default search action
Innovations in Systems and Software Engineering, Volume 11
Volume 11, Number 1, March 2015
- Ardhendu Mandal, Subhas Chandra Pal:
Achieving agility through BRIDGE process model: an approach to integrate the agile and disciplined software development. 1-7 - Jeremy Rose:
Improving software management: the industry model, the knowledge model, the network model. 9-23 - Vahid Khatibi Bardsiri, Elham Khatibi:
Insightful analogy-based software development effort estimation through selective classification and localization. 25-38 - Imène Issaoui, Nadia Bouassida, Hanêne Ben-Abdallah:
Using metric-based filtering to improve design pattern detection approaches. 39-53 - Jing Liu, Xijiao Xiong, Zuohua Ding, Jifeng He:
Modeling and analysis of interactive telemedicine systems. 55-69
Volume 11, Number 2, June 2015
- Steve Reeves:
Preface. 71 - Paolo Masci, Rimvydas Ruksenas, Patrick Oladimeji, Abigail Cauchi, Andy Gimblett, Karen Yunqiu Li, Paul Curzon, Harold W. Thimbleby:
The benefits of formalising design guidelines: a case study on the predictability of drug infusion pumps. 73-93 - Michael D. Harrison, José Creissac Campos, Paolo Masci:
Reusing models and properties in the analysis of similar interactive devices. 95-111 - Paolo Masci, Paul Curzon, Dominic Furniss, Ann Blandford:
Using PVS to support the analysis of distributed cognition systems. 113-130 - Muffy Calder, Philip D. Gray, Chris Unsworth:
Is my configuration any good: checking usability in an interactive sensor-based activity monitor. 131-142 - Doron Drusinsky:
Early detection of evolving system failures and temporal conflicts using parameterized formal specifications and bounded constraint-solving. 143-152
Volume 11, Number 3, September 2015
- Sanjay Kumar Jena, Ashok K. Turuk, Manmath Narayan Sahoo, Sambit Bakshi:
Introduction to special issue on 'Advances in Information Systems and Network Systems Security'. 153-154 - Sarat Kumar Chettri, Bhogeswar Borah:
On analysis of time-series data with preserved privacy. 155-165 - Keith Garrett, Sai Raghu Talluri, Swapnoneel Roy:
On vulnerability analysis of several password authentication protocols. 167-176 - Partha Basuchowdhuri, Riya Roy, Siddhartha Anand, Diksha Roy Srivastava, Subhashis Majumder, Sanjoy Kumar Saha:
Spanning tree-based fast community detection methods in social networks. 177-186 - Susmita Bhaduri, Orchisama Das, Sanjoy Kumar Saha, Chandan Mazumdar:
Rhythm analysis of tablā signal by detecting the cyclic pattern. 187-195 - Soubhagya Sankar Barpanda, Banshidhar Majhi, Pankaj Kumar Sa:
Region-based feature extraction from non-cooperative iris images using CDF 9/7 filter bank. 197-202 - Jin Song Dong, Yuzhang Feng, Yuan-Fang Li, Colin Keng-Yan Tan, Bimlesh Wadhwa, Hai H. Wang:
BOWL: augmenting the Semantic Web with beliefs. 203-215 - Vignir Gudmundsson, Christoph Schulze, Dharmalingam Ganesan, Mikael Lindvall, Robert Wiegand:
Model-based testing of NASA's GMSEC, a reusable framework for ground system software. 217-232
Volume 11, Number 4, December 2015
- Florian Merz, Carsten Sinz, Hendrik Post, Thomas Gorges, Thomas Kropf:
Bridging the gap between test cases and requirements by abstract testing. 233-242 - Subhrakanta Panda, Durga Prasad Mohapatra:
ACCo: a novel approach to measure cohesion using hierarchical slicing of Java programs. 243-260 - Md. Imrul Kayes, Shafinaz Islam, Jacob Chakareski:
The network of faults: a complex network approach to prioritize test cases for regression testing. 261-275 - Fernando Valles-Barajas:
A comparative analysis between two techniques for the prediction of software defects: fuzzy and statistical linear regression. 277-287 - Yousef Abdi, Saeed Parsa, Yousef Seyfari:
A hybrid one-class rule learning approach based on swarm intelligence for software fault prediction. 289-301 - Mohamad Kassab, Nil H. Kilicay-Ergin:
Applying analytical hierarchy process to system quality requirements prioritization. 303-312
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.