


default search action
International Journal of Software Engineering and Knowledge Engineering, Volume 27
Volume 27, Number 1, February 2017
- Wei Lu, Weidong Wang, Ergude Bao, Weiwei Xing, Kai Zhu:

Improving Resilience of Software Systems: A Case Study in 3D-Online Game System. 1-22 - Nada A. Dief, Ali E. Al-Desouky, Amr Ali-Eldin, Asmaa M. el-Said:

An Adaptive Semantic Descriptive Model for Multi-Document Representation to Enhance Generic Summarization. 23-48 - Mehmet Kaya, James W. Fawcett:

Identification of Extract Method Refactoring Opportunities through Analysis of Variable Declarations and Uses. 49-70 - Peng Liu, Yan Bai, Lie Wang, Xianxian Li:

Partial k-Anonymity for Privacy-Preserving Social Network Data Publishing. 71-90 - Zhongjie Wang, Dewayne E. Perry, Xiaofei Xu:

Characterizing Individualized Coding Contributions of OSS Developers from Topic Perspective. 91-124 - Jarkko Hyysalo, Markku Oivo, Pasi Kuvaja:

A Design Theory for Cognitive Workflow Systems. 125-
Volume 27, Number 2, March 2017
- Veronica Gacitua-Decar, Claus Pahl

:
Structural Process Pattern Matching Based on Graph Morphism Detection. 153-190 - Mahdi Bashari, Ebrahim Bagheri

, Weichang Du:
Dynamic Software Product Line Engineering: A Reference Framework. 191-234 - Hee-Jin Lee, Joon-Sang Lee, Eunkyoung Jee, Doo-Hwan Bae:

A User eXperience Evaluation Framework for Mobile Usability. 235-280 - Marek Krótkiewicz

:
Association-Oriented Database Model - n-ary Associations. 281-320 - Samini Subramaniam, Su-Cheng Haw

, Lay-Ki Soon, Kok-Leong Koong:
QTwig: A Structural Join Algorithm for Efficient Query Retrieval Based on Region-Based Labeling. 321-
Volume 27, Number 3, April 2017
- Umit Can

, Bilal Alatas
:
Automatic Mining of Quantitative Association Rules with Gravitational Search Algorithm. 343-372 - Hongzhen Xu, Wenlin Song, Zhiqiang Liu:

A Specification and Detection Approach for Parallel Evolution Conflicts of Software Architectures. 373-398 - Sana Chakri

, Said Raghay, Salah el hadaj:
Semantic Trajectory Knowledge Discovery: A Promising Way to Extract Meaningful Patterns from Spatiotemporal Data. 399-422 - Hui Zhang:

Utilization of Dependence and Weight to Improve Fault Localization Method of Regression Test Cases. 423-448 - Saeed Setayeshi

, Vahid Bairami Rad, Alireza Noruzi, Nasser Yousefi:
Optimal Design of Wide Area Based on Fuzzy Controller and Intelligent Method. 449-474 - Abdelkareem M. Alashqar

, Hazem M. El-Bakry
, Ahmad Abo Elfetouh:
A Framework for Selecting Architectural Tactics Using Fuzzy Measures. 475-498 - Soner Kiziloluk

, Ahmet Bedri Özer
:
Web Pages Classification with Parliamentary Optimization Algorithm. 499-
Volume 27, Number 4, May 2017
- Bassey Isong

:
Enhancing Software Maintenance via Early Prediction of Fault-Prone Object-Oriented Classes. 515-538 - Zhong Sheng Qian:

SXM-Based Web Test Generation with Respect to Logic Coverage Criteria. 539-574 - Zahra Akbari, Sedigheh Khoshnevis

, Mehran Mohsenzadeh
:
A Method for Prioritizing Integration Testing in Software Product Lines Based on Feature Model. 575-600 - Aneesa Saeed, Siti Hafizah Ab Hamid

, Asmiza Abdul Sani
:
Cost and Effectiveness of Search-Based Techniques for Model-Based Testing: An Empirical Analysis. 601-622 - Peng Zhou

, Yan Liu, Mengjia Zhao, Xin Lou:
A Proof of Concept Study for Criminal Network Analysis with Interactive Strategies. 623-640 - Muhammad Usman, Jürgen Börstler

, Kai Petersen
:
An Effort Estimation Taxonomy for Agile Software Development. 641-
Volume 27, Number 5, June 2017
- Tubagus Mohammad Akhriza

, Yinghua Ma, Jianhua Li:
Revealing the Gap Between Skills of Students and the Evolving Skills Required by the Industry of Information and Communication Technology. 675-698 - Nuno Flores

, Ademar Aguiar
:
Learning Frameworks in a Social-Intensive Knowledge Environment - An Empirical Study. 699-726 - Jia Hao, Qiang-Fu Zhao, Yan Yan, Guoxin Wang:

A Review of Tacit Knowledge: Current Situation and the Direction to Go. 727-748 - Mourad Badri, Aymen Kout, Linda Badri:

Investigating the Effect of Aspect-Oriented Refactoring on the Unit Testing Effort of Classes: An Empirical Evaluation. 749-790 - Mariusz Pelc

, Dawid Galus
:
Adaptation Architecture for Self-Healing Computer Systems. 791-816 - Johnny Maikeo Ferreira, Silvia Regina Vergilio, Marcos Antonio Quináia:

Software Product Line Testing Based on Feature Model Mutation. 817-840 - Euijong Lee

, Young-Gab Kim
, Young-Duk Seo, Kwangsoo Seol, Doo-Kwon Baik:
An Evaluation Method for Content Analysis Based on Twitter Content Influence. 841-
Volume 27, Number 6, August 2017
- He Jiang, Najam Nazar

, Jingxuan Zhang, Tao Zhang
, Zhilei Ren:
PRST: A PageRank-Based Summarization Technique for Summarizing Bug Reports with Duplicates. 869-896 - Honghao Gao, Danqi Chu, Yucong Duan, Yuyu Yin

:
Probabilistic Model Checking-Based Service Selection Method for Business Process Modeling. 897-924 - Yu Zhou, Yanxiang Tong, Taolue Chen

, Jin Han:
Augmenting Bug Localization with Part-of-Speech and Invocation. 925-950 - Zohreh Karimi Aghdam, Bahman Arasteh

:
An Efficient Method to Generate Test Data for Software Structural Testing Using Artificial Bee Colony Optimization Algorithm. 951-966 - Kiyoshi Honda, Hironori Washizaki, Yoshiaki Fukazawa:

Generalized Software Reliability Model Considering Uncertainty and Dynamics: Model and Applications. 967-
Volume 27, Number 7, September 2017
- Dmitriy Dunaev, László Lengyel:

Parametrization and Evaluation of Intermediate Level Obfuscator. 995-1012 - Lu Liu, Wanli Zuo, Tao Peng:

Structure2Content: An Incremental Method for Detecting Outlier Correlation in Heterogeneous Network. 1013-1032 - Jimin Hwa, Shin Yoo, Yeong-Seok Seo

, Doo-Hwan Bae:
Search-Based Approaches for Software Module Clustering Based on Multiple Relationship Factors. 1033-1062 - Giulio Concas, Michele Marchesi

, Cristina Monni, Matteo Orrù, Roberto Tonelli
:
Software Quality and Community Structure in Java Software Networks. 1063-1096 - Francesca Arcelli Fontana, Claudia Raibulet, Marco Zanoni:

Alternatives to the Knowledge Discovery Metamodel: An Investigation. 1097-1128 - Cagatay Catal

, Serkan Tugul, Basar Akpinar:
Automatic Software Categorization Using Ensemble Methods and Bytecode Analysis. 1129-
Volume 27, Number 8, October 2017
- Shadi Banitaan, Kendall E. Nygard, Kenneth Magel:

Test Focus Selection for Integration Testing. 1145-1166 - Johan Silvander, Magnus Wilson, Krzysztof Wnuk, Mikael Svahnberg:

Supporting Continuous Changes to Business Intents. 1167-1198 - Karla Olmos-Sánchez

, Jorge Enrique Rodas Osollo
:
Requirements Engineering Based on Knowledge Management: Theoretical Aspects and a Practical Proposal. 1199-1234 - Jinfu Chen, Saihua Cai

, Dave Towey
, Lili Zhu, Rubing Huang
, Hilary Ackah-Arthur
, Michael Omari:
Detecting Implicit Security Exceptions Using an Improved Variable-Length Sequential Pattern Mining Method. 1235-1268 - Yulei Pang, Xiaozhen Xue, Akbar Siami Namin:

Fault Localizations Through Feature Selections. 1269-1290 - Humberto Cortés, Antonio Navarro:

Enterprise WAE: A Lightweight UML Extension for the Characterization of the Presentation Tier of Enterprise Applications with MDD-Based Mockup Generation. 1291-1332 - Abhijeet Ramesh Thakare

, Parag S. Deshpande:
Comparative Search of Entities. 1333-
Volume 27, Numbers 9-10, November & December 2017
- Shi-Kuo Chang, Xudong He:

Guest Editors' Introduction. 1359-1360 - Xudong He, Zhijiang Dong, Heng Yin

, Yujian Fu:
A Framework for Developing Cyber-Physical Systems. 1361-1386 - Amal Shehadeh, Alexander Felfernig, Martin Stettinger, Michael Jeran, Stefan Reiterer:

Automated Learning Content Generation from Knowledge Bases in the STUDYBATTLES Environment. 1387-1408 - Yunxiang Xiong, Zhangyuan Meng, Beijun Shen, Wei Yin:

Developer Identity Linkage and Behavior Mining Across GitHub and StackOverflow. 1409-1426 - Xiao Yu, Jin Liu, Weiqiang Peng, Xingyu Peng:

Improving Cross-Company Defect Prediction with Data Filtering. 1427-1438 - Sebastian Weigelt, Tobias Hey

, Walter F. Tichy:
Context Model Acquisition from Spoken Utterances. 1439-1454 - Dewan Mohammad Moksedul Alam, Xudong He:

A Method to Analyze Predicate Transition Nets Using SPIN Model Checker. 1455-1482 - Zhenya Zhang, Peng Wu, Yu Zhang:

Localization of Linearizability Faults on the Coarse-Grained Level. 1483-1506 - Judith F. Islam, Manishankar Mondal, Chanchal K. Roy, Kevin A. Schneider:

Comparing Software Bugs in Clone and Non-clone Code: An Empirical Study. 1507-1528 - Zadia Codabux, Kazi Zakia Sultana, Byron J. Williams:

The Relationship Between Code Smells and Traceable Patterns - Are They Measuring the Same Thing? 1529-1548 - Óscar Mortágua Pereira

, Rui L. Aguiar
:
Enhancing Call-Level Interfaces with Thread-Safe Local Memory Structures. 1549-1566
- Dongjin Yu, Yiyu Wu, Jingchao Sun, Zhiyong Ni, Youhuizi Li, Qing Wu, Xufeng Chen:

Mining Hidden Interests from Twitter Based on Word Similarity and Social Relationship for OLAP. 1567-1578 - Reinier Morejon, Marx L. Viana, Carlos Lucena:

An Approach to Generate Software Agents for Health Data Mining. 1579-1590 - Qing Huang, Yangrui Yang, Xudong Wang, Hongyan Wan, Rui Wang, Guoqing Wu:

Query Expansion via Intent Predicting. 1591-1602 - Woramet Muangsiri, Shingo Takada:

Random GUI Testing of Android Application Using Behavioral Model. 1603-1612 - Denise da Luz Siqueira, Lisandra M. Fontoura, Rafael H. Bordini, Luís A. Lima Silva:

Argumentation Schemes for Collaborative Debate of Requirement Risks in Software Projects. 1613-1636 - Pengyi Li, Jing Sun, Hai Wang

:
Formal Approach to Assertion-Based Code Generation. 1637-

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














