Export 50 results:Author Title Type [ Year]
Filters: First Letter Of Last Name is J [Clear All Filters]
Stunner: A Smart Phone Trace for Developing Decentralized Edge Systems. Lecture Notes in Computer Science. vol 11534(Pereira J., Ricci L. (eds) Distributed Applications and Interoperable Systems. DAIS 2019). 2019.
Towards an Accurate Prediction of the Question Quality at Stack Overflow Using a Deep-Learning-Based NLP Approach. Proceedings of ICSOFT 2019, 14th International Conference on Software Technologies. :631-639.. 2019.
Smartphone-based data collection with stunner, the reality of peer-to-peer connectivity and web real-time communications using crowdsourcing: lessons learnt while cleaning the data. International Journal On Advances in Software. 11(1-2):120-130.. 2018.
Software Testing Conferences and Women. Proceedings of the 2018 ACM/IEEE 1st International Workshop on Gender Equality in Software Engineering (GE'18). :17-20.. 2018.
Method for tracking of motion of objects associated with wireless communication devices within a predefined area.. 2017.
A method for tracking of motion of objects associated with wireless communication devices within a predefined area.. 2017.
Smartphone-based Data Collection with Stunner Using Crowdsourcing: Lessons Learnt while Cleaning the Data. IARIA Conference. Best paper award. Twelfth International Multi-Conference on Computing in the Global Information Technology (ICCGI 2017). :28-35.. 2017.
Relating Code Coverage, Mutation Score and Test Suite Reducibility to Defect Density. Proceedings of the 2016 IEEE International Conference on Software Testing, Verification and Validation Workshops: 11th International Workshop on Mutation Analysis (MUTATION'16). :174-179.. 2016.
Empirical Investigation of SEA-Based Dependence Cluster Properties. Science of Computer Programming. 105:3-25.. 2015.
Uncovering Dependence Clusters and Linchpin Functions. Proceedings of the 31th IEEE International Conference on Software Maintenance and Evolution (ICSME'15). :141-150.. 2015.
Defining and Understanding Smartphone Churn over the Internet: a Measurement Study. 14th IEEE International Conference on Peer-to-Peer Computing, IEEE P2P. :1-5.. 2014.
Designing and Implementing Control Flow Graph for Magic 4th Generation Language. Acta Cybernetica. 21:419–437.. 2014.
Impact Analysis in the Presence of Dependence Clusters Using Static Execute After in WebKit. Journal of Software: Evolution and Process. 26:569-588.. 2014.
Using GPU Acceleration in the GL2D Graphics Engine. Proceedings of the 18th IEEE International Symposium on Consumer Electronics (ISCE 2014). :42–43.. 2014.
Configuring Software for Reuse with VCL. Proceedings of the 13th Symposium on Programming Languages and Software Tools (SPLST 2013). :16–30.. 2013.
Configuring Software for Reuse with VCL. Proceedings of the 13th Symposium on Programming Languages and Software Tools, SPLST'13. :16–30.. 2013.
Designing and Implementing Control Flow Graph for Magic 4th Generation Language. Proceedings of the 13th Symposium on Programming Languages and Software Tools (SPLST 2013). :200–214.. 2013.
Empirical investigation of SEA-Based dependence cluster properties. IEEE 13th International Working Conference on Source Code Analysis and Manipulation, SCAM 2013. :1–10.. 2013.
Relating clusterization measures and software quality. CSMR'13. :345–348.. 2013.
Impact Analysis Using Static Execute After in WebKit. Proceedings of the16th European Conference on Software Maintenance and Reengineering (CSMR'12). :95–104.. 2012.
Modeling network-level impacts of P2P flows. 19th Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP). :590-594.. 2011.
Scalable Stealth Mode P2P Overlays of Very Small Constant Degree. ACM Transactions on Autonomous and Adaptive Systems. 6:1-27.. 2011.
CIASYS – Change Impact Analysis at System Level. Proceedings of the 14th European Conference on Software Maintenance and Reengineering (CSMR'10). :203-206.. 2010.