default search action
IET Software, Volume 8
Volume 8, Number 1, February 2014
- Hui Liu, Yang Liu, Xue Guo, Yuan Gao:
Case study on software refactoring tactics. 1-11 - Tingyuan Nie, Lijian Zhou, Zhe-Ming Lu:
Power evaluation methods for data encryption algorithms. 12-18 - Patricia Miravet, Ignacio Marín, Francisco Ortin, Javier Rodríguez:
Framework for the declarative implementation of native mobile applications. 19-32 - Wenhu Tang, Long Yan, Zhen Yang, Q. Henry Wu:
Improved document ranking in ontology-based document search engine using evidential reasoning. 33-41 - Philip O'Kane, Sakir Sezer, Kieran McLaughlin, Eul Gyu Im:
Malware detection: program run length against detection rate. 42-51 - Mohammad Azzeh, Marwan Alseid:
Errata 'Value of ranked voting methods for estimation by analogy', IET Softw., 2013, 7, (4), pp 195-202. 52
Volume 8, Number 2, April 2014
- Yu Wang, Zhenxing Wang, Liancheng Zhang, Jizhong Li, Yi Guo:
Situation assessment model for inter-domain routing system. 53-61 - Jun-Hong Shen, Ye-In Chang, Fang-Ming Chang:
Dual-expansion indexing for moving objects. 62-72 - Maria N. Koukovini, Eugenia I. Papagiannakopoulou, Georgios V. Lioudakis, Nikolaos L. Dellas, Dimitra I. Kaklamani, Iakovos S. Venieris:
An ontology-based approach towards comprehensive workflow modelling. 73-85 - Samir Benbelkacem, Mahmoud Belhocine, Nadia Zenati-Henda, Abdelkader Bellarbi, Mohamed Tadjine:
Integrating human-computer interaction and business practices for mixed reality systems design: a case study. 86-101
Volume 8, Number 3, June 2014
- Manoj Kumar, Arun Sharma, Rajesh Kumar:
Fuzzy entropy-based framework for multi-faceted test case classification and selection: an empirical study. 103-112 - Raed Shatnawi:
Empirical study of fault prediction for open-source systems using the Chidamber and Kemerer metrics. 113-119 - Viktor Pavlu, Markus Schordan, Andreas Krall:
Computation of alias sets from shape graphs for comparison of shape analysis precision. 120-133 - Bo Ye, Maziar M. Nekovee, Anjum Pervez, Mohammad Ghavami:
Automatic trust calculation for service-oriented systems. 134-142
Volume 8, Number 4, August 2014
- Panos Fitsilis, Vassilis C. Gerogiannis, Leonidas G. Anthopoulos:
Role of unified modelling language in software development in Greece ?? results from an exploratory study. 143-153 - Muneera Bano, Didar Zowghi, Naveed Ikram, Mahmood Niazi:
What makes service oriented requirements engineering challenging? a qualitative study. 154-160 - Siffat Ullah Khan, Muhammad Ilyas Azeem:
Intercultural challenges in offshore software development outsourcing relationships: an exploratory study using a systematic literature review. 161-173 - Tuncay Yigit, Ali Hakan Isik, Murat Ince:
Web-based learning object selection software using analytical hierarchy process. 174-183 - Kemal Deniz Teket, Müge Sayit, Geylani Kardas:
Software agents for peer-to-peer video streaming. 184-192
Volume 8, Number 5, October 2014
- Donal Heffernan, Ciaran MacNamee, Padraig Fogarty:
Runtime verification monitoring for automotive embedded systems using the ISO 26262 functional safety standard as a guide for the definition of the monitored properties. 193-203 - Claudia P. Ayala, Xavier Franch:
Dealing with information quality in software package selection: an empirically based approach. 204-218 - Omid Bushehrian, Salman Zare:
Cost-aware execution of transactional web services using labelled transition systems. 232-243
Volume 8, Number 6, December 2014
- Srikrishnan Sundararajan, Marath Bhasi, Pramod K. Vijayaraghavan:
Case study on risk management practice in large offshore-outsourced Agile software projects. 245-257 - Malik Jahan Khan:
Applications of case-based reasoning in Software Engineering: a systematic mapping study. 258-268 - Ramin Shokripour, John Anvik, Zarinah Mohd Kasirun, Sima Zamani:
Improving automatic bug assignment using time-metadata in term-weighting. 269-278 - Faheem Ahmed, Luiz Fernando Capretz, M. A. Sandhu, Arif Raza:
Analysis of risks faced by information technology offshore outsourcing service providers. 279-284 - Jehad Al Dallal:
Effects of incorporating special methods into cohesion measurement on class instantiation reuse-proneness prediction. 285-295
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.