Publications
Export 279 results:
Author Title [ Type] Year Filters: First Letter Of Last Name is B [Clear All Filters]
Relating Code Coverage, Mutation Score and Test Suite Reducibility to Defect Density. Proceedings of the 2016 IEEE International Conference on Software Testing, Verification and Validation Workshops: 11th International Workshop on Mutation Analysis (MUTATION'16). :174-179.
.
2016. Relating clusterization measures and software quality. CSMR'13. :345–348.
.
2013. Recognizing Antipatterns and Analyzing Their Effects on Software Maintainability. Proceedings of the 14th International Conference on Computational Science and Its Applications (ICCSA 2014). 8583:337–352.
.
2014. QualityGate SourceAudit: a Tool for Assessing the Technical Quality of Software. Proceedings of the 2014 Software Evolution Week (Merger of the 18th IEEE European Conference on Software Maintenance and Reengineering & 21st IEEE Working Conference on Reverse Engineering – CSMR-WCRE 2014). :440–445.
.
2014. A probabilistic software quality model. Software Maintenance (ICSM), 2011 27th IEEE International Conference on. :243-252.
.
2011. Predictive Complex Event Processing. Proceedings of the 5th Balkan Conference in Informatics. :26–31.
.
2012. Predictive Complex Event Processing. Proceedings of the 5th Balkan Conference in Informatics. :26–31.
.
2012. Predictive Complex Event Processing. Proceedings of the 5th Balkan Conference in Informatics. :26–31.
.
2012. .
2012. .
2012. Prediction Models for Performance, Power, and Energy Efficiency of Software Executed on Heterogeneous Hardware. Proceedings of the 13th IEEE International Symposium on Parallel and Distributed Processing with Applications (ISPA 2015). :178–183.
.
2015. Predicting Critical Problems from Execution Logs of a Large-Scale Software System. Proceedings of the 11th Symposium on Programming Languages and Software Tools and 7th Nordic Workshop on Model Driven Software Engineering (SPLST'09). :19-30.
.
2009. PF-BVM: A Privacy-aware fog-enhanced blockchain validation mechanism. CLOSER 2020 - Proceedings of the 10th International Conference on Cloud Computing and Services Science. :430-439.
.
2020. Paxos with multiple leaders. Volume of Extended Abstracts of the 5th Conference of PhD Students in Computer Science. :28.
.
2006. A Parallel Design Method for Producing Valid Protocols. Proc. of 8th Symposium on Microcomputer and Microprocessor Applications. :689-697.
.
1994. Optimizing for Space : Measurements and Possibilities for Improvement. Proceedings of the 2003 GCC Developers' Summit. :7-20.
.
2003. Opening Up The C/C++ Preprocessor Black Box. Proceedings of the Eight Symposium on Programming Languages and Software Tools (SPLST'03). :45-57.
.
2003. A novel approach for monitoring ad-hoc networks. Proceedings of the Regional Conference on Embedded and Ambient Systems (RCEAS 2007).
.
2007. A novel approach for distributed Management and Monitoring of Wireless Mesh Networks. Proceedings of the Regional Conference on Embedded and Ambient Systems (RCEAS 2007). :Paper46.
.
2007. A novel approach for distributed Management and Monitoring of Wireless Mesh Networks. Proceedings of the Regional Conference on Embedded and Ambient Systems (RCEAS 2007). :Paper46.
.
2007. New, Linguistics-based, Ontology-enabled Approaches in Biological Information Management. Proceedings of eChallenges e-2006 Conference. :1352-1359.
.
2006. A New Interactive Fault Localization Method with Context Aware User Feedback. Proceedings of the First International Workshop on Intelligent Bug Fixing (IBF 2019). :23-28.
.
2019. Network topology discovery. Volume of Extended Abstracts of the 5th Conference of PhD Students in Computer Science. :27.
.
2006. Netspotter: a framework for network testing. 7th International Conference on Applied Informatics.
.
2007. Netspotter: a framework for network testing. 7th International Conference on Applied Informatics.
.
2007.