Analysis, Evaluation, and Assessment for Containerizing an Industry Automation Software. | 0 | 0.34 | 2020 |
A model-based approach for design and verification of Industrial Internet of Things | 1 | 0.36 | 2019 |
A proposed sizing model for managing 3rd party code technical debt. | 0 | 0.34 | 2018 |
Modeling And Analysis Of Fpga Based Power Management System For Renewables | 0 | 0.34 | 2017 |
Design and verification of Cyber-Physical Systems using TrueTime, evolutionary optimization and UPPAAL. | 5 | 0.40 | 2016 |
The Effect Of Time Zone Difference On Asynchronous Communications In Global Software Development | 2 | 0.49 | 2016 |
Using normalized compression distance to measure the evolutionary stability of software systems | 2 | 0.40 | 2015 |
Modelling time-varying delays in networked automation systems with heterogeneous networks using machine learning techniques | 2 | 0.42 | 2015 |
Design Contracts For Networked Automation Systems Co-design | 0 | 0.34 | 2015 |
A Simulation Based Approach To Detect Wear In Industrial Robots | 0 | 0.34 | 2015 |
Model checking response times in Networked Automation Systems using jitter bounds | 2 | 0.37 | 2015 |
SafeChat: A tool to shield children's communication from explicit messages | 5 | 0.48 | 2014 |
Event Based Robot Prognostics Using Principal Component Analysis | 0 | 0.34 | 2014 |
Enhancing Privacy in Online Social Communities: Can Trust Help Mitigate Privacy Risks? | 0 | 0.34 | 2014 |
Medical Software - Issues and Best Practices. | 0 | 0.34 | 2013 |
Supporting Location Information Privacy in Mobile Devices. | 3 | 0.48 | 2013 |
A layered architecture for control functionality implementation in smart grids | 1 | 0.36 | 2013 |
Adaptive LQR controller for Networked Control Systems subjected to random communication delays | 8 | 0.58 | 2013 |
Using bug report as a software quality measure: an empirical study. | 0 | 0.34 | 2013 |
Enhancing Privacy using Community Driven Recommendations: An Investigation with Facebook Data. | 1 | 0.48 | 2013 |
Towards Requirements Change Decision Support. | 3 | 0.37 | 2013 |
A Study of SourceForge Users and User Network. | 0 | 0.34 | 2013 |
Distributed Computing and Internet Technology - 8th International Conference, ICDCIT 2012, Bhubaneswar, India, February 2-4, 2012. Proceedings | 32 | 3.95 | 2012 |
PCIEF: a policy conflict identification and evaluation framework. | 0 | 0.34 | 2012 |
On adopting multi-criteria decision-making approaches for variability management in software product lines | 1 | 0.35 | 2012 |
Differentiated service strategies for ad-hoc wireless sensor networks in harsh communication environments | 2 | 0.42 | 2012 |
Using Bug Reports as a Software Quality Measure | 1 | 0.35 | 2011 |
Capacity estimation in HPC systems: simulation approach | 0 | 0.34 | 2011 |
Analysing organisational structures using social network analysis: a case study | 0 | 0.34 | 2011 |
C-FaRM: A collaborative and context aware framework for requirements management | 1 | 0.35 | 2011 |
Examining the Relationships between Software Coupling and Software Performance: A Cross-platform Experiment | 3 | 0.55 | 2011 |
Communications in global software development: an empirical study using GTK+ OSS repository | 5 | 0.40 | 2011 |
A P2P, agent-based system of systems architecture for cooperative maritime networks | 2 | 0.40 | 2010 |
A system of systems approach: A benchmark to WSNs mobility models. | 0 | 0.34 | 2010 |
Rapid scalability of complex and dynamic web-based systems: Challenges and recent approaches to mitigation | 1 | 0.35 | 2010 |
Component co-evolution and component dependency: speculations and verifications | 4 | 0.41 | 2010 |
Computing packet loss probabilities of D-BMAP/PH/1/N queues with group services | 3 | 0.38 | 2010 |
CBPM: Context Based Privacy Model | 3 | 0.53 | 2010 |
Secure data aggregation in heterogeneous and disparate networks using stand off server architecture | 0 | 0.34 | 2009 |
Analyzing Organizational Structures Using Social Network Analysis | 2 | 0.38 | 2009 |
Jigdfs For Implementing Secure Container Communities | 0 | 0.34 | 2009 |
Measuring the evolutionary stability of software systems: case studies of Linux and FreeBSD | 3 | 0.41 | 2009 |
Translating Security Policy to Executable Code for Sandboxing Linux Kernel | 0 | 0.34 | 2009 |
Towards a social responsible agents | 0 | 0.34 | 2009 |
Multiple-parameter coupling metrics for layered component-based software | 9 | 0.53 | 2009 |
An empirical approach to evaluating dependency locality in hierarchically structured software systems | 4 | 0.42 | 2009 |
Impact of duty cycle variation on WSNs | 2 | 0.38 | 2009 |
Social network analysis for email classification | 11 | 0.62 | 2008 |
Improving modularity by refactoring code clones: a feasibility study on Linux | 4 | 0.44 | 2008 |
A domain-independent, ontology-agnostic approach to leveraging unstructured data sources | 1 | 0.38 | 2008 |