[1]
T. Abdou and P. Kamthan. A knowledge management approach for testing open source software systems. In 33rd IEEE International Performance Computing and Communications Conference, IPCCC 2014. Institute of Electrical and Electronics Engineers Inc., 2015. (doi:10.1109/PCCC.2014.7017022)
[2]
R.A. Abouhogail. Network security and metrology: A survey. International Journal of Security and its Applications, 9(11):251–270, 2015. (doi:10.14257/ijsia.2015.9.11.24)
[3]
A. Adewumi, O. Emebo, S. Misra, and L. Fernandez. Tool support for Cascading Style Sheets' complexity metrics. 4th International Conference on Soft Computing, Intelligent Systems and Information Technology, ICSIIT 2015, 516:551–560, 2015. (doi:10.1007/978-3-662-46742-8_50)
[4]
A. Adewumi, S. Misra, and N. Omoregbe. Evaluating open source software quality models against ISO 25010. In 15th IEEE International Conference on Computer and Information Technology, CIT 2015, 14th IEEE International Conference on Ubiquitous Computing and Communications, IUCC 2015, 13th IEEE International Conference on Dependable, Autonomic and Secure Computing, DASC 2015 and 13th IEEE International Conference on Pervasive Intelligence and Computing, PICom 2015, pages 872–877. Institute of Electrical and Electronics Engineers Inc., 2015. (doi:10.1109/CIT/IUCC/DASC/PICOM.2015.130)
[5]
R.N. Akram, K. Markantonakis, and K. Mayes. Enhancing java runtime environment for smart cards against runtime attacks. 20th European Symposium on Research in Computer Security, ESORICS 2015, 9327:541–560, 2015. (doi:10.1007/978-3-319-24177-7_27)
[6]
A.B. Al-Badareen, J.-M. Desharnais, and A. Abran. A suite of rules for developing and evaluating software quality models. 25th International Workshop on Software Measurement, IWSM 2015 and 10th International Conference on Software Process and Product Measurement, Mensura 2015, 230:1–13, 2015. (doi:10.1007/978-3-319-24285-9_1)
[7]
J. Al Dallal. Accounting for data encapsulation in the measurement of object-oriented class cohesion. Journal of Software: Evolution and Process, 27(5):373–400, 2015. (doi:10.1002/smr.1714)
[8]
Z. Al-Mousa and Q. Nasir. cl-CIDPS: A cloud computing based cooperative intrusion detection and prevention system framework. 1st International Conference on Future Network Systems and Security, FNSS 2015, 523:181–194, 2015. (doi:10.1007/978-3-319-19210-9_13)
[9]
M. Alenezi and M. Zarour. Modularity measurement and evolution in object-oriented open-source projects. In 2015 International Conference on Engineering and MIS, ICEMIS 2015, volume 24-26-September-2015. Association for Computing Machinery, 2015. (doi:10.1145/2832987.2833013)
[10]
R.S. Alkhawaldeh and J.M. Jose. Experimental study on semi-structured peer-to-peer information retrieval network. 6th International Conference on Labs of the Evaluation Forum, CLEF 2015, 9283:3–14, 2015. (doi:10.1007/978-3-319-24027-5_1)
[11]
N. Allen, P. Krishnan, and B. Scholz. Combining type-analysis with points-to analysis for analyzing Java library source-code. In 4th ACM SIGPLAN International Workshop on State of the Art in Program Analysis, SOAP 2015, pages 13–18. Association for Computing Machinery, Inc, 2015. (doi:10.1145/2771284.2771287)
[12]
M.H. Almomani and F. Ababneh. The expected opportunity cost and selecting the optimal subset. Applied Mathematical Sciences, 9(131):6507–6519, 2015. (doi:10.12988/ams.2015.58561)
[13]
S. Amann, S. Beyer, K. Kevic, and H. Gall. Software mining studies: Goals, approaches, artifacts, and replicability. 10th LASER Summer School on Software Engineering: Software for the Cloud and Big Data, LASER 2013–2014, 8987:121–158, 2015. (doi:10.1007/978-3-319-28406-4_5)
[14]
L. Amorim, E. Costa, N. Antunes, B. Fonseca, and M. Ribeiro. Experience report: Evaluating the effectiveness of decision trees for detecting code smells. In 26th IEEE International Symposium on Software Reliability Engineering, ISSRE 2015, pages 261–269. Institute of Electrical and Electronics Engineers Inc., 2015. (doi:10.1109/ISSRE.2015.7381819)
[15]
M. Aram and G. Neumann. Multilayered analysis of co-development of business information systems. Journal of Internet Services and Applications, 6(1), 2015. (doi:10.1186/s13174-015-0030-8)
[16]
J. Augustine, G. Pandurangan, P. Robinson, S. Roche, and E. Upfal. Enabling robust and efficient distributed computation in dynamic peer-to-peer networks. In 56th IEEE Annual Symposium on Foundations of Computer Science, FOCS 2015, volume 2015-December, pages 350–369. IEEE Computer Society, 2015. (doi:10.1109/FOCS.2015.29)
[17]
J. Augustine, G. Pandurangan, P. Robinson, and E. Upfal. Distributed agreement in dynamic peer-to-peer networks. Journal of Computer and System Sciences, 81(7):1088–1109, 2015. (doi:10.1016/j.jcss.2014.10.005)
[18]
L. Aversano and M. Tortorella. Analysing the reliability of open source software projects. In 10th International Conference on Software Engineering and Applications, ICSOFT-EA 2015, pages 348–357. SciTePress, 2015.
[19]
E. Azadi Marand, E. Azadi Marand, and M. Challenger. DSML4CP: A domain-specific modeling language for concurrent programming. Computer Languages, Systems and Structures, 44:319–341, 2015. (doi:10.1016/j.cl.2015.09.002)
[20]
P. Bahr, J. Berthold, and M. Elsman. Certified symbolic management of financial multi-party contracts. In 20th ACM SIGPLAN International Conference on Functional Programming, ICFP 2015, volume 2015-August, pages 315–327. Association for Computing Machinery, 2015. (doi:10.1145/2784731.2784747)
[21]
Y. Bai, G. Yin, and H. Wang. Multi-dimensions of developer trustworthiness assessment in OSS community. In 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2014, pages 75–81. Institute of Electrical and Electronics Engineers Inc., 2015. (doi:10.1109/TrustCom.2014.14)
[22]
G. Bajwa, M. Fazeen, R. Dantu, and S. Tanpure. Unintentional bugs to vulnerability mapping in Android applications. In 13th IEEE International Conference on Intelligence and Security Informatics, ISI 2015, pages 176–178. Institute of Electrical and Electronics Engineers Inc., 2015. (doi:10.1109/ISI.2015.7165966)
[23]
A. Bates, K.R.B. Butler, M. Sherr, C. Shields, P. Traynor, and D. Wallach. Accountable wiretapping-or-i know they can hear you now. Journal of Computer Security, 23(2):167–195, 2015. (doi:10.3233/JCS-140515)
[24]
M. Bačıková, J. Porubän, S. Chodarev, and M. Nosál'. Bootstrapping DSLs from user interfaces. In 30th Annual ACM Symposium on Applied Computing, SAC 2015, volume 13-17-April-2015, pages 2115–2118. Association for Computing Machinery, 2015. (doi:10.1145/2695664.2695994)
[25]
G. Bavota, A. De Lucia, M. Di Penta, R. Oliveto, and F. Palomba. An experimental investigation on the innate relationship between quality and refactoring. Journal of Systems and Software, 107:1–14, 2015. (doi:10.1016/j.jss.2015.05.024)
[26]
S. Bayati, D. Parsons, T. Susnjak, and M. Heidary. Big data analytics on large-scale socio-technical software engineering archives. In 3rd International Conference on Information and Communication Technology, ICoICT 2015, pages 65–69. Institute of Electrical and Electronics Engineers Inc., 2015. (doi:10.1109/ICoICT.2015.7231398)
[27]
A.M. Bejarano, L.E. Garcıa, and E.E. Zurek. Detection of source code similitude in academic environments. Computer Applications in Engineering Education, 23(1):13–22, 2015. (doi:10.1002/cae.21571)
[28]
E. Berndt, D. Furniss, and A. Blandford. Learning contextual inquiry and distributed cognition: a case study on technology use in anaesthesia. Cognition, Technology and Work, 17(3):431–449, 2015. (doi:10.1007/s10111-014-0314-y)
[29]
C. Biray and F. Buzluca. A learning-based method for detecting defective classes in object-oriented systems. In 2015 8th IEEE International Conference on Software Testing, Verification and Validation Workshops, ICSTW 2015. Institute of Electrical and Electronics Engineers Inc., 2015. (doi:10.1109/ICSTW.2015.7107477)
[30]
T.F. Bissyandé, L. Réveillère, J.L. Lawall, Y.-D. Bromberg, and G. Muller. Implementing an embedded compiler using program transformation rules. Software - Practice and Experience, 45(2):177–196, 2015. (doi:10.1002/spe.2225)
[31]
K. Blincoe and D. Damian. Implicit coordination: A case study of the rails OSS project. 11th IFIP WG 2.13 International Conference on Open Source Systems, OSS 2015, 451:35–44, 2015. (doi:10.1007/978-3-319-17837-0_4)
[32]
I. Bluemke and A. StepieŃ. Experiment on defect prediction. 10th International Conference on Dependability and Complex Systems, DepCoS-RELCOMEX 2015, 365:25–34, 2015. (doi:10.1007/978-3-319-19216-1_3)
[33]
C. Borrego, S. Robles, A. Fabregues, and A. Sánchez-Carmona. A mobile code bundle extension for application-defined routing in delay and disruption tolerant networking. Computer Networks, 87:59–77, 2015. (doi:10.1016/j.comnet.2015.05.017)
[34]
David D. Brandt, Kenwood Hall, Mark Burton Anderson, Craig D. Anderson, and George Bradford Collins. System and methodology providing automation security analysis and network intrusion protection in an industrial environment. United States Patent 9,009,084, April 2015. Assignee: Rockwell Automation Technologies, Inc. (Mayfield Heights, OH).
[35]
M. Bruntink. Towards base rates in software analytics: Early results and challenges from studying Ohloh. Science of Computer Programming, 97(P1):135–142, 2015. (doi:10.1016/j.scico.2013.11.023)
[36]
B. Bryant, J.-M. Jézéquel, R. Lämmel, M. Mernik, M. Schindler, F. Steinmann, J.-P. Tolvanen, A. Vallecillo, and M. Völter. Globalized domain specific language engineering. International Dagstuhl Seminar on Globalizing Domain-Specific Languages, 2014, 9400:43–69, 2015. (doi:10.1007/978-3-319-26172-0_4)
[37]
T. Buchert, L. Nussbaum, and J. Gustedt. Towards complete tracking of provenance in experimental distributed systems research. International Workshops on Parallel Processing Workshops, Euro-Par 2015, 9523:604–616, 2015. (doi:10.1007/978-3-319-27308-2_49)
[38]
G. Burlet and A. Hindle. An empirical study of end-user programmers in the computer music community. In 12th Working Conference on Mining Software Repositories, MSR 2015, volume 2015-August, pages 292–302. IEEE Computer Society, 2015. (doi:10.1109/MSR.2015.34)
[39]
M. Cadariu, E. Bouwers, J. Visser, and A. Van Deursen. Tracking known security vulnerabilities in proprietary software systems. In 22nd IEEE International Conference on Software Analysis, Evolution, and Reengineering, SANER 2015, pages 516–519. Institute of Electrical and Electronics Engineers Inc., 2015. (doi:10.1109/SANER.2015.7081868)
[40]
F. Camilo, A. Meneely, and M. Nagappan. Do bugs foreshadow vulnerabilities? a study of the Chromium project. In 12th Working Conference on Mining Software Repositories, MSR 2015, volume 2015-August, pages 269–279. IEEE Computer Society, 2015. (doi:10.1109/MSR.2015.32)
[41]
S. Campanelli, P. Foglia, and C.A. Prete. An architecture to integrate IEC 61131-3 systems in an IEC 61499 distributed solution. Computers in Industry, 72:47–67, 2015. (doi:10.1016/j.compind.2015.04.002)
[42]
C. Casalnuovo, B. Vasilescu, P. Devanbu, and V. Filkov. Developer on boarding in GitHub: The role of prior social links and language experience. In 10th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering, ESEC/FSE 2015, pages 817–828. Association for Computing Machinery, Inc, 2015. (doi:10.1145/2786805.2786854)
[43]
Casparus Cate, James J. Fitzgibbon, Robert R. Keller, Jr., Sapta Gireesh Pudipeddi, and Cory Sorice. Barrier operator feature enhancement. United States Patent 9,141,099, September 2015. Assignee: The Chamberlain Group, Inc. (Elmhurst, IL).
[44]
Casparus Cate, James J. Fitzgibbon, Robert R. Keller, Jr., Cory Sorice, James Scott Murray, Gregory John Stanek, and Colin Barns Willmott. Barrier operator feature enhancement. United States Patent 9,122,254, September 2015. Assignee: The Chamberlain Group, Inc. (Elmhurst, IL).
[45]
M. Ceccato, A. Capiluppi, P. Falcarin, and C. Boldyreff. A large study on the effect of code obfuscation on the quality of java code. Empirical Software Engineering, 20(6):1486–1524, 2015. (doi:10.1007/s10664-014-9321-0)
[46]
T. Chaikalis and A. Chatzigeorgiou. Forecasting java software evolution trends employing network models. IEEE Transactions on Software Engineering, 41(6):582–602, 2015. (doi:10.1109/TSE.2014.2381249)
[47]
P. Chakraborty. Fifty years of peephole optimization. Current Science, 108(12):2186–2190, 2015.
[48]
R.-I. Chang, T.-T. Wei, and C.-H. Wang. A cost-effective key distribution of P2P IPTV DRM over opportunistic multicast overlay for e-commerce systems. Electronic Commerce Research, 15(1):49–71, 2015. (doi:10.1007/s10660-015-9176-5)
[49]
H. Chanti, L. Thiry, M. Hassenforder, E. Blanchard, and P. Fromy. Fire safety DSL based algebra. In 3rd International Conference on Control, Engineering and Information Technology, CEIT 2015. Institute of Electrical and Electronics Engineers Inc., 2015. (doi:10.1109/CEIT.2015.7233083)
[50]
F. Chauvel, H. Song, N. Ferry, and F. Fleurey. Evaluating robustness of cloud-based systems. Journal of Cloud Computing, 4(1), 2015. (doi:10.1186/s13677-015-0043-7)
[51]
M.K. Chawla and I. Chhabra. SQMMA: Software quality model for maintainability analysis. In 8th ACM COMPUTE INDIA Conference, Compute 2015, volume 29-31-October-2015, pages 9–17. Association for Computing Machinery, 2015. (doi:10.1145/2835043.2835062)
[52]
L. Chen, B. Fang, Z. Shang, and Y. Tang. Negative samples reduction in cross-company software defects prediction. Information and Software Technology, 62(1):67–77, 2015. (doi:10.1016/j.infsof.2015.01.014)
[53]
X. Chen, G. Sime, C. Lutteroth, and G. Weber. OAuthHub-a service for consolidating authentication services. In 19th IEEE International Enterprise Distributed Object Computing Conference Workshps and Demonstrations, EDOCW 2015, volume 2015-November, pages 201–210. Institute of Electrical and Electronics Engineers Inc., 2015. (doi:10.1109/EDOC.2015.36)
[54]
Y.C. Cheng, J.-S. Jwo, and C.-T. Tsai. A leading indicator of post-release defect density in refactoring-based software maintenance — a case study. International Computer Symposium, ICS 2014, 274:1815–1821, 2015. (doi:10.3233/978-1-61499-484-8-1815)
[55]
N. Choi and J.A. Pruett. The characteristics and motivations of library open source software developers: An empirical study. Library and Information Science Research, 37(2):109–117, 2015. (doi:10.1016/j.lisr.2015.02.007)
[56]
C.Y. Chong and S.P. Lee. Analyzing maintainability and reliability of object-oriented software using weighted complex network. Journal of Systems and Software, 110:28–53, 2015. (doi:10.1016/j.jss.2015.08.014)
[57]
S.R. Choudhary, A. Gorla, and A. Orso. Automated test input generation for android: Are we there yet? In 30th IEEE/ACM International Conference on Automated Software Engineering, ASE 2015, pages 429–440. Institute of Electrical and Electronics Engineers Inc., 2015. (doi:10.1109/ASE.2015.89)
[58]
T. Chusho and J. Xu. Description and implementation of business logic for end-user-initiative development. 14th International Conference on New Trends in Intelligent Software Methodology, Tools, and Techniques, SoMeT 2015, 532:355–366, 2015. (doi:10.1007/978-3-319-22689-7_27)
[59]
T. Chusho. The classification of matching applications for end-user-initiative development. In International MultiConference of Engineers and Computer Scientists 2015, IMECS 2015, volume 1, pages 476–481. Newswood Limited, 2015.
[60]
T. Clark. XPL: A language for modular homogeneous language embedding. Science of Computer Programming, 98:589–616, 2015. (doi:10.1016/j.scico.2014.08.005)
[61]
D.Ó. Coileáin and D. O'Mahony. Accounting and accountability in content distribution architectures: A survey. ACM Computing Surveys, 47(4), 2015. (doi:10.1145/2723701)
[62]
Rod Cope. Analyzing content using abstractable interchangeable elements. United States Patent 9,092,487, July 2015. Assignee: OpenLogic, Inc. (Broomfield, CO).
[63]
V. Cosentino, J.L.C. Izquierdo, and J. Cabot. Gitana: A SQL-based Git repository inspector. 34th International Conference on Conceptual Modeling, ER 2015, 9381:329–343, 2015. (doi:10.1007/978-3-319-25264-3_24)
[64]
A. Costa, A. Alfieri, A. Matta, and S. Fichera. A parallel tabu search for solving the primal buffer allocation problem in serial production systems. Computers and Operations Research, 64:97–112, 2015. (doi:10.1016/j.cor.2015.05.013)
[65]
L.D. Couto, P.W.V. Tran-Jorgensen, J.W. Coleman, and K. Lausdahl. Migrating to an extensible architecture for abstract syntax trees. In 12th Working IEEE/IFIP Conference on Software Architecture, WICSA 2015, pages 145–154. Institute of Electrical and Electronics Engineers Inc., 2015. (doi:10.1109/WICSA.2015.10)
[66]
M. De Bayser, L.G. Azevedo, and R. Cerqueira. ResearchOps: The case for DevOps in scientific applications. In 14th IFIP/IEEE International Symposium on Integrated Network Management, IM 2015, pages 1398–1404. Institute of Electrical and Electronics Engineers Inc., 2015. (doi:10.1109/INM.2015.7140503)
[67]
S. De Kinderen and Q. Ma. Requirements engineering for the design of conceptual modeling languages. Applied Ontology, 10(1):7–24, 2015. (doi:10.3233/AO-150139)
[68]
A. Decan, T. Mens, M. Claes, and P. Grosjean. On the development and distribution of r packages: An empirical analysis of the r ecosystem. In European Conference on Software Architecture Workshops, ECSAW 2015, volume 07-11-September-2015. Association for Computing Machinery, 2015. (doi:10.1145/2797433.2797476)
[69]
S. Delbruel, D. Frey, and F. Taïani. Decentralized view prediction for global content placement. In 14th Workshop on Adaptive and Reflective Middleware, ARM 2015. Association for Computing Machinery, Inc, 2015. (doi:10.1145/2834965.2834974)
[70]
V.M. Deshmukh and G.R. Bamnote. An empirical evaluation of optimization parameters in XML parsing for performance enhancement. In IEEE International Conference on Computer, Communication and Control, IC4 2015. Institute of Electrical and Electronics Engineers Inc., 2015. (doi:10.1109/IC4.2015.7375582)
[71]
V.M. Deshmukh and G.R. Bamnote. An empirical study of XML parsers across applications. In 1st International Conference on Computing, Communication, Control and Automation, ICCUBEA 2015, pages 396–401. Institute of Electrical and Electronics Engineers Inc., 2015. (doi:10.1109/ICCUBEA.2015.83)
[72]
G. Dèvai, D. Leskò, and M. Tejfel. The EDSL's struggle for their sources. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 8606:300–335, 2015. (doi:10.1007/978-3-319-15940-9_7)
[73]
D. Di Ruscio, D.S. Kolovos, I. Korkontzelos, N. Matragkas, and J.J. Vinju. OSSMETER: A software measurement platform for automatically analysing open source software projects. In 10th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering, ESEC/FSE 2015, pages 970–973. Association for Computing Machinery, Inc, 2015. (doi:10.1145/2786805.2803186)
[74]
Q. Do, B. Martini, and K.-K.R. Choo. Exfiltrating data from Android devices. Computers and Security, 48:74–91, 2015. (doi:10.1016/j.cose.2014.10.016)
[75]
M. Dolores Gallego, S. Bueno, F. José Racero, and J. Noyes. Open source software: The effects of training on acceptance. Computers in Human Behavior, 49:390–399, 2015. (doi:10.1016/j.chb.2015.03.029)
[76]
R. Dyer, H.A. Nguyen, H. Rajan, and T.N. Nguyen. Boa: Ultra-large-scale software repository and source-code mining. ACM Transactions on Software Engineering and Methodology, 25(1), 2015. (doi:10.1145/2803171)
[77]
F. Ebert, F. Castor, and A. Serebrenik. An exploratory study on exception handling bugs in Java programs. Journal of Systems and Software, 106:82–101, 2015. (doi:10.1016/j.jss.2015.04.066)
[78]
M. Ebrahimi and S.M.T. Rouhani Rankoohi. An ant-based approach to cluster peers in P2P database systems. Knowledge and Information Systems, 43(1):219–247, 2015. (doi:10.1007/s10115-014-0743-1)
[79]
Michael Eddington and Adam Cecchetti. Metaphor based language fuzzing of computer code. United States Patent 9,098,352, August 2015. Assignee: DEJA VU SECURITY, LLC (Seattle, WA).
[80]
Z.J. Estrada, C. Pham, F. Deng, Z. Kalbarczyk, R.K. Iyer, and L. Yan. Dynamic VM dependability monitoring using hypervisor probes. In 11th European Dependable Computing Conference, EDCC 2015, pages 61–72. Institute of Electrical and Electronics Engineers Inc., 2015. (doi:10.1109/EDCC.2015.9)
[81]
Q. Fan, H. Wang, G. Yin, and T. Wang. Ranking open source software based on crowd wisdom. In 6th IEEE International Conference on Software Engineering and Service Science, ICSESS 2015, volume 2015-November, pages 966–972. IEEE Computer Society, 2015. (doi:10.1109/ICSESS.2015.7339215)
[82]
F. Felisberto, R. Laza, F. Fdez-Riverola, and A. Pereira. A distributed multiagent system architecture for body area networks applied to healthcare monitoring. BioMed Research International, 2015, 2015. (doi:10.1155/2015/192454)
[83]
M.M. Ferreira, K.A.M. Ferreira, and H.T. Marques-Neto. Mapping the potential change impact in object-oriented software. In 30th Annual ACM Symposium on Applied Computing, SAC 2015, volume 13-17-April-2015, pages 1654–1656. Association for Computing Machinery, 2015. (doi:10.1145/2695664.2696043)
[84]
Michael H. Ficco. Distributed media-protection systems and methods to operate the same. United States Patent 9,178,693, November 2015. Assignee: The DIRECTV Group, Inc. (El Segundo, CA).
[85]
Michael H. Ficco. Distributed media-aggregation systems and methods to operate the same. United States Patent 9,225,761, December 2015. Assignee: The DIRECTV Group, Inc. (El Segundo, CA).
[86]
F.F. Filho, M.G. Perin, C. Treude, S. Marczak, L. Melo, I.M. da Silva, and L.B. dos Santos. A study on the geographical distribution of Brazil's prestigious software developers. Journal of Internet Services and Applications, 6(1), 2015. (doi:10.1186/s13174-015-0032-6)
[87]
E. Flores, A. Barrõn Cedeño, L. Moreno, and P. Rosso. Uncovering source code reuse in large-scale academic environments. Computer Applications in Engineering Education, 23(3):383–390, 2015. (doi:10.1002/cae.21608)
[88]
F.A. Fontana, V. Ferme, M. Zanoni, and A. Yamashita. Automatic metric thresholds derivation for code smell detection. In 6th International Workshop on Emerging Trends in Software Metrics, WETSoM 2015, volume 2015-August, pages 44–53. IEEE Computer Society, 2015. (doi:10.1109/WETSoM.2015.14)
[89]
X. Franch, R.S. Kenett, A. Susi, N. Galanis, R. Glott, and F. Mancinelli. Community data for OSS adoption risk management. The Art and Science of Analyzing Software Data, pages 377–409, 2015. (doi:10.1016/B978-0-12-411519-4.00014-8)
[90]
O. Franco-Bedoya, D. Ameller, D. Costal, and X. Franch. Measuring the quality of open source software ecosystems using QuESo. 9th International Joint Conference on Software Technologies, ICSOFT 2014, 555:39–62, 2015. (doi:10.1007/978-3-319-25579-8_3)
[91]
L. Fürst, M. Mernik, and V. Mahnič. Converting metamodels to graph grammars: doing without advanced graph grammar features. Software and Systems Modeling, 14(3):1297–1317, 2015. (doi:10.1007/s10270-013-0380-2)
[92]
T. Galinac Grbac and D. Huljenić. On the probability distribution of faults in complex software systems. Information and Software Technology, 58:250–258, 2015. (doi:10.1016/j.infsof.2014.06.014)
[93]
M. Gatrell and S. Counsell. The effect of refactoring on change and fault-proneness in commercial C# software. Science of Computer Programming, 102:44–56, 2015. (doi:10.1016/j.scico.2014.12.002)
[94]
M. Gatrell, S. Counsell, S. Swift, R.M. Hierons, and X. Liu. Test and production classes of an industrial C# system: A refactoring and fault perspective. In 41st Euromicro Conference on Software Engineering and Advanced Applications, SEAA 2015, pages 35–38. Institute of Electrical and Electronics Engineers Inc., 2015. (doi:10.1109/SEAA.2015.40)
[95]
E. Gebennini, A. Grassi, and C. Fantuzzi. The two-machine one-buffer continuous time model with restart policy. Annals of Operations Research, 231(1):33–64, 2015. (doi:10.1007/s10479-013-1373-9)
[96]
S.M. Ghanem, M.A. Ismail, and S.G. Omar. VITAL: Structured and clustered super-peer network for similarity search. Peer-to-Peer Networking and Applications, 8(6):965–991, 2015. (doi:10.1007/s12083-014-0304-0)
[97]
A.H. Ghapanchi and M. Tavana. A longitudinal study of the impact of open source software project characteristics on positive outcomes. Information Systems Management, 32(4):285–298, 2015. (doi:10.1080/10580530.2015.1079999)
[98]
M. Gharehyazie, D. Posnett, B. Vasilescu, and V. Filkov. Developer initiation and social interactions in OSS: A case study of the Apache software foundation. Empirical Software Engineering, 20(5):1318–1353, 2015. (doi:10.1007/s10664-014-9332-x)
[99]
Y. Gil, F. Michel, V. Ratnakar, M. Hauder, C. Duffy, H. Dugan, and P. Hanson. A task-centered framework for computationally-grounded science collaborations. In 11th IEEE International Conference on eScience, eScience 2015, pages 352–361. Institute of Electrical and Electronics Engineers Inc., 2015. (doi:10.1109/eScience.2015.76)
[100]
Jr. Girola, F. and J.L.V. Barbosa. U-deal: A decentralized trail-aware model for business opportunities identification. IEEE Latin America Transactions, 13(5):1640–1648, 2015. (doi:10.1109/TLA.2015.7112026)
[101]
G. Godena, T. Lukman, M. Heričko, and S. Strmčnik. The experience of implementing model-driven engineering tools in the process control domain. Information Technology and Control, 44(2):135–147, 2015. (doi:10.5755/j01.itc.44.2.6258)
[102]
H. Groenda, S. Seifermann, K. Müller, and G. Jaworek. The cooperate assistive teamwork environment for software description languages. 13th European Conference on the Advancement of Assistive Technology, AAATE 2015, 217:111–118, 2015. (doi:10.3233/978-1-61499-566-1-111)
[103]
L. Gui, R. Shen, Y. Yu, D. Feng, Y. Peng, and W. Liu. DLG-hypertree: A low-diameter, server-centric datacenter network architecture. In 8th IEEE International Conference on Cloud Computing, CLOUD 2015, pages 1077–1080. Institute of Electrical and Electronics Engineers Inc., 2015. (doi:10.1109/CLOUD.2015.156)
[104]
O. Günalp, C. Escoffier, and P. Lalanda. Demo abstract: Reproducible deployment of pervasive applications. In 13th IEEE International Conference on Pervasive Computing and Communication, PerCom Workshops 2015, pages 211–213. Institute of Electrical and Electronics Engineers Inc., 2015. (doi:10.1109/PERCOMW.2015.7134025)
[105]
O. Günalp, C. Escoffier, and P. Lalanda. Rondo: A tool suite for continuous deployment in dynamic environments. In IEEE International Conference on Services Computing, SCC 2015, pages 720–727. Institute of Electrical and Electronics Engineers Inc., 2015. (doi:10.1109/SCC.2015.102)
[106]
Satya V. Gupta and Prashant Shenoy. System and methods for run time detection and correction of memory corruption. United States Patent 8,966,312, February 2015. Assignee: Virsec Systems, Inc. (Acton, MA).
[107]
N. Gupta, D. Singh, and A. Sharma. Identifying effective software metrics for categorical defect prediction using structural equation modeling. In 3rd International Symposium on Women in Computing and Informatics, WCI 2015, volume 10-13-August-2015, pages 59–65. Association for Computing Machinery, 2015. (doi:10.1145/2791405.2791484)
[108]
V. Gupta, N. Ganeshan, and T.K. Singhal. Determining the root causes of various software bugs throughsoftware metrics. In 2nd International Conference on Computing for Sustainable Global Development, INDIACom 2015, pages 1211–1215. Institute of Electrical and Electronics Engineers Inc., 2015.
[109]
S. Hai-Jew. Conducting semantic-based network analyses from social media data: Extracted insights about the data leakage movement. In Design Strategies and Innovations in Multimedia Presentations, pages 369–427. IGI Global, 2015. (doi:10.4018/978-1-4666-8696-0.ch011)
[110]
M.M. Hall, C.B. Jones, and P. Smart. Spatial natural language generation for location description in photo captions. 12th International Conference on Spatial Information Theory, COSIT 2015, 9368:196–223, 2015. (doi:10.1007/978-3-319-23374-1_10)
[111]
M. Harari and D. Jobin. International co-operation. The OECD Convention on Bribery, pages 486–533, 2015. (doi:10.1007/CBO9781139565332)
[112]
K. Haribabu and C. Hota. Analysis of floating index caching technique for P2P overlay index propagation. In 16th International Conference on Distributed Computing and Networking, ICDCN 2015, volume 04-07-January-2015. Association for Computing Machinery, 2015. (doi:10.1145/2684464.2684489)
[113]
T. Hartmann, A. Moawad, F. Fouquet, G. Nain, J. Klein, and Y. Le Traon. Stream my models: Reactive peer-to-peer distributed models@run.time. In 18th ACM/IEEE International Conference on Model Driven Engineering Languages and Systems, MODELS 2015, pages 80–89. Institute of Electrical and Electronics Engineers Inc., 2015. (doi:10.1109/MODELS.2015.7338238)
[114]
John M. Harvey, Michael David Atella, Thomas Francis Doyle, Loyie H. Sims, III, and Satish N. Ram. Digital over-the-air keying system. United States Patent 9,165,416, October 2015. Assignee: OMNITRACS, LLC (Dallas, TX).
[115]
L. Hatton and G. Warr. Protein structure and evolution: Are they constrained globally by a principle derived from information theory? PLoS ONE, 10(5), 2015. (doi:10.1371/journal.pone.0125663)
[116]
P. He, B. Li, X. Liu, J. Chen, and Y. Ma. An empirical study on software defect prediction with a simplified metric set. Information and Software Technology, 59:170–190, 2015. (doi:10.1016/j.infsof.2014.11.006)
[117]
A. Heikkinen, T. Koskela, and M. Ylianttila. Performance evaluation of distributed data delivery on mobile devices using WebRTC. In 11th International Wireless Communications and Mobile Computing Conference, IWCMC 2015, pages 1036–1042. Institute of Electrical and Electronics Engineers Inc., 2015. (doi:10.1109/IWCMC.2015.7289225)
[118]
H. Heitkötter, H. Kuchen, and T.A. Majchrzak. Extending a model-driven cross-platform development approach for business apps. Science of Computer Programming, 97(P1):31–36, 2015. (doi:10.1016/j.scico.2013.11.013)
[119]
S.M. Hemam and O. Hioual. Load balancing by requests redistribution in failure nodes context. In International Conference on Intelligent Information Processing, Security and Advanced Communication, IPAC 2015, volume 23-25-November-2015. Association for Computing Machinery, 2015. (doi:10.1145/2816839.2816847)
[120]
A. Hindle. Green mining: a methodology of relating software change and configuration to power consumption. Empirical Software Engineering, 20(2):374–409, 2015. (doi:10.1007/s10664-013-9276-6)
[121]
J. Hintsch, C. Gorling, and K. Turowski. Modularization of software as a service products: A case study of the configuration management tool Puppet. In 3rd International Conference on Enterprise Systems, ES 2015, pages 184–191. Institute of Electrical and Electronics Engineers Inc., 2015. (doi:10.1109/ES.2015.25)
[122]
B. Hoisl and S. Sobernig. Consistency rules for uml-based domain-specific language models: A literature review. In 8th Joint International Workshop on Model-Based Architecting of Cyber-Physical and Embedded Systems and 1st International Workshop on UML Consistency Rules, ACES-MB 2015 and WUCOR 2015, volume 1508, pages 29–36. CEUR-WS, 2015.
[123]
D. Holstein, T.W. Cease, and M.G. Seewald. Application and management of cybersecurity measures for protection and control. In 7th International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, CyberC 2015, pages 76–83. Institute of Electrical and Electronics Engineers Inc., 2015. (doi:10.1109/CyberC.2015.80)
[124]
F.-M. Huang, Y.H. Huang, C. Szu, A.Y.S. Su, M.C. Chen, and Y.S. Sun. A study of a life logging smartphone app and its power consumption observation in location-based service scenario. In 3rd IEEE International Conference on Mobile Services, MS 2015, pages 225–232. Institute of Electrical and Electronics Engineers Inc., 2015. (doi:10.1109/MobServ.2015.40)
[125]
X. Huang, T. Zhao, and Y. Cao. PIR: A domain specific language for multimedia information retrieval. In Web Design and Development: Concepts, Methodologies, Tools, and Applications, volume 2-3, pages 748–771. IGI Global, 2015. (doi:10.4018/978-1-4666-8619-9.ch035)
[126]
M.C. Huang. Using SOA and web 2.0 in web service applications. In International Conference on Network Security and Communication Engineering, NSCE 2014, pages 339–342. CRC Press/Balkema, 2015.
[127]
A.-K. Hueske and E. Guenther. What hampers innovation? External stakeholders, the organization, groups and individuals: a systematic review of empirical barrier research. Management Review Quarterly, 65(2):113–148, 2015. (doi:10.1007/s11301-014-0109-5)
[128]
A.-K. Hueske, J. Endrikat, and E. Guenther. External environment, the innovating organization, and its individuals: A multilevel model for identifying innovation barriers accounting for social uncertainties. Journal of Engineering and Technology Management - JET-M, 35:45–70, 2015. (doi:10.1016/j.jengtecman.2014.10.001)
[129]
R. Jabangwe, J. Börstler, and K. Petersen. Handover of managerial responsibilities in global software development: a case study of source code evolution and quality. Software Quality Journal, 23(4):539–566, 2015. (doi:10.1007/s11219-014-9247-1)
[130]
M. Jarke and C.R. Prause. Gamification for enforcing coding conventions. In 10th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering, ESEC/FSE 2015, pages 649–660. Association for Computing Machinery, Inc, 2015. (doi:10.1145/2786805.2786806)
[131]
K. Jezek and J. Ambroz. Detecting incompatibilities concealed in duplicated software libraries. In 41st Euromicro Conference on Software Engineering and Advanced Applications, SEAA 2015, pages 233–240. Institute of Electrical and Electronics Engineers Inc., 2015. (doi:10.1109/SEAA.2015.17)
[132]
D. Jing and H. Yang. Creative computing for bespoke ideation. In 2015 IEEE 39th Annual Computer Software and Applications Conference - Stephen S. Yau Academic Symposium, COMPSAC 2015, volume 1, pages 34–43. IEEE Computer Society, 2015. (doi:10.1109/COMPSAC.2015.203)
[133]
J.L. Johnson, H. tom Wörden, and K. van Wijk. PLACE: An open-source Python package for laboratory automation, control, and experimentation. Journal of Laboratory Automation, 20(1):10–16, 2015. (doi:10.1177/2211068214553022)
[134]
R. Josephine Grace Rexilla and P. Shanthi. Optimizing cloud bandwidth and cost using content aware chunk prediction to improve efficiency of retrieval. Indian Journal of Science and Technology, 8(16), 2015. (doi:10.17485/ijst/2015/v8i16/61966)
[135]
E. Jung. A persistent web data architecture with named data networking. Lecture Notes in Electrical Engineering, 373:153–158, 2015. (doi:10.1007/978-981-10-0281-6_22)
[136]
M. Jureczko and L. Madeyski. Cross-project defect prediction with respect to code ownership model: An empirical study. E-Informatica Software Engineering Journal, 9(1):21–35, 2015. (doi:10.5277/e-Inf150102)
[137]
G.M. Kapitsaki, N.D. Tselikas, and I.E. Foukarakis. An insight into license tools for open source software systems. Journal of Systems and Software, 102:72–87, 2015. (doi:10.1016/j.jss.2014.12.050)
[138]
R. Karthika, M. Anandaraj, and K.P. Vijayakumar. Efficient content distribution mechanism in peer to peer networks. International Journal of Applied Engineering Research, 10(49):334–339, 2015.
[139]
S. Karumanchi, J. Li, and A. Squicciarini. Securing resource discovery in content hosting networks. Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, 152:153–173, 2015. (doi:10.1007/978-3-319-23829-6_12)
[140]
K. Kasemsap. The role of e-business adoption in the business world. Strategic Infrastructure Development for Economic Growth and Social Change, pages 51–63, 2015. (doi:10.4018/978-1-4666-7470-7.ch005)
[141]
Y. Kashiwabara, T. Ishio, H. Hata, and K. Inoue. Method verb recommendation using association rule mining in a set of existing projects. IEICE Transactions on Information and Systems, E98D(3):627–636, 2015. (doi:10.1587/transinf.2014EDP7276)
[142]
A. Kaur, K. Kaur, and H. Kaur. An investigation of the accuracy of code and process metrics for defect prediction of mobile applications. In 4th International Conference on Reliability, Infocom Technologies and Optimization, ICRITO 2015. Institute of Electrical and Electronics Engineers Inc., 2015. (doi:10.1109/ICRITO.2015.7359220)
[143]
A. Kaur, K. Kaur, and K. Pathak. A proposed new model for maintainability index of open source software. In 2014 3rd International Conference on Reliability, Infocom Technologies and Optimization, ICRITO 2014. Institute of Electrical and Electronics Engineers Inc., 2015. (doi:10.1109/ICRITO.2014.7014758)
[144]
S. Kaur, K. Kaur, and N. Kaur. An empirical investigation of relationship between software metrics. In 2nd IEEE International Conference on Advances in Computing and Communication Engineering, ICACCE 2015, pages 639–643. Institute of Electrical and Electronics Engineers Inc., 2015. (doi:10.1109/ICACCE.2015.23)
[145]
M. Kaya and S.A. Özel. Integrating an online compiler and a plagiarism detection tool into the Moodle distance education system for easy assessment of programming assignments. Computer Applications in Engineering Education, 23(3):363–373, 2015. (doi:10.1002/cae.21606)
[146]
R. Kikas, M. Dumas, and D. Pfahl. Issue dynamics in github projects. 16th International Conference on Product-Focused Software Process Improvement, PROFES 2015, 9459:295–310, 2015. (doi:10.1007/978-3-319-26844-6_22)
[147]
Brendan Kitts, Brian Burdick, Dyng Au, and Tyson Roberts. Method and system for automatically targeting ads to television media using demographic similarity. United States Patent 9,088,833, July 2015. Assignee: LUCID COMMERCE, INC. (Seattle, WA).
[148]
Brendan Kitts, Brian Burdick, Dyng Au, and Tyson Roberts. Targeting television ads using keywords. United States Patent 9,161,099, October 2015. Assignee: Lucid Commerce, Inc. (Seattle, WA).
[149]
L. Kong, G. Bauer, and J. Hale. Robust wireless signal indoor localization. Concurrency Computation, 27(11):2839–2850, 2015. (doi:10.1002/cpe.3443)
[150]
M. Konôpka and M. Bieliková. Software developer activity as a source for identifying hidden source code dependencies. 41st International Conference on Current Trends in Theory and Practice of Computer Science, SOFSEM 2015, 8939:449–462, 2015.
[151]
S.Y. Kose and O. Kilincci. Analyzing buffer allocations using utilization-based search methods. In 45th International Conference on Computers and Industrial Engineering, CIE 2015. Universite de Lorraine, 2015.
[152]
S.Y. Kose and O. Kilincci. Hybrid approach for buffer allocation in open serial production lines. Computers and Operations Research, 60:67–78A, 2015. (doi:10.1016/j.cor.2015.01.009)
[153]
S.Y. Köse, L. Demir, S. Tunal, and D.T. Eliiyi. Capacity improvement using simulation optimization approaches: A case study in the thermotechnology industry. Engineering Optimization, 47(2):149–164, 2015. (doi:10.1080/0305215X.2013.875166)
[154]
B.T.S. Kumar, D.V. Kumar, and K.R. Prithviraj. Wayback machine: Reincarnation to vanished online citations. Program, 49(2):205–223, 2015. (doi:10.1108/PROG-07-2013-0039)
[155]
O.A.L. Lemos, A.C. De Paula, H. Sajnani, and C.V. Lopes. Can the use of types and query expansion help improve large-scale code search? In IEEE 15th International Working Conference on Source Code Analysis and Manipulation, SCAM 2015, pages 41–50. Institute of Electrical and Electronics Engineers Inc., 2015. (doi:10.1109/SCAM.2015.7335400)
[156]
Abha Lessing, Christophe Schnelle, Paul William Leslie, and Geoffrey John Nolan. MALTweb multi-axis viewing interface and higher level scoping. United States Patent 8,972,846, March 2015. Assignee: Timebase Pty Limited (Sydney NSW, AU).
[157]
Abha Lessing, Christophe Schnelle, and Peter Mariani. Maltweb multi-axis viewing interface and higher level scoping. United States Patent 8,983,955, March 2015. Assignee: Timebase PTY Limited (Sydney NSW, AU).
[158]
L. Li, J. Wang, and Y. Hui. ReliableTrust: Trust model based on professional knowledge node of local knowledge for a reliable request. Journal of Computational Information Systems, 11(18):6589–6596, 2015. (doi:10.12733/jcis15354)
[159]
W. Li, W. Guo, and E. Franzinelli. Achieving dynamic workload balancing for P2P volunteer computing. In 44th Annual Conference of the International Conference on Parallel Processing Workshops, ICPPW 2015, volume 2015-January, pages 240–249. Institute of Electrical and Electronics Engineers Inc., 2015. (doi:10.1109/ICPPW.2015.34)
[160]
Y. Li, Y. Cheng, V. Gligor, and A. Perrig. Establishing software-only root of trust on embedded systems: Facts and fiction. 23rd International Workshop on Security Protocols, 2015, 9379:50–68, 2015. (doi:10.1007/978-3-319-26096-9_7)
[161]
S.A. Licorish, C.W. Lee, B.T.R. Savarimuthu, P. Patel, and S.G. Macdonell. They'll know it when they see it: Analyzing post-release feedback from the Android community. In 21st Americas Conference on Information Systems, AMCIS 2015. Americas Conference on Information Systems, 2015.
[162]
J. Liebig, A. Janker, F. Garbe, S. Apel, and C. Lengauer. Morpheus: Variability-aware refactoring in the wild. In 37th IEEE/ACM International Conference on Software Engineering, ICSE 2015, volume 1, pages 380–391. IEEE Computer Society, 2015. (doi:10.1109/ICSE.2015.57)
[163]
J. Lima, C. Treude, F.F. Filho, and U. Kulesza. Assessing developer contribution with repository mining-based metrics. In 31st IEEE International Conference on Software Maintenance and Evolution, ICSME 2015, pages 536–540. Institute of Electrical and Electronics Engineers Inc., 2015. (doi:10.1109/ICSM.2015.7332509)
[164]
Z. Lin and J. Whitehead. Why power laws? an explanation from fine-grained code changes. In 12th Working Conference on Mining Software Repositories, MSR 2015, volume 2015-August, pages 68–75. IEEE Computer Society, 2015. (doi:10.1109/MSR.2015.14)
[165]
J. Lin, W.-T. Zhu, Q. Wang, N. Zhang, J. Jing, and N. Gao. RIKE+: Using revocable identities to support key escrow in public key infrastructures with flexibility. IET Information Security, 9(2):136–147, 2015. (doi:10.1049/iet-ifs.2013.0552)
[166]
C.V. Lopes and J. Ossher. How scale affects structure in Java programs. In 2015 ACM SIGPLAN International Conference on Object-Oriented Programming, Systems, Languages, and Applications, OOPSLA 2015, volume 25-30-Oct-2015, pages 675–694. Association for Computing Machinery, 2015. (doi:10.1145/2814270.2814300)
[167]
E. Loukis, Y. Charalabidis, and A. Androutsopoulou. Evaluating a passive social media citizensourcing innovation. 14th IFIP WG 8.5 International Conference on Electronic Government, EGOV 2015, 9248:305–320, 2015. (doi:10.1007/978-3-319-22479-4_23)
[168]
L.E. Lwakatare, P. Kuvaja, and M. Oivo. Dimensions of devops. 16th International Conference on Agile Software Development, XP 2015, 212:212–217, 2015. (doi:10.1007/978-3-319-18612-2_19)
[169]
H.J. Macho, G. Robles, and J.M. González-Barahona. Evaluation of FLOSS by analyzing its software evolution: An example using the moodle platform. Journal of Information Technology Research, 8(1):62–81, 2015. (doi:10.4018/JITR.2015010105)
[170]
L. Madeyski and M. Jureczko. Which process metrics can significantly improve defect prediction models? an empirical study. Software Quality Journal, 23(3):393–422, 2015. (doi:10.1007/s11219-014-9241-7)
[171]
R.K. Mahapatra, R. Manzar, and V.S. Bhadauria. Adoption and use of open source infrastructure software by large corporations: The case of MySQL. Journal of Database Management, 26(4):1–17, 2015. (doi:10.4018/JDM.2015100101)
[172]
A. Malatras. State-of-the-art survey on P2P overlay networks in pervasive computing environments. Journal of Network and Computer Applications, 55:1–23, 2015. (doi:10.1016/j.jnca.2015.04.014)
[173]
R. Malhotra and A.J. Bansal. Fault prediction considering threshold effects of object-oriented metrics. Expert Systems, 32(2):203–219, 2015. (doi:10.1111/exsy.12078)
[174]
R. Malhotra, A. Chug, and P. Khosla. Prioritization of classes for refactoring: A step towards improvement in software quality. In 3rd International Symposium on Women in Computing and Informatics, WCI 2015, volume 10-13-August-2015, pages 228–234. Association for Computing Machinery, 2015. (doi:10.1145/2791405.2791463)
[175]
M. Marchesi. 15 years of application of statistical physics methods to the study of software systems. In 6th International Workshop on Emerging Trends in Software Metrics, WETSoM 2015, volume 2015-August, pages 1–2. IEEE Computer Society, 2015. (doi:10.1109/WETSoM.2015.9)
[176]
J.E. Marynowski, A.O. Santin, and A.R. Pimentel. Method for testing the fault tolerance of MapReduce frameworks. Computer Networks, 86:1–13, 2015. (doi:10.1016/j.comnet.2015.04.009)
[177]
C. Mateos, M. Crasso, A. Zunino, and J.L. Ordiales Coscia. A stitch in time saves nine: Early improving code-first web services discoverability. International Journal of Cooperative Information Systems, 24(2), 2015. (doi:10.1142/S0218843015500045)
[178]
P. Mayer, J. Velasco, A. Klarl, R. Hennicker, M. Puviani, F. Tiezzi, R. Pugliese, J. Keznikl, and T. Bureš. The autonomic cloud. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 8998:495–512, 2015.
[179]
F. Medeiros, C. Kästner, M. Ribeiro, S. Nadi, and R. Gheyi. The love/hate relationship with the C preprocessor: An interview study. In 29th European Conference on Object-Oriented Programming, ECOOP 2015, volume 37, pages 495–518. Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, 2015. (doi:10.4230/LIPIcs.ECOOP.2015.495)
[180]
John D. Mehr, Elissa E. S. Murphy, Navjot Virk, and Lara M. Sosnosky. Hybrid distributed and cloud backup architecture. United States Patent 8,935,366, January 2015. Assignee: Microsoft Corporation (Redmond, WA).
[181]
P. Mehta, J. Sharda, and M.L. Das Maniklal. Sqlshield: Preventing SQL injection attacks by modifying user input data. 11th International Conference on Information Systems Security, ICISS 2015, 9478:192–206, 2015. (doi:10.1007/978-3-319-26961-0_12)
[182]
Archana Vidya Menon. Method and system for managing display of personalized advertisements in a user interface (UI) of an on-screen interactive program (IPG). United States Patent 9,106,942, August 2015.
[183]
M. Mesgari, C. Okoli, M. Mehdi, F.Å. Nielsen, and A. Lanamäki. "the sum of all human knowledge": A systematic review of scholarly research on the content of Wikipedia. Journal of the Association for Information Science and Technology, 66(2):219–245, 2015. (doi:10.1002/asi.23172)
[184]
F. Michel, V. Ratnakar, Y. Gil, and M. Hauder. A virtual crowdsourcing community for open collaboration in science processes. In 21st Americas Conference on Information Systems, AMCIS 2015. Americas Conference on Information Systems, 2015.
[185]
W. Mo, B. Shen, Y. He, and H. Zhong. GEMiner: Mining social and programming behaviors to identify experts in GitHub. In 7th Asia-Pacific Symposium on Internetware, Internetware 2015, volume 06-November-2015, pages 93–101. Association for Computing Machinery, 2015. (doi:10.1145/2875913.2875924)
[186]
A. Muñoz, M. Urueña, R. Aparicio, and G. Rodrıguez De Los Santos. Digital wiretap warrant: Improving the security of ETSI lawful interception. Digital Investigation, 14:1–16, 2015. (doi:10.1016/j.diin.2015.04.005)
[187]
S. Mukherjee. Video Games and Storytelling: Reading Games and Playing Books. Palgrave Macmillan, 2015. (doi:10.1057/9781137525055)
[188]
E. Murphy-Hill, T. Zimmermann, C. Bird, and N. Nagappan. The design space of bug fixes and how developers navigate it. IEEE Transactions on Software Engineering, 41(1):65–81, 2015. (doi:10.1109/TSE.2014.2357438)
[189]
Z. Mushtaq and G. Rasool. Multilingual source code analysis: State of the art and challenges. In 9th International Conference on Open Source Systems and Technologies, ICOSST 2015, pages 170–175. Institute of Electrical and Electronics Engineers Inc., 2015. (doi:10.1109/ICOSST.2015.7396422)
[190]
N. Nahas and M. Nourelfath. Buffer allocation, machine selection and preventive maintenance optimization in unreliable production lines. In International Conference on Industrial Engineering and Systems Management, IEEE IESM 2015, pages 1028–1033. Institute of Electrical and Electronics Engineers Inc., 2015. (doi:10.1109/IESM.2015.7380281)
[191]
K.L. Narasimhamu, V. Venugopal Reddy, and C.S. Rao. Optimization of buffer allocation in manufacturing system using particle swarm optimization. International Review on Modelling and Simulations, 8(2):212–222, 2015.
[192]
D.M.C. Nascimento, R. Almeida Bittencourt, and C. Chavez. Open source projects in software engineering education: a mapping study. Computer Science Education, 25(1):67–114, 2015. (doi:10.1080/08993408.2015.1033159)
[193]
S. Naval, V. Laxmi, M. Rajarajan, M.S. Gaur, and M. Conti. Employing program semantics for malware detection. IEEE Transactions on Information Forensics and Security, 10(12):2591–2604, 2015. (doi:10.1109/TIFS.2015.2469253)
[194]
A. Nazarov. Can you afford to ignore open source software? In 36th Hydrology and Water Resources Symposium: The Art and Science of Water, HWRS 2015, pages 1404–1412. Engineers Australia, 2015.
[195]
D.T. Nguyen, Q.B. Duong, E. Zamai, and M.K. Shahzad. Fault diagnosis for the complex manufacturing system. Proceedings of the Institution of Mechanical Engineers, Part O: Journal of Risk and Reliability, 230(2):178–194, 2015. (doi:10.1177/1748006X15623089)
[196]
Jian Ni and Jie Lin. Two-level structured overlay design for cluster management in a peer-to-peer network. United States Patent 9,026,628, May 2015. Assignee: Xerox Corporation (Norwalk, CT).
[197]
Jian Ni, Jie Lin, Steven J. Harrington, and Naveen Sharma. Two-level structured overlay design for cluster management in a peer-to-peer network. United States Patent 9,015,342, April 2015. Assignee: Xerox Corporation (Norwalk, CT).
[198]
A.L. Nicolini, A.G. Maguitman, and C.I. Chesñevar. ArgP2P: An argumentative approach for intelligent query routing in P2P networks. 3rd International Workshop on Theory and Applications of Formal Argumentation, TAFA 2015, 9524:194–210, 2015. (doi:10.1007/978-3-319-28460-6_12)
[199]
H. Oumarou, N. Anquetil, A. Etien, S. Ducasse, and K.D. Taiwe. Identifying the exact fixing actions of static rule violation. In 22nd IEEE International Conference on Software Analysis, Evolution, and Reengineering, SANER 2015, pages 371–379. Institute of Electrical and Electronics Engineers Inc., 2015. (doi:10.1109/SANER.2015.7081847)
[200]
Raymond E. Ozzie, Jack E. Ozzie, George P. Moromisato, Paresh S. Suthar, Raman Narayanan, and Matthew S. Augustine. Data synchronization and sharing relationships. United States Patent 9,203,786, December 2015. Assignee: Microsoft Technology Licensing, LLC (Redmond, WA).
[201]
J. Pan. Data leakage triage: Quantitative measure of effectiveness of containment plan. International Journal of Information and Computer Security, 7(2-4):240–254, 2015. (doi:10.1504/IJICS.2015.073032)
[202]
T. Peng, C.-H. Chi, A. Chiasera, G. Armellin, M. Ronchetti, and C. Matteotti. Modeling and composition of environment-as-a-service. In IEEE International Conference on Services Computing, SCC 2015, pages 443–450. Institute of Electrical and Electronics Engineers Inc., 2015. (doi:10.1109/SCC.2015.67)
[203]
Adrian Perrig, Pradeep Khosla, Arvind Seshadri, Mark Luk, and Leendert van Doorn. Verifying integrity and guaranteeing execution of code on untrusted computer platform. United States Patent 9,177,153, November 2015. Assignee: Carnegie Mellon University (Pittsburg, PA).
[204]
A. Pescador, A. Garmendia, E. Guerra, J.S. Sánchez Cuadrado, and J. De Lara. Pattern-based development of domain-specific modelling languages. In 18th ACM/IEEE International Conference on Model Driven Engineering Languages and Systems, MODELS 2015, pages 166–175. Institute of Electrical and Electronics Engineers Inc., 2015. (doi:10.1109/MODELS.2015.7338247)
[205]
I. Polato, D. Barbosa, A. Hindle, and F. Kon. Hadoop branching: Architectural impacts on energy and performance. In 6th International Green and Sustainable Computing Conference, IGSC 2015. Institute of Electrical and Electronics Engineers Inc., 2015. (doi:10.1109/IGCC.2015.7393709)
[206]
P. Priller, W. Gruber, N. Olberding, and D. Peinsipp. Towards perfectly scalable real-time systems. International Conference on Computer Safety, Reliability, and Securitym, SAFECOMP 2015 and held 3rd International Workshop on Assurance Cases for Software-Intensive Systems ASSURE 2015, Workshop on Dependable Embedded and Cyber-Physical Systems and Systems-of-Systems, DECSoS 2015, 2nd International Workshop on the Integration of Safety and Security Engineering, ISSE 2015, Workshop on Reliability and Security Aspects for Critical Infrastructure Protection, ReSA4CI 2015, and 4th InternationalWorkshop on NextGeneration of System Assurance Approaches for Safety-Critical Systems SASSUR, 2015, 9338:212–223, 2015. (doi:10.1007/978-3-319-24249-1_19)
[207]
D. Qiu, S. Wang, and D. Xu. Application of cache in P2P systems. In Proceedings - 2015 IEEE 12th International Conference on Ubiquitous Intelligence and Computing, 2015 IEEE 12th International Conference on Advanced and Trusted Computing, 2015 IEEE 15th International Conference on Scalable Computing and Communications, 2015 IEEE International Conference on Cloud and Big Data Computing, 2015 IEEE International Conference on Internet of People and Associated Symposia/Workshops, UIC-ATC-ScalCom-CBDCom-IoP 2015, pages 1461–1465. Institute of Electrical and Electronics Engineers Inc., 2015. (doi:10.1109/UIC-ATC-ScalCom-CBDCom-IoP.2015.263)
[208]
Y. Qiu, W. Zhang, W. Zou, J. Liu, and Q. Liu. An empirical study of developer quality. In IEEE International Conference on Software Quality, Reliability and Security-Companion, QRS-C 2015, pages 202–209. Institute of Electrical and Electronics Engineers Inc., 2015. (doi:10.1109/QRS-C.2015.33)
[209]
Y. Qu, X. Guan, Q. Zheng, T. Liu, L. Wang, Y. Hou, and Z. Yang. Exploring community structure of software call graph and its applications in class cohesion measurement. Journal of Systems and Software, 108:193–210, 2015. (doi:10.1016/j.jss.2015.06.015)
[210]
Y. Radziwill. Cyber-attacks and the exploitable imperfections of international law. Brill, 2015. (doi:10.1163/9789004298309)
[211]
G.M. Rama and A. Kak. Some structural measures of API usability. Software - Practice and Experience, 45(1):75–110, 2015. (doi:10.1002/spe.2215)
[212]
L. Ramanathan and S.K. Iyer. A qualitative study on the adoption of open source software in information technology outsourcing organizations. 11th IFIP WG 2.13 International Conference on Open Source Systems, OSS 2015, 451:103–113, 2015. (doi:10.1007/978-3-319-17837-0_10)
[213]
L. Ramanathan and S. Krishnan. An empirical investigation into the adoption of open source software in information technology outsourcing organizations. Journal of Systems and Information Technology, 17(2):167–192, 2015. (doi:10.1108/JSIT-10-2014-0070)
[214]
Kumar Rangarajan, Jonathan M. Sanders, and Tanuj Vohra. Error detection on the stack. United States Patent 9,183,114, November 2015. Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION (Armonk, NY).
[215]
J. Rasley, E. Gessiou, T. Ohmann, Y. Brun, S. Krishnamurthi, and J. Cappos. Detecting latent cross-platform API violations. In 26th IEEE International Symposium on Software Reliability Engineering, ISSRE 2015, pages 484–495. Institute of Electrical and Electronics Engineers Inc., 2015. (doi:10.1109/ISSRE.2015.7381841)
[216]
A. Rastogi. Contributor's performance, participation intentions, its influencers and project performance. In 37th IEEE/ACM International Conference on Software Engineering, ICSE 2015, volume 2, pages 919–922. IEEE Computer Society, 2015. (doi:10.1109/ICSE.2015.292)
[217]
B.R. Reddy, S. Khurana, and A. Ojha. Software maintainability estimation made easy — a comprehensive tool COIN. In 6th International Conference on Computer and Communication Technology, ICCCT 2015, volume 25-27-September-2015, pages 68–72. Association for Computing Machinery, 2015. (doi:10.1145/2818567.2818580)
[218]
H. Ren, W. Mo, G. Zhao, D. Ren, and S. Liu. Breadth first search based cosine software code framework automation algorithm. In ASME 2015 Power Conference, POWER 2015, collocated with the ASME 2015 9th International Conference on Energy Sustainability, the ASME 2015 13th International Conference on Fuel Cell Science, Engineering and Technology, and the ASME 2015 Nuclear Forum, volume 2015-January. American Society of Mechanical Engineers (ASME), 2015. (doi:10.1115/POWER201549855)
[219]
R. Robbes, D. Röthlisberger, and É. Tanter. Object-oriented software extensions in practice. Empirical Software Engineering, 20(3):745–782, 2015. (doi:10.1007/s10664-013-9298-0)
[220]
W.N. Robinson and T. Deng. Data mining behavioral transitions in open source repositories. In 48th Annual Hawaii International Conference on System Sciences, HICSS 2015, volume 2015-March, pages 5280–5289. IEEE Computer Society, 2015. (doi:10.1109/HICSS.2015.622)
[221]
M. Rodrıguez, O. Pedreira, and C.M. Fernández. Certification of the maintainability of software product. a case study. In XI Jornadas Iberoamericanas de Ingenieria de Software e Ingenieria del Conocimiento, JIISIC 2015 - 11th Ibero-American Conference on Software Engineering and Knowledge Engineering, JIISIC 2015, pages 93–105. Escuela Superior Politecnica de Chimborazo, 2015.
[222]
M. Rodriguez, M. Piattini, and C.M. Fernandez. A hard look at software quality: Pilot program uses ISO/IEC 25000 family to evaluate, improve and certify software products. Quality Progress, 48(9):30–36, 2015.
[223]
Anthony Rose. Filter for a distributed network. United States Patent 9,098,683, August 2015. Assignee: Global File Systems Holdings, LLC (Sherman Oaks, CA).
[224]
J. Ruan, T. Samatsu, and Y. Shi. A similarity-based M(1,2,3) approach and its application in rating the security of network systems. International Journal of Innovative Computing, Information and Control, 11(6):2177–2191, 2015.
[225]
J. Ruohonen, S. Hyrynsalmi, and V. Leppänen. Exploring the stability of software with time-series cross-sectional data. In 2nd International Workshop on Software Architecture and Metrics, SAM 2015, pages 41–47. Institute of Electrical and Electronics Engineers Inc., 2015. (doi:10.1109/SAM.2015.13)
[226]
J. Ruohonen, S. Hyrynsalmi, and V. Leppänen. Software evolution and time series volatility: An empirical exploration. In 14th International Workshop on Principles of Software Evolution, IWPSE 2015, volume 30-Aug-2015, pages 56–65. Institute of Electrical and Electronics Engineers Inc., 2015. (doi:10.1145/2804360.2804367)
[227]
A. Safarkhanlou, A. Souri, M. Norouzi, and S.E.H. Sardroud. Formalizing and verification of an antivirus protection service using model checking. In 3rd International Conference on Recent Trends in Computing, ICRTC 2015, volume 57, pages 1324–1331. Elsevier, 2015. (doi:10.1016/j.procs.2015.07.443)
[228]
Jonathan Salz and Richard S. Tibbetts. Stream processor with compiled programs. United States Patent 9,038,041, May 2015. Assignee: TIBCO Software, Inc. (Palo Alto, CA).
[229]
B.T. Sampath Kumar and K.R. Prithviraj. Bringing life to dead: Role of Wayback Machine in retrieving vanished URLs. Journal of Information Science, 41(1):71–81, 2015. (doi:10.1177/0165551514552752)
[230]
C. Sanders, A. Shah, and S. Zhang. Comprehensive analysis of the Android google play's auto-update policy. 11th International Conference on Information Security Practice and Experience, ISPEC 2015, 9065:365–377, 2015. (doi:10.1007/978-3-319-17533-1_25)
[231]
H. Santos, J.F. Pimentel, V. Torres Da Silva, and L. Murta. Software rejuvenation via a multi-agent approach. Journal of Systems and Software, 104:41–59, 2015. (doi:10.1016/j.jss.2015.02.017)
[232]
B.F.D. Santos Neto, M. Ribeiro, V.T. Da Silva, C. Braga, C.J.P. De Lucena, and E. De Barros Costa. AutoRefactoring: A platform to build refactoring agents. Expert Systems with Applications, 42(3):1652–1664, 2015. (doi:10.1016/j.eswa.2014.09.022)
[233]
M. Savić and M. Ivanović. Validation of static program analysis tools by self-application: A case study. In 4th Workshop on Software Quality Analysis, Monitoring, Improvement, and Applications, SQAMIA 2015, volume 1375, pages 61–68. CEUR-WS, 2015.
[234]
D. Schall. Social Network-Based Recommender Systems. Springer International Publishing, 2015. (doi:10.1007/978-3-319-22735-1)
[235]
U. Segundo, J. López-Cuadrado, L. Aldamiz-Echevarria, T.A. Pérez, D. Buenestado, A. Iruetaguena, R. Barrena, and J.M. Pikatza. Automatic construction of fuzzy inference systems for computerized clinical guidelines and protocols. Applied Soft Computing Journal, 26:257–269, 2015. (doi:10.1016/j.asoc.2014.09.045)
[236]
N. Senthil Madasamy and T. Revathi. Secure concurrent communication predicament with solutions in peer-to-peer network. ARPN Journal of Engineering and Applied Sciences, 10(9):4097–4104, 2015.
[237]
N. Shah. Sluts 'r' us: Intersections of gender, protocol and agency in the digital age. First Monday, 20(4), 2015. (doi:10.5210/fm.v20i4.5463)
[238]
Behzad Shahraray, Andrea Basso, Lee Begeja, David C. Gibbon, Zhu Liu, and Bernard S. Renger. System and method for adaptive playback based on destination. United States Patent 9,026,555, May 2015. Assignee: AT&T Intellectual Property I, L.P. (Atlanta, GA).
[239]
R. Shatnawi. Deriving metrics thresholds using log transformation. Journal of Software: Evolution and Process, 27(2):95–113, 2015. (doi:10.1002/smr.1702)
[240]
E. Shaw, A. Shaw, and D. Umphress. Mining Android apps to predict market ratings. In 2014 6th International Conference on Mobile Computing, Applications and Services, MobiCASE 2014, pages 166–167. Institute of Electrical and Electronics Engineers Inc., 2015. (doi:10.4108/icst.mobicase.2014.257773)
[241]
W. Shi and A. Afanasyev. RepoSync: Combined action-based and data-based synchronization model in named data network. In IEEE Conference on Computer Communications Workshops, INFOCOM WKSHPS 2015, volume 2015-August, pages 275–280. Institute of Electrical and Electronics Engineers Inc., 2015. (doi:10.1109/INFCOMW.2015.7179397)
[242]
R.G. Shirey, K.M. Hopkinson, K.E. Stewart, D.D. Hodson, and B.J. Borghetti. Analysis of implementations to secure git for use as an encrypted distributed version control system. In 48th Annual Hawaii International Conference on System Sciences, HICSS 2015, volume 2015-March, pages 5310–5319. IEEE Computer Society, 2015. (doi:10.1109/HICSS.2015.625)
[243]
Stylianos Sidiroglou, Angelos D. Keromytis, and Salvatore J. Stolfo. Systems, methods, and media protecting a digital data processing device from attack. United States Patent 9,143,518, September 2015. Assignee: The Trustees of Columbia University in the City of New York (New York, NY).
[244]
I. Sila. The state of empirical research on the adoption and diffusion of business-to-business e-commerce. International Journal of Electronic Business, 12(3):258–301, 2015. (doi:10.1504/IJEB.2015.071386)
[245]
L.H. Silva, M. Ramos, M.T. Valente, A. Bergel, and N. Anquetil. Does JavaScript software embrace classes? In 22nd IEEE International Conference on Software Analysis, Evolution, and Reengineering, SANER 2015, pages 73–82. Institute of Electrical and Electronics Engineers Inc., 2015. (doi:10.1109/SANER.2015.7081817)
[246]
J. Smeds, K. Nybom, and I. Porres. DevOps: A definition and perceived adoption impediments. 16th International Conference on Agile Software Development, XP 2015, 212:166–177, 2015. (doi:10.1007/978-3-319-18612-2_14)
[247]
J.M.G. Smith. Optimal workload allocation in closed queueing networks with state dependent queues. Annals of Operations Research, 231(1):157–183, 2015. (doi:10.1007/s10479-013-1418-0)
[248]
Q.D. Soetens, J. Pérez, S. Demeyer, and A. Zaidman. Circumventing refactoring masking using fine-grained change recording. In 14th International Workshop on Principles of Software Evolution, IWPSE 2015, volume 30-Aug-2015, pages 9–18. Institute of Electrical and Electronics Engineers Inc., 2015. (doi:10.1145/2804360.2804362)
[249]
A. Sotelo and S. Takahashi. GOLD: A graph oriented language implemented using the eclipse xtext framework. In Eclipse Technology eXchange Workshop, ETX 2015, pages 19–24. Association for Computing Machinery, Inc, 2015. (doi:10.1145/2846650.2846653)
[250]
O. Stecklina, P. Langendörfer, F. Vater, T. Kranz, and G. Leander. Intrinsic code attestation by instruction chaining for embedded devices. 11th International Conference Security and Privacy in Communication Networks, SecureComm 2015, 164:97–115, 2015. (doi:10.1007/978-3-319-28865-9_6)
[251]
Salvatore J. Stolfo, Angelos D. Keromytis, Brian M. Bowen, Shlomo Hershkop, Vasileios P. Kemerlis, Pratap V. Prabhu, and Malek Ben Salem. Methods, systems, and media for baiting inside attackers. United States Patent 9,009,829, April 2015. Assignee: The Trustees of Columbia University in the City of New York (New York, NY).
[252]
J.T. Stroud and K.J. Feeley. Responsible academia: Optimizing conference locations to minimize greenhouse gas emissions. Ecography, 38(4):402–404, 2015. (doi:10.1111/ecog.01366)
[253]
V. Suganthi and S. Duraisamy. An efficient method for quality estimation in open sourcesoftware using improved particle swarm optimization. International Journal of Applied Engineering Research, 10(1):1791–1806, 2015.
[254]
B. Suri and S. Singhal. Investigating the OO characteristics of software using CKJM metrics. In 4th International Conference on Reliability, Infocom Technologies and Optimization, ICRITO 2015. Institute of Electrical and Electronics Engineers Inc., 2015. (doi:10.1109/ICRITO.2015.7359254)
[255]
G. Szoke, C. Nagy, P. Hegedus, R. Ferenc, and T. Gyimothy. Do automatic refactorings improve maintainability? an industrial case study. In 31st IEEE International Conference on Software Maintenance and Evolution, ICSME 2015, pages 429–438. Institute of Electrical and Electronics Engineers Inc., 2015. (doi:10.1109/ICSM.2015.7332494)
[256]
K. Tabata, H. Tanno, and M. Oinuma. Helping testers by fault-prone functionality prediction. In 10th Asia-Pacific Symposium on Information and Telecommunication Technologies, APSITT 2015, pages 94–96. Institute of Electrical and Electronics Engineers Inc., 2015. (doi:10.1109/APSITT.2015.7217084)
[257]
M. Teixeira, R. Ribeiro, M. Barbosa, F. Enembreck, and R. Massa. A modeling architecture for the orchestration of service components in factory automation. In 20th IEEE International Conference on Emerging Technologies and Factory Automation, ETFA 2015, volume 2015-October. Institute of Electrical and Electronics Engineers Inc., 2015. (doi:10.1109/ETFA.2015.7301446)
[258]
J. Teixeira. On the openness of digital platforms/ecosystems. In 11th International Symposium on Open Collaboration, OPENSYM 2015. Association for Computing Machinery, Inc, 2015. (doi:10.1145/2788993.2789829)
[259]
Y. Tian, M. Nagappan, D. Lo, and A.E. Hassan. What are the characteristics of high-rated apps? a case study on free Android applications. In 31st IEEE International Conference on Software Maintenance and Evolution, ICSME 2015, pages 301–310. Institute of Electrical and Electronics Engineers Inc., 2015. (doi:10.1109/ICSM.2015.7332476)
[260]
J.-P. Tolvanen, V. Djukić, and A. Popovic. Metamodeling for medical devices: Code generation, model-debugging and run-time synchronization. In 6th International Conference on Emerging Ubiquitous Systems and Pervasive Networks, EUSPN 2015, volume 63, pages 539–544. Elsevier, 2015. (doi:10.1016/j.procs.2015.08.382)
[261]
H.M. Tran and J. Schönwälder. DisCaRia — distributed case-based reasoning system for fault management. IEEE Transactions on Network and Service Management, 12(4):540–553, 2015. (doi:10.1109/TNSM.2015.2496224)
[262]
H. Uchimiya, S. Ogata, and K. Kaijiri. Method mining in experimental software engineering. In 2014 2nd International Conference on Systems and Informatics, ICSAI 2014, pages 1012–1016. Institute of Electrical and Electronics Engineers Inc., 2015. (doi:10.1109/ICSAI.2014.7009433)
[263]
B. Urban and B.C. Greyling. Open source software adoption and links to innovation performance. International Journal of Technological Learning, Innovation and Development, 7(3):261–278, 2015. (doi:10.1504/IJTLID.2015.070379)
[264]
G. Vale and E. Figueiredo. A method to derive metric thresholds for software product lines. In 29th Brazilian Symposium on Software Engineering, SBES 2015, pages 110–119. Institute of Electrical and Electronics Engineers Inc., 2015. (doi:10.1109/SBES.2015.9)
[265]
G. Vale, D. Albuquerque, E. Figueiredo, and A. Garcia. Defining metric thresholds for software product lines: A comparative study. In 19th International Software Product Line Conference, SPLC 2015, volume 20-24-July-2015, pages 176–185. Association for Computing Machinery, 2015. (doi:10.1145/2791060.2791078)
[266]
T. Van Der Storm and J.J. Vinju. Towards multilingual programming environments. Science of Computer Programming, 97(P1):143–149, 2015. (doi:10.1016/j.scico.2013.11.041)
[267]
E. Vasilomanolakis, S. Karuppayah, M. Muhlhauser, and M. Fischer. Taxonomy and survey of collaborative intrusion detection. ACM Computing Surveys, 47(4), 2015. (doi:10.1145/2716260)
[268]
D. Villatoro, G. Andrighetto, R. Conte, and J. Sabater-Mir. Self-policing through norm internalization: A cognitive solution to the tragedy of the digital commons in social networks. JASSS, 18(2):1–28, 2015.
[269]
C. Vitolo, Y. Elkhatib, D. Reusser, C.J.A. Macleod, and W. Buytaert. Web technologies for environmental big data. Environmental Modelling and Software, 63:185–198, 2015. (doi:10.1016/j.envsoft.2014.10.007)
[270]
T. Voigt, S. Flad, and P. Struss. Model-based fault localization in bottling plants. Advanced Engineering Informatics, 29(1):101–114, 2015. (doi:10.1016/j.aei.2014.09.007)
[271]
S. Wagner, A. Goeb, L. Heinemann, M. Kläs, C. Lampasona, K. Lochmann, A. Mayr, R. Plösch, A. Seidl, J. Streit, and A. Trendowicz. Operationalised product quality models and assessment: The Quamoco approach. Information and Software Technology, 62(1):101–123, 2015. (doi:10.1016/j.infsof.2015.02.009)
[272]
W. Wang, B. Li, and P. He. An analysis of the evolution of developers' role in open-source software community. Complex Systems and Complexity Science, 12(1):1–7, 2015. (doi:10.13306/j.1672-3813.2015.01.001)
[273]
W. Wang, N. Niu, H. Liu, and Y. Wu. Tagging in assisted tracing. In 8th IEEE/ACM International Symposium on Software and Systems Traceability, SST 2015, pages 8–14. Institute of Electrical and Electronics Engineers Inc., 2015. (doi:10.1109/SST.2015.9)
[274]
W. Wang, G. Poo-Caamaño, E. Wilde, and D.M. German. What is the GIST? understanding the use of public gists on GitHub. In 12th Working Conference on Mining Software Repositories, MSR 2015, volume 2015-August, pages 314–323. IEEE Computer Society, 2015. (doi:10.1109/MSR.2015.36)
[275]
X. Wang, N.L. Or, Z. Lu, and D. Pao. Hardware accelerator to detect multi-segment virus patterns. Computer Journal, 58(10):2443–2460, 2015. (doi:10.1093/comjnl/bxu079)
[276]
M. Waterman, J. Noble, and G. Allan. How much up-front? a grounded theory of agile architecture. In 37th IEEE/ACM International Conference on Software Engineering, ICSE 2015, volume 1, pages 347–357. IEEE Computer Society, 2015. (doi:10.1109/ICSE.2015.54)
[277]
S. Weiss and R. Stolletz. Buffer allocation in stochastic flow lines via sample-based optimization with initial bounds. OR Spectrum, 37(4):869–902, 2015. (doi:10.1007/s00291-015-0393-z)
[278]
Daniel Willis and Gordon Freedman. Method and system supporting audited reporting of advertising impressions from video games. United States Patent 9,180,369, November 2015. Assignee: Google Inc. (Mountain View, CA).
[279]
T.-Y. Wu, J.-S. Pan, C.-M. Chen, and C.-W. Lin. Towards SQL injection attacks detection mechanism using parse tree. 8th International Conference on Genetic and Evolutionary Computing, ICGEC 2014, 329:371–380, 2015. (doi:10.1007/978-3-319-12286-1_38)
[280]
B. Wulff, A. Wilson, B. Jost, and M. Ketterl. An adopter centric API and visual programming interface for the definition of strategies for automated camera tracking. In 17th IEEE International Symposium on Multimedia, ISM 2015, pages 587–592. Institute of Electrical and Electronics Engineers Inc., 2015. (doi:10.1109/ISM.2015.106)
[281]
B. Xu and D. Li. An empirical study of the motivations for content contribution and community participation in Wikipedia. Information and Management, 52(3):275–286, 2015. (doi:10.1016/j.im.2014.12.003)
[282]
L. Yang and C.L. Henry. How ARL academic libraries present open web resources — a proposed solution to address discoverability. Journal of Academic Librarianship, 41(5):629–635, 2015. (doi:10.1016/j.acalib.2015.06.018)
[283]
V. Zaytsev. Taxonomy of flexible linguistic commitments. In 1st Workshop on Flexible Model Driven Engineering, FlexMDE 2015 - co-located with ACM/IEEE 18th International Conference on Model Driven Engineering Languages and Systems, MoDELS 2015, volume 1470, pages 42–50. CEUR-WS, 2015.
[284]
Y. Zhao and S.S.M. Chow. Privacy preserving collaborative filtering from asymmetric randomized encoding. 19th International Conference on Financial Cryptography and Data Security, FC 2015, 8975:459–477, 2015. (doi:10.1007/978-3-662-47854-7_28)
[285]
X. Zhao, Z. Wang, X. Fan, and Z. Wang. A clustering-bayesian network based approach for test case prioritization. In 39th IEEE Annual Computer Software and Applications Conference Workshops, COMPSACW 2015, volume 3, pages 542–547. IEEE Computer Society, 2015. (doi:10.1109/COMPSAC.2015.154)
[286]
Yu Zheng, Chang Sheng, and Xing Xie. Recommending points of interests in a region. United States Patent 9,009,177, April 2015. Assignee: Microsoft Corporation (Redmond, WA).
[287]
Yu Zheng, Jianqiao Feng, Xing Xie, and Wei-Ying Ma. Detecting spatial outliers in a location entity dataset. United States Patent 9,063,226, June 2015. Assignee: Microsoft Technology Licensing, LLC (Redmond, WA).
[288]
X. Zhou and Z. Yu. A novel approach for the selection of super peers in P2P networks. ICIC Express Letters, 9(2):551–556, 2015.
[289]
X. Zhu, L. Zhong, H. Zong, C. Hou, and N. Zhang. Understanding of the component-based software evolution by using similarity measurement. In 5th International Conference on Computer Engineering and Networks, CENet 2015, volume 12-13-September-2015. Proceedings of Science (PoS), 2015.