Export 87 results:Author Title Type [ Year]
Filters: First Letter Of Title is S [Clear All Filters]
Smartphone-based Data Collection with Stunner Using Crowdsourcing: Lessons Learnt while Cleaning the Data. IARIA Conference. Best paper award. Twelfth International Multi-Conference on Computing in the Global Information Technology (ICCGI 2017). :28-35.. 2017.
Smartphone-based data collection with stunner, the reality of peer-to-peer connectivity and web real-time communications using crowdsourcing: lessons learnt while cleaning the data. International Journal On Advances in Software. 11(1-2):120-130.. 2018.
Software Testing Conferences and Women. Proceedings of the 2018 ACM/IEEE 1st International Workshop on Gender Equality in Software Engineering (GE'18). :17-20.. 2018.
Study of Various Classifiers for Identification and Classification of Non-Functional Requirements. Proceedings of the 18th International Conference on Computational Science and Its Applications (ICCSA 2018). 10964:492-503.. 2018.
Supporting Product Line Adoption by Combining Syntactic and Textual Feature Extraction. International Conference on Software Reuse.. 2018.
Source Code Level Word Embeddings in Aiding Semantic Test-to-Code Traceability. Proceedings of the 10th International Workshop on Software and Systems Traceability, (SST 2019 @ ICSE). :29-36.. 2019.
Study of The Performance of Various Classifiers in Labeling Non-Functional Requirements. Information Technology and Control. 48:1-16.. 2019.
Stunner: A Smart Phone Trace for Developing Decentralized Edge Systems. Lecture Notes in Computer Science. vol 11534(Pereira J., Ricci L. (eds) Distributed Applications and Interoperable Systems. DAIS 2019). 2019.
Simulating the Effect of Test Flakiness on Fault Localization Effectiveness. Proceedings of the 3rd International Workshop on Validation, Analysis and Evolution of Software Tests (VST'20). :28-35.. 2020.
A survey and taxonomy of simulation environments modelling fog computing. Simulation Modelling Practice and Theory. 101. 2020.
A Survey on Blockchain-Fog Integration Approaches. IEEE Access. 8:102657-102668.. 2020.