nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A domain-specific language for modeling and analyzing solution spaces for technology roadmapping
|
Breckel, Alexander |
|
|
184 |
C |
p. |
artikel |
2 |
API beauty is in the eye of the clients: 2.2 million Maven dependencies reveal the spectrum of client–API usages
|
Harrand, Nicolas |
|
|
184 |
C |
p. |
artikel |
3 |
Architecture evaluation in continuous development
|
Ågren, S. Magnus |
|
|
184 |
C |
p. |
artikel |
4 |
A stochastic algorithm for scheduling bag-of-tasks applications on hybrid clouds under task duration variations
|
Yin, Lu |
|
|
184 |
C |
p. |
artikel |
5 |
Automated reverse engineering of role-based access control policies of web applications
|
Le, Ha Thanh |
|
|
184 |
C |
p. |
artikel |
6 |
Breaking the vicious circle: A case study on why AI for software analytics and business intelligence does not take off in practice
|
Figalist, Iris |
|
|
184 |
C |
p. |
artikel |
7 |
Cataloging dependency injection anti-patterns in software systems
|
Laigner, Rodrigo |
|
|
184 |
C |
p. |
artikel |
8 |
Classifying crowdsourced mobile test reports with image features: An empirical study
|
Li, Yuying |
|
|
184 |
C |
p. |
artikel |
9 |
Clone detection through srcClone: A program slicing based approach
|
Alomari, Hakam W. |
|
|
184 |
C |
p. |
artikel |
10 |
Deep learning application on code clone detection: A review of current knowledge
|
Lei, Maggie |
|
|
184 |
C |
p. |
artikel |
11 |
Detecting violations of access control and information flow policies in data flow diagrams
|
Seifermann, Stephan |
|
|
184 |
C |
p. |
artikel |
12 |
Editorial Board
|
|
|
|
184 |
C |
p. |
artikel |
13 |
Efficient computation of minimal weak and strong control closure
|
Masud, Abu Naser |
|
|
184 |
C |
p. |
artikel |
14 |
Enabling automated integration of architectural languages: An experience report from the automotive domain
|
Bucaioni, Alessio |
|
|
184 |
C |
p. |
artikel |
15 |
HUNTER: AI based holistic resource management for sustainable cloud computing
|
Tuli, Shreshth |
|
|
184 |
C |
p. |
artikel |
16 |
Mining user reviews of COVID contact-tracing apps: An exploratory analysis of nine European apps
|
Garousi, Vahid |
|
|
184 |
C |
p. |
artikel |
17 |
Modelling and executing IoT-enhanced business processes through BPMN and microservices
|
Valderas, Pedro |
|
|
184 |
C |
p. |
artikel |
18 |
Moderator factors of software security and performance verification
|
Ribeiro, Victor Vidigal |
|
|
184 |
C |
p. |
artikel |
19 |
Multi-triage: A multi-task learning framework for bug triage
|
Aung, Thazin Win Win |
|
|
184 |
C |
p. |
artikel |
20 |
Precise Learning of Source Code Contextual Semantics via Hierarchical Dependence Structure and Graph Attention Networks
|
Zhao, Zhehao |
|
|
184 |
C |
p. |
artikel |
21 |
Prevalence, common causes and effects of technical debt: Results from a family of surveys with the IT industry
|
Ramač, Robert |
|
|
184 |
C |
p. |
artikel |
22 |
Self-adaptive mobile web service discovery framework for Dynamic Mobile Environment
|
Garba, Salisu |
|
|
184 |
C |
p. |
artikel |
23 |
Sharing runtime permission issues for developers based on similar-app review mining
|
Gao, Hongcan |
|
|
184 |
C |
p. |
artikel |
24 |
Spreadsheet debugging: The perils of tool over-reliance
|
Mukhtar, Adil |
|
|
184 |
C |
p. |
artikel |