


default search action
IET Software, Volume 13
Volume 13, Number 1, 2019
- Guest Editorial: Adaptive and Reconfigurable Service-Oriented, Cloud and Virtualised Architectures. 1-2
- Takoua Abdellatif:
E2SM: a security tool for adaptive cloud-based service-oriented applications. 3-13 - Leah Mutanu, Gerald Kotonya
:
State of runtime adaptation in service-oriented systems: what, where, when, how and right. 14-24 - Khaled Khebbeb, Nabil Hameurlain, Faiza Belala, Hamza Sahli:
Formal modelling and verifying elasticity strategies in cloud systems. 25-35 - Imen Graja
, Slim Kallel
, Nawal Guermouche, Saoussen Cheikhrouhou, Ahmed Hadj Kacem:
Modelling and verifying time-aware processes for cyber-physical environments. 36-48 - Arthur Gatouillat, Youakim Badr
, Bertrand Massot
:
Smart and safe self-adaption of connected devices based on discrete controllers. 49-59 - Abubakar Zakari
, Sai Peck Lee, Khubaib Amjad Alam
, Rodina Ahmad:
Software fault localisation: a systematic mapping study. 60-74 - Pierre A. Akiki:
Generating contextual help for user interfaces from software requirements. 75-85 - Kokila Harshan Ramanayaka
, Xianqiao Chen, Bing Shi:
Application of extent analysis FAHP to determine the relative weights of evaluation indices for library website usability acceptance model. 86-95
Volume 13, Number 2, 2019
- Guest Editorial: Gamification and Persuasive Games for Software Engineering. 97-98
- Mirna Muñoz, Adriana Peña Pérez Negrón
, Jezreel Mejia, Gloria Piedad Gasca Hurtado
, María Clara Gómez-Alvarez
, Luis Hernández:
Applying gamification elements to build teams for software development. 99-105 - Antoni Lluís Mesquida
, Jovana Jovanovic, Milos Jovanovic, Antònia Mas
:
Agile software process improvement: a collaborative game toolbox. 106-111 - Eduardo Herranz, Javier García Guzmán, Antonio de Amescua Seco
, Xabier Larrucea
:
Gamification for software process improvement: a practical approach. 112-121 - Gloria Piedad Gasca Hurtado
, María Clara Gómez-Álvarez
, Mirna Muñoz, Jezreel Mejia:
Proposal of an assessment framework for gamified environments: a case study. 122-128 - Pedro de A. Santos Neto, Danilo Medeiros, Irvayne Matheus de Sousa Ibiapina, Otávio Cury da Costa Castro:
Case study of the introduction of game design techniques in software development. 129-143 - Alejandro Calderón, Mercedes Ruiz
, Rory V. O'Connor:
Designing game scenarios for software project management education and assessment. 144-151 - Merve Denizci Nazligul
, Murat Yilmaz
, Ulas Güleç, A. E. Yilmaz, Veysi Isler
, Rory O'Connor
, Mert Ali Gozcu, Paul M. Clarke:
Interactive three-dimensional virtual environment to reduce the public speaking anxiety levels of novice software engineers. 152-158 - Affan Yasin
, Lin Liu, Tong Li, Rubia Fatima
, Jianmin Wang
:
Improving software security awareness using a serious game. 159-169
Volume 13, Number 3, 2019
- Guest Editorial: Security and Privacy in Cloud-based Systems. 171
- Victor Muntés-Mulero
, Oscar Ripolles
, Smrati Gupta, Jacek Dominiak
, Eric Willeke, Peter Matthews, Balázs Somoskoi:
Agile risk management for multi-cloud software development. 172-181 - Charidimos Chaintoutis
, Marialena Akriotou, Charis Mesaritakis
, Ioannis Komnios, Dimitris Karamitros, Alexandros Fragkos, Dimitris Syvridis
:
Optical PUFs as physical root of trust for blockchain-driven applications. 182-186 - Katherapaka Sudhakar, M. A. H. Farquad
, G. Narshimha:
Effective convolution method for privacy preserving in cloud over big data using map reduce framework. 187-194 - Xabier Larrucea
, Izaskun Santamaría
, Ricardo Colomo Palacios:
Assessing source code vulnerabilities in a cloud-based system for health systems: OpenNCP. 195-202 - Pantelis Natsiavas
, Christine Kakalou
, Konstantinos Votis
, Dimitrios Tzovaras
, Nicos Maglaveras
, Vassilis Koutkias:
Requirements elicitation for secure and interoperable cross-border health data exchange: the KONFIDO study. 203-210 - Erkuden Rios
, Eider Iturbe
, Xabier Larrucea
, Massimiliano Rak
, Wissam Mallouli, Jacek Dominiak
, Victor Muntés, Peter Matthews, Luis Gonzalez:
Service level agreement-based GDPR compliance and security assurance in (multi)Cloud-based systems. 213-222 - Deepak Garg
, Jagpreet Sidhu, Shalli Rani
:
Emerging trends in cloud computing security: a bibliometric analyses. 223-231
Volume 13, Number 4, 2019
- Faizura Haneem, Nazri Kama
, Nur Azaliah Abu Bakar
:
Critical influential determinants of IT innovation adoption at organisational level in local government context. 233-240 - Marios Fragkoulis
, Diomidis Spinellis
, Panos Louridas:
Live interactive queries to a software application's memory profile. 241-248 - Loay Aladib
, Sai Peck Lee:
Pattern detection and design rationale traceability: an integrated approach to software design quality. 249-259 - Semih Utku
, Serra Sahin:
Process diversity in software development: an industrial study. 260-267 - Akhan Akbulut
, Sezer Toprak:
Code generator framework for smart TV platforms. 268-279 - Ramanuj Chouksey, Chandan Karfa
, Kunal Banerjee, Pankaj Kumar Kalita, Purandar Bhaduri
:
Counter-example generation procedure for path-based equivalence checkers. 280-285 - Ameen A. B. A. Homaid, Abdul Rahman A. Alsewari
, Kamal Z. Zamli, Yazan A. Alsariera
:
Adapting the elitism on greedy algorithm for variable strength combinatorial test cases generation. 286-294 - Serkan Balli
, Onur Karasoy
:
Development of content-based SMS classification application by using Word2Vec-based feature extraction. 295-304 - Indriana Hidayah
, Teguh Bharata Adji, Noor Akhmad Setiawan
:
Development and evaluation of adaptive metacognitive scaffolding for algorithm-learning system. 305-312 - Rubing Huang
, Weiwen Zong, Tsong Yueh Chen
, Dave Towey
, Yunan Zhou, Jinfu Chen:
Prioritising abstract test cases: an empirical study. 313-326
Volume 13, Number 5, 2019
- Masoumeh Taromirad
, Raman Ramsin
:
MBT in agile/lightweight processes: a process-centred review. 327-337 - Mert Ozkaya
:
Are the UML modelling tools powerful enough for practitioners? A literature review. 338-354 - Ana Vrankovic, Tihana Galinac Grbac
, Zeljka Car:
Software structure evolution and relation to subgraph defectiveness. 355-367 - Marwa Hentati, Abdelwaheb Trabelsi
, Lassaad Ben Ammar
, Adel Mahfoudhi:
Search-based software engineering for optimising usability of user interfaces within model transformations. 368-378 - Shohreh Ajoudanian
, Maryam Nooraei Abadeh:
Recommending human resources to project leaders using a collaborative filtering-based recommender system: Case study of gitHub. 379-385 - Çagdas Üsfekes, Eray Tüzün
, Murat Yilmaz
, Yagup Macit, Paul M. Clarke
:
Auction-based serious game for bug tracking. 386-392 - Shaojian Qiu
, Lu Lu, Siyu Jiang:
Joint distribution matching model for distribution-adaptation-based cross-project defect prediction. 393-402 - Rajvir Singh
, Rajesh Bhatia, Anita Singhrova
:
Demand Based Test Case Generation for Object Oriented System. 403-413 - Shahid Hussain, Jacky Keung
, Mohammad Khalid Sohail, Arif Ali Khan
, Ghufran Ahmad, Muhammad Rafiq Mufti, Hasan Ali Khattak:
Methodology for the quantification of the effect of patterns and anti-patterns association on the software quality. 414-422 - R. Anbunathan, Anirban Basu:
Combining genetic algorithm and pairwise testing for optimised test generation from UML ADs. 423-433 - Abdelhakim Hannousse
:
Dealing with crosscutting and dynamic features in component software using aspect-orientation: requirements and experiences. 434-446 - Vamshi Krishna Epuri, Sushma Sakala, Tae-Hyuk Ahn
, Myoungkyu Song:
Tool support for managing repetitive program changes in evolving software. 447-455 - Iván A. García, Carla L. Pacheco, José Antonio Calvo-Manzano
:
Introducing gamification to increase staff involvement and motivation when conducting SPI initiatives in small-sized software enterprises. 456-465 - Jitong Zhao, Yan Liu:
APIUaaS: a reference architecture for facilitating API usage from a data analytics perspective. 466-478
Volume 13, Number 6, 2019
- Ebubeogu Amarachukwu Felix
, Sai Peck Lee:
Systematic literature review of preprocessing techniques for imbalanced data. 479-496 - Esubalew Workineh Tegegne, Pertti Seppänen
, Muhammad Ovais Ahmad
:
Software development methodologies and practices in start-ups. 497-509 - Ana Carolina Oran
, Natasha M. Costa Valentim
, Gleison Santos, Tayana Conte
:
Why use case specifications are hard to use in generating prototypes? 510-517 - Radomir Prodanovic, Ivan Vulic
:
Classification as an approach to public key infrastructure requirements analysis. 518-527 - Tao Zhang
, Haoming Li, Zhou Xu, Jian Liu, Rubing Huang
, Yiran Shen:
Labelling issue reports in mobile apps. 528-542 - Asmaa H. Elsaid
, Rashed K. Salem
, Hatem M. Abdelkader:
Proposed framework for planning software releases using fuzzy rule-based system. 543-554 - J. David Patón-Romero
, Maria Teresa Baldassarre
, Moisés Rodríguez
, Mario Piattini
:
Maturity model based on CMMI for governance and management of Green IT. 555-563 - Rubia Fatima
, Affan Yasin
, Lin Liu, Jianmin Wang
, Wasif Afzal, Atif Yasin:
Improving software requirements reasoning by novices: a story-based approach. 564-574 - Kleinner Farias
, Toacy Cavalcante de Oliveira
, Lucian José Gonçales
, Vinicius Bischoff:
UML2Merge: a UML extension for model merging. 575-586 - João Choma Neto, Cristiano Herculano da Silva, Thelma Elita Colanzi, Aline Maria Malachini Miotto Amaral:
Are MAs profitable to search-based PLA design? 587-599 - Bestoun S. Ahmed
, Angelo Gargantini
, Kamal Z. Zamli, Cemal Yilmaz
, Miroslav Bures, Marek Szeles
:
Code-aware combinatorial interaction testing. 600-609 - Arpita Dutta
, Anwesha Patel
, Rajib Mall:
Investigation into the effectiveness of white-box T-way testing. 610-616

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.