default search action
Innovations in Systems and Software Engineering, Volume 12
Volume 12, Number 1, March 2016
- Huiquan Zhu, Jing Sun, Jin Song Dong, Shang-Wei Lin:
From verified model to executable program: the PAT approach. 1-26 - Alessandro Gerlinger Romero, Klaus Schneider, Maurício Gonçalves Vieira Ferreira:
Semantics in space systems architectures. 27-40 - Djedjiga Mouheb, Dima Alhadidi, Mariam Nouh, Mourad Debbabi, Lingyu Wang, Makan Pourzandi:
Aspect-oriented modeling framework for security hardening. 41-67 - Ralph L. Wojtowicz:
Sketch theory as a framework for knowledge management. 69-79
Volume 12, Number 2, June 2016
- Martin S. Feather, Joel M. Wilf, Joseph Priest:
Metrics for V&V of cyber defenses. 81-94 - Emil Vassev, Mike Hinchey:
Capturing autonomy features for unmanned spacecraft with ARE, the autonomy requirements engineering approach. 95-107 - Brahim Hamid, Sigrid Gürgens, Andreas Fuchs:
Security patterns modeling and formalization for pattern-based development of secure software systems. 109-140 - Doron Drusinsky:
Run-time monitoring using bounded constraint instance discovery within big data streams. 141-151 - Chhabi Rani Panigrahi, Rajib Mall:
Regression test size reduction using improved precision slices. 153-159
Volume 12, Number 3, September 2016
- Atulya K. Nagar, Manmath Narayan Sahoo, Sambit Bakshi, Basabdatta Sen Bhattacharya:
Introduction to special issue on 'Recent Computing Paradigms, Network Protocols, and Applications'. 161-162 - Supriya Chakraborty, Agostino Cortesi, Nabedu Chaki:
A uniform representation of multi-variant data in intensive-query databases. 163-176 - Angan Mitra, Sohom Ghosh, Partha Basuchowdhuri, Manoj Kumar Shekhawat, Sanjoy Kumar Saha:
Recommendation system based on product purchase analysis. 177-192 - Shrutilipi Bhattacharjee, Soumya K. Ghosh:
Measuring semantic similarity between land-cover classes for spatial analysis: an ontology hierarchy exploration approach. 193-200 - Rahul Raman, Pankaj Kumar Sa, Banshidhar Majhi:
Direction prediction for avoiding occlusion in visual surveillance. 201-214 - Neil Buckley, Atulya K. Nagar, Subramanian Arumugam:
On the use of secret sharing as a secure multi-use pad. 215-225 - Dibakar Saha, Nabanita Das:
Self-organized area coverage in wireless sensor networks by limited node mobility. 227-238 - Sayan Sen Sarma, S. K. Setua:
Uniform load sharing on a hierarchical content delivery network interconnection model. 239-248
Volume 12, Number 4, December 2016
- D. Richard Kuhn, Raghu N. Kacker, Yu Lei:
Measuring and specifying combinatorial coverage of test input configurations. 249-261 - Shambhu Prasad, Suraj Nayak, Vamshi Vijay, Rajib Mall:
SLDG: a metamodel for Simulink/Stateflow models and its applications. 263-278 - Debasish Kundu, Debasis Samanta:
Enumerating message paths for interaction testing of object-oriented systems. 279-301 - Md. Imrul Kayes, Mithun Sarker, Jacob Chakareski:
Product backlog rating: a case study on measuring test quality in scrum. 303-317 - Sangharatna Godboley, Arpita Dutta, Durga Prasad Mohapatra, Avijit Das, Rajib Mall:
Making a concolic tester achieve increased MC/DC. 319-332
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.