Export 87 results:[ Author] Title Type Year
Filters: First Letter Of Title is S [Clear All Filters]
Service Layer for IDE Integration of C/C++ Preprocessor Related Analysis. Proceedings of the 14th International Conference on Computational Science and Its Applications (ICCSA 2014). 8583. 2014.
Scheduling Solution for Grid Meta-Brokering using the Pliant System.. ICAART (2)'10. :46-53.. 2010.
SourceMeter SonarQube plug-in. Proceedings of the 14th IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM 2014). :77–82.. 2014.
Software Product Quality Models. Evolving Software Systems. :65–100.. 2014.
SIP compression. Periodica Polytechnica-Electrical Engineering. 47:1-2.. 2003.
Software generation based on attribute grammars. Periodica Polytechnica. 35:147-152.. 1991.
Syntactic pattern recognition with modified fuzzy automata. Computational Linguistics and Computer Langugaes. 15:175-193.. 1982.
Static Slicing of Logic Programs. AADEBUG 2nd International Workshop on Automated and Algorithmic Debugging. :85–105.. 1995.
Syntactic pattern recognition in the HLP/PAS system. Acta Cybern.. 8:79–88.. 1987.
Source Code Metrics and Maintainability: A Case Study.. FGIT-ASEA/DRBC/EL. 257:272-284.. 2011.
Script2Ant - a tool for cross-platform scripting between different operating systems. Proceedings of the 11th Symposium on Programming Languages and Software Tools and 7th Nordic Workshop on Model Driven Software Engineering (SPLST'09). :45-48.. 2009.
Security Evolution of the Webkit Browser Engine. 14th IEEE International Symposium on Web Systems (WSE). :17–19.. 2012.
Software Testing Conferences and Women. Proceedings of the 2018 ACM/IEEE 1st International Workshop on Gender Equality in Software Engineering (GE'18). :17-20.. 2018.
Static Execute After/Before as a Replacement of Traditional Software Dependencies. Proceedings of the 2008 IEEE International Conference on Software Maintenance (ICSM'08). :137-146.. 2008.
Static Execute After Algorithms as Alternatives for Impact Analysis. Periodica Polytechnica Elec. Eng.. 52:163-176.. 2008.
Scalable Stealth Mode P2P Overlays of Very Small Constant Degree. ACM Transactions on Autonomous and Adaptive Systems. 6:1-27.. 2011.
Scalable P2P overlays of very small constant degree: an emerging security threat. Lecture notes in computer science. 5873:399-412.. 2009.
Strategies for Increased Energy Awareness in Cloud Federations. High-Performance Computing on Complex Environments. :365-382.. 2014.
An SLA-based resource virtualization approach for on-demand service provision. Proceedings of the 3rd international workshop on Virtualization technologies in distributed computing. :27–34.. 2009.
Supporting Product Line Adoption by Combining Syntactic and Textual Feature Extraction. International Conference on Software Reuse.. 2018.