Security In Microservice-Based Systems: A Multivocal Literature Review | 1 | 0.36 | 2021 |
Microservices Backlog - A Model of Granularity Specification and Microservice Identification. | 1 | 0.36 | 2020 |
Introduction to the Minitrack on Digital Government and Business Process Management (BPM). | 0 | 0.34 | 2020 |
Mitigating security threats through the use of security tactics to design secure cyber-physical systems (CPS) | 0 | 0.34 | 2019 |
BlackSheep - Dynamic Effort Estimation in Agile Software Development using Machine Learning. | 0 | 0.34 | 2019 |
Industry 4.0 Challenges for Business Process Management and Electronic-Commerce | 0 | 0.34 | 2019 |
Exploring security issues in telehealth systems | 0 | 0.34 | 2019 |
Identifying availability tactics to support security architectural design of microservice-based systems | 1 | 0.36 | 2019 |
A study of over-the-air (OTA) update systems for CPS and IoT operating systems | 1 | 0.41 | 2019 |
Architectural Tactics for Scalability. | 0 | 0.34 | 2019 |
Exploration of academic and industrial evidence about architectural tactics and patterns in microservices. | 0 | 0.34 | 2018 |
Security tactics selection poker (TaSPeR): a card game to select security tactics to satisfy security requirements. | 0 | 0.34 | 2018 |
Empirical evidence of Colombian national e-government programs' impact on local Smart City-Adoption. | 0 | 0.34 | 2018 |
Actual Use of Architectural Patterns in Microservices-Based Open Source Projects | 3 | 0.46 | 2018 |
An Architecture Based On Computing With Words To Support Runtime Reconfiguration Decisions Of Service-Based Systems | 1 | 0.34 | 2018 |
Characterizing Architectural Evaluations and Identifying Quality Attributes addressed in Systems-of-Systems: A Systematic Mapping Study | 0 | 0.34 | 2018 |
The Benefit of Thinking Small in Big Data. | 0 | 0.34 | 2017 |
Software Development Initiatives to Identify and Mitigate Security Threats - Two Systematic Mapping Studies. | 0 | 0.34 | 2016 |
Mitigating security threats using tactics and patterns: a controlled experiment. | 0 | 0.34 | 2016 |
An approach for software knowledge sharing based on architectural decisions | 0 | 0.34 | 2016 |
Identifying potential suppliers for competitive bidding using Latent Semantic Analysis | 0 | 0.34 | 2016 |
Preface to the special issues devoted to CLEI 2015. | 0 | 0.34 | 2016 |
A Conceptual-KDD Tool for Ontology Construction from a Database Schema. | 0 | 0.34 | 2015 |
Comparing scalability of message queue system: ZeroMQ vs RabbitMQ | 1 | 0.37 | 2015 |
Preface to the Best Papers from CLEI 2014 Special Issue. | 2 | 0.46 | 2015 |
Machine-assisted Cyber Threat Analysis Using Conceptual Knowledge Discovery. | 0 | 0.34 | 2015 |
Using Trust Networks to Improve Data Quality and Recommendations. | 0 | 0.34 | 2015 |
Revisiting Architectural Tactics for Security | 6 | 0.51 | 2015 |
Decentralized Strategy for Supporting Multi-agent Negotiation of Several Aspects of Different Products | 0 | 0.34 | 2014 |
Semi-automated Tool Recommender for Software Development Processes | 0 | 0.34 | 2014 |
Time-Based Hesitant Fuzzy Information Aggregation Approach for Decision-Making Problems | 6 | 0.42 | 2014 |
Managing requirements@run.time with a linguistic decision making approach. | 0 | 0.34 | 2014 |
VirtualMarket: Extending Chilecompra with Agent Capabilities for Identifying Providers Associativity Opportunities and Negotiate Alliance Participation | 0 | 0.34 | 2014 |
Exploring the Trust and Knowledge Obsolescence Relation | 0 | 0.34 | 2013 |
Process-based evaluation and comparison of OTS software alternatives. | 0 | 0.34 | 2013 |
Web metadata extraction and semantic indexing for learning objects extraction | 5 | 0.53 | 2013 |
Using pattern structures to support information retrieval with Formal Concept Analysis. | 1 | 0.36 | 2013 |
A Conceptual-KDD Approach and its Application to Cultural Heritage. | 3 | 0.46 | 2013 |
Tagging tagged images: on the impact of existing annotations on image tagging | 1 | 0.35 | 2012 |
A Digital Library Built Around the Information-Content Model Duality. | 0 | 0.34 | 2012 |
Market-aware Requirements. | 0 | 0.34 | 2012 |
Bridging the gap between software architecture rationale formalisms and actual architecture documents: An ontology-driven approach | 22 | 0.95 | 2012 |
Mitigating the obsolescence of quality specifications models in service-based systems | 7 | 0.44 | 2012 |
Improving the Component Discovery Process by Leveraging Automatic Sensitive Analysis | 0 | 0.34 | 2011 |
Conception, development and implementation of an e-Government maturity model in public agencies | 29 | 1.39 | 2011 |
Improving Web API Discovery by Leveraging Social Information | 24 | 1.02 | 2011 |
The Tutelkan Reference Process: A Reusable Process Model for Enabling SPI in Small Settings. | 3 | 0.48 | 2011 |
Simplifying mashup component selection with a combined similarity- and social-based technique | 16 | 0.82 | 2011 |
Externalizing the Autopoietic Part of Software to Achieve Self-Adaptability | 1 | 0.36 | 2011 |
Self-Adaptive Fuzzy QoS-Driven Web Service Discovery | 19 | 0.77 | 2011 |