


Остановите войну!
for scientists:


default search action
Bojan Cukic
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2022
- [j26]Pietro Liguori
, Erfan Al-Hossami, Domenico Cotroneo, Roberto Natella, Bojan Cukic, Samira Shaikh:
Can we generate shellcodes via natural language? An empirical study. Autom. Softw. Eng. 29(1): 30 (2022) - [c114]Katerina Goseva-Popstojanova, Bojan Cukic:
Message from the General Co-Chairs: ISSRE 2022. ISSRE 2022: xiii - [c113]Katerina Goseva-Popstojanova, Bojan Cukic:
Message from the ISSRE 2022 General Co-Chairs. ISSRE Workshops 2022: xiv - [c112]Pietro Liguori
, Cristina Improta, Simona De Vivo, Roberto Natella, Bojan Cukic, Domenico Cotroneo:
Can NMT Understand Me? Towards Perturbation-based Evaluation of NMT Models for Code Generation. NLBSE 2022: 59-66 - [i6]Pietro Liguori, Erfan Al-Hossami, Domenico Cotroneo, Roberto Natella, Bojan Cukic, Samira Shaikh:
Can We Generate Shellcodes via Natural Language? An Empirical Study. CoRR abs/2202.03755 (2022) - [i5]Pietro Liguori, Cristina Improta, Simona De Vivo, Roberto Natella, Bojan Cukic, Domenico Cotroneo:
Can NMT Understand Me? Towards Perturbation-based Evaluation of NMT Models for Code Generation. CoRR abs/2203.15319 (2022) - [i4]Cristina Improta, Pietro Liguori, Roberto Natella, Bojan Cukic, Domenico Cotroneo:
Who Evaluates the Evaluators? On Automatic Metrics for Assessing AI-based Offensive Code Generators. CoRR abs/2212.06008 (2022) - 2021
- [c111]Pietro Liguori
, Erfan Al-Hossami, Vittorio Orbinato, Roberto Natella, Samira Shaikh, Domenico Cotroneo, Bojan Cukic:
EVIL: Exploiting Software via Natural Language. ISSRE 2021: 321-332 - [i3]Pietro Liguori, Erfan Al-Hossami, Domenico Cotroneo, Roberto Natella, Bojan Cukic, Samira Shaikh:
Shellcode_IA32: A Dataset for Automatic Shellcode Generation. CoRR abs/2104.13100 (2021) - [i2]Pietro Liguori, Erfan Al-Hossami, Vittorio Orbinato, Roberto Natella, Samira Shaikh, Domenico Cotroneo, Bojan Cukic:
EVIL: Exploiting Software via Natural Language. CoRR abs/2109.00279 (2021) - 2020
- [c110]Bojan Cukic, Douglas Hague, Mary Lou Maher:
An Innovative Interdisciplinary Undergraduate Data Science Program: Pathways and Experience. FIE 2020: 1-5
2010 – 2019
- 2019
- [j25]Zahid A. Syed
, Jordan Helmick, Sean Banerjee, Bojan Cukic:
Touch gesture-based authentication on mobile devices: The effects of user posture, device size, configuration, and inter-session variability. J. Syst. Softw. 149: 158-173 (2019) - 2018
- [c109]Tonya K. Frevert
, Audrey Rorrer, Daniel J. Davis, Celine Latulipe
, Mary Lou Maher, Bojan Cukic, Lawrence Mays, Steven Rogelberg:
Sustainable Educational Innovation Through Engaged Pedagogy and Organizational Change. FIE 2018: 1-5 - [e5]Sudipto Ghosh, Roberto Natella, Bojan Cukic, Robin S. Poston, Nuno Laranjeiro:
29th IEEE International Symposium on Software Reliability Engineering, ISSRE 2018, Memphis, TN, USA, October 15-18, 2018. IEEE Computer Society 2018, ISBN 978-1-5386-8321-7 [contents] - [e4]Sudipto Ghosh, Roberto Natella, Bojan Cukic, Robin S. Poston, Nuno Laranjeiro:
2018 IEEE International Symposium on Software Reliability Engineering Workshops, ISSRE Workshops, Memphis, TN, USA, October 15-18, 2018. IEEE Computer Society 2018, ISBN 978-1-5386-9443-5 [contents] - 2017
- [j24]Sean Banerjee, Zahid A. Syed
, Jordan Helmick, Mark Vere Culp, Kenneth Joseph Ryan, Bojan Cukic
:
Automated triaging of very large bug repositories. Inf. Softw. Technol. 89: 1-13 (2017) - 2016
- [j23]Zahid A. Syed
, Sean Banerjee, Bojan Cukic
:
Normalizing variations in feature vector structure in keystroke dynamics authentication systems. Softw. Qual. J. 24(1): 137-157 (2016) - [c108]Mohsen Dorodchi, Maryam Abedi, Bojan Cukic
:
Trust-Based Development Framework for Distributed Systems and IoT. COMPSAC Workshops 2016: 437-442 - [c107]Mary Lou Maher, Bojan Cukic
, Lawrence Mays, Steven Rogelberg, Celine Latulipe
, Jamie Payton, Audrey Rorrer, Tonya K. Frevert
:
The Connected Learner: Engaging faculty to connect computing students to peers, profession and purpose. FIE 2016: 1-8 - [c106]Emanuela Marasco, Mohamed Shehab, Bojan Cukic
:
A Methodology for Prevention of Biometric Presentation Attacks. LADC 2016: 9-14 - [e3]Radu F. Babiceanu, Hélène Waeselynck, Raymond A. Paul, Bojan Cukic, Jie Xu:
17th IEEE International Symposium on High Assurance Systems Engineering, HASE 2016, Orlando, FL, USA, January 7-9, 2016. IEEE Computer Society 2016, ISBN 978-1-4673-9913-5 [contents] - 2015
- [j22]Emanuela Marasco, Ayman Abaza, Bojan Cukic:
Why rank-level fusion? And what is the impact of image quality? Int. J. Big Data Intell. 2(2): 106-116 (2015) - [c105]Nathan D. Kalka, Nick Bartlow, Bojan Cukic
, Arun Ross:
A preliminary study on identifying sensors from iris images. CVPR Workshops 2015: 50-56 - [c104]Zahid A. Syed
, Jordan Helmick, Sean Banerjee, Bojan Cukic
:
Effect of User Posture and Device Size on the Performance of Touch-Based Authentication Systems. HASE 2015: 10-17 - [c103]Sean Banerjee, Jordan Helmick, Zahid A. Syed
, Bojan Cukic
:
Eclipse vs. Mozilla: A Comparison of Two Large-Scale Open Source Problem Report Repositories. HASE 2015: 263-270 - [c102]Sean Banerjee, Bojan Cukic
:
On the Cost of Mining Very Large Open Source Repositories. BIGDSE@ICSE 2015: 37-43 - [r4]Nick Bartlow, Nathan D. Kalka, Bojan Cukic, Arun Ross:
Iris Digital Watermarking. Encyclopedia of Biometrics 2015: 964-973 - [r3]Sean Banerjee, Zahid A. Syed
, Nick Bartlow, Bojan Cukic:
Keystroke Recognition. Encyclopedia of Biometrics 2015: 1067-1073 - [r2]Zahid A. Syed
, Sean Banerjee, Bojan Cukic:
Pointer-Based Recognition. Encyclopedia of Biometrics 2015: 1261-1268 - 2014
- [c101]Huihua Lu, Bojan Cukic
, Mark Vere Culp:
A Semi-supervised Approach to Software Defect Prediction. COMPSAC 2014: 416-425 - [c100]Stephen Mason, Ilir Gashi
, Luca Lugini, Emanuela Marasco, Bojan Cukic
:
Interoperability between Fingerprint Biometric Systems: An Empirical Study. DSN 2014: 586-597 - [c99]Zahid A. Syed
, Sean Banerjee, Bojan Cukic
:
Leveraging Variations in Event Sequences in Keystroke-Dynamics Authentication Systems. HASE 2014: 9-16 - [c98]Jesse Musgrove, Bojan Cukic
, Vittorio Cortellessa:
Proactive Model-Based Performance Analysis and Security Tradeoffs in a Complex System. HASE 2014: 211-215 - [c97]Carsten Gottschlich
, Emanuela Marasco, Allen Y. Yang, Bojan Cukic
:
Fingerprint liveness detection based on histograms of invariant gradients. IJCB 2014: 1-7 - [c96]Jesse Musgrove, Bojan Cukic
, Vittorio Cortellessa:
On the Adequacy of Performance Models in an Adaptive Border Inspection Management System. JISIC 2014: 200-207 - [c95]Huihua Lu, Ekrem Kocaguneli, Bojan Cukic
:
Defect Prediction between Software Versions with Active Learning and Dimensionality Reduction. ISSRE 2014: 312-322 - [c94]Cagatay Turkay
, Stephen Mason, Ilir Gashi
, Bojan Cukic
:
Supporting Decision-Making for Biometric System Deployment through Visual Analysis. ISSRE Workshops 2014: 347-352 - [c93]Luca Lugini, Emanuela Marasco, Bojan Cukic
, Jeremy M. Dawson:
Removing gender signature from fingerprints. MIPRO 2014: 1283-1287 - 2013
- [j21]Victor L. Winter, Bojan Cukic, Taghi M. Khoshgoftaar, Kinji Mori, Raymond A. Paul, Carlos Pérez Leguízamo, Sahra Sedigh Sarvestani
, John C. Sloan, Mladen A. Vouk, I-Ling Yen:
High Consequence Systems and Semantic Computing. Int. J. Semantic Comput. 7(3): 291-324 (2013) - [j20]Yue Jiang, Bojan Cukic
, Tim Menzies, Jie Lin:
Incremental Development of Fault Prediction Models. Int. J. Softw. Eng. Knowl. Eng. 23(10): 1399-1426 (2013) - [c92]Emanuela Marasco, Luca Lugini, Bojan Cukic
, Thirimachos Bourlai
:
Minimizing the impact of low interoperability between optical fingerprints sensors. BTAS 2013: 1-8 - [c91]Luca Lugini, Emanuela Marasco, Bojan Cukic
, Ilir Gashi
:
Interoperability in fingerprint recognition: A large-scale empirical study. DSN Workshops 2013: 1-6 - [c90]Emanuela Marasco, Ayman Abaza, Luca Lugini, Bojan Cukic
:
Impact of Biometric Data Quality on Rank-Level Fusion Schemes. ICA3PP (2) 2013: 209-216 - [c89]Ekrem Kocaguneli, Bojan Cukic
, Huihua Lu:
Predicting more from less: Synergies of learning. RAISE@ICSE 2013: 42-48 - [c88]Sean Banerjee, Zahid A. Syed
, Jordan Helmick, Bojan Cukic
:
A fusion approach for classifying duplicate problem reports. ISSRE 2013: 208-217 - [c87]Ekrem Kocaguneli, Bojan Cukic, Tim Menzies, Huihua Lu:
Building a second opinion: learning cross-company data. PROMISE 2013: 12:1-12:10 - 2012
- [j19]Goran Martinovic, Josip Balen, Bojan Cukic:
Performance Evaluation of Recent Windows Operating Systems. J. Univers. Comput. Sci. 18(2): 218-263 (2012) - [c86]Mayra Sacanamboy, Bojan Cukic
, Vittorio Cortellessa:
Performance and Risk Analysis for Border Management Applications: A Model-Driven Approach and a Perspective View. EISIC 2012: 350-352 - [c85]Sean Banerjee, Bojan Cukic
, Donald A. Adjeroh:
Automated Duplicate Bug Report Classification Using Subsequence Matching. HASE 2012: 74-81 - [c84]Thirimachos Bourlai
, Bojan Cukic
:
Multi-spectral face recognition: Identification of people in difficult environments. ISI 2012: 196-201 - [c83]Sean Banerjee, Jesse Musgrove, Bojan Cukic
:
Handling Language Variations in Open Source Bug Reporting Systems. ISSRE Workshops 2012: 325-330 - [c82]Huihua Lu, Bojan Cukic
, Mark Vere Culp:
Software defect prediction using semi-supervised learning with dimension reduction. ASE 2012: 314-317 - [c81]Huihua Lu, Bojan Cukic
:
An adaptive approach with active learning in software fault prediction. PROMISE 2012: 79-88 - [e2]Daniel Zeng, Lina Zhou, Bojan Cukic, G. Alan Wang, Christopher C. Yang:
2012 IEEE International Conference on Intelligence and Security Informatics, ISI 2012, Washington, DC, USA, June 11-14, 2012. IEEE 2012, ISBN 978-1-4673-2105-1 [contents] - 2011
- [c80]Zahid A. Syed
, Sean Banerjee, Qi Cheng, Bojan Cukic
:
Effects of User Habituation in Keystroke Dynamics on Password Security Policy. HASE 2011: 352-359 - [c79]Nathan D. Kalka, Thirimachos Bourlai
, Bojan Cukic
, Lawrence A. Hornak:
Cross-spectral face recognition in heterogeneous environments: A case study on matching visible to short-wave infrared imagery. IJCB 2011: 1-8 - [c78]Sean Banerjee, Hema Srikanth, Bojan Cukic
:
Challenges for Creating Highly Dependable Service Based Systems. ISORC Workshops 2011: 264-273 - [c77]Tomi Prifti, Sean Banerjee, Bojan Cukic
:
Detecting bug duplicate reports through local references. PROMISE 2011: 8 - [c76]Huihua Lu, Bojan Cukic
, Mark Vere Culp:
An iterative semi-supervised approach to software fault prediction. PROMISE 2011: 15 - [e1]Tadashi Dohi, Bojan Cukic:
IEEE 22nd International Symposium on Software Reliability Engineering, ISSRE 2011, Hiroshima, Japan, November 29 - December 2, 2011. IEEE Computer Society 2011, ISBN 978-1-4577-2060-4 [contents] - 2010
- [j18]Tim Menzies, Zach Milton, Burak Turhan
, Bojan Cukic
, Yue Jiang, Ayse Basar Bener:
Defect prediction from static code features: current results, limitations, new approaches. Autom. Softw. Eng. 17(4): 375-407 (2010) - [j17]Nathan D. Kalka, Jinyu Zuo, Natalia A. Schmid
, Bojan Cukic
:
Estimating and Fusing Quality Factors for Iris Biometric Images. IEEE Trans. Syst. Man Cybern. Part A 40(3): 509-524 (2010) - [c75]Rogério de Lemos
, Holger Giese, Hausi A. Müller
, Mary Shaw, Jesper Andersson, Marin Litoiu, Bradley R. Schmerl, Gabriel Tamura
, Norha M. Villegas
, Thomas Vogel
, Danny Weyns
, Luciano Baresi
, Basil Becker, Nelly Bencomo, Yuriy Brun
, Bojan Cukic
, Ronald J. Desmarais, Schahram Dustdar
, Gregor Engels, Kurt Geihs
, Karl M. Göschka
, Alessandra Gorla, Vincenzo Grassi, Paola Inverardi, Gabor Karsai
, Jeff Kramer, Antónia Lopes
, Jeff Magee, Sam Malek, Serge Mankovski, Raffaela Mirandola
, John Mylopoulos, Oscar Nierstrasz
, Mauro Pezzè, Christian Prehofer, Wilhelm Schäfer, Richard D. Schlichting, Dennis B. Smith, João Pedro Sousa, Ladan Tahvildari, Kenny Wong, Jochen Wuttke:
Software Engineering for Self-Adaptive Systems: A Second Research Roadmap. Software Engineering for Self-Adaptive Systems 2010: 1-32 - [c74]Mayra Sacanamboy, Bojan Cukic
:
Combined performance and risk analysis for border management applications. DSN 2010: 403-412 - [c73]Thirimachos Bourlai
, Nathan D. Kalka, Arun Ross, Bojan Cukic
, Lawrence A. Hornak:
Cross-Spectral Face Verification in the Short Wave Infrared (SWIR) Band. ICPR 2010: 1343-1347 - [c72]Sampath Yerramalla, Edgar Fuller
, Bojan Cukic
:
Optimal method for growth in dynamic self organizing learning systems. IJCNN 2010: 1-7 - [c71]Sean Banerjee, Hema Srikanth, Bojan Cukic
:
Log-Based Reliability Analysis of Software as a Service (SaaS). ISSRE 2010: 239-248 - [p3]Sampath Yerramalla, Edgar Fuller
, Bojan Cukic
:
Dynamic Allocation in Neural Networks for Adaptive Controllers. Applications of Neural Networks in High Assurance Systems 2010: 111-139 - [i1]Rogério de Lemos, Holger Giese, Hausi A. Müller, Mary Shaw, Jesper Andersson, Luciano Baresi, Basil Becker, Nelly Bencomo, Yuriy Brun, Bojan Cukic, Ronald J. Desmarais, Schahram Dustdar, Gregor Engels, Kurt Geihs, Karl M. Göschka, Alessandra Gorla, Vincenzo Grassi, Paola Inverardi, Gabor Karsai, Jeff Kramer, Marin Litoiu, Antónia Lopes, Jeff Magee, Sam Malek, Serge Mankovskii, Raffaela Mirandola, John Mylopoulos, Oscar Nierstrasz, Mauro Pezzè
, Christian Prehofer, Wilhelm Schäfer, Richard D. Schlichting, Bradley R. Schmerl, Dennis B. Smith, João Pedro Sousa, Gabriel Tamura, Ladan Tahvildari, Norha M. Villegas, Thomas Vogel, Danny Weyns, Kenny Wong, Jochen Wuttke:
Software Engineering for Self-Adaptive Systems: A second Research Roadmap. Software Engineering for Self-Adaptive Systems 2010
2000 – 2009
- 2009
- [c70]Nathan D. Kalka, Nick Bartlow, Bojan Cukic
:
Decision dependability and its application to identity management. CSIIRW 2009: 68 - [c69]Nick Bartlow, Nathan D. Kalka, Bojan Cukic, Arun Ross:
Identifying sensors from fingerprint images. CVPR Workshops 2009: 78-84 - [c68]Betty H. C. Cheng
, Rogério de Lemos
, Holger Giese, Paola Inverardi, Jeff Magee, Jesper Andersson, Basil Becker, Nelly Bencomo, Yuriy Brun
, Bojan Cukic
, Giovanna Di Marzo Serugendo
, Schahram Dustdar
, Anthony Finkelstein, Cristina Gacek, Kurt Geihs
, Vincenzo Grassi, Gabor Karsai
, Holger M. Kienle, Jeff Kramer, Marin Litoiu, Sam Malek, Raffaela Mirandola, Hausi A. Müller
, Sooyong Park, Mary Shaw, Matthias Tichy, Massimo Tivoli
, Danny Weyns
, Jon Whittle:
Software Engineering for Self-Adaptive Systems: A Research Roadmap. Software Engineering for Self-Adaptive Systems 2009: 1-26 - [c67]Yue Jiang, Jie Lin, Bojan Cukic
, Tim Menzies:
Variance Analysis in Software Fault Prediction Models. ISSRE 2009: 99-108 - [c66]Gregory Gay, Tim Menzies, Bojan Cukic
, Burak Turhan
:
How to build repeatable experiments. PROMISE 2009: 15 - [c65]Yue Jiang, Bojan Cukic
:
Misclassification cost-sensitive fault prediction models. PROMISE 2009: 20 - [p2]Nick Bartlow, Bojan Cukic:
Keystroke Dynamics-Based Credential Hardening Systems. Handbook of Remote Biometrics 2009: 329-347 - [r1]Nick Bartlow, Nathan D. Kalka, Bojan Cukic, Arun Ross:
Iris Digital Watermarking. Encyclopedia of Biometrics 2009: 778-787 - 2008
- [j16]Yue Jiang, Bojan Cukic
, Yan Ma:
Techniques for evaluating fault prediction models. Empir. Softw. Eng. 13(5): 561-595 (2008) - [c64]Yue Jiang, Bojan Cukic
, Tim Menzies:
Cost Curve Evaluation of Fault Prediction Models. ISSRE 2008: 197-206 - [c63]Yue Jiang, Bojan Cukic
, Tim Menzies:
Can data transformation help in the detection of fault-prone modules? DEFECTS 2008: 16-20 - [c62]Yue Jiang, Bojan Cukic
, Tim Menzies, Nick Bartlow:
Comparing design and code metrics for software quality prediction. PROMISE@ICSE 2008: 11-18 - [c61]Tim Menzies, Burak Turhan
, Ayse Bener, Gregory Gay
, Bojan Cukic
, Yue Jiang:
Implications of ceiling effects in defect predictors. PROMISE@ICSE 2008: 47-54 - 2007
- [j15]Yan Liu, Bojan Cukic
, Srikanth Gururajan:
Validating neural network-based online adaptive systems: a case study. Softw. Qual. J. 15(3): 309-326 (2007) - [c60]Nick Bartlow, Nathan D. Kalka, Bojan Cukic
, Arun Ross:
Protecting Iris Images through Asymmetric Digital Watermarking. AutoID 2007: 192-197 - [c59]Yue Jiang, Bojan Cukic, Tim Menzies:
Fault Prediction using Early Lifecycle Data. ISSRE 2007: 237-246 - [c58]Yan Ma, Bojan Cukic
:
Adequate and Precise Evaluation of Quality Models in Software Engineering Studies. PROMISE@ICSE 2007: 1 - [p1]Yan Liu, Bojan Cukic
, Johann Schumann, Michael Jiang:
Performance Analysis of Dynamic Cell Structures. Trends in Neural Computation 2007: 367-389 - 2006
- [j14]Ing-Ray Chen, Bojan Cukic
:
High Assurance Software Systems. Comput. J. 49(5): 507-508 (2006) - [j13]Dejan Desovski, Vijai Gandikota, Yan Liu, Yue Jiang, Bojan Cukic
:
Verification and Validation of a Fingerprint Image Registration Software. EURASIP J. Adv. Signal Process. 2006 (2006) - [j12]Yan Liu, Bojan Cukic
, Edgar Fuller
, Sampath Yerramalla, Srikanth Gururajan:
Monitoring techniques for an online neuro-adaptive controller. J. Syst. Softw. 79(11): 1527-1540 (2006) - [j11]Sampath Yerramalla, Edgar Fuller
, Bojan Cukic
:
A validation approach for neural network-based online adaptive systems. Softw. Pract. Exp. 36(11-12): 1209-1225 (2006) - [j10]Natalia A. Schmid, Manasi V. Ketkar, Harshinder Singh, Bojan Cukic
:
Performance analysis of iris-based identification system at the matching score level. IEEE Trans. Inf. Forensics Secur. 1(2): 154-168 (2006) - [c57]Dejan Desovski, Bojan Cukic:
A Component-Based Approach to Verification and Validation of Formal Software Models. WADS 2006: 89-114 - [c56]Nick Bartlow, Bojan Cukic
:
Evaluating the Reliability of Credential Hardening through Keystroke Dynamics. ISSRE 2006: 117-126 - [c55]Paola Bracchi, Bojan Cukic
, Vittorio Cortellessa:
Modeling the Performance of Border Inspections with Electronic Travel Documents. ISSRE 2006: 237-246 - [c54]David Owen, Dejan Desovski, Bojan Cukic
:
Effectively Combining Software Verification Strategies: Understanding Different Assumptions. ISSRE 2006: 321-330 - [c53]David Owen, Dejan Desovski, Bojan Cukic
:
Random testing of formal software models and induced coverage. Random Testing 2006: 20-27 - [c52]Dejan Desovski, Bojan Cukic
:
A Strategy for Verification of Decomposable SCR Models. PRDC 2006: 11-18 - 2005
- [j9]Bojan Cukic
:
The Virtues of Assessing Software Reliability Early. IEEE Softw. 22(3): 50-53 (2005) - [j8]Bojan Cukic
:
Guest Editor's Introduction: The Promise of Public Software Engineering Data Repositories. IEEE Softw. 22(6): 20-22 (2005) - [c51]Yan Ma, Michael E. Schuckers, Bojan Cukic
:
Guidelines for Appropriate Use of Simulated Data for Bio-Authentication Research. AutoID 2005: 251-256 - [c50]Yan Ma, Bojan Cukic, Harshinder Singh:
A Classification Approach to Multi-biometric Score Fusion. AVBPA 2005: 484-493 - [c49]Yan Liu, Bojan Cukic
, Edgar Fuller
, Srikanth Gururajan, Sampath Yerramalla:
Novelty Detection for a Neural Network-Based Online Adaptive System. COMPSAC (2) 2005: 117-122 - [c48]Sampath Yerramalla, Bojan Cukic
, Martin Mladenovski, Edgar Fuller
:
Stability Monitoring and Analysis of Learning in an Adaptive System. DSN 2005: 70-79 - [c47]Dejan Desovski, Yan Liu, Bojan Cukic
:
Linear Randomized Voting Algorithm for Fault Tolerant Sensor Fusion and the Corresponding Reliability Model. HASE 2005: 153-162 - [c46]Natalia A. Schmid, Bojan Cukic
, Manasi V. Ketkar, Harshinder Singh:
Performance analysis of Iris Based identification system at the matching score level. ICASSP (2) 2005: 93-96 - [c45]Yan Liu, Bojan Cukic, Michael Jiang, Zhiwei Xu:
Predicting with Confidence - An Improved Dynamic Cell Structure. ICNC (1) 2005: 750-759 - [c44]Petar Popic, Dejan Desovski, Walid Abdelmoez, Bojan Cukic
:
Error Propagation in the Reliability Analysis of Component Based Systems. ISSRE 2005: 53-62 - [c43]Bojan Cukic
, Martin Mladenovski, Dejan Desovski, Sampath Yerramalla:
Real-Time Data Fusion Technique for Validation of an Autonomous System. WORDS 2005: 121-128 - 2004
- [j7]Sherif M. Yacoub, Bojan Cukic
, Hany H. Ammar:
A scenario-based reliability analysis approach for component-based software. IEEE Trans. Reliab. 53(4): 465-480 (2004) - [c42]Yan Liu, Sampath Yerramalla, Edgar Fuller, Bojan Cukic, Srikanth Gururajan:
Adaptive Control Software: Can We Guarantee Safety? COMPSAC Workshops 2004: 100-103 - [c41]Lan Guo, Supratik Mukhopadhyay, Bojan Cukic:
Does Your Result Checker Really Check? DSN 2004: 399-404 - [c40]Sampath Yerramalla, Yan Liu, Edgar Fuller
, Bojan Cukic, Srikanth Gururajan:
An Approach to V&V of Embedded Adaptive Systems. FAABS 2004: 173-188 - [c39]Ali Mili, GuangJie Jiang, Bojan Cukic, Yan Liu, Rahma Ben Ayed:
Towards the Verification and Validation of Online Learning Systems: General Framework and Applications. HICSS 2004 - [c38]Ming Li, Y. Wei, Dejan Desovski, Hamed Nejad, Sushmita Ghose, Bojan Cukic, Carol S. Smidts:
Validation of a Methodology for Assessing Software Reliability. ISSRE 2004: 66-76 - [c37]Paola Bracchi, Bojan Cukic
, Vittorio Cortellessa:
Performability Modeling of Mobile Software Systems. ISSRE 2004: 77-88 - [c36]Dejan Desovski, Vijai Gandikota, Yan Liu, Yue Jiang, Bojan Cukic:
Validation and Reliability Estimation of a Fingerprint Image Registration Software. ISSRE 2004: 306-313 - [c35]