Migration tracing and kinematic state concept embedded in discrete fracture network for modeling hydrocarbon migration around unlined rock caverns Fulltext Access 14 Pages 2016
Software architectural principles in contemporary mobile software: from conception to practice Fulltext Access 14 Pages 2016
Test case prioritization of build acceptance tests for an enterprise cloud application: An industrial case study Fulltext Access 14 Pages 2016
Empirical evaluation of two best practices for energy-efficient software development Fulltext Access 14 Pages 2016
Multi-criteria analysis of measures in benchmarking: Dependability benchmarking as a case study Fulltext Access 14 Pages 2016
Using multiple models to uncover blood vessel patterns in color images for forensic analysis Fulltext Access 14 Pages 2016
Utility-preserving differentially private data releases via individual ranking microaggregation Fulltext Access 14 Pages 2016
Automated modelling of spatially-distributed glacier ice thickness and volume Fulltext Access 14 Pages 2016
Costs and obstacles encountered in technical debt management - A case study Fulltext Access 14 Pages 2016
Performance comparison of several response surface surrogate models and ensemble methods for water injection optimization under uncertainty Fulltext Access 14 Pages 2016
Code search with input/output queries: Generalizing, ranking, and assessment Fulltext Access 14 Pages 2016
Links between the personalities, styles and performance in computer programming Fulltext Access 14 Pages 2016
Clustering and splitting charging algorithms for large scaled wireless rechargeable sensor networks Fulltext Access 14 Pages 2016
Predicting uncertainty in sediment transport and landscape evolution - the influence of initial surface conditions Fulltext Access 14 Pages 2016
Performance optimization for state machine replication based on application semantics: A review Fulltext Access 14 Pages 2016
A goal programming model of obtaining the priority weights from an interval preference relation Fulltext Access 14 Pages 2016
The effect of software engineers’ personality traits on team climate and performance: A Systematic Literature Review Fulltext Access 14 Pages 2016
Towards uniform management of multi-layered cloud services by applying model-driven development Fulltext Access 14 Pages 2016
Towards designing an extendable vulnerability detection method for executable codes Fulltext Access 14 Pages 2016
Towards pragmatic interoperability to support collaboration: A systematic review and mapping of the literature Fulltext Access 14 Pages 2016
The role of software updates in information systems continuance — An experimental study from a user perspective Fulltext Access 14 Pages 2016
Candidate document retrieval for cross-lingual plagiarism detection using two-level proximity information Fulltext Access 14 Pages 2016
Exploring the physicochemical profile and the binding patterns of selected novel anticancer Himalayan plant derived active compounds with macromolecular targets Fulltext Access 14 Pages 2016
Optimizing the energy consumption of message passing applications with iterations executed over grids Fulltext Access 14 Pages 2016
An intelligent pattern recognition model for supporting investment decisions in stock market Fulltext Access 14 Pages 2016
New directions in anonymization: Permutation paradigm, verifiability by subjects and intruders, transparency to users Fulltext Access 14 Pages 2016
Adaptive output-feedback neural tracking control for a class of nonstrict-feedback nonlinear systems Fulltext Access 14 Pages 2016
Novel quantum image encryption using one-dimensional quantum cellular automata Fulltext Access 14 Pages 2016
A robust deadlock prevention control for automated manufacturing systems with unreliable resources Fulltext Access 14 Pages 2016
Circular inter–intra pixels bit-level permutation and chaos-based image encryption Fulltext Access 14 Pages 2016
Analysis of Ant Colony Optimization-based routing in optical networks in the presence of byzantine failures Fulltext Access 14 Pages 2016
Adaptive fuzzy asymptotic tracking control of uncertain nonaffine nonlinear systems with non-symmetric dead-zone nonlinearities Fulltext Access 14 Pages 2016
Recursive estimation of high-order Markov chains: Approximation by finite mixtures Fulltext Access 14 Pages 2016
Stability and stabilization of switched linear time-invariant systems with saddle points and switching delays Fulltext Access 14 Pages 2016
Integrating social profile to improve the source selection and the result merging process in distributed information retrieval Fulltext Access 14 Pages 2016
Formal security analysis of near field communication using model checking Fulltext Access 14 Pages 2016
Improved triangular prism methods for fractal analysis of remotely sensed images Fulltext Access 14 Pages 2016
The future of information security incident management training: A case study of electrical power companies Fulltext Access 14 Pages 2016
The precision of the arithmetic mean, geometric mean and percentiles for citation data: An experimental simulation modelling approach Fulltext Access 14 Pages 2016
Stochastic evaluation methods of a multi-state system via a modular decomposition Fulltext Access 14 Pages 2016
Identity-based encryption with outsourced equality test in cloud computing Fulltext Access 14 Pages 2016
Integrating frequent pattern clustering and branch-and-bound approaches for data partitioning Fulltext Access 14 Pages 2016
Distributed finite-time attitude regulation for multiple rigid spacecraft via bounded control Fulltext Access 14 Pages 2016
How much do switching costs and local network effects contribute to consumer lock-in in mobile telephony? Fulltext Access 15 Pages 2016
Frequentistic approximations to Bayesian prevision of exchangeable random elements Fulltext Access 15 Pages 2016
The role of local partial independence in learning of Bayesian networks Fulltext Access 15 Pages 2016
Co-investment in ultra-fast broadband access networks: Is there a role for content providers? Fulltext Access 15 Pages 2016
Identifying emerging core technologies for the future: Case study of patents published by leading telecommunication organizations Fulltext Access 15 Pages 2016
Identification of common therapeutic targets for selected neurodegenerative disorders: An in silico approach Fulltext Access 15 Pages 2016
Decision functions for chain classifiers based on Bayesian networks for multi-label classification Fulltext Access 15 Pages 2016
Geometric views on conflicting mass functions: From distances to angles Fulltext Access 15 Pages 2016
Self-scalable services in service oriented software for cost-effective data farming Fulltext Access 15 Pages 2016
Overcoming data locality: An in-memory runtime file system with symmetrical data distribution Fulltext Access 15 Pages 2016
Information security policy development and implementation: The what, how and who Fulltext Access 15 Pages 2016
Secure, efficient and revocable multi-authority access control system in cloud storage Fulltext Access 15 Pages 2016
Thermal-throttling server: A thermal-aware real-time task scheduling framework for three-dimensional multicore chips Fulltext Access 15 Pages 2016
Scalable and efficient configuration of time-division multiplexed resources Fulltext Access 15 Pages 2016
Mobile device power models for energy efficient dynamic offloading at runtime Fulltext Access 15 Pages 2016
Reducing age stereotypes in software development: The effects of awareness- and cooperation-based diversity interventions Fulltext Access 15 Pages 2016
Adaptive management of multimodal biometrics fusion using ant colony optimization Fulltext Access 15 Pages 2016
A component recommender for bug reports using Discriminative Probability Latent Semantic Analysis Fulltext Access 15 Pages 2016
The effect of automatic concern mapping strategies on conceptual cohesion measurement Fulltext Access 15 Pages 2016
An empirical investigation into the effect of slice types on slice-based cohesion metrics Fulltext Access 15 Pages 2016
A bibliometric analysis of 20 years of research on software product lines Fulltext Access 15 Pages 2016
Model-based specification of safety compliance needs for critical systems: A holistic generic metamodel Fulltext Access 15 Pages 2016
Software metrics fluctuation: a property for assisting the metric selection process Fulltext Access 15 Pages 2016
Integrating experts' weights generated dynamically into the consensus reaching process and its applications in managing non-cooperative behaviors Fulltext Access 15 Pages 2016
Design and analysis of two highly scalable sparse grid combination algorithms Fulltext Access 15 Pages 2016