


Остановите войну!
for scientists:


default search action
James Miller 0001
Person information

- affiliation: University of Alberta, Department of Electrical and Computer Engineering, Edmonton, AB, Canada
- affiliation (PhD): University of Strathclyde, Glasgow, UK
Other persons with the same name
- James Miller — disambiguation page
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [i2]Mojtaba Yeganejou, Kimia Honari, Ryan Kluzinski, Scott Dick, Michael Lipsett, James Miller:
DCNFIS: Deep Convolutional Neuro-Fuzzy Inference System. CoRR abs/2308.06378 (2023) - 2022
- [j114]Saeedeh Sadat Sajjadi Ghaemmaghami, Seyedeh Sepideh Emam, James Miller:
Automatically inferring user behavior models in large-scale web applications. Inf. Softw. Technol. 141: 106704 (2022) - [j113]Saeedeh Sadat Sajjadi Ghaemmaghami
, James Miller
:
Integrated-Block: A New Combination Model to Improve Web Page Segmentation. J. Web Eng. 21(4): 1103-1144 (2022) - [j112]Mona Nashaat, Aindrila Ghosh, James Miller, Shaikh Quader:
Semi-Supervised Ensemble Learning for Dealing with Inaccurate and Incomplete Supervision. ACM Trans. Knowl. Discov. Data 16(3): 43:1-43:33 (2022) - [j111]Aindrila Ghosh
, Mona Nashaat
, James Miller
, Shaikh Quader:
Interpretation of Structural Preservation in Low-Dimensional Embeddings. IEEE Trans. Knowl. Data Eng. 34(5): 2227-2240 (2022) - [j110]Aindrila Ghosh
, Mona Nashaat
, James Miller
, Shaikh Quader:
VisExPreS: A Visual Interactive Toolkit for User-Driven Evaluations of Embeddings. IEEE Trans. Vis. Comput. Graph. 28(7): 2791-2807 (2022) - [c52]Kimia Honari, Xiaotian Zhou, Sara Rouhani, Scott Dick, Hao Liang, Yunwei Li, James Miller:
A Scalable Blockchain-based Smart Contract Model for Decentralized Voltage Stability Using Sharding Technique. Blockchain 2022: 124-131 - [c51]Mojtaba Yeganejou, Ryan Kluzinski, Scott Dick, James Miller:
An End-to-End Trainable Deep Convolutional Neuro-Fuzzy Classifier. FUZZ-IEEE 2022: 1-7 - [i1]Kimia Honari, Xiaotian Zhou, Sara Rouhani, Scott Dick, Hao Liang, Yunwei Li, James Miller:
A Scalable Blockchain-based Smart Contract Model for Decentralized Voltage Stability Using Sharding Technique. CoRR abs/2206.13776 (2022) - 2021
- [j109]Saeedeh Sajjadi-Ghaem-Maghami
, James Miller
:
A New Semantic Approach to Improve Webpage Segmentation. J. Web Eng. 20(4): 963-992 (2021) - [j108]Mona Nashaat
, Aindrila Ghosh
, James Miller, Shaikh Quader:
TabReformer: Unsupervised Representation Learning for Erroneous Data Detection. Trans. Data Sci. 2(3): 18:1-18:29 (2021) - [j107]Aindrila Ghosh, Mona Nashaat
, James Miller, Shaikh Quader:
Context-Based Evaluation of Dimensionality Reduction Algorithms - Experiments and Statistical Significance Analysis. ACM Trans. Knowl. Discov. Data 15(2): 24:1-24:40 (2021) - [c50]Mona Nashaat, James Miller:
Improving News Popularity Estimation via Weak Supervision and Meta-active Learning. HICSS 2021: 1-10 - 2020
- [j106]Mona Nashaat
, Aindrila Ghosh, James Miller, Shaikh Quader:
Asterisk: Generating Large Training Datasets with Automatic Active Supervision. Trans. Data Sci. 1(2): 13:1-13:25 (2020) - [j105]Mojtaba Yeganejou, Scott Dick
, James Miller:
Interpretable Deep Convolutional Fuzzy Classifier. IEEE Trans. Fuzzy Syst. 28(7): 1407-1419 (2020) - [c49]James Miller:
Towards A Lean Innovative Approach to Rethinking Employees Turnover. Surviving with Less-Knowledge, but not Knowledge-less: A Case Study. HICSS 2020: 1-10 - [c48]Mona Nashaat, Aindrila Ghosh, James Miller, Shaikh Quader:
WeSAL: Applying Active Supervision to Find High-quality Labels at Industrial Scale. HICSS 2020: 1-10
2010 – 2019
- 2019
- [j104]Aindrila Ghosh
, Mona Nashaat
, James Miller
:
The current state of software license renewals in the I.T. industry. Inf. Softw. Technol. 108: 139-152 (2019) - [j103]Mona Nashaat
, Aindrila Ghosh
, James Miller
, Shaikh Quader, Chad Marston:
M-Lean: An end-to-end development framework for predictive models in B2B scenarios. Inf. Softw. Technol. 113: 131-145 (2019) - [j102]Fadwa Estuka, James Miller:
A Pure Visual Approach for Automatically Extracting and Aligning Structured Web Data. ACM Trans. Internet Techn. 19(4): 51:1-51:26 (2019) - [j101]Osama Al-Baik
, James Miller
:
Integrative Double Kaizen Loop (IDKL): Towards a Culture of Continuous Learning and Sustainable Improvements for Software Organizations. IEEE Trans. Software Eng. 45(12): 1189-1210 (2019) - [c47]Seyedeh Sepideh Emam, James Miller:
Automated Testing of Motion-based Events in Mobile Applications. HICSS 2019: 1-10 - 2018
- [j100]Ali Shahbazi, Mahsa Panahandeh, James Miller:
Black-box tree test case generation through diversity. Autom. Softw. Eng. 25(3): 531-568 (2018) - [j99]Zhen Xu, James Miller:
Cross-Browser Differences Detection Based on an Empirical Metric for Web Page Visual Similarity. ACM Trans. Internet Techn. 18(3): 34:1-34:23 (2018) - [j98]Seyedeh Sepideh Emam
, James Miller:
Inferring Extended Probabilistic Finite-State Automaton Models from Software Executions. ACM Trans. Softw. Eng. Methodol. 27(1): 4:1-4:39 (2018) - [j97]Aindrila Ghosh
, Mona Nashaat
, James Miller, Shaikh Quader, Chad Marston:
A comprehensive review of tools for exploratory analysis of tabular industrial datasets. Vis. Informatics 2(4): 235-253 (2018) - [c46]Mona Nashaat
, Aindrila Ghosh
, James Miller, Shaikh Quader, Chad Marston, Jean-François Puget:
Hybridization of Active Learning and Data Programming for Labeling Large Industrial Datasets. IEEE BigData 2018: 46-55 - 2017
- [j96]Jason M. Morawski, Torin Stepan, Scott Dick, James Miller:
A Fuzzy Recommender System for Public Library Catalogs. Int. J. Intell. Syst. 32(10): 1062-1084 (2017) - [j95]Abhimanyu Panwar, Iosif-Viorel Onut, Michael Smith, James Miller:
On the Concept of Automatic User Behavior Profiling of Websites. Int. J. Syst. Serv. Oriented Eng. 7(1): 1-20 (2017) - [j94]James Miller, Abhimanyu Panwar, Iosif-Viorel Onut:
Towards Building a New Age Commercial Contextual Advertising System. Int. J. Syst. Serv. Oriented Eng. 7(3): 1-14 (2017) - [j93]Zhen Xu, James Miller:
Estimating similarity of rich internet pages using visual information. Int. J. Web Eng. Technol. 12(2): 97-119 (2017) - [j92]Alejandro Felix, Andrew F. Tappenden, Michael R. Smith, James Miller:
Automated policy generation for testing access control software. Inf. Secur. J. A Glob. Perspect. 26(1): 17-38 (2017) - [j91]Narges Roshanbin, James Miller:
A comparative study of the performance of local feature-based pattern recognition algorithms. Pattern Anal. Appl. 20(4): 1145-1156 (2017) - [j90]Adel Khaled, James Miller:
Using π-calculus for Formal Modeling and Verification of WS-CDL Choreographies. IEEE Trans. Serv. Comput. 10(2): 316-327 (2017) - [c45]Osama Al-Baik, James Miller, Daniel R. Greening:
Towards an Innovative Validation-Driven Approach to Lean Product Development. HICSS 2017: 1-10 - [c44]Mona Nashaat
, Karim Ali, James Miller:
Detecting Security Vulnerabilities in Object-Oriented PHP Programs. SCAM 2017: 159-164 - 2016
- [j89]Narges Roshanbin
, James Miller:
ADAMAS: Interweaving unicode and color to enhance CAPTCHA security. Future Gener. Comput. Syst. 55: 289-310 (2016) - [j88]Narges Roshanbin, James Miller:
Enhancing CAPTCHA Security Using Interactivity, Dynamism, and Mouse Movement Patterns. Int. J. Syst. Serv. Oriented Eng. 6(1): 17-36 (2016) - [j87]Teh-Chung Chen, Torin Stepan, Scott Dick, James Miller:
An investigation of implicit features in compression-based learning for comparing webpages. Pattern Anal. Appl. 19(2): 397-410 (2016) - [j86]Torin Stepan, Jason M. Morawski, Scott Dick
, James Miller:
Incorporating Spatial, Temporal, and Social Context in Recommendations for Location-Based Social Networks. IEEE Trans. Comput. Soc. Syst. 3(4): 164-175 (2016) - [j85]Ali Shahbazi, James Miller:
Black-Box String Test Case Generation through a Multi-Objective Optimization. IEEE Trans. Software Eng. 42(4): 361-378 (2016) - [j84]Zhen Xu, James Miller:
Identifying semantic blocks in Web pages using Gestalt laws of grouping. World Wide Web 19(5): 957-978 (2016) - [c43]Osama Al-Baik
, James Miller:
Kaizen Cookbook: The Success Recipe for Continuous Learning and Improvements. HICSS 2016: 5388-5397 - [c42]Alejandro Felix, Andrew F. Tappenden, James Miller:
Policy Generator (PG): A Heuristic-Based Fuzzer. HICSS 2016: 5535-5544 - 2015
- [j83]Osama Al-Baik
, James Miller:
The kanban approach, between agility and leanness: a systematic review. Empir. Softw. Eng. 20(6): 1861-1897 (2015) - [j82]Seyedeh Sepideh Emam
, James Miller:
Test Case Prioritization Using Extended Digraphs. ACM Trans. Softw. Eng. Methodol. 25(1): 6:1-6:41 (2015) - [j81]Michael R. Smith, Dongcheng Deng, Syed Islam, James Miller:
Enhancing Hardware Assisted Test Insertion Capabilities on Embedded Processors using an FPGA-based Agile Test Support Co-processor. J. Signal Process. Syst. 79(3): 285-298 (2015) - [c41]Guy-Vincent Jourdan, Gregor von Bochmann, Ettore Merlo, James Miller, Vio Onut, Lin Tan:
Workshop on the application of security and testing to rich internet applications. CASCON 2015: 320-322 - [c40]Zhen Xu, James Miller:
A New Webpage Classification Model Based on Visual Information Using Gestalt Laws of Grouping. WISE (2) 2015: 225-232 - 2014
- [j80]Osama Al-Baik
, James Miller:
Waste identification and elimination in information technology organizations. Empir. Softw. Eng. 19(6): 2019-2061 (2014) - [j79]Scott Dick, Omolbanin Yazdanbakhsh, Xiuli Tang, Toan Huynh, James Miller:
An empirical investigation of Web session workloads: Can self-similarity be explained by deterministic chaos? Inf. Process. Manag. 50(1): 41-53 (2014) - [j78]Teh-Chung Chen, Torin Stepan, Scott Dick, James Miller:
An Anti-Phishing System Employing Diffused Information. ACM Trans. Inf. Syst. Secur. 16(4): 16 (2014) - [j77]Ali Shahbazi, James Miller:
Extended Subtree: A New SimilarityFunction for Tree Structured Data. IEEE Trans. Knowl. Data Eng. 26(4): 864-877 (2014) - [j76]Andrew F. Tappenden, James Miller:
Automated cookie collection testing. ACM Trans. Softw. Eng. Methodol. 23(1): 3:1-3:40 (2014) - [c39]Abhimanyu Panwar, Iosif-Viorel Onut, James Miller:
Towards Real Time Contextual Advertising. WISE (2) 2014: 445-459 - 2013
- [j75]Ian Reay, Patricia Beatty, Scott Dick, James Miller:
Privacy policies and national culture on the internet. Inf. Syst. Frontiers 15(2): 279-292 (2013) - [j74]Ming Ying, James Miller:
Refactoring legacy AJAX applications to improve the efficiency of the data exchange component. J. Syst. Softw. 86(1): 72-88 (2013) - [j73]Ejike Ofuonye, James Miller:
Securing web-clients with instrumented code and dynamic runtime monitoring. J. Syst. Softw. 86(6): 1689-1711 (2013) - [j72]Narges Roshanbin, James Miller:
A Survey and Analysis of Current CAPTCHA Approaches. J. Web Eng. 12(1&2): 1-40 (2013) - [j71]Ali Shahbazi, Andrew F. Tappenden, James Miller:
Centroidal Voronoi Tessellations - A New Approach to Random Testing. IEEE Trans. Software Eng. 39(2): 163-183 (2013) - [c38]Joshua Charles Campbell, Chenlei Zhang, Zhen Xu, Abram Hindle, James Miller:
Deficient documentation detection: a methodology to locate deficient project documentation using topic analysis. MSR 2013: 57-60 - 2012
- [j70]Eric Luong, Toan Huynh, James Miller:
On Spam Susceptibility and Browser Updating. Int. J. Syst. Serv. Oriented Eng. 3(1): 44-57 (2012) - [j69]Toan Huynh, James Miller:
AIWAS: The Automatic Identification of Web Attacks System. Int. J. Syst. Serv. Oriented Eng. 3(1): 73-91 (2012) - [j68]Ming Ying, James Miller:
Refactoring Flash Embedding Methods. Int. J. Syst. Serv. Oriented Eng. 3(3): 26-40 (2012) - [j67]Mohamed El-Attar
, Ravi Inder Singh, James Miller:
Embracing Composite Metrics in Software Experiments. J. Softw. 7(7): 1664-1676 (2012) - [j66]Mohamed El-Attar
, Mahmoud O. Elish
, Sajjad Mahmood
, James Miller:
Is In-Depth Object-Oriented Knowledge Necessary to Develop Quality Robustness Diagrams? J. Softw. 7(11): 2538-2552 (2012) - [j65]Mohamed El-Attar
, James Miller:
Constructing high quality use case models: a systematic review of current practices. Requir. Eng. 17(3): 187-201 (2012) - 2011
- [j64]Patricia Beatty, Ian Reay, Scott Dick, James Miller:
Consumer trust in e-commerce web sites: A meta-study. ACM Comput. Surv. 43(3): 14:1-14:46 (2011) - [j63]John Charles Gyorffy, Andrew F. Tappenden, James Miller:
Token-based graphical password authentication. Int. J. Inf. Sec. 10(6): 321-336 (2011) - [j62]Ming Ying, James Miller:
ART-Improving Execution Time for Flash Applications. Int. J. Syst. Serv. Oriented Eng. 2(1): 1-20 (2011) - [j61]Ming Ying, James Miller:
FTT: A System to Refactor Traditional Forms into Ajax-Enabled Forms. Int. J. Syst. Serv. Oriented Eng. 2(4): 1-20 (2011) - [j60]Ravi I. Singh, Manasa Sumeeth, James Miller:
A user-centric evaluation of the readability of privacy policies in popular web sites. Inf. Syst. Frontiers 13(4): 501-514 (2011) - [j59]James Miller, James E. Prieger:
The Broadcasters' Transition Date Roulette: Strategic Aspects of the DTV Transition. J. Telecommun. High Technol. Law 9(2): 437-500 (2011) - [c37]Ming Ying, James Miller:
Refactoring Traditional Forms into Ajax-enabled Forms. WCRE 2011: 367-371 - [c36]Narges Roshanbin, James Miller:
Finding Homoglyphs - A Step towards Detecting Unicode-Based Visual Spoofing Attacks. WISE 2011: 1-14 - 2010
- [j58]Ravi I. Singh, James Miller:
Empirical Knowledge Discovery by Triangulation in Computer Science. Adv. Comput. 80: 163-190 (2010) - [j57]Toan Huynh, James Miller:
An empirical investigation into open source web applications' implementation vulnerabilities. Empir. Softw. Eng. 15(5): 556-576 (2010) - [j56]Adel Khaled, James Miller:
Chronological fault-based mutation processes for WS-BPEL 2.0 programs. Int. J. Web Eng. Technol. 6(2): 141-170 (2010) - [j55]James Miller, Toan Huynh:
Practical Elimination of External Interaction Vulnerabilities in Web Applications. J. Web Eng. 9(1): 1-24 (2010) - [j54]James Miller, Toan Huynh:
Investigating the Distributional Property of the Session Workload. J. Web Eng. 9(1): 25-47 (2010) - [j53]Ejike Ofuonye, Patricia Beatty, Scott Dick, James Miller:
Prevalence and classification of web page defects. Online Inf. Rev. 34(1): 160-174 (2010) - [j52]Mohamed El-Attar
, James Miller:
Developing comprehensive acceptance tests from use cases and robustness diagrams. Requir. Eng. 15(3): 285-306 (2010) - [j51]Mohamed El-Attar
, James Miller:
Improving the quality of use case models using antipatterns. Softw. Syst. Model. 9(2): 141-160 (2010) - [j50]Teh-Chung Chen, Scott Dick, James Miller:
Detecting visually similar Web pages: Application to phishing detection. ACM Trans. Internet Techn. 10(2): 5:1-5:38 (2010) - [c35]Ming Ying, James Miller:
Refactoring ActionScript for Improving Application Execution Time. WISE Workshops 2010: 268-281
2000 – 2009
- 2009
- [j49]Toan Huynh, James Miller:
Another viewpoint on "evaluating web software reliability based on workload and failure data extracted from server logs". Empir. Softw. Eng. 14(4): 371-396 (2009) - [j48]Mohamed El-Attar
, James Miller:
A subject-based empirical evaluation of SSUCD's performance in reducing inconsistencies in use case models. Empir. Softw. Eng. 14(5): 477-512 (2009) - [j47]Ian Reay, Patricia Beatty, Scott Dick, James Miller:
Do You Know Where Your Data Is? A Study of the Effect of Enforcement Strategies on Privacy Policies. Int. J. Inf. Secur. Priv. 3(4): 68-95 (2009) - [j46]Toan Huynh, James Miller:
Empirical observations on the session timeout threshold. Inf. Process. Manag. 45(5): 513-528 (2009) - [j45]Ian Reay, Scott Dick, James Miller:
An analysis of privacy signals on the World Wide Web: Past, present and future. Inf. Sci. 179(8): 1102-1115 (2009) - [j44]Jiang Yu, Andrew F. Tappenden, James Miller, Michael R. Smith:
A Scalable Testing Framework for Location-Based Services. J. Comput. Sci. Technol. 24(2): 386-404 (2009) - [j43]Andrew F. Tappenden, James Miller:
A Survey of Cookie Technology Adoption Amongst Nations. J. Web Eng. 8(3): 211-244 (2009) - [j42]Michael R. Smith, James Miller, Lily Huang, Albert Tran:
A More Agile Approach to Embedded System Development. IEEE Softw. 26(3): 50-57 (2009) - [j41]Andrew F. Tappenden, James Miller:
A Novel Evolutionary Approach for Adaptive Random Testing. IEEE Trans. Reliab. 58(4): 619-633 (2009) - [j40]Ian Reay, Scott Dick, James Miller:
A large-scale empirical study of P3P privacy policies: Stated actions vs. legal obligations. ACM Trans. Web 3(2): 6:1-6:34 (2009) - [j39]Andrew F. Tappenden, James Miller:
Cookies: A deployment study and the testing implications. ACM Trans. Web 3(3): 9:1-9:49 (2009) - [j38]Michael R. Smith, James Miller, Steven Daeninck:
A Test-oriented Embedded System Production Methodology. J. Signal Process. Syst. 56(1): 69-89 (2009) - 2008
- [j37]James Miller:
Triangulation as a basis for knowledge discovery in software engineering. Empir. Softw. Eng. 13(2): 223-228 (2008) - [j36]James Miller, L. Zhang, Ejike Ofuonye, Michael R. Smith:
The Theory and Implementation of InputValidator: A Semi-Automated Value-Level Bypass Testing Tool. Int. J. Inf. Technol. Web Eng. 3(3): 28-45 (2008) - [j35]Patricia Beatty, Scott Dick, James Miller:
Is HTML in a Race to the Bottom? A Large-Scale Survey and Analysis of Conformance to W3C Standards. IEEE Internet Comput. 12(2): 76-80 (2008) - [j34]Marek Z. Reformat
, Xinwei Chai, James Miller:
On the possibilities of (pseudo-) software cloning from external interactions. Soft Comput. 12(1): 29-49 (2008) - [j33]Ejike Ofuonye, Patricia Beatty, Ian Reay, Scott Dick, James Miller:
How Do We Build Trust into E-commerce Web Sites? IEEE Softw. 25(5): 7-9 (2008) - [j32]Mohamed El-Attar
, James Miller:
Producing robust use case diagrams via reverse engineering of use case descriptions. Softw. Syst. Model. 7(1): 67-83 (2008) - [c34]Adel Khaled, Yongsheng Ma
, James Miller:
A Service Oriented Architecture for CAX concurrent collaboration. CASE 2008: 650-655 - [c33]Andrew F. Tappenden, James Miller:
A Three-Tiered Testing Strategy for Cookies. ICST 2008: 131-140 - [c32]Ejike Ofuonye, James Miller:
Resolving JavaScript Vulnerabilities in the Browser Runtime. ISSRE 2008: 57-66 - [c31]Lily Huang, Michael R. Smith, Albert Tran, James Miller:
E-RACE, A Hardware-Assisted Approach to Lockset-Based Data Race Detection for Embedded Products. ISSRE 2008: 277-278 - [c30]Albert Tran, Michael R. Smith, James Miller:
A Hardware-Assisted Tool for Fast, Full Code Coverage Analysis. ISSRE 2008: 321-322 - [p1]Andy Brooks, Marc Roper, Murray Wood
, John W. Daly, James Miller:
Replication's Role in Software Engineering. Guide to Advanced Empirical Software Engineering 2008: 365-379 - 2007
- [j31]Mohamed El-Attar, James Miller:
A User-Centered Approach to Modeling BPEL Business Processes Using SUCD Use Cases. e Informatica Softw. Eng. J. 1(1): 59-76 (2007) - [j30]Man Xiao, Mohamed El-Attar
, Marek Z. Reformat
, James Miller:
Empirical evaluation of optimization algorithms when used in goal-oriented automated test data generation techniques. Empir. Softw. Eng. 12(2): 183-239 (2007) - [j29]Ping Li, Toan Huynh, Marek Z. Reformat
, James Miller:
A practical approach to testing GUI systems. Empir. Softw. Eng. 12(4): 331-357 (2007) - [j28]John D. Ferguson, James Miller:
Modeling Defects In E-Projects. Int. J. Inf. Technol. Web Eng. 2(3): 1-16 (2007) - [j27]Patricia Beatty, Ian Reay, Scott Dick, James Miller:
P3P Adoption on E-Commerce Web sites: A Survey and Analysis. IEEE Internet Comput. 11(2): 65-71 (2007) - [j26]Ian Reay, Patricia Beatty, Scott Dick, James Miller:
A Survey and Analysis of the P3P Protocol's Agents, Adoption, Maintenance, and Future. IEEE Trans. Dependable Secur. Comput. 4(2): 151-164 (2007) - [c29]James Miller, Michael R. Smith:
A TDD approach to introducing students to embedded programming. ITiCSE 2007: 33-37 - 2006
- [j25]Andrew F. Tappenden, Toan Huynh, James Miller, Adam Geras, Michael R. Smith:
Agile Development of Secure Web-Based Applications. Int. J. Inf. Technol. Web Eng. 1(2): 1-24 (2006) - [j24]James Miller, Marek Z. Reformat
, Howard Zhang:
Automatic test data generation using genetic algorithm and program dependence graphs. Inf. Softw. Technol. 48(7): 586-605 (2006) - [j23]