default search action
Randy K. Smith
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j14]Songhui Yue, Xiaoyan Hong, Randy K. Smith:
CSM-H-R: A Context Modeling Framework in Supporting Reasoning Automation for Interoperable Intelligent Systems and Privacy Protection. IEEE Access 12: 115672-115686 (2024) - 2023
- [i2]Songhui Yue, Jyothsna Kondari, Aibek Musaev, Randy K. Smith, Songqing Yue:
Using Twitter Data to Determine Hurricane Category: An Experiment. CoRR abs/2308.05866 (2023) - [i1]Songhui Yue, Xiaoyan Hong, Randy K. Smith:
CSM-H-R: An Automatic Context Reasoning Framework for Interoperable Intelligent Systems and Privacy Protection. CoRR abs/2308.11066 (2023) - 2021
- [c16]Songhui Yue, Randy K. Smith:
Applying Context State Machines to Smart Elevators: Design, Implementation and Evaluation. SSCI 2021: 1-9
2010 – 2019
- 2018
- [j13]Travis Atkison, Stanislav Ponomarev, Randy K. Smith, Bernard Chen:
Feature Extraction Optimization for Network Intrusion Detection in Control System Networks. Int. J. Netw. Secur. 20(5): 853-861 (2018) - 2012
- [j12]Peng Shao, Travis Atkison, Nicholas A. Kraft, Randy K. Smith:
Combining lexical and structural information for static bug localisation. Int. J. Comput. Appl. Technol. 44(1): 61-71 (2012) - [e1]Randy K. Smith, Susan V. Vrbsky:
Proceedings of the 50th Annual Southeast Regional Conference, 2012, Tuscaloosa, AL, USA, March 29-31, 2012. ACM 2012, ISBN 978-1-4503-1203-5 [contents] - 2011
- [j11]David P. Hale, Joanne E. Hale, Randy K. Smith:
Evaluation of work product defects during corrective & enhancive software evolution: a field study comparison. Data Base 42(1): 59-73 (2011) - [j10]Jan Durand, Juan Flores, Travis Atkison, Nicholas A. Kraft, Randy K. Smith:
Using Executable Slicing to Improve Rogue Software Detection Algorithms. Int. J. Secur. Softw. Eng. 2(2): 53-64 (2011) - [j9]Dana Steil, Jeremy R. Pate, Nicholas A. Kraft, Randy K. Smith, Brandon Dixon, Li Ding, Allen S. Parrish:
Patrol Routing Expression, Execution, Evaluation, and Engagement. IEEE Trans. Intell. Transp. Syst. 12(1): 58-72 (2011)
2000 – 2009
- 2009
- [j8]Randy K. Smith:
Introduction: Special Issue on the Application of Computer Technology to Public Safety and Law Enforcement. Int. J. Comput. Their Appl. 16(2): 80 (2009) - [j7]Graylin Jay, Joanne E. Hale, Randy K. Smith, David P. Hale, Nicholas A. Kraft, Charles Ward:
Cyclomatic Complexity and Lines of Code: Empirical Evidence of a Stable Linear Relationship. J. Softw. Eng. Appl. 2(3): 137-143 (2009) - [c15]Peng Shao, Randy K. Smith:
Feature location by IR modules and call graph. ACM Southeast Regional Conference 2009 - [c14]Li Ding, Dana Steil, Matthew Hudnall, Brandon Dixon, Randy K. Smith, David Brown, Allen S. Parrish:
PerpSearch: An integrated crime detection system. ISI 2009: 161-163 - [c13]Yan Liang, Nicholas A. Kraft, Randy K. Smith:
Automatic Class Matching to Compare Extracted Class Diagrams: Approach and Case Study. SEKE 2009: 268-273 - 2008
- [c12]Nicholas A. Kraft, Brandon W. Bonds, Randy K. Smith:
Cross-language Clone Detection. SEKE 2008: 54-59 - 2007
- [j6]Jim Azar, Randy K. Smith, David Cordes:
Value-Oriented Requirements Prioritization in a Small Development Organization. IEEE Softw. 24(1): 32-37 (2007) - [c11]Maury Mitchell, Matthew Hudnall, David Brown, David Cordes, Randy K. Smith, Allen S. Parrish:
A Host Architecture for Automobile License Plate Recognition. ISI 2007: 87-94 - 2006
- [c10]Niveditha Thagarapu, Tilak Mulukalapally, Sachin Lad, Randy K. Smith:
NASA's standards advisor pilot: search solutions for an intranet. ACM Southeast Regional Conference 2006: 446-451 - [c9]Joanne E. Hale, David P. Hale, Randy K. Smith:
The Cohesion-Based Requirements Set Model for Improved Information System Maintainability. AMCIS 2006: 464 - 2005
- [j5]Huanjing Wang, Allen S. Parrish, Randy K. Smith, Susan V. Vrbsky:
Improved variable and value ranking techniques for mining categorical traffic accident data. Expert Syst. Appl. 29(4): 795-806 (2005) - [j4]Michael Davis, Randy K. Smith, Brandon Dixon, Allen S. Parrish, David Cordes:
Utilizing commodity hardware and software to distribute a real-world application: maximizing reuse while improving performance. Softw. Pract. Exp. 35(7): 621-641 (2005) - [c8]Swapna Gupta, J. Scott Hawker, Randy K. Smith:
Acquiring and delivering lessons learned for NASA scientists and engineers: a dynamic approach. ACM Southeast Regional Conference (2) 2005: 370-375 - [c7]Susan V. Vrbsky, Randy K. Smith, Allen S. Parrish, Huanjing Wang:
Strategies to Improve Variable Selection Performance. IKE 2005: 209-214 - [c6]Huanjing Wang, Allen S. Parrish, Randy K. Smith, Susan V. Vrbsky:
Variable selection and ranking for analyzing automobile traffic accident data. SAC 2005: 32-37 - 2004
- [j3]Allen S. Parrish, Randy K. Smith, David P. Hale, Joanne E. Hale:
A Field Study of Developer Pairs: Productivity Impacts and Implications. IEEE Softw. 21(5): 76-79 (2004) - [c5]Ning Hu, Randy K. Smith, Phillip G. Bradford:
Security for fixed sensor networks. ACM Southeast Regional Conference 2004: 212-213 - 2003
- [c4]Phillip G. Bradford, Olga V. Gavrylyako, Randy K. Smith:
Perfect Secrecy in Wireless Networks. ICPP Workshops 2003: 409-416 - 2002
- [c3]Joseph D. Sloan, Andy Lopez, Randy K. Smith, Dick Mowe:
Networking CS: beyond the first course. SIGCSE 2002: 281-282 - 2001
- [j2]Randy K. Smith, Joanne E. Hale, Allen S. Parrish:
An Empirical Study Using Task Assignment Patterns to Improve the Accuracy of Software Effort Estimation. IEEE Trans. Software Eng. 27(3): 264-271 (2001) - 2000
- [j1]Joanne E. Hale, Allen S. Parrish, Randy K. Smith, Brandon Dixon:
Enhancing the Cocomo Estimation Models. IEEE Softw. 17(6): 45-49 (2000)
1990 – 1999
- 1998
- [c2]Randy K. Smith, Allen S. Parrish, Joanne E. Hale:
Cost estimation for component based software development. ACM Southeast Regional Conference 1998: 323-325 - 1997
- [c1]Randy K. Smith, Marcus Brown:
A study on the maintenance of literate programs. ACM Southeast Regional Conference 1997: 185-187
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-09 13:14 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint