Name
Papers
Collaborators
HERNÁN ASTUDILLO
83
118
Citations 
PageRank 
Referers 
264
36.77
549
Referees 
References 
1102
572
Search Limit
1001000
Title
Citations
PageRank
Year
Security In Microservice-Based Systems: A Multivocal Literature Review10.362021
Microservices Backlog - A Model of Granularity Specification and Microservice Identification.10.362020
Introduction to the Minitrack on Digital Government and Business Process Management (BPM).00.342020
Mitigating security threats through the use of security tactics to design secure cyber-physical systems (CPS)00.342019
BlackSheep - Dynamic Effort Estimation in Agile Software Development using Machine Learning.00.342019
Industry 4.0 Challenges for Business Process Management and Electronic-Commerce00.342019
Exploring security issues in telehealth systems00.342019
Identifying availability tactics to support security architectural design of microservice-based systems10.362019
A study of over-the-air (OTA) update systems for CPS and IoT operating systems10.412019
Architectural Tactics for Scalability.00.342019
Exploration of academic and industrial evidence about architectural tactics and patterns in microservices.00.342018
Security tactics selection poker (TaSPeR): a card game to select security tactics to satisfy security requirements.00.342018
Empirical evidence of Colombian national e-government programs' impact on local Smart City-Adoption.00.342018
Actual Use of Architectural Patterns in Microservices-Based Open Source Projects30.462018
An Architecture Based On Computing With Words To Support Runtime Reconfiguration Decisions Of Service-Based Systems10.342018
Characterizing Architectural Evaluations and Identifying Quality Attributes addressed in Systems-of-Systems: A Systematic Mapping Study00.342018
The Benefit of Thinking Small in Big Data.00.342017
Software Development Initiatives to Identify and Mitigate Security Threats - Two Systematic Mapping Studies.00.342016
Mitigating security threats using tactics and patterns: a controlled experiment.00.342016
An approach for software knowledge sharing based on architectural decisions00.342016
Identifying potential suppliers for competitive bidding using Latent Semantic Analysis00.342016
Preface to the special issues devoted to CLEI 2015.00.342016
A Conceptual-KDD Tool for Ontology Construction from a Database Schema.00.342015
Comparing scalability of message queue system: ZeroMQ vs RabbitMQ10.372015
Preface to the Best Papers from CLEI 2014 Special Issue.20.462015
Machine-assisted Cyber Threat Analysis Using Conceptual Knowledge Discovery.00.342015
Using Trust Networks to Improve Data Quality and Recommendations.00.342015
Revisiting Architectural Tactics for Security60.512015
Decentralized Strategy for Supporting Multi-agent Negotiation of Several Aspects of Different Products00.342014
Semi-automated Tool Recommender for Software Development Processes00.342014
Time-Based Hesitant Fuzzy Information Aggregation Approach for Decision-Making Problems60.422014
Managing requirements@run.time with a linguistic decision making approach.00.342014
VirtualMarket: Extending Chilecompra with Agent Capabilities for Identifying Providers Associativity Opportunities and Negotiate Alliance Participation00.342014
Exploring the Trust and Knowledge Obsolescence Relation00.342013
Process-based evaluation and comparison of OTS software alternatives.00.342013
Web metadata extraction and semantic indexing for learning objects extraction50.532013
Using pattern structures to support information retrieval with Formal Concept Analysis.10.362013
A Conceptual-KDD Approach and its Application to Cultural Heritage.30.462013
Tagging tagged images: on the impact of existing annotations on image tagging10.352012
A Digital Library Built Around the Information-Content Model Duality.00.342012
Market-aware Requirements.00.342012
Bridging the gap between software architecture rationale formalisms and actual architecture documents: An ontology-driven approach220.952012
Mitigating the obsolescence of quality specifications models in service-based systems70.442012
Improving the Component Discovery Process by Leveraging Automatic Sensitive Analysis00.342011
Conception, development and implementation of an e-Government maturity model in public agencies291.392011
Improving Web API Discovery by Leveraging Social Information241.022011
The Tutelkan Reference Process: A Reusable Process Model for Enabling SPI in Small Settings.30.482011
Simplifying mashup component selection with a combined similarity- and social-based technique160.822011
Externalizing the Autopoietic Part of Software to Achieve Self-Adaptability10.362011
Self-Adaptive Fuzzy QoS-Driven Web Service Discovery190.772011
  • 1
  • 2