Volume 52, Number 5, May 2022
Evaluation of design pattern alternatives in Java.

Lex A. Bijlsma Arjan J. F. Kok Harrie J. M. Passier Harold J. Pootjes Sylvia Stuurman

The effect of distance metrics in a general purpose synthesizer: An empirical study on integer domain imperative programs.

Alexandre R. S. Correia Juliano Manabu Iyoda Alexandre Cabral Mota

Toward a novel engine for compiler optimization space exploration of big data workloads.

Hameeza Ahmed Muhammad Ali Ismail

Message piece dissemination approach for opportunistic underwater sensor network invaded by underwater spy-robots.

Linfeng Liu Houqian Zhang Jiagao Wu Jia Xu

A flexible approach for virtual machine selection in cloud data centers with AHP.

Javad Ahmadi Abolfazl Toroghi Haghighat Amir Masoud Rahmani Reza Ravanmehr

DACA: Distributed adaptive grid decision graph based clustering algorithm.

Jing He Jun Zhou Haoyu Wang Li Cai

Architecture of a time-sensitive provisioning system for cloud-native software.

Sreekrishnan Venkateswaran Adwait Bauskar Santonu Sarkar

AuctionWhisk: Using an auction-inspired approach for function placement in serverless fog platforms.

David Bermbach Jonathan Bader Jonathan Hasenburg Tobias Pfandzelter Lauritz Thamsen

SafeOSL: Ensuring memory safety of C via ownership-based intermediate language.

Xiaohua Yin Zhiqiu Huang Shuanglong Kan Guohua Shen Zhe Chen Yang Liu Fei Wang

Profiling and controlling I/O-related memory contention in COTS heterogeneous platforms.

Matteo Zini Giorgiomaria Cicero Daniel Casini Alessandro Biondi


Volume 52, Number 4, April 2022
Rafting multiplayer video games.

Gabriele Pozzan Tullio Vardanega

The evolution of the Arjuna transaction processing system.

Mark C. Little Santosh K. Shrivastava

A comprehensive survey on nature-inspired algorithms and their applications in edge computing: Challenges and future directions.

Mainak Adhikari Satish Narayana Srirama Tarachand Amgoth

Transcoding web pages via stylesheets and scripts for saving energy on the client.

Hüseyin Ünlü Yeliz Yesilada

Evaluating the semantic transparency of Guaraná: A domain-specific language for enterprise application integration.

José Bocanegra Rafael Z. Frantz Fabricia Roos-Frantz Fábio Paulo Basso

On the (un-)adoption of JavaScript front-end frameworks.

Fabio Ferreira Hudson Silva Borges Marco Tulio Valente

An evolutionary ensemble analogy-based software effort estimation.

Zahra Shahpar Vahid Khatibi Bardsiri Amid Khatibi Bardsiri

Efficient interest-aware data dissemination in mobile opportunistic networks.

Sui Yu Lichen Zhang Peng Li Lixia Li Bin Yan Zhipeng Cai

A powerful software-defined cyber-physical system to expand CPS adoption.

Haisheng Yu Heng Qi Keqiu Li

Advanced data integration in banking, financial, and insurance software in the age of COVID-19.

Moinak Maiti Darko Vukovic Amrit Mukherjee Pavan D. Paikarao Janardan Krishna Yadav

Software system to predict the infection in COVID-19 patients using deep learning and web of things.

Ashima Singh Amrita Kaur Arwinder Dhillon Sahil Ahuja Harpreet Vohra

NovidChain: Blockchain-based privacy-preserving platform for COVID-19 test/vaccine certificates.

Amal Abid Saoussen Cheikhrouhou Slim Kallel Mohamed Jmaiel

An approach to forecast impact of Covid-19 using supervised machine learning model.

Senthilkumar Mohan John A Ahed Abugabah M. Adimoolam Shubham Kumar Singh Ali Kashif Bashir Louis Sanzogni

Innovative software systems for managing the impact of the COVID-19 pandemic.

Sukhpal Singh Gill Ricardo Vinuesa Venki Balasubramanian Soumya K. Ghosh


Volume 52, Number 3, March 2022
An efficient Hadoop-based brain tumor detection framework using big data analytic.

Prabhjot Kaur Chahal Shreelekha Pandey

Security analytics for real-time forecasting of cyberattacks.

Amir Javed Mike Lakoju Pete Burnap Omer F. Rana

An Internet of Things-enabled decision support system for circular economy business model.

Julius Sechang Mboli Dhavalkumar Thakker Jyoti Laxmi Mishra

Applying artificial bee colony algorithm to the multidepot vehicle routing problem.

Zhaoquan Gu Yan Zhu Yuexuan Wang Xiaojiang Du Mohsen Guizani Zhihong Tian

PSSCC: Provably secure communication framework for crowdsourced industrial Internet of Things environments.

Dharminder Dharminder Dheerendra Mishra Joel J. P. C. Rodrigues Ricardo de A. L. Rabelo Kashif Saleem

A community-based hierarchical user authentication scheme for Industry 4.0.

Akash Sinha Gulshan Shrivastava Prabhat Kumar Deepak Gupta

A multidomain virtual network embedding algorithm based on multiobjective optimization for Internet of Drones architecture in Industry 4.0.

Peiying Zhang Chao Wang Zeyu Qin Haotong Cao

Deep-Q learning-based heterogeneous earliest finish time scheduling algorithm for scientific workflows in cloud.

Avinash Kaur Parminder Singh Ranbir Singh Batth Chee Peng Lim

Data dimensionality reduction techniques for Industry 4.0: Research results, challenges, and future research directions.

Prateek Chhikara Nikhil Jain Rajkumar Tekchandani Neeraj Kumar

An efficient scheme for secure feature location using data fusion and data mining in internet of things environment.

N. Balaji S. Lakshmi M. Anand M. Anbarasan P. Mathiyalagan

Big data analytics in Industry 4.0 ecosystems.

Gagangeet Singh Aujla Radu Prodan Danda B. Rawat


Volume 52, Number 2, February 2022
Posits and the state of numerical representations in the age of exascale and edge computing.

Alexandra Poulos Sally A. McKee Jon C. Calhoun

PolyRec Gesture Design Tool: A tool for fast prototyping of gesture-based mobile applications.

Roberto Bufano Gennaro Costagliola Mattia De Rosa Vittorio Fuccella

Equivalent mutant identification using hybrid wavelet convolutional rain optimization.

Kiran Jammalamadaka Nikhat Parveen

Transcoding billions of Unicode characters per second with SIMD instructions.

Daniel Lemire Wojciech Mula

A computational approach for progressive architecture shrinkage in action recognition.

Matteo Tomei Lorenzo Baraldi Giuseppe Fiameni Simone Bronzin Rita Cucchiara

How the adoption of feature toggles correlates with branch merges and defects in open-source projects?

Eduardo Smil Prutchi Heleno de S. Campos Junior Leonardo G. P. Murta

A metaheuristic-based data replica placement approach for data-intensive IoT applications in the fog computing environment.

Jaber Taghizadeh Mostafa Ghobaei-Arani Ali Shahidinejad

Intelligent antiphishing framework to detect phishing scam: A hybrid classification approach.

Satheesh Kumar Marimuthu Srinivasagan Kalampatti Gopalasamy Jalel Ben-Othman

Computationally easy, spectrally good multipliers for congruential pseudorandom number generators.

Guy L. Steele Jr. Sebastiano Vigna

Towards cloud-based unobtrusive monitoring in remote multi-vendor environments.

Jerico Moeyersons Sarah Kerkhove Tim Wauters Filip De Turck Bruno Volckaert

SDFunc: Modular spreadsheet design with sheet-defined functions in Microsoft Excel.

Tomaz Turk

PDMA: Probabilistic service migration approach for delay-aware and mobility-aware mobile edge computing.

Minxian Xu Qiheng Zhou Huaming Wu Weiwei Lin Kejiang Ye Chengzhong Xu

RGraph: Asynchronous graph processing based on asymmetry of remote direct memory access.

Hanhua Chen Jie Yuan Hai Jin Yonghui Wang Sijie Wu Zhihao Jiang

SPOPB: Reducing solid state drive write traffic for flash-based key-value caching.

Zongwei Li Dan Feng Yuchong Hu Mengting Lu

Container lifecycle-aware scheduling for serverless computing.

Song Wu Zhiheng Tao Hao Fan Zhuo Huang Xinmin Zhang Hai Jin Chen Yu Chun Cao

Climbing out of a software black hole.

Lynn Robert Carter


Volume 52, Number 1, January 2022
Optimizing checkpoint-based fault-tolerance in distributed stream processing systems: Theory to practice.

Sachini Jayasekara Shanika Karunasekera Aaron Harwood

Global outliers detection in wireless sensor networks: A novel approach integrating time-series analysis, entropy, and random forest-based classification.

Mahmood Safaei Maha Driss Wadii Boulila Elankovan A. Sundararajan Mitra Safaei

Real time flood disaster monitoring based on energy efficient ensemble clustering mechanism in wireless sensor network.

Allan Jenose Wilson Aravindhan Sarojini Radhamani

A method to acquire cross-domain requirements based on Syntax Direct Technique.

Huaxiao Liu Mengxi Zhang Lei Liu Zhou Liu

An energy-aware virtual machines consolidation method for cloud computing: Simulation and verification.

Rahmat Zolfaghari Amir Sahafi Amir Masoud Rahmani Reza Rezaei

Benchmarking and learning garbage collection delays for resource-restricted graphical user interfaces.

Harry McCarthy Abigail Koay Michael Dawson Kenneth B. Kent Panos Patros

Reformulation of the performance portability metric.

Ami Marowka

Just-in-time defect prediction for software hunks.

Xiaoyan Zhu Chenyu Yan E. James Whitehead Jr. Binbin Niu Lei Zhu Long Pan

TraceChain: A blockchain-based scheme to protect data confidentiality and traceability.

Yongkai Fan Xiaodong Lin Wei Liang Jinghan Wang Gang Tan Xia Lei Jing Lei

Quantum computing: A taxonomy, systematic review and future directions.

Sukhpal Singh Gill Adarsh Kumar Harvinder Singh Manmeet Singh Kamalpreet Kaur Muhammad Usman Rajkumar Buyya

Software effort estimation accuracy prediction of machine learning techniques: A systematic performance evaluation.

Yasir Mahmood Nazri Kama Azri Azmi Ahmad Salman Khan Mazlan Ali

Design of frameworks for self-adaptive service-oriented applications: A systematic analysis.

William Filisbino Passini Cristiane Aparecida Lana Vinicius Pfeifer Frank José Affonso

Post golden jubilee year of the software journal: New research trends and strengthening advisory editorial team.

Satish Narayana Srirama Rajkumar Buyya