Publications
Export 50 results:
Author Title Type [ Year] Filters: First Letter Of Last Name is J [Clear All Filters]
Stunner: A Smart Phone Trace for Developing Decentralized Edge Systems. Lecture Notes in Computer Science. vol 11534(Pereira J., Ricci L. (eds) Distributed Applications and Interoperable Systems. DAIS 2019)
.
2019. Towards an Accurate Prediction of the Question Quality at Stack Overflow Using a Deep-Learning-Based NLP Approach. Proceedings of ICSOFT 2019, 14th International Conference on Software Technologies. :631-639.
.
2019. Smartphone-based data collection with stunner, the reality of peer-to-peer connectivity and web real-time communications using crowdsourcing: lessons learnt while cleaning the data. International Journal On Advances in Software. 11(1-2):120-130.
.
2018. Software Testing Conferences and Women. Proceedings of the 2018 ACM/IEEE 1st International Workshop on Gender Equality in Software Engineering (GE'18). :17-20.
.
2018. .
2017. .
2017.
Smartphone-based Data Collection with Stunner Using Crowdsourcing: Lessons Learnt while Cleaning the Data. IARIA Conference. Best paper award. Twelfth International Multi-Conference on Computing in the Global Information Technology (ICCGI 2017). :28-35.
.
2017. Relating Code Coverage, Mutation Score and Test Suite Reducibility to Defect Density. Proceedings of the 2016 IEEE International Conference on Software Testing, Verification and Validation Workshops: 11th International Workshop on Mutation Analysis (MUTATION'16). :174-179.
.
2016. Empirical Investigation of SEA-Based Dependence Cluster Properties. Science of Computer Programming. 105:3-25.
.
2015. Uncovering Dependence Clusters and Linchpin Functions. Proceedings of the 31th IEEE International Conference on Software Maintenance and Evolution (ICSME'15). :141-150.
.
2015. Defining and Understanding Smartphone Churn over the Internet: a Measurement Study. 14th IEEE International Conference on Peer-to-Peer Computing, IEEE P2P. :1-5.
.
2014. Designing and Implementing Control Flow Graph for Magic 4th Generation Language. Acta Cybernetica. 21:419–437.
.
2014. Impact Analysis in the Presence of Dependence Clusters Using Static Execute After in WebKit. Journal of Software: Evolution and Process. 26:569-588.
.
2014. Using GPU Acceleration in the GL2D Graphics Engine. Proceedings of the 18th IEEE International Symposium on Consumer Electronics (ISCE 2014). :42–43.
.
2014. Configuring Software for Reuse with VCL. Proceedings of the 13th Symposium on Programming Languages and Software Tools (SPLST 2013). :16–30.
.
2013. Configuring Software for Reuse with VCL. Proceedings of the 13th Symposium on Programming Languages and Software Tools, SPLST'13. :16–30.
.
2013. Designing and Implementing Control Flow Graph for Magic 4th Generation Language. Proceedings of the 13th Symposium on Programming Languages and Software Tools (SPLST 2013). :200–214.
.
2013. Empirical investigation of SEA-Based dependence cluster properties. IEEE 13th International Working Conference on Source Code Analysis and Manipulation, SCAM 2013. :1–10.
.
2013. Relating clusterization measures and software quality. CSMR'13. :345–348.
.
2013. .
2012. .
2012.
Impact Analysis Using Static Execute After in WebKit. Proceedings of the16th European Conference on Software Maintenance and Reengineering (CSMR'12). :95–104.
.
2012. Modeling network-level impacts of P2P flows. 19th Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP). :590-594.
.
2011. Scalable Stealth Mode P2P Overlays of Very Small Constant Degree. ACM Transactions on Autonomous and Adaptive Systems. 6:1-27.
.
2011. CIASYS – Change Impact Analysis at System Level. Proceedings of the 14th European Conference on Software Maintenance and Reengineering (CSMR'10). :203-206.
.
2010.