![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
Software - Practice and Experience, Volume 50
Volume 50, Number 1, January 2020
- Kenichi Kourai
, Kouta Sannomiya:
Flexible service consolidation with nested virtualization and library operating systems. 3-21
- Junaid Akram
, Majid Mumtaz
, Ping Luo:
IBFET: Index-based features extraction technique for scalable code clone detection at file level granularity. 22-46 - Fernando O. Gallego
, Rafael Corchuelo
:
Torii: An aspect-based sentiment analysis system that can mine conditions. 47-64 - Mouhamed Gaith Ayadi
, Riadh Bouslimi, Jalel Akaichi
:
Medical social network content analysis for medical image retrieval purpose. 65-86
Volume 50, Number 2, February 2020
- Wojciech Mula, Daniel Lemire
:
Base64 encoding and decoding at almost the speed of a memory copy. 89-97
- Richen Liu
, Genlin Ji, Mingjun Su:
Domain-specific visualization system based on automatic multiseed recommendations: Extracting stratigraphic structures. 98-115 - Basel Magableh
, Muder Almiani
:
A deep recurrent Q network towards self-adapting distributed microservice architecture. 116-135 - Christophe Foket
, Koen De Bosschere
, Bjorn De Sutter
:
Effective and efficient Java-type obfuscation. 136-160 - Hossein Monshizadeh Naeen
, Esmaeil Zeinali Khosraghi
, Abolfazl Toroghi Haghighat:
Adaptive Markov-based approach for dynamic virtual machine consolidation in cloud data centers with quality-of-service constraints. 161-183
Volume 50, Number 3, March 2020
Editorial
- Judith Bishop
, Kendra M. L. Cooper
, Helen Sharp
, Michael W. Whalen:
Introduction to the special issue on software engineering in practice. 187-188
- Taeyoung Kim, Suntae Kim
, Sooyong Park, YoungBeom Park:
Automatic recommendation to appropriate log levels. 189-209 - Guoping Rong
, Zefeng Jin, He Zhang, Youwen Zhang, Wenhua Ye, Dong Shao
:
DevDocOps: Enabling continuous documentation in alignment with DevOps. 210-226 - Yuan Huang
, Nan Jia, Junhuai Shu, Xinyu Hu, Xiangping Chen
, Qiang Zhou:
Does your code need comment? 227-245 - Heiko Koziolek
, Andreas Burger, Marie Platenius-Mohr, Julius Rückert, Francisco Mendoza, Roland Braun:
Automated industrial IoT-device integration using the OpenPnP reference architecture. 246-274 - Charles Weir
, Ingolf Becker
, James Noble
, Lynne Blair
, M. Angela Sasse
, Awais Rashid
:
Interventions for long-term software security: Creating a lightweight program of assurance techniques for developers. 275-298 - Gang Hu
, Min Peng, Yihan Zhang, Qianqian Xie, Wang Gao
, Mengting Yuan:
Unsupervised software repositories mining and its application to code search. 299-322
Volume 50, Number 4, April 2020
- Bruno Iran Ferreira Maciel
, Silas G. T. C. Santos
, Roberto S. M. Barros
:
MOAManager: A tool to support data stream experiments. 325-334
- Gianfranco Lamperti
:
Temporal determinization of mutating finite automata: Reconstructing or restructuring. 335-367 - Taciano Perez
, Marcelo Veiga Neves
, Diego Medaglia
, Pedro H. G. Monteiro
, César A. F. De Rose
:
Orthogonal persistence in nonvolatile memory architectures: A persistent heap design and its implementation for a Java Virtual Machine. 368-387 - Ben-Bright Benuwa
, Benjamin Ghansah
, Ernest K. Ansah:
Deep locality-sensitive discriminative dictionary learning for semantic video analysis. 388-406 - Hiba Alsghaier, Mohammed Akour
:
Software fault prediction using particle swarm algorithm with genetic algorithm and support vector machine classifier. 407-427 - Mahmood Safaei
, Abul Samad Ismail, Hassan Chizari, Maha Driss
, Wadii Boulila
, Shahla Asadi
, Mitra Safaei:
Standalone noise and anomaly detection in wireless sensor networks: A novel time-series and adaptive Bayesian-network-based approach. 428-446 - Souad Ghazouani
, Haithem Mezni
, Yahya Slimani:
Bringing semantics to multicloud service compositions. 447-469
Volume 50, Number 5, May 2020
Editorial
- Rajiv Ranjan
, Massimo Villari, Haiying Shen, Omer F. Rana
, Rajkumar Buyya
:
Software tools and techniques for fog and edge computing. 473-475
- Xianghua Xu
, LiQiming Liu, Lingjun Zhang, Ping Li, Jinjun Chen:
Abnormal visual event detection based on multi-instance learning and autoregressive integrated moving average model in edge-based Smart City surveillance. 476-488 - Yan Guo
, Shangguang Wang
, Ao Zhou, Jinliang Xu, Jie Yuan, Ching-Hsien Hsu:
User allocation-aware edge cloud placement in mobile edge computing. 489-502 - Thar Baker
, Muhammad Asim
, Áine MacDermott
, Farkhund Iqbal
, Faouzi Kamoun, Babar Shah, Omar Alfandi
, Mohammad Hammoudeh
:
A secure fog-based platform for SCADA-based IoT critical infrastructure. 503-518 - Nam Ky Giang
, Rodger Lea, Victor C. M. Leung
:
Developing applications in large scale, dynamic fog computing: A case study. 519-532 - Antonella Longo
, Marco Zappatore, Andrea De Matteis:
An osmotic computing infrastructure for urban pollution monitoring. 533-557 - Prateeksha Varshney, Yogesh Simmhan
:
Characterizing application scheduling on edge, fog, and cloud computing resources. 558-595 - Hengjin Ke
, Dan Chen
, Tejal Shah
, Xianzeng Liu, Xinhua Zhang, Lei Zhang, Xiaoli Li
:
Cloud-aided online EEG classification system for brain healthcare: A case study of depression evaluation with a lightweight CNN. 596-610 - Lanlan Rui, Yabin Qin
, Biyao Li, Ying Wang, Haoqiu Huang:
SEWMS: An edge-based smart wearable maintenance system in communication network. 611-629 - Chyi-Ren Dow
, Ngo Huu Huy
, Liang-Hsuan Lee, Po-Yu Lai, Kuan-Chieh Wang, Van-Tung Bui:
A crosswalk pedestrian recognition system by using deep learning and zebra-crossing recognition techniques. 630-644 - H. Sankar, V. Subramaniyaswamy
, Varadarajan Vijayakumar, Arun Kumar Sangaiah
, Logesh Ravi
, A. Umamakeswari
:
Intelligent sentiment analysis approach using edge computing-based deep learning technique. 645-657 - Ruoyu Wang, Daniel Sun
, Guoqiang Li
, Raymond K. Wong, Shiping Chen
:
Pipeline provenance for cloud-based big data analytics. 658-674 - Nuno Apolónia
, Felix Freitag
, Leandro Navarro, Sarunas Girdzijauskas
:
Socially aware microcloud service overlay optimization in community networks. 675-687 - Matías Hirsch
, Cristian Mateos
, Juan Manuel Rodriguez
, Alejandro Zunino
:
DewSim: A trace-driven toolkit for simulating mobile device clusters in Dew computing environments. 688-718 - Antonio Brogi
, Stefano Forti
, Carlos Guerrero
, Isaac Lera
:
How to place your apps in the fog: State of the art and open challenges. 719-740 - Enrique Chirivella-Perez
, Ricardo Marco Alaez
, Alba Hita, Ana Serrano Mamolar
, José M. Alcaraz Calero
, Qi Wang, Pedro Miguel Neves, Giacomo Bernini
, Konstantinos Koutsopoulos, Manuel Gil Pérez
, Gregorio Martínez Pérez, Maria João Barros, Anastasius Gavras
:
SELFNET 5G mobile edge computing infrastructure: Design and prototyping. 741-756 - Prabhakar Krishnan
, Subhasri Duttagupta, Krishnashree Achuthan:
SDN/NFV security framework for fog-to-things computing infrastructure. 757-800
Volume 50, Number 6, June 2020
- Blesson Varghese
, Marco A. S. Netto, Ignacio Martín Llorente, Rajkumar Buyya
:
New generation cloud computing. 803-804
- Daniel Rosendo, Demis Gomes, Guto Leoni Santos, Leylane Silva, André L. C. Moreira
, Judith Kelner, Djamel Sadok, Glauco Estácio Gonçalves, Amardeep Mehta, Mattias Wildeman, Patricia Takako Endo
:
Availability analysis of design configurations to compose virtual performance-optimized data center systems in next-generation cloud data centers. 805-826 - Bukhtawar Elahi, Asad Waqar Malik
, Anis Ur Rahman
, Muazzam Ali Khan:
Toward scalable cloud data center simulation using high-level architecture. 827-843 - Devki Nandan Jha
, Khaled Alwasel
, Areeb Alshoshan, Xianghua Huang, Ranesh Kumar Naha
, Sudheer Kumar Battula
, Saurabh Garg
, Deepak Puthal, Philip James, Albert Y. Zomaya
, Schahram Dustdar
, Rajiv Ranjan:
IoTSim-Edge: A simulation framework for modeling the behavior of Internet of Things and edge computing environments. 844-867 - Aishwarya Srivastava
, Siddhant Aggarwal, Amy W. Apon, Edward B. Duffy, Ken Kennedy, André Luckow
, Brandon Posey, Marcin Ziolkowski:
Deployment of a cloud pipeline for real-time visual inspection using fast streaming high-definition images. 868-898 - Edvard Martins de Oliveira
, Júlio Cezar Estrella, Alexandre Cláudio Botazzo Delbem, Mario Henrique de Souza Pardo, Fausto Guzzo da Costa, Alexandre Defelicibus
, Stephan Reiff-Marganiec
:
Optimizing computational resource management for the scientific gateways ecosystems based on the service-oriented paradigm. 899-924 - Amany M. Mohamed
, Hisham M. Abdelsalam:
A multicriteria optimization model for cloud service provider selection in multicloud environments. 925-947 - Jihun Kang
, JongBeom Lim, HeonChang Yu
:
Partial migration technique for GPGPU tasks to Prevent GPU Memory Starvation in RPC-based GPU Virtualization. 948-972 - Mozhdeh Farhadi
, Jean-Louis Lanet, Guillaume Pierre
, Daniele Miorandi:
A systematic approach toward security in Fog computing: Assets, vulnerabilities, possible countermeasures. 973-997 - Amartya Sen
, Sanjay Madria
:
Analysis of a cloud migration framework for offline risk assessment of cloud service providers. 998-1021
Volume 50, Number 7, July 2020
- Nour El Houda Bouzerzour
, Souad Ghazouani
, Yahya Slimani:
A survey on the service interoperability in cloud computing: Client-centric and provider-centric perspectives. 1025-1060
- Sungjae Hwang, Sungho Lee, Sukyoung Ryu
:
All about activity injection: Threats, semantics, detection, and defense. 1061-1086
- Carla Sauvanaud, Ajay Dholakia, Jordi Guitart
, Chulho Kim, Peter Mayes:
Big data deployment in containerized infrastructures through the interconnection of network namespaces. 1087-1113 - Taewoo Kim
, Alexander Behm, Michael Blow, Vinayak R. Borkar, Yingyi Bu, Michael J. Carey, Murtadha Al Hubail, Shiva Jahangiri
, Jianfeng Jia, Chen Li, Chen Luo
, Ian Maxon, Pouria Pirzadeh:
Robust and efficient memory management in Apache AsterixDB. 1114-1151
- Chengyu Hu
, Xin Shu, Xuesong Yan, Deze Zeng, Wenyin Gong, Lei Wang:
Inline wireless mobile sensors and fog nodes placement for leakage detection in water distribution systems. 1152-1167 - Andrew Robert, Apaar Gupta
, Vinayak Shenoy, Dinkar Sitaram, Subramaniam Kalambur:
Predicting Hadoop misconfigurations using machine learning. 1168-1183 - Stefano Marchini, Sebastiano Vigna
:
Compact Fenwick trees for dynamic ranking and selection. 1184-1202 - Golnaz Aghaee Ghazvini
, Mehran Mohsenzadeh
, Ramin Nasiri, Amir Masoud Rahmani
:
MMLT: A mutual multilevel trust framework based on trusted third parties in multicloud environments. 1203-1227 - Michel S. Bonfim
, Marcelo Anderson Santos, Kelvin L. Dias, Stenio Fernandes:
A real-time attack defense framework for 5G network slicing. 1228-1257 - Shouki A. Ebad
:
Healthcare software design and implementation - A project failure case. 1258-1276 - Fabian Prasser
, Johanna Eicher
, Helmut Spengler, Raffael Bild
, Klaus A. Kuhn:
Flexible data anonymization using ARX - Current status and challenges ahead. 1277-1304 - Yifan Wang
, Kiran Ijaz
, Dong Yuan
, Rafael A. Calvo
:
VR-Rides: An object-oriented application framework for immersive virtual reality exergames. 1305-1324
Volume 50, Number 8, August 2020
- Gabriel A. Wainer
, Mohammad Moallemi:
Designing real-time systems using imprecise discrete-event system specifications. 1327-1344
- Jingyao Li, Lei Liu, Peng Zhang
:
Tabular-expression-based method for constructing metamorphic relations. 1345-1380 - Ashutosh Bhatt
, Priti Dimri, Ambika Aggarwal
:
Self-adaptive brainstorming for jobshop scheduling in multicloud environment. 1381-1398 - Imanol Mugarza
, Jorge Parra
, Eduardo Jacob
:
Cetratus: A framework for zero downtime secure software updates in safety-critical systems. 1399-1424 - Dileep Kumar Pattipati
, Rupesh Nasre, Sreenivasa Kumar Puligundla:
OPAL: An extensible framework for ontology-based program analysis. 1425-1462 - Abdelhamid Khiat
, Abdelkamel Tari
, Tom Guérout
:
MFHS: A modular scheduling framework for heterogeneous system. 1463-1497 - Lamia Berkani
:
A semantic and social-based collaborative recommendation of friends in social networks. 1498-1519 - Julio Moreno
, Javier Gómez, Manuel A. Serrano
, Eduardo B. Fernández, Eduardo Fernández-Medina:
Application of security reference architecture to Big Data ecosystems in an industrial scenario. 1520-1538 - Ali Sajedi Badashian
, Eleni Stroulia:
Vocabulary and time based bug-assignment: A recommender system for open-source projects. 1539-1564 - Mohammadreza Sharbaf
, Bahman Zamani
:
Configurable three-way model merging. 1565-1599 - Arash Mazidi
, Mehdi Golsorkhtabaramiri
, Meisam Yadollahzadeh Tabari
:
Autonomic resource provisioning for multilayer cloud applications with K-nearest neighbor resource scaling and priority-based resource allocation. 1600-1625
Volume 50, Number 9, September 2020
- Daniel Ingalls, Eliot Miranda, Clément Béra
, Elisa Gonzalez Boix
:
Two decades of live coding and debugging of virtual machines through simulation. 1629-1650
- Sara Hassan
, Rami Bahsoon, Rick Kazman:
Microservice transition and its granularity problem: A systematic mapping study. 1651-1681
- Pieter De Cremer
, Nathan Desmet, Matias Madou, Bjorn De Sutter
:
Sensei: Enforcing secure coding guidelines in the integrated development environment. 1682-1718
- Ali Shakarami, Ali Shahidinejad
, Mostafa Ghobaei-Arani
:
A review on the computation offloading approaches in mobile edge computing: A game-theoretic perspective. 1719-1759 - Daniel Casini
, Alessandro Biondi
, Giorgio C. Buttazzo:
Timing isolation and improved scheduling of deep neural networks for real-time systems. 1760-1777 - Chun Liu
, Wei Yang, Zheng Li
, Yijun Yu
:
Recommending software features to designers: From the perspective of users. 1778-1792 - Matteo Bogo, Jacopo Soldani
, Davide Neri
, Antonio Brogi
:
Component-aware orchestration of cloud-based enterprise applications, from TOSCA to Docker and Kubernetes. 1793-1821 - Chung-Ming Huang
, Pin-Jui Chen:
Proximate sharing of geo data using the credit-considered mobile edge computing server switching control scheme. 1822-1841 - Richard Amankwah
, Jinfu Chen
, Patrick Kwaku Kudjo
, Dave Towey
:
An empirical comparison of commercial and open-source web vulnerability scanners. 1842-1857 - Arto Niemi
, Jukka Teuhola:
Burrows-Wheeler post-transformation with effective clustering and interpolative coding. 1858-1874
Volume 50, Number 10, October 2020
- Ming-Hsiang Huang
, Wuu Yang:
PFACC: An OpenACC-like programming model for irregular nested parallelism. 1877-1904 - Rodrigo Andrade
, Paulo Borba:
Privacy and security constraints for code contributions. 1905-1929 - Damian Andrew Tamburri
, Kelly Blincoe
, Fabio Palomba, Rick Kazman:
"The Canary in the Coal Mine..." A cautionary tale from the decline of SourceForge. 1930-1951 - Wen Cheng, Tao Guo, Lingfang Zeng
, Yang Wang
, Lars Nagel
, Tim Süß, André Brinkmann:
Improving LSM-trie performance by parallel search. 1952-1965 - Soulaimane Guedria
, Noël De Palma, Félix Renard, Nicolas Vuillerme
:
R2D2: A scalable deep learning toolkit for medical imaging segmentation. 1966-1985
- Lars Larsson
, William Tärneberg
, Cristian Klein
, Erik Elmroth
, Maria Kihl
:
Impact of etcd deployment on Kubernetes, Istio, and application performance. 1986-2007
Volume 50, Number 11, November 2020
Editorial
- Hao Wu, Rongfang Bie, Charith Pereira, Omer F. Rana
:
Special Issue: Identification, Information, and Knowledge in the Internet of Things. 2011
- Anil Singh
, Nitin Auluck
:
Load balancing aware scheduling algorithms for fog networks. 2012-2030 - Feng Zeng
, Lan Yao, Baoling Wu, Wenjia Li
, Lin Meng
:
Dynamic human contact prediction based on naive Bayes algorithm in mobile social networks. 2031-2045 - Junqi Guo
, Yazhu Dai
, Chixiang Wang, Hao Wu, Tianyou Xu, Kai Lin
:
A physiological data-driven model for learners' cognitive load detection using HRV-PRV feature fusion and optimized XGBoost classification. 2046-2064 - Cun Ji
, Xiunan Zou, Shijun Liu
, Li Pan:
ADARC: An anomaly detection algorithm based on relative outlier distance and biseries correlation. 2065-2081 - Xiao Yu, Congcong Han, Junqi Guo, Yinghe Chen:
The role of superior image composition in children's analogical reasoning. 2082-2094 - Samina Kausar, Muhammad Habib, Muhammad Yasir Shabir
, Ata Ullah
, Huahu Xu, Rashid Mehmood
, Rongfang Bie, Muhammad Shahid Iqbal
:
Secure and efficient data transfer using spreading and assimilation in MANET. 2095-2109 - Junqi Guo
, Guicheng Shen, Yichen Sun, Jin Zhao, Hao Wu
, Zhilin Zhu
:
Field of experts optimization-based noisy image retrieval. 2110-2118
Volume 50, Number 12, December 2020
- João Pedro de Carvalho Castro
, Anderson Chaves Carniel
, Cristina Dutra de Aguiar Ciferri:
Analyzing spatial analytics systems based on Hadoop and Spark: A user perspective. 2121-2144
- Rafael Capilla
, Rick Kazman, Carlos Romera, Carlos Carrillo
:
Usability implications in software architecture: The case study of a mobile app. 2145-2168 - Patricia Jiménez
, Juan C. Roldán
, Fernando O. Gallego
, Rafael Corchuelo
:
On the synthesis of metadata tags for HTML files. 2169-2192 - David Llorens
, Juan Miguel Vilar
:
Easily solving dynamic programming problems in Haskell by memoization of hylomorphisms. 2193-2211 - Ali Shahidinejad
, Mostafa Ghobaei-Arani
:
Joint computation offloading and resource provisioning for edge-cloud computing environment: A machine learning-based approach. 2212-2230 - Amit Kumar Bhardwaj
, Yuvraj Gajpal
, Chirag Surti, Sukhpal Singh Gill
:
HEART: Unrelated parallel machines problem with precedence constraints for task scheduling in cloud computing using heuristic and meta-heuristic algorithms. 2231-2251 - Tadeus Prastowo
, Luigi Palopoli
, Luca Abeni
:
Tice: A real-time language compilable using C++ compilers. 2252-2292 - I-Ching Hsu
, Yin-Hung Lin:
Integrated machine learning with semantic web for open government data recommendation based on cloud computing. 2293-2312 - Ziyi Zhou
, Huiqun Yu
, Guisheng Fan
:
Effective approaches to combining lexical and syntactical information for code summarization. 2313-2336 - John Paul Martin
, A. Kandasamy, K. Chandrasekaran:
CREW: Cost and Reliability aware Eagle-Whale optimiser for service placement in Fog. 2337-2360
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.