022.3188311","url":"https://dblp.org/rec/journals/access/SiddiquiHS0ADD22"}, "url":"URL#578451" }, { "@score":"2", "@id":"579020", "info":{"authors":{"author":[{"@pid":"220/8943","text":"Marios Touloupou"},{"@pid":"34/4500","text":"Marinos Themistocleous"},{"@pid":"86/4942","text":"Elias Iosif"},{"@pid":"117/6069","text":"Klitos Christodoulou"}]},"title":"A Systematic Literature Review Toward a Blockchain Benchmarking Framework.","venue":"IEEE Access","volume":"10","pages":"70630-70644","year":"2022","type":"Journal Articles","access":"open","key":"journals/access/TouloupouTIC22","doi":"10.1109/ACCESS.2022.3188123","ee":"https://doi.org/10.1109/ACCESS.2022.3188123","url":"https://dblp.org/rec/journals/access/TouloupouTIC22"}, "url":"URL#579020" }, { "@score":"2", "@id":"584274", "info":{"authors":{"author":[{"@pid":"00/3355","text":"Zenonas Theodosiou"},{"@pid":"294/3608","text":"Marios Thoma"},{"@pid":"198/3006","text":"Harris Partaourides"},{"@pid":"09/3834","text":"Andreas Lanitis"}]},"title":"A Systematic Approach for Developing a Robust Artwork Recognition Framework Using Smartphone Cameras.","venue":"Algorithms","volume":"15","number":"9","pages":"305","year":"2022","type":"Journal Articles","access":"open","key":"journals/algorithms/TheodosiouTPL22","doi":"10.3390/A15090305","ee":"https://doi.org/10.3390/a15090305","url":"https://dblp.org/rec/journals/algorithms/TheodosiouTPL22"}, "url":"URL#584274" }, { "@score":"2", "@id":"591893", "info":{"authors":{"author":[{"@pid":"253/6803","text":"Varun S. Sharma"},{"@pid":"19/1021","text":"Andrea Fossati"},{"@pid":"325/3538","text":"Rodolfo Ciuffa"},{"@pid":"325/3503","text":"Marija Buljan"},{"@pid":"325/3316","text":"Evan G. Williams"},{"@pid":"11/1266-9","text":"Zhen Chen 0009"},{"@pid":"213/6797","text":"Wenguang Shao"},{"@pid":"176/9748","text":"Patrick G. A. Pedrioli"},{"@pid":"213/7074","text":"Anthony W. Purcell"},{"@pid":"178/8685","text":"María Rodríguez Martínez"},{"@pid":"33/6588","text":"Jiangning Song"},{"@pid":"194/3100","text":"Matteo Manica"},{"@pid":"15/5373","text":"Ruedi Aebersold"},{"@pid":"164/3294-21","text":"Chen Li 0021"}]},"title":"PCfun: a hybrid computational framework for systematic characterization of protein complex function.","venue":"Briefings Bioinform.","volume":"23","number":"4","year":"2022","type":"Journal Articles","access":"closed","key":"journals/bib/SharmaFCBWCSPPM22","doi":"10.1093/BIB/BBAC239","ee":"https://doi.org/10.1093/bib/bbac239","url":"https://dblp.org/rec/journals/bib/SharmaFCBWCSPPM22"}, "url":"URL#591893" }, { "@score":"2", "@id":"608197", "info":{"authors":{"author":[{"@pid":"312/7705","text":"Marium Mehmood"},{"@pid":"165/7009","text":"Nasser O. Alshammari"},{"@pid":"247/8122","text":"Saad Awadh Alanazi"},{"@pid":"243/3910","text":"Fahad Ahmad"}]},"title":"Systematic Framework to Predict Early-Stage Liver Carcinoma Using Hybrid of Feature Selection Techniques and Regression Techniques.","venue":"Complex.","volume":"2022","pages":"7816200:1-7816200:11","year":"2022","type":"Journal Articles","access":"open","key":"journals/complexity/MehmoodAAA22","doi":"10.1155/2022/7816200","ee":"https://doi.org/10.1155/2022/7816200","url":"https://dblp.org/rec/journals/complexity/MehmoodAAA22"}, "url":"URL#608197" }, { "@score":"2", "@id":"611828", "info":{"authors":{"author":[{"@pid":"307/5158","text":"Zhengya Gong"},{"@pid":"203/8146","text":"Lik-Hang Lee"},{"@pid":"328/5403","text":"Sohail Ahmed Soomro"},{"@pid":"220/3657","text":"Vijayakumar Nanjappan"},{"@pid":"51/9797","text":"Georgi V. Georgiev"}]},"title":"A systematic review of virtual brainstorming from the perspective of creativity: affordances, framework, and outlook.","venue":"Digit. Creativity","volume":"33","number":"2","pages":"96-127","year":"2022","type":"Journal Articles","access":"open","key":"journals/creativity/GongLSNG22","doi":"10.1080/14626268.2022.2064879","ee":"https://doi.org/10.1080/14626268.2022.2064879","url":"https://dblp.org/rec/journals/creativity/GongLSNG22"}, "url":"URL#611828" }, { "@score":"2", "@id":"619444", "info":{"authors":{"author":[{"@pid":"07/2345","text":"Wu-Yuin Hwang"},{"@pid":"327/9815","text":"Van-Giap Nguyen"},{"@pid":"204/1553","text":"Siska Wati Dewi Purba"}]},"title":"Systematic survey of anything-to-text recognition and constructing its framework in language learning.","venue":"Educ. Inf. Technol.","volume":"27","number":"9","pages":"12273-12299","year":"2022","type":"Journal Articles","access":"closed","key":"journals/eait/HwangNP22","doi":"10.1007/S10639-022-11112-6","ee":"https://doi.org/10.1007/s10639-022-11112-6","url":"https://dblp.org/rec/journals/eait/HwangNP22"}, "url":"URL#619444" }, { "@score":"2", "@id":"619721", "info":{"authors":{"author":[{"@pid":"213/8617","text":"Weiqi Xu"},{"@pid":"128/0529","text":"Fan Ouyang"}]},"title":"A systematic review of AI role in the educational system based on a proposed conceptual framework.","venue":"Educ. Inf. Technol.","volume":"27","number":"3","pages":"4195-4223","year":"2022","type":"Journal Articles","access":"closed","key":"journals/eait/XuO22","doi":"10.1007/S10639-021-10774-Y","ee":"https://doi.org/10.1007/s10639-021-10774-y","url":"https://dblp.org/rec/journals/eait/XuO22"}, "url":"URL#619721" }, { "@score":"2", "@id":"633786", "info":{"authors":{"author":[{"@pid":"331/8766","text":"Edidiong Bassey"},{"@pid":"294/6319","text":"Emer Mulligan"},{"@pid":"o/AdegboyegaKOjo","text":"Adegboyega Ojo"}]},"title":"A conceptual framework for digital tax administration - A systematic review.","venue":"Gov. Inf. Q.","volume":"39","number":"4","pages":"101754","year":"2022","type":"Journal Articles","access":"closed","key":"journals/giq/BasseyMO22","doi":"10.1016/J.GIQ.2022.101754","ee":"https://doi.org/10.1016/j.giq.2022.101754","url":"https://dblp.org/rec/journals/giq/BasseyMO22"}, "url":"URL#633786" }, { "@score":"2", "@id":"638564", "info":{"authors":{"author":[{"@pid":"346/0783","text":"Sukirman Sukirman"},{"@pid":"136/0601","text":"Laili Farhana Md Ibharim"},{"@pid":"53/7708","text":"Che Soh Said"},{"@pid":"346/0677","text":"Budi Murtiyasa"}]},"title":"A Strategy of Learning Computational Thinking through Game Based in Virtual Reality: Systematic Review and Conceptual Framework.","venue":"Informatics Educ.","volume":"21","number":"1","pages":"179-200","year":"2022","type":"Journal Articles","access":"unavailable","key":"journals/iie/SukirmanISM22","url":"https://dblp.org/rec/journals/iie/SukirmanISM22"}, "url":"URL#638564" }, { "@score":"2", "@id":"640104", "info":{"authors":{"author":[{"@pid":"354/1777","text":"Hiba Shakeel"},{"@pid":"187/8355","text":"Mahfooz Alam"}]},"title":"Load Balancing Approaches in Cloud and Fog Computing Environments: A Framework, Classification, and Systematic Review.","venue":"Int. J. Cloud Appl. Comput.","volume":"12","number":"1","pages":"1-24","year":"2022","type":"Journal Articles","access":"closed","key":"journals/ijcac/ShakeelA22","doi":"10.4018/IJCAC.311503","ee":"https://doi.org/10.4018/ijcac.311503","url":"https://dblp.org/rec/journals/ijcac/ShakeelA22"}, "url":"URL#640104" }, { "@score":"2", "@id":"645302", "info":{"authors":{"author":[{"@pid":"223/7754","text":"Frederick Pobee"},{"@pid":"335/7529","text":"Thuso Mphela"}]},"title":"E-commerce research in developing countries: a systematic review of research themes, frameworks, methods and future lines of research.","venue":"Int. J. Inf. Decis. Sci.","volume":"14","number":"4","pages":"399-416","year":"2022","type":"Journal Articles","access":"closed","key":"journals/ijids/PobeeM22","doi":"10.1504/IJIDS.2022.10052390","ee":"https://doi.org/10.1504/IJIDS.2022.10052390","url":"https://dblp.org/rec/journals/ijids/PobeeM22"}, "url":"URL#645302" }, { "@score":"2", "@id":"646938", "info":{"authors":{"author":[{"@pid":"324/8952","text":"Shivam Goyal"},{"@pid":"207/8998","text":"Sunil Luthra"},{"@pid":"180/5150","text":"Dixit Garg"}]},"title":"Shifting Systematically Towards Sustainable Consumption and Production: A Solution Framework to Overcome the Impacts of Covid-19.","venue":"Int. J. Inf. Technol. Decis. Mak.","volume":"21","number":"3","pages":"933-968","year":"2022","type":"Journal Articles","access":"closed","key":"journals/ijitdm/GoyalLG22","doi":"10.1142/S0219622022500043","ee":"https://doi.org/10.1142/S0219622022500043","url":"https://dblp.org/rec/journals/ijitdm/GoyalLG22"}, "url":"URL#646938" }, { "@score":"2", "@id":"650263", "info":{"authors":{"author":[{"@pid":"225/4055","text":"Paul-Arthur Dreyfus"},{"@pid":"133/1149","text":"Foivos Psarommatis"},{"@pid":"119/2448","text":"Gökan May"},{"@pid":"58/4778","text":"Dimitris Kiritsis"}]},"title":"Virtual metrology as an approach for product quality estimation in Industry 4.0: a systematic review and integrative conceptual framework.","venue":"Int. J. Prod. Res.","volume":"60","number":"2","pages":"742-765","year":"2022","type":"Journal Articles","access":"open","key":"journals/ijpr/DreyfusPMK22","doi":"10.1080/00207543.2021.1976433","ee":"https://doi.org/10.1080/00207543.2021.1976433","url":"https://dblp.org/rec/journals/ijpr/DreyfusPMK22"}, "url":"URL#650263" }, { "@score":"2", "@id":"653018", "info":{"authors":{"author":{"@pid":"208/4688","text":"Harrison Stewart"}},"title":"A systematic framework to explore the determinants of information security policy development and outcomes.","venue":"Inf. Comput. Secur.","volume":"30","number":"4","pages":"490-516","year":"2022","type":"Journal Articles","access":"closed","key":"journals/imcs/Stewart22a","doi":"10.1108/ICS-06-2021-0076","ee":"https://doi.org/10.1108/ICS-06-2021-0076","url":"https://dblp.org/rec/journals/imcs/Stewart22a"}, "url":"URL#653018" }, { "@score":"2", "@id":"654938", "info":{"authors":{"author":[{"@pid":"182/7034","text":"Julio César Cortés Ríos"},{"@pid":"e/SMEmbury","text":"Suzanne M. Embury"},{"@pid":"130/2239","text":"Sukru Eraslan"}]},"title":"A unifying framework for the systematic analysis of Git workflows.","venue":"Inf. Softw. Technol.","volume":"145","pages":"106811","year":"2022","type":"Journal Articles","access":"closed","key":"journals/infsof/RiosEE22","doi":"10.1016/J.INFSOF.2021.106811","ee":"https://doi.org/10.1016/j.infsof.2021.106811","url":"https://dblp.org/rec/journals/infsof/RiosEE22"}, "url":"URL#654938" }, { "@score":"2", "@id":"660113", "info":{"authors":{"author":[{"@pid":"317/4775","text":"Rajesh Chidananda Reddy"},{"@pid":"195/6587","text":"Biplab Bhattacharjee"},{"@pid":"118/4173","text":"Debasisha Mishra"},{"@pid":"317/4640","text":"Anandadeep Mandal"}]},"title":"A systematic literature review towards a conceptual framework for enablers and barriers of an enterprise data science strategy.","venue":"Inf. Syst. E Bus. Manag.","volume":"20","number":"1","pages":"223-255","year":"2022","type":"Journal Articles","access":"closed","key":"journals/isem/ReddyBMM22","doi":"10.1007/S10257-022-00550-X","ee":"https://doi.org/10.1007/s10257-022-00550-x","url":"https://dblp.org/rec/journals/isem/ReddyBMM22"}, "url":"URL#660113" }, { "@score":"2", "@id":"672447", "info":{"authors":{"author":[{"@pid":"287/7367","text":"Eduardo Guzman 0001"},{"@pid":"119/2235","text":"Beatriz Andrés"},{"@pid":"50/2456","text":"Raul Poler"}]},"title":"Models and algorithms for production planning, scheduling and sequencing problems: A holistic framework and a systematic review.","venue":"J. Ind. Inf. Integr.","volume":"27","pages":"100287","year":"2022","type":"Journal Articles","access":"closed","key":"journals/jiii/GuzmanAP22","doi":"10.1016/J.JII.2021.100287","ee":"https://doi.org/10.1016/j.jii.2021.100287","url":"https://dblp.org/rec/journals/jiii/GuzmanAP22"}, "url":"URL#672447" }, { "@score":"2", "@id":"673770", "info":{"authors":{"author":[{"@pid":"324/9854","text":"Imelda Gozali"},{"@pid":"332/9605","text":"Faizatul Istiqomah"},{"@pid":"332/9028","text":"Utami Widiati"}]},"title":"A Systematic Review of Online ELT Research in Indonesia During the COVID-19 Pandemic Through the Community of Inquiry Framework.","venue":"J. Inf. Technol. Educ. Res.","volume":"21","pages":"501-546","year":"2022","type":"Journal Articles","access":"open","key":"journals/jite/GozaliIW22","doi":"10.28945/5033","ee":"https://doi.org/10.28945/5033","url":"https://dblp.org/rec/journals/jite/GozaliIW22"}, "url":"URL#673770" }, { "@score":"2", "@id":"674054", "info":{"authors":{"author":[{"@pid":"313/3229","text":"Asha Thomas"},{"@pid":"45/3166","text":"Vikas Gupta"}]},"title":"Tacit knowledge in organizations: bibliometrics and a framework-based systematic review of antecedents, outcomes, theories, methods and future directions.","venue":"J. Knowl. Manag.","volume":"26","number":"4","pages":"1014-1041","year":"2022","type":"Journal Articles","access":"closed","key":"journals/jkm/ThomasG22","doi":"10.1108/JKM-01-2021-0026","ee":"https://doi.org/10.1108/JKM-01-2021-0026","url":"https://dblp.org/rec/journals/jkm/ThomasG22"}, "url":"URL#674054" }, { "@score":"2", "@id":"682796", "info":{"authors":{"author":[{"@pid":"91/5825","text":"Tullio Facchinetti"},{"@pid":"128/0745","text":"Guido Benetti"},{"@pid":"257/5905","text":"Davide Giuffrida"},{"@pid":"08/7399","text":"Antonino Nocera"}]},"title":"slr-kit: A semi-supervised machine learning framework for systematic literature reviews.","venue":"Knowl. Based Syst.","volume":"251","pages":"109266","year":"2022","type":"Journal Articles","access":"closed","key":"journals/kbs/FacchinettiBGN22","doi":"10.1016/J.KNOSYS.2022.109266","ee":"https://doi.org/10.1016/j.knosys.2022.109266","url":"https://dblp.org/rec/journals/kbs/FacchinettiBGN22"}, "url":"URL#682796" }, { "@score":"2", "@id":"710157", "info":{"authors":{"author":[{"@pid":"266/5215","text":"Fran Domazetovic"},{"@pid":"266/5236","text":"Ante Siljeg"},{"@pid":"125/6859","text":"Ivan Maric"},{"@pid":"285/8949","text":"Lovre Panda"}]},"title":"A New Systematic Framework for Optimization of Multi-Temporal Terrestrial LiDAR Surveys over Complex Gully Morphology.","venue":"Remote. Sens.","volume":"14","number":"14","pages":"3366","year":"2022","type":"Journal Articles","access":"open","key":"journals/remotesensing/DomazetovicSMP22","doi":"10.3390/RS14143366","ee":"https://doi.org/10.3390/rs14143366","url":"https://dblp.org/rec/journals/remotesensing/DomazetovicSMP22"}, "url":"URL#710157" }, { "@score":"2", "@id":"716016", "info":{"authors":{"author":[{"@pid":"264/8270","text":"Hoese Michel Tornyeviadzi"},{"@pid":"310/7885","text":"Emmanuel Owusu-Ansah"},{"@pid":"208/8225","text":"Hadi Mohammed"},{"@pid":"208/8160","text":"Razak Seidu"}]},"title":"A systematic framework for dynamic nodal vulnerability assessment of water distribution networks based on multilayer networks.","venue":"Reliab. Eng. Syst. Saf.","volume":"219","pages":"108217","year":"2022","type":"Journal Articles","access":"open","key":"journals/ress/TornyeviadziOMS22","doi":"10.1016/J.RESS.2021.108217","ee":"https://doi.org/10.1016/j.ress.2021.108217","url":"https://dblp.org/rec/journals/ress/TornyeviadziOMS22"}, "url":"URL#716016" }, { "@score":"3", "@id":"718411", "info":{"authors":{"author":[{"@pid":"290/5032","text":"Tijs Vandemeulebroucke"},{"@pid":"323/5758","text":"Yvonne Denier"},{"@pid":"323/5126","text":"Evelyne Mertens"},{"@pid":"290/5050","text":"Chris Gastmans"}]},"title":"Which Framework to Use? A Systematic Review of Ethical Frameworks for the Screening or Evaluation of Health Technology Innovations.","venue":"Sci. Eng. Ethics","volume":"28","number":"3","pages":"26","year":"2022","type":"Journal Articles","access":"closed","key":"journals/see/Vandemeulebroucke22","doi":"10.1007/S11948-022-00377-2","ee":"https://doi.org/10.1007/s11948-022-00377-2","url":"https://dblp.org/rec/journals/see/Vandemeulebroucke22"}, "url":"URL#718411" }, { "@score":"2", "@id":"721879", "info":{"authors":{"author":[{"@pid":"327/4157","text":"Thulfiqar Jabar"},{"@pid":"05/7967","text":"Manmeet Mahinderjit Singh 0001"}]},"title":"Exploration of Mobile Device Behavior for Mitigating Advanced Persistent Threats (APT): A Systematic Literature Review and Conceptual Framework.","venue":"Sensors","volume":"22","number":"13","pages":"4662","year":"2022","type":"Journal Articles","access":"open","key":"journals/sensors/JabarS22","doi":"10.3390/S22134662","ee":"https://doi.org/10.3390/s22134662","url":"https://dblp.org/rec/journals/sensors/JabarS22"}, "url":"URL#721879" }, { "@score":"2", "@id":"722261", "info":{"authors":{"author":[{"@pid":"286/7990","text":"Keshav Kaushik"},{"@pid":"194/0092","text":"Akashdeep Bhardwaj"},{"@pid":"286/7979","text":"Susheela Dahiya"},{"@pid":"263/5130","text":"Mashael S. Maashi"},{"@pid":"333/7012","text":"Moteeb Al Moteri"},{"@pid":"332/4991","text":"Mohammed Aljebreen"},{"@pid":"327/5119","text":"Salil Bharany"}]},"title":"Multinomial Naive Bayesian Classifier Framework for Systematic Analysis of Smart IoT Devices.","venue":"Sensors","volume":"22","number":"19","pages":"7318","year":"2022","type":"Journal Articles","access":"open","key":"journals/sensors/KaushikBDMMAB22","doi":"10.3390/S22197318","ee":"https://doi.org/10.3390/s22197318","url":"https://dblp.org/rec/journals/sensors/KaushikBDMMAB22"}, "url":"URL#722261" }, { "@score":"2", "@id":"723724", "info":{"authors":{"author":[{"@pid":"319/0276","text":"Mamoona Majid"},{"@pid":"174/8464","text":"Shaista Habib"},{"@pid":"204/9296","text":"Abdul Rehman Javed"},{"@pid":"34/9672-5","text":"Muhammad Rizwan 0005"},{"@pid":"57/9993","text":"Gautam Srivastava 0001"},{"@pid":"192/9289","text":"Thippa Reddy Gadekallu"},{"@pid":"41/912","text":"Jerry Chun-Wei Lin"}]},"title":"Applications of Wireless Sensor Networks and Internet of Things Frameworks in the Industry Revolution 4.0: A Systematic Literature Review.","venue":"Sensors","volume":"22","number":"6","pages":"2087","year":"2022","type":"Journal Articles","access":"open","key":"journals/sensors/MajidHJRSGL22","doi":"10.3390/S22062087","ee":"https://doi.org/10.3390/s22062087","url":"https://dblp.org/rec/journals/sensors/MajidHJRSGL22"}, "url":"URL#723724" }, { "@score":"2", "@id":"732177", "info":{"authors":{"author":[{"@pid":"194/5031","text":"Nebi Yilmaz"},{"@pid":"37/3493","text":"Ayça Kolukisa Tarhan"}]},"title":"Quality evaluation models or frameworks for open source software: A systematic literature review.","venue":"J. Softw. Evol. Process.","volume":"34","number":"6","year":"2022","type":"Journal Articles","access":"closed","key":"journals/smr/YilmazT22","doi":"10.1002/SMR.2458","ee":"https://doi.org/10.1002/smr.2458","url":"https://dblp.org/rec/journals/smr/YilmazT22"}, "url":"URL#732177" }, { "@score":"2", "@id":"734512", "info":{"authors":{"author":[{"@pid":"229/5619","text":"William Filisbino Passini"},{"@pid":"190/4212","text":"Cristiane Aparecida Lana"},{"@pid":"309/7631","text":"Vinicius Pfeifer"},{"@pid":"117/5635","text":"Frank José Affonso"}]},"title":"Design of frameworks for self-adaptive service-oriented applications: A systematic analysis.","venue":"Softw. Pract. Exp.","volume":"52","number":"1","pages":"5-38","year":"2022","type":"Journal Articles","access":"closed","key":"journals/spe/PassiniLPA22","doi":"10.1002/SPE.3013","ee":"https://doi.org/10.1002/spe.3013","url":"https://dblp.org/rec/journals/spe/PassiniLPA22"}, "url":"URL#734512" }, { "@score":"2", "@id":"743405", "info":{"authors":{"author":[{"@pid":"c/ChungKuanCheng","text":"Chung-Kuan Cheng"},{"@pid":"k/AndrewBKahng","text":"Andrew B. Kahng"},{"@pid":"58/1106","text":"Hayoung Kim"},{"@pid":"78/661","text":"Minsoo Kim"},{"@pid":"53/11179","text":"Daeyeal Lee"},{"@pid":"55/11454","text":"Dongwon Park"},{"@pid":"211/0031","text":"Mingyu Woo"}]},"title":"PROBE2.0: A Systematic Framework for Routability Assessment From Technology to Design in Advanced Nodes.","venue":"IEEE Trans. Comput. Aided Des. Integr. Circuits Syst.","volume":"41","number":"5","pages":"1495-1508","year":"2022","type":"Journal Articles","access":"closed","key":"journals/tcad/ChengKKKLPW22","doi":"10.1109/TCAD.2021.3093015","ee":"https://doi.org/10.1109/TCAD.2021.3093015","url":"https://dblp.org/rec/journals/tcad/ChengKKKLPW22"}, "url":"URL#743405" }, { "@score":"2", "@id":"776802", "info":{"authors":{"author":[{"@pid":"297/5296","text":"Theresa Ullmann"},{"@pid":"67/1113","text":"Christian Hennig"},{"@pid":"58/635","text":"Anne-Laure Boulesteix"}]},"title":"Validation of cluster analysis results on validation data: A systematic framework.","venue":"WIREs Data Mining Knowl. Discov.","volume":"12","number":"3","year":"2022","type":"Journal Articles","access":"open","key":"journals/widm/UllmannHB22","doi":"10.1002/WIDM.1444","ee":"https://doi.org/10.1002/widm.1444","url":"https://dblp.org/rec/journals/widm/UllmannHB22"}, "url":"URL#776802" }, { "@score":"2", "@id":"791689", "info":{"authors":{"author":{"@pid":"137/2999","text":"Dana Copot"}},"title":"A Systematic Framework for Design and Evaluation of Control Strategies for Continuous Manufacturing of Tablets.","venue":"AQTR","pages":"1-6","year":"2022","type":"Conference and Workshop Papers","access":"closed","key":"conf/aqtr/Copot22","doi":"10.1109/AQTR55203.2022.9801916","ee":"https://doi.org/10.1109/AQTR55203.2022.9801916","url":"https://dblp.org/rec/conf/aqtr/Copot22"}, "url":"URL#791689" }, { "@score":"2", "@id":"792440", "info":{"authors":{"author":[{"@pid":"55/8846-1","text":"Hyunwoo Lee 0001"},{"@pid":"229/5471","text":"Imtiaz Karim"},{"@pid":"l/NinghuiLi","text":"Ninghui Li"},{"@pid":"b/ElisaBertino","text":"Elisa Bertino"}]},"title":"VWAnalyzer: A Systematic Security Analysis Framework for the Voice over WiFi Protocol.","venue":"AsiaCCS","pages":"182-195","year":"2022","type":"Conference and Workshop Papers","access":"closed","key":"conf/asiaccs/LeeKLB22","doi":"10.1145/3488932.3517425","ee":"https://doi.org/10.1145/3488932.3517425","url":"https://dblp.org/rec/conf/asiaccs/LeeKLB22"}, "url":"URL#792440" }, { "@score":"2", "@id":"793094", "info":{"authors":{"author":[{"@pid":"314/7064","text":"Thilini Kaushalya Bandara"},{"@pid":"253/1649","text":"Dhananjaya Wijerathne"},{"@pid":"22/5985","text":"Tulika Mitra"},{"@pid":"86/2160","text":"Li-Shiuan Peh"}]},"title":"REVAMP: a systematic framework for heterogeneous CGRA realization.","venue":"ASPLOS","pages":"918-932","year":"2022","type":"Conference and Workshop Papers","access":"closed","key":"conf/asplos/BandaraWMP22","doi":"10.1145/3503222.3507772","ee":"https://doi.org/10.1145/3503222.3507772","url":"https://dblp.org/rec/conf/asplos/BandaraWMP22"}, "url":"URL#793094" }, { "@score":"2", "@id":"799319", "info":{"authors":{"author":[{"@pid":"336/1317","text":"Antreas Pogiatzis"},{"@pid":"67/7700","text":"Georgios Samakovitis"}]},"title":"A Systematic Local Fork Management Framework for Blockchain Sandbox Environments.","venue":"BPM","pages":"36-50","year":"2022","type":"Conference and Workshop Papers","access":"closed","key":"conf/bpm/PogiatzisS22","doi":"10.1007/978-3-031-16168-1_3","ee":"https://doi.org/10.1007/978-3-031-16168-1_3","url":"https://dblp.org/rec/conf/bpm/PogiatzisS22"}, "url":"URL#799319" }, { "@score":"2", "@id":"839993", "info":{"authors":{"author":[{"@pid":"322/6057","text":"Alexis Avelino"},{"@pid":"84/8409","text":"Rony Cueva"},{"@pid":"143/6422","text":"Freddy Paz"}]},"title":"A Systematic Review of User-Centered Design Framework Applied to the Redesign of Purchase Order Modules.","venue":"HCI","pages":"106-123","year":"2022","type":"Conference and Workshop Papers","access":"closed","key":"conf/hci/AvelinoCP22","doi":"10.1007/978-3-031-05906-3_9","ee":"https://doi.org/10.1007/978-3-031-05906-3_9","url":"https://dblp.org/rec/conf/hci/AvelinoCP22"}, "url":"URL#839993" }, { "@score":"2", "@id":"861167", "info":{"authors":{"author":[{"@pid":"326/5799","text":"Francesco Berloco"},{"@pid":"14/910","text":"Vitoantonio Bevilacqua"},{"@pid":"c/SimonaColucci","text":"Simona Colucci"}]},"title":"A Systematic Review of Distributed Deep Learning Frameworks for Big Data.","venue":"ICIC","pages":"242-256","year":"2022","type":"Conference and Workshop Papers","access":"closed","key":"conf/icic/BerlocoBC22","doi":"10.1007/978-3-031-13832-4_21","ee":"https://doi.org/10.1007/978-3-031-13832-4_21","url":"https://dblp.org/rec/conf/icic/BerlocoBC22"}, "url":"URL#861167" }, { "@score":"2", "@id":"885094", "info":{"authors":{"author":[{"@pid":"328/0985","text":"Nompilo Fakude"},{"@pid":"26/777","text":"Elmarie Kritzinger"}]},"title":"Utilization of Theoretical Domains Framework (TDF) to Validate the Digital Piracy Behaviour Constructs - A Systematic Literature Review Study.","venue":"ICS","pages":"625-636","year":"2022","type":"Conference and Workshop Papers","access":"closed","key":"conf/intcompsymp/FakudeK22","doi":"10.1007/978-981-19-9582-8_55","ee":"https://doi.org/10.1007/978-981-19-9582-8_55","url":"https://dblp.org/rec/conf/intcompsymp/FakudeK22"}, "url":"URL#885094" }, { "@score":"2", "@id":"888189", "info":{"authors":{"author":[{"@pid":"304/8029","text":"Caleb Escobedo"},{"@pid":"201/2007","text":"Nataliya Nechyporenko"},{"@pid":"305/0434","text":"Shreyas Kadekodi"},{"@pid":"151/9736","text":"Alessandro Roncone"}]},"title":"A Framework for the Systematic Evaluation of Obstacle Avoidance and Object-Aware Controllers.","venue":"IROS","pages":"8117-8124","year":"2022","type":"Conference and Workshop Papers","access":"closed","key":"conf/iros/EscobedoNKR22","doi":"10.1109/IROS47612.2022.9982198","ee":"https://doi.org/10.1109/IROS47612.2022.9982198","url":"https://dblp.org/rec/conf/iros/EscobedoNKR22"}, "url":"URL#888189" }, { "@score":"2", "@id":"891325", "info":{"authors":{"author":[{"@pid":"43/10680","text":"Anouck Adrot"},{"@pid":"255/3038","text":"Samuel Auclair"},{"@pid":"238/5298","text":"Julien Coche"},{"@pid":"169/4560","text":"Audrey Fertier"},{"@pid":"332/5774","text":"Cécile Gracianne"},{"@pid":"151/7023","text":"Aurélie Montarnal"}]},"title":"Using Social Media Data in Emergency Management: A Proposal for a Socio-technical Framework and a Systematic Literature Review.","venue":"ISCRAM","pages":"470-479","year":"2022","type":"Conference and Workshop Papers","access":"open","key":"conf/iscram/AdrotACFGM22","ee":"https://idl.iscram.org/show.php?record=2433","url":"https://dblp.org/rec/conf/iscram/AdrotACFGM22"}, "url":"URL#891325" }, { "@score":"2", "@id":"891854", "info":{"authors":{"author":[{"@pid":"312/0840","text":"Vítor Hugo Machado Ribeiro"},{"@pid":"136/8314","text":"João Barata"},{"@pid":"85/6616","text":"Paulo Rupino da Cunha"}]},"title":"Sustainable Data Governance: A Systematic Review and a Conceptual Framework.","venue":"ISD","year":"2022","type":"Conference and Workshop Papers","access":"closed","key":"conf/isdevel/RibeiroBC22","ee":"https://aisel.aisnet.org/isd2014/proceedings2022/usability/6","url":"https://dblp.org/rec/conf/isdevel/RibeiroBC22"}, "url":"URL#891854" }, { "@score":"2", "@id":"901362", "info":{"authors":{"author":[{"@pid":"338/3050","text":"Zi-Cheng Weng"},{"@pid":"73/1109","text":"Fu-Ching Tsai"}]},"title":"A Systematic Literature Review of Law Enforcement Image Recognition Methods based on Generative Adversarial Networks Framework.","venue":"KES","pages":"3635-3644","year":"2022","type":"Conference and Workshop Papers","access":"open","key":"conf/kes/WengT22","doi":"10.1016/J.PROCS.2022.09.423","ee":"https://doi.org/10.1016/j.procs.2022.09.423","url":"https://dblp.org/rec/conf/kes/WengT22"}, "url":"URL#901362" }, { "@score":"2", "@id":"902138", "info":{"authors":{"author":[{"@pid":"169/0335","text":"Mohammad Khalil"},{"@pid":"116/9444","text":"Paul Prinsloo"},{"@pid":"116/9443","text":"Sharon Slade"}]},"title":"A Comparison of Learning Analytics Frameworks: a Systematic Review.","venue":"LAK","pages":"152-163","year":"2022","type":"Conference and Workshop Papers","access":"closed","key":"conf/lak/KhalilPS22","doi":"10.1145/3506860.3506878","ee":"https://doi.org/10.1145/3506860.3506878","url":"https://dblp.org/rec/conf/lak/KhalilPS22"}, "url":"URL#902138" }, { "@score":"2", "@id":"923442", "info":{"authors":{"author":[{"@pid":"316/8016","text":"Bruno Silvério Costa"},{"@pid":"316/7923","text":"Jorge Viana Santos"},{"@pid":"316/8344","text":"Cristiane Namiuti"},{"@pid":"316/7076","text":"Aline Silva Costa"}]},"title":"The Systematic Construction of Multiple Types of Corpora Through the Lapelinc Framework.","venue":"PROPOR","pages":"401-406","year":"2022","type":"Conference and Workshop Papers","access":"closed","key":"conf/propor/CostaSNC22","doi":"10.1007/978-3-030-98305-5_37","ee":"https://doi.org/10.1007/978-3-030-98305-5_37","url":"https://dblp.org/rec/conf/propor/CostaSNC22"}, "url":"URL#923442" }, { "@score":"2", "@id":"927031", "info":{"authors":{"author":[{"@pid":"306/7283","text":"Gabriel Rutsch"},{"@pid":"340/5928","text":"Maximilian Groebner"},{"@pid":"44/1757","text":"Anthony Sanders"},{"@pid":"340/5266","text":"Konrad Maier"},{"@pid":"e/WolfgangEcker","text":"Wolfgang Ecker"}]},"title":"A framework that enables systematic analysis of mixed-signal applications on FPGA.","venue":"RSP","pages":"50-56","year":"2022","type":"Conference and Workshop Papers","access":"closed","key":"conf/rsp/RutschGSME22","doi":"10.1109/RSP57251.2022.10039031","ee":"https://doi.org/10.1109/RSP57251.2022.10039031","url":"https://dblp.org/rec/conf/rsp/RutschGSME22"}, "url":"URL#927031" }, { "@score":"2", "@id":"939949", "info":{"authors":{"author":[{"@pid":"346/2469","text":"Alvaro Marcos Antonio de Araujo Pistono"},{"@pid":"346/2269","text":"Arnaldo Manuel Pinto Santos"},{"@pid":"346/2448","text":"Ricardo José Vieira Baptista"}]},"title":"An Initial Framework for Adaptive Serious Games Based on a Systematic Literature Review.","venue":"TECH-EDU","pages":"43-51","year":"2022","type":"Conference and Workshop Papers","access":"closed","key":"conf/techedu/PistonoSB22","doi":"10.1007/978-3-031-22918-3_4","ee":"https://doi.org/10.1007/978-3-031-22918-3_4","url":"https://dblp.org/rec/conf/techedu/PistonoSB22"}, "url":"URL#939949" }, { "@score":"2", "@id":"967000", "info":{"authors":{"author":[{"@pid":"314/5572","text":"Angelo D'Ambrosio"},{"@pid":"95/11008","text":"Hajo Grundmann"},{"@pid":"29/11008","text":"Tjibbe Donker"}]},"title":"An open-source integrated framework for the automation of citation collection and screening in systematic reviews.","venue":"CoRR","volume":"abs/2202.10033","year":"2022","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-2202-10033","ee":"https://arxiv.org/abs/2202.10033","url":"https://dblp.org/rec/journals/corr/abs-2202-10033"}, "url":"URL#967000" }, { "@score":"2", "@id":"971169", "info":{"authors":{"author":[{"@pid":"208/8909","text":"Mustain Billah"},{"@pid":"297/3010","text":"Sk. Tanzir Mehedi"},{"@pid":"140/7443","text":"Adnan Anwar"},{"@pid":"08/11312-3","text":"Ziaur Rahman 0003"},{"@pid":"99/999","text":"Rafiqul Islam"}]},"title":"A Systematic Literature Review on Blockchain Enabled Federated Learning Framework for Internet of Vehicles.","venue":"CoRR","volume":"abs/2203.05192","year":"2022","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-2203-05192","doi":"10.48550/ARXIV.2203.05192","ee":"https://doi.org/10.48550/arXiv.2203.05192","url":"https://dblp.org/rec/journals/corr/abs-2203-05192"}, "url":"URL#971169" }, { "@score":"2", "@id":"986271", "info":{"authors":{"author":[{"@pid":"295/9513","text":"Leon Witt"},{"@pid":"320/8197","text":"Mathis Heyer"},{"@pid":"45/10835","text":"Kentaroh Toyoda"},{"@pid":"79/9736","text":"Wojciech Samek"},{"@pid":"48/4185-1","text":"Dan Li 0001"}]},"title":"Decentral and Incentivized Federated Learning Frameworks: A Systematic Literature Review.","venue":"CoRR","volume":"abs/2205.07855","year":"2022","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-2205-07855","doi":"10.48550/ARXIV.2205.07855","ee":"https://doi.org/10.48550/arXiv.2205.07855","url":"https://dblp.org/rec/journals/corr/abs-2205-07855"}, "url":"URL#986271" }, { "@score":"2", "@id":"1009320", "info":{"authors":{"author":[{"@pid":"327/9569","text":"Filipe Arantes Fernandes"},{"@pid":"19/8164","text":"Claudia Susie Camargo Rodrigues"},{"@pid":"76/8543","text":"Eldânae Nogueira Teixeira"},{"@pid":"w/CMLWerner","text":"Cláudia M. L. Werner"}]},"title":"Immersive Learning Frameworks: A Systematic Literature Review.","venue":"CoRR","volume":"abs/2208.14179","year":"2022","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-2208-14179","doi":"10.48550/ARXIV.2208.14179","ee":"https://doi.org/10.48550/arXiv.2208.14179","url":"https://dblp.org/rec/journals/corr/abs-2208-14179"}, "url":"URL#1009320" }, { "@score":"2", "@id":"1039132", "info":{"authors":{"author":[{"@pid":"208/8909","text":"Mustain Billah"},{"@pid":"297/3010","text":"Sk. Tanzir Mehedi"},{"@pid":"140/7443","text":"Adnan Anwar"},{"@pid":"08/11312-3","text":"Ziaur Rahman 0003"},{"@pid":"99/999","text":"Rafiqul Islam"}]},"title":"A Systematic Literature Review on Blockchain Enabled Federated Learning Framework for Internet of Vehicles.","venue":"IACR Cryptol. ePrint Arch.","volume":"2022","pages":"356","year":"2022","type":"Informal and Other Publications","access":"open","key":"journals/iacr/BillahMARI22","ee":"https://eprint.iacr.org/2022/356","url":"https://dblp.org/rec/journals/iacr/BillahMARI22"}, "url":"URL#1039132" }, { "@score":"2", "@id":"1047181", "info":{"authors":{"author":{"@pid":"248/1672","text":"Sri Shaila G"}},"title":"MalAnalysis: A Systematic Framework for Identifying Weaknesses in Malware Detection and Analysis Tools.","year":"2021","type":"Books and Theses","access":"closed","key":"phd/us/G21","ee":"https://www.escholarship.org/uc/item/2t21g43h","url":"https://dblp.org/rec/phd/us/G21"}, "url":"URL#1047181" }, { "@score":"2", "@id":"1051971", "info":{"authors":{"author":[{"@pid":"156/3547","text":"Ikram Ul Haq"},{"@pid":"43/9299","text":"Tamim Ahmed Khan"}]},"title":"Penetration Frameworks and Development Issues in Secure Mobile Application Development: A Systematic Literature Review.","venue":"IEEE Access","volume":"9","pages":"87806-87825","year":"2021","type":"Journal Articles","access":"open","key":"journals/access/HaqK21","doi":"10.1109/ACCESS.2021.3088229","ee":"https://doi.org/10.1109/ACCESS.2021.3088229","url":"https://dblp.org/rec/journals/access/HaqK21"}, "url":"URL#1051971" }, { "@score":"2", "@id":"1061185", "info":{"authors":{"author":[{"@pid":"119/6169","text":"Yingcheng Sun"},{"@pid":"254/9880","text":"Alex M. Butler"},{"@pid":"313/0723","text":"Ibrahim Diallo"},{"@pid":"15/4502","text":"Jae Hyun Kim"},{"@pid":"212/2584","text":"Casey N. Ta"},{"@pid":"196/2681","text":"James R. Rogers"},{"@pid":"09/3214-54","text":"Hao Liu 0054"},{"@pid":"60/4820","text":"Chunhua Weng"}]},"title":"A Framework for Systematic Assessment of Clinical Trial Population Representativeness Using Electronic Health Records Data.","venue":"Appl. Clin. Inform.","volume":"12","number":"4","pages":"816-825","year":"2021","type":"Journal Articles","access":"closed","key":"journals/aci/SunBDKTRLW21","doi":"10.1055/S-0041-1733846","ee":"https://doi.org/10.1055/s-0041-1733846","url":"https://dblp.org/rec/journals/aci/SunBDKTRLW21"}, "url":"URL#1061185" }, { "@score":"2", "@id":"1061746", "info":{"authors":{"author":[{"@pid":"267/4332","text":"Jorge Merchan-Lima"},{"@pid":"188/3396","text":"Fabian Astudillo-Salinas"},{"@pid":"139/7420","text":"Luis Tello-Oquendo"},{"@pid":"133/4779","text":"Franklin L. Sanchez"},{"@pid":"290/8122","text":"Gabriel Lopez-Fonseca"},{"@pid":"267/4652","text":"Dorys Quiroz"}]},"title":"Information security management frameworks and strategies in higher education institutions: a systematic review.","venue":"Ann. des Télécommunications","volume":"76","number":"3-4","pages":"255-270","year":"2021","type":"Journal Articles","access":"closed","key":"journals/adt/Merchan-LimaATS21","doi":"10.1007/S12243-020-00783-2","ee":"https://doi.org/10.1007/s12243-020-00783-2","url":"https://dblp.org/rec/journals/adt/Merchan-LimaATS21"}, "url":"URL#1061746" }, { "@score":"2", "@id":"1065675", "info":{"authors":{"author":[{"@pid":"289/7983","text":"Rory Humphries"},{"@pid":"84/10391","text":"Kieran F. Mulchrone"},{"@pid":"289/7971","text":"Jamie Tratalos"},{"@pid":"289/7709","text":"Simon J. More"},{"@pid":"52/8905","text":"Philipp Hövel"}]},"title":"A systematic framework of modelling epidemics on temporal networks.","venue":"Appl. Netw. Sci.","volume":"6","number":"1","pages":"23","year":"2021","type":"Journal Articles","access":"open","key":"journals/ans/HumphriesMTMH21","doi":"10.1007/S41109-021-00363-W","ee":"https://doi.org/10.1007/s41109-021-00363-w","url":"https://dblp.org/rec/journals/ans/HumphriesMTMH21"}, "url":"URL#1065675" }, { "@score":"2", "@id":"1072126", "info":{"authors":{"author":[{"@pid":"42/559","text":"C. Maria Keet"},{"@pid":"84/2049","text":"Rolf Grütter"}]},"title":"Toward a systematic conflict resolution framework for ontologies.","venue":"J. Biomed. Semant.","volume":"12","number":"1","pages":"15","year":"2021","type":"Journal Articles","access":"open","key":"journals/biomedsem/KeetG21","doi":"10.1186/S13326-021-00246-0","ee":"https://doi.org/10.1186/s13326-021-00246-0","url":"https://dblp.org/rec/journals/biomedsem/KeetG21"}, "url":"URL#1072126" }, { "@score":"2", "@id":"1076296", "info":{"authors":{"author":[{"@pid":"295/6071","text":"Kotha Raj Kumar Reddy"},{"@pid":"37/2275","text":"Angappa Gunasekaran"},{"@pid":"22/2390","text":"P. Kalpana"},{"@pid":"295/6232","text":"V. Raja Sreedharan"},{"@pid":"295/5882","text":"S. Arvind Kumar"}]},"title":"Developing a blockchain framework for the automotive supply chain: A systematic review.","venue":"Comput. Ind. Eng.","volume":"157","pages":"107334","year":"2021","type":"Journal Articles","access":"open","key":"journals/candie/ReddyGKSK21","doi":"10.1016/J.CIE.2021.107334","ee":"https://doi.org/10.1016/j.cie.2021.107334","url":"https://dblp.org/rec/journals/candie/ReddyGKSK21"}, "url":"URL#1076296" }, { "@score":"2", "@id":"1078517", "info":{"authors":{"author":[{"@pid":"170/1410","text":"Yi-Fen Yeh"},{"@pid":"295/4588","text":"Kennedy Kam Ho Chan"},{"@pid":"38/1638","text":"Ying-Shao Hsu"}]},"title":"Toward a framework that connects individual TPACK and collective TPACK: A systematic review of TPACK studies investigating teacher collaborative discourse in the learning by design process.","venue":"Comput. Educ.","volume":"171","pages":"104238","year":"2021","type":"Journal Articles","access":"closed","key":"journals/ce/YehCH21","doi":"10.1016/J.COMPEDU.2021.104238","ee":"https://doi.org/10.1016/j.compedu.2021.104238","url":"https://dblp.org/rec/journals/ce/YehCH21"}, "url":"URL#1078517" }, { "@score":"2", "@id":"1092257", "info":{"authors":{"author":[{"@pid":"247/7789","text":"Shweta Suran"},{"@pid":"220/8442","text":"Vishwajeet Pattanaik"},{"@pid":"d/DirkDraheim","text":"Dirk Draheim"}]},"title":"Frameworks for Collective Intelligence: A Systematic Literature Review.","venue":"ACM Comput. Surv.","volume":"53","number":"1","pages":"14:1-14:36","year":"2021","type":"Journal Articles","access":"closed","key":"journals/csur/SuranPD20","doi":"10.1145/3368986","ee":"https://doi.org/10.1145/3368986","url":"https://dblp.org/rec/journals/csur/SuranPD20"}, "url":"URL#1092257" }, { "@score":"2", "@id":"1098927", "info":{"authors":{"author":[{"@pid":"220/6783","text":"Amine Abbad Andaloussi"},{"@pid":"81/8569","text":"Andrea Burattin"},{"@pid":"66/10278","text":"Tijs Slaats"},{"@pid":"60/1600","text":"Ekkart Kindler"},{"@pid":"96/2864","text":"Barbara Weber"}]},"title":"On the Declarative Paradigm in Hybrid Business Process Representations: A Conceptual Framework and a Systematic Literature Study (Extended Abstract).","venue":"EMISA Forum","volume":"41","number":"1","pages":"19-20","year":"2021","type":"Journal Articles","access":"unavailable","key":"journals/emisa/AndaloussiBSKW21","url":"https://dblp.org/rec/journals/emisa/AndaloussiBSKW21"}, "url":"URL#1098927" }, { "@score":"2", "@id":"1108151", "info":{"authors":{"author":[{"@pid":"134/3108","text":"Katja Rogers"},{"@pid":"277/8319","text":"Sukran Karaosmanoglu"},{"@pid":"167/6688-2","text":"Dennis Wolf 0002"},{"@pid":"09/6285","text":"Frank Steinicke"},{"@pid":"93/2134","text":"Lennart E. Nacke"}]},"title":"A Best-Fit Framework and Systematic Review of Asymmetric Gameplay in Multiplayer Virtual Reality Games.","venue":"Frontiers Virtual Real.","volume":"2","pages":"694660","year":"2021","type":"Journal Articles","access":"open","key":"journals/frvir/RogersKWSN21","doi":"10.3389/FRVIR.2021.694660","ee":"https://doi.org/10.3389/frvir.2021.694660","url":"https://dblp.org/rec/journals/frvir/RogersKWSN21"}, "url":"URL#1108151" }, { "@score":"2", "@id":"1109736", "info":{"authors":{"author":[{"@pid":"190/3831","text":"Devender Kumar"},{"@pid":"151/6718","text":"Steven Jeuris"},{"@pid":"b/JakobEBardram","text":"Jakob E. Bardram"},{"@pid":"85/3106","text":"Nicola Dragoni"}]},"title":"Mobile and Wearable Sensing Frameworks for mHealth Studies and Applications: A Systematic Review.","venue":"ACM Trans. Comput. Heal.","volume":"2","number":"1","pages":"8:1-8:28","year":"2021","type":"Journal Articles","access":"closed","key":"journals/health/KumarJBD21","doi":"10.1145/3422158","ee":"https://doi.org/10.1145/3422158","url":"https://dblp.org/rec/journals/health/KumarJBD21"}, "url":"URL#1109736" }, { "@score":"2", "@id":"1118315", "info":{"authors":{"author":[{"@pid":"00/2343","text":"Ornella Mich"},{"@pid":"76/910","text":"Patrizia Maria Margherita Ghislandi"},{"@pid":"34/2959","text":"Paolo Massa"},{"@pid":"308/8354","text":"Vlad Mardare"},{"@pid":"308/8406","text":"Tommaso Bisutti"},{"@pid":"308/8398","text":"Daniela Giacomozzi"}]},"title":"A Framework for Educational Robotics in Kindergarten: A Systematic Literature Review and Analysis.","venue":"Int. J. Digit. Lit. Digit. Competence","volume":"12","number":"2","pages":"1-32","year":"2021","type":"Journal Articles","access":"closed","key":"journals/ijdldc/MichGMMBG21","doi":"10.4018/IJDLDC.287624","ee":"https://doi.org/10.4018/IJDLDC.287624","url":"https://dblp.org/rec/journals/ijdldc/MichGMMBG21"}, "url":"URL#1118315" }, { "@score":"2", "@id":"1119277", "info":{"authors":{"author":[{"@pid":"170/4271","text":"Chaoguang Wang"},{"@pid":"317/9702","text":"Lusha Huang"}]},"title":"A Systematic Review of Serious Games for Collaborative Learning: Theoretical Framework, Game Mechanic and Efficiency Assessment.","venue":"Int. J. Emerg. Technol. Learn.","volume":"16","number":"6","year":"2021","type":"Journal Articles","access":"closed","key":"journals/ijet/WangH21","doi":"10.3991/IJET.V16I06.18495","ee":"https://doi.org/10.3991/ijet.v16i06.18495","url":"https://dblp.org/rec/journals/ijet/WangH21"}, "url":"URL#1119277" }, { "@score":"2", "@id":"1130257", "info":{"authors":{"author":[{"@pid":"118/0074","text":"Iosif Viktoratos"},{"@pid":"10/1748","text":"Athanasios Tsadiras"}]},"title":"Personalized Advertising Computational Techniques: A Systematic Literature Review, Findings, and a Design Framework.","venue":"Inf.","volume":"12","number":"11","pages":"480","year":"2021","type":"Journal Articles","access":"open","key":"journals/information/ViktoratosT21","doi":"10.3390/INFO12110480","ee":"https://doi.org/10.3390/info12110480","url":"https://dblp.org/rec/journals/information/ViktoratosT21"}, "url":"URL#1130257" }, { "@score":"2", "@id":"1131165", "info":{"authors":{"author":[{"@pid":"73/9798","text":"Puneet Kaur"},{"@pid":"46/7117","text":"Amandeep Dhir"},{"@pid":"273/5392","text":"Amal Khalifa Alkhalifa"},{"@pid":"273/9788","text":"Anushree Tandon"}]},"title":"Social media platforms and sleep problems: a systematic literature review, synthesis and framework for future research.","venue":"Internet Res.","volume":"31","number":"4","pages":"1121-1152","year":"2021","type":"Journal Articles","access":"closed","key":"journals/intr/KaurDAT21","doi":"10.1108/INTR-04-2020-0187","ee":"https://doi.org/10.1108/INTR-04-2020-0187","url":"https://dblp.org/rec/journals/intr/KaurDAT21"}, "url":"URL#1131165" }, { "@score":"2", "@id":"1131204", "info":{"authors":{"author":[{"@pid":"273/9788","text":"Anushree Tandon"},{"@pid":"46/7117","text":"Amandeep Dhir"},{"@pid":"294/6986","text":"Intesar Almugren"},{"@pid":"294/6739","text":"Ghada Naif AlNemer"},{"@pid":"99/4116","text":"Matti Mäntymäki"}]},"title":"Fear of missing out (FoMO) among social media users: a systematic literature review, synthesis and framework for future research.","venue":"Internet Res.","volume":"31","number":"3","pages":"782-821","year":"2021","type":"Journal Articles","access":"closed","key":"journals/intr/TandonDAAM21","doi":"10.1108/INTR-11-2019-0455","ee":"https://doi.org/10.1108/INTR-11-2019-0455","url":"https://dblp.org/rec/journals/intr/TandonDAAM21"}, "url":"URL#1131204" }, { "@score":"2", "@id":"1131205", "info":{"authors":{"author":[{"@pid":"273/9788","text":"Anushree Tandon"},{"@pid":"46/7117","text":"Amandeep Dhir"},{"@pid":"99/4116","text":"Matti Mäntymäki"}]},"title":"Jealousy due to social media? A systematic literature review and framework of social media-induced jealousy.","venue":"Internet Res.","volume":"31","number":"5","pages":"1541-1582","year":"2021","type":"Journal Articles","access":"closed","key":"journals/intr/TandonDM21","doi":"10.1108/INTR-02-2020-0103","ee":"https://doi.org/10.1108/INTR-02-2020-0103","url":"https://dblp.org/rec/journals/intr/TandonDM21"}, "url":"URL#1131205" }, { "@score":"2", "@id":"1131374", "info":{"authors":{"author":[{"@pid":"301/3991","text":"Ali Al Hadwer"},{"@pid":"38/6263","text":"Madjid Tavana"},{"@pid":"259/0296","text":"Daniel Gillis"},{"@pid":"69/2165","text":"Davar Rezania"}]},"title":"A Systematic Review of Organizational Factors Impacting Cloud-based Technology Adoption Using Technology-Organization-Environment Framework.","venue":"Internet Things","volume":"15","pages":"100407","year":"2021","type":"Journal Articles","access":"closed","key":"journals/iot/HadwerTGR21","doi":"10.1016/J.IOT.2021.100407","ee":"https://doi.org/10.1016/j.iot.2021.100407","url":"https://dblp.org/rec/journals/iot/HadwerTGR21"}, "url":"URL#1131374" }, { "@score":"2", "@id":"1148842", "info":{"authors":{"author":[{"@pid":"76/7938","text":"Khalid Hussain"},{"@pid":"238/5807","text":"N. Z. Jhanjhi"},{"@pid":"295/3378","text":"Hafiz Mati-ur-Rahman"},{"@pid":"21/6725","text":"Jawad Hussain"},{"@pid":"180/6040","text":"Muhammad Hasan Islam"}]},"title":"Using a systematic framework to critically analyze proposed smart card based two factor authentication schemes.","venue":"J. King Saud Univ. Comput. Inf. Sci.","volume":"33","number":"4","pages":"417-425","year":"2021","type":"Journal Articles","access":"closed","key":"journals/jksucis/HussainJMHI21","doi":"10.1016/J.JKSUCI.2019.01.015","ee":"https://doi.org/10.1016/j.jksuci.2019.01.015","url":"https://dblp.org/rec/journals/jksucis/HussainJMHI21"}, "url":"URL#1148842" }, { "@score":"2", "@id":"1166164", "info":{"authors":{"author":[{"@pid":"305/9151","text":"Valérian Fraisse"},{"@pid":"78/3830","text":"Marcelo M. Wanderley"},{"@pid":"25/8243","text":"Catherine Guastavino"}]},"title":"Comprehensive Framework for Describing Interactive Sound Installations: Highlighting Trends through a Systematic Review.","venue":"Multimodal Technol. Interact.","volume":"5","number":"4","pages":"19","year":"2021","type":"Journal Articles","access":"open","key":"journals/mti/FraisseWG21","doi":"10.3390/MTI5040019","ee":"https://doi.org/10.3390/mti5040019","url":"https://dblp.org/rec/journals/mti/FraisseWG21"}, "url":"URL#1166164" }, { "@score":"2", "@id":"1167011", "info":{"authors":{"author":[{"@pid":"190/1793","text":"Rens van de Schoot"},{"@pid":"242/1686","text":"Jonathan de Bruin"},{"@pid":"267/9817","text":"Raoul Schram"},{"@pid":"267/9667","text":"Parisa Zahedi"},{"@pid":"34/8245","text":"Jan de Boer"},{"@pid":"267/9516","text":"Felix Weijdema"},{"@pid":"221/3852","text":"Bianca Kramer"},{"@pid":"267/9414","text":"Martijn Huijts"},{"@pid":"128/7968","text":"Maarten Hoogerwerf"},{"@pid":"267/9462","text":"Gerbrich Ferdinands"},{"@pid":"267/9691","text":"Albert Harkema"},{"@pid":"267/9730","text":"Joukje Willemsen"},{"@pid":"267/9597","text":"Yongchao Ma"},{"@pid":"267/9626","text":"Qixiang Fang"},{"@pid":"307/3340","text":"Sybren Hindriks"},{"@pid":"267/9569","text":"Lars Tummers"},{"@pid":"133/8892","text":"Daniel L. Oberski"}]},"title":"An open source machine learning framework for efficient and transparent systematic reviews.","venue":"Nat. Mach. Intell.","volume":"3","number":"2","pages":"125-133","year":"2021","type":"Journal Articles","access":"open","key":"journals/natmi/SchootBSZBWKHHF21","doi":"10.1038/S42256-020-00287-7","ee":"https://doi.org/10.1038/s42256-020-00287-7","url":"https://dblp.org/rec/journals/natmi/SchootBSZBWKHHF21"}, "url":"URL#1167011" }, { "@score":"2", "@id":"1170377", "info":{"authors":{"author":[{"@pid":"291/6923","text":"Eleni Kapantai"},{"@pid":"291/6408","text":"Androniki Christopoulou"},{"@pid":"13/132","text":"Christos Berberidis"},{"@pid":"24/1347","text":"Vassilios Peristeras"}]},"title":"A systematic literature review on disinformation: Toward a unified taxonomical framework.","venue":"New Media Soc.","volume":"23","number":"5","year":"2021","type":"Journal Articles","access":"closed","key":"journals/nms/KapantaiCBP21","doi":"10.1177/1461444820959296","ee":"https://doi.org/10.1177/1461444820959296","url":"https://dblp.org/rec/journals/nms/KapantaiCBP21"}, "url":"URL#1170377" }, { "@score":"2", "@id":"1176414", "info":{"authors":{"author":[{"@pid":"132/5633","text":"Qingzhao Zhang"},{"@pid":"162/5593","text":"David Ke Hong"},{"@pid":"48/1804","text":"Ze Zhang"},{"@pid":"150/3272","text":"Qi Alfred Chen"},{"@pid":"m/SAMahlke","text":"Scott A. Mahlke"},{"@pid":"91/584","text":"Z. Morley Mao"}]},"title":"A Systematic Framework to Identify Violations of Scenario-dependent Driving Rules in Autonomous Vehicle Software.","venue":"Proc. ACM Meas. Anal. Comput. Syst.","volume":"5","number":"2","pages":"15:1-15:25","year":"2021","type":"Journal Articles","access":"closed","key":"journals/pomacs/ZhangHZCMM21","doi":"10.1145/3460082","ee":"https://doi.org/10.1145/3460082","url":"https://dblp.org/rec/journals/pomacs/ZhangHZCMM21"}, "url":"URL#1176414" }, { "@score":"2", "@id":"1180907", "info":{"authors":{"author":[{"@pid":"35/5587","text":"Qi Dai"},{"@pid":"275/3344","text":"Xunnong Xu"},{"@pid":"49/2045","text":"Wen Guo"},{"@pid":"264/9543","text":"Suzhou Huang"},{"@pid":"17/4875","text":"Dimitar P. Filev"}]},"title":"Towards a systematic computational framework for modeling multi-agent decision-making at micro level for smart vehicles in a smart world.","venue":"Robotics Auton. Syst.","volume":"144","pages":"103859","year":"2021","type":"Journal Articles","access":"closed","key":"journals/ras/DaiXGHF21","doi":"10.1016/J.ROBOT.2021.103859","ee":"https://doi.org/10.1016/j.robot.2021.103859","url":"https://dblp.org/rec/journals/ras/DaiXGHF21"}, "url":"URL#1180907" }, { "@score":"2", "@id":"1219260", "info":{"authors":{"author":[{"@pid":"65/2709","text":"Yi Sun"},{"@pid":"245/3597","text":"Shihui Li"}]},"title":"A systematic review of the research framework and evolution of smart homes based on the internet of things.","venue":"Telecommun. Syst.","volume":"77","number":"3","pages":"597-623","year":"2021","type":"Journal Articles","access":"closed","key":"journals/telsys/SunL21","doi":"10.1007/S11235-021-00787-W","ee":"https://doi.org/10.1007/s11235-021-00787-w","url":"https://dblp.org/rec/journals/telsys/SunL21"}, "url":"URL#1219260" }, { "@score":"2", "@id":"1226440", "info":{"authors":{"author":[{"@pid":"27/7313","text":"Richard Heeks 0001"},{"@pid":"60/9168","text":"Mark Graham"},{"@pid":"189/0022","text":"Paul W. Mungai"},{"@pid":"32/2717","text":"Jean-Paul Van Belle"},{"@pid":"181/1312","text":"Jamie Woodcock"}]},"title":"Systematic evaluation of gig work against decent work standards: The development and application of the Fairwork framework.","venue":"Inf. Soc.","volume":"37","number":"5","pages":"267-286","year":"2021","type":"Journal Articles","access":"open","key":"journals/tis/HeeksGMBW21","doi":"10.1080/01972243.2021.1942356","ee":"https://doi.org/10.1080/01972243.2021.1942356","url":"https://dblp.org/rec/journals/tis/HeeksGMBW21"}, "url":"URL#1226440" }, { "@score":"2", "@id":"1258220", "info":{"authors":{"author":[{"@pid":"335/0546","text":"Gema Giler-Velásquez"},{"@pid":"335/0561","text":"Bryan Marcillo-Delgado"},{"@pid":"193/4877","text":"Mónica Vaca-Cardenas"},{"@pid":"220/9402","text":"Leticia Vaca-Cardenas"}]},"title":"Software Frameworks that Improve HCI Focused on Cognitive Cities. A Systematic Literature Review.","venue":"ARTIIS","pages":"142-157","year":"2021","type":"Conference and Workshop Papers","access":"closed","key":"conf/artiis/Giler-Velasquez21","doi":"10.1007/978-3-030-90241-4_12","ee":"https://doi.org/10.1007/978-3-030-90241-4_12","url":"https://dblp.org/rec/conf/artiis/Giler-Velasquez21"}, "url":"URL#1258220" }, { "@score":"2", "@id":"1265640", "info":{"authors":{"author":[{"@pid":"356/1104","text":"Yahya Lavaf-Pour"},{"@pid":"356/1606","text":"Merate Barakat"},{"@pid":"73/8740","text":"Anna P. Chatzimichali"}]},"title":"Embedded Intelligent Empathy: A Systematic Review Towards a Conceptual Framework.","venue":"CAAD Futures","pages":"36-48","year":"2021","type":"Conference and Workshop Papers","access":"closed","key":"conf/caad-futures/Lavaf-PourBC21","doi":"10.1007/978-981-19-1280-1_3","ee":"https://doi.org/10.1007/978-981-19-1280-1_3","url":"https://dblp.org/rec/conf/caad-futures/Lavaf-PourBC21"}, "url":"URL#1265640" }, { "@score":"2", "@id":"1272569", "info":{"authors":{"author":[{"@pid":"315/5977","text":"Martin Rubio"},{"@pid":"36/2478","text":"Andrea Delgado 0001"},{"@pid":"44/5155","text":"Libertad Tansini"}]},"title":"Process mining and data mining integration frameworks for evidence-based business intelligence: a systematic review.","venue":"CIbSE","pages":"28-41","year":"2021","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/cibse/RubioDT21","url":"https://dblp.org/rec/conf/cibse/RubioDT21"}, "url":"URL#1272569" }, { "@score":"2", "@id":"1280977", "info":{"authors":{"author":[{"@pid":"302/2287","text":"Baptiste Millot"},{"@pid":"37/5001","text":"Julien Francq"},{"@pid":"228/6201","text":"Franck Sicard"}]},"title":"Systematic and Efficient Anomaly Detection Framework using Machine Learning on Public ICS Datasets.","venue":"CSR","pages":"292-297","year":"2021","type":"Conference and Workshop Papers","access":"closed","key":"conf/csr2/MillotFS21","doi":"10.1109/CSR51186.2021.9527911","ee":"https://doi.org/10.1109/CSR51186.2021.9527911","url":"https://dblp.org/rec/conf/csr2/MillotFS21"}, "url":"URL#1280977" }, { "@score":"2", "@id":"1282537", "info":{"authors":{"author":[{"@pid":"04/2161","text":"Peer Neubert"},{"@pid":"68/4718","text":"Stefan Schubert"}]},"title":"Hyperdimensional Computing as a Framework for Systematic Aggregation of Image Descriptors.","venue":"CVPR","pages":"16938-16947","year":"2021","type":"Conference and Workshop Papers","access":"open","key":"conf/cvpr/NeubertS21","doi":"10.1109/CVPR46437.2021.01666","ee":"https://openaccess.thecvf.com/content/CVPR2021/html/Neubert_Hyperdimensional_Computing_as_a_Framework_for_Systematic_Aggregation_of_Image_CVPR_2021_paper.html","url":"https://dblp.org/rec/conf/cvpr/NeubertS21"}, "url":"URL#1282537" }, { "@score":"2", "@id":"1287435", "info":{"authors":{"author":[{"@pid":"16/2788","text":"Hongwei Yang"},{"@pid":"37/4190","text":"Yang Li"},{"@pid":"310/3707","text":"Kehan Yao"},{"@pid":"74/3590","text":"Tao Sun"},{"@pid":"61/3491","text":"Cheng Zhou"}]},"title":"A Systematic Network Traffic Emulation Framework for Digital Twin Network.","venue":"DTPI","pages":"94-97","year":"2021","type":"Conference and Workshop Papers","access":"closed","key":"conf/dtpi/YangLYSZ21","doi":"10.1109/DTPI52967.2021.9540090","ee":"https://doi.org/10.1109/DTPI52967.2021.9540090","url":"https://dblp.org/rec/conf/dtpi/YangLYSZ21"}, "url":"URL#1287435" }, { "@score":"2", "@id":"1292954", "info":{"authors":{"author":[{"@pid":"313/8663","text":"Tarek Kaddoumi"},{"@pid":"80/8607","text":"Torben Tambo"}]},"title":"Democratizing Enterprise AI Success Factors and Challenges: A Systematic Literature Review and a Proposed Framework.","venue":"EMCIS","pages":"640-652","year":"2021","type":"Conference and Workshop Papers","access":"closed","key":"conf/emcis/KaddoumiT21","doi":"10.1007/978-3-030-95947-0_45","ee":"https://doi.org/10.1007/978-3-030-95947-0_45","url":"https://dblp.org/rec/conf/emcis/KaddoumiT21"}, "url":"URL#1292954" }, { "@score":"2", "@id":"1294921", "info":{"authors":{"author":[{"@pid":"13/2106","text":"Dolors Costal"},{"@pid":"80/1912","text":"Carles Farré"},{"@pid":"f/XavierFranch","text":"Xavier Franch"},{"@pid":"80/3358","text":"Carme Quer"}]},"title":"Inclusion and Exclusion Criteria in Software Engineering Tertiary Studies: A Systematic Mapping and Emerging Framework.","venue":"ESEM","pages":"30:1-30:6","year":"2021","type":"Conference and Workshop Papers","access":"closed","key":"conf/esem/CostalFFQ21","doi":"10.1145/3475716.3484190","ee":"https://doi.org/10.1145/3475716.3484190","url":"https://dblp.org/rec/conf/esem/CostalFFQ21"}, "url":"URL#1294921" }, { "@score":"2", "@id":"1327130", "info":{"authors":{"author":[{"@pid":"202/0918","text":"Braulio Murillo"},{"@pid":"p/JoseAntonioPowSang","text":"José Antonio Pow-Sang"},{"@pid":"302/8536","text":"Rosanna Palma"}]},"title":"A Systematic Mapping Review of PMO Frameworks.","venue":"ICICT","pages":"285-295","year":"2021","type":"Conference and Workshop Papers","access":"closed","key":"conf/icict/MurilloPP21","doi":"10.1007/978-981-16-2377-6_28","ee":"https://doi.org/10.1007/978-981-16-2377-6_28","url":"https://dblp.org/rec/conf/icict/MurilloPP21"}, "url":"URL#1327130" }, { "@score":"2", "@id":"1330877", "info":{"authors":{"author":[{"@pid":"307/8767","text":"Nkhangweni Lawrence Mashau"},{"@pid":"24/8856","text":"Jan H. Kroeze"},{"@pid":"120/5785","text":"Grant Royd Howard"}]},"title":"An Integrated Conceptual Framework to Assess Small and Rural Municipalities' Readiness for Smart City Implementation: A Systematic Literature Review.","venue":"ICITL","pages":"262-273","year":"2021","type":"Conference and Workshop Papers","access":"closed","key":"conf/icitl/MashauKH21","doi":"10.1007/978-3-030-91540-7_28","ee":"https://doi.org/10.1007/978-3-030-91540-7_28","url":"https://dblp.org/rec/conf/icitl/MashauKH21"}, "url":"URL#1330877" }, { "@score":"2", "@id":"1344536", "info":{"authors":{"author":[{"@pid":"317/6298","text":"Muriani Emelda Isharyani"},{"@pid":"46/10935","text":"Bertha Maya Sopha"},{"@pid":"317/5710","text":"Muhammed Arif Wibisono"},{"@pid":"82/3511","text":"Benny Tjahjono"}]},"title":"Smart Retail Adaptation Framework for Traditional Retailers: A Systematical Review of Literature.","venue":"IEEM","pages":"143-147","year":"2021","type":"Conference and Workshop Papers","access":"closed","key":"conf/ieem/IsharyaniSWT21","doi":"10.1109/IEEM50564.2021.9673056","ee":"https://doi.org/10.1109/IEEM50564.2021.9673056","url":"https://dblp.org/rec/conf/ieem/IsharyaniSWT21"}, "url":"URL#1344536" }, { "@score":"2", "@id":"1383027", "info":{"authors":{"author":[{"@pid":"226/3139","text":"Timm Hess"},{"@pid":"200/8146","text":"Martin Mundt"},{"@pid":"241/9454","text":"Iuliia Pliushch"},{"@pid":"01/4906","text":"Visvanathan Ramesh"}]},"title":"A Procedural World Generation Framework for Systematic Evaluation of Continual Learning.","venue":"NeurIPS Datasets and Benchmarks","year":"2021","type":"Conference and Workshop Papers","access":"open","key":"conf/nips/HessMPR21","ee":"https://datasets-benchmarks-proceedings.neurips.cc/paper/2021/hash/d645920e395fedad7bbbed0eca3fe2e0-Abstract-round1.html","url":"https://dblp.org/rec/conf/nips/HessMPR21"}, "url":"URL#1383027" }, { "@score":"2", "@id":"1386706", "info":{"authors":{"author":[{"@pid":"300/5576","text":"Marie Godefroid"},{"@pid":"294/7356","text":"Anna Zeuge"},{"@pid":"237/2409","text":"Frederike Marie Oschinsky"},{"@pid":"78/8177","text":"Ralf Plattfaut"},{"@pid":"97/6774","text":"Björn Niehaves"}]},"title":"Cognitive Biases in IS Research: A Framework Based on a Systematic Literature Review.","venue":"PACIS","pages":"105","year":"2021","type":"Conference and Workshop Papers","access":"closed","key":"conf/pacis/GodefroidZOPN21","ee":"https://aisel.aisnet.org/pacis2021/105","url":"https://dblp.org/rec/conf/pacis/GodefroidZOPN21"}, "url":"URL#1386706" }, { "@score":"2", "@id":"1398835", "info":{"authors":{"author":[{"@pid":"132/5633","text":"Qingzhao Zhang"},{"@pid":"162/5593","text":"David Ke Hong"},{"@pid":"48/1804","text":"Ze Zhang"},{"@pid":"150/3272","text":"Qi Alfred Chen"},{"@pid":"m/SAMahlke","text":"Scott A. Mahlke"},{"@pid":"91/584","text":"Z. Morley Mao"}]},"title":"A Systematic Framework to Identify Violations of Scenario-dependent Driving Rules in Autonomous Vehicle Software.","venue":"SIGMETRICS","pages":"43-44","year":"2021","type":"Conference and Workshop Papers","access":"closed","key":"conf/sigmetrics/ZhangHZCMM21","doi":"10.1145/3410220.3460101","ee":"https://doi.org/10.1145/3410220.3460101","url":"https://dblp.org/rec/conf/sigmetrics/ZhangHZCMM21"}, "url":"URL#1398835" }, { "@score":"2", "@id":"1405159", "info":{"authors":{"author":[{"@pid":"312/3589","text":"Finlay McCall"},{"@pid":"217/1537","text":"Aya Hussein"},{"@pid":"75/10051","text":"Eleni Petraki"},{"@pid":"36/7061","text":"Sondoss Elsawah"},{"@pid":"a/HusseinAAbbass","text":"Hussein A. Abbass"}]},"title":"Towards a systematic educational framework for human-machine teaming.","venue":"TALE","pages":"375-382","year":"2021","type":"Conference and Workshop Papers","access":"closed","key":"conf/tale/McCallHPEA21","doi":"10.1109/TALE52509.2021.9678853","ee":"https://doi.org/10.1109/TALE52509.2021.9678853","url":"https://dblp.org/rec/conf/tale/McCallHPEA21"}, "url":"URL#1405159" }, { "@score":"2", "@id":"1410192", "info":{"authors":{"author":[{"@pid":"308/7009","text":"Linglin Liu"},{"@pid":"137/6291","text":"Honghao Ju"},{"@pid":"28/520","text":"Xuming Fang"},{"@pid":"38/4289","text":"Yan Long"},{"@pid":"51/4510","text":"Rong He"}]},"title":"Systematic Design of Radar Detection Under IEEE 802.11ad Framework.","venue":"VTC Fall","pages":"1-5","year":"2021","type":"Conference and Workshop Papers","access":"closed","key":"conf/vtc/LiuJFLH21","doi":"10.1109/VTC2021-FALL52928.2021.9625293","ee":"https://doi.org/10.1109/VTC2021-Fall52928.2021.9625293","url":"https://dblp.org/rec/conf/vtc/LiuJFLH21"}, "url":"URL#1410192" }, { "@score":"2", "@id":"1413110", "info":{"authors":{"author":[{"@pid":"205/9718","text":"Soreangsey Kiv"},{"@pid":"86/11497","text":"Samedi Heng"},{"@pid":"23/2483","text":"Yves Wautelet"},{"@pid":"08/89","text":"Manuel Kolp"}]},"title":"Towards a Systematic Socio-Intentional Framework for Agile Methods Tailoring.","venue":"CBI","pages":"143-152","year":"2021","type":"Conference and Workshop Papers","access":"closed","key":"conf/wecwis/KivHWK21","doi":"10.1109/CBI52690.2021.10065","ee":"https://doi.org/10.1109/CBI52690.2021.10065","url":"https://dblp.org/rec/conf/wecwis/KivHWK21"}, "url":"URL#1413110" }, { "@score":"2", "@id":"1420278", "info":{"authors":{"author":[{"@pid":"13/2106","text":"Dolors Costal"},{"@pid":"80/1912","text":"Carles Farré"},{"@pid":"f/XavierFranch","text":"Xavier Franch"},{"@pid":"80/3358","text":"Carme Quer"}]},"title":"Inclusion and Exclusion Criteria in Software Engineering Tertiary Studies: A Systematic Mapping and Emerging Framework - Replication Package.","venue":"Zenodo","publisher":"Zenodo","year":"2021","type":"Data and Artifacts","access":"open","key":"data/10/CostalFFQ21a","doi":"10.5281/ZENODO.5111378","ee":"https://doi.org/10.5281/zenodo.5111378","url":"https://dblp.org/rec/data/10/CostalFFQ21a"}, "url":"URL#1420278" }, { "@score":"2", "@id":"1423764", "info":{"authors":{"author":[{"@pid":"04/2161","text":"Peer Neubert"},{"@pid":"68/4718","text":"Stefan Schubert"}]},"title":"Hyperdimensional computing as a framework for systematic aggregation of image descriptors.","venue":"CoRR","volume":"abs/2101.07720","year":"2021","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-2101-07720","ee":"https://arxiv.org/abs/2101.07720","url":"https://dblp.org/rec/journals/corr/abs-2101-07720"}, "url":"URL#1423764" }, { "@score":"2", "@id":"1444249", "info":{"authors":{"author":[{"@pid":"290/9395","text":"Sofia Yfantidou"},{"@pid":"128/5106","text":"Pavlos Sermpezis"},{"@pid":"v/AthenaVakali","text":"Athena Vakali"}]},"title":"Self-Tracking Technology for mHealth: A Systematic Review and the PAST SELF Framework.","venue":"CoRR","volume":"abs/2104.11483","year":"2021","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-2104-11483","ee":"https://arxiv.org/abs/2104.11483","url":"https://dblp.org/rec/journals/corr/abs-2104-11483"}, "url":"URL#1444249" }, { "@score":"2", "@id":"1453472", "info":{"authors":{"author":[{"@pid":"226/3139","text":"Timm Hess"},{"@pid":"200/8146","text":"Martin Mundt"},{"@pid":"241/9454","text":"Iuliia Pliushch"},{"@pid":"01/4906","text":"Visvanathan Ramesh"}]},"title":"A Procedural World Generation Framework for Systematic Evaluation of Continual Learning.","venue":"CoRR","volume":"abs/2106.02585","year":"2021","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-2106-02585","ee":"https://arxiv.org/abs/2106.02585","url":"https://dblp.org/rec/journals/corr/abs-2106-02585"}, "url":"URL#1453472" }, { "@score":"2", "@id":"1475063", "info":{"authors":{"author":[{"@pid":"13/2106","text":"Dolors Costal"},{"@pid":"80/1912","text":"Carles Farré"},{"@pid":"f/XavierFranch","text":"Xavier Franch"},{"@pid":"80/3358","text":"Carme Quer"}]},"title":"Inclusion and Exclusion Criteria in Software Engineering Tertiary Studies: A Systematic Mapping and Emerging Framework.","venue":"CoRR","volume":"abs/2109.08226","year":"2021","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-2109-08226","ee":"https://arxiv.org/abs/2109.08226","url":"https://dblp.org/rec/journals/corr/abs-2109-08226"}, "url":"URL#1475063" }, { "@score":"2", "@id":"1494005", "info":{"authors":{"author":[{"@pid":"67/11142","text":"Brianna Richardson"},{"@pid":"01/6747","text":"Juan E. Gilbert"}]},"title":"A Framework for Fairness: A Systematic Review of Existing Fair AI Solutions.","venue":"CoRR","volume":"abs/2112.05700","year":"2021","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-2112-05700","ee":"https://arxiv.org/abs/2112.05700","url":"https://dblp.org/rec/journals/corr/abs-2112-05700"}, "url":"URL#1494005" }, { "@score":"2", "@id":"1511226", "info":{"authors":{"author":[{"@pid":"258/5642","text":"Emeka Chukwu"},{"@pid":"92/5090","text":"Lalit Garg"}]},"title":"A Systematic Review of Blockchain in Healthcare: Frameworks, Prototypes, and Implementations.","venue":"IEEE Access","volume":"8","pages":"21196-21214","year":"2020","type":"Journal Articles","access":"open","key":"journals/access/ChukwuG20","doi":"10.1109/ACCESS.2020.2969881","ee":"https://doi.org/10.1109/ACCESS.2020.2969881","url":"https://dblp.org/rec/journals/access/ChukwuG20"}, "url":"URL#1511226" }, { "@score":"2", "@id":"1514694", "info":{"authors":{"author":[{"@pid":"29/7379-3","text":"Milos Jovanovic 0003"},{"@pid":"81/9496","text":"Antoni Lluís Mesquida"},{"@pid":"61/265","text":"Antònia Mas Picahaco"},{"@pid":"64/2561","text":"Ricardo Colomo Palacios"}]},"title":"Agile Transition and Adoption Frameworks, Issues and Factors: A Systematic Mapping.","venue":"IEEE Access","volume":"8","pages":"15711-15735","year":"2020","type":"Journal Articles","access":"open","key":"journals/access/JovanovicMPP20","doi":"10.1109/ACCESS.2020.2967839","ee":"https://doi.org/10.1109/ACCESS.2020.2967839","url":"https://dblp.org/rec/journals/access/JovanovicMPP20"}, "url":"URL#1514694" }, { "@score":"2", "@id":"1515540", "info":{"authors":{"author":[{"@pid":"54/7169","text":"Kaya Kuru"},{"@pid":"82/9788","text":"Darren Ansell"}]},"title":"TCitySmartF: A Comprehensive Systematic Framework for Transforming Cities Into Smart Cities.","venue":"IEEE Access","volume":"8","pages":"18615-18644","year":"2020","type":"Journal Articles","access":"open","key":"journals/access/KuruA20","doi":"10.1109/ACCESS.2020.2967777","ee":"https://doi.org/10.1109/ACCESS.2020.2967777","url":"https://dblp.org/rec/journals/access/KuruA20"}, "url":"URL#1515540" }, { "@score":"2", "@id":"1529297", "info":{"authors":{"author":[{"@pid":"264/0108","text":"Ghada El-Khawaga"},{"@pid":"20/10701","text":"Mervat Abu-Elkheir"},{"@pid":"265/4983","text":"Sherif I. Barakat"},{"@pid":"271/8645","text":"Alaa M. Riad"},{"@pid":"r/ManfredReichert","text":"Manfred Reichert"}]},"title":"CONDA-PM - A Systematic Review and Framework for Concept Drift Analysis in Process Mining.","venue":"Algorithms","volume":"13","number":"7","pages":"161","year":"2020","type":"Journal Articles","access":"open","key":"journals/algorithms/El-KhawagaABRR20","doi":"10.3390/A13070161","ee":"https://doi.org/10.3390/a13070161","url":"https://dblp.org/rec/journals/algorithms/El-KhawagaABRR20"}, "url":"URL#1529297" }, { "@score":"2", "@id":"1529931", "info":{"authors":{"author":[{"@pid":"255/1270","text":"Bryar A. Hassan"},{"@pid":"70/555","text":"Tarik A. Rashid"}]},"title":"Operational framework for recent advances in backtracking search optimisation algorithm: A systematic review and performance evaluation.","venue":"Appl. Math. Comput.","volume":"370","year":"2020","type":"Journal Articles","access":"closed","key":"journals/amc/HassanR20","doi":"10.1016/J.AMC.2019.124919","ee":"https://doi.org/10.1016/j.amc.2019.124919","url":"https://dblp.org/rec/journals/amc/HassanR20"}, "url":"URL#1529931" }, { "@score":"2", "@id":"1537105", "info":{"authors":{"author":[{"@pid":"274/7314","text":"Peyman Badakhshan"},{"@pid":"60/1802","text":"Kieran Conboy"},{"@pid":"196/2412","text":"Thomas Grisold"},{"@pid":"b/JvBrocke","text":"Jan vom Brocke"}]},"title":"Agile business process management: A systematic literature review and an integrated framework.","venue":"Bus. Process. Manag. J.","volume":"26","number":"6","pages":"1505-1523","year":"2020","type":"Journal Articles","access":"closed","key":"journals/bpmj/BadakhshanCGB20","doi":"10.1108/BPMJ-12-2018-0347","ee":"https://doi.org/10.1108/BPMJ-12-2018-0347","url":"https://dblp.org/rec/journals/bpmj/BadakhshanCGB20"}, "url":"URL#1537105" }, { "@score":"2", "@id":"1540987", "info":{"authors":{"author":[{"@pid":"264/8567","text":"Rahma Muthia"},{"@pid":"137/5122","text":"Megan Jobson"},{"@pid":"40/7174","text":"Anton A. Kiss"}]},"title":"A systematic framework for assessing the applicability of reactive distillation for quaternary mixtures using a mapping method.","venue":"Comput. Chem. Eng.","volume":"136","pages":"106804","year":"2020","type":"Journal Articles","access":"closed","key":"journals/cce/MuthiaJK20","doi":"10.1016/J.COMPCHEMENG.2020.106804","ee":"https://doi.org/10.1016/j.compchemeng.2020.106804","url":"https://dblp.org/rec/journals/cce/MuthiaJK20"}, "url":"URL#1540987" }, { "@score":"2", "@id":"1541085", "info":{"authors":{"author":[{"@pid":"213/9863","text":"Yuhe Tian"},{"@pid":"260/0792","text":"Iosif Pappas"},{"@pid":"244/1047","text":"Baris Burnak"},{"@pid":"244/1178","text":"Justin Katz"},{"@pid":"23/313","text":"Efstratios N. Pistikopoulos"}]},"title":"A Systematic Framework for the synthesis of operable process intensification systems - Reactive separation systems.","venue":"Comput. Chem. Eng.","volume":"134","pages":"106675","year":"2020","type":"Journal Articles","access":"closed","key":"journals/cce/TianPBKP20","doi":"10.1016/J.COMPCHEMENG.2019.106675","ee":"https://doi.org/10.1016/j.compchemeng.2019.106675","url":"https://dblp.org/rec/journals/cce/TianPBKP20"}, "url":"URL#1541085" }, { "@score":"2", "@id":"1541366", "info":{"authors":{"author":[{"@pid":"122/4161","text":"Helen Crompton"},{"@pid":"61/1412","text":"Diane Burke"}]},"title":"Mobile learning and pedagogical opportunities: A configurative systematic review of PreK-12 research using the SAMR framework.","venue":"Comput. Educ.","volume":"156","pages":"103945","year":"2020","type":"Journal Articles","access":"closed","key":"journals/ce/CromptonB20","doi":"10.1016/J.COMPEDU.2020.103945","ee":"https://doi.org/10.1016/j.compedu.2020.103945","url":"https://dblp.org/rec/journals/ce/CromptonB20"}, "url":"URL#1541366" }, { "@score":"2", "@id":"1544169", "info":{"authors":{"author":[{"@pid":"273/9788","text":"Anushree Tandon"},{"@pid":"46/7117","text":"Amandeep Dhir"},{"@pid":"95/1179","text":"A. K. M. Najmul Islam"},{"@pid":"99/4116","text":"Matti Mäntymäki"}]},"title":"Blockchain in healthcare: A systematic literature review, synthesizing framework and future research agenda.","venue":"Comput. Ind.","volume":"122","pages":"103290","year":"2020","type":"Journal Articles","access":"open","key":"journals/cii/TandonDIM20","doi":"10.1016/J.COMPIND.2020.103290","ee":"https://doi.org/10.1016/j.compind.2020.103290","url":"https://dblp.org/rec/journals/cii/TandonDIM20"}, "url":"URL#1544169" }, { "@score":"2", "@id":"1550245", "info":{"authors":{"author":[{"@pid":"233/4564","text":"Daniel A. Sepulveda Estay"},{"@pid":"15/9554","text":"Rishikesh Sahay"},{"@pid":"25/9134","text":"Michael Bruhn Barfod"},{"@pid":"j/ChristianDamsgaardJensen","text":"Christian Damsgaard Jensen"}]},"title":"A systematic review of cyber-resilience assessment frameworks.","venue":"Comput. Secur.","volume":"97","pages":"101996","year":"2020","type":"Journal Articles","access":"closed","key":"journals/compsec/EstaySBJ20","doi":"10.1016/J.COSE.2020.101996","ee":"https://doi.org/10.1016/j.cose.2020.101996","url":"https://dblp.org/rec/journals/compsec/EstaySBJ20"}, "url":"URL#1550245" }, { "@score":"2", "@id":"1550886", "info":{"authors":{"author":[{"@pid":"92/10331","text":"Muath A. Obaidat"},{"@pid":"79/10327","text":"Suhaib Obeidat"},{"@pid":"219/6496","text":"Jennifer Holst"},{"@pid":"263/3428","text":"Abdullah Al Hayajneh"},{"@pid":"198/8464","text":"Joseph Brown"}]},"title":"A Comprehensive and Systematic Survey on the Internet of Things: Security and Privacy Challenges, Security Frameworks, Enabling Technologies, Threats, Vulnerabilities and Countermeasures.","venue":"Comput.","volume":"9","number":"2","pages":"44","year":"2020","type":"Journal Articles","access":"open","key":"journals/computers/ObaidatOHHB20","doi":"10.3390/COMPUTERS9020044","ee":"https://doi.org/10.3390/computers9020044","url":"https://dblp.org/rec/journals/computers/ObaidatOHHB20"}, "url":"URL#1550886" }, { "@score":"2", "@id":"1557556", "info":{"authors":{"author":[{"@pid":"79/6199","text":"Alberto Castellini"},{"@pid":"87/6321","text":"Manuele Bicego"},{"@pid":"239/8488","text":"Francesco Masillo"},{"@pid":"263/4321","text":"Maddalena Zuccotto"},{"@pid":"f/AlessandroFarinelli","text":"Alessandro Farinelli"}]},"title":"Time series segmentation for state-model generation of autonomous aquatic drones: A systematic framework.","venue":"Eng. Appl. Artif. Intell.","volume":"90","pages":"103499","year":"2020","type":"Journal Articles","access":"closed","key":"journals/eaai/CastelliniBMZF20","doi":"10.1016/J.ENGAPPAI.2020.103499","ee":"https://doi.org/10.1016/j.engappai.2020.103499","url":"https://dblp.org/rec/journals/eaai/CastelliniBMZF20"}, "url":"URL#1557556" }, { "@score":"2", "@id":"1557583", "info":{"authors":{"author":[{"@pid":"254/6697","text":"Zouhair Elamrani Abou Elassad"},{"@pid":"55/9489","text":"Hajar Mousannif"},{"@pid":"96/9488","text":"Hassan Al Moatassime"},{"@pid":"150/3569","text":"Aimad Karkouch"}]},"title":"The application of machine learning techniques for driving behavior analysis: A conceptual framework and a systematic literature review.","venue":"Eng. Appl. Artif. Intell.","volume":"87","year":"2020","type":"Journal Articles","access":"closed","key":"journals/eaai/ElassadMMK20","doi":"10.1016/J.ENGAPPAI.2019.103312","ee":"https://doi.org/10.1016/j.engappai.2019.103312","url":"https://dblp.org/rec/journals/eaai/ElassadMMK20"}, "url":"URL#1557583" }, { "@score":"2", "@id":"1559187", "info":{"authors":{"author":[{"@pid":"31/8261","text":"Neetu Singh"},{"@pid":"84/5714","text":"Upkar Varshney"}]},"title":"IT-based reminders for medication adherence: systematic review, taxonomy, framework and research directions.","venue":"Eur. J. Inf. Syst.","volume":"29","number":"1","pages":"84-108","year":"2020","type":"Journal Articles","access":"closed","key":"journals/ejis/SinghV20","doi":"10.1080/0960085X.2019.1701956","ee":"https://doi.org/10.1080/0960085X.2019.1701956","url":"https://dblp.org/rec/journals/ejis/SinghV20"}, "url":"URL#1559187" }, { "@score":"2", "@id":"1564468", "info":{"authors":{"author":[{"@pid":"218/0749","text":"Michal R. Hoffman"},{"@pid":"62/8313","text":"Luis-Daniel Ibáñez"},{"@pid":"p/ElenaPaslaruBontasSimperl","text":"Elena Simperl"}]},"title":"Toward a Formal Scholarly Understanding of Blockchain-Mediated Decentralization: A Systematic Review and a Framework.","venue":"Frontiers Blockchain","volume":"3","pages":"35","year":"2020","type":"Journal Articles","access":"open","key":"journals/fbloc/HoffmanIS20","doi":"10.3389/FBLOC.2020.00035","ee":"https://doi.org/10.3389/fbloc.2020.00035","url":"https://dblp.org/rec/journals/fbloc/HoffmanIS20"}, "url":"URL#1564468" }, { "@score":"2", "@id":"1564748", "info":{"authors":{"author":[{"@pid":"185/9471","text":"Elizabeth Ford"},{"@pid":"286/6447","text":"Scarlett Shepherd"},{"@pid":"120/0150","text":"Kerina H. Jones"},{"@pid":"213/0662","text":"Lamiece Hassan"}]},"title":"Toward an Ethical Framework for the Text Mining of Social Media for Health Research: A Systematic Review.","venue":"Frontiers Digit. Health","volume":"2","pages":"592237","year":"2020","type":"Journal Articles","access":"open","key":"journals/fdgth/FordSJH20","doi":"10.3389/FDGTH.2020.592237","ee":"https://doi.org/10.3389/fdgth.2020.592237","url":"https://dblp.org/rec/journals/fdgth/FordSJH20"}, "url":"URL#1564748" }, { "@score":"2", "@id":"1565852", "info":{"authors":{"author":[{"@pid":"230/0102","text":"Newton Masinde"},{"@pid":"276/9961","text":"Liat Khitman"},{"@pid":"230/0177","text":"Iakov Dlikman"},{"@pid":"61/5614","text":"Kalman Graffi"}]},"title":"Systematic Evaluation of LibreSocial - A Peer-to-Peer Framework for Online Social Networks.","venue":"Future Internet","volume":"12","number":"9","pages":"140","year":"2020","type":"Journal Articles","access":"open","key":"journals/fi/MasindeKDG20","doi":"10.3390/FI12090140","ee":"https://doi.org/10.3390/fi12090140","url":"https://dblp.org/rec/journals/fi/MasindeKDG20"}, "url":"URL#1565852" }, { "@score":"2", "@id":"1565979", "info":{"authors":{"author":[{"@pid":"98/5391","text":"Thomas A. Cleland"},{"@pid":"183/6087","text":"Ayon Borthakur"}]},"title":"A Systematic Framework for Olfactory Bulb Signal Transformations.","venue":"Frontiers Comput. Neurosci.","volume":"14","pages":"579143","year":"2020","type":"Journal Articles","access":"open","key":"journals/ficn/ClelandB20","doi":"10.3389/FNCOM.2020.579143","ee":"https://doi.org/10.3389/fncom.2020.579143","url":"https://dblp.org/rec/journals/ficn/ClelandB20"}, "url":"URL#1565979" }, { "@score":"2", "@id":"1582173", "info":{"authors":{"author":[{"@pid":"238/8212","text":"Matthew T. Neame"},{"@pid":"279/0219","text":"Gerri Sefton"},{"@pid":"55/11342","text":"Matthew Roberts"},{"@pid":"211/5435","text":"David Harkness"},{"@pid":"238/8158","text":"Ian P. Sinha"},{"@pid":"238/8105","text":"Daniel B. Hawcutt"}]},"title":"Evaluating health information technologies: A systematic review of framework recommendations.","venue":"Int. J. Medical Informatics","volume":"142","pages":"104247","year":"2020","type":"Journal Articles","access":"closed","key":"journals/ijmi/NeameSRHSH20","doi":"10.1016/J.IJMEDINF.2020.104247","ee":"https://doi.org/10.1016/j.ijmedinf.2020.104247","url":"https://dblp.org/rec/journals/ijmi/NeameSRHSH20"}, "url":"URL#1582173" }, { "@score":"2", "@id":"1585824", "info":{"authors":{"author":[{"@pid":"275/5874","text":"Karam Ahkouk"},{"@pid":"117/3744","text":"Mustapha Machkour"}]},"title":"Towards an interface for translating natural language questions to SQL: a conceptual framework from a systematic review.","venue":"Int. J. Reason. based Intell. Syst.","volume":"12","number":"4","pages":"264-275","year":"2020","type":"Journal Articles","access":"closed","key":"journals/ijris/AhkoukM20","doi":"10.1504/IJRIS.2020.111786","ee":"https://doi.org/10.1504/IJRIS.2020.111786","url":"https://dblp.org/rec/journals/ijris/AhkoukM20"}, "url":"URL#1585824" }, { "@score":"2", "@id":"1591770", "info":{"authors":{"author":[{"@pid":"220/6783","text":"Amine Abbad Andaloussi"},{"@pid":"81/8569","text":"Andrea Burattin"},{"@pid":"66/10278","text":"Tijs Slaats"},{"@pid":"60/1600","text":"Ekkart Kindler"},{"@pid":"96/2864","text":"Barbara Weber"}]},"title":"On the declarative paradigm in hybrid business process representations: A conceptual framework and a systematic literature study.","venue":"Inf. Syst.","volume":"91","pages":"101505","year":"2020","type":"Journal Articles","access":"closed","key":"journals/is/AndaloussiBSKW20","doi":"10.1016/J.IS.2020.101505","ee":"https://doi.org/10.1016/j.is.2020.101505","url":"https://dblp.org/rec/journals/is/AndaloussiBSKW20"}, "url":"URL#1591770" }, { "@score":"2", "@id":"1599266", "info":{"authors":{"author":[{"@pid":"43/5379","text":"Orazio Tomarchio"},{"@pid":"171/0362","text":"Domenico Calcaterra"},{"@pid":"52/6324","text":"Giuseppe Di Modica"}]},"title":"Cloud resource orchestration in the multi-cloud landscape: a systematic review of existing frameworks.","venue":"J. Cloud Comput.","volume":"9","pages":"49","year":"2020","type":"Journal Articles","access":"open","key":"journals/jcloudc/TomarchioCM20","doi":"10.1186/S13677-020-00194-7","ee":"https://doi.org/10.1186/s13677-020-00194-7","url":"https://dblp.org/rec/journals/jcloudc/TomarchioCM20"}, "url":"URL#1599266" }, { "@score":"2", "@id":"1613359", "info":{"authors":{"author":[{"@pid":"164/1411","text":"Sundong Kim"},{"@pid":"28/3904","text":"Jae-Gil Lee 0001"}]},"title":"A systematic framework of predicting customer revisit with in-store sensors.","venue":"Knowl. Inf. Syst.","volume":"62","number":"3","pages":"1005-1035","year":"2020","type":"Journal Articles","access":"closed","key":"journals/kais/KimL20","doi":"10.1007/S10115-019-01373-Y","ee":"https://doi.org/10.1007/s10115-019-01373-y","url":"https://dblp.org/rec/journals/kais/KimL20"}, "url":"URL#1613359" }, { "@score":"2", "@id":"1641324", "info":{"authors":{"author":[{"@pid":"286/9949","text":"Indu Bhardwaj"},{"@pid":"46/4140","text":"Sibaram Khara"},{"@pid":"286/9824","text":"Priestly Shan"}]},"title":"A Framework to Systematically Analyse the Trustworthiness of Nodes for Securing IoV Interactions.","venue":"Scalable Comput. Pract. Exp.","volume":"21","number":"3","pages":"451-462","year":"2020","type":"Journal Articles","access":"closed","key":"journals/scpe/BhardwajKS20","doi":"10.12694/SCPE.V21I3.1743","ee":"https://doi.org/10.12694/scpe.v21i3.1743","url":"https://dblp.org/rec/journals/scpe/BhardwajKS20"}, "url":"URL#1641324" }, { "@score":"2", "@id":"1667817", "info":{"authors":{"author":[{"@pid":"192/1237","text":"Stefanos Leonardos"},{"@pid":"35/8864","text":"Daniël Reijsbergen"},{"@pid":"62/1236","text":"Georgios Piliouras"}]},"title":"PREStO: A Systematic Framework for Blockchain Consensus Protocols.","venue":"IEEE Trans. Engineering Management","volume":"67","number":"4","pages":"1028-1044","year":"2020","type":"Journal Articles","access":"closed","key":"journals/tem/LeonardosRP20","doi":"10.1109/TEM.2020.2981286","ee":"https://doi.org/10.1109/TEM.2020.2981286","url":"https://dblp.org/rec/journals/tem/LeonardosRP20"}, "url":"URL#1667817" }, { "@score":"2", "@id":"1668308", "info":{"authors":{"author":[{"@pid":"46/1089","text":"Lihua Zhang"},{"@pid":"96/6073","text":"Shihua Zhang"}]},"title":"A General Joint Matrix Factorization Framework for Data Integration and Its Systematic Algorithmic Exploration.","venue":"IEEE Trans. Fuzzy Syst.","volume":"28","number":"9","pages":"1971-1983","year":"2020","type":"Journal Articles","access":"closed","key":"journals/tfs/ZhangZ20","doi":"10.1109/TFUZZ.2019.2928518","ee":"https://doi.org/10.1109/TFUZZ.2019.2928518","url":"https://dblp.org/rec/journals/tfs/ZhangZ20"}, "url":"URL#1668308" }, { "@score":"2", "@id":"1670564", "info":{"authors":{"author":[{"@pid":"21/3626-10","text":"Fan Zhang 0010"},{"@pid":"70/1946","text":"Xiaofei Dong"},{"@pid":"233/5642","text":"Bolin Yang"},{"@pid":"15/7381","text":"Yajin Zhou"},{"@pid":"20/6179-1","text":"Kui Ren 0001"}]},"title":"A Systematic Evaluation of Wavelet-Based Attack Framework on Random Delay Countermeasures.","venue":"IEEE Trans. Inf. Forensics Secur.","volume":"15","pages":"1407-1422","year":"2020","type":"Journal Articles","access":"closed","key":"journals/tifs/ZhangDYZR20","doi":"10.1109/TIFS.2019.2941774","ee":"https://doi.org/10.1109/TIFS.2019.2941774","url":"https://dblp.org/rec/journals/tifs/ZhangDYZR20"}, "url":"URL#1670564" }, { "@score":"2", "@id":"1681421", "info":{"authors":{"author":[{"@pid":"17/2703-6","text":"Jie Li 0006"},{"@pid":"156/9600-1","text":"Siming Chen 0001"},{"@pid":"c/WeiChen1","text":"Wei Chen 0001"},{"@pid":"a/GennadyLAndrienko","text":"Gennady L. Andrienko"},{"@pid":"a/NataliaVAndrienko","text":"Natalia V. Andrienko"}]},"title":"Semantics-Space-Time Cube: A Conceptual Framework for Systematic Analysis of Texts in Space and Time.","venue":"IEEE Trans. Vis. Comput. Graph.","volume":"26","number":"4","pages":"1789-1806","year":"2020","type":"Journal Articles","access":"closed","key":"journals/tvcg/LiCCAA20","doi":"10.1109/TVCG.2018.2882449","ee":"https://doi.org/10.1109/TVCG.2018.2882449","url":"https://dblp.org/rec/journals/tvcg/LiCCAA20"}, "url":"URL#1681421" }, { "@score":"2", "@id":"1684774", "info":{"authors":{"author":[{"@pid":"165/8090","text":"Maryam Zahabi"},{"@pid":"276/8357","text":"Ashiq Mohammed Abdul Razak"}]},"title":"Adaptive virtual reality-based training: a systematic literature review and framework.","venue":"Virtual Real.","volume":"24","number":"4","pages":"725-752","year":"2020","type":"Journal Articles","access":"closed","key":"journals/vr/ZahabiR20","doi":"10.1007/S10055-020-00434-W","ee":"https://doi.org/10.1007/s10055-020-00434-w","url":"https://dblp.org/rec/journals/vr/ZahabiR20"}, "url":"URL#1684774" }, { "@score":"2", "@id":"1693290", "info":{"authors":{"author":[{"@pid":"278/0252","text":"Samira Zad"},{"@pid":"27/8885","text":"Mark A. Finlayson"}]},"title":"Systematic Evaluation of a Framework for Unsupervised Emotion Recognition for Narrative Text.","venue":"NUSE@ACL","pages":"26-37","year":"2020","type":"Conference and Workshop Papers","access":"open","key":"conf/acl/ZadF20","doi":"10.18653/V1/2020.NUSE-1.4","ee":"https://doi.org/10.18653/v1/2020.nuse-1.4","url":"https://dblp.org/rec/conf/acl/ZadF20"}, "url":"URL#1693290" }, { "@score":"2", "@id":"1702268", "info":{"authors":{"author":[{"@pid":"22/10356","text":"Vera Granikov"},{"@pid":"224/3180","text":"Reem El Sherif"},{"@pid":"84/2109","text":"France Bouthillier"},{"@pid":"01/7315","text":"Pierre Pluye"}]},"title":"Collaborative information monitoring: Preliminary results of a systematic mixed studies review and a framework synthesis.","venue":"ASIST","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/asist/GranikovSBP20","doi":"10.1002/PRA2.369","ee":"https://doi.org/10.1002/pra2.369","url":"https://dblp.org/rec/conf/asist/GranikovSBP20"}, "url":"URL#1702268" }, { "@score":"2", "@id":"1707752", "info":{"authors":{"author":[{"@pid":"273/9672","text":"Michael Greineder"},{"@pid":"27/7905","text":"Ivo Blohm"},{"@pid":"131/8090","text":"Niklas Leicht"}]},"title":"Conceptualizing the Agile Work Organization: A systematic literature review, framework and research agenda.","venue":"Bled eConference","pages":"25","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/bled/GreinederBL20","ee":"https://aisel.aisnet.org/bled2020/25","url":"https://dblp.org/rec/conf/bled/GreinederBL20"}, "url":"URL#1707752" }, { "@score":"2", "@id":"1713083", "info":{"authors":{"author":[{"@pid":"86/11295","text":"Ana Rita Neves"},{"@pid":"314/9439","text":"Jóana Cósta"},{"@pid":"27/8141-2","text":"João Reis 0002"}]},"title":"Using a Systematic Literature Review to Build a Framework for University-Industry Linkages using Open Innovation.","venue":"CENTERIS/ProjMAN/HCist","pages":"23-33","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/centeris/NevesCR20","doi":"10.1016/J.PROCS.2021.01.095","ee":"https://doi.org/10.1016/j.procs.2021.01.095","url":"https://dblp.org/rec/conf/centeris/NevesCR20"}, "url":"URL#1713083" }, { "@score":"2", "@id":"1713123", "info":{"authors":{"author":[{"@pid":"314/9363","text":"J. K. Ssegawa"},{"@pid":"314/8704","text":"M. Muzinda"}]},"title":"Feasibility Assessment Framework (FAF): A Systematic and Objective Approach for Assessing the Viability of a Project.","venue":"CENTERIS/ProjMAN/HCist","pages":"377-385","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/centeris/SsegawaM20","doi":"10.1016/J.PROCS.2021.01.180","ee":"https://doi.org/10.1016/j.procs.2021.01.180","url":"https://dblp.org/rec/conf/centeris/SsegawaM20"}, "url":"URL#1713123" }, { "@score":"2", "@id":"1714383", "info":{"authors":{"author":[{"@pid":"182/4077","text":"Taliesin L. Smith"},{"@pid":"161/3793","text":"Emily B. Moore"}]},"title":"Storytelling to Sensemaking: A Systematic Framework for Designing Auditory Description Display for Interactives.","venue":"CHI","pages":"1-12","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/chi/SmithM20","doi":"10.1145/3313831.3376460","ee":"https://doi.org/10.1145/3313831.3376460","url":"https://dblp.org/rec/conf/chi/SmithM20"}, "url":"URL#1714383" }, { "@score":"2", "@id":"1743453", "info":{"authors":{"author":[{"@pid":"201/9826","text":"Kacper Sokol"},{"@pid":"f/PeterAFlach","text":"Peter A. Flach"}]},"title":"Explainability fact sheets: a framework for systematic assessment of explainable approaches.","venue":"FAT*","pages":"56-67","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/fat/SokolF20","doi":"10.1145/3351095.3372870","ee":"https://doi.org/10.1145/3351095.3372870","url":"https://dblp.org/rec/conf/fat/SokolF20"}, "url":"URL#1743453" }, { "@score":"2", "@id":"1745580", "info":{"authors":{"author":[{"@pid":"259/3790","text":"Jiantong Jiang"},{"@pid":"233/6269","text":"Zeke Wang"},{"@pid":"207/7109","text":"Xue Liu"},{"@pid":"28/7411","text":"Juan Gómez-Luna"},{"@pid":"45/5411","text":"Nan Guan"},{"@pid":"95/63","text":"Qingxu Deng"},{"@pid":"10/4661-12","text":"Wei Zhang 0012"},{"@pid":"m/OnurMutlu","text":"Onur Mutlu"}]},"title":"Boyi: A Systematic Framework for Automatically Deciding the Right Execution Model of OpenCL Applications on FPGAs.","venue":"FPGA","pages":"299-309","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/fpga/JiangWLGGDZM20","doi":"10.1145/3373087.3375313","ee":"https://doi.org/10.1145/3373087.3375313","url":"https://dblp.org/rec/conf/fpga/JiangWLGGDZM20"}, "url":"URL#1745580" }, { "@score":"2", "@id":"1750448", "info":{"authors":{"author":{"@pid":"152/4737","text":"Kaja J. Fietkiewicz"}},"title":"The Law of Live Streaming: A Systematic Literature Review and Analysis of German Legal Framework.","venue":"HCI","pages":"227-242","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/hci/Fietkiewicz20","doi":"10.1007/978-3-030-49570-1_16","ee":"https://doi.org/10.1007/978-3-030-49570-1_16","url":"https://dblp.org/rec/conf/hci/Fietkiewicz20"}, "url":"URL#1750448" }, { "@score":"2", "@id":"1752202", "info":{"authors":{"author":[{"@pid":"270/1613","text":"Silvano Herculano da Luz Júnior"},{"@pid":"290/5399","text":"Francisco l. C. Silva"},{"@pid":"270/1865","text":"Gustavo Sousa Galisa Albuquerque"},{"@pid":"270/2197","text":"Francisco Petrônio Alencar de Medeiros"},{"@pid":"266/2533","text":"Heremita Brasileiro Lira"}]},"title":"Frameworks, Methodologies and Specification Tools for the Enterprise Architecture Application in Healthcare Systems: A Systematic Literature Review.","venue":"HealthCom","pages":"1-7","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/healthcom/JuniorSAML20","doi":"10.1109/HEALTHCOM49281.2021.9398916","ee":"https://doi.org/10.1109/HEALTHCOM49281.2021.9398916","url":"https://dblp.org/rec/conf/healthcom/JuniorSAML20"}, "url":"URL#1752202" }, { "@score":"2", "@id":"1761219", "info":{"authors":{"author":[{"@pid":"271/3011","text":"Harsh Mashru"},{"@pid":"254/8008","text":"Naman Kabra"},{"@pid":"264/2054","text":"Krishnan Mohan"}]},"title":"A Systematic Framework for State Channel Protocols Identification for Blockchain-Based IoT Networks and Applications.","venue":"ICC Workshops","pages":"1-7","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/MashruKM20","doi":"10.1109/ICCWORKSHOPS49005.2020.9145400","ee":"https://doi.org/10.1109/ICCWorkshops49005.2020.9145400","url":"https://dblp.org/rec/conf/icc/MashruKM20"}, "url":"URL#1761219" }, { "@score":"2", "@id":"1786585", "info":{"authors":{"author":[{"@pid":"342/7569","text":"Amantha Naicker"},{"@pid":"31/10500","text":"Marita Turpin"},{"@pid":"32/2717","text":"Jean-Paul Van Belle"}]},"title":"Mapping the Factors Influencing the Sustainability of Public Access Computing in Africa to the ACE Framework: A Systematic Literature Review.","venue":"IDIA","pages":"95-109","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/idia/NaickerTB20","doi":"10.1007/978-3-030-52014-4_7","ee":"https://doi.org/10.1007/978-3-030-52014-4_7","url":"https://dblp.org/rec/conf/idia/NaickerTB20"}, "url":"URL#1786585" }, { "@score":"2", "@id":"1794815", "info":{"authors":{"author":[{"@pid":"227/7149","text":"Yijia Chang"},{"@pid":"40/5044-1","text":"Xi Huang 0001"},{"@pid":"271/9915","text":"Longxiulin Deng"},{"@pid":"98/549","text":"Ziyu Shao"},{"@pid":"59/1232","text":"Junshan Zhang"}]},"title":"Systematic Topology Design for Large-Scale Networks: A Unified Framework.","venue":"INFOCOM","pages":"347-356","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/infocom/ChangHDSZ20","doi":"10.1109/INFOCOM41043.2020.9155462","ee":"https://doi.org/10.1109/INFOCOM41043.2020.9155462","url":"https://dblp.org/rec/conf/infocom/ChangHDSZ20"}, "url":"URL#1794815" }, { "@score":"2", "@id":"1821398", "info":{"authors":{"author":[{"@pid":"175/1548","text":"Arvid Butting"},{"@pid":"217/2765","text":"Jerome Pfeiffer"},{"@pid":"r/BernhardRumpe","text":"Bernhard Rumpe"},{"@pid":"02/6598-1","text":"Andreas Wortmann 0001"}]},"title":"A compositional framework for systematic modeling language reuse.","venue":"MoDELS","pages":"35-46","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/models/ButtingPRW20","doi":"10.1145/3365438.3410934","ee":"https://doi.org/10.1145/3365438.3410934","url":"https://dblp.org/rec/conf/models/ButtingPRW20"}, "url":"URL#1821398" }, { "@score":"2", "@id":"1837574", "info":{"authors":{"author":[{"@pid":"79/9996","text":"Poonam Yadav"},{"@pid":"263/2278","text":"Angelo Feraudo"},{"@pid":"36/655","text":"Budi Arief"},{"@pid":"s/SFShahandashti","text":"Siamak F. Shahandashti"},{"@pid":"65/1815","text":"Vassilios G. Vassilakis"}]},"title":"Position paper: A systematic framework for categorising IoT device fingerprinting mechanisms.","venue":"AIChallengeIoT@SenSys","pages":"62-68","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/sensys/YadavFASV20","doi":"10.1145/3417313.3429384","ee":"https://doi.org/10.1145/3417313.3429384","url":"https://dblp.org/rec/conf/sensys/YadavFASV20"}, "url":"URL#1837574" }, { "@score":"2", "@id":"1856497", "info":{"authors":{"author":[{"@pid":"82/10197","text":"Jezreel Mejía"},{"@pid":"272/3130","text":"Perla Maciel"},{"@pid":"87/10197","text":"Mirna Muñoz 0001"},{"@pid":"66/7429","text":"Yadira Quiñonez"}]},"title":"Frameworks to Develop Secure Mobile Applications: A Systematic Literature Review.","venue":"WorldCIST","pages":"137-146","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/worldcist/MejiaMMQ20","doi":"10.1007/978-3-030-45691-7_13","ee":"https://doi.org/10.1007/978-3-030-45691-7_13","url":"https://dblp.org/rec/conf/worldcist/MejiaMMQ20"}, "url":"URL#1856497" }, { "@score":"2", "@id":"1910773", "info":{"authors":{"author":[{"@pid":"264/0108","text":"Ghada El-Khawaga"},{"@pid":"20/10701","text":"Mervat Abu-Elkheir"},{"@pid":"265/4983","text":"Sherif I. Barakat"},{"@pid":"271/8645","text":"Alaa M. Riad"},{"@pid":"r/ManfredReichert","text":"Manfred Reichert"}]},"title":"CONDA-PM - A Systematic Review and Framework for Concept Drift Analysis in Process Mining.","venue":"CoRR","volume":"abs/2009.05438","year":"2020","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-2009-05438","ee":"https://arxiv.org/abs/2009.05438","url":"https://dblp.org/rec/journals/corr/abs-2009-05438"}, "url":"URL#1910773" }, { "@score":"2", "@id":"1913351", "info":{"authors":{"author":[{"@pid":"35/5587","text":"Qi Dai"},{"@pid":"275/3344","text":"Xunnong Xu"},{"@pid":"49/2045","text":"Wen Guo"},{"@pid":"264/9543","text":"Suzhou Huang"},{"@pid":"17/4875","text":"Dimitar P. Filev"}]},"title":"Towards a Systematic Computational Framework for Modeling Multi-Agent Decision-Making at Micro Level for Smart Vehicles in a Smart World.","venue":"CoRR","volume":"abs/2009.12213","year":"2020","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-2009-12213","ee":"https://arxiv.org/abs/2009.12213","url":"https://dblp.org/rec/journals/corr/abs-2009-12213"}, "url":"URL#1913351" }, { "@score":"2", "@id":"1918154", "info":{"authors":{"author":[{"@pid":"79/9996","text":"Poonam Yadav"},{"@pid":"263/2278","text":"Angelo Feraudo"},{"@pid":"36/655","text":"Budi Arief"},{"@pid":"s/SFShahandashti","text":"Siamak F. Shahandashti"},{"@pid":"65/1815","text":"Vassilios G. Vassilakis"}]},"title":"Position paper: A systematic framework for categorising IoT device fingerprinting mechanisms.","venue":"CoRR","volume":"abs/2010.08466","year":"2020","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-2010-08466","ee":"https://arxiv.org/abs/2010.08466","url":"https://dblp.org/rec/journals/corr/abs-2010-08466"}, "url":"URL#1918154" }, { "@score":"2", "@id":"1932759", "info":{"authors":{"author":[{"@pid":"277/2691","text":"Judith Wewerka"},{"@pid":"r/ManfredReichert","text":"Manfred Reichert"}]},"title":"Robotic Process Automation - A Systematic Literature Review and Assessment Framework.","venue":"CoRR","volume":"abs/2012.11951","year":"2020","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-2012-11951","ee":"https://arxiv.org/abs/2012.11951","url":"https://dblp.org/rec/journals/corr/abs-2012-11951"}, "url":"URL#1932759" }, { "@score":"2", "@id":"1937393", "info":{"authors":{"author":{"@pid":"133/2020","text":"Nazila Gol Mohammadi"}},"title":"Trustworthy Cyber-Physical Systems - A Systematic Framework towards Design and Evaluation of Trust and Trustworthiness","pages":"1-320","publisher":"Springer Vieweg","year":"2019","type":"Books and Theses","access":"closed","key":"books/sp/Mohammadi19","doi":"10.1007/978-3-658-27488-7","ee":"https://doi.org/10.1007/978-3-658-27488-7","url":"https://dblp.org/rec/books/sp/Mohammadi19"}, "url":"URL#1937393" }, { "@score":"2", "@id":"1939054", "info":{"authors":{"author":{"@pid":"57/9995","text":"Robert Dietrich"}},"title":"Scalable Applications on Heterogeneous System Architectures: A Systematic Performance Analysis Framework.","year":"2019","type":"Books and Theses","access":"closed","key":"phd/dnb/Dietrich19a","ee":"https://nbn-resolving.org/urn:nbn:de:bsz:14-qucosa2-361678","url":"https://dblp.org/rec/phd/dnb/Dietrich19a"}, "url":"URL#1939054" }, { "@score":"2", "@id":"1954019", "info":{"authors":{"author":[{"@pid":"143/4186","text":"Guruh Fajar Shidik"},{"@pid":"83/10131","text":"Edi Noersasongko"},{"@pid":"255/0361","text":"Adhitya Nugraha"},{"@pid":"211/1707","text":"Pulung Nurtantio Andono"},{"@pid":"254/4756","text":"Jumanto Jumanto"},{"@pid":"255/0629","text":"Edi Jaya Kusuma"}]},"title":"A Systematic Review of Intelligence Video Surveillance: Trends, Techniques, Frameworks, and Datasets.","venue":"IEEE Access","volume":"7","pages":"170457-170473","year":"2019","type":"Journal Articles","access":"open","key":"journals/access/ShidikNNAJK19","doi":"10.1109/ACCESS.2019.2955387","ee":"https://doi.org/10.1109/ACCESS.2019.2955387","url":"https://dblp.org/rec/journals/access/ShidikNNAJK19"}, "url":"URL#1954019" }, { "@score":"2", "@id":"1961774", "info":{"authors":{"author":[{"@pid":"200/1668","text":"Hussain M. Aljaroodi"},{"@pid":"91/10115","text":"Marc T. P. Adam"},{"@pid":"41/4654","text":"Raymond Chiong"},{"@pid":"128/0078","text":"Timm Teubner"}]},"title":"Avatars and Embodied Agents in Experimental Information Systems Research: A Systematic Review and Conceptual Framework.","venue":"Australas. J. Inf. Syst.","volume":"23","year":"2019","type":"Journal Articles","access":"closed","key":"journals/ajis/AljaroodiACT19","doi":"10.3127/AJIS.V23I0.1841","ee":"https://doi.org/10.3127/ajis.v23i0.1841","url":"https://dblp.org/rec/journals/ajis/AljaroodiACT19"}, "url":"URL#1961774" }, { "@score":"2", "@id":"1970147", "info":{"authors":{"author":{"@pid":"260/8093","text":"Andrea Vaccaro"}},"title":"C*-algebras and the Uncountable: A Systematic Study of the Combinatorics of the Uncountable in the Noncommutative Framework.","venue":"Bull. Symb. Log.","volume":"25","number":"4","pages":"448-449","year":"2019","type":"Journal Articles","access":"closed","key":"journals/bsl/Vaccaro19","doi":"10.1017/BSL.2019.35","ee":"https://doi.org/10.1017/bsl.2019.35","url":"https://dblp.org/rec/journals/bsl/Vaccaro19"}, "url":"URL#1970147" }, { "@score":"2", "@id":"1973559", "info":{"authors":{"author":[{"@pid":"54/9058","text":"Tiago J. Rato"},{"@pid":"78/8803","text":"Marco S. Reis"}]},"title":"SS-DAC: A systematic framework for selecting the best modeling approach and pre-processing for spectroscopic data.","venue":"Comput. Chem. Eng.","volume":"128","pages":"437-449","year":"2019","type":"Journal Articles","access":"closed","key":"journals/cce/RatoR19","doi":"10.1016/J.COMPCHEMENG.2019.05.036","ee":"https://doi.org/10.1016/j.compchemeng.2019.05.036","url":"https://dblp.org/rec/journals/cce/RatoR19"}, "url":"URL#1973559" }, { "@score":"2", "@id":"1991811", "info":{"authors":{"author":[{"@pid":"247/7481","text":"Jamie McGann"},{"@pid":"143/8836","text":"Johann Issartel"},{"@pid":"15/1071","text":"Lucy Hederman"},{"@pid":"70/1905","text":"Owen Conlan"}]},"title":"PaCMAn: A 'principled' framework, arising from a systematic review of the literature, to underpin design and deployment of video games for motor skill acquisition.","venue":"Entertain. Comput.","volume":"31","year":"2019","type":"Journal Articles","access":"closed","key":"journals/entcom/McGannIHC19","doi":"10.1016/J.ENTCOM.2019.100310","ee":"https://doi.org/10.1016/j.entcom.2019.100310","url":"https://dblp.org/rec/journals/entcom/McGannIHC19"}, "url":"URL#1991811" }, { "@score":"2", "@id":"1995220", "info":{"authors":{"author":[{"@pid":"61/1466","text":"Jeffrey S. Saltz"},{"@pid":"214/8054","text":"Neil I. Dewar"}]},"title":"Data science ethical considerations: a systematic literature review and proposed project framework.","venue":"Ethics Inf. Technol.","volume":"21","number":"3","pages":"197-208","year":"2019","type":"Journal Articles","access":"closed","key":"journals/ethicsit/SaltzD19","doi":"10.1007/S10676-019-09502-5","ee":"https://doi.org/10.1007/s10676-019-09502-5","url":"https://dblp.org/rec/journals/ethicsit/SaltzD19"}, "url":"URL#1995220" }, { "@score":"2", "@id":"2012431", "info":{"authors":{"author":[{"@pid":"253/0049","text":"Zahra Zandesh"},{"@pid":"195/9370","text":"Marjan Ghazi Saeedi"},{"@pid":"41/3022","text":"Murthy V. Devarakonda"},{"@pid":"02/4828","text":"Mohammad Sayad Haghighi"}]},"title":"Legal framework for health cloud: A systematic review.","venue":"Int. J. Medical Informatics","volume":"132","year":"2019","type":"Journal Articles","access":"closed","key":"journals/ijmi/ZandeshSDH19","doi":"10.1016/J.IJMEDINF.2019.103953","ee":"https://doi.org/10.1016/j.ijmedinf.2019.103953","url":"https://dblp.org/rec/journals/ijmi/ZandeshSDH19"}, "url":"URL#2012431" }, { "@score":"2", "@id":"2019406", "info":{"authors":{"author":[{"@pid":"133/4914","text":"Mohab Aly"},{"@pid":"32/147","text":"Foutse Khomh"},{"@pid":"141/7826","text":"Mohammed Haoues"},{"@pid":"73/5806","text":"Alejandro Quintero"},{"@pid":"21/9101","text":"Soumaya Yacout"}]},"title":"Enforcing security in Internet of Things frameworks: A Systematic Literature Review.","venue":"Internet Things","volume":"6","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iot/AlyKHQY19","doi":"10.1016/J.IOT.2019.100050","ee":"https://doi.org/10.1016/j.iot.2019.100050","url":"https://dblp.org/rec/journals/iot/AlyKHQY19"}, "url":"URL#2019406" }, { "@score":"2", "@id":"2021051", "info":{"authors":{"author":[{"@pid":"192/8848","text":"Vincent Reniers"},{"@pid":"20/6363","text":"Dimitri Van Landuyt"},{"@pid":"148/4512","text":"Ansar Rafique"},{"@pid":"13/86","text":"Wouter Joosen"}]},"title":"Object to NoSQL Database Mappers (ONDM): A systematic survey and comparison of frameworks.","venue":"Inf. Syst.","volume":"85","pages":"1-20","year":"2019","type":"Journal Articles","access":"closed","key":"journals/is/ReniersLRJ19","doi":"10.1016/J.IS.2019.05.001","ee":"https://doi.org/10.1016/j.is.2019.05.001","url":"https://dblp.org/rec/journals/is/ReniersLRJ19"}, "url":"URL#2021051" }, { "@score":"2", "@id":"2025129", "info":{"authors":{"author":[{"@pid":"01/7315","text":"Pierre Pluye"},{"@pid":"224/3180","text":"Reem El Sherif"},{"@pid":"22/10356","text":"Vera Granikov"},{"@pid":"233/0487","text":"Quan Nha Hong"},{"@pid":"83/9206","text":"Isabelle Vedel"},{"@pid":"231/3808","text":"Maria Cristiane Barbosa Galvão"},{"@pid":"242/8870","text":"Francesca E. Y. Frati"},{"@pid":"242/9376","text":"Sophie Desroches"},{"@pid":"124/5529","text":"Carol Repchinsky"},{"@pid":"242/8946","text":"Benoît Rihoux"},{"@pid":"98/11085","text":"France Légaré"},{"@pid":"242/9367","text":"Bernard Burnand"},{"@pid":"233/0071","text":"Mathieu Bujold"},{"@pid":"16/7315","text":"Roland M. Grad"}]},"title":"Health outcomes of online consumer health information: A systematic mixed studies review with framework synthesis.","venue":"J. Assoc. Inf. Sci. Technol.","volume":"70","number":"7","pages":"643-659","year":"2019","type":"Journal Articles","access":"open","key":"journals/jasis/PluyeSGHVGFDRRL19","doi":"10.1002/ASI.24178","ee":"https://doi.org/10.1002/asi.24178","url":"https://dblp.org/rec/journals/jasis/PluyeSGHVGFDRRL19"}, "url":"URL#2025129" }, { "@score":"2", "@id":"2025685", "info":{"authors":{"author":[{"@pid":"49/3771","text":"Melanie C. Wright"},{"@pid":"44/7337","text":"Damian Borbolla"},{"@pid":"200/4663","text":"Rosalie G. Waller"},{"@pid":"37/1820","text":"Guilherme Del Fiol"},{"@pid":"205/9935","text":"Thomas J. Reese"},{"@pid":"205/9933","text":"Paige Nesbitt"},{"@pid":"50/2705","text":"Noa Segall"}]},"title":"Critical care information display approaches and design frameworks: A systematic review and meta-analysis.","venue":"J. Biomed. Informatics X","volume":"3","pages":"100041","year":"2019","type":"Journal Articles","access":"open","key":"journals/jbix/WrightBWFRNS19","doi":"10.1016/J.YJBINX.2019.100041","ee":"https://doi.org/10.1016/j.yjbinx.2019.100041","url":"https://dblp.org/rec/journals/jbix/WrightBWFRNS19"}, "url":"URL#2025685" }, { "@score":"2", "@id":"2036074", "info":{"authors":{"author":[{"@pid":"231/5089","text":"Weijie Han"},{"@pid":"52/7663","text":"Jingfeng Xue"},{"@pid":"84/2694-10","text":"Yong Wang 0010"},{"@pid":"162/0920","text":"Zhenyan Liu"},{"@pid":"231/5031","text":"Zixiao Kong"}]},"title":"MalInsight: A systematic profiling based malware detection framework.","venue":"J. Netw. Comput. Appl.","volume":"125","pages":"236-250","year":"2019","type":"Journal Articles","access":"open","key":"journals/jnca/HanXWLK19","doi":"10.1016/J.JNCA.2018.10.022","ee":"https://doi.org/10.1016/j.jnca.2018.10.022","url":"https://dblp.org/rec/journals/jnca/HanXWLK19"}, "url":"URL#2036074" }, { "@score":"2", "@id":"2054423", "info":{"authors":{"author":{"@pid":"245/4066","text":"Frank a Campo"}},"title":"A Framework for the Systematic Determination of the Posets on n Points with at Least τ ⋅ 2 n Downsets.","venue":"Order","volume":"36","number":"2","pages":"119-157","year":"2019","type":"Journal Articles","access":"closed","key":"journals/order/Campo19","doi":"10.1007/S11083-018-9459-2","ee":"https://doi.org/10.1007/s11083-018-9459-2","url":"https://dblp.org/rec/journals/order/Campo19"}, "url":"URL#2054423" }, { "@score":"2", "@id":"2070582", "info":{"authors":{"author":[{"@pid":"221/3914","text":"Han Shi"},{"@pid":"25/1145-2","text":"Hai Zhao 0002"},{"@pid":"51/3710","text":"Yang Liu"},{"@pid":"28/2073","text":"Wei Gao"},{"@pid":"162/2020","text":"Shengchang Dou"}]},"title":"Systematic Analysis of a Military Wearable Device Based on a Multi-Level Fusion Framework: Research Directions.","venue":"Sensors","volume":"19","number":"12","pages":"2651","year":"2019","type":"Journal Articles","access":"open","key":"journals/sensors/ShiZLGD19","doi":"10.3390/S19122651","ee":"https://doi.org/10.3390/s19122651","url":"https://dblp.org/rec/journals/sensors/ShiZLGD19"}, "url":"URL#2070582" }, { "@score":"2", "@id":"2076774", "info":{"authors":{"author":[{"@pid":"166/5498","text":"Sebastian Steinau"},{"@pid":"17/1681","text":"Andrea Marrella"},{"@pid":"166/5519","text":"Kevin Andrews"},{"@pid":"21/10229","text":"Francesco Leotta"},{"@pid":"42/2448","text":"Massimo Mecella"},{"@pid":"r/ManfredReichert","text":"Manfred Reichert"}]},"title":"DALEC: a framework for the systematic evaluation of data-centric approaches to process management software.","venue":"Softw. Syst. Model.","volume":"18","number":"4","pages":"2679-2716","year":"2019","type":"Journal Articles","access":"open","key":"journals/sosym/SteinauMALMR19","doi":"10.1007/S10270-018-0695-0","ee":"https://doi.org/10.1007/s10270-018-0695-0","url":"https://dblp.org/rec/journals/sosym/SteinauMALMR19"}, "url":"URL#2076774" }, { "@score":"2", "@id":"2123975", "info":{"authors":{"author":[{"@pid":"258/4717","text":"Gaocai Dong"},{"@pid":"13/4682-16","text":"Ping Zhang 0016"},{"@pid":"182/7191","text":"Jingya Yang"},{"@pid":"02/621","text":"Dongdong Zhang"},{"@pid":"05/4333","text":"Jing Peng"}]},"title":"A Systematic Framework for Drug Repurposing based on Literature Mining.","venue":"BIBM","pages":"939-942","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/bibm/DongZYZP19","doi":"10.1109/BIBM47256.2019.8983320","ee":"https://doi.org/10.1109/BIBM47256.2019.8983320","url":"https://dblp.org/rec/conf/bibm/DongZYZP19"}, "url":"URL#2123975" }, { "@score":"2", "@id":"2126745", "info":{"authors":{"author":[{"@pid":"243/0980","text":"Shubhaditya Goswami"},{"@pid":"243/0994","text":"Sukanya Pal"},{"@pid":"227/8365","text":"Simon Goldsworthy"},{"@pid":"11/7631","text":"Tanmay Basu"}]},"title":"An Effective Machine Learning Framework for Data Elements Extraction from the Literature of Anxiety Outcome Measures to Build Systematic Review.","venue":"BIS","pages":"247-258","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/bis/GoswamiPGB19","doi":"10.1007/978-3-030-20485-3_19","ee":"https://doi.org/10.1007/978-3-030-20485-3_19","url":"https://dblp.org/rec/conf/bis/GoswamiPGB19"}, "url":"URL#2126745" }, { "@score":"2", "@id":"2153213", "info":{"authors":{"author":[{"@pid":"367/7444","text":"David Otoo-Arthur"},{"@pid":"367/7422","text":"Terence Van Zyl"}]},"title":"A Systematic Review on Big Data Analytics Frameworks for Higher Education - Tools and Algorithms.","venue":"EBIMCS","pages":"15:1-15:9","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/ebimcs/Otoo-ArthurZ19","doi":"10.1145/3377817.3377836","ee":"https://doi.org/10.1145/3377817.3377836","url":"https://dblp.org/rec/conf/ebimcs/Otoo-ArthurZ19"}, "url":"URL#2153213" }, { "@score":"2", "@id":"2173627", "info":{"authors":{"author":[{"@pid":"238/5186","text":"Safa Yousif Ahmed"},{"@pid":"118/9984","text":"Hossana Twinomurinzi"}]},"title":"Exploring Semantic Interoperability in e-Government Interoperability Frameworks for intra-African collaboration: A Systematic Literature Review.","venue":"HICSS","pages":"1-8","year":"2019","type":"Conference and Workshop Papers","access":"open","key":"conf/hicss/AhmedT19","ee":"https://hdl.handle.net/10125/59754","url":"https://dblp.org/rec/conf/hicss/AhmedT19"}, "url":"URL#2173627" }, { "@score":"2", "@id":"2205536", "info":{"authors":{"author":[{"@pid":"226/6335","text":"Pavlos Triantafyllou"},{"@pid":"180/0404","text":"Hussein Mnyusiwalla"},{"@pid":"155/1219","text":"Panagiotis Sotiropoulos"},{"@pid":"72/4716","text":"Máximo A. Roa"},{"@pid":"79/318","text":"Duncan Russell"},{"@pid":"43/535","text":"Graham E. Deacon"}]},"title":"A Benchmarking Framework for Systematic Evaluation of Robotic Pick-and-Place Systems in an Industrial Grocery Setting.","venue":"ICRA","pages":"6692-6698","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/icra/TriantafyllouMS19","doi":"10.1109/ICRA.2019.8793993","ee":"https://doi.org/10.1109/ICRA.2019.8793993","url":"https://dblp.org/rec/conf/icra/TriantafyllouMS19"}, "url":"URL#2205536" }, { "@score":"2", "@id":"2206621", "info":{"authors":{"author":[{"@pid":"162/5593","text":"David Ke Hong"},{"@pid":"42/11518","text":"Ashkan Nikravesh"},{"@pid":"91/584","text":"Z. Morley Mao"},{"@pid":"80/6049","text":"Mahesh Ketkar"},{"@pid":"04/5731","text":"Michael Kishinevsky"}]},"title":"PerfProbe: a systematic, cross-layer performance diagnosis framework for mobile platforms.","venue":"MOBILESoft@ICSE","pages":"50-61","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/icse/HongNMKK19","doi":"10.1109/MOBILESOFT.2019.00018","ee":"https://doi.org/10.1109/MOBILESoft.2019.00018","url":"https://dblp.org/rec/conf/icse/HongNMKK19"}, "url":"URL#2206621" }, { "@score":"2", "@id":"2211048", "info":{"authors":{"author":[{"@pid":"15/10738","text":"Dian He"},{"@pid":"87/3166","text":"Ying Liang"},{"@pid":"82/6624-4","text":"Xiaolong Li 0004"},{"@pid":"64/424","text":"Yao Liu"},{"@pid":"253/8072","text":"Jianglian Liu"}]},"title":"Systematic Framework of the All-for-One Tourism Digital Ecosystem.","venue":"ICPCSEE","pages":"110-119","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/icycsee/HeLLLL19","doi":"10.1007/978-981-15-0121-0_8","ee":"https://doi.org/10.1007/978-981-15-0121-0_8","url":"https://dblp.org/rec/conf/icycsee/HeLLLL19"}, "url":"URL#2211048" }, { "@score":"2", "@id":"2236364", "info":{"authors":{"author":[{"@pid":"254/6540","text":"Demin Nalic"},{"@pid":"183/3628","text":"Arno Eichberger"},{"@pid":"254/6543","text":"Georg Hanzl"},{"@pid":"120/0696","text":"Martin Fellendorf"},{"@pid":"254/6372","text":"Branko Rogic"}]},"title":"Development of a Co-Simulation Framework for Systematic Generation of Scenarios for Testing and Validation of Automated Driving Systems.","venue":"ITSC","pages":"1895-1901","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/itsc/NalicEHFR19","doi":"10.1109/ITSC.2019.8916839","ee":"https://doi.org/10.1109/ITSC.2019.8916839","url":"https://dblp.org/rec/conf/itsc/NalicEHFR19"}, "url":"URL#2236364" }, { "@score":"2", "@id":"2252808", "info":{"authors":{"author":[{"@pid":"76/3473-4","text":"Cheng Feng 0004"},{"@pid":"176/9981","text":"Venkata Reddy Palleti"},{"@pid":"m/AdityaPMathur","text":"Aditya Mathur"},{"@pid":"205/3763","text":"Deeph Chana"}]},"title":"A Systematic Framework to Generate Invariants for Anomaly Detection in Industrial Control Systems.","venue":"NDSS","year":"2019","type":"Conference and Workshop Papers","access":"open","key":"conf/ndss/0004PMC19","ee":"https://www.ndss-symposium.org/ndss-paper/a-systematic-framework-to-generate-invariants-for-anomaly-detection-in-industrial-control-systems/","url":"https://dblp.org/rec/conf/ndss/0004PMC19"}, "url":"URL#2252808" }, { "@score":"2", "@id":"2267938", "info":{"authors":{"author":[{"@pid":"18/3112","text":"Ricardo Gacitúa"},{"@pid":"13/7706","text":"Mauricio Diéguez"},{"@pid":"139/7423","text":"Jaime Díaz"},{"@pid":"00/7707","text":"Samuel Sepúlveda"}]},"title":"A flexible and systematic teaching framework to develop cognitive skills through programming courses.","venue":"SCCC","pages":"1-8","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/sccc/GacituaDDS19","doi":"10.1109/SCCC49216.2019.8966409","ee":"https://doi.org/10.1109/SCCC49216.2019.8966409","url":"https://dblp.org/rec/conf/sccc/GacituaDDS19"}, "url":"URL#2267938" }, { "@score":"2", "@id":"2270223", "info":{"authors":{"author":[{"@pid":"54/1216","text":"Yu Song"},{"@pid":"81/6701","text":"Tianyong Hao"},{"@pid":"224/5455","text":"Zhinan Liu"},{"@pid":"240/2815","text":"Zixin Lan"}]},"title":"A Systematic Review of Frameworks for Coding Towards Classroom Dialogue.","venue":"SETE@ICWL","pages":"226-236","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/sete/SongHLL19","doi":"10.1007/978-3-030-38778-5_25","ee":"https://doi.org/10.1007/978-3-030-38778-5_25","url":"https://dblp.org/rec/conf/sete/SongHLL19"}, "url":"URL#2270223" }, { "@score":"2", "@id":"2320216", "info":{"authors":{"author":[{"@pid":"159/3628","text":"Vaishaal Shankar"},{"@pid":"156/1161","text":"Achal Dave"},{"@pid":"145/2224","text":"Rebecca Roelofs"},{"@pid":"49/488","text":"Deva Ramanan"},{"@pid":"r/BenRecht","text":"Benjamin Recht"},{"@pid":"141/2720","text":"Ludwig Schmidt"}]},"title":"A systematic framework for natural perturbations from videos.","venue":"CoRR","volume":"abs/1906.02168","year":"2019","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1906-02168","ee":"http://arxiv.org/abs/1906.02168","url":"https://dblp.org/rec/journals/corr/abs-1906-02168"}, "url":"URL#2320216" }, { "@score":"2", "@id":"2321917", "info":{"authors":{"author":[{"@pid":"192/1237","text":"Stefanos Leonardos"},{"@pid":"35/8864","text":"Daniël Reijsbergen"},{"@pid":"62/1236","text":"Georgios Piliouras"}]},"title":"PREStO: A Systematic Framework for Blockchain Consensus Protocols.","venue":"CoRR","volume":"abs/1906.06540","year":"2019","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1906-06540","ee":"http://arxiv.org/abs/1906.06540","url":"https://dblp.org/rec/journals/corr/abs-1906-06540"}, "url":"URL#2321917" }, { "@score":"2", "@id":"2348554", "info":{"authors":{"author":[{"@pid":"255/1270","text":"Bryar A. Hassan"},{"@pid":"70/555","text":"Tarik A. Rashid"}]},"title":"Operational Framework for Recent Advances in Backtracking Search Optimisation Algorithm: A Systematic Review and Performance Evaluation.","venue":"CoRR","volume":"abs/1911.13011","year":"2019","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1911-13011","ee":"http://arxiv.org/abs/1911.13011","url":"https://dblp.org/rec/journals/corr/abs-1911-13011"}, "url":"URL#2348554" }, { "@score":"2", "@id":"2350466", "info":{"authors":{"author":[{"@pid":"201/9826","text":"Kacper Sokol"},{"@pid":"f/PeterAFlach","text":"Peter A. Flach"}]},"title":"Explainability Fact Sheets: A Framework for Systematic Assessment of Explainable Approaches.","venue":"CoRR","volume":"abs/1912.05100","year":"2019","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1912-05100","ee":"http://arxiv.org/abs/1912.05100","url":"https://dblp.org/rec/journals/corr/abs-1912-05100"}, "url":"URL#2350466" }, { "@score":"2", "@id":"2358854", "info":{"authors":{"author":{"@pid":"205/8625","text":"Malte Thiede"}},"title":"Bibliometric snowballing: a framework for a backward and forward search for systematic literature reviews.","pages":"1-147","year":"2018","type":"Books and Theses","access":"unavailable","key":"phd/dnb/Thiede18","ee":"https://d-nb.info/1156350212","url":"https://dblp.org/rec/phd/dnb/Thiede18"}, "url":"URL#2358854" }, { "@score":"2", "@id":"2362541", "info":{"authors":{"author":{"@pid":"318/2604","text":"Ying Fei Li"}},"title":"A Systematic Framework to Optimize and Control Monoclonal Antibody Manufacturing Process.","year":"2018","type":"Books and Theses","access":"closed","key":"phd/us/Li18a","doi":"10.7916/D8GX5TJP","ee":"https://doi.org/10.7916/D8GX5TJP","url":"https://dblp.org/rec/phd/us/Li18a"}, "url":"URL#2362541" }, { "@score":"2", "@id":"2385515", "info":{"authors":{"author":{"@pid":"125/9623","text":"Qian Yao"}},"title":"A systematic framework to understand central bank digital currency.","venue":"Sci. China Inf. Sci.","volume":"61","number":"3","pages":"033101:1-033101:8","year":"2018","type":"Journal Articles","access":"closed","key":"journals/chinaf/Yao18","doi":"10.1007/S11432-017-9294-5","ee":"https://doi.org/10.1007/s11432-017-9294-5","url":"https://dblp.org/rec/journals/chinaf/Yao18"}, "url":"URL#2385515" }, { "@score":"2", "@id":"2402361", "info":{"authors":{"author":[{"@pid":"166/9297","text":"Hafiz Alaka"},{"@pid":"137/1700","text":"Lukumon O. Oyedele"},{"@pid":"166/9342","text":"Hakeem Owolabi"},{"@pid":"21/1587-1","text":"Vikas Kumar 0001"},{"@pid":"166/9365","text":"Saheed Ajayi"},{"@pid":"151/5576","text":"Olúgbénga O. Akinadé"},{"@pid":"60/2550-5","text":"Muhammad Bilal 0005"}]},"title":"Systematic review of bankruptcy prediction models: Towards a framework for tool selection.","venue":"Expert Syst. Appl.","volume":"94","pages":"164-184","year":"2018","type":"Journal Articles","access":"closed","key":"journals/eswa/AlakaOOKAAB18","doi":"10.1016/J.ESWA.2017.10.040","ee":"https://doi.org/10.1016/j.eswa.2017.10.040","url":"https://dblp.org/rec/journals/eswa/AlakaOOKAAB18"}, "url":"URL#2402361" }, { "@score":"2", "@id":"2411632", "info":{"authors":{"author":[{"@pid":"233/6399","text":"Ceren Ocal Tasar"},{"@pid":"118/0956","text":"Murat Komesli"},{"@pid":"48/5039","text":"Murat Osman Ünalir"}]},"title":"Systematic mapping study on question answering frameworks over linked data.","venue":"IET Softw.","volume":"12","number":"6","pages":"461-472","year":"2018","type":"Journal Articles","access":"open","key":"journals/iet-sen/TasarKU18","doi":"10.1049/IET-SEN.2018.5105","ee":"https://doi.org/10.1049/iet-sen.2018.5105","url":"https://dblp.org/rec/journals/iet-sen/TasarKU18"}, "url":"URL#2411632" }, { "@score":"2", "@id":"2411839", "info":{"authors":{"author":[{"@pid":"57/2605","text":"Minghui Zheng"},{"@pid":"03/4774","text":"Fu Zhang"},{"@pid":"06/4676-12","text":"Xiao Liang 0012"}]},"title":"A systematic design framework for iterative learning control with current feedback.","venue":"IFAC J. Syst. Control.","volume":"5","pages":"1-10","year":"2018","type":"Journal Articles","access":"closed","key":"journals/ifacjsc/ZhengZL18","doi":"10.1016/J.IFACSC.2018.06.001","ee":"https://doi.org/10.1016/j.ifacsc.2018.06.001","url":"https://dblp.org/rec/journals/ifacjsc/ZhengZL18"}, "url":"URL#2411839" }, { "@score":"2", "@id":"2425718", "info":{"authors":{"author":[{"@pid":"37/10608","text":"Nauman Bin Ali"},{"@pid":"20/241-2","text":"Muhammad Usman 0002"}]},"title":"Reliability of search in systematic reviews: Towards a quality assessment framework for the automated-search strategy.","venue":"Inf. Softw. Technol.","volume":"99","pages":"133-147","year":"2018","type":"Journal Articles","access":"closed","key":"journals/infsof/AliU18","doi":"10.1016/J.INFSOF.2018.02.002","ee":"https://doi.org/10.1016/j.infsof.2018.02.002","url":"https://dblp.org/rec/journals/infsof/AliU18"}, "url":"URL#2425718" }, { "@score":"2", "@id":"2450748", "info":{"authors":{"author":[{"@pid":"230/0524","text":"Amy O'Donnell"},{"@pid":"128/0182","text":"Eileen Kaner"},{"@pid":"230/0577","text":"Caroline Shaw"},{"@pid":"230/0457","text":"Catherine Haighton"}]},"title":"Primary care physicians' attitudes to the adoption of electronic medical records: a systematic review and evidence synthesis using the clinical adoption framework.","venue":"BMC Medical Informatics Decis. Mak.","volume":"18","number":"1","pages":"101:1-101:16","year":"2018","type":"Journal Articles","access":"open","key":"journals/midm/ODonnellKSH18","doi":"10.1186/S12911-018-0703-X","ee":"https://doi.org/10.1186/s12911-018-0703-x","url":"https://dblp.org/rec/journals/midm/ODonnellKSH18"}, "url":"URL#2450748" }, { "@score":"2", "@id":"2467154", "info":{"authors":{"author":[{"@pid":"19/10337","text":"Huai Su"},{"@pid":"87/1185","text":"Enrico Zio"},{"@pid":"212/0290","text":"Jinjun Zhang"},{"@pid":"85/5921","text":"Xueyi Li"}]},"title":"A systematic framework of vulnerability analysis of a natural gas pipeline network.","venue":"Reliab. Eng. Syst. Saf.","volume":"175","pages":"79-91","year":"2018","type":"Journal Articles","access":"closed","key":"journals/ress/SuZZL18","doi":"10.1016/J.RESS.2018.03.006","ee":"https://doi.org/10.1016/j.ress.2018.03.006","url":"https://dblp.org/rec/journals/ress/SuZZL18"}, "url":"URL#2467154" }, { "@score":"3", "@id":"2481425", "info":{"authors":{"author":[{"@pid":"27/2136","text":"David Rousseau"},{"@pid":"227/9735","text":"Julie Billingham"}]},"title":"A Systematic Framework for Exploring Worldviews and Its Generalization as a Multi-Purpose Inquiry Framework.","venue":"Syst.","volume":"6","number":"3","pages":"27","year":"2018","type":"Journal Articles","access":"open","key":"journals/systems/RousseauB18","doi":"10.3390/SYSTEMS6030027","ee":"https://doi.org/10.3390/systems6030027","url":"https://dblp.org/rec/journals/systems/RousseauB18"}, "url":"URL#2481425" }, { "@score":"2", "@id":"2511602", "info":{"authors":{"author":[{"@pid":"173/0709","text":"Alessia Antelmi"},{"@pid":"57/2979","text":"Josephine Griffith"},{"@pid":"174/4708","text":"Karen Young"}]},"title":"Towards a More Systematic Analysis of Twitter Data: A Framework for the Analysis of Twitter Communities.","venue":"AICS","pages":"303-314","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/aics/AntelmiGY18","ee":"https://ceur-ws.org/Vol-2259/aics_28.pdf","url":"https://dblp.org/rec/conf/aics/AntelmiGY18"}, "url":"URL#2511602" }, { "@score":"2", "@id":"2521610", "info":{"authors":{"author":[{"@pid":"231/6087","text":"Mst. Shamima Khatun"},{"@pid":"96/29-2","text":"Md. Mehedi Hasan 0002"},{"@pid":"96/4301","text":"Md. Nurul Haque Mollah"},{"@pid":"64/3014","text":"Hiroyuki Kurata"}]},"title":"SIPMA: A Systematic Identification of Protein-Protein Interactions in Zea mays Using Autocorrelation Features in a Machine-Learning Framework.","venue":"BIBE","pages":"122-125","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/bibe/KhatunHMK18","doi":"10.1109/BIBE.2018.00030","ee":"https://doi.org/10.1109/BIBE.2018.00030","url":"https://dblp.org/rec/conf/bibe/KhatunHMK18"}, "url":"URL#2521610" }, { "@score":"2", "@id":"2534361", "info":{"authors":{"author":[{"@pid":"232/8662","text":"Zahidah Zulkifli"},{"@pid":"204/1328-1","text":"Ely Salwana Mat Surin"},{"@pid":"97/9032","text":"Abdul Wahab Abdul Rahman"}]},"title":"The Effectiveness of Development Skills Plan Framework for Learning Disabilities Children: A Systematic Literature Review.","venue":"CIST","pages":"1-5","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/cist/ZulkifliSR18","doi":"10.1109/CIST.2018.8596327","ee":"https://doi.org/10.1109/CIST.2018.8596327","url":"https://dblp.org/rec/conf/cist/ZulkifliSR18"}, "url":"URL#2534361" }, { "@score":"2", "@id":"2535111", "info":{"authors":{"author":[{"@pid":"185/7103","text":"Ibrahim El-Shekeil"},{"@pid":"59/7987","text":"Amitangshu Pal"},{"@pid":"25/2574-1","text":"Krishna Kant 0001"}]},"title":"CloudMiner: A Systematic Failure Diagnosis Framework in Enterprise Cloud Environments.","venue":"CloudCom","pages":"73-80","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/cloudcom/El-ShekeilPK18","doi":"10.1109/CLOUDCOM2018.2018.00028","ee":"https://doi.org/10.1109/CloudCom2018.2018.00028","url":"https://dblp.org/rec/conf/cloudcom/El-ShekeilPK18"}, "url":"URL#2535111" }, { "@score":"2", "@id":"2549293", "info":{"authors":{"author":[{"@pid":"181/7386","text":"Tianyun Zhang"},{"@pid":"215/4368","text":"Shaokai Ye"},{"@pid":"178/4486-3","text":"Kaiqi Zhang 0003"},{"@pid":"181/2667-8","text":"Jian Tang 0008"},{"@pid":"70/11466","text":"Wujie Wen"},{"@pid":"36/6214","text":"Makan Fardad"},{"@pid":"45/7737","text":"Yanzhi Wang"}]},"title":"A Systematic DNN Weight Pruning Framework Using Alternating Direction Method of Multipliers.","venue":"ECCV","pages":"191-207","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/eccv/ZhangYZTWFW18","doi":"10.1007/978-3-030-01237-3_12","ee":"https://doi.org/10.1007/978-3-030-01237-3_12","url":"https://dblp.org/rec/conf/eccv/ZhangYZTWFW18"}, "url":"URL#2549293" }, { "@score":"2", "@id":"2550712", "info":{"authors":{"author":[{"@pid":"93/7215","text":"Yi-Shan Tsai"},{"@pid":"24/7424","text":"Maren Scheffel"},{"@pid":"67/5716","text":"Dragan Gasevic"}]},"title":"Enabling Systematic Adoption of Learning Analytics through a Policy Framework.","venue":"EC-TEL","pages":"556-560","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/ectel/TsaiSG18","doi":"10.1007/978-3-319-98572-5_44","ee":"https://doi.org/10.1007/978-3-319-98572-5_44","url":"https://dblp.org/rec/conf/ectel/TsaiSG18"}, "url":"URL#2550712" }, { "@score":"2", "@id":"2551939", "info":{"authors":{"author":[{"@pid":"210/9281","text":"Gustavo Almeida"},{"@pid":"20/5813","text":"Claudia Cappelli"},{"@pid":"62/5474","text":"Cristiano Maciel"},{"@pid":"224/9055","text":"Yamile Mahecha"}]},"title":"Co-production of Digital Services: Definitions, Frameworks, Cases and Evaluation Initiatives - Findings from a Systematic Literature Review.","venue":"EGOVIS","pages":"3-19","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/egovis/AlmeidaCMM18","doi":"10.1007/978-3-319-98349-3_1","ee":"https://doi.org/10.1007/978-3-319-98349-3_1","url":"https://dblp.org/rec/conf/egovis/AlmeidaCMM18"}, "url":"URL#2551939" }, { "@score":"2", "@id":"2557863", "info":{"authors":{"author":[{"@pid":"11/3119-1","text":"Pedro Fonseca 0001"},{"@pid":"08/5760-5","text":"Xi Wang 0005"},{"@pid":"k/AKrishnamurthy","text":"Arvind Krishnamurthy"}]},"title":"MultiNyx: a multi-level abstraction framework for systematic analysis of hypervisors.","venue":"EuroSys","pages":"23:1-23:12","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/eurosys/0001WK18","doi":"10.1145/3190508.3190529","ee":"https://doi.org/10.1145/3190508.3190529","url":"https://dblp.org/rec/conf/eurosys/0001WK18"}, "url":"URL#2557863" }, { "@score":"2", "@id":"2563683", "info":{"authors":{"author":[{"@pid":"236/7955","text":"Ece Erdogan"},{"@pid":"10/11240","text":"Somayeh Koohborfardhaghighi"}]},"title":"Delivering a Systematic Framework for the Selection and Evaluation of Startups.","venue":"GECON","pages":"151-159","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/gecon/ErdoganK18","doi":"10.1007/978-3-030-13342-9_13","ee":"https://doi.org/10.1007/978-3-030-13342-9_13","url":"https://dblp.org/rec/conf/gecon/ErdoganK18"}, "url":"URL#2563683" }, { "@score":"2", "@id":"2568985", "info":{"authors":{"author":[{"@pid":"33/2336","text":"Mladen Kezunovic"},{"@pid":"92/1944","text":"Zoran Obradovic"},{"@pid":"160/9552","text":"Tatjana Djokic"},{"@pid":"173/8541","text":"Shoumik Roychoudhury"}]},"title":"Systematic Framework for Integration of Weather Data into Prediction Models for the Electric Grid Outage and Asset Management Applications.","venue":"HICSS","pages":"1-10","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/hicss/KezunovicODR18","ee":"https://hdl.handle.net/10125/50234","url":"https://dblp.org/rec/conf/hicss/KezunovicODR18"}, "url":"URL#2568985" }, { "@score":"2", "@id":"2571111", "info":{"authors":{"author":[{"@pid":"76/5789","text":"Shuai Liu"},{"@pid":"66/4615-25","text":"Yong Zhang 0025"},{"@pid":"59/3349","text":"Lei Jin"},{"@pid":"49/7526","text":"Xiaojuan Wang"},{"@pid":"05/2978","text":"Mei Song"},{"@pid":"08/4955","text":"Da Guo"}]},"title":"A Systematic Framework for Malicious Traffic Detection Based on Feature Repository.","venue":"HCC","pages":"601-612","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/hucc/LiuZJWSG18","doi":"10.1007/978-3-030-15127-0_60","ee":"https://doi.org/10.1007/978-3-030-15127-0_60","url":"https://dblp.org/rec/conf/hucc/LiuZJWSG18"}, "url":"URL#2571111" }, { "@score":"2", "@id":"2571280", "info":{"authors":{"author":[{"@pid":"155/1219","text":"Panagiotis Sotiropoulos"},{"@pid":"72/4716","text":"Máximo A. Roa"},{"@pid":"65/8523","text":"Murilo F. Martins"},{"@pid":"54/8366","text":"Werner Friedl"},{"@pid":"180/0404","text":"Hussein Mnyusiwalla"},{"@pid":"226/6335","text":"Pavlos Triantafyllou"},{"@pid":"43/535","text":"Graham E. Deacon"}]},"title":"A Benchmarking Framework for Systematic Evaluation of Compliant Under-Actuated Soft End Effectors in an Industrial Context.","venue":"Humanoids","pages":"280-283","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/humanoids/SotiropoulosRMF18","doi":"10.1109/HUMANOIDS.2018.8624924","ee":"https://doi.org/10.1109/HUMANOIDS.2018.8624924","url":"https://dblp.org/rec/conf/humanoids/SotiropoulosRMF18"}, "url":"URL#2571280" }, { "@score":"2", "@id":"2591782", "info":{"authors":{"author":[{"@pid":"285/4055","text":"Omar Azouz"},{"@pid":"141/7252","text":"Youssef Lefdaoui"}]},"title":"Gamification design frameworks: a systematic mapping study.","venue":"ICMCS","pages":"1-9","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/icmcs2/AzouzL18","doi":"10.1109/ICMCS.2018.8525900","ee":"https://doi.org/10.1109/ICMCS.2018.8525900","url":"https://dblp.org/rec/conf/icmcs2/AzouzL18"}, "url":"URL#2591782" }, { "@score":"2", "@id":"2616888", "info":{"authors":{"author":[{"@pid":"272/8724","text":"Cristina Pinneri"},{"@pid":"47/2706","text":"Georg Martius"}]},"title":"Systematic self-exploration of behaviors for robots in a dynamical systems framework.","venue":"ALIFE","pages":"319-326","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/isalalife/PinneriM18","doi":"10.1162/ISAL_A_00062","ee":"https://doi.org/10.1162/isal_a_00062","url":"https://dblp.org/rec/conf/isalalife/PinneriM18"}, "url":"URL#2616888" }, { "@score":"2", "@id":"2650132", "info":{"authors":{"author":[{"@pid":"232/6658","text":"Matheus Marinho"},{"@pid":"232/6641","text":"Danilo Arruda"},{"@pid":"118/4045","text":"Fernando Wanderley"},{"@pid":"117/2937","text":"Anthony Lins"}]},"title":"A Systematic Approach of Dataset Definition for a Supervised Machine Learning Using NFR Framework.","venue":"QUATIC","pages":"110-118","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/quatic/MarinhoAWL18","doi":"10.1109/QUATIC.2018.00024","ee":"https://doi.org/10.1109/QUATIC.2018.00024","url":"https://dblp.org/rec/conf/quatic/MarinhoAWL18"}, "url":"URL#2650132" }, { "@score":"2", "@id":"2664490", "info":{"authors":{"author":[{"@pid":"26/9033","text":"Shafiq-Ur Rehman"},{"@pid":"g/VolkerGruhn","text":"Volker Gruhn"},{"@pid":"142/9327","text":"Saad Shafiq"},{"@pid":"131/6406","text":"Irum Inayat"}]},"title":"A Systematic Mapping Study on Security Requirements Engineering Frameworks for Cyber-Physical Systems.","venue":"SpaCCS","pages":"428-442","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/spaccs/RehmanGSI18","doi":"10.1007/978-3-030-05345-1_37","ee":"https://doi.org/10.1007/978-3-030-05345-1_37","url":"https://dblp.org/rec/conf/spaccs/RehmanGSI18"}, "url":"URL#2664490" }, { "@score":"2", "@id":"2666535", "info":{"authors":{"author":[{"@pid":"247/7242","text":"Yuliana Apaza"},{"@pid":"247/7160","text":"Richard Tumailla"},{"@pid":"247/7171","text":"Wilder Hancco"},{"@pid":"182/7016","text":"Alfredo Paz Valderrama"},{"@pid":"65/5766","text":"Carlo Corrales Delgado"},{"@pid":"37/5083","text":"Manuel E. Loaiza"}]},"title":"Systematic Mapping Study on High-Level Content Design Frameworks for Augmented Reality.","venue":"SVR","pages":"192-201","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/svr/ApazaTHVDL18","doi":"10.1109/SVR.2018.00037","ee":"https://doi.org/10.1109/SVR.2018.00037","url":"https://dblp.org/rec/conf/svr/ApazaTHVDL18"}, "url":"URL#2666535" }, { "@score":"2", "@id":"2677654", "info":{"authors":{"author":[{"@pid":"259/9202","text":"Vaishali S. Vairale"},{"@pid":"21/7661","text":"Samiksha Shukla"}]},"title":"Recommendation Framework for Diet and Exercise Based on Clinical Data: A Systematic Review.","venue":"WIR","pages":"333-346","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/wir/VairaleS18","doi":"10.1007/978-981-10-7641-1_29","ee":"https://doi.org/10.1007/978-981-10-7641-1_29","url":"https://dblp.org/rec/conf/wir/VairaleS18"}, "url":"URL#2677654" }, { "@score":"2", "@id":"2698201", "info":{"authors":{"author":[{"@pid":"181/7386","text":"Tianyun Zhang"},{"@pid":"215/4368","text":"Shaokai Ye"},{"@pid":"178/4486-3","text":"Kaiqi Zhang 0003"},{"@pid":"181/2667-8","text":"Jian Tang 0008"},{"@pid":"70/11466","text":"Wujie Wen"},{"@pid":"36/6214","text":"Makan Fardad"},{"@pid":"45/7737","text":"Yanzhi Wang"}]},"title":"A Systematic DNN Weight Pruning Framework using Alternating Direction Method of Multipliers.","venue":"CoRR","volume":"abs/1804.03294","year":"2018","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1804-03294","ee":"http://arxiv.org/abs/1804.03294","url":"https://dblp.org/rec/journals/corr/abs-1804-03294"}, "url":"URL#2698201" }, { "@score":"2", "@id":"2711188", "info":{"authors":{"author":[{"@pid":"181/7386","text":"Tianyun Zhang"},{"@pid":"178/4486-3","text":"Kaiqi Zhang 0003"},{"@pid":"215/4368","text":"Shaokai Ye"},{"@pid":"147/0314","text":"Jiayu Li"},{"@pid":"181/2667-8","text":"Jian Tang 0008"},{"@pid":"70/11466","text":"Wujie Wen"},{"@pid":"94/7236","text":"Xue Lin"},{"@pid":"36/6214","text":"Makan Fardad"},{"@pid":"45/7737","text":"Yanzhi Wang"}]},"title":"ADAM-ADMM: A Unified, Systematic Framework of Structured Weight Pruning for DNNs.","venue":"CoRR","volume":"abs/1807.11091","year":"2018","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1807-11091","ee":"http://arxiv.org/abs/1807.11091","url":"https://dblp.org/rec/journals/corr/abs-1807-11091"}, "url":"URL#2711188" }, { "@score":"2", "@id":"2720670", "info":{"authors":{"author":[{"@pid":"c/WeiChen13","text":"Wei Chen 0013"},{"@pid":"t/ShangHuaTeng","text":"Shang-Hua Teng"},{"@pid":"168/8847","text":"Hanrui Zhang"}]},"title":"A Systematic Framework and Characterization of Influence-Based Network Centrality.","venue":"CoRR","volume":"abs/1810.09981","year":"2018","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1810-09981","ee":"http://arxiv.org/abs/1810.09981","url":"https://dblp.org/rec/journals/corr/abs-1810-09981"}, "url":"URL#2720670" }, { "@score":"2", "@id":"2735295", "info":{"authors":{"author":{"@pid":"238/3792","text":"Ian Martin Kennedy"}},"title":"A framework for the systematic evaluation of malware forensic tools.","year":"2017","type":"Books and Theses","access":"closed","key":"phd/ethos/Kennedy17","ee":"https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.724863","url":"https://dblp.org/rec/phd/ethos/Kennedy17"}, "url":"URL#2735295" }, { "@score":"2", "@id":"2780403", "info":{"authors":{"author":[{"@pid":"50/5443","text":"Tatjana Jevsikova"},{"@pid":"243/6039","text":"Andrius Berniukevicius"},{"@pid":"85/6036","text":"Eugenijus Kurilovas"}]},"title":"Application of Resource Description Framework to Personalise Learning: Systematic Review and Methodology.","venue":"Informatics Educ.","volume":"16","number":"1","pages":"61-82","year":"2017","type":"Journal Articles","access":"open","key":"journals/iie/JevsikovaBK17","doi":"10.15388/INFEDU.2017.04","ee":"https://doi.org/10.15388/infedu.2017.04","url":"https://dblp.org/rec/journals/iie/JevsikovaBK17"}, "url":"URL#2780403" }, { "@score":"2", "@id":"2787129", "info":{"authors":{"author":[{"@pid":"157/0576","text":"Shahryar Monghasemi"},{"@pid":"87/7680","text":"Mohammad Reza Nikoo"},{"@pid":"157/0589","text":"Mohammad Ali Khaksar Fasaee"},{"@pid":"120/6449","text":"Jan Franklin Adamowski"}]},"title":"A Hybrid of Genetic Algorithm and Evidential Reasoning for Optimal Design of Project Scheduling: A Systematic Negotiation Framework for Multiple Decision-Makers.","venue":"Int. J. Inf. Technol. Decis. Mak.","volume":"16","number":"2","pages":"389-420","year":"2017","type":"Journal Articles","access":"closed","key":"journals/ijitdm/MonghasemiNFA17","doi":"10.1142/S0219622017500079","ee":"https://doi.org/10.1142/S0219622017500079","url":"https://dblp.org/rec/journals/ijitdm/MonghasemiNFA17"}, "url":"URL#2787129" }, { "@score":"2", "@id":"2787562", "info":{"authors":{"author":[{"@pid":"136/0589","text":"Amirhossein Eslami Andargoli"},{"@pid":"37/4339","text":"Helana Scheepers"},{"@pid":"192/5606","text":"Diana Rajendran"},{"@pid":"87/1901","text":"Amrik Sohal"}]},"title":"Health information systems evaluation frameworks: A systematic review.","venue":"Int. J. Medical Informatics","volume":"97","pages":"195-209","year":"2017","type":"Journal Articles","access":"closed","key":"journals/ijmi/AndargoliSRS17","doi":"10.1016/J.IJMEDINF.2016.10.008","ee":"https://doi.org/10.1016/j.ijmedinf.2016.10.008","url":"https://dblp.org/rec/journals/ijmi/AndargoliSRS17"}, "url":"URL#2787562" }, { "@score":"2", "@id":"2793407", "info":{"authors":{"author":[{"@pid":"133/2020","text":"Nazila Gol Mohammadi"},{"@pid":"h/MarittaHeisel","text":"Maritta Heisel"}]},"title":"A Framework for Systematic Refinement of Trustworthiness Requirements.","venue":"Inf.","volume":"8","number":"2","pages":"46","year":"2017","type":"Journal Articles","access":"open","key":"journals/information/MohammadiH17","doi":"10.3390/INFO8020046","ee":"https://doi.org/10.3390/info8020046","url":"https://dblp.org/rec/journals/information/MohammadiH17"}, "url":"URL#2793407" }, { "@score":"2", "@id":"2796149", "info":{"authors":{"author":[{"@pid":"04/6901-4","text":"Meng Zhang 0004"},{"@pid":"09/4080","text":"Guy G. Gable"}]},"title":"A Systematic Framework for Multilevel Theorizing in Information Systems Research.","venue":"Inf. Syst. Res.","volume":"28","number":"2","pages":"203-224","year":"2017","type":"Journal Articles","access":"closed","key":"journals/isr/ZhangG17","doi":"10.1287/ISRE.2017.0690","ee":"https://doi.org/10.1287/isre.2017.0690","url":"https://dblp.org/rec/journals/isr/ZhangG17"}, "url":"URL#2796149" }, { "@score":"2", "@id":"2800348", "info":{"authors":{"author":[{"@pid":"152/8814","text":"Alberto Mora"},{"@pid":"33/3603","text":"Daniel Riera"},{"@pid":"36/2101","text":"Carina S. González-González"},{"@pid":"29/2092","text":"Joan Arnedo-Moreno"}]},"title":"Gamification: a systematic review of design frameworks.","venue":"J. Comput. High. Educ.","volume":"29","number":"3","pages":"516-548","year":"2017","type":"Journal Articles","access":"closed","key":"journals/jche/MoraRGA17","doi":"10.1007/S12528-017-9150-4","ee":"https://doi.org/10.1007/s12528-017-9150-4","url":"https://dblp.org/rec/journals/jche/MoraRGA17"}, "url":"URL#2800348" }, { "@score":"2", "@id":"2854987", "info":{"authors":{"author":[{"@pid":"48/4329","text":"Jaak Tepandi"},{"@pid":"183/9253","text":"Mihkel Lauk"},{"@pid":"208/8212","text":"Janar Linros"},{"@pid":"208/8151","text":"Priit Raspel"},{"@pid":"73/8302","text":"Gunnar Piho"},{"@pid":"41/10558","text":"Ingrid Pappel"},{"@pid":"d/DirkDraheim","text":"Dirk Draheim"}]},"title":"The Data Quality Framework for the Estonian Public Sector and Its Evaluation - Establishing a Systematic Process-Oriented Viewpoint on Cross-Organizational Data Quality.","venue":"Trans. Large Scale Data Knowl. Centered Syst.","volume":"35","pages":"1-26","year":"2017","type":"Journal Articles","access":"closed","key":"journals/tlsdkcs/TepandiLLRPPD17","doi":"10.1007/978-3-662-56121-8_1","ee":"https://doi.org/10.1007/978-3-662-56121-8_1","url":"https://dblp.org/rec/journals/tlsdkcs/TepandiLLRPPD17"}, "url":"URL#2854987" }, { "@score":"2", "@id":"2871576", "info":{"authors":{"author":[{"@pid":"177/0397","text":"Maryam Tabibzadeh"},{"@pid":"302/6759","text":"Simone Stavros"},{"@pid":"302/7026","text":"Mikhil S. Ashtekar"},{"@pid":"177/0393","text":"Najmedin Meshkati"}]},"title":"A Systematic Framework for Root-Cause Analysis of the Aliso Canyon Gas Leak Using the AcciMap Methodology.","venue":"AHFE","pages":"132-144","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/ahfe/TabibzadehSAM17","doi":"10.1007/978-3-319-60645-3_13","ee":"https://doi.org/10.1007/978-3-319-60645-3_13","url":"https://dblp.org/rec/conf/ahfe/TabibzadehSAM17"}, "url":"URL#2871576" }, { "@score":"2", "@id":"2884781", "info":{"authors":{"author":[{"@pid":"k/DimitrisAKarras","text":"Dimitrios A. Karras"},{"@pid":"08/880","text":"Rallis C. Papademetriou"}]},"title":"A Systematic Review of Analytical Management Techniques Applied to Competition Analysis Modeling Towards a Framework for Integrating them with BPM.","venue":"BMSD","pages":"166-185","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/bmsd/KarrasP17","doi":"10.1007/978-3-319-78428-1_9","ee":"https://doi.org/10.1007/978-3-319-78428-1_9","url":"https://dblp.org/rec/conf/bmsd/KarrasP17"}, "url":"URL#2884781" }, { "@score":"2", "@id":"2916404", "info":{"authors":{"author":[{"@pid":"74/1774","text":"Nour El-Kadri"},{"@pid":"09/1140","text":"Liam Peyton"}]},"title":"A Systematic Literature Review Comparing Primary and Community Health Care Indicators and Measurement Frameworks.","venue":"EUSPN/ICTH","pages":"384-391","year":"2017","type":"Conference and Workshop Papers","access":"open","key":"conf/euspn/El-KadriP17","doi":"10.1016/J.PROCS.2017.08.353","ee":"https://doi.org/10.1016/j.procs.2017.08.353","url":"https://dblp.org/rec/conf/euspn/El-KadriP17"}, "url":"URL#2916404" }, { "@score":"2", "@id":"2938278", "info":{"authors":{"author":{"@pid":"42/3496","text":"Sanja Lazarova-Molnar"}},"title":"Towards a framework for comprehensive and systematic reliability evaluation of building management systems.","venue":"ICCPS","pages":"89","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iccps/Lazarova-Molnar17","doi":"10.1145/3055004.3064844","ee":"https://doi.org/10.1145/3055004.3064844","url":"https://dblp.org/rec/conf/iccps/Lazarova-Molnar17"}, "url":"URL#2938278" }, { "@score":"2", "@id":"2941982", "info":{"authors":{"author":[{"@pid":"182/9319","text":"Ahmed Alghamdi"},{"@pid":"75/9828","text":"Walayat Hussain"},{"@pid":"210/4840","text":"Abdulaziz Alharthi"},{"@pid":"210/4851","text":"Abdulla Badar Almusheqah"}]},"title":"The Need of an Optimal QoS Repository and Assessment Framework in Forming a Trusted Relationship in Cloud: A Systematic Review.","venue":"ICEBE","pages":"301-306","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/icebe/AlghamdiHAA17","doi":"10.1109/ICEBE.2017.55","ee":"https://doi.org/10.1109/ICEBE.2017.55","url":"https://dblp.org/rec/conf/icebe/AlghamdiHAA17"}, "url":"URL#2941982" }, { "@score":"2", "@id":"2973894", "info":{"authors":{"author":[{"@pid":"147/5771","text":"Lívia Castro Degrossi"},{"@pid":"34/3940","text":"João Porto de Albuquerque"},{"@pid":"131/0642","text":"Roberto dos Santos Rocha"},{"@pid":"28/303","text":"Alexander Zipf"}]},"title":"A Framework of Quality Assessment Methods for Crowdsourced Geographic Information: a Systematic Literature Review.","venue":"ISCRAM","year":"2017","type":"Conference and Workshop Papers","access":"open","key":"conf/iscram/DegrossiARZ17","ee":"http://idl.iscram.org/files/liviacastrodegrossi/2017/1487_LiviaCastroDegrossi_etal2017.pdf","url":"https://dblp.org/rec/conf/iscram/DegrossiARZ17"}, "url":"URL#2973894" }, { "@score":"2", "@id":"2990293", "info":{"authors":{"author":[{"@pid":"183/8437","text":"Bernhards Blumbergs"},{"@pid":"63/421","text":"Risto Vaarandi"}]},"title":"Bbuzz: A bit-aware fuzzing framework for network protocol systematic reverse engineering and analysis.","venue":"MILCOM","pages":"707-712","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/milcom/BlumbergsV17","doi":"10.1109/MILCOM.2017.8170785","ee":"https://doi.org/10.1109/MILCOM.2017.8170785","url":"https://dblp.org/rec/conf/milcom/BlumbergsV17"}, "url":"URL#2990293" }, { "@score":"2", "@id":"3007275", "info":{"authors":{"author":[{"@pid":"166/2442","text":"Arif Ali Khan"},{"@pid":"86/7853","text":"Jacky W. Keung"},{"@pid":"07/2817","text":"Mahmood Niazi"},{"@pid":"60/7385-1","text":"Shahid Hussain 0001"}]},"title":"Towards a hypothetical framework of humans related success factors for process improvement in global software development: systematic review.","venue":"SAC","pages":"180-186","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/KhanKNH17","doi":"10.1145/3019612.3019685","ee":"https://doi.org/10.1145/3019612.3019685","url":"https://dblp.org/rec/conf/sac/KhanKNH17"}, "url":"URL#3007275" }, { "@score":"2", "@id":"3031697", "info":{"authors":{"author":[{"@pid":"178/3104","text":"Suresh Kumar Gudla"},{"@pid":"192/0772","text":"Jitendra Kumar Sahoo"},{"@pid":"27/2328","text":"Abhishek Singh"},{"@pid":"84/5687","text":"Joy Bose"},{"@pid":"154/8730","text":"Nazeer Ahamed"}]},"title":"A Systematic Framework to Optimize Launch Times of Web Apps.","venue":"WWW","pages":"785-786","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/www/GudlaSSBA17","doi":"10.1145/3041021.3054206","ee":"https://doi.org/10.1145/3041021.3054206","url":"https://dblp.org/rec/conf/www/GudlaSSBA17"}, "url":"URL#3031697" }, { "@score":"2", "@id":"3058381", "info":{"authors":{"author":{"@pid":"48/9658","text":"Song-Kyoo Kim"}},"title":"Systematic Innovation Mounted Software Development Process and Intuitive Project Management Framework for Lean Startups.","venue":"CoRR","volume":"abs/1708.06900","year":"2017","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1708-06900","ee":"http://arxiv.org/abs/1708.06900","url":"https://dblp.org/rec/journals/corr/abs-1708-06900"}, "url":"URL#3058381" }, { "@score":"2", "@id":"3066183", "info":{"authors":{"author":[{"@pid":"209/9876","text":"Hamed Jelodar"},{"@pid":"67/2851","text":"Yongli Wang"},{"@pid":"21/5025","text":"Chi Yuan"},{"@pid":"86/3872","text":"Xiaohui Jiang"}]},"title":"A systematic framework to discover pattern for web spam classification.","venue":"CoRR","volume":"abs/1711.06955","year":"2017","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1711-06955","ee":"http://arxiv.org/abs/1711.06955","url":"https://dblp.org/rec/journals/corr/abs-1711-06955"}, "url":"URL#3066183" }, { "@score":"2", "@id":"3080350", "info":{"authors":{"author":[{"@pid":"32/3424","text":"Ke Xiong 0001"},{"@pid":"50/671-42","text":"Yu Zhang 0042"},{"@pid":"44/2936","text":"Pingyi Fan"},{"@pid":"51/4942","text":"Hong-Chuan Yang"}]},"title":"Evaluation Framework for User Experience in 5G Systems: On Systematic Rateless-Coded Transmissions.","venue":"IEEE Access","volume":"4","pages":"9108-9118","year":"2016","type":"Journal Articles","access":"open","key":"journals/access/XiongZFY16","doi":"10.1109/ACCESS.2016.2644106","ee":"https://doi.org/10.1109/ACCESS.2016.2644106","url":"https://dblp.org/rec/journals/access/XiongZFY16"}, "url":"URL#3080350" }, { "@score":"2", "@id":"3088634", "info":{"authors":{"author":[{"@pid":"188/0929","text":"Wenpin Hou"},{"@pid":"140/3580","text":"Yushan Qiu"},{"@pid":"19/6370","text":"Nobuyuki Hashimoto"},{"@pid":"98/4717","text":"Wai-Ki Ching"},{"@pid":"a/KiyokoFAokiKinoshita","text":"Kiyoko F. Aoki-Kinoshita"}]},"title":"A systematic framework to derive N-glycan biosynthesis process and the automated construction of glycosylation networks.","venue":"BMC Bioinform.","volume":"17","number":"S-7","pages":"240","year":"2016","type":"Journal Articles","access":"open","key":"journals/bmcbi/HouQHCA16","doi":"10.1186/S12859-016-1094-6","ee":"https://doi.org/10.1186/s12859-016-1094-6","url":"https://dblp.org/rec/journals/bmcbi/HouQHCA16"}, "url":"URL#3088634" }, { "@score":"2", "@id":"3128794", "info":{"authors":{"author":[{"@pid":"164/3172","text":"Saba Vahid"},{"@pid":"32/7619","text":"Nadia Lehoux"},{"@pid":"03/4434","text":"Luis Antonio de Santa-Eulalia"},{"@pid":"64/2657","text":"Sophie D'Amours"},{"@pid":"90/4943","text":"Jean-Marc Frayret"},{"@pid":"73/6638","text":"Uday Venkatadri"}]},"title":"Supply chain modelling frameworks for forest products industry: a systematic literature review.","venue":"INFOR Inf. Syst. Oper. Res.","volume":"54","number":"1","pages":"52-75","year":"2016","type":"Journal Articles","access":"closed","key":"journals/infor/VahidLSDFV16","doi":"10.1080/03155986.2016.1149312","ee":"https://doi.org/10.1080/03155986.2016.1149312","url":"https://dblp.org/rec/journals/infor/VahidLSDFV16"}, "url":"URL#3128794" }, { "@score":"2", "@id":"3129164", "info":{"authors":{"author":[{"@pid":"15/8191","text":"Michael Vierhauser"},{"@pid":"r/RickRabister","text":"Rick Rabiser"},{"@pid":"g/PGrunbacher","text":"Paul Grünbacher"}]},"title":"Requirements monitoring frameworks: A systematic review.","venue":"Inf. Softw. Technol.","volume":"80","pages":"89-109","year":"2016","type":"Journal Articles","access":"closed","key":"journals/infsof/VierhauserRG16","doi":"10.1016/J.INFSOF.2016.08.005","ee":"https://doi.org/10.1016/j.infsof.2016.08.005","url":"https://dblp.org/rec/journals/infsof/VierhauserRG16"}, "url":"URL#3129164" }, { "@score":"2", "@id":"3212848", "info":{"authors":{"author":[{"@pid":"136/1181","text":"Dirk Stamer"},{"@pid":"185/3553","text":"Ole Zimmermann"},{"@pid":"29/6910","text":"Kurt Sandkuhl"}]},"title":"What Is a Framework? - A Systematic Literature Review in the Field of Information Systems.","venue":"BIR","pages":"145-158","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/bir/StamerZS16","doi":"10.1007/978-3-319-45321-7_11","ee":"https://doi.org/10.1007/978-3-319-45321-7_11","url":"https://dblp.org/rec/conf/bir/StamerZS16"}, "url":"URL#3212848" }, { "@score":"2", "@id":"3219103", "info":{"authors":{"author":[{"@pid":"178/6513","text":"Gloria Ejehiohen Iyawa"},{"@pid":"22/8856","text":"Marlien Herselman"},{"@pid":"39/8856","text":"Adele Botha"}]},"title":"Digital Health Innovation Ecosystems: From Systematic Literature Review to Conceptual Framework.","venue":"CENTERIS/ProjMAN/HCist","pages":"244-252","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/centeris/IyawaHB16","doi":"10.1016/J.PROCS.2016.09.149","ee":"https://doi.org/10.1016/j.procs.2016.09.149","url":"https://dblp.org/rec/conf/centeris/IyawaHB16"}, "url":"URL#3219103" }, { "@score":"2", "@id":"3242210", "info":{"authors":{"author":[{"@pid":"169/8184","text":"Riccardo Tommasini 0001"},{"@pid":"91/4526","text":"Emanuele Della Valle"},{"@pid":"122/5489","text":"Marco Balduini"},{"@pid":"57/8026","text":"Daniele Dell'Aglio"}]},"title":"Heaven: A Framework for Systematic Comparative Research Approach for RSP Engines.","venue":"ESWC","pages":"250-265","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/esws/TommasiniVBD16","doi":"10.1007/978-3-319-34129-3_16","ee":"https://doi.org/10.1007/978-3-319-34129-3_16","url":"https://dblp.org/rec/conf/esws/TommasiniVBD16"}, "url":"URL#3242210" }, { "@score":"2", "@id":"3246277", "info":{"authors":{"author":[{"@pid":"173/1552","text":"Ali Shafaat"},{"@pid":"193/1262","text":"Hossein Ebrahiminejad"},{"@pid":"132/6108","text":"Farshid Marbouti"},{"@pid":"45/10634","text":"Monica Cardella"},{"@pid":"31/8745","text":"Amr A. Kandil"}]},"title":"Developing a systematic framework to enhance construction procedure design.","venue":"FIE","pages":"1-3","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/fie/ShafaatEMCK16","doi":"10.1109/FIE.2016.7757591","ee":"https://doi.org/10.1109/FIE.2016.7757591","url":"https://dblp.org/rec/conf/fie/ShafaatEMCK16"}, "url":"URL#3246277" }, { "@score":"2", "@id":"3248560", "info":{"authors":{"author":[{"@pid":"126/1917","text":"Tai-Ying Huang"},{"@pid":"76/7206","text":"Wei-Yu Chiu"}]},"title":"Systematic framework for solving real-world problems with multiple objectives.","venue":"GCCE","pages":"1-2","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/gcce/HuangC16a","doi":"10.1109/GCCE.2016.7800365","ee":"https://doi.org/10.1109/GCCE.2016.7800365","url":"https://dblp.org/rec/conf/gcce/HuangC16a"}, "url":"URL#3248560" }, { "@score":"2", "@id":"3255574", "info":{"authors":{"author":{"@pid":"194/1418","text":"Mohammad Irshad"}},"title":"A Systematic Review of Information Security Frameworks in the Internet of Things (IoT).","venue":"HPCC/SmartCity/DSS","pages":"1270-1275","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/hpcc/Irshad16","doi":"10.1109/HPCC-SMARTCITY-DSS.2016.0180","ee":"https://doi.org/10.1109/HPCC-SmartCity-DSS.2016.0180","url":"https://dblp.org/rec/conf/hpcc/Irshad16"}, "url":"URL#3255574" }, { "@score":"2", "@id":"3266792", "info":{"authors":{"author":[{"@pid":"194/1754","text":"Mohammed Alayyoub"},{"@pid":"64/3204","text":"Ali Yazici"},{"@pid":"60/640","text":"Ziya Karakaya"}]},"title":"Systematic mapping for big data stream processing frameworks.","venue":"ICDIM","pages":"31-36","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/icdim/AlayyoubYK16","doi":"10.1109/ICDIM.2016.7829760","ee":"https://doi.org/10.1109/ICDIM.2016.7829760","url":"https://dblp.org/rec/conf/icdim/AlayyoubYK16"}, "url":"URL#3266792" }, { "@score":"2", "@id":"3269103", "info":{"authors":{"author":[{"@pid":"182/8162","text":"Ala S. Al Kafri"},{"@pid":"03/11115","text":"Sud Sudirman"},{"@pid":"34/4701","text":"Abir Jaafar Hussain"},{"@pid":"12/1040","text":"Paul Fergus"},{"@pid":"59/6775","text":"Dhiya Al-Jumeily"},{"@pid":"14/9136","text":"Mohammed Al-Jumaily"},{"@pid":"139/5801","text":"Haya Al-Askar"}]},"title":"A Framework on a Computer Assisted and Systematic Methodology for Detection of Chronic Lower Back Pain Using Artificial Intelligence and Computer Graphics Technologies.","venue":"ICIC","pages":"843-854","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/icic/KafriSHFAAA16","doi":"10.1007/978-3-319-42291-6_83","ee":"https://doi.org/10.1007/978-3-319-42291-6_83","url":"https://dblp.org/rec/conf/icic/KafriSHFAAA16"}, "url":"URL#3269103" }, { "@score":"2", "@id":"3278418", "info":{"authors":{"author":[{"@pid":"174/8880","text":"Görkem Giray"},{"@pid":"t/ErayTuzun","text":"Eray Tüzün"},{"@pid":"87/3092","text":"Bedir Tekinerdogan"},{"@pid":"151/2278","text":"Yagup Macit"}]},"title":"Systematic approach for mapping software development methods to the essence framework.","venue":"TOSE@ICSE","pages":"26-32","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/icse/GirayTTM16","doi":"10.1145/2897134.2897139","ee":"https://doi.org/10.1145/2897134.2897139","url":"https://dblp.org/rec/conf/icse/GirayTTM16"}, "url":"URL#3278418" }, { "@score":"2", "@id":"3312165", "info":{"authors":{"author":[{"@pid":"148/9587","text":"Radha Venkatagiri"},{"@pid":"126/0708","text":"Abdulrahman Mahmoud"},{"@pid":"85/525","text":"Siva Kumar Sastry Hari"},{"@pid":"97/4181","text":"Sarita V. Adve"}]},"title":"Approxilyzer: Towards a systematic framework for instruction-level approximate computing and its application to hardware resiliency.","venue":"MICRO","pages":"42:1-42:14","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/micro/VenkatagiriMHA16","doi":"10.1109/MICRO.2016.7783745","ee":"https://doi.org/10.1109/MICRO.2016.7783745","url":"https://dblp.org/rec/conf/micro/VenkatagiriMHA16"}, "url":"URL#3312165" }, { "@score":"2", "@id":"3332978", "info":{"authors":{"author":[{"@pid":"118/5294","text":"Andreas Niekler"},{"@pid":"186/7380","text":"Christian Kahmann"}]},"title":"Extracting Process Graphs from Medical Text Data - An Approach Towards a Systematic Framework to Extract and Mine Medical Sequential Processes Descriptions from Large Text Sources.","venue":"KEKI/NLP&DBpedia@ISWC","pages":"76-88","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/semweb/NieklerK16","doi":"10.1007/978-3-319-68723-0_7","ee":"https://doi.org/10.1007/978-3-319-68723-0_7","url":"https://dblp.org/rec/conf/semweb/NieklerK16"}, "url":"URL#3332978" }, { "@score":"2", "@id":"3335985", "info":{"authors":{"author":[{"@pid":"42/1065","text":"Ryo Hanai"},{"@pid":"18/3462","text":"Kensuke Harada"}]},"title":"A framework for systematic accumulation, sharing and reuse of task implementation knowledge.","venue":"SII","pages":"434-440","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/sii/HanaiH16","doi":"10.1109/SII.2016.7844037","ee":"https://doi.org/10.1109/SII.2016.7844037","url":"https://dblp.org/rec/conf/sii/HanaiH16"}, "url":"URL#3335985" }, { "@score":"2", "@id":"3344711", "info":{"authors":{"author":[{"@pid":"133/2020","text":"Nazila Gol Mohammadi"},{"@pid":"h/MarittaHeisel","text":"Maritta Heisel"}]},"title":"A Framework for Systematic Analysis and Modeling of Trustworthiness Requirements Using i* and BPMN.","venue":"TrustBus","pages":"3-18","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/trustbus/MohammadiH16","doi":"10.1007/978-3-319-44341-6_1","ee":"https://doi.org/10.1007/978-3-319-44341-6_1","url":"https://dblp.org/rec/conf/trustbus/MohammadiH16"}, "url":"URL#3344711" }, { "@score":"2", "@id":"3351385", "info":{"authors":{"author":[{"@pid":"180/7308","text":"Timothy C. Fanelli"},{"@pid":"180/7249","text":"Scott C. Simons"},{"@pid":"01/8783","text":"Sean Banerjee"}]},"title":"A Systematic Framework for Modernizing Legacy Application Systems.","venue":"SANER","pages":"678-682","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/wcre/FanelliSB16","doi":"10.1109/SANER.2016.40","ee":"https://doi.org/10.1109/SANER.2016.40","url":"https://dblp.org/rec/conf/wcre/FanelliSB16"}, "url":"URL#3351385" }, { "@score":"2", "@id":"3364124", "info":{"authors":{"author":[{"@pid":"11/7631","text":"Tanmay Basu"},{"@pid":"176/4200","text":"Shraman Kumar"},{"@pid":"182/2429","text":"Abhishek Kalyan"},{"@pid":"182/2353","text":"Priyanka Jayaswal"},{"@pid":"77/2307-2","text":"Pawan Goyal 0002"},{"@pid":"p/SPettifer","text":"Stephen Pettifer"},{"@pid":"72/7800","text":"Siddhartha Jonnalagadda"}]},"title":"A Novel Framework to Expedite Systematic Reviews by Automatically Building Information Extraction Training Corpora.","venue":"CoRR","volume":"abs/1606.06424","year":"2016","type":"Informal and Other Publications","access":"open","key":"journals/corr/BasuKKJGPJ16","ee":"http://arxiv.org/abs/1606.06424","url":"https://dblp.org/rec/journals/corr/BasuKKJGPJ16"}, "url":"URL#3364124" }, { "@score":"2", "@id":"3388888", "info":{"authors":{"author":{"@pid":"119/7373","text":"Che Ngufor"}},"title":"Optimal Integration of Machine Learning Models: A Large-Scale Distributed Learning Framework with Application to Systematic Prediction of Adverse Drug Reactions.","year":"2015","type":"Books and Theses","access":"closed","key":"phd/basesearch/Ngufor15","ee":"https://hdl.handle.net/1920/9190","url":"https://dblp.org/rec/phd/basesearch/Ngufor15"}, "url":"URL#3388888" }, { "@score":"2", "@id":"3390708", "info":{"authors":{"author":{"@pid":"89/8828","text":"David Gañán"}},"title":"An application framework for the systematic construction of multimedia-based Collaborative Complex Learning Resources.","year":"2015","type":"Books and Theses","access":"closed","key":"phd/es/Jimenez15","ee":"http://hdl.handle.net/10803/402141","url":"https://dblp.org/rec/phd/es/Jimenez15"}, "url":"URL#3390708" }, { "@score":"2", "@id":"3398996", "info":{"authors":{"author":[{"@pid":"89/8828","text":"David Gañán"},{"@pid":"46/368","text":"Santi Caballé"},{"@pid":"71/5257","text":"Jordi Conesa"},{"@pid":"80/6437","text":"Fatos Xhafa"}]},"title":"An Application Framework to Systematically Develop Complex Learning Resources Based on Collaborative Knowledge Engineering.","venue":"Int. J. Appl. Math. Comput. Sci.","volume":"25","number":"2","pages":"361-375","year":"2015","type":"Journal Articles","access":"open","key":"journals/amcs/GananCCX15","doi":"10.1515/AMCS-2015-0028","ee":"https://doi.org/10.1515/amcs-2015-0028","url":"https://dblp.org/rec/journals/amcs/GananCCX15"}, "url":"URL#3398996" }, { "@score":"2", "@id":"3406972", "info":{"authors":{"author":[{"@pid":"155/9419","text":"María Fuentes Garí"},{"@pid":"155/9240","text":"Eirini Velliou"},{"@pid":"04/8800","text":"Ruth Misener"},{"@pid":"134/7364","text":"Eleni Pefani"},{"@pid":"155/9383","text":"Maria Rende"},{"@pid":"97/4335","text":"Nicki Panoskaltsis"},{"@pid":"27/7173","text":"Athanasios Mantalaris"},{"@pid":"23/313","text":"Efstratios N. Pistikopoulos"}]},"title":"A systematic framework for the design, simulation and optimization of personalized healthcare: Making and healing blood.","venue":"Comput. Chem. Eng.","volume":"81","pages":"80-93","year":"2015","type":"Journal Articles","access":"closed","key":"journals/cce/GariVMPRPMP15","doi":"10.1016/J.COMPCHEMENG.2015.03.008","ee":"https://doi.org/10.1016/j.compchemeng.2015.03.008","url":"https://dblp.org/rec/journals/cce/GariVMPRPMP15"}, "url":"URL#3406972" }, { "@score":"2", "@id":"3442132", "info":{"authors":{"author":[{"@pid":"22/9220","text":"Clara Ayora"},{"@pid":"99/1046","text":"Victoria Torres"},{"@pid":"96/2864","text":"Barbara Weber"},{"@pid":"r/ManfredReichert","text":"Manfred Reichert"},{"@pid":"29/4995","text":"Vicente Pelechano"}]},"title":"VIVACE: A framework for the systematic evaluation of variability support in process-aware information systems.","venue":"Inf. Softw. Technol.","volume":"57","pages":"248-276","year":"2015","type":"Journal Articles","access":"closed","key":"journals/infsof/AyoraTWRP15","doi":"10.1016/J.INFSOF.2014.05.009","ee":"https://doi.org/10.1016/j.infsof.2014.05.009","url":"https://dblp.org/rec/journals/infsof/AyoraTWRP15"}, "url":"URL#3442132" }, { "@score":"2", "@id":"3460330", "info":{"authors":{"author":[{"@pid":"148/9941","text":"Onur Atan"},{"@pid":"85/3071","text":"Yiannis Andreopoulos"},{"@pid":"98/7659","text":"Cem Tekin"},{"@pid":"s/MihaelavanderSchaar","text":"Mihaela van der Schaar"}]},"title":"Bandit Framework for Systematic Learning in Wireless Video-Based Face Recognition.","venue":"IEEE J. Sel. Top. Signal Process.","volume":"9","number":"1","pages":"180-194","year":"2015","type":"Journal Articles","access":"closed","key":"journals/jstsp/AtanATS15","doi":"10.1109/JSTSP.2014.2330799","ee":"https://doi.org/10.1109/JSTSP.2014.2330799","url":"https://dblp.org/rec/journals/jstsp/AtanATS15"}, "url":"URL#3460330" }, { "@score":"2", "@id":"3475685", "info":{"authors":{"author":[{"@pid":"22/7901","text":"Jinkyun Park"},{"@pid":"58/7897","text":"Wondea Jung"}]},"title":"A systematic framework to investigate the coverage of abnormal operating procedures in nuclear power plants.","venue":"Reliab. Eng. Syst. Saf.","volume":"138","pages":"21-30","year":"2015","type":"Journal Articles","access":"closed","key":"journals/ress/ParkJ15a","doi":"10.1016/J.RESS.2015.01.013","ee":"https://doi.org/10.1016/j.ress.2015.01.013","url":"https://dblp.org/rec/journals/ress/ParkJ15a"}, "url":"URL#3475685" }, { "@score":"2", "@id":"3483872", "info":{"authors":{"author":[{"@pid":"18/6490","text":"Domenico Ciuonzo"},{"@pid":"48/992","text":"Antonio De Maio"},{"@pid":"41/1","text":"Pierluigi Salvo Rossi"}]},"title":"A Systematic Framework for Composite Hypothesis Testing of Independent Bernoulli Trials.","venue":"IEEE Signal Process. Lett.","volume":"22","number":"9","pages":"1249-1253","year":"2015","type":"Journal Articles","access":"closed","key":"journals/spl/CiuonzoMR15","doi":"10.1109/LSP.2015.2395811","ee":"https://doi.org/10.1109/LSP.2015.2395811","url":"https://dblp.org/rec/journals/spl/CiuonzoMR15"}, "url":"URL#3483872" }, { "@score":"2", "@id":"3485522", "info":{"authors":{"author":[{"@pid":"41/3085","text":"Yong Fang"},{"@pid":"155/7953","text":"Dantong Zhu"},{"@pid":"162/5216","text":"Yinxia Zheng"}]},"title":"The current status and systematic framework of talent programmes in basic research in China: a system theory perspective.","venue":"Technol. Anal. Strateg. Manag.","volume":"27","number":"6","pages":"722-738","year":"2015","type":"Journal Articles","access":"closed","key":"journals/taasm/FangZZ15","doi":"10.1080/09537325.2014.957665","ee":"https://doi.org/10.1080/09537325.2014.957665","url":"https://dblp.org/rec/journals/taasm/FangZZ15"}, "url":"URL#3485522" }, { "@score":"2", "@id":"3513617", "info":{"authors":{"author":[{"@pid":"146/2910","text":"Samir E. AbdelRahman"},{"@pid":"51/7027","text":"Kensaku Kawamoto"}]},"title":"Design, Development, and Initial Application of a Systematic, Semi-Automated Predictive Analytics Framework for Health Care.","venue":"AMIA","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/amia/AbdelRahmanK15","ee":"https://knowledge.amia.org/59310-amia-1.2741865/t005-1.2744350/f005-1.2744351/2248691-1.2745463/2246287-1.2745460","url":"https://dblp.org/rec/conf/amia/AbdelRahmanK15"}, "url":"URL#3513617" }, { "@score":"2", "@id":"3552382", "info":{"authors":{"author":[{"@pid":"29/1726-5","text":"Peng Huang 0005"},{"@pid":"b/WJBolosky","text":"William J. Bolosky"},{"@pid":"27/2328","text":"Abhishek Singh"},{"@pid":"99/2747-1","text":"Yuanyuan Zhou 0001"}]},"title":"ConfValley: a systematic configuration validation framework for cloud services.","venue":"EuroSys","pages":"19:1-19:16","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/eurosys/HuangBSZ15","doi":"10.1145/2741948.2741963","ee":"https://doi.org/10.1145/2741948.2741963","url":"https://dblp.org/rec/conf/eurosys/HuangBSZ15"}, "url":"URL#3552382" }, { "@score":"2", "@id":"3574046", "info":{"authors":{"author":[{"@pid":"172/2417","text":"Gyeong-Soo Noh"},{"@pid":"19/10864","text":"Jeonghwan Gwak"},{"@pid":"61/3523","text":"Moongu Jeon"}]},"title":"A systematic framework for real-time online multi-object tracking.","venue":"ICCAIS","pages":"57-61","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/iccais/NohGJ15","doi":"10.1109/ICCAIS.2015.7338725","ee":"https://doi.org/10.1109/ICCAIS.2015.7338725","url":"https://dblp.org/rec/conf/iccais/NohGJ15"}, "url":"URL#3574046" }, { "@score":"2", "@id":"3577985", "info":{"authors":{"author":{"@pid":"138/9277","text":"Le-Duc Tung"}},"title":"Pregel meets UnCAL: A systematic framework for transforming big graphs.","venue":"ICDE Workshops","pages":"250-254","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/icde/Tung15","doi":"10.1109/ICDEW.2015.7129585","ee":"https://doi.org/10.1109/ICDEW.2015.7129585","url":"https://dblp.org/rec/conf/icde/Tung15"}, "url":"URL#3577985" }, { "@score":"2", "@id":"3602482", "info":{"authors":{"author":[{"@pid":"26/3295","text":"Kaisa Väänänen-Vainio-Mattila"},{"@pid":"31/5587-2","text":"Thomas Olsson 0002"},{"@pid":"62/6700","text":"Jonna Häkkilä"}]},"title":"Towards Deeper Understanding of User Experience with Ubiquitous Computing Systems: Systematic Literature Review and Design Framework.","venue":"INTERACT","pages":"384-401","year":"2015","type":"Conference and Workshop Papers","access":"open","key":"conf/interact/Vaananen-Vainio-Mattila15","doi":"10.1007/978-3-319-22698-9_26","ee":"https://doi.org/10.1007/978-3-319-22698-9_26","url":"https://dblp.org/rec/conf/interact/Vaananen-Vainio-Mattila15"}, "url":"URL#3602482" }, { "@score":"2", "@id":"3632654", "info":{"authors":{"author":{"@pid":"10/7903","text":"Yen-Hao Hsieh"}},"title":"A Systematic Framework of Value Co-Creation Modelling in Service Systems.","venue":"PACIS","pages":"145","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/pacis/Hsieh15","ee":"http://aisel.aisnet.org/pacis2015/145","url":"https://dblp.org/rec/conf/pacis/Hsieh15"}, "url":"URL#3632654" }, { "@score":"2", "@id":"3709332", "info":{"authors":{"author":[{"@pid":"17/8801","text":"Ravendra Singh"},{"@pid":"147/4174","text":"Abhishek Sahay"},{"@pid":"61/11475","text":"Fernando J. Muzzio"},{"@pid":"02/7149","text":"Marianthi G. Ierapetritou"},{"@pid":"18/11475","text":"Rohit Ramachandran"}]},"title":"A systematic framework for onsite design and implementation of a control system in a continuous tablet manufacturing process.","venue":"Comput. Chem. Eng.","volume":"66","pages":"186-200","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cce/SinghSMIR14","doi":"10.1016/J.COMPCHEMENG.2014.02.029","ee":"https://doi.org/10.1016/j.compchemeng.2014.02.029","url":"https://dblp.org/rec/journals/cce/SinghSMIR14"}, "url":"URL#3709332" }, { "@score":"2", "@id":"3717377", "info":{"authors":{"author":[{"@pid":"59/8732","text":"Alan Humphrey"},{"@pid":"14/11145","text":"Qingyu Meng"},{"@pid":"b/MartinBerzins","text":"Martin Berzins"},{"@pid":"69/7127","text":"Diego Caminha Barbosa De Oliveira"},{"@pid":"31/4458","text":"Zvonimir Rakamaric"},{"@pid":"g/GGopalakrishnan","text":"Ganesh Gopalakrishnan"}]},"title":"Systematic Debugging Methods for Large-Scale HPC Computational Frameworks.","venue":"Comput. Sci. Eng.","volume":"16","number":"3","pages":"48-56","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cse/HumphreyMBORG14","doi":"10.1109/MCSE.2014.11","ee":"https://doi.org/10.1109/MCSE.2014.11","url":"https://dblp.org/rec/journals/cse/HumphreyMBORG14"}, "url":"URL#3717377" }, { "@score":"2", "@id":"3746478", "info":{"authors":{"author":[{"@pid":"75/9032","text":"François-Xavier de Vaujany"},{"@pid":"128/4280","text":"Sabine Carton"},{"@pid":"36/3392","text":"Nathalie N. Mitev"},{"@pid":"151/5072","text":"Cécile Romeyer"}]},"title":"Applying and theorizing institutional frameworks in IS research: A systematic analysis from 1999 to 2009.","venue":"Inf. Technol. People","volume":"27","number":"3","pages":"280-317","year":"2014","type":"Journal Articles","access":"closed","key":"journals/itp/VaujanyCMR14","doi":"10.1108/ITP-10-2013-0185","ee":"https://doi.org/10.1108/ITP-10-2013-0185","url":"https://dblp.org/rec/journals/itp/VaujanyCMR14"}, "url":"URL#3746478" }, { "@score":"2", "@id":"3750697", "info":{"authors":{"author":[{"@pid":"97/515","text":"David Hoksza"},{"@pid":"91/7529","text":"Petr Skoda 0001"},{"@pid":"144/6307","text":"Milan Vorsilák"},{"@pid":"07/430","text":"Daniel Svozil"}]},"title":"Molpher: a software framework for systematic chemical space exploration.","venue":"J. Cheminformatics","volume":"6","number":"1","pages":"7","year":"2014","type":"Journal Articles","access":"open","key":"journals/jcheminf/HokszaSVS14","doi":"10.1186/1758-2946-6-7","ee":"https://doi.org/10.1186/1758-2946-6-7","url":"https://dblp.org/rec/journals/jcheminf/HokszaSVS14"}, "url":"URL#3750697" }, { "@score":"2", "@id":"3777032", "info":{"authors":{"author":[{"@pid":"142/7382","text":"Seyed Mohsen Hoseyni"},{"@pid":"91/11340","text":"Mohammad Pourgol-Mohamad"},{"@pid":"04/8793","text":"Ali Abbaspour Tehrani-Fard"},{"@pid":"142/7383","text":"Faramarz Yousefpour"}]},"title":"A systematic framework for effective uncertainty assessment of severe accident calculations; Hybrid qualitative and quantitative methodology.","venue":"Reliab. Eng. Syst. Saf.","volume":"125","pages":"22-35","year":"2014","type":"Journal Articles","access":"closed","key":"journals/ress/HoseyniPTY14","doi":"10.1016/J.RESS.2013.06.037","ee":"https://doi.org/10.1016/j.ress.2013.06.037","url":"https://dblp.org/rec/journals/ress/HoseyniPTY14"}, "url":"URL#3777032" }, { "@score":"2", "@id":"3778005", "info":{"authors":{"author":[{"@pid":"130/4033","text":"Daniel Graziotin"},{"@pid":"99/2479-1","text":"Xiaofeng Wang 0001"},{"@pid":"71/5809","text":"Pekka Abrahamsson"}]},"title":"A framework for systematic analysis of open access journals and its application in software engineering and information systems.","venue":"Scientometrics","volume":"101","number":"3","pages":"1627-1656","year":"2014","type":"Journal Articles","access":"closed","key":"journals/scientometrics/GraziotinWA14","doi":"10.1007/S11192-014-1278-7","ee":"https://doi.org/10.1007/s11192-014-1278-7","url":"https://dblp.org/rec/journals/scientometrics/GraziotinWA14"}, "url":"URL#3778005" }, { "@score":"2", "@id":"3783254", "info":{"authors":{"author":[{"@pid":"18/2841","text":"Chih-Ming Hsu"},{"@pid":"l/FengLiLian","text":"Feng-Li Lian"},{"@pid":"28/3548","text":"Cheng-Ming Huang"}]},"title":"A Systematic Spatiotemporal Modeling Framework for Characterizing Traffic Dynamics Using Hierarchical Gaussian Mixture Modeling and Entropy Analysis.","venue":"IEEE Syst. J.","volume":"8","number":"4","pages":"1126-1135","year":"2014","type":"Journal Articles","access":"closed","key":"journals/sj/HsuLH14","doi":"10.1109/JSYST.2013.2253197","ee":"https://doi.org/10.1109/JSYST.2013.2253197","url":"https://dblp.org/rec/journals/sj/HsuLH14"}, "url":"URL#3783254" }, { "@score":"2", "@id":"3785330", "info":{"authors":{"author":[{"@pid":"61/6417","text":"Thomas Rings"},{"@pid":"145/3649","text":"Patrick Poglitsch"},{"@pid":"89/3872-2","text":"Stephan Schulz 0002"},{"@pid":"145/3643","text":"Luca Serazio"},{"@pid":"27/1222","text":"Theofanis Vassiliou-Gioles"}]},"title":"A generic interoperability testing framework and a systematic development process for automated interoperability testing.","venue":"Int. J. Softw. Tools Technol. Transf.","volume":"16","number":"3","pages":"295-313","year":"2014","type":"Journal Articles","access":"closed","key":"journals/sttt/RingsPSSV14","doi":"10.1007/S10009-013-0281-2","ee":"https://doi.org/10.1007/s10009-013-0281-2","url":"https://dblp.org/rec/journals/sttt/RingsPSSV14"}, "url":"URL#3785330" }, { "@score":"2", "@id":"3817796", "info":{"authors":{"author":[{"@pid":"86/9769","text":"Dingcheng Li"},{"@pid":"78/6727","text":"Zhen Wang"},{"@pid":"132/3554","text":"Feichen Shen"},{"@pid":"157/0965","text":"Mohammad Hassan Murad"},{"@pid":"92/2407","text":"Hongfang Liu"}]},"title":"Towards a multi-level framework for supporting systematic review - A pilot study.","venue":"BIBM","pages":"43-50","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/bibm/LiWSML14","doi":"10.1109/BIBM.2014.6999266","ee":"https://doi.org/10.1109/BIBM.2014.6999266","url":"https://dblp.org/rec/conf/bibm/LiWSML14"}, "url":"URL#3817796" }, { "@score":"2", "@id":"3850289", "info":{"authors":{"author":[{"@pid":"77/5221","text":"Hannu Jaakkola"},{"@pid":"t/BernhardThalheim","text":"Bernhard Thalheim"}]},"title":"A Framework for Systematic Change Management.","venue":"EuroSPI","pages":"60-72","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/eurospi/JaakkolaT14","doi":"10.1007/978-3-662-43896-1_6","ee":"https://doi.org/10.1007/978-3-662-43896-1_6","url":"https://dblp.org/rec/conf/eurospi/JaakkolaT14"}, "url":"URL#3850289" }, { "@score":"2", "@id":"3868035", "info":{"authors":{"author":[{"@pid":"148/9941","text":"Onur Atan"},{"@pid":"98/7659","text":"Cem Tekin"},{"@pid":"s/MihaelavanderSchaar","text":"Mihaela van der Schaar"},{"@pid":"85/3071","text":"Yiannis Andreopoulos"}]},"title":"Bandit framework for systematic learning in wireless video-based face recognition.","venue":"ICASSP","pages":"704-708","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/icassp/AtanTSA14","doi":"10.1109/ICASSP.2014.6853687","ee":"https://doi.org/10.1109/ICASSP.2014.6853687","url":"https://dblp.org/rec/conf/icassp/AtanTSA14"}, "url":"URL#3868035" }, { "@score":"2", "@id":"3885157", "info":{"authors":{"author":[{"@pid":"91/10007","text":"Min Yang Jung"},{"@pid":"71/2446","text":"Russell H. Taylor"},{"@pid":"14/4502","text":"Peter Kazanzides"}]},"title":"Safety Design View: A conceptual framework for systematic understanding of safety features of medical robot systems.","venue":"ICRA","pages":"1883-1888","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/icra/JungTK14","doi":"10.1109/ICRA.2014.6907107","ee":"https://doi.org/10.1109/ICRA.2014.6907107","url":"https://dblp.org/rec/conf/icra/JungTK14"}, "url":"URL#3885157" }, { "@score":"2", "@id":"3945158", "info":{"authors":{"author":[{"@pid":"129/0257","text":"Benedek Izsó"},{"@pid":"151/1414","text":"Gábor Szárnyas"},{"@pid":"07/4090","text":"István Ráth"},{"@pid":"53/1883","text":"Dániel Varró"}]},"title":"MONDO-SAM: A Framework to Systematically Assess MDE Scalability.","venue":"BigMDE@STAF","pages":"40-43","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/staf/IzsoSRV14","ee":"https://ceur-ws.org/Vol-1206/paper_12.pdf","url":"https://dblp.org/rec/conf/staf/IzsoSRV14"}, "url":"URL#3945158" }, { "@score":"2", "@id":"3953841", "info":{"authors":{"author":[{"@pid":"88/2172","text":"Kunpeng Zhang"},{"@pid":"33/4854-42","text":"Yi Yang 0042"},{"@pid":"55/6485","text":"Aaron Sun"},{"@pid":"69/6532","text":"Hengchang Liu"}]},"title":"A Systematic Framework for Sentiment Identification by Modeling User Social Effects.","venue":"WI-IAT","pages":"172-179","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/webi/ZhangYSL14","doi":"10.1109/WI-IAT.2014.95","ee":"https://doi.org/10.1109/WI-IAT.2014.95","url":"https://dblp.org/rec/conf/webi/ZhangYSL14"}, "url":"URL#3953841" }, { "@score":"2", "@id":"3978121", "info":{"authors":{"author":[{"@pid":"46/1398","text":"E. Paul Ratazzi"},{"@pid":"138/6356","text":"Yousra Aafer"},{"@pid":"139/2343","text":"Amit Ahlawat"},{"@pid":"96/10637","text":"Hao Hao"},{"@pid":"00/555","text":"Yifei Wang"},{"@pid":"d/WenliangDu","text":"Wenliang Du"}]},"title":"A Systematic Security Evaluation of Android's Multi-User Framework.","venue":"CoRR","volume":"abs/1410.7752","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/RatazziAAHWD14","ee":"http://arxiv.org/abs/1410.7752","url":"https://dblp.org/rec/journals/corr/RatazziAAHWD14"}, "url":"URL#3978121" }, { "@score":"2", "@id":"3987261", "info":{"authors":{"author":{"@pid":"15/8435","text":"Shekoufeh Kolahdouz Rahimi"}},"title":"A comparative study of model transformation approaches through a systematic procedural framework and goal question metrics paradigm.","year":"2013","type":"Books and Theses","access":"closed","key":"phd/ethos/KolahdouzRahimi13","ee":"https://kclpure.kcl.ac.uk/portal/en/theses/a-comparative-study-of-model-transformation-approaches-through-a-systematic-procedural-framework-and-goal-question-metrics-paradigm(c0ff8ef8-2027-495c-a86f-b1c7493cdba7).html","url":"https://dblp.org/rec/phd/ethos/KolahdouzRahimi13"}, "url":"URL#3987261" }, { "@score":"2", "@id":"4001012", "info":{"authors":{"author":[{"@pid":"71/2575","text":"Alberto Quaglia"},{"@pid":"01/11197","text":"Bent Sarup"},{"@pid":"03/8802","text":"Gürkan Sin"},{"@pid":"79/7145","text":"Rafiqul Gani"}]},"title":"A systematic framework for enterprise-wide optimization: Synthesis and design of processing networks under uncertainty.","venue":"Comput. Chem. Eng.","volume":"59","pages":"47-62","year":"2013","type":"Journal Articles","access":"closed","key":"journals/cce/QuagliaSSG13","doi":"10.1016/J.COMPCHEMENG.2013.03.018","ee":"https://doi.org/10.1016/j.compchemeng.2013.03.018","url":"https://dblp.org/rec/journals/cce/QuagliaSSG13"}, "url":"URL#4001012" }, { "@score":"2", "@id":"4001023", "info":{"authors":{"author":[{"@pid":"51/9457","text":"Noor Asma Fazli Abdul Samad"},{"@pid":"03/8802","text":"Gürkan Sin"},{"@pid":"16/1673","text":"Krist V. Gernaey"},{"@pid":"79/7145","text":"Rafiqul Gani"}]},"title":"A systematic framework for design of process monitoring and control (PAT) systems for crystallization processes.","venue":"Comput. Chem. Eng.","volume":"54","pages":"8-23","year":"2013","type":"Journal Articles","access":"closed","key":"journals/cce/SamadSGG13","doi":"10.1016/J.COMPCHEMENG.2013.03.003","ee":"https://doi.org/10.1016/j.compchemeng.2013.03.003","url":"https://dblp.org/rec/journals/cce/SamadSGG13"}, "url":"URL#4001023" }, { "@score":"2", "@id":"4006437", "info":{"authors":{"author":[{"@pid":"61/9133","text":"Xin (Robert) Luo"},{"@pid":"10/4661-35","text":"Wei Zhang 0035"},{"@pid":"81/5495","text":"Stephen D. Burd"},{"@pid":"78/1922","text":"Alessandro F. Seazzu"}]},"title":"Investigating phishing victimization with the Heuristic-Systematic Model: A theoretical framework and an exploration.","venue":"Comput. Secur.","volume":"38","pages":"28-38","year":"2013","type":"Journal Articles","access":"closed","key":"journals/compsec/LuoZBS13","doi":"10.1016/J.COSE.2012.12.003","ee":"https://doi.org/10.1016/j.cose.2012.12.003","url":"https://dblp.org/rec/journals/compsec/LuoZBS13"}, "url":"URL#4006437" }, { "@score":"2", "@id":"4029352", "info":{"authors":{"author":{"@pid":"47/5259","text":"Mathupayas Thongmak"}},"title":"A Systematic Framework for Sustainable ICTs in Developing Countries.","venue":"Int. J. Inf. Technol. Syst. Approach","volume":"6","number":"1","pages":"1-19","year":"2013","type":"Journal Articles","access":"closed","key":"journals/ijitsa/Thongmak13","doi":"10.4018/JITSA.2013010101","ee":"https://doi.org/10.4018/jitsa.2013010101","url":"https://dblp.org/rec/journals/ijitsa/Thongmak13"}, "url":"URL#4029352" }, { "@score":"2", "@id":"4039420", "info":{"authors":{"author":[{"@pid":"71/6245","text":"Todd R. Johnson"},{"@pid":"133/5810","text":"Eliz Markowitz"},{"@pid":"33/2666","text":"Elmer V. Bernstam"},{"@pid":"33/5946","text":"Jorge R. Herskovic"},{"@pid":"t/HaroldWThimbleby","text":"Harold Thimbleby"}]},"title":"SYFSA: A framework for Systematic Yet Flexible Systems Analysis.","venue":"J. Biomed. Informatics","volume":"46","number":"4","pages":"665-675","year":"2013","type":"Journal Articles","access":"open","key":"journals/jbi/JohnsonMBHT13","doi":"10.1016/J.JBI.2013.05.003","ee":"https://doi.org/10.1016/j.jbi.2013.05.003","url":"https://dblp.org/rec/journals/jbi/JohnsonMBHT13"}, "url":"URL#4039420" }, { "@score":"2", "@id":"4047014", "info":{"authors":{"author":[{"@pid":"02/11058","text":"Aishwarya Bakshi"},{"@pid":"79/1834","text":"Amir Talaei-Khoei"},{"@pid":"46/6139","text":"Pradeep Ray"}]},"title":"Adaptive policy framework: A systematic review.","venue":"J. Netw. Comput. Appl.","volume":"36","number":"4","pages":"1261-1271","year":"2013","type":"Journal Articles","access":"closed","key":"journals/jnca/BakshiTR13","doi":"10.1016/J.JNCA.2012.12.007","ee":"https://doi.org/10.1016/j.jnca.2012.12.007","url":"https://dblp.org/rec/journals/jnca/BakshiTR13"}, "url":"URL#4047014" }, { "@score":"2", "@id":"4050294", "info":{"authors":{"author":[{"@pid":"59/1809","text":"César Jesús Pardo Calvache"},{"@pid":"25/6026","text":"Francisco J. Pino"},{"@pid":"18/8313-1","text":"Félix García 0001"},{"@pid":"73/1559","text":"Maria Teresa Baldassarre"},{"@pid":"p/MPiattini","text":"Mario Piattini"}]},"title":"From chaos to the systematic harmonization of multiple reference models: A harmonization framework applied in two case studies.","venue":"J. Syst. Softw.","volume":"86","number":"1","pages":"125-143","year":"2013","type":"Journal Articles","access":"closed","key":"journals/jss/CalvachePGBP13","doi":"10.1016/J.JSS.2012.07.072","ee":"https://doi.org/10.1016/j.jss.2012.07.072","url":"https://dblp.org/rec/journals/jss/CalvachePGBP13"}, "url":"URL#4050294" }, { "@score":"2", "@id":"4050901", "info":{"authors":{"author":[{"@pid":"125/3536","text":"Mahmood Ghaleb Al-Bashayreh"},{"@pid":"31/3897","text":"Nor Laily Hashim"},{"@pid":"125/3569","text":"Ola Taiseer Khorma"}]},"title":"Context-Aware Mobile Patient Monitoring Frameworks: A Systematic Review and Research Agenda.","venue":"J. Softw.","volume":"8","number":"7","pages":"1604-1612","year":"2013","type":"Journal Articles","access":"closed","key":"journals/jsw/Al-BashayrehHK13","doi":"10.4304/JSW.8.7.1604-1612","ee":"https://doi.org/10.4304/jsw.8.7.1604-1612","url":"https://dblp.org/rec/journals/jsw/Al-BashayrehHK13"}, "url":"URL#4050901" }, { "@score":"2", "@id":"4050902", "info":{"authors":{"author":[{"@pid":"125/3536","text":"Mahmood Ghaleb Al-Bashayreh"},{"@pid":"31/3897","text":"Nor Laily Hashim"},{"@pid":"125/3569","text":"Ola Taiseer Khorma"}]},"title":"Software Frameworks in Biomedical Informatics: A Systematic Review and Research Agenda.","venue":"J. Softw.","volume":"8","number":"12","pages":"2996-3006","year":"2013","type":"Journal Articles","access":"closed","key":"journals/jsw/Al-BashayrehHK13a","doi":"10.4304/JSW.8.12.2996-3006","ee":"https://doi.org/10.4304/jsw.8.12.2996-3006","url":"https://dblp.org/rec/journals/jsw/Al-BashayrehHK13a"}, "url":"URL#4050902" }, { "@score":"2", "@id":"4062492", "info":{"authors":{"author":[{"@pid":"122/0302","text":"Drazen Petrov"},{"@pid":"141/5329","text":"Christian Margreitter"},{"@pid":"155/2203","text":"Melanie Grandits"},{"@pid":"83/2913","text":"Chris Oostenbrink"},{"@pid":"22/5379","text":"Bojan Zagrovic"}]},"title":"A Systematic Framework for Molecular Dynamics Simulations of Protein Post-Translational Modifications.","venue":"PLoS Comput. Biol.","volume":"9","number":"7","year":"2013","type":"Journal Articles","access":"open","key":"journals/ploscb/PetrovMGOZ13","doi":"10.1371/JOURNAL.PCBI.1003154","ee":"https://doi.org/10.1371/journal.pcbi.1003154","url":"https://dblp.org/rec/journals/ploscb/PetrovMGOZ13"}, "url":"URL#4062492" }, { "@score":"2", "@id":"4100074", "info":{"authors":{"author":[{"@pid":"133/5810","text":"Eliz Markowitz"},{"@pid":"71/6245","text":"Todd R. Johnson"},{"@pid":"33/2666","text":"Elmer V. Bernstam"},{"@pid":"33/5946","text":"Jorge R. Herskovic"},{"@pid":"t/HaroldWThimbleby","text":"Harold Thimbleby"}]},"title":"A Systematic Yet Flexible Systems Analysis Framework.","venue":"AMIA","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/amia/MarkowitzJBHT13","ee":"https://knowledge.amia.org/amia-55142-a2013e-1.580047/t-06-1.582200/f-006-1.582201/a-332-1.582995/a-333-1.582989","url":"https://dblp.org/rec/conf/amia/MarkowitzJBHT13"}, "url":"URL#4100074" }, { "@score":"2", "@id":"4104149", "info":{"authors":{"author":[{"@pid":"140/0451","text":"Shuo-You Hsu"},{"@pid":"48/9791","text":"Chih-Hsiang Hsu"},{"@pid":"123/8618","text":"Ting-Shuo Hsu"},{"@pid":"18/6918","text":"Jing-Jia Liou"}]},"title":"A Region-Based Framework for Design Feature Identification of Systematic Process Variations.","venue":"Asian Test Symposium","pages":"265-270","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/ats/HsuHHL13","doi":"10.1109/ATS.2013.56","ee":"https://doi.org/10.1109/ATS.2013.56","url":"https://dblp.org/rec/conf/ats/HsuHHL13"}, "url":"URL#4104149" }, { "@score":"2", "@id":"4119904", "info":{"authors":{"author":[{"@pid":"17/9715","text":"Swanand Kadhe"},{"@pid":"91/5383","text":"M. Girish Chandra"},{"@pid":"19/9716","text":"Balaji Janakiram"}]},"title":"A Network Coding Based Framework for Construction of Systematic Minimum Bandwidth Regenerating (MBR) Codes for Distributed Storage.","venue":"COMAD","pages":"45-55","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/comad/KadheCJ13","ee":"http://comad.in/comad2013/pdfs/kadhe.pdf","url":"https://dblp.org/rec/conf/comad/KadheCJ13"}, "url":"URL#4119904" }, { "@score":"2", "@id":"4124322", "info":{"authors":{"author":[{"@pid":"70/2885","text":"Arindam Mallik"},{"@pid":"04/6344","text":"Paul Zuber"},{"@pid":"84/8270","text":"Tsung-Te Liu"},{"@pid":"130/1369","text":"Bharani Chava"},{"@pid":"130/1351","text":"Bhavana Ballal"},{"@pid":"130/1346","text":"Pablo Royer Del Bario"},{"@pid":"23/944","text":"Rogier Baert"},{"@pid":"18/1955","text":"Kris Croes"},{"@pid":"85/5323","text":"Julien Ryckaert"},{"@pid":"02/4695","text":"Mustafa Badaroglu"},{"@pid":"24/6079","text":"Abdelkarim Mercha"},{"@pid":"93/763","text":"Diederik Verkest"}]},"title":"TEASE: a systematic analysis framework for early evaluation of FinFET-based advanced technology nodes.","venue":"DAC","pages":"24:1-24:6","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/dac/MallikZLCBBBCRBMV13","doi":"10.1145/2463209.2488764","ee":"https://doi.org/10.1145/2463209.2488764","url":"https://dblp.org/rec/conf/dac/MallikZLCBBBCRBMV13"}, "url":"URL#4124322" }, { "@score":"2", "@id":"4130014", "info":{"authors":{"author":[{"@pid":"75/5456","text":"Linh Thao Ly"},{"@pid":"05/801","text":"Fabrizio Maria Maggi"},{"@pid":"85/1455","text":"Marco Montali"},{"@pid":"r/StefanieRinderle","text":"Stefanie Rinderle-Ma"},{"@pid":"a/WilMPvanderAalst","text":"Wil M. P. van der Aalst"}]},"title":"A Framework for the Systematic Comparison and Evaluation of Compliance Monitoring Approaches.","venue":"EDOC","pages":"7-16","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/edoc/LyMMRA13","doi":"10.1109/EDOC.2013.11","ee":"https://doi.org/10.1109/EDOC.2013.11","url":"https://dblp.org/rec/conf/edoc/LyMMRA13"}, "url":"URL#4130014" }, { "@score":"2", "@id":"4173875", "info":{"authors":{"author":[{"@pid":"81/4737","text":"Yong Se Kim"},{"@pid":"l/SangWonLee","text":"Sang Won Lee 0001"},{"@pid":"143/8471","text":"Heji Jeong"},{"@pid":"143/8501","text":"Sun Ran Kim"},{"@pid":"143/8495","text":"Jin Hui Kim"},{"@pid":"143/8485","text":"Ji Hye Noh"},{"@pid":"143/8483","text":"Jong Hung Won"}]},"title":"A Systematic Design Framework for Product-Service Systems and Its Implementation.","venue":"ICSSI","pages":"59-66","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icssi/KimLJKKNW13","doi":"10.1109/ICSSI.2013.22","ee":"https://doi.org/10.1109/ICSSI.2013.22","url":"https://dblp.org/rec/conf/icssi/KimLJKKNW13"}, "url":"URL#4173875" }, { "@score":"2", "@id":"4216705", "info":{"authors":{"author":[{"@pid":"23/8904","text":"Shokoofeh Hesari"},{"@pid":"27/4596","text":"Razieh Behjati"},{"@pid":"40/7423-2","text":"Tao Yue 0002"}]},"title":"Towards a systematic requirement-based test generation framework: Industrial challenges and needs.","venue":"RE","pages":"261-266","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/re/HesariBY13","doi":"10.1109/RE.2013.6636727","ee":"https://doi.org/10.1109/RE.2013.6636727","url":"https://dblp.org/rec/conf/re/HesariBY13"}, "url":"URL#4216705" }, { "@score":"2", "@id":"4245532", "info":{"authors":{"author":[{"@pid":"65/6458","text":"Auroop R. Ganguly"},{"@pid":"47/5976","text":"Joseph Whitmeyer"},{"@pid":"50/1517","text":"Olufemi A. Omitaomu"},{"@pid":"137/3843","text":"Peter Brecke"},{"@pid":"05/2604","text":"Mirsad Hadzikadic"},{"@pid":"137/3801","text":"Paul Gilman"},{"@pid":"89/1339","text":"Moutaz Khouja"},{"@pid":"23/7790","text":"Steven J. Fernandez"},{"@pid":"82/57","text":"Christopher N. Eichelberger"},{"@pid":"33/4097","text":"Thom McLean"},{"@pid":"21/8878","text":"Cathy Jiao"},{"@pid":"07/11427","text":"Erin Middleton"},{"@pid":"56/298","text":"Ted Carmichael"},{"@pid":"40/219","text":"Amar Saric"},{"@pid":"62/2750","text":"Min Sun"}]},"title":"Towards a Characterization and Systematic Evaluation Framework for Theories and Models of Human, Social, Behavioral, and Cultural Processes within Agent-Based Models.","venue":"Managing Complexity","pages":"93-136","year":"2013","type":"Parts in Books or Collections","access":"closed","key":"series/sci/GangulyWOBHGKFEMJMCSS13","doi":"10.1007/978-3-642-39295-5_8","ee":"https://doi.org/10.1007/978-3-642-39295-5_8","url":"https://dblp.org/rec/series/sci/GangulyWOBHGKFEMJMCSS13"}, "url":"URL#4245532" }, { "@score":"2", "@id":"4252210", "info":{"authors":{"author":[{"@pid":"130/4033","text":"Daniel Graziotin"},{"@pid":"99/2479-1","text":"Xiaofeng Wang 0001"},{"@pid":"71/5809","text":"Pekka Abrahamsson"}]},"title":"A Framework for Systematic Analysis of Open Access Journals and its Application in Software Engineering and Information Systems.","venue":"CoRR","volume":"abs/1308.2597","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/GraziotinWA13a","ee":"http://arxiv.org/abs/1308.2597","url":"https://dblp.org/rec/journals/corr/GraziotinWA13a"}, "url":"URL#4252210" }, { "@score":"2", "@id":"4299131", "info":{"authors":{"author":[{"@pid":"52/4012","text":"Tobias Mettler"},{"@pid":"81/7393","text":"Dimitri Aristotle Raptis"}]},"title":"What constitutes the field of health information systems? Fostering a systematic framework and research agenda.","venue":"Health Informatics J.","volume":"18","number":"2","pages":"147-156","year":"2012","type":"Journal Articles","access":"closed","key":"journals/hij/MettlerR12","doi":"10.1177/1460458212452496","ee":"https://doi.org/10.1177/1460458212452496","url":"https://dblp.org/rec/journals/hij/MettlerR12"}, "url":"URL#4299131" }, { "@score":"2", "@id":"4308103", "info":{"authors":{"author":[{"@pid":"14/8664","text":"Mansoor Alghooneh"},{"@pid":"54/4158","text":"Qiong Wu"}]},"title":"A Systematic Gait-Planning Framework Negotiating Biomechanically Motivated Characteristics of a Planar bipedal Robot.","venue":"Int. J. Humanoid Robotics","volume":"9","number":"4","year":"2012","type":"Journal Articles","access":"closed","key":"journals/ijhr/AlghoonehW12","doi":"10.1142/S0219843612500314","ee":"https://doi.org/10.1142/S0219843612500314","url":"https://dblp.org/rec/journals/ijhr/AlghoonehW12"}, "url":"URL#4308103" }, { "@score":"2", "@id":"4309180", "info":{"authors":{"author":{"@pid":"122/1636","text":"Mc Donald Van der Merwe"}},"title":"Applying the community of inquiry framework: a novel tool for systematic and economic coding and analysis of forum discourse in situ and in context.","venue":"Int. J. Learn. Technol.","volume":"7","number":"3","pages":"246-260","year":"2012","type":"Journal Articles","access":"closed","key":"journals/ijlt/Merwe12","doi":"10.1504/IJLT.2012.049192","ee":"https://doi.org/10.1504/IJLT.2012.049192","url":"https://dblp.org/rec/journals/ijlt/Merwe12"}, "url":"URL#4309180" }, { "@score":"2", "@id":"4327352", "info":{"authors":{"author":[{"@pid":"33/8389","text":"Marion Lepmets"},{"@pid":"32/2748","text":"Aileen Cater-Steel"},{"@pid":"08/10656","text":"Francis Gacenga"},{"@pid":"17/4929","text":"Eric Ras"}]},"title":"Extending the IT service quality measurement framework through a systematic literature review.","venue":"J. Serv. Sci. Res.","volume":"4","number":"1","pages":"7-47","year":"2012","type":"Journal Articles","access":"closed","key":"journals/jossr/LepmetsCGR12","doi":"10.1007/S12927-012-0001-6","ee":"https://doi.org/10.1007/s12927-012-0001-6","url":"https://dblp.org/rec/journals/jossr/LepmetsCGR12"}, "url":"URL#4327352" }, { "@score":"2", "@id":"4330031", "info":{"authors":{"author":[{"@pid":"06/8199","text":"Oscar Rebollo"},{"@pid":"33/5492","text":"Daniel Mellado"},{"@pid":"f/EduardoFernandezMedina","text":"Eduardo Fernández-Medina"}]},"title":"A Systematic Review of Information Security Governance Frameworks in the Cloud Computing Environment.","venue":"J. Univers. Comput. Sci.","volume":"18","number":"6","pages":"798-815","year":"2012","type":"Journal Articles","access":"open","key":"journals/jucs/RebolloMF12","doi":"10.3217/JUCS-018-06-0798","ee":"https://doi.org/10.3217/jucs-018-06-0798","url":"https://dblp.org/rec/journals/jucs/RebolloMF12"}, "url":"URL#4330031" }, { "@score":"2", "@id":"4366920", "info":{"authors":{"author":[{"@pid":"91/5512","text":"Chunqing Chen"},{"@pid":"99/5318","text":"Shixing Yan"},{"@pid":"88/636","text":"Guopeng Zhao"},{"@pid":"l/BuSungLee","text":"Bu-Sung Lee"},{"@pid":"11/3042","text":"Sharad Singhal"}]},"title":"A Systematic Framework Enabling Automatic Conflict Detection and Explanation in Cloud Service Selection for Enterprises.","venue":"IEEE CLOUD","pages":"883-890","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/IEEEcloud/ChenYZLS12","doi":"10.1109/CLOUD.2012.95","ee":"https://doi.org/10.1109/CLOUD.2012.95","url":"https://dblp.org/rec/conf/IEEEcloud/ChenYZLS12"}, "url":"URL#4366920" }, { "@score":"2", "@id":"4406968", "info":{"authors":{"author":[{"@pid":"71/2967","text":"Kento Emoto"},{"@pid":"74/3745","text":"Sebastian Fischer"},{"@pid":"24/5199","text":"Zhenjiang Hu"}]},"title":"Generate, Test, and Aggregate - A Calculation-based Framework for Systematic Parallel Programming with MapReduce.","venue":"ESOP","pages":"254-273","year":"2012","type":"Conference and Workshop Papers","access":"open","key":"conf/esop/EmotoFH12","doi":"10.1007/978-3-642-28869-2_13","ee":"https://doi.org/10.1007/978-3-642-28869-2_13","url":"https://dblp.org/rec/conf/esop/EmotoFH12"}, "url":"URL#4406968" }, { "@score":"2", "@id":"4451594", "info":{"authors":{"author":[{"@pid":"41/9514","text":"Ali Bigdelou"},{"@pid":"48/10608","text":"Asli Okur"},{"@pid":"41/11495","text":"Max-Emanuel Hoffmann"},{"@pid":"11/11495","text":"Bamshad Azizi"},{"@pid":"n/NassirNavab","text":"Nassir Navab"}]},"title":"Towards Systematic Usability Evaluations for the OR: An Introduction to OR-Use Framework.","venue":"IPCAI","pages":"146-156","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/ipcai/BigdelouOHAN12","doi":"10.1007/978-3-642-30618-1_15","ee":"https://doi.org/10.1007/978-3-642-30618-1_15","url":"https://dblp.org/rec/conf/ipcai/BigdelouOHAN12"}, "url":"URL#4451594" }, { "@score":"2", "@id":"4471736", "info":{"authors":{"author":[{"@pid":"80/2983","text":"Yu Wei"},{"@pid":"65/2520","text":"Hyo-Jeong So"}]},"title":"A Three-level Evaluation Framework For a Systematic Review of Contextual Mobile Learning.","venue":"mLearn","pages":"164-171","year":"2012","type":"Conference and Workshop Papers","access":"open","key":"conf/mlearn/WeiS12","ee":"https://ceur-ws.org/Vol-955/papers/paper_55.pdf","url":"https://dblp.org/rec/conf/mlearn/WeiS12"}, "url":"URL#4471736" }, { "@score":"2", "@id":"4615727", "info":{"authors":{"author":[{"@pid":"70/1648","text":"Chenggao Han"},{"@pid":"14/1190","text":"Naoki Suehiro"},{"@pid":"70/3441","text":"Takeshi Hashimoto"}]},"title":"A Systematic Framework for the Construction of Optimal Complete Complementary Codes.","venue":"IEEE Trans. Inf. Theory","volume":"57","number":"9","pages":"6033-6042","year":"2011","type":"Journal Articles","access":"closed","key":"journals/tit/HanSH11","doi":"10.1109/TIT.2011.2162182","ee":"https://doi.org/10.1109/TIT.2011.2162182","url":"https://dblp.org/rec/journals/tit/HanSH11"}, "url":"URL#4615727" }, { "@score":"2", "@id":"4663829", "info":{"authors":{"author":[{"@pid":"96/8881","text":"Joel Weinberger"},{"@pid":"90/105","text":"Prateek Saxena"},{"@pid":"12/8302","text":"Devdatta Akhawe"},{"@pid":"11/6892","text":"Matthew Finifter"},{"@pid":"13/8735","text":"Eui Chul Richard Shin"},{"@pid":"s/DXSong","text":"Dawn Song"}]},"title":"A Systematic Analysis of XSS Sanitization in Web Application Frameworks.","venue":"ESORICS","pages":"150-171","year":"2011","type":"Conference and Workshop Papers","access":"open","key":"conf/esorics/WeinbergerSAFSS11","doi":"10.1007/978-3-642-23822-2_9","ee":"https://doi.org/10.1007/978-3-642-23822-2_9","url":"https://dblp.org/rec/conf/esorics/WeinbergerSAFSS11"}, "url":"URL#4663829" }, { "@score":"2", "@id":"4665239", "info":{"authors":{"author":[{"@pid":"74/5933","text":"Thomas Birkhölzer"},{"@pid":"84/4927","text":"Christoph Dickmann"},{"@pid":"70/3204","text":"Jürgen Vaupel"}]},"title":"A Framework for Systematic Evaluation of Process Improvement Priorities.","venue":"EUROMICRO-SEAA","pages":"294-301","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/euromicro/BirkholzerDV11","doi":"10.1109/SEAA.2011.52","ee":"https://doi.org/10.1109/SEAA.2011.52","url":"https://dblp.org/rec/conf/euromicro/BirkholzerDV11"}, "url":"URL#4665239" }, { "@score":"2", "@id":"4736419", "info":{"authors":{"author":{"@pid":"12/9549","text":"Mihai Florian"}},"title":"A Framework for Systematic Testing of Multi-threaded Applications.","venue":"PRDC","pages":"278-279","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/prdc/Florian11","doi":"10.1109/PRDC.2011.48","ee":"https://doi.org/10.1109/PRDC.2011.48","url":"https://dblp.org/rec/conf/prdc/Florian11"}, "url":"URL#4736419" }, { "@score":"2", "@id":"4737673", "info":{"authors":{"author":[{"@pid":"39/6042","text":"Sepideh Ghanavati"},{"@pid":"a/DanielAmyot","text":"Daniel Amyot"},{"@pid":"09/1140","text":"Liam Peyton"}]},"title":"A systematic review of goal-oriented requirements management frameworks for business process compliance.","venue":"RELAW","pages":"25-34","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/re/GhanavatiAP11","doi":"10.1109/RELAW.2011.6050270","ee":"https://doi.org/10.1109/RELAW.2011.6050270","url":"https://dblp.org/rec/conf/re/GhanavatiAP11"}, "url":"URL#4737673" }, { "@score":"2", "@id":"4781954", "info":{"authors":{"author":{"@pid":"46/4884","text":"Sebastian Gunreben"}},"title":"Framework for systematic evaluation of protocol performance with respect to out-of-sequence packet arrivals.","pages":"1-163","year":"2010","type":"Books and Theses","access":"unavailable","key":"phd/de/Gunreben2010","ee":"https://d-nb.info/1010074822","url":"https://dblp.org/rec/phd/de/Gunreben2010"}, "url":"URL#4781954" }, { "@score":"2", "@id":"4810164", "info":{"authors":{"author":[{"@pid":"195/1597","text":"Dave Gelders"},{"@pid":"195/1540","text":"Marleen Brans"},{"@pid":"195/1561","text":"Jeroen Maesschalck"},{"@pid":"195/1610","text":"Nathalie Colsoul"}]},"title":"Systematic evaluation of public participation projects: Analytical framework and application based on two Belgian neighborhood watch projects.","venue":"Gov. Inf. Q.","volume":"27","number":"2","pages":"134-140","year":"2010","type":"Journal Articles","access":"closed","key":"journals/giq/GeldersBMC10","doi":"10.1016/J.GIQ.2009.10.003","ee":"https://doi.org/10.1016/j.giq.2009.10.003","url":"https://dblp.org/rec/journals/giq/GeldersBMC10"}, "url":"URL#4810164" }, { "@score":"2", "@id":"4811617", "info":{"authors":{"author":[{"@pid":"77/5221","text":"Hannu Jaakkola"},{"@pid":"t/BernhardThalheim","text":"Bernhard Thalheim"}]},"title":"Framework for high-quality software design and development: a systematic approach.","venue":"IET Softw.","volume":"4","number":"2","pages":"105-118","year":"2010","type":"Journal Articles","access":"closed","key":"journals/iee/JaakkolaT10","doi":"10.1049/IET-SEN.2008.0085","ee":"https://doi.org/10.1049/iet-sen.2008.0085","url":"https://dblp.org/rec/journals/iee/JaakkolaT10"}, "url":"URL#4811617" }, { "@score":"2", "@id":"4818072", "info":{"authors":{"author":{"@pid":"05/7308","text":"Richard E. Scott"}},"title":"'Pragmatic Evaluation': A Conceptual Framework for Designing a Systematic Approach to Evaluation of eHealth Interventions.","venue":"Int. J. E Health Medical Commun.","volume":"1","number":"2","pages":"1-11","year":"2010","type":"Journal Articles","access":"closed","key":"journals/ijehmc/Scott10","doi":"10.4018/JEHMC.2010040101","ee":"https://doi.org/10.4018/jehmc.2010040101","url":"https://dblp.org/rec/journals/ijehmc/Scott10"}, "url":"URL#4818072" }, { "@score":"2", "@id":"4826622", "info":{"authors":{"author":[{"@pid":"06/9195","text":"Kim M. Unertl"},{"@pid":"66/9193","text":"Laurie L. Novak"},{"@pid":"94/4561","text":"Kevin B. Johnson"},{"@pid":"17/7327","text":"Nancy M. Lorenzi"}]},"title":"Traversing the many paths of workflow research: developing a conceptual framework of workflow terminology through a systematic literature review.","venue":"J. Am. Medical Informatics Assoc.","volume":"17","number":"3","pages":"265-273","year":"2010","type":"Journal Articles","access":"closed","key":"journals/jamia/UnertlNJL10","doi":"10.1136/JAMIA.2010.004333","ee":"https://doi.org/10.1136/jamia.2010.004333","url":"https://dblp.org/rec/journals/jamia/UnertlNJL10"}, "url":"URL#4826622" }, { "@score":"2", "@id":"4836152", "info":{"authors":{"author":[{"@pid":"68/3683","text":"Fangwen Fu"},{"@pid":"s/MihaelavanderSchaar","text":"Mihaela van der Schaar"}]},"title":"A systematic framework for dynamically optimizing multi-user wireless video transmission.","venue":"IEEE J. Sel. Areas Commun.","volume":"28","number":"3","pages":"308-320","year":"2010","type":"Journal Articles","access":"closed","key":"journals/jsac/FuS10","doi":"10.1109/JSAC.2010.100403","ee":"https://doi.org/10.1109/JSAC.2010.100403","url":"https://dblp.org/rec/journals/jsac/FuS10"}, "url":"URL#4836152" }, { "@score":"2", "@id":"4858331", "info":{"authors":{"author":[{"@pid":"25/1096","text":"Lars Schmitt"},{"@pid":"72/1999","text":"Heinrich Meyr"}]},"title":"A Systematic Framework for Iterative Maximum Likelihood Receiver Design.","venue":"IEEE Trans. Commun.","volume":"58","number":"7","pages":"2035-2045","year":"2010","type":"Journal Articles","access":"closed","key":"journals/tcom/SchmittM10","doi":"10.1109/TCOMM.2010.07.080357","ee":"https://doi.org/10.1109/TCOMM.2010.07.080357","url":"https://dblp.org/rec/journals/tcom/SchmittM10"}, "url":"URL#4858331" }, { "@score":"2", "@id":"4868677", "info":{"authors":{"author":[{"@pid":"95/7994","text":"Agnes Owuato Odongo"},{"@pid":"06/4939","text":"Sungwon Kang"},{"@pid":"02/4002","text":"In-Young Ko"}]},"title":"A Scheme for Systematically Selecting an Enterprise Architecture Framework.","venue":"ACIS-ICIS","pages":"665-670","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/ACISicis/OdongoKK10","doi":"10.1109/ICIS.2010.85","ee":"https://doi.org/10.1109/ICIS.2010.85","url":"https://dblp.org/rec/conf/ACISicis/OdongoKK10"}, "url":"URL#4868677" }, { "@score":"2", "@id":"4879230", "info":{"authors":{"author":[{"@pid":"77/4002","text":"Frederic Py"},{"@pid":"22/999","text":"Kanna Rajan"},{"@pid":"07/4315","text":"Conor McGann"}]},"title":"A systematic agent framework for situated autonomous systems.","venue":"AAMAS","pages":"583-590","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/atal/PyRM10","ee":"https://dl.acm.org/citation.cfm?id=1838183","url":"https://dblp.org/rec/conf/atal/PyRM10"}, "url":"URL#4879230" }, { "@score":"2", "@id":"4899989", "info":{"authors":{"author":[{"@pid":"02/807","text":"Stefan Weinbrenner"},{"@pid":"08/860","text":"Jan Engler"},{"@pid":"62/5038","text":"Astrid Wichmann"},{"@pid":"h/HeinzUlrichHoppe","text":"Ulrich Hoppe"}]},"title":"Monitoring and Analysing Students' Systematic Behaviour - The SCY Pedagogical Agent Framework.","venue":"EC-TEL","pages":"602-607","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/ectel/WeinbrennerEWH10","doi":"10.1007/978-3-642-16020-2_61","ee":"https://doi.org/10.1007/978-3-642-16020-2_61","url":"https://dblp.org/rec/conf/ectel/WeinbrennerEWH10"}, "url":"URL#4899989" }, { "@score":"2", "@id":"4903237", "info":{"authors":{"author":[{"@pid":"87/8239","text":"Dennis Westermann"},{"@pid":"99/3555","text":"Jens Happe"},{"@pid":"13/7073-1","text":"Michael Hauck 0001"},{"@pid":"55/10406","text":"Christian Heupel"}]},"title":"The Performance Cockpit Approach: A Framework For Systematic Performance Evaluations.","venue":"EUROMICRO-SEAA","pages":"31-38","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/euromicro/WestermannHHH10","doi":"10.1109/SEAA.2010.24","ee":"https://doi.org/10.1109/SEAA.2010.24","url":"https://dblp.org/rec/conf/euromicro/WestermannHHH10"}, "url":"URL#4903237" }, { "@score":"2", "@id":"4968158", "info":{"authors":{"author":[{"@pid":"17/1781","text":"Yonggui Wang"},{"@pid":"03/2363","text":"Dongming Xu"},{"@pid":"93/4634","text":"Fiona H. Rohde"}]},"title":"A Systematic Framework of IT-Enabled Service Research towards Formulating Research Questions in IS Realm.","venue":"PACIS","pages":"68","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/pacis/WangXR10","ee":"http://aisel.aisnet.org/pacis2010/68","url":"https://dblp.org/rec/conf/pacis/WangXR10"}, "url":"URL#4968158" }, { "@score":"2", "@id":"5002597", "info":{"authors":{"author":[{"@pid":"70/1648","text":"Chenggao Han"},{"@pid":"14/1190","text":"Naoki Suehiro"},{"@pid":"70/3441","text":"Takeshi Hashimoto"}]},"title":"A Systematic Framework for the Construction of Optimal Complete Complementary Codes","venue":"CoRR","volume":"abs/1003.2681","year":"2010","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1003-2681","ee":"http://arxiv.org/abs/1003.2681","url":"https://dblp.org/rec/journals/corr/abs-1003-2681"}, "url":"URL#5002597" }, { "@score":"2", "@id":"5045582", "info":{"authors":{"author":[{"@pid":"68/4199","text":"Shun Long"},{"@pid":"61/2980","text":"Grigori Fursin"}]},"title":"Systematic search within an optimisation space based on Unified Transformation Framework.","venue":"Int. J. Comput. Sci. Eng.","volume":"4","number":"2","pages":"102-111","year":"2009","type":"Journal Articles","access":"closed","key":"journals/ijcse/LongF09","doi":"10.1504/IJCSE.2009.027002","ee":"https://doi.org/10.1504/IJCSE.2009.027002","url":"https://dblp.org/rec/journals/ijcse/LongF09"}, "url":"URL#5045582" }, { "@score":"2", "@id":"5045894", "info":{"authors":{"author":[{"@pid":"88/5711","text":"Yi-Hsung Li"},{"@pid":"85/5464","text":"Chyi-Ren Dow"},{"@pid":"07/6421","text":"Cheng-Min Lin"},{"@pid":"85/6335","text":"Sheng-Chang Chen"},{"@pid":"59/6095","text":"Fu-Wei Hsu"}]},"title":"A Systematic Framework of Virtual Laboratories Using Mobile Agent and Design Pattern Technologies.","venue":"Int. J. Distance Educ. Technol.","volume":"7","number":"3","pages":"26-43","year":"2009","type":"Journal Articles","access":"closed","key":"journals/ijdet/LiDLCH09","doi":"10.4018/JDET.2009070102","ee":"https://doi.org/10.4018/jdet.2009070102","url":"https://dblp.org/rec/journals/ijdet/LiDLCH09"}, "url":"URL#5045894" }, { "@score":"2", "@id":"5060014", "info":{"authors":{"author":[{"@pid":"35/4310","text":"Enrico Scarso"},{"@pid":"01/1082","text":"Ettore Bolisani"},{"@pid":"29/7469","text":"Luigi Salvador"}]},"title":"A systematic framework for analysing the critical success factors of communities of practice.","venue":"J. Knowl. Manag.","volume":"13","number":"6","pages":"431-447","year":"2009","type":"Journal Articles","access":"closed","key":"journals/jkm/ScarsoBS09","doi":"10.1108/13673270910997105","ee":"https://doi.org/10.1108/13673270910997105","url":"https://dblp.org/rec/journals/jkm/ScarsoBS09"}, "url":"URL#5060014" }, { "@score":"2", "@id":"5063340", "info":{"authors":{"author":[{"@pid":"76/7957","text":"Fatemeh Saghafi"},{"@pid":"45/8073","text":"Kolsoom Abbasi Shahkooh"},{"@pid":"21/8073","text":"Akbar Kary Dolat Abadi"},{"@pid":"78/6645","text":"Behrouz Zarei"}]},"title":"Proposed E-government Foresight Framework in Developing Countries, A Systematic Approach.","venue":"J. Softw.","volume":"4","number":"6","pages":"577-583","year":"2009","type":"Journal Articles","access":"closed","key":"journals/jsw/SaghafiSAZ09","doi":"10.4304/JSW.4.6.577-583","ee":"https://doi.org/10.4304/jsw.4.6.577-583","url":"https://dblp.org/rec/journals/jsw/SaghafiSAZ09"}, "url":"URL#5063340" }, { "@score":"2", "@id":"5090807", "info":{"authors":{"author":[{"@pid":"68/3683","text":"Fangwen Fu"},{"@pid":"s/MihaelavanderSchaar","text":"Mihaela van der Schaar"}]},"title":"A New Systematic Framework for Autonomous Cross-Layer Optimization.","venue":"IEEE Trans. Veh. Technol.","volume":"58","number":"4","pages":"1887-1903","year":"2009","type":"Journal Articles","access":"closed","key":"journals/tvt/FuS09","doi":"10.1109/TVT.2008.2007418","ee":"https://doi.org/10.1109/TVT.2008.2007418","url":"https://dblp.org/rec/journals/tvt/FuS09"}, "url":"URL#5090807" }, { "@score":"2", "@id":"5093608", "info":{"authors":{"author":[{"@pid":"76/7436","text":"Lixiao Zheng"},{"@pid":"75/248","text":"Haiming Chen"}]},"title":"A Systematic Framework for Grammar Testing.","venue":"ACIS-ICIS","pages":"1013-1019","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/ACISicis/ZhengC09","doi":"10.1109/ICIS.2009.193","ee":"https://doi.org/10.1109/ICIS.2009.193","url":"https://dblp.org/rec/conf/ACISicis/ZhengC09"}, "url":"URL#5093608" }, { "@score":"2", "@id":"5095475", "info":{"authors":{"author":[{"@pid":"81/3692","text":"Line C. Pouchard"},{"@pid":"13/8809","text":"Jonathan D. Dobson"},{"@pid":"44/10905","text":"Joseph P. Trien"}]},"title":"A Framework for the Systematic Collection of Open Source Intelligence.","venue":"AAAI Spring Symposium - Technosocial Predictive Analytics","pages":"102-107","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/aaaiss/PouchardDT09","ee":"http://www.aaai.org/Library/Symposia/Spring/2009/ss09-09-019.php","url":"https://dblp.org/rec/conf/aaaiss/PouchardDT09"}, "url":"URL#5095475" }, { "@score":"2", "@id":"5122484", "info":{"authors":{"author":[{"@pid":"49/10212","text":"Dehong Huo"},{"@pid":"44/4949","text":"Paul G. Maropoulos"},{"@pid":"98/1856","text":"Chun Hung Cheng"}]},"title":"The Framework of the Virtual Laser Tracker - A Systematic Approach to the Assessment of Error sources and Uncertainty in Laser Tracker Measurement.","venue":"DET","pages":"507-523","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/det/HuoMC09","doi":"10.1007/978-3-642-10430-5_39","ee":"https://doi.org/10.1007/978-3-642-10430-5_39","url":"https://dblp.org/rec/conf/det/HuoMC09"}, "url":"URL#5122484" }, { "@score":"2", "@id":"5140673", "info":{"authors":{"author":[{"@pid":"65/2690","text":"Mara Nikolaidou"},{"@pid":"43/4858","text":"Anargyros Tsadimas"},{"@pid":"86/1088","text":"Nancy Alexopoulou"},{"@pid":"29/806","text":"Dimosthenis Anagnostopoulos"}]},"title":"Employing Zachman Enterprise Architecture Framework to Systematically Perform Model-Based System Engineering Activities.","venue":"HICSS","pages":"1-10","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/hicss/NikolaidouTAA09","doi":"10.1109/HICSS.2009.189","ee":"https://doi.org/10.1109/HICSS.2009.189","url":"https://dblp.org/rec/conf/hicss/NikolaidouTAA09"}, "url":"URL#5140673" }, { "@score":"2", "@id":"5147529", "info":{"authors":{"author":[{"@pid":"57/4432","text":"Rani S. Ghaida"},{"@pid":"06/1383-1","text":"Puneet Gupta 0001"}]},"title":"A framework for early and systematic evaluation of design rules.","venue":"ICCAD","pages":"615-622","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/iccad/GhaidaG09","doi":"10.1145/1687399.1687513","ee":"https://doi.org/10.1145/1687399.1687513","url":"https://dblp.org/rec/conf/iccad/GhaidaG09"}, "url":"URL#5147529" }, { "@score":"2", "@id":"5228111", "info":{"authors":{"author":[{"@pid":"68/3683","text":"Fangwen Fu"},{"@pid":"s/MihaelavanderSchaar","text":"Mihaela van der Schaar"}]},"title":"A Systematic Framework for Dynamically Optimizing Multi-User Wireless Video Transmission","venue":"CoRR","volume":"abs/0903.0207","year":"2009","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-0903-0207","ee":"http://arxiv.org/abs/0903.0207","url":"https://dblp.org/rec/journals/corr/abs-0903-0207"}, "url":"URL#5228111" }, { "@score":"2", "@id":"5244166", "info":{"authors":{"author":[{"@pid":"55/4898","text":"Ari Rantanen"},{"@pid":"r/JuhoRousu","text":"Juho Rousu"},{"@pid":"62/720","text":"Paula Jouhten"},{"@pid":"59/2754","text":"Nicola Zamboni"},{"@pid":"93/3769","text":"Hannu Maaheimo"},{"@pid":"u/EskoUkkonen","text":"Esko Ukkonen"}]},"title":"An analytic and systematic framework for estimating metabolic flux ratios from 13C tracer experiments.","venue":"BMC Bioinform.","volume":"9","year":"2008","type":"Journal Articles","access":"open","key":"journals/bmcbi/RantanenRJZMU08","doi":"10.1186/1471-2105-9-266","ee":"https://doi.org/10.1186/1471-2105-9-266","url":"https://dblp.org/rec/journals/bmcbi/RantanenRJZMU08"}, "url":"URL#5244166" }, { "@score":"2", "@id":"5331099", "info":{"authors":{"author":[{"@pid":"22/3826","text":"Pietro Baroni"},{"@pid":"77/1121","text":"Massimiliano Giacomin"}]},"title":"A systematic classification of argumentation frameworks where semantics agree.","venue":"COMMA","pages":"37-48","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/comma/BaroniG08a","ee":"http://www.booksonline.iospress.nl/Content/View.aspx?piid=9266","url":"https://dblp.org/rec/conf/comma/BaroniG08a"}, "url":"URL#5331099" }, { "@score":"2", "@id":"5343428", "info":{"authors":{"author":[{"@pid":"00/353","text":"Sojan Markose"},{"@pid":"48/2518","text":"Xiaoqing Frank Liu"},{"@pid":"91/2733","text":"Bruce M. McMillin"}]},"title":"A Systematic Framework for Structured Object-Oriented Security Requirements Analysis in Embedded Systems.","venue":"EUC","pages":"75-81","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/MarkoseLM08","doi":"10.1109/EUC.2008.92","ee":"https://doi.org/10.1109/EUC.2008.92","url":"https://dblp.org/rec/conf/euc/MarkoseLM08"}, "url":"URL#5343428" }, { "@score":"2", "@id":"5398435", "info":{"authors":{"author":[{"@pid":"93/2516","text":"Mi-Sun Ryu"},{"@pid":"61/9605","text":"Youngmin Kim"},{"@pid":"19/3882","text":"Hong-Shik Park"}]},"title":"Systematic QoS Class Mapping Framework over Multiple Heterogeneous Networks.","venue":"NEW2AN","pages":"212-221","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/new2an/RyuKP08","doi":"10.1007/978-3-540-85500-2_19","ee":"https://doi.org/10.1007/978-3-540-85500-2_19","url":"https://dblp.org/rec/conf/new2an/RyuKP08"}, "url":"URL#5398435" }, { "@score":"2", "@id":"5402248", "info":{"authors":{"author":[{"@pid":"21/3382","text":"Harri Oinas-Kukkonen"},{"@pid":"59/5195","text":"Marja Harjumaa"}]},"title":"A Systematic Framework for Designing and Evaluating Persuasive Systems.","venue":"PERSUASIVE","pages":"164-176","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/persuasive/Oinas-KukkonenH08","doi":"10.1007/978-3-540-68504-3_15","ee":"https://doi.org/10.1007/978-3-540-68504-3_15","url":"https://dblp.org/rec/conf/persuasive/Oinas-KukkonenH08"}, "url":"URL#5402248" }, { "@score":"2", "@id":"5441042", "info":{"authors":{"author":{"@pid":"l/ZhuoweiLi","text":"Zhuowei Li 0001"}},"title":"Framework for systematic design, analysis and evaluation of intrusion detection systems","year":"2007","type":"Books and Theses","access":"closed","key":"phd/sg/Li07","doi":"10.32657/10356/2481","ee":"https://doi.org/10.32657/10356/2481","url":"https://dblp.org/rec/phd/sg/Li07"}, "url":"URL#5441042" }, { "@score":"2", "@id":"5475660", "info":{"authors":{"author":[{"@pid":"30/1092","text":"Steven E. Labkoff"},{"@pid":"21/2486","text":"William A. Yasnoff"}]},"title":"A framework for systematic evaluation of health information infrastructure progress in communities.","venue":"J. Biomed. Informatics","volume":"40","number":"2","pages":"100-105","year":"2007","type":"Journal Articles","access":"open","key":"journals/jbi/LabkoffY07","doi":"10.1016/J.JBI.2006.01.002","ee":"https://doi.org/10.1016/j.jbi.2006.01.002","url":"https://dblp.org/rec/journals/jbi/LabkoffY07"}, "url":"URL#5475660" }, { "@score":"2", "@id":"5491587", "info":{"authors":{"author":[{"@pid":"10/5980-2","text":"Yuan Lu 0002"},{"@pid":"47/1419","text":"Elke den Ouden"},{"@pid":"07/1288","text":"Aarnout Brombacher"},{"@pid":"128/8532","text":"Wim Geudens"},{"@pid":"58/20","text":"Herman Hartmann"}]},"title":"Towards a more systematic analysis of uncertain user-product interactions in product development: an enhanced user-product interaction framework.","venue":"Qual. Reliab. Eng. Int.","volume":"23","number":"1","pages":"19-29","year":"2007","type":"Journal Articles","access":"closed","key":"journals/qre/LuOBGH07","doi":"10.1002/QRE.820","ee":"https://doi.org/10.1002/qre.820","url":"https://dblp.org/rec/journals/qre/LuOBGH07"}, "url":"URL#5491587" }, { "@score":"2", "@id":"5533251", "info":{"authors":{"author":{"@pid":"25/5360","text":"Hansje Braam"}},"title":"Structural Theory of Science as a Systematic Framework for the Design of DL's and CD's for E-science.","venue":"Description Logics","year":"2007","type":"Conference and Workshop Papers","access":"open","key":"conf/dlog/Braam07","ee":"https://ceur-ws.org/Vol-250/paper_31.pdf","url":"https://dblp.org/rec/conf/dlog/Braam07"}, "url":"URL#5533251" }, { "@score":"2", "@id":"5593381", "info":{"authors":{"author":[{"@pid":"35/5274","text":"Yihua He"},{"@pid":"41/5119","text":"Georgos Siganos"},{"@pid":"f/MichalisFaloutsos","text":"Michalis Faloutsos"},{"@pid":"k/SrikanthVKrishnamurthy","text":"Srikanth V. Krishnamurthy"}]},"title":"A Systematic Framework for Unearthing the Missing Links: Measurements and Impact.","venue":"NSDI","year":"2007","type":"Conference and Workshop Papers","access":"open","key":"conf/nsdi/HeSFK07","ee":"http://www.usenix.org/events/nsdi07/tech/he.html","url":"https://dblp.org/rec/conf/nsdi/HeSFK07"}, "url":"URL#5593381" }, { "@score":"2", "@id":"5635724", "info":{"authors":{"author":[{"@pid":"80/6075","text":"Karl F. Rauscher"},{"@pid":"42/3822","text":"Richard E. Krock"},{"@pid":"43/3199","text":"James P. Runyon"}]},"title":"Eight ingredients of communications infrastructure: A systematic and comprehensive framework for enhancing network reliability and security.","venue":"Bell Labs Tech. J.","volume":"11","number":"3","pages":"73-81","year":"2006","type":"Journal Articles","access":"closed","key":"journals/bell/RauscherKR06","doi":"10.1002/BLTJ.20179","ee":"https://doi.org/10.1002/bltj.20179","url":"https://dblp.org/rec/journals/bell/RauscherKR06"}, "url":"URL#5635724" }, { "@score":"2", "@id":"5635906", "info":{"authors":{"author":[{"@pid":"32/724-3","text":"Jiang Du 0003"},{"@pid":"23/3792","text":"Joel S. Rozowsky"},{"@pid":"70/5257","text":"Jan O. Korbel"},{"@pid":"80/3996","text":"Zhengdong D. Zhang"},{"@pid":"14/5963","text":"Thomas E. Royce"},{"@pid":"93/3072","text":"Martin H. Schultz"},{"@pid":"50/5034","text":"Michael Snyder 0001"},{"@pid":"67/5132","text":"Mark Gerstein"}]},"title":"A supervised hidden markov model framework for efficiently segmenting tiling array data in transcriptional and chIP-chip experiments: systematically incorporating validated biological knowledge.","venue":"Bioinform.","volume":"22","number":"24","pages":"3016-3024","year":"2006","type":"Journal Articles","access":"closed","key":"journals/bioinformatics/DuRKZRSSG06","doi":"10.1093/BIOINFORMATICS/BTL515","ee":"https://doi.org/10.1093/bioinformatics/btl515","url":"https://dblp.org/rec/journals/bioinformatics/DuRKZRSSG06"}, "url":"URL#5635906" }, { "@score":"2", "@id":"5638425", "info":{"authors":{"author":[{"@pid":"11/7160","text":"Mano Ram Maurya"},{"@pid":"83/4138","text":"Santhoji Katare"},{"@pid":"17/1818","text":"Priyan R. Patkar"},{"@pid":"29/7097","text":"Ann E. Rundell"},{"@pid":"08/83","text":"Venkat Venkatasubramanian"}]},"title":"A systematic framework for the design of reduced-order models for signal transduction pathways from a control theoretic perspective.","venue":"Comput. Chem. Eng.","volume":"30","number":"3","pages":"437-452","year":"2006","type":"Journal Articles","access":"closed","key":"journals/cce/MauryaKPRV06","doi":"10.1016/J.COMPCHEMENG.2005.10.003","ee":"https://doi.org/10.1016/j.compchemeng.2005.10.003","url":"https://dblp.org/rec/journals/cce/MauryaKPRV06"}, "url":"URL#5638425" }, { "@score":"2", "@id":"5640431", "info":{"authors":{"author":[{"@pid":"05/5316","text":"Li Lao"},{"@pid":"28/1330","text":"Jun-Hong Cui"},{"@pid":"g/MarioGerla","text":"Mario Gerla"}]},"title":"A framework for realistic and systematic multicast performance evaluation.","venue":"Comput. Networks","volume":"50","number":"12","pages":"2054-2070","year":"2006","type":"Journal Articles","access":"closed","key":"journals/cn/LaoCG06","doi":"10.1016/J.COMNET.2005.09.027","ee":"https://doi.org/10.1016/j.comnet.2005.09.027","url":"https://dblp.org/rec/journals/cn/LaoCG06"}, "url":"URL#5640431" }, { "@score":"2", "@id":"5662376", "info":{"authors":{"author":[{"@pid":"17/2892","text":"R. J. Urbanic"},{"@pid":"15/1096","text":"Waguih H. ElMaraghy"},{"@pid":"18/4172","text":"Hoda A. ElMaraghy"}]},"title":"An Integrated Systematic Design Recovery Framework.","venue":"J. Comput. Inf. Sci. Eng.","volume":"6","number":"4","pages":"318-330","year":"2006","type":"Journal Articles","access":"closed","key":"journals/jcise/UrbanicEE06","doi":"10.1115/1.2353854","ee":"https://doi.org/10.1115/1.2353854","url":"https://dblp.org/rec/journals/jcise/UrbanicEE06"}, "url":"URL#5662376" }, { "@score":"2", "@id":"5676991", "info":{"authors":{"author":[{"@pid":"22/7901","text":"Jinkyun Park"},{"@pid":"58/7897","text":"Wondea Jung"}]},"title":"The appropriateness of the systematic framework to develop diagnosis procedures of nuclear power plants - an experimental verification.","venue":"Reliab. Eng. Syst. Saf.","volume":"91","number":"1","pages":"53-65","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ress/ParkJ06","doi":"10.1016/J.RESS.2004.11.019","ee":"https://doi.org/10.1016/j.ress.2004.11.019","url":"https://dblp.org/rec/journals/ress/ParkJ06"}, "url":"URL#5676991" }, { "@score":"2", "@id":"5715004", "info":{"authors":{"author":[{"@pid":"08/269-1","text":"John Keane 0001"},{"@pid":"80/4647","text":"Hanyong Eom"},{"@pid":"125/7918","text":"Tony Tae-Hyoung Kim"},{"@pid":"s/SachinSSapatnekar","text":"Sachin S. Sapatnekar"},{"@pid":"31/4424","text":"Chris H. Kim"}]},"title":"Subthreshold logical effort: a systematic framework for optimal subthreshold device sizing.","venue":"DAC","pages":"425-428","year":"2006","type":"Conference and Workshop Papers","access":"closed","key":"conf/dac/KeaneEKSK06","doi":"10.1145/1146909.1147022","ee":"https://doi.org/10.1145/1146909.1147022","url":"https://dblp.org/rec/conf/dac/KeaneEKSK06"}, "url":"URL#5715004" }, { "@score":"2", "@id":"5766469", "info":{"authors":{"author":[{"@pid":"38/860","text":"Simon P. Chung"},{"@pid":"m/AloysiusKMok","text":"Aloysius K. Mok"}]},"title":"The LAIDS/LIDS Framework for Systematic IPS Design.","venue":"IWIA","pages":"3-11","year":"2006","type":"Conference and Workshop Papers","access":"closed","key":"conf/iwia/ChungM06","doi":"10.1109/IWIA.2006.21","ee":"https://doi.org/10.1109/IWIA.2006.21","url":"https://dblp.org/rec/conf/iwia/ChungM06"}, "url":"URL#5766469" }, { "@score":"2", "@id":"5776680", "info":{"authors":{"author":[{"@pid":"97/1909","text":"Felix Köbler"},{"@pid":"74/2619","text":"Jan Marco Leimeister"},{"@pid":"20/6664","text":"Artur Lugmayr"}]},"title":"Framework for Systematic and Strategic Planning of Innovation-Based Mobile Broadband Services.","venue":"PDP","pages":"366-369","year":"2006","type":"Conference and Workshop Papers","access":"closed","key":"conf/pdp/KoblerLL06","doi":"10.1109/PDP.2006.38","ee":"https://doi.org/10.1109/PDP.2006.38","url":"https://dblp.org/rec/conf/pdp/KoblerLL06"}, "url":"URL#5776680" }, { "@score":"2", "@id":"5795529", "info":{"authors":{"author":[{"@pid":"61/6023","text":"Susanne Kandl"},{"@pid":"48/5592","text":"Raimund Kirner"},{"@pid":"90/3050","text":"Peter P. Puschner"}]},"title":"Development of a Framework for Automated Systematic Testing of Safety-Critical Embedded Systems.","venue":"WISES","pages":"65-77","year":"2006","type":"Conference and Workshop Papers","access":"closed","key":"conf/wises/KandlKP06","doi":"10.1109/WISES.2006.329116","ee":"https://doi.org/10.1109/WISES.2006.329116","url":"https://dblp.org/rec/conf/wises/KandlKP06"}, "url":"URL#5795529" }, { "@score":"2", "@id":"5838142", "info":{"authors":{"author":[{"@pid":"206/2937","text":"R. Jea"},{"@pid":"96/6237","text":"Chao-Ton Su"},{"@pid":"73/11091","text":"J.-L. Lin"}]},"title":"Time aggregation effect on the correlation coefficient: added-systematically sampled framework.","venue":"J. Oper. Res. Soc.","volume":"56","number":"11","pages":"1303-1309","year":"2005","type":"Journal Articles","access":"closed","key":"journals/jors/JeaSL05","doi":"10.1057/PALGRAVE.JORS.2601947","ee":"https://doi.org/10.1057/palgrave.jors.2601947","url":"https://dblp.org/rec/journals/jors/JeaSL05"}, "url":"URL#5838142" }, { "@score":"2", "@id":"5858206", "info":{"authors":{"author":[{"@pid":"88/4138-1","text":"Arnab Roy 0001"},{"@pid":"269/5976","text":"Subrat Kumar Panda"},{"@pid":"75/4223-4","text":"Rajeev Kumar 0004"},{"@pid":"c/PPChakrabarti","text":"P. P. Chakrabarti 0001"}]},"title":"A framework for systematic validation and debugging of pipeline simulators.","venue":"ACM Trans. Design Autom. Electr. Syst.","volume":"10","number":"3","pages":"462-491","year":"2005","type":"Journal Articles","access":"closed","key":"journals/todaes/RoyPKC05","doi":"10.1145/1080334.1080336","ee":"https://doi.org/10.1145/1080334.1080336","url":"https://dblp.org/rec/journals/todaes/RoyPKC05"}, "url":"URL#5858206" }, { "@score":"2", "@id":"5881380", "info":{"authors":{"author":[{"@pid":"22/5422","text":"Yi Jiao"},{"@pid":"29/6600","text":"Baifeng Wu"},{"@pid":"95/1161-5","text":"Kun Zhu 0005"},{"@pid":"18/6339","text":"Qiang Yu"}]},"title":"Towards a Systematic Conflict Resolution Policy in Multi-agent System: A Conceptual Framework.","venue":"CSCWD","pages":"274-283","year":"2005","type":"Conference and Workshop Papers","access":"closed","key":"conf/cscwd/JiaoWZY05","doi":"10.1007/11686699_28","ee":"https://doi.org/10.1007/11686699_28","url":"https://dblp.org/rec/conf/cscwd/JiaoWZY05"}, "url":"URL#5881380" }, { "@score":"2", "@id":"5920808", "info":{"authors":{"author":[{"@pid":"57/5632","text":"Mahmoud Elassal"},{"@pid":"55/3227-1","text":"Ashok Kumar 0001"},{"@pid":"b/MagdyABayoumi","text":"Magdy A. Bayoumi"}]},"title":"A systematic framework for high throughput MAP decoder VLSI architectures.","venue":"ISCAS","pages":"29-32","year":"2005","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscas/ElassalKB05","doi":"10.1109/ISCAS.2005.1464516","ee":"https://doi.org/10.1109/ISCAS.2005.1464516","url":"https://dblp.org/rec/conf/iscas/ElassalKB05"}, "url":"URL#5920808" }, { "@score":"2", "@id":"5991159", "info":{"authors":{"author":{"@pid":"26/5249","text":"Yousif Mustafa"}},"title":"A Systematic Framework for Conducting Research Projects in Undergraduate Courses.","venue":"J. Inf. Syst. Educ.","volume":"15","number":"1","pages":"35-40","year":"2004","type":"Journal Articles","access":"open","key":"journals/jisedu/Mustafa04","ee":"https://jise.org/Volume15/n1/JISEv15n1p35.html","url":"https://dblp.org/rec/journals/jisedu/Mustafa04"}, "url":"URL#5991159" }, { "@score":"2", "@id":"5992522", "info":{"authors":{"author":[{"@pid":"40/2321","text":"Karim Seada"},{"@pid":"h/AhmedHelmy","text":"Ahmed Helmy"},{"@pid":"g/SandeepKGupta","text":"Sandeep Gupta 0001"}]},"title":"A framework for systematic evaluation of multicast congestion control protocols.","venue":"IEEE J. Sel. Areas Commun.","volume":"22","number":"10","pages":"2048-2061","year":"2004","type":"Journal Articles","access":"closed","key":"journals/jsac/SeadaHG04","doi":"10.1109/JSAC.2004.836013","ee":"https://doi.org/10.1109/JSAC.2004.836013","url":"https://dblp.org/rec/journals/jsac/SeadaHG04"}, "url":"URL#5992522" }, { "@score":"2", "@id":"6000386", "info":{"authors":{"author":[{"@pid":"22/7901","text":"Jinkyun Park"},{"@pid":"58/7897","text":"Wondea Jung"}]},"title":"A study on the systematic framework to develop effective diagnosis procedures of nuclear power plants.","venue":"Reliab. Eng. Syst. Saf.","volume":"84","number":"3","pages":"319-335","year":"2004","type":"Journal Articles","access":"closed","key":"journals/ress/ParkJ04","doi":"10.1016/J.RESS.2003.12.004","ee":"https://doi.org/10.1016/j.ress.2003.12.004","url":"https://dblp.org/rec/journals/ress/ParkJ04"}, "url":"URL#6000386" }, { "@score":"2", "@id":"6010153", "info":{"authors":{"author":[{"@pid":"50/3087","text":"Sung Kim"},{"@pid":"52/960","text":"Farokh B. Bastani"},{"@pid":"51/5492","text":"I-Ling Yen"},{"@pid":"c/IngRayChen","text":"Ing-Ray Chen"}]},"title":"Systematic Reliability Analysis of a Class of Application-Specific Embedded Software Frameworks.","venue":"IEEE Trans. Software Eng.","volume":"30","number":"4","pages":"218-230","year":"2004","type":"Journal Articles","access":"closed","key":"journals/tse/KimBYC04","doi":"10.1109/TSE.2004.1274042","ee":"https://doi.org/10.1109/TSE.2004.1274042","url":"https://dblp.org/rec/journals/tse/KimBYC04"}, "url":"URL#6010153" }, { "@score":"2", "@id":"6035442", "info":{"authors":{"author":[{"@pid":"06/1076","text":"Si Won Choi"},{"@pid":"47/3100","text":"Soo Ho Chang"},{"@pid":"51/4218","text":"Soo Dong Kim"}]},"title":"A Systematic Methodology for Developing Component Frameworks.","venue":"FASE","pages":"359-373","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/fase/ChoiCK04","doi":"10.1007/978-3-540-24721-0_27","ee":"https://doi.org/10.1007/978-3-540-24721-0_27","url":"https://dblp.org/rec/conf/fase/ChoiCK04"}, "url":"URL#6035442" }, { "@score":"2", "@id":"6056881", "info":{"authors":{"author":[{"@pid":"59/3541","text":"Angela Miguel"},{"@pid":"28/11","text":"Peter Wright"}]},"title":"Towards a Framework for Systematically Analysing Collaborative Error.","venue":"Human Error, Safety and Systems Development","pages":"271-284","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/ifip13/MiguelW04","doi":"10.1007/1-4020-8153-7_18","ee":"https://doi.org/10.1007/1-4020-8153-7_18","url":"https://dblp.org/rec/conf/ifip13/MiguelW04"}, "url":"URL#6056881" }, { "@score":"2", "@id":"6121384", "info":{"authors":{"author":[{"@pid":"73/6788","text":"Rita Kukafka"},{"@pid":"48/5425","text":"Stephen B. Johnson"},{"@pid":"02/2910","text":"Allison Linfante"},{"@pid":"16/5508","text":"John P. Allegrante"}]},"title":"Grounding a new information technology implementation framework in behavioral science: a systematic analysis of the literature on IT use.","venue":"J. Biomed. Informatics","volume":"36","number":"3","pages":"218-227","year":"2003","type":"Journal Articles","access":"open","key":"journals/jbi/KukafkaJLA03","doi":"10.1016/J.JBI.2003.09.002","ee":"https://doi.org/10.1016/j.jbi.2003.09.002","url":"https://dblp.org/rec/journals/jbi/KukafkaJLA03"}, "url":"URL#6121384" }, { "@score":"2", "@id":"6141961", "info":{"authors":{"author":[{"@pid":"64/2748","text":"Tim Miller"},{"@pid":"92/5917","text":"Paul A. Strooper"}]},"title":"A framework and tool support for the systematic testing of model-based specifications.","venue":"ACM Trans. Softw. Eng. Methodol.","volume":"12","number":"4","pages":"409-439","year":"2003","type":"Journal Articles","access":"closed","key":"journals/tosem/MillerS03","doi":"10.1145/990010.990012","ee":"https://doi.org/10.1145/990010.990012","url":"https://dblp.org/rec/journals/tosem/MillerS03"}, "url":"URL#6141961" }, { "@score":"2", "@id":"6183931", "info":{"authors":{"author":[{"@pid":"84/4809-2","text":"Fan Bai 0002"},{"@pid":"97/4936","text":"Narayanan Sadagopan"},{"@pid":"h/AhmedHelmy","text":"Ahmed Helmy"}]},"title":"IMPORTANT: A framework to systematically analyze the Impact of Mobility on Performance of RouTing protocols for Adhoc NeTworks.","venue":"INFOCOM","pages":"825-835","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/infocom/BaiSH03","doi":"10.1109/INFCOM.2003.1208920","ee":"https://doi.org/10.1109/INFCOM.2003.1208920","url":"https://dblp.org/rec/conf/infocom/BaiSH03"}, "url":"URL#6183931" }, { "@score":"2", "@id":"6200063", "info":{"authors":{"author":[{"@pid":"07/284","text":"Wen-Kui Chang"},{"@pid":"10/4913","text":"Shing-Kai Hon"},{"@pid":"c/WilliamCChu","text":"William C. Chu"}]},"title":"A Systematic Framework for Evaluating Hyperlink Validity in Web Environments.","venue":"QSIC","pages":"178-185","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/qsic/ChangHC03","doi":"10.1109/QSIC.2003.1319101","ee":"https://doi.org/10.1109/QSIC.2003.1319101","url":"https://dblp.org/rec/conf/qsic/ChangHC03"}, "url":"URL#6200063" }, { "@score":"2", "@id":"6240103", "info":{"authors":{"author":[{"@pid":"128/2297","text":"Steven R. Feldman"},{"@pid":"128/2169","text":"G. John Chen"},{"@pid":"128/2314","text":"Judy Y. Hu"},{"@pid":"128/2444","text":"Alan B. Fleischer"}]},"title":"Effects of systematic asymmetric discounting on physician-patient interactions: a theoretical framework to explain poor compliance with lifestyle counseling.","venue":"BMC Medical Informatics Decis. Mak.","volume":"2","pages":"8","year":"2002","type":"Journal Articles","access":"open","key":"journals/midm/FeldmanCHF02","doi":"10.1186/1472-6947-2-8","ee":"https://doi.org/10.1186/1472-6947-2-8","url":"https://dblp.org/rec/journals/midm/FeldmanCHF02"}, "url":"URL#6240103" }, { "@score":"2", "@id":"6300519", "info":{"authors":{"author":[{"@pid":"c/PCousot","text":"Patrick Cousot"},{"@pid":"c/RCousot","text":"Radhia Cousot"}]},"title":"Systematic design of program transformation frameworks by abstract interpretation.","venue":"POPL","pages":"178-190","year":"2002","type":"Conference and Workshop Papers","access":"closed","key":"conf/popl/CousotC02","doi":"10.1145/503272.503290","ee":"https://doi.org/10.1145/503272.503290","url":"https://dblp.org/rec/conf/popl/CousotC02"}, "url":"URL#6300519" }, { "@score":"2", "@id":"6348124", "info":{"authors":{"author":[{"@pid":"17/2458","text":"Min-You Chen"},{"@pid":"65/1665","text":"Derek A. Linkens"}]},"title":"A systematic neuro-fuzzy modeling framework with application to material property prediction.","venue":"IEEE Trans. Syst. Man Cybern. Part B","volume":"31","number":"5","pages":"781-790","year":"2001","type":"Journal Articles","access":"closed","key":"journals/tsmc/ChenL01","doi":"10.1109/3477.956039","ee":"https://doi.org/10.1109/3477.956039","url":"https://dblp.org/rec/journals/tsmc/ChenL01"}, "url":"URL#6348124" }, { "@score":"2", "@id":"6420180", "info":{"authors":{"author":[{"@pid":"00/5686","text":"Cassiano Durand"},{"@pid":"h/ChristophMHoffmann","text":"Christoph M. Hoffmann"}]},"title":"A Systematic Framework for Solving Geometric Constraints Analytically.","venue":"J. Symb. Comput.","volume":"30","number":"5","pages":"493-519","year":"2000","type":"Journal Articles","access":"open","key":"journals/jsc/DurandH00","doi":"10.1006/JSCO.2000.0392","ee":"https://doi.org/10.1006/jsco.2000.0392","url":"https://dblp.org/rec/journals/jsc/DurandH00"}, "url":"URL#6420180" }, { "@score":"2", "@id":"6439067", "info":{"authors":{"author":[{"@pid":"73/5607","text":"W. Lam"},{"@pid":"78/1430","text":"V. Shankararaman"},{"@pid":"90/2008","text":"B. Robinson"}]},"title":"A Process Framework for the Systematic Evaluation and Diffusion of Reuse Methods.","venue":"Australian Software Engineering Conference","pages":"73-86","year":"2000","type":"Conference and Workshop Papers","access":"closed","key":"conf/aswec/LamSR00","doi":"10.1109/ASWEC.2000.844563","ee":"https://doi.org/10.1109/ASWEC.2000.844563","url":"https://dblp.org/rec/conf/aswec/LamSR00"}, "url":"URL#6439067" }, { "@score":"2", "@id":"6468358", "info":{"authors":{"author":[{"@pid":"e/ShimonEdelman","text":"Shimon Edelman"},{"@pid":"87/4330","text":"Nathan Intrator"}]},"title":"A Productive, Systematic Framework for the Representation of Visual Structure.","venue":"NIPS","pages":"10-16","year":"2000","type":"Conference and Workshop Papers","access":"open","key":"conf/nips/EdelmanI00","ee":"https://proceedings.neurips.cc/paper/2000/hash/fface8385abbf94b4593a0ed53a0c70f-Abstract.html","url":"https://dblp.org/rec/conf/nips/EdelmanI00"}, "url":"URL#6468358" }, { "@score":"2", "@id":"6583069", "info":{"authors":{"author":[{"@pid":"30/954","text":"Dong Kwan Kim"},{"@pid":"30/6200","text":"Hyo Taeg Jung"},{"@pid":"09/923","text":"Chae Kyu Kim"}]},"title":"Techniques for Systematically Generating Framework Diagram based on UML.","venue":"APSEC","pages":"203-210","year":"1998","type":"Conference and Workshop Papers","access":"closed","key":"conf/apsec/KimJK98","doi":"10.1109/APSEC.1998.733721","ee":"https://doi.org/10.1109/APSEC.1998.733721","url":"https://dblp.org/rec/conf/apsec/KimJK98"}, "url":"URL#6583069" }, { "@score":"2", "@id":"6588093", "info":{"authors":{"author":[{"@pid":"17/1837","text":"G. John van der Pijl"},{"@pid":"12/10516","text":"Walter H. P. van Boven"}]},"title":"A framework for a systematic approach to knowledge management.","venue":"ECIS","pages":"100-113","year":"1998","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/ecis/PijlB98","url":"https://dblp.org/rec/conf/ecis/PijlB98"}, "url":"URL#6588093" }, { "@score":"2", "@id":"6588264", "info":{"authors":{"author":{"@pid":"13/4588","text":"Franck Barbier"}},"title":"Systematic Construction of UML Associations and Aggregations Using cOlOr Framework.","venue":"ECOOP Workshops","pages":"480-482","year":"1998","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecoopw/Barbier98","doi":"10.1007/3-540-49255-0_158","ee":"https://doi.org/10.1007/3-540-49255-0_158","url":"https://dblp.org/rec/conf/ecoopw/Barbier98"}, "url":"URL#6588264" }, { "@score":"2", "@id":"6620995", "info":{"authors":{"author":{"@pid":"97/33","text":"Hans Albrecht Schmid"}},"title":"Systematic Framework Design by Generalization.","venue":"Commun. ACM","volume":"40","number":"10","pages":"48-51","year":"1997","type":"Journal Articles","access":"closed","key":"journals/cacm/Schmid97","doi":"10.1145/262793.262803","ee":"https://doi.org/10.1145/262793.262803","url":"https://dblp.org/rec/journals/cacm/Schmid97"}, "url":"URL#6620995" }, { "@score":"2", "@id":"6649310", "info":{"authors":{"author":[{"@pid":"d/RodneyGDowney","text":"Rodney G. Downey"},{"@pid":"f/MichaelRFellows","text":"Michael R. Fellows"},{"@pid":"s/UlrikeStege","text":"Ulrike Stege"}]},"title":"Parameterized complexity: A framework for systematically confronting computational intractability.","venue":"Contemporary Trends in Discrete Mathematics","pages":"49-99","year":"1997","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/dimacs/DowneyFS97","doi":"10.1090/DIMACS/049/04","ee":"https://doi.org/10.1090/dimacs/049/04","url":"https://dblp.org/rec/conf/dimacs/DowneyFS97"}, "url":"URL#6649310" }, { "@score":"2", "@id":"6665648", "info":{"authors":{"author":{"@pid":"37/60","text":"James M. Tien"}},"title":"Toward A Systematic Evaluation of Large-Scale Information Systems: A Framework and Application.","venue":"PACIS","pages":"48","year":"1997","type":"Conference and Workshop Papers","access":"closed","key":"conf/pacis/Tien97","ee":"http://aisel.aisnet.org/pacis1997/48","url":"https://dblp.org/rec/conf/pacis/Tien97"}, "url":"URL#6665648" }, { "@score":"2", "@id":"6708566", "info":{"authors":{"author":[{"@pid":"c/KManiChandy","text":"K. Mani Chandy"},{"@pid":"72/2163","text":"Eve M. Schooler"}]},"title":"Designing Directories in Distributed Systems: A Systematic Framework.","venue":"HPDC","pages":"318-328","year":"1996","type":"Conference and Workshop Papers","access":"closed","key":"conf/hpdc/ChandyS96","doi":"10.1109/HPDC.1996.546202","ee":"https://doi.org/10.1109/HPDC.1996.546202","url":"https://dblp.org/rec/conf/hpdc/ChandyS96"}, "url":"URL#6708566" }, { "@score":"2", "@id":"6717621", "info":{"authors":{"author":{"@pid":"68/4429","text":"Dirk Moelants"}},"title":"A Framework for the Subsymbolic Description of Meter.","venue":"Joint International Conference on Cognitive and Systematic Musicology","pages":"263-276","year":"1996","type":"Conference and Workshop Papers","access":"closed","key":"conf/jic/Moelants96","doi":"10.1007/BFB0034120","ee":"https://doi.org/10.1007/BFb0034120","url":"https://dblp.org/rec/conf/jic/Moelants96"}, "url":"URL#6717621" }, { "@score":"2", "@id":"6739078", "info":{"authors":{"author":[{"@pid":"85/4414","text":"Venkata Konda"},{"@pid":"35/6421","text":"Anup Kumar"}]},"title":"A Systematic Framework for the Dependence Cycle Removal in Practical Loops.","venue":"J. Parallel Distributed Comput.","volume":"27","number":"2","pages":"157-171","year":"1995","type":"Journal Articles","access":"closed","key":"journals/jpdc/KondaK95","doi":"10.1006/JPDC.1995.1079","ee":"https://doi.org/10.1006/jpdc.1995.1079","url":"https://dblp.org/rec/journals/jpdc/KondaK95"}, "url":"URL#6739078" }, { "@score":"2", "@id":"6770939", "info":{"authors":{"author":[{"@pid":"31/2","text":"Martin L. Griss"},{"@pid":"62/383","text":"Ivar Jacobson"},{"@pid":"76/7013","text":"Chris Jette"},{"@pid":"k/RobertRKessler","text":"Robert R. Kessler"},{"@pid":"l/DougLea","text":"Doug Lea"}]},"title":"Panel: Systematic Software Reuse - Objects and Frameworks are not Enough.","venue":"SSR","pages":"17-18","year":"1995","type":"Conference and Workshop Papers","access":"closed","key":"conf/ssr/GrissJJKL95","doi":"10.1145/211782.213969","ee":"https://doi.org/10.1145/211782.213969","url":"https://dblp.org/rec/conf/ssr/GrissJJKL95"}, "url":"URL#6770939" }, { "@score":"2", "@id":"6814589", "info":{"authors":{"author":[{"@pid":"74/1821","text":"Mehmet Bülent Özcan"},{"@pid":"20/1070","text":"Jawed I. A. Siddiqi"}]},"title":"Validating and evolving software requirements in a systematic framework.","venue":"ICRE","pages":"202-205","year":"1994","type":"Conference and Workshop Papers","access":"closed","key":"conf/re/OzcanS94","doi":"10.1109/ICRE.1994.292384","ee":"https://doi.org/10.1109/ICRE.1994.292384","url":"https://dblp.org/rec/conf/re/OzcanS94"}, "url":"URL#6814589" }, { "@score":"2", "@id":"6855759", "info":{"authors":{"author":[{"@pid":"87/3960","text":"Wei-Tek Tsai"},{"@pid":"12/6266","text":"Weiwen Xie"},{"@pid":"09/853","text":"Imran A. Zualkernan"},{"@pid":"62/3963","text":"Satish K. Musukula"}]},"title":"A Framework for Systematic Testing of Software Specifications.","venue":"SEKE","pages":"380-387","year":"1993","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/seke/TsaiXZM93","url":"https://dblp.org/rec/conf/seke/TsaiXZM93"}, "url":"URL#6855759" }, { "@score":"2", "@id":"6961374", "info":{"authors":{"author":[{"@pid":"198/9928","text":"Larry D. Gaultney"},{"@pid":"52/3471","text":"Miroslaw J. Skibniewski"},{"@pid":"s/GavrielSalvendy","text":"Gavriel Salvendy"}]},"title":"A Systematic Approach to Industrial Technology Transfer: A Conceptual Framework and a Proposed Methodology.","venue":"J. Inf. Technol.","volume":"4","number":"1","pages":"7-16","year":"1989","type":"Journal Articles","access":"closed","key":"journals/jitech/GaultneySS89","doi":"10.1057/JIT.1989.2","ee":"https://doi.org/10.1057/jit.1989.2","url":"https://dblp.org/rec/journals/jitech/GaultneySS89"}, "url":"URL#6961374" }, { "@score":"2", "@id":"7104454", "info":{"authors":{"author":[{"@pid":"c/PCousot","text":"Patrick Cousot"},{"@pid":"c/RCousot","text":"Radhia Cousot"}]},"title":"Systematic Design of Program Analysis Frameworks.","venue":"POPL","pages":"269-282","year":"1979","type":"Conference and Workshop Papers","access":"closed","key":"conf/popl/CousotC79","doi":"10.1145/567752.567778","ee":"https://doi.org/10.1145/567752.567778","url":"https://dblp.org/rec/conf/popl/CousotC79"}, "url":"URL#7104454" } ] } } } )