Found 3538 results
Model-driven planning and monitoring of long-term software product line evolution. In Proceedings of the Seventh International Workshop on Variability Modelling of Software-intensive Systems (VaMoS '13).
.
2013. Modelling Care Pathways in a Connected Health Setting. Third International Symposium on Foundations of Health Information Engineering and SystemsThird International Symposium on Foundations of Health Information Engineering and Systems.
.
2013. Monitoring the Cloud – CloudMon. the 1st IAIS Workshop on Cloud Computing Research.
.
2013. Multi-Agent Multi-Issue Negotiations with Incomplete Information: A Genetic Algorithm Based on Discrete Surrogate Approach. Congress on Evolutionary ComputationCongress on Evolutionary Computation.
.
2013. Multi-agent simulation to support water distribution network partitioning. In 27th European Simulation and Modelling Conference - ESM’2013In 27th European Simulation and Modelling Conference - ESM’2013.
.
2013. Opening the Door to Innovation in Cloud Computing. 12th Information Technology & Telecommunication Conference (IT&T)12th Information Technology & Telecommunication Conference (IT&T).
.
2013. Orchestrating stream graphs using model checking. ACM Transactions on Architecture and Code Optimization. 10(3)
.
2013. PatEvol - A Pattern Language for Evolution in Component-Based Software Architectures. First Workshop on Patterns Promotion and Anti-patterns Prevention (PPAP) 2013.
.
2013. The performance of recommender systems in online shopping: a user-centric study. Expert Systems with Applications. 40
.
2013. Proceedings of the Doctoral Consortium at the 9th International Conference on Open Source Systems, 2013. Doctoral Consortium at the 9th International Conference on Open Source Systems, 2013Doctoral Consortium at the 9th International Conference on Open Source Systems, 2013.
.
2013. A Process Assessment Model for Security Assurance of Networked Medical Devices. The 13th International SPICE Conference on Process Improvement and Capability dEterminationThe 13th International SPICE Conference on Process Improvement and Capability dEtermination.
.
2013. Profile-based, load-independent anomaly detection and analysis in performance regression testing of software systems. 17th European Conference on Software Maintenance and Reengineering (CSMR’13)17th European Conference on Software Maintenance and Reengineering (CSMR’13).
.
2013. Protecting Organizational Data Confidentiality in the Cloud using a High-Performance Anonymization Engine. the 12th Information Technology &Telecommunications (IT&T) Conferencethe 12th Information Technology &Telecommunications (IT&T) Conference.
.
2013. QoE-driven User-centric VoD Services in Urban Multi-homed P2P-based Vehicular Networks. IEEE Transactions on Vehicular Technology. 62(5)
.
2013. Quantification of information systems security with stochastic calculus. 8th Annual Cyber Security and Information Intelligence Research Workshop (CSIIRW).
.
2013. Reasoning with Contextual Requirements: Detecting Inconsistency and Conflicts. Information and Software Technology (IST) Journal.
.
2013. Report on the first SEMAT workshop on general theory of software engineering (GTSE 2012). ACM SIGSOFT Software Engineering Notes. 38(2)
.
2013. Report on the Second SEMAT Workshop on General Theory of Software Engineering (GTSE 2013). ACM Software Engineering Notes. 38(5)
.
2013. Requirements Engineering Meets Physiotherapy: An Experience with Motion-Based Games. 19th Working Conference on Requirements Engineering: Foundation for Software Quality (REFSQ 2013)19th Working Conference on Requirements Engineering: Foundation for Software Quality (REFSQ 2013).
.
2013. Requirements-Driven Adaptive Digital Forensics. 21th International Conference on Requirements Engineering (RE 2013), Posters & Demos Track.21th International Conference on Requirements Engineering (RE 2013), Posters & Demos Track..
.
2013. Residential Electrical Demand Forecasting in Very Small Scale: An Evaluation of Forecasting Methods. 2nd International Workshop on Software Engineering Challenges for the Smart Grid co-located at ICSE 2013.
.
2013. Resolving Vulnerability Identification Errors using Security Requirements on Business Process Models. Information Management and Computer Security. 21(3)
.
2013. A Resource Flow Approach to Modelling Care Pathways. Third International Symposium on Foundations of Health Information Engineering and SystemsThird International Symposium on Foundations of Health Information Engineering and Systems.
.
2013. Risk Management of Medical IT Networks: An ISO/IEC 15504 Compliant Approach to Assessment against IEC 80001-1. International Conference on Software and Systems Processes ICSSP 2013International Conference on Software and Systems Processes ICSSP 2013.
.
2013. Road-Casting: A New Distributed Dissemination Protocol for Safety Messages in Urban Areas.. IEEE Vehicular Networking Conference (VNC) 2013IEEE Vehicular Networking Conference (VNC) 2013.
.
2013.