


default search action
Science of Computer Programming, Volume 95
Volume 95, Part 1, December 2014
- Rafael Valencia-García
, Alejandro Rodríguez González
, Ricardo Colomo Palacios
:
Special issue on Systems Development by Means of Semantic Technologies. 1-2 - Paulo Maio, Nuno Silva:
An extensible argument-based ontology matching negotiation approach. 3-25 - Carla Gomes de Faria, Ivo Serra, Rosario Girardi:
A domain-independent process for automatic ontology population from text. 26-43 - Mohammad Hamdaqa
, Ladan Tahvildari, Neil LaChapelle
, Brian Campbell
:
Cultural scene detection using reverse Louvain optimization. 44-72 - Mariel Alejandra Ale, Carlos Manuel Toledo
, Omar Chiotti
, María Rosa Galli:
A conceptual model and technological support for organizational knowledge management. 73-92 - Hai H. Wang
, Danica Damljanovic, Jing Sun
:
An automated tool for semantic accessing to formal software models. 93-111 - Dario Bonino
, Giuseppe Procaccianti
:
Exploiting semantic technologies in smart environments and grids: Emerging roles and case studies. 112-134 - José Emilio Labra Gayo
, Johan Jeuring, José María Álvarez Rodríguez
:
Inductive representations of RDF graphs. 135-146
Volume 95, Part 2, December 2014
- Elvira Albert, Shin-Cheng Mu
:
Selected and extended papers from Partial Evaluation and Program Manipulation 2013. 147-148 - Emanuele De Angelis
, Fabio Fioravanti
, Alberto Pettorossi
, Maurizio Proietti
:
Program verification via iterated specialization. 149-175 - Álvaro García-Pérez
, Pablo Nogueira:
On the syntactic and functional correspondence between hybrid (or layered) normalisers and abstract machines. 176-199 - Jeroen Weijers
, Jurriaan Hage
, Stefan Holdermans:
Security type error diagnosis for higher-order, polymorphic languages. 200-218 - Marco Servetto
, Elena Zucca:
A meta-circular language for active libraries. 219-253 - Axel Simon:
Deriving a complete type inference for Hindley-Milner and vector sizes using expansion. 254-271
Volume 95, Part 3, December 2014
Selected papers from the Software Verification and Testing (SVT 2013) track at the 28th ACM Symposium
- Mohammad Reza Mousavi
, Jun Pang:
Special section on Software Verification and Testing. 273-274 - Gustavo Carvalho, Diogo Falcão, Flávia de Almeida Barros, Augusto Sampaio, Alexandre Mota
, Leonardo Motta, Mark R. Blackburn:
NAT2TESTSCR: Test case generation from natural language requirements based on SCR specifications. 275-297 - Mike Papadakis
, Márcio Eduardo Delamaro, Yves Le Traon
:
Mitigating the effects of equivalent mutants with mutant classification strategies. 298-319 - Liqian Chen, Renjian Li, Xueguang Wu, Ji Wang:
Static analysis of lists by combining shape and numerical abstractions. 320-342
- Miguel Gómez-Zamalloa
, Germán Puebla:
Selected and extended papers from Bytecode 2013. 343 - Aibek Sarimbekov, Yudi Zheng, Danilo Ansaloni, Lubomír Bulej
, Lukás Marek, Walter Binder
, Petr Tuma
, Zhengwei Qi:
Dynamic program analysis - Reconciling developer productivity and tool performance. 344-358 - Enrico Scapin
, Fausto Spoto
:
Field-sensitive unreachability and non-cyclicity analysis. 359-375 - Stefan Blom, Marieke Huisman
, Matej Mihelcic
:
Specification and verification of GPGPU programs. 376-388
Volume 95, Part 4, December 2014
- Katsuro Inoue, Rainer Koschke
, Jens Krinke:
Special issue on software clones (IWSC'12). 389 - Antonio Cuomo, Antonella Santone, Umberto Villano:
CD-Form: A clone detector based on formal methods. 390-405 - Umut Tekin
, Feza Buzluca
:
A graph mining approach for detecting identical design structures in object-oriented design models. 406-425 - Iman Keivanloo, Chanchal Kumar Roy, Juergen Rilling:
SeByte: Scalable clone and similarity search for bytecode. 426-444 - Manishankar Mondal, Chanchal Kumar Roy, Kevin A. Schneider:
An insight into the dispersion of changes in cloned and non-cloned code: A genealogy based empirical study. 445-468

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.