SPE - volume 50 - 2020 论文列表 |
点击这里查看 Software - Practice and Experience 的JCR分区、影响因子等信息 |
John Paul Martin A. Kandasamy K. Chandrasekaran
Effective approaches to combining lexical and syntactical information for code summarization.Ziyi Zhou Huiqun Yu Guisheng Fan
Integrated machine learning with semantic web for open government data recommendation based on cloud computing. Tice: A real-time language compilable using C++ compilers.Tadeus Prastowo Luigi Palopoli Luca Abeni
HEART: Unrelated parallel machines problem with precedence constraints for task scheduling in cloud computing using heuristic and meta-heuristic algorithms.Amit Kumar Bhardwaj Yuvraj Gajpal Chirag Surti Sukhpal Singh Gill
Joint computation offloading and resource provisioning for edge-cloud computing environment: A machine learning-based approach.Ali Shahidinejad Mostafa Ghobaei-Arani
Easily solving dynamic programming problems in Haskell by memoization of hylomorphisms.David Llorens Juan Miguel Vilar
On the synthesis of metadata tags for HTML files.Patricia Jiménez Juan C. Roldán Fernando O. Gallego Rafael Corchuelo
Usability implications in software architecture: The case study of a mobile app.Rafael Capilla Rick Kazman Carlos Romera Carlos Carrillo
Analyzing spatial analytics systems based on Hadoop and Spark: A user perspective.Joao Pedro de Carvalho Castro Anderson Chaves Carniel Cristina Dutra de Aguiar Ciferri
Junqi Guo Guicheng Shen Yichen Sun Jin Zhao Hao Wu Zhilin Zhu
Secure and efficient data transfer using spreading and assimilation in MANET.Samina Kausar Muhammad Habib Muhammad Yasir Shabir Ata Ullah Xu Huahu Rashid Mehmood Rongfang Bie Muhammad Shahid Iqbal
The role of superior image composition in children's analogical reasoning.Xiao Yu Congcong Han Junqi Guo Yinghe Chen
ADARC: An anomaly detection algorithm based on relative outlier distance and biseries correlation.Cun Ji Xiunan Zou Shijun Liu Li Pan
A physiological data-driven model for learners' cognitive load detection using HRV-PRV feature fusion and optimized XGBoost classification.Junqi Guo Yazhu Dai Chixiang Wang Hao Wu Tianyou Xu Kai Lin
Dynamic human contact prediction based on naive Bayes algorithm in mobile social networks. Load balancing aware scheduling algorithms for fog networks. Special Issue: Identification, Information, and Knowledge in the Internet of Things.Lars Larsson William Tärneberg Cristian Klein Erik Elmroth Maria Kihl
R2D2: A scalable deep learning toolkit for medical imaging segmentation.Soulaimane Guedria Noël De Palma Félix Renard Nicolas Vuillerme
Improving LSM-trie performance by parallel search.Wen Cheng Tao Guo Lingfang Zeng Yang Wang Lars Nagel Tim Süß André Brinkmann
"The Canary in the Coal Mine..." A cautionary tale from the decline of SourceForge.Damian Andrew Tamburri Kelly Blincoe Fabio Palomba Rick Kazman
Privacy and security constraints for code contributions. PFACC: An OpenACC-like programming model for irregular nested parallelism.Richard Amankwah Jinfu Chen Patrick Kwaku Kudjo Dave Towey
Proximate sharing of geo data using the credit-considered mobile edge computing server switching control scheme. Component-aware orchestration of cloud-based enterprise applications, from TOSCA to Docker and Kubernetes.Matteo Bogo Jacopo Soldani Davide Neri Antonio Brogi
Recommending software features to designers: From the perspective of users.Chun Liu Wei Yang Zheng Li Yijun Yu
Timing isolation and improved scheduling of deep neural networks for real-time systems.Daniel Casini Alessandro Biondi Giorgio C. Buttazzo
A review on the computation offloading approaches in mobile edge computing: A game-theoretic perspective.Ali Shakarami Ali Shahidinejad Mostafa Ghobaei-Arani
Sensei: Enforcing secure coding guidelines in the integrated development environment.Pieter De Cremer Nathan Desmet Matias Madou Bjorn De Sutter
Microservice transition and its granularity problem: A systematic mapping study.Sara Hassan Rami Bahsoon Rick Kazman
Two decades of live coding and debugging of virtual machines through simulation.Daniel Ingalls Eliot Miranda Clément Béra Elisa Gonzalez Boix
Arash Mazidi Mehdi Golsorkhtabaramiri Meisam Yadollahzadeh Tabari
Configurable three-way model merging.Mohammadreza Sharbaf Bahman Zamani
Vocabulary and time based bug-assignment: A recommender system for open-source projects.Ali Sajedi Badashian Eleni Stroulia
Application of security reference architecture to Big Data ecosystems in an industrial scenario.Julio Moreno Javier Gómez Manuel A. Serrano Eduardo B. Fernández Eduardo Fernández-Medina
A semantic and social-based collaborative recommendation of friends in social networks. MFHS: A modular scheduling framework for heterogeneous system.Abdelhamid Khiat Abdelkamel Tari Tom Guérout
OPAL: An extensible framework for ontology-based program analysis.Dileep Kumar Pattipati Rupesh Nasre Sreenivasa Kumar Puligundla
Cetratus: A framework for zero downtime secure software updates in safety-critical systems.Imanol Mugarza Jorge Parra Eduardo Jacob
Self-adaptive brainstorming for jobshop scheduling in multicloud environment. Tabular-expression-based method for constructing metamorphic relations. Designing real-time systems using imprecise discrete-event system specifications.Yifan Wang Kiran Ijaz Dong Yuan Rafael A. Calvo
Flexible data anonymization using ARX - Current status and challenges ahead.Fabian Prasser Johanna Eicher Helmut Spengler Raffael Bild Klaus A. Kuhn
Healthcare software design and implementation - A project failure case. A real-time attack defense framework for 5G network slicing.Michel S. Bonfim Marcelo Anderson Santos Kelvin L. Dias Stenio Fernandes
MMLT: A mutual multilevel trust framework based on trusted third parties in multicloud environments.Golnaz Aghaee Ghazvini Mehran Mohsenzadeh Ramin Nasiri Amir Masoud Rahmani
Compact Fenwick trees for dynamic ranking and selection.Stefano Marchini Sebastiano Vigna
Predicting Hadoop misconfigurations using machine learning.Andrew Robert Apaar Gupta Vinayak Shenoy Dinkar Sitaram Subramaniam Kalambur
Inline wireless mobile sensors and fog nodes placement for leakage detection in water distribution systems.Chengyu Hu Xin Shu Xuesong Yan Deze Zeng Wenyin Gong Lei Wang
Robust and efficient memory management in Apache AsterixDB.Taewoo Kim Alexander Behm Michael Blow Vinayak R. Borkar Yingyi Bu Michael J. Carey Murtadha Al Hubail Shiva Jahangiri Jianfeng Jia Chen Li Chen Luo Ian Maxon Pouria Pirzadeh
Big data deployment in containerized infrastructures through the interconnection of network namespaces.Carla Sauvanaud Ajay Dholakia Jordi Guitart Chulho Kim Peter Mayes
All about activity injection: Threats, semantics, detection, and defense. A survey on the service interoperability in cloud computing: Client-centric and provider-centric perspectives.Mozhdeh Farhadi Jean-Louis Lanet Guillaume Pierre Daniele Miorandi
Partial migration technique for GPGPU tasks to Prevent GPU Memory Starvation in RPC-based GPU Virtualization.Jihun Kang JongBeom Lim HeonChang Yu
A multicriteria optimization model for cloud service provider selection in multicloud environments.Amany M. Mohamed Hisham M. Abdelsalam
Optimizing computational resource management for the scientific gateways ecosystems based on the service-oriented paradigm.Edvard Martins de Oliveira Júlio Cezar Estrella Alexandre Cláudio Botazzo Delbem Mario Henrique de Souza Pardo Fausto Guzzo da Costa Alexandre Defelicibus Stephan Reiff-Marganiec
Deployment of a cloud pipeline for real-time visual inspection using fast streaming high-definition images.Aishwarya Srivastava Siddhant Aggarwal Amy W. Apon Edward B. Duffy Ken Kennedy André Luckow Brandon Posey Marcin Ziolkowski
IoTSim-Edge: A simulation framework for modeling the behavior of Internet of Things and edge computing environments.Devki Nandan Jha Khaled Alwasel Areeb Alshoshan Xianghua Huang Ranesh Kumar Naha Sudheer Kumar Battula Saurabh Garg Deepak Puthal Philip James Albert Y. Zomaya Schahram Dustdar Rajiv Ranjan
Toward scalable cloud data center simulation using high-level architecture.Bukhtawar Elahi Asad Waqar Malik Anis Ur Rahman Muazzam Ali Khan
Availability analysis of design configurations to compose virtual performance-optimized data center systems in next-generation cloud data centers.Daniel Rosendo Demis Gomes Guto Leoni Santos Leylane Silva André L. C. Moreira Judith Kelner Djamel Sadok Glauco Estácio Gonçalves Amardeep Mehta Mattias Wildeman Patricia Takako Endo
New generation cloud computing.Blesson Varghese Marco A. S. Netto Ignacio Martín Llorente Rajkumar Buyya
Prabhakar Krishnan Subhasri Duttagupta Krishnashree Achuthan
SELFNET 5G mobile edge computing infrastructure: Design and prototyping.Enrique Chirivella-Perez Ricardo Marco Alaez Alba Hita Ana Serrano Mamolar Jose M. Alcaraz Calero Qi Wang Pedro Miguel Neves Giacomo Bernini Konstantinos Koutsopoulos Manuel Gil Pérez Gregorio Martínez Pérez Maria João Barros Anastasius Gavras
How to place your apps in the fog: State of the art and open challenges.Antonio Brogi Stefano Forti Carlos Guerrero Isaac Lera
DewSim: A trace-driven toolkit for simulating mobile device clusters in Dew computing environments.Matías Hirsch Cristian Mateos Juan Manuel Rodriguez Alejandro Zunino
Socially aware microcloud service overlay optimization in community networks.Nuno Apolónia Felix Freitag Leandro Navarro Sarunas Girdzijauskas
Pipeline provenance for cloud-based big data analytics.Ruoyu Wang Daniel Sun Guoqiang Li Raymond K. Wong Shiping Chen
Intelligent sentiment analysis approach using edge computing-based deep learning technique.H. Sankar V. Subramaniyaswamy Varadarajan Vijayakumar Arun Kumar Sangaiah Logesh Ravi A. Umamakeswari
A crosswalk pedestrian recognition system by using deep learning and zebra-crossing recognition techniques.Chyi-Ren Dow Ngo Huu Huy Liang-Hsuan Lee Po-Yu Lai Kuan-Chieh Wang Van-Tung Bui
SEWMS: An edge-based smart wearable maintenance system in communication network.Lanlan Rui Yabin Qin Biyao Li Ying Wang Haoqiu Huang
Cloud-aided online EEG classification system for brain healthcare: A case study of depression evaluation with a lightweight CNN.Hengjin Ke Dan Chen Tejal Shah Xianzeng Liu Xinhua Zhang Lei Zhang Xiaoli Li
Characterizing application scheduling on edge, fog, and cloud computing resources.Prateeksha Varshney Yogesh Simmhan
An osmotic computing infrastructure for urban pollution monitoring.Antonella Longo Marco Zappatore Andrea De Matteis
Developing applications in large scale, dynamic fog computing: A case study.Nam Ky Giang Rodger Lea Victor C. M. Leung
A secure fog-based platform for SCADA-based IoT critical infrastructure.Thar Baker Muhammad Asim Áine MacDermott Farkhund Iqbal Faouzi Kamoun Babar Shah Omar Alfandi Mohammad Hammoudeh
User allocation-aware edge cloud placement in mobile edge computing.Yan Guo Shangguang Wang Ao Zhou Jinliang Xu Jie Yuan Ching-Hsien Hsu
Abnormal visual event detection based on multi-instance learning and autoregressive integrated moving average model in edge-based Smart City surveillance.Xianghua Xu LiQiming Liu Lingjun Zhang Ping Li Jinjun Chen
Software tools and techniques for fog and edge computing.Rajiv Ranjan Massimo Villari Haiying Shen Omer F. Rana Rajkumar Buyya
Souad Ghazouani Haithem Mezni Yahya Slimani
Standalone noise and anomaly detection in wireless sensor networks: A novel time-series and adaptive Bayesian-network-based approach.Mahmood Safaei Abul Samad Ismail Hassan Chizari Maha Driss Wadii Boulila Shahla Asadi Mitra Safaei
Software fault prediction using particle swarm algorithm with genetic algorithm and support vector machine classifier. Deep locality-sensitive discriminative dictionary learning for semantic video analysis.Ben-Bright Benuwa Benjamin Ghansah Ernest K. Ansah
Orthogonal persistence in nonvolatile memory architectures: A persistent heap design and its implementation for a Java Virtual Machine.Taciano Perez Marcelo Veiga Neves Diego Medaglia Pedro H. G. Monteiro César A. F. De Rose
Temporal determinization of mutating finite automata: Reconstructing or restructuring. MOAManager: A tool to support data stream experiments.Bruno Iran Ferreira Maciel Silas G. T. C. Santos Roberto S. M. Barros
Gang Hu Min Peng Yihan Zhang Qianqian Xie Wang Gao Mengting Yuan
Interventions for long-term software security: Creating a lightweight program of assurance techniques for developers.Charles Weir Ingolf Becker James Noble Lynne Blair M. Angela Sasse Awais Rashid
Automated industrial IoT-device integration using the OpenPnP reference architecture.Heiko Koziolek Andreas Burger Marie Platenius-Mohr Julius Rückert Francisco Mendoza Roland Braun
Does your code need comment?Yuan Huang Nan Jia Junhuai Shu Xinyu Hu Xiangping Chen Qiang Zhou
DevDocOps: Enabling continuous documentation in alignment with DevOps.Guoping Rong Zefeng Jin He Zhang Youwen Zhang Wenhua Ye Dong Shao
Automatic recommendation to appropriate log levels.Taeyoung Kim Suntae Kim Sooyong Park YoungBeom Park
Introduction to the special issue on software engineering in practice.Judith Bishop Kendra M. L. Cooper Helen Sharp Michael W. Whalen
Hossein Monshizadeh Naeen Esmaeil Zeinali Khosraghi Abolfazl Toroghi Haghighat
Effective and efficient Java-type obfuscation.Christophe Foket Koen De Bosschere Bjorn De Sutter
A deep recurrent Q network towards self-adapting distributed microservice architecture. Domain-specific visualization system based on automatic multiseed recommendations: Extracting stratigraphic structures. Base64 encoding and decoding at almost the speed of a memory copy.Mouhamed Gaith Ayadi Riadh Bouslimi Jalel Akaichi
Torii: An aspect-based sentiment analysis system that can mine conditions.Fernando O. Gallego Rafael Corchuelo
IBFET: Index-based features extraction technique for scalable code clone detection at file level granularity. Flexible service consolidation with nested virtualization and library operating systems.