default search action
Software - Practice and Experience, Volume 50
Volume 50, Number 1, January 2020
- Kenichi Kourai, Kouta Sannomiya:
Flexible service consolidation with nested virtualization and library operating systems. 3-21
- Junaid Akram, Majid Mumtaz, Ping Luo:
IBFET: Index-based features extraction technique for scalable code clone detection at file level granularity. 22-46 - Fernando O. Gallego, Rafael Corchuelo:
Torii: An aspect-based sentiment analysis system that can mine conditions. 47-64 - Mouhamed Gaith Ayadi, Riadh Bouslimi, Jalel Akaichi:
Medical social network content analysis for medical image retrieval purpose. 65-86
Volume 50, Number 2, February 2020
- Wojciech Mula, Daniel Lemire:
Base64 encoding and decoding at almost the speed of a memory copy. 89-97
- Richen Liu, Genlin Ji, Mingjun Su:
Domain-specific visualization system based on automatic multiseed recommendations: Extracting stratigraphic structures. 98-115 - Basel Magableh, Muder Almiani:
A deep recurrent Q network towards self-adapting distributed microservice architecture. 116-135 - Christophe Foket, Koen De Bosschere, Bjorn De Sutter:
Effective and efficient Java-type obfuscation. 136-160 - Hossein Monshizadeh Naeen, Esmaeil Zeinali Khosraghi, Abolfazl Toroghi Haghighat:
Adaptive Markov-based approach for dynamic virtual machine consolidation in cloud data centers with quality-of-service constraints. 161-183
Volume 50, Number 3, March 2020
Editorial
- Judith Bishop, Kendra M. L. Cooper, Helen Sharp, Michael W. Whalen:
Introduction to the special issue on software engineering in practice. 187-188
- Taeyoung Kim, Suntae Kim, Sooyong Park, YoungBeom Park:
Automatic recommendation to appropriate log levels. 189-209 - Guoping Rong, Zefeng Jin, He Zhang, Youwen Zhang, Wenhua Ye, Dong Shao:
DevDocOps: Enabling continuous documentation in alignment with DevOps. 210-226 - Yuan Huang, Nan Jia, Junhuai Shu, Xinyu Hu, Xiangping Chen, Qiang Zhou:
Does your code need comment? 227-245 - Heiko Koziolek, Andreas Burger, Marie Platenius-Mohr, Julius Rückert, Francisco Mendoza, Roland Braun:
Automated industrial IoT-device integration using the OpenPnP reference architecture. 246-274 - Charles Weir, Ingolf Becker, James Noble, Lynne Blair, M. Angela Sasse, Awais Rashid:
Interventions for long-term software security: Creating a lightweight program of assurance techniques for developers. 275-298 - Gang Hu, Min Peng, Yihan Zhang, Qianqian Xie, Wang Gao, Mengting Yuan:
Unsupervised software repositories mining and its application to code search. 299-322
Volume 50, Number 4, April 2020
- Bruno Iran Ferreira Maciel, Silas G. T. C. Santos, Roberto S. M. Barros:
MOAManager: A tool to support data stream experiments. 325-334
- Gianfranco Lamperti:
Temporal determinization of mutating finite automata: Reconstructing or restructuring. 335-367 - Taciano Perez, Marcelo Veiga Neves, Diego Medaglia, Pedro H. G. Monteiro, César A. F. De Rose:
Orthogonal persistence in nonvolatile memory architectures: A persistent heap design and its implementation for a Java Virtual Machine. 368-387 - Ben-Bright Benuwa, Benjamin Ghansah, Ernest K. Ansah:
Deep locality-sensitive discriminative dictionary learning for semantic video analysis. 388-406 - Hiba Alsghaier, Mohammed Akour:
Software fault prediction using particle swarm algorithm with genetic algorithm and support vector machine classifier. 407-427 - Mahmood Safaei, Abul Samad Ismail, Hassan Chizari, Maha Driss, Wadii Boulila, Shahla Asadi, Mitra Safaei:
Standalone noise and anomaly detection in wireless sensor networks: A novel time-series and adaptive Bayesian-network-based approach. 428-446 - Souad Ghazouani, Haithem Mezni, Yahya Slimani:
Bringing semantics to multicloud service compositions. 447-469
Volume 50, Number 5, May 2020
Editorial
- Rajiv Ranjan, Massimo Villari, Haiying Shen, Omer F. Rana, Rajkumar Buyya:
Software tools and techniques for fog and edge computing. 473-475
- Xianghua Xu, LiQiming Liu, Lingjun Zhang, Ping Li, Jinjun Chen:
Abnormal visual event detection based on multi-instance learning and autoregressive integrated moving average model in edge-based Smart City surveillance. 476-488 - Yan Guo, Shangguang Wang, Ao Zhou, Jinliang Xu, Jie Yuan, Ching-Hsien Hsu:
User allocation-aware edge cloud placement in mobile edge computing. 489-502 - Thar Baker, Muhammad Asim, Áine MacDermott, Farkhund Iqbal, Faouzi Kamoun, Babar Shah, Omar Alfandi, Mohammad Hammoudeh:
A secure fog-based platform for SCADA-based IoT critical infrastructure. 503-518 - Nam Ky Giang, Rodger Lea, Victor C. M. Leung:
Developing applications in large scale, dynamic fog computing: A case study. 519-532 - Antonella Longo, Marco Zappatore, Andrea De Matteis:
An osmotic computing infrastructure for urban pollution monitoring. 533-557 - Prateeksha Varshney, Yogesh Simmhan:
Characterizing application scheduling on edge, fog, and cloud computing resources. 558-595 - Hengjin Ke, Dan Chen, Tejal Shah, Xianzeng Liu, Xinhua Zhang, Lei Zhang, Xiaoli Li:
Cloud-aided online EEG classification system for brain healthcare: A case study of depression evaluation with a lightweight CNN. 596-610 - Lanlan Rui, Yabin Qin, Biyao Li, Ying Wang, Haoqiu Huang:
SEWMS: An edge-based smart wearable maintenance system in communication network. 611-629 - Chyi-Ren Dow, Ngo Huu Huy, Liang-Hsuan Lee, Po-Yu Lai, Kuan-Chieh Wang, Van-Tung Bui:
A crosswalk pedestrian recognition system by using deep learning and zebra-crossing recognition techniques. 630-644 - H. Sankar, V. Subramaniyaswamy, Varadarajan Vijayakumar, Arun Kumar Sangaiah, Logesh Ravi, A. Umamakeswari:
Intelligent sentiment analysis approach using edge computing-based deep learning technique. 645-657 - Ruoyu Wang, Daniel Sun, Guoqiang Li, Raymond K. Wong, Shiping Chen:
Pipeline provenance for cloud-based big data analytics. 658-674 - Nuno Apolónia, Felix Freitag, Leandro Navarro, Sarunas Girdzijauskas:
Socially aware microcloud service overlay optimization in community networks. 675-687 - Matías Hirsch, Cristian Mateos, Juan Manuel Rodriguez, Alejandro Zunino:
DewSim: A trace-driven toolkit for simulating mobile device clusters in Dew computing environments. 688-718 - Antonio Brogi, Stefano Forti, Carlos Guerrero, Isaac Lera:
How to place your apps in the fog: State of the art and open challenges. 719-740 - Enrique Chirivella-Perez, Ricardo Marco Alaez, Alba Hita, Ana Serrano Mamolar, José M. Alcaraz Calero, Qi Wang, Pedro Miguel Neves, Giacomo Bernini, Konstantinos Koutsopoulos, Manuel Gil Pérez, Gregorio Martínez Pérez, Maria João Barros, Anastasius Gavras:
SELFNET 5G mobile edge computing infrastructure: Design and prototyping. 741-756 - Prabhakar Krishnan, Subhasri Duttagupta, Krishnashree Achuthan:
SDN/NFV security framework for fog-to-things computing infrastructure. 757-800
Volume 50, Number 6, June 2020
- Blesson Varghese, Marco A. S. Netto, Ignacio Martín Llorente, Rajkumar Buyya:
New generation cloud computing. 803-804
- Daniel Rosendo, Demis Gomes, Guto Leoni Santos, Leylane Silva, André L. C. Moreira, Judith Kelner, Djamel Sadok, Glauco Estácio Gonçalves, Amardeep Mehta, Mattias Wildeman, Patricia Takako Endo:
Availability analysis of design configurations to compose virtual performance-optimized data center systems in next-generation cloud data centers. 805-826 - Bukhtawar Elahi, Asad Waqar Malik, Anis Ur Rahman, Muazzam Ali Khan:
Toward scalable cloud data center simulation using high-level architecture. 827-843 - Devki Nandan Jha, Khaled Alwasel, Areeb Alshoshan, Xianghua Huang, Ranesh Kumar Naha, Sudheer Kumar Battula, Saurabh Garg, Deepak Puthal, Philip James, Albert Y. Zomaya, Schahram Dustdar, Rajiv Ranjan:
IoTSim-Edge: A simulation framework for modeling the behavior of Internet of Things and edge computing environments. 844-867 - Aishwarya Srivastava, Siddhant Aggarwal, Amy W. Apon, Edward B. Duffy, Ken Kennedy, André Luckow, Brandon Posey, Marcin Ziolkowski:
Deployment of a cloud pipeline for real-time visual inspection using fast streaming high-definition images. 868-898 - Edvard Martins de Oliveira, Júlio Cezar Estrella, Alexandre Cláudio Botazzo Delbem, Mario Henrique de Souza Pardo, Fausto Guzzo da Costa, Alexandre Defelicibus, Stephan Reiff-Marganiec:
Optimizing computational resource management for the scientific gateways ecosystems based on the service-oriented paradigm. 899-924 - Amany M. Mohamed, Hisham M. Abdelsalam:
A multicriteria optimization model for cloud service provider selection in multicloud environments. 925-947 - Jihun Kang, JongBeom Lim, HeonChang Yu:
Partial migration technique for GPGPU tasks to Prevent GPU Memory Starvation in RPC-based GPU Virtualization. 948-972 - Mozhdeh Farhadi, Jean-Louis Lanet, Guillaume Pierre, Daniele Miorandi:
A systematic approach toward security in Fog computing: Assets, vulnerabilities, possible countermeasures. 973-997 - Amartya Sen, Sanjay Madria:
Analysis of a cloud migration framework for offline risk assessment of cloud service providers. 998-1021
Volume 50, Number 7, July 2020
- Nour El Houda Bouzerzour, Souad Ghazouani, Yahya Slimani:
A survey on the service interoperability in cloud computing: Client-centric and provider-centric perspectives. 1025-1060
- Sungjae Hwang, Sungho Lee, Sukyoung Ryu:
All about activity injection: Threats, semantics, detection, and defense. 1061-1086
- Carla Sauvanaud, Ajay Dholakia, Jordi Guitart, Chulho Kim, Peter Mayes:
Big data deployment in containerized infrastructures through the interconnection of network namespaces. 1087-1113 - Taewoo Kim, Alexander Behm, Michael Blow, Vinayak R. Borkar, Yingyi Bu, Michael J. Carey, Murtadha Al Hubail, Shiva Jahangiri, Jianfeng Jia, Chen Li, Chen Luo, Ian Maxon, Pouria Pirzadeh:
Robust and efficient memory management in Apache AsterixDB. 1114-1151
- Chengyu Hu, Xin Shu, Xuesong Yan, Deze Zeng, Wenyin Gong, Lei Wang:
Inline wireless mobile sensors and fog nodes placement for leakage detection in water distribution systems. 1152-1167 - Andrew Robert, Apaar Gupta, Vinayak Shenoy, Dinkar Sitaram, Subramaniam Kalambur:
Predicting Hadoop misconfigurations using machine learning. 1168-1183 - Stefano Marchini, Sebastiano Vigna:
Compact Fenwick trees for dynamic ranking and selection. 1184-1202 - Golnaz Aghaee Ghazvini, Mehran Mohsenzadeh, Ramin Nasiri, Amir Masoud Rahmani:
MMLT: A mutual multilevel trust framework based on trusted third parties in multicloud environments. 1203-1227 - Michel S. Bonfim, Marcelo Anderson Santos, Kelvin L. Dias, Stenio Fernandes:
A real-time attack defense framework for 5G network slicing. 1228-1257 - Shouki A. Ebad:
Healthcare software design and implementation - A project failure case. 1258-1276 - Fabian Prasser, Johanna Eicher, Helmut Spengler, Raffael Bild, Klaus A. Kuhn:
Flexible data anonymization using ARX - Current status and challenges ahead. 1277-1304 - Yifan Wang, Kiran Ijaz, Dong Yuan, Rafael A. Calvo:
VR-Rides: An object-oriented application framework for immersive virtual reality exergames. 1305-1324
Volume 50, Number 8, August 2020
- Gabriel A. Wainer, Mohammad Moallemi:
Designing real-time systems using imprecise discrete-event system specifications. 1327-1344
- Jingyao Li, Lei Liu, Peng Zhang:
Tabular-expression-based method for constructing metamorphic relations. 1345-1380 - Ashutosh Bhatt, Priti Dimri, Ambika Aggarwal:
Self-adaptive brainstorming for jobshop scheduling in multicloud environment. 1381-1398 - Imanol Mugarza, Jorge Parra, Eduardo Jacob:
Cetratus: A framework for zero downtime secure software updates in safety-critical systems. 1399-1424 - Dileep Kumar Pattipati, Rupesh Nasre, Sreenivasa Kumar Puligundla:
OPAL: An extensible framework for ontology-based program analysis. 1425-1462 - Abdelhamid Khiat, Abdelkamel Tari, Tom Guérout:
MFHS: A modular scheduling framework for heterogeneous system. 1463-1497 - Lamia Berkani:
A semantic and social-based collaborative recommendation of friends in social networks. 1498-1519 - Julio Moreno, Javier Gómez, Manuel A. Serrano, Eduardo B. Fernández, Eduardo Fernández-Medina:
Application of security reference architecture to Big Data ecosystems in an industrial scenario. 1520-1538 - Ali Sajedi Badashian, Eleni Stroulia:
Vocabulary and time based bug-assignment: A recommender system for open-source projects. 1539-1564 - Mohammadreza Sharbaf, Bahman Zamani:
Configurable three-way model merging. 1565-1599 - Arash Mazidi, Mehdi Golsorkhtabaramiri, Meisam Yadollahzadeh Tabari:
Autonomic resource provisioning for multilayer cloud applications with K-nearest neighbor resource scaling and priority-based resource allocation. 1600-1625
Volume 50, Number 9, September 2020
- Daniel Ingalls, Eliot Miranda, Clément Béra, Elisa Gonzalez Boix:
Two decades of live coding and debugging of virtual machines through simulation. 1629-1650
- Sara Hassan, Rami Bahsoon, Rick Kazman:
Microservice transition and its granularity problem: A systematic mapping study. 1651-1681
- Pieter De Cremer, Nathan Desmet, Matias Madou, Bjorn De Sutter:
Sensei: Enforcing secure coding guidelines in the integrated development environment. 1682-1718
- Ali Shakarami, Ali Shahidinejad, Mostafa Ghobaei-Arani:
A review on the computation offloading approaches in mobile edge computing: A game-theoretic perspective. 1719-1759 - Daniel Casini, Alessandro Biondi, Giorgio C. Buttazzo:
Timing isolation and improved scheduling of deep neural networks for real-time systems. 1760-1777 - Chun Liu, Wei Yang, Zheng Li, Yijun Yu:
Recommending software features to designers: From the perspective of users. 1778-1792 - Matteo Bogo, Jacopo Soldani, Davide Neri, Antonio Brogi:
Component-aware orchestration of cloud-based enterprise applications, from TOSCA to Docker and Kubernetes. 1793-1821 - Chung-Ming Huang, Pin-Jui Chen:
Proximate sharing of geo data using the credit-considered mobile edge computing server switching control scheme. 1822-1841 - Richard Amankwah, Jinfu Chen, Patrick Kwaku Kudjo, Dave Towey:
An empirical comparison of commercial and open-source web vulnerability scanners. 1842-1857 - Arto Niemi, Jukka Teuhola:
Burrows-Wheeler post-transformation with effective clustering and interpolative coding. 1858-1874
Volume 50, Number 10, October 2020
- Ming-Hsiang Huang, Wuu Yang:
PFACC: An OpenACC-like programming model for irregular nested parallelism. 1877-1904 - Rodrigo Andrade, Paulo Borba:
Privacy and security constraints for code contributions. 1905-1929 - Damian Andrew Tamburri, Kelly Blincoe, Fabio Palomba, Rick Kazman:
"The Canary in the Coal Mine..." A cautionary tale from the decline of SourceForge. 1930-1951 - Wen Cheng, Tao Guo, Lingfang Zeng, Yang Wang, Lars Nagel, Tim Süß, André Brinkmann:
Improving LSM-trie performance by parallel search. 1952-1965 - Soulaimane Guedria, Noël De Palma, Félix Renard, Nicolas Vuillerme:
R2D2: A scalable deep learning toolkit for medical imaging segmentation. 1966-1985
- Lars Larsson, William Tärneberg, Cristian Klein, Erik Elmroth, Maria Kihl:
Impact of etcd deployment on Kubernetes, Istio, and application performance. 1986-2007
Volume 50, Number 11, November 2020
Editorial
- Hao Wu, Rongfang Bie, Charith Pereira, Omer F. Rana:
Special Issue: Identification, Information, and Knowledge in the Internet of Things. 2011
- Anil Singh, Nitin Auluck:
Load balancing aware scheduling algorithms for fog networks. 2012-2030 - Feng Zeng, Lan Yao, Baoling Wu, Wenjia Li, Lin Meng:
Dynamic human contact prediction based on naive Bayes algorithm in mobile social networks. 2031-2045 - Junqi Guo, Yazhu Dai, Chixiang Wang, Hao Wu, Tianyou Xu, Kai Lin:
A physiological data-driven model for learners' cognitive load detection using HRV-PRV feature fusion and optimized XGBoost classification. 2046-2064 - Cun Ji, Xiunan Zou, Shijun Liu, Li Pan:
ADARC: An anomaly detection algorithm based on relative outlier distance and biseries correlation. 2065-2081 - Xiao Yu, Congcong Han, Junqi Guo, Yinghe Chen:
The role of superior image composition in children's analogical reasoning. 2082-2094 - Samina Kausar, Muhammad Habib, Muhammad Yasir Shabir, Ata Ullah, Huahu Xu, Rashid Mehmood, Rongfang Bie, Muhammad Shahid Iqbal:
Secure and efficient data transfer using spreading and assimilation in MANET. 2095-2109 - Junqi Guo, Guicheng Shen, Yichen Sun, Jin Zhao, Hao Wu, Zhilin Zhu:
Field of experts optimization-based noisy image retrieval. 2110-2118
Volume 50, Number 12, December 2020
- João Pedro de Carvalho Castro, Anderson Chaves Carniel, Cristina Dutra de Aguiar Ciferri:
Analyzing spatial analytics systems based on Hadoop and Spark: A user perspective. 2121-2144
- Rafael Capilla, Rick Kazman, Carlos Romera, Carlos Carrillo:
Usability implications in software architecture: The case study of a mobile app. 2145-2168 - Patricia Jiménez, Juan C. Roldán, Fernando O. Gallego, Rafael Corchuelo:
On the synthesis of metadata tags for HTML files. 2169-2192 - David Llorens, Juan Miguel Vilar:
Easily solving dynamic programming problems in Haskell by memoization of hylomorphisms. 2193-2211 - Ali Shahidinejad, Mostafa Ghobaei-Arani:
Joint computation offloading and resource provisioning for edge-cloud computing environment: A machine learning-based approach. 2212-2230 - Amit Kumar Bhardwaj, Yuvraj Gajpal, Chirag Surti, Sukhpal Singh Gill:
HEART: Unrelated parallel machines problem with precedence constraints for task scheduling in cloud computing using heuristic and meta-heuristic algorithms. 2231-2251 - Tadeus Prastowo, Luigi Palopoli, Luca Abeni:
Tice: A real-time language compilable using C++ compilers. 2252-2292 - I-Ching Hsu, Yin-Hung Lin:
Integrated machine learning with semantic web for open government data recommendation based on cloud computing. 2293-2312 - Ziyi Zhou, Huiqun Yu, Guisheng Fan:
Effective approaches to combining lexical and syntactical information for code summarization. 2313-2336 - John Paul Martin, A. Kandasamy, K. Chandrasekaran:
CREW: Cost and Reliability aware Eagle-Whale optimiser for service placement in Fog. 2337-2360
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.