Nothing Special   »   [go: up one dir, main page]

skip to main content
Volume 106, Issue CAugust 2015
Reflects downloads up to 01 Mar 2025Bibliometrics
Skip Table Of Content Section
research-article
Learning to detect representative data for large scale instance selection

The ReDD (Representative Data Detection) approach is introduced for large scale instance selection.In ReDD, a detector learns the patterns of (un)representative data after performing instance selection.Then, the detector is used to detect the newly ...

research-article
Engineering Future Internet applications

We define a new architectural style called P-REST as refinement of the REST one.We provide a modeling framework allowing for the design of P-RESTful applications.We provide the PRIME approach supporting the development of P-RESTful applications.We ...

research-article
Information infrastructure risk prediction through platform vulnerability analysis

A risk prediction methodology based on SCAP specifications is proposed.The methodology is demonstrated with an example from the e-banking sector.Distribution fitting and Kolmogorov-Smirnov test are utilized.A BBN topology to perform predictions on risk ...

research-article
Safe evolution templates for software product lines

We extend our investigation of compositional product lines with more subjectsWe also investigate annotative product lines, and propose templates for this contextWe contribute to the body of evidence on safe evolution of product linesWe bring additional ...

research-article
A large-scale study on the usage of Java's concurrent programming constructs

An analysis of 2227 Java projects, comprising more than 650 million lines of code.Seventy seven percent of the projects create threads or employ a concurrency control mechanism.Concurrent programming constructs are used both frequently and ...

research-article
An exploratory study on exception handling bugs in Java programs
Pages 82–101

We study exception handling bugs from two real systems.We survey developers to understand their thoughts about exception handling bugs.Analysis of bug repositories shows small percentages of exception handling bugs.Exception handling bugs seems to be as ...

research-article
Automated analysis of security requirements through risk-based argumentation

Included definition of premises.Adjusted the metamodel according to the Toulmin-style arguments.Revised the examples according to the changed metamodel.Added descriptions to Figs. 7 and 8.Fixed typos and improved the language. Computer-based systems are ...

research-article
The discourse on tool integration beyond technology, a literature survey
Pages 117–131

Research strands beyond technology with regard to tool integration were studied.We find that research on a larger set of stakeholders and contexts is needed.We identify important suggestions for changes to a well-known classification scheme.We propose ...

research-article
Feature extraction approaches from natural language requirements for reuse in software product lines

Hybrid NLP approaches were more common for extracting textual requirements.There is a mixture of automated and semi-automated approaches from IR and data mining.Support tools were not made available to the public.Not all studies use software metrics in ...

research-article
Toward the tools selection in model based system engineering for embedded systems-A systematic literature review

Recent model based system engineering (MBSE) approaches pertaining to embedded systems were identified.Systematic literature review (SLR) was used to identify the emerging trends.39 tools were identified for various MBSE activities.Evaluation of ...

Comments

Please enable JavaScript to view thecomments powered by Disqus.