default search action
Kenneth Johnson
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c24]Kenneth Johnson, Samaneh Madanian, Catia Trubiani:
Patterns of Applied Control for Public Health Measures on Transportation Services under Epidemic. SEAMS@ICSE 2024: 150-160 - 2023
- [c23]Hamidreza Rasouli Panah, Abtin Ijadi Maghsoodi, Samaneh Madanian, Jian Yu, Kenneth Johnson:
A Novel Proof of Concept Forecasting Model for Pandemics - A Case Study in New Zealand. ITDRR 2023: 253-268 - 2021
- [j9]Chandan Sharma, Roopak Sinha, Kenneth Johnson:
Practical and comprehensive formalisms for modelling contemporary graph query languages. Inf. Syst. 102: 101816 (2021) - [j8]Radu Calinescu, Colin Paterson, Kenneth Johnson:
Efficient Parametric Model Checking Using Domain Knowledge. IEEE Trans. Software Eng. 47(6): 1114-1133 (2021) - [c22]Kenneth Johnson, Javier Cámara, Roopak Sinha, Samaneh Madanian, Dave Parry:
Towards Self-Adaptive Disaster Management Systems. ISCRAM 2021: 49-61 - [p1]Kenneth Johnson, Marc Zeller, Arthur Vetter, Dániel Varró:
Continual Model-Based Analysis. Composing Model-Based Analysis Tools 2021: 97-127 - [i3]Kenneth Johnson, Samaneh Madanian, Roopak Sinha:
Graph-Theoretic Models of Resource Distribution for Cyber-Physical Systems of Disaster-Affected Regions. CoRR abs/2112.12046 (2021) - 2020
- [c21]Kenneth Johnson, Samaneh Madanian, Roopak Sinha:
Graph-Theoretic Models of Resource Distribution for Cyber-Physical Systems of Disaster-Affected Regions. SEAA 2020: 521-528 - [c20]Ajit Narayanan, Koz Ross, Kenneth Johnson:
Zero-error rule induction using a memetic algorithm. SSCI 2020: 647-654
2010 – 2019
- 2019
- [e3]Kenneth Johnson, Josef Spillner, Xinghui Zhao, Olga Datskova, Blesson Varghese:
Proceedings of the 6th IEEE/ACM International Conference on Big Data Computing, Applications and Technologies, BDCAT 2019, Auckland, New Zealand, December 2-5, 2019. ACM 2019, ISBN 978-1-4503-7016-5 [contents] - [e2]Kenneth Johnson, Josef Spillner, Dalibor Klusácek, Ashiq Anjum:
Proceedings of the 12th IEEE/ACM International Conference on Utility and Cloud Computing, UCC 2019, Auckland, New Zealand, December 2-5, 2019. ACM 2019, ISBN 978-1-4503-6894-0 [contents] - [e1]Kenneth Johnson, Josef Spillner, Dalibor Klusácek, Ashiq Anjum:
Proceedings of the 12th IEEE/ACM International Conference on Utility and Cloud Computing, UCC 2019, Companion Volume, Auckland, New Zealand, December 2-5, 2019. ACM 2019, ISBN 978-1-4503-7044-8 [contents] - 2018
- [c19]Radu Calinescu, Kenneth Johnson, Colin Paterson:
Efficient parametric model checking using domain-specific modelling patterns. ICSE (NIER) 2018: 61-64 - [i2]Radu Calinescu, Colin Paterson, Kenneth Johnson:
Efficient Parametric Model Checking Using Domain Knowledge. CoRR abs/1812.09952 (2018) - 2017
- [c18]Kenneth Johnson, Shahper Richter:
Quantitative Verification of Social Media Networks: The Case Study of Twitter. BDCAT 2017: 53-62 - [i1]Kenneth Johnson, John V. Tucker, Victoria Wang:
Monitoring and Intervention: Concepts and Formal Models. CoRR abs/1701.07484 (2017) - 2016
- [j7]Radu Calinescu, Carlo Ghezzi, Kenneth Johnson, Mauro Pezzè, Yasmin Rafiq, Giordano Tamburrelli:
Formal Verification With Confidence Intervals to Establish Quality of Service Properties of Software Systems. IEEE Trans. Reliab. 65(1): 107-125 (2016) - [c17]Radu Calinescu, Kenneth Johnson, Colin Paterson:
FACT: A Probabilistic Model Checker for Formal Verification with Confidence Intervals. TACAS 2016: 540-546 - [c16]Kenneth Johnson, John V. Tucker, Victoria Wang:
Theorising Monitoring: Algebraic Models of Web Monitoring in Organisations. WADT 2016: 13-35 - 2015
- [c15]Kenneth Johnson, Roopak Sinha, Radu Calinescu, Ji Ruan:
A Multi-agent Framework for Dependable Adaptation of Evolving System Architectures. EUROMICRO-SEAA 2015: 159-166 - 2014
- [c14]Roopak Sinha, Kenneth Johnson, Radu Calinescu:
A scalable approach for re-configuring evolving industrial control systems. ETFA 2014: 1-8 - [c13]Kenneth Johnson, Radu Calinescu:
Efficient re-resolution of SMT specifications for evolving software architectures. QoSA 2014: 93-102 - [c12]Radu Calinescu, Yasmin Rafiq, Kenneth Johnson, Mehmet Emin Bakir:
Adaptive model learning for continual verification of non-functional properties. ICPE 2014: 87-98 - 2013
- [j6]Kenneth Johnson, John V. Tucker:
The data type of spatial objects. Formal Aspects Comput. 25(2): 189-218 (2013) - [c11]Kenneth Johnson, Radu Calinescu, Shinji Kikuchi:
An incremental verification framework for component-based software systems. CBSE 2013: 33-42 - [c10]Kenneth Johnson, Yuanzhi Wang, Radu Calinescu, Ian Sommerville, Gordon D. Baxter, John V. Tucker:
Services2Cloud: A Framework for Revenue Analysis of Software-as-a-Service Provisioning. CloudCom (2) 2013: 144-151 - [c9]Radu Calinescu, Simos Gerasimou, Kenneth Johnson, Colin Paterson:
Using Runtime Quantitative Verification to Provide Assurance Evidence for Self-Adaptive Software - Advances, Applications and Research Challenges. Software Engineering for Self-Adaptive Systems 2013: 223-248 - [c8]Radu Calinescu, Kenneth Johnson, Yasmin Rafiq:
Developing self-verifying service-based systems. ASE 2013: 734-737 - [c7]Radu Calinescu, Kenneth Johnson, Yasmin Rafiq, Simos Gerasimou, Gabriel Costa Silva, Stanimir N. Pehlivanov:
Continual Verification of Non-Functional Properties in Cloud-Based Systems. NiM-ALP@MoDELS 2013: 1-5 - 2012
- [c6]Radu Calinescu, Shinji Kikuchi, Kenneth Johnson:
Compositional Reverification of Probabilistic Safety Properties for Large-Scale Complex IT Systems. Monterey Workshop 2012: 303-329 - [c5]Kenneth Johnson, John V. Tucker:
Algebraic Specifications of Computing as a Service with Applications to Cost Analysis. UCC 2012: 143-150 - 2011
- [c4]Kenneth Johnson, Simon Reed, Radu Calinescu:
Specification and Quantitative Analysis of Probabilistic Cloud Deployment Patterns. Haifa Verification Conference 2011: 145-159 - [c3]Radu Calinescu, Kenneth Johnson, Yasmin Rafiq:
Using observation ageing to improve markovian model learning in QoS engineering. ICPE 2011: 505-510
2000 – 2009
- 2009
- [j5]Loïc Besnard, Thierry Gautier, Matthieu Moy, Jean-Pierre Talpin, Kenneth Johnson, Florence Maraninchi:
Automatic translation of C/C++ parallel code into synchronous formalism using an SSA intermediate form. Electron. Commun. Eur. Assoc. Softw. Sci. Technol. 23 (2009) - 2007
- [b1]Kenneth Johnson:
The algebraic specification of spatial data types with applications to constructive volume geometry. Swansea University, UK, 2007
1990 – 1999
- 1998
- [j4]Rosalie J. Ocker, Jerry Fjermestad, Starr Roxanne Hiltz, Kenneth Johnson:
Effects of Four Modes of Group Communication on the Outcomes of Software Requirements Determination. J. Manag. Inf. Syst. 15(1): 99-118 (1998) - 1995
- [c2]Jerry Fjermestad, Robert M. Czech, Starr Roxanne Hiltz, Murray Turoff, Cameron Ford, Rosalie J. Ocker, Frederick Ferront, Malcolm Worrell, Kenneth Johnson:
Group strategic decision making: asynchronous GSS using structured conflict and consensus approaches. HICSS (4) 1995: 222-231 - 1991
- [j3]Starr Roxanne Hiltz, Kenneth Johnson, Murray Turoff:
Group Decision Support: The Effects of Designated Human Leaders and Statistical Feedback in Computerized Conferences. J. Manag. Inf. Syst. 8(2): 81-108 (1991)
1980 – 1989
- 1989
- [j2]Starr Roxanne Hiltz, Murray Turoff, Kenneth Johnson:
Experiments in group decision making, 3: disinhibition, deindividuation, and group process in pen name and real name computer conferences. Decis. Support Syst. 5(2): 217-232 (1989) - [j1]Starr Roxanne Hiltz, Kenneth Johnson:
Measuring acceptance of computer-mediated communication systems. JASIS 40(6): 386-397 (1989) - 1980
- [c1]Starr Roxanne Hiltz, Kenneth Johnson, Ann Marie Rabke:
The Process of Communication in Face to Face Vs. Computerized Conferences. A Controlled Experiment Using Bales Interaction Process Analysis. ACL 1980
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-08 21:30 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint