Efficiently interpreting traces of low level events in business process logs Fulltext Access 54 Pages 2018
Capturing correlation changes by applying kernel change point detection on the running correlations Fulltext Access 54 Pages 2018
How information technology influences opportunity exploration and exploitation firm's capabilities Fulltext Access 54 Pages 2018
A survey on technical threat intelligence in the age of sophisticated cyber attacks Fulltext Access 55 Pages 2018
Auto-detection of sophisticated malware using lazy-binding control flow graph and deep learning Fulltext Access 55 Pages 2018
Information structures and uncertainty measures in a fully fuzzy information system Fulltext Access 55 Pages 2018
A case-based reasoning approach to reuse quality-driven designs in service-oriented architectures Fulltext Access 55 Pages 2018
A cloud services recommendation system based on Fuzzy Formal Concept Analysis Fulltext Access 55 Pages 2018
Perspectives on usability guidelines for smartphone applications: An empirical investigation and systematic literature review Fulltext Access 55 Pages 2018
A remote attestation mechanism for the sensing layer nodes of the Internet of Things Fulltext Access 55 Pages 2018
Execution anomaly detection in large-scale systems through console log analysis Fulltext Access 56 Pages 2018
Using ontology-based clustering to understand the push and pull factors for British tourists visiting a Mediterranean coastal destination Fulltext Access 56 Pages 2018
Supporting semi-automatic co-evolution of architecture and fault tree models Fulltext Access 56 Pages 2018
Empirical evaluation of abstract argumentation: Supporting the need for bipolar and probabilistic approaches Fulltext Access 57 Pages 2018
Opportunistic Edge Computing: Concepts, opportunities and research challenges Fulltext Access 57 Pages 2018
The impact of tailoring criteria on agile practices adoption: A survey with novice agile practitioners in Brazil Fulltext Access 57 Pages 2018
A theory of openness for software engineering tools in software organizations Fulltext Access 58 Pages 2018
Supporting selective undo of string-wise operations for collaborative editing systems Fulltext Access 58 Pages 2018
Physical characteristics of wireless communication channels for secret key establishment: A survey of the research Fulltext Access 58 Pages 2018
Don't believe strangers: Online consumer reviews and the role of social psychological distance Fulltext Access 58 Pages 2018
A hybrid fuzzy time series forecasting model based on granular computing and bio-inspired optimization approaches Fulltext Access 59 Pages 2018
A scalable multiphysics algorithm for massively parallel direct numerical simulations of electrophoretic motion Fulltext Access 59 Pages 2018
A mesh-free finite-difference method for elastic wave propagation in the frequency-domain Fulltext Access 59 Pages 2018
On a pursuit for perfecting an undergraduate requirements engineering course Fulltext Access 59 Pages 2018
Cross lifecycle variability analysis: Utilizing requirements and testing artifacts Fulltext Access 59 Pages 2018
Canonical decomposition of belief functions based on Teugels' representation of the multivariate Bernoulli distribution Fulltext Access 59 Pages 2018
Requirements traceability technologies and technology transfer decision support: A systematic review Fulltext Access 60 Pages 2018
An exploratory case study on reusing architecture decisions in software-intensive system projects Fulltext Access 60 Pages 2018
Efficient validation of self-adaptive applications by counterexample probability maximization Fulltext Access 60 Pages 2018
Modeling regulation of vascular tone following muscle contraction: Model development, validation and global sensitivity analysis Fulltext Access 60 Pages 2018
Two sides of the same coin - how agile software development teams approach uncertainty as threats and opportunities Fulltext Access 61 Pages 2018
Architecture-based change impact analysis in cross-disciplinary automated production systems Fulltext Access 61 Pages 2018
Holistic approach to management of IT infrastructure for environmental monitoring and decision support systems with urgent computing capabilities Fulltext Access 62 Pages 2018
Assumptions and their management in software development: A systematic mapping study Fulltext Access 62 Pages 2018
Cross-domain dynamic anonymous authenticated group key management with symptom-matching for e-health social system Fulltext Access 63 Pages 2018
Combining sparse coding with structured output regression machine for single image super-resolution Fulltext Access 63 Pages 2018
Program execution analysis in Windows: A study of data sources, their format and comparison of forensic capability Fulltext Access 64 Pages 2018
Past and future of software architectures for context-aware systems: A systematic mapping study Fulltext Access 65 Pages 2018
Enabling firm performance through business intelligence and analytics: A dynamic capabilities perspective Fulltext Access 65 Pages 2018
Towards cognitive support for unit testing: A qualitative study with practitioners Fulltext Access 66 Pages 2018
A systematic literature review on the semi-automatic configuration of extended product lines Fulltext Access 66 Pages 2018
A tertiary study on technical debt: Types, management strategies, research trends, and base information for practitioners Fulltext Access 66 Pages 2018
Bug-proneness and late propagation tendency of code clones: A Comparative study on different clone types Fulltext Access 69 Pages 2018
Information technology capability and firm performance: Role of industry Fulltext Access 69 Pages 2018
Software search is not a science, even among scientists: A survey of how scientists and engineers find software Fulltext Access 70 Pages 2018
Code smells and their collocations: A large-scale experiment on open-source systems Fulltext Access 74 Pages 2018
What is needed to make cardiovascular models suitable for clinical decision support? A viewpoint paper Fulltext Access 78 Pages 2018
A review of numerical techniques approaching microstructures of crystalline rocks Fulltext Access 80 Pages 2018
Detecting semantic social engineering attacks with the weakest link: Implementation and empirical evaluation of a human-as-a-security-sensor framework Fulltext Access 81 Pages 2018
Collateral damage of Facebook third-party applications: a comprehensive study Fulltext Access 84 Pages 2018
Using text message reminders in health care services: A narrative literature review Fulltext Access 91 Pages 2018
Special issue on ``Software architectures and systems for real time data stream analytics'' Fulltext Access 4 Pages 2017
Response to van den Besselaar et al.: What happens when the Australian context is misunderstood Fulltext Access 4 Pages 2017
Some considerations about causes and effects in studies of performance-based research funding systems Fulltext Access 4 Pages 2017
What year? Difficulties in identifying the effect of policy on university output Fulltext Access 4 Pages 2017
Response to comments on: “Does your surname affect the citability of your publications?” Fulltext Access 4 Pages 2017
Why not to use the journal impact factor as a criterion for the selection of junior researchers: A comment on Bornmann and Williams (2017) Fulltext Access 4 Pages 2017
Effect of multi-vendor outsourcing on organizational learning: A social relation perspective Fulltext Access 4 Pages 2017
What can Google and Wikipedia can tell us about a disease? Big Data trends analysis in Systemic Lupus Erythematosus Fulltext Access 5 Pages 2017
Baptist Health System: Succeeding in bundled payments through behavioral principles Fulltext Access 5 Pages 2017
Challenges of smart business process management: An introduction to the special issue Fulltext Access 5 Pages 2017
The use of communicated negative sentiment and victimization for locating authors at-risk for, or having committed, insider actions Fulltext Access 5 Pages 2017
Bi-objective workflow scheduling of the energy consumption and reliability in heterogeneous computing systems Fulltext Access 5 Pages 2017