[1]
H. E, X. Jin, J. Tong, M. Song, and X. Zhu. Measure method and metrics for network characteristics in service systems. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 7719 LNCS:180–193, 2013.
[2]
P. He, B. Li, Y. Ma, and L. He. Using software dependency to bug prediction. Mathematical Problems in Engineering, 2013, 2013. (doi:10.1155/2013/869356)
[3]
Y. Li, C.-H. Tan, and X. Yang. It is all about what we have: A discriminant analysis of organizations' decision to adopt open source software. Decision Support Systems, 56(1):56–62, 2013. (doi:10.1016/j.dss.2013.05.006)
[4]
Y. Li, W. Wang, Y. Zhu, and J. Chen. What accounts for organizations' different usage of B2B e-marketplaces? In 17th Pacific Asia Conference on Information Systems, PACIS 2013. Pacific Asia Conference on Information Systems, 2013.
[5]
W. Li, Y. Meng, and L.-F. Kwok. Enhancing trust evaluation using intrusion sensitivity in collaborative intrusion detection networks: Feasibility and challenges. In 9th International Conference on Computational Intelligence and Security, CIS 2013, pages 518–522, 2013. (doi:10.1109/CIS.2013.115)
[6]
J. Gu, W. Wang, A. Huang, and H. Shan. Proactive storage at caching-enable base stations in cellular networks. In 2013 IEEE 24th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications, PIMRC 2013, pages 1543–1547, 2013. (doi:10.1109/PIMRC.2013.6666387)
[7]
Q. He, Y. Wang, Y. Linlin, and Q.K. Key. P2PRPIPS: A P2P and reverse proxy based web intrusion protection system. Research Journal of Applied Sciences, Engineering and Technology, 5(7):2439–2444, 2013.
[8]
Y. Li, H.M. Jiang, and T. Hu. A study on distributed license authorization system based on threshold secret sharing. 2013 International Conference on Vehicle and Mechanical Engineering and Information Technology, VMEIT 2013, 380-384:2749–2752, 2013. (doi:10.4028/www.scientific.net/AMM.380-384.2749)
[9]
D.-G. Xu, L.-H. Qin, J.-H. Park, and J.-L. Zhou. ODSA: Chord-based object discovery service architecture for the internet of things. Wireless Personal Communications, 73(4):1455–1476, 2013. (doi:10.1007/s11277-013-1260-3)
[10]
Z.-K. Hu, X.-L. Zheng, Y.-F. Wu, and D.-R. Chen. Product recommendation algorithm based on users' reviews mining. Zhejiang Daxue Xuebao (Gongxue Ban)/Journal of Zhejiang University (Engineering Science), 47(8):1475–1485, 2013. (doi:10.3785/j.issn.1008-973X.2013.08.023)
[11]
G. Lu and K. Lü. Logical trees: An essential method of parsing SQL statement with semantic analysis. International Journal of Advancements in Computing Technology, 5(1):270–278, 2013. (doi:10.4156/ijact.vol5.issue1.30)
[12]
L. Li and H. Leung. Predicting fault-proneness of object-oriented system developed with agile process using learned bayesian network. In 15th International Conference on Enterprise Information Systems, ICEIS 2013, volume 2, pages 5–16, 2013.
[13]
F. De Asıs López-Fuentes. An incentives model based on reputation for P2P systems. Journal of Telecommunications and Information Technology, 2013(4):92–101, 2013.
[14]
R.A. De Carvalho and B. Johansson. Key aspects of free and open source enterprise resource planning systems. Enterprise Resource Planning: Concepts, Methodologies, Tools, and Applications, 1-3:35–51, 2013. (doi:10.4018/978-1-4666-4153-2.ch004)
[15]
J. Al Dallal. Object-oriented class maintainability prediction using internal quality attributes. Information and Software Technology, 55(11):2028–2048, 2013. (doi:10.1016/j.infsof.2013.07.005)
[16]
J. Al Dallal. Incorporating transitive relations in low-level design-based class cohesion measurement. Software - Practice and Experience, 43(6):685–704, 2013.
[17]
P. De Filippi. Ubiquitous computing in the cloud: User empowerment vs. user obsequity. User Behavior in Ubiquitous Online Environments, pages 44–63, 2013. (doi:10.4018/978-1-4666-4566-0.ch003)
[18]
H. Ren, W. Mo, S. Liu, D. Li, Y. Sun, and G. Zhao. Code automation technology based COSINE software development. In ASME 2013 Power Conference, POWER 2013, volume 2. American Society of Mechanical Engineers, 2013. (doi:10.1115/POWER2013-98109)
[19]
J. Zhu, J. He, H. Zhou, and B. Zhao. EPCache: In-network video caching for LTE core networks. In 2013 International Conference on Wireless Communications and Signal Processing, WCSP 2013. IEEE Computer Society, 2013. (doi:10.1109/WCSP.2013.6677228)
[20]
Q. Yan, Y. Li, and R.H. Deng. Malware protection on RFID-enabled supply chain management systems in the EPCglobal network. In Advanced Security and Privacy for RFID Technologies, pages 153–175. IGI Global, 2013. (doi:10.4018/978-1-4666-3685-9.ch010)
[21]
Q. Yan, Y. Li, and R.H. Deng. Malware protection on RFID-enabled supply chain management systems in the EPCglobal network. Crisis Management: Concepts, Methodologies, Tools, and Applications, 2-3:1166–1188, 2013. (doi:10.4018/978-1-4666-4707-7.ch058)
[22]
H. Ren, W.-T. Mo, G. Zhao, and S. Liu. Automation algorithm of COSINE software code framework based on breadth first search. Yuanzineng Kexue Jishu/Atomic Energy Science and Technology, 47(SUPPL.):717–720, 2013. (doi:10.7538/yzk.2013.47.S1.0717)
[23]
Z. Sun, S. Pan, Y.C. Su, and P. Zhang. Headio: Zero-configured heading acquisition for indoor mobile devices through multimodal context sensing. In 2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing, UbiComp 2013, pages 33–42, 2013. (doi:10.1145/2493432.2493434)
[24]
S. Dey, Y. Liu, S. Wang, and Y. Lu. Addressing response time of cloud-based mobile applications. In 1st International Workshop on Mobile Cloud Computing and Networking, MobileCloud 2013, pages 3–10, 2013. (doi:10.1145/2492348.2492359)
[25]
H. Xia, L. Meng, and S. Lou. Research on spatial image streaming model based on bittorrent. Cehui Xuebao/Acta Geodaetica et Cartographica Sinica, 42(2):225–232, 2013.
[26]
Y. Guo, Z.-X. Zhao, and W. Wang. Complexity analysis of software based on function-call graph. In 19th International Conference on Industrial Engineering and Engineering Management, pages 269–277, 2013. (doi:10.1007/978-3-642-37270-4_26)
[27]
M. Jin, L. Huang, and P. Ren. RFID based space-time navigation scheduling for low-carbon ecotourism management system. International Journal of Applied Environmental Sciences, 8(20):2533–2546, 2013.
[28]
Y. Gil, A. Knight, K. Zhang, L. Zhang, V. Ratnakar, and R. Sethi. The democratization of semantic properties: An analysis of semantic wikis. In 2013 IEEE 7th International Conference on Semantic Computing, ICSC 2013, pages 206–211, 2013. (doi:10.1109/ICSC.2013.44)
[29]
X. Ben, S. Beijun, and Y. Weicheng. Mining developer contribution in open source software using visualization techniques. In Proceedings of the 2013 3rd International Conference on Intelligent System Design and Engineering Applications, ISDEA 2013, pages 934–937, 2013.
[30]
P. Liu, T.F. LaPorta, and K. Kotapati. Cellular network security. In Network and System Security: Second Edition, pages 319–351. Elsevier Inc., 2013. (doi:10.1016/B978-0-12-416689-9.00011-3)
[31]
P. Liu, T.F. LaPorta, and K. Kotapati. Cellular network security. In Computer and Information Security Handbook, pages 323–343. Elsevier Inc., 2013. (doi:10.1016/B978-0-12-394397-2.00017-9)
[32]
M. Kas, L. Richard Carley, and K.M. Carley. Monitoring social centrality for peer-to-peer network protection. IEEE Communications Magazine, 51(12):155–161, 2013. (doi:10.1109/MCOM.2013.6685771)
[33]
M. Liu, T. Leppanen, E. Harjula, Z. Ou, M. Ylianttila, and T. Ojala. Distributed resource discovery in the machine-to-machine applications. In 10th IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, MASS 2013, pages 411–412, 2013. (doi:10.1109/MASS.2013.46)
[34]
M. Liu, T. Leppanen, E. Harjula, Z. Ou, A. Ramalingam, M. Ylianttila, and T. Ojala. Distributed resource directory architecture in machine-to-machine communications. In 2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications, WiMob 2013, pages 319–324, 2013. (doi:10.1109/WiMOB.2013.6673379)
[35]
H.J. Lee, B.-K. Seo, and E. Seo. A git source repository analysis tool based on a novel branch-oriented approach. In 2013 4th International Conference on Information Science and Applications, ICISA 2013, 2013. (doi:10.1109/ICISA.2013.6579457)
[36]
J. Kim and S. Lee. Efficient and flexible storage visualization system based on distributed hash tables. Information (Japan), 16(1 A):383–392, 2013.
[37]
J. Gao and W. Ding. A sensory data integrating bus under the intelligent transportation environment. In 2013 10th Web Information System and Application Conference, WISA 2013, pages 328–332. IEEE Computer Society, 2013. (doi:10.1109/WISA.2013.68)
[38]
S.-J. Lin and W.-H. Chung. An efficient (n,k) information dispersal algorithm based on fermat number transforms. IEEE Transactions on Information Forensics and Security, 8(8):1371–1383, 2013. (doi:10.1109/TIFS.2013.2270892)
[39]
B. Jay and J. Vergara. Growing a language in pattern calculus. In 2013 International Symposium on Theoretical Aspects of Software Engineering, TASE 2013, pages 233–240, 2013. (doi:10.1109/TASE.2013.37)
[40]
Y. Gil and V. Ratnakar. Knowledge capture in the wild: A perspective from semantic wiki communities. In 7th International Conference on Knowledge Capture: "Knowledge Capture in the Age of Massive Web Data", K-CAP 2013, 2013. (doi:10.1145/2479832.2479858)
[41]
Z. Zhu and A. Afanasyev. Let's ChronoSync: Decentralized dataset state synchronization in named data networking. In 2013 21st IEEE International Conference on Network Protocols, ICNP 2013. IEEE Computer Society, 2013. (doi:10.1109/ICNP.2013.6733578)
[42]
L. Wang, P. Yu, Z. Wang, C. Yang, and Q. Ye. On the evolution of linux kernels: A complex network perspective. Journal of software: Evolution and Process, 25(5):439–458, 2013.
[43]
Y. Zhao, X. Pan, C.C. Li, G. Yao, J. Wu, X. Fu, D. Lai, D. Li, and Q. Zhang. Modeling and case study of the production line layout system. Open Automation and Control Systems Journal, 5(1):51–58, 2013. (doi:10.2174/1874444301305010051)
[44]
J. Fang, Y. Han, and Z. Zhao. A hierarchical service community model for cross-organizational service management. In 2013 International Conference on Service Science, ICSS 2013, pages 84–89, 2013. (doi:10.1109/ICSS.2013.57)
[45]
Y. Zhao, X.Y. Pan, and C.C. Li. Modeling and case study of the production line layout system. 9th International Symposium on Linear Drives for Industry Applications, LDIA 2013, 416-417:1373–1380, 2013. (doi:10.4028/www.scientific.net/AMM.416-417.1373)
[46]
Y. Zhao, X.Y. Pan, C.C. Li, G.H. Yao, J. Wu, X. Fu, D. Lai, D. Li, and Q.W. Zhang. Optimal production linelayout model based on integer programming. Advanced Materials Research, 690 693:2896–2900, 2013.
[47]
G. Song, B. Yang, Z. Wu, J. Chuai, and Y. Zheng. ROIN: Reputation-oriented inverted indexing for the P2P network. Journal of Supercomputing, 64(3):968–986, 2013. (doi:10.1007/s11227-013-0878-y)
[48]
C. Chen, P. Wang, Y. Liu, G. Wu, and P. Wang. Impacts of government website information on social sciences and humanities in China: A citation analysis. Government Information Quarterly, 30(4):450–463, 2013. (doi:10.1016/j.giq.2013.05.008)
[49]
J. Wang, X. Chen, and D. Yang. A study of important node rank based on KAD network. Advanced Science Letters, 19(8):2266–2270, 2013.
[50]
J. Wang, Z. Zhang, K. Xu, Y. Yin, and P. Guo. A research on security and privacy issues for patient related data in medical organization system. International Journal of Security and its Applications, 7(4):287–298, 2013.
[51]
H. Holm, M. Ekstedt, and T. Sommestad. Effort estimates on web application vulnerability discovery. In Proceedings of the Annual Hawaii International Conference on System Sciences, pages 5029–5038, 2013.
[52]
S. Nadi, C. Dietrich, R. Tartler, R.C. Holt, and D. Lohmann. Linux variability anomalies: What causes them and how do they get fixed? In 10th International Working Conference on Mining Software Repositories, MSR 2013, pages 111–120, 2013. (doi:10.1109/MSR.2013.6624017)
[53]
E. Ligu, T. Chaikalis, and A. Chatzigeorgiou. BuCo reporter: Mining software and bug repositories. In 6th Balkan Conference in Informatics, BCI-LOCAL 2013, volume 1036, pages 121–127. CEUR-WS, 2013.
[54]
S. Frey, W. Hasselbring, and B. Schnoor. Automatic conformance checking for migrating software systems to cloud infrastructures and platforms. Journal of software: Evolution and Process, 25(10):1089–1115, 2013. (doi:10.1002/smr.582)
[55]
C.-S. Wang, C.-L. Chen, and D.-J. Deng. P2P-based mobile navigation system with location service. Peer-to-Peer Networking and Applications, 8(1):22–31, 2013. (doi:10.1007/s12083-013-0204-8)
[56]
C.-Y. Lien, T.-L. Yang, C.-H. Hsiao, and T. Kao. Realizing digital signatures for medical imaging and reporting in a PACS environment. Journal of Medical Systems, 37(1), 2013. (doi:10.1007/s10916-012-9924-1)
[57]
B.S. Neto, V.T. Da Silva, M. Ribeiro, E. Costa, and C. Lucena. Using jason to develop refactoring agents. In 2nd Brazilian Conference on Intelligent Systems, BRACIS 2013, pages 44–50. IEEE Computer Society, 2013. (doi:10.1109/BRACIS.2013.16)
[58]
H.S. Moon, Y.H. Cho, and J.K. Kim. IERMS: An intelligent exhibition rule management system using PMML. In 17th Pacific Asia Conference on Information Systems, PACIS 2013. Pacific Asia Conference on Information Systems, 2013.
[59]
H.S. Moon, J.K. Kim, and Y.U. Ryu. A sequence-based filtering method for exhibition booth visit recommendations. International Journal of Information Management, 33(4):620–626, 2013.
[60]
H.K. Cora, H. Turgut Uyar, and A. Şima Etaner-Uyar. HH-DSL: A domain specific language for selection hyper-heuristics. In 15th Annual Conference on Genetic and Evolutionary Computation, GECCO 2013, pages 1317–1324, 2013. (doi:10.1145/2464576.2482711)
[61]
Z. Zhao and Y. Guo. Scale-free model in software engineering: A new design method. 2013 International Conference on Geo-Informatics in Resource Management and Sustainable Ecosystem, GRMSE 2013, 399 PART II:346–353, 2013. (doi:10.1007/978-3-642-41908-9_35)
[62]
C. Zhai and H. Liu. Factors affecting SMEs adoption decision of B2B e-marketplace: A case study in China. In 2013 10th International Conference on Service Systems and Service Management, ICSSSM 2013, pages 262–266, 2013. (doi:10.1109/ICSSSM.2013.6602643)
[63]
T.Y. Pang and S. Maslov. Universal distribution of component frequencies in biological and technological systems. Proceedings of the National Academy of Sciences of the United States of America, 110(15):6235–6239, 2013.
[64]
D. Bell and S.R. Shirzad. Social media business intelligence: A pharmaceutical domain analysis study. International Journal of Sociotechnology and Knowledge Development, 5(3):51–73, 2013. (doi:10.4018/ijskd.2013070104)
[65]
M. Geva and A. Herzberg. DOT-COM: Decentralized online trading and commerce. 8th International Workshop on Security and Trust Management, STM 2012, 7783 LNCS:177–192, 2013. (doi:10.1007/978-3-642-38004-4_12)
[66]
C. Ruiz and W. Robinson. Measuring open source quality: A literature review. In Open Source Software Dynamics, Processes, and Applications, pages 189–206. IGI Global, 2013. (doi:10.4018/978-1-4666-2937-0.ch010)
[67]
S. Haun and A. Nürnberger. Towards persistent identification of resources in personal information management. In 3rd International Workshop on Semantic Digital Archives, SDA 2013 - Co-located with 17th International Conference on Theory and Practice of Digital Libraries, TPDL 2013, volume 1091, pages 73–80. CEUR-WS, 2013.
[68]
L. Sang-Hyun, J.-G. Lee, and M. Kyung-Il. Smart home security system using multiple ANFIS. International Journal of Smart Home, 7(3):121–132, 2013.
[69]
M.E. Sosa-Rodrıguez and E. Pérez-Cortés. The evolution of cooperation in file sharing P2P systems: First steps. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 7630 LNAI(PART 2):151–162, 2013.
[70]
X. Huang, T. Lu, X. Ding, T. Liu, and N. Gu. A provenance-based solution for software selection in scientific software sharing. In 2013 IEEE 17th International Conference on Computer Supported Cooperative Work in Design, CSCWD 2013, pages 172–177, 2013. (doi:10.1109/CSCWD.2013.6580958)
[71]
B. Kitts, D. Au, and B. Burdick. A high-dimensional set top box ad targeting algorithm including experimental comparisons to traditional tv algorithms. In 13th IEEE International Conference on Data Mining, ICDM 2013, pages 370–378, 2013. (doi:10.1109/ICDM.2013.169)
[72]
X. Huang, T. Zhao, and Y. Cao. PIR: A domain specific language for multimedia retrieval. In 15th IEEE International Symposium on Multimedia, ISM 2013, pages 359–363, 2013. (doi:10.1109/ISM.2013.68)
[73]
X. Huang, X. Ding, C.P. Lee, T. Lu, and N. Gu. Meanings and boundaries of scientific software sharing. In Proceedings of the ACM Conference on Computer Supported Cooperative Work, CSCW, pages 423–434, 2013.
[74]
W. Zhang, S. Wang, Y. Yang, and Q. Wang. Heterogeneous network analysis of developer contribution in bug repositories. In 2013 International Conference on Cloud and Service Computing, CSC 2013, pages 98–105. IEEE Computer Society, 2013. (doi:10.1109/CSC.2013.23)
[75]
H. Huang, J. Xiao, Q. Yang, Q. Wang, and H. Wu. Creating process-agents incrementally by mining process asset library. Information Sciences, 233:183–199, 2013.
[76]
D. Kelly, D. Hook, and R. Sanders. A framework for testing code in computational applications. Software Design and Development: Concepts, Methodologies, Tools, and Applications, 1-4:479–505, 2013. (doi:10.4018/978-1-4666-4301-7.ch024)
[77]
J. Jiang, L. Zhang, and L. Li. Understanding project dissemination on a social coding site. In 20th Working Conference on Reverse Engineering, WCRE 2013, pages 132–141, 2013. (doi:10.1109/WCRE.2013.6671288)
[78]
G. Dévai, D. Leskó, and M. Tejfel. Embedding and parsing combined for efficient language design. In 8th International Joint conference on Software Technologies, ICSOFT 2013, pages 244–250, 2013.
[79]
F. Zhang, A. Mockus, Y. Zou, F. Khomh, and A.E. Hassan. How does context affect the distribution of software maintainability metrics? In 29th IEEE International Conference on Software Maintenance, ICSM 2013, pages 350–359, 2013. (doi:10.1109/ICSM.2013.46)
[80]
L. Demir, S. Tunali, D.T. Eliiyi, and A. Løkketangen. Two approaches for solving the buffer allocation problem in unreliable production lines. Computers and Operations Research, 40(10):2556–2563, 2013.
[81]
I. Turnu, G. Concas, M. Marchesi, and R. Tonelli. The fractal dimension of software networks as a global quality metric. Information Sciences, 245:290–303, 2013. (doi:10.1016/j.ins.2013.05.014)
[82]
T. Abdou, P. Grogono, and P. Kamthan. Managing corrective actions to closure in open source software test process. In 25th International Conference on Software Engineering and Knowledge Engineering, SEKE 2013, pages 306–311. Knowledge Systems Institute Graduate School, January 2013.
[83]
D. Bueno, K.J. Compton, K.A. Sakallah, and M. Bailey. Detecting traditional packers, decisively. 16th International Symposium on Research in Attacks, Intrusions, and Defenses, RAID 2013, 8145 LNCS:184–203, 2013. (doi:10.1007/978-3-642-41284-4_10)
[84]
B. Hoisl, S. Sobernig, and M. Strembeck. Higher-order rewriting of model-to-text templates for integrating domain-specific modeling languages. In MODELSWARD 2013 - Proceedings of the 1st International Conference on Model-Driven Engineering and Software Development, pages 49–61, 2013.
[85]
P. Tomas, M.J. Escalona, and M. Mejias. Open source tools for measuring the internal quality of Java software products. a survey. Computer Standards and Interfaces, 36(1):244–255, 2013. (doi:10.1016/j.csi.2013.08.006)
[86]
V. Urovi, A.C. Olivieri, S. Bromuri, N. Fornara, and M.I. Schumacher. A peer to peer agent coordination framework for IHE based cross-community health record exchange. In Proceedings of the ACM Symposium on Applied Computing, pages 1355–1362, 2013.
[87]
L. Demir, A. Diamantidis, D.T. Eliiyi, M.E.J. O'Kelly, C.T. Papadopoulos, A.K. Tsadiras, and S. Tunali. A comparison of three search algorithms for solving the buffer allocation problem in reliable production lines. In 7th IFAC Conference on Manufacturing Modelling, Management, and Control, MIM 2013, pages 1626–1631, 2013. (doi:10.3182/20130619-3-RU-3018.00345)
[88]
Yu Zheng, Lizhu Zhang, and Xing Xie. Mining correlation between locations using location history. United States Patent 8,612,134, December 2013. Assignee: Microsoft Corporation (Redmond, WA).
[89]
Brian M. Bowen, Pratap V. Prabhu, Vasileios P. Kemerlis, Stylianos Sidiroglou, Salvatore J. Stolfo, and Angelos D. Keromytis. Methods, systems, and media for detecting covert malware. United States Patent 8,528,091, September 2013. Assignee: The Trustees of Columbia University in the City of New York (New York, NY).
[90]
Raymond E. Ozzie, Jack E. Ozzie, Paresh S. Suthar, Raman Naravanan, and Matthew S. Augustine. Clipboard augmentation with references. United States Patent 8,453,066, May 2013. Assignee: Microsoft Corporation (Redmond, WA).
[91]
Raymond E. Ozzie, Jack E. Ozzie, George P. Moromisato, Paresh S. Suthar, Raman Narayanan, and Matthew S. Augustine. Data synchronization and sharing relationships. United States Patent 8,370,423, February 2013. Assignee: Microsoft Corporation (Redmond, WA).
[92]
M.I. Ahmed and M. Abo-Rizka. Remote internet voting: Security and performance issues. In 2013 World Congress on Internet Security, WorldCIS 2013, pages 56–64. IEEE Computer Society, 2013. (doi:10.1109/WorldCIS.2013.6751017)
[93]
N. Ratti and P. Kaur. Case study: Version control in component-based systems. In Designing, Engineering, and Analyzing Reliable and Efficient Software, pages 283–297. IGI Global, 2013. (doi:10.4018/978-1-4666-2958-5.ch016)
[94]
T. Clark and B.S. Barn. Domain engineering for software tools. In Domain Engineering: Product Lines, Languages, and Conceptual Models, pages 187–209. Springer Berlin Heidelberg, 2013. (doi:10.1007/978-3-642-36654-3_8)
[95]
D. Mancl and S. Fraser. Software tools research: SPLASH panel discussion. IEEE Software, 30(2):16–17, 2013.
[96]
I. Dávid and L. Gönczy. Ontology-supported design of domain-specific languages: A complex event processing case study. Advances and Applications in Model-Driven Engineering, pages 106–133, 2013. (doi:10.4018/978-1-4666-4494-6.ch006)
[97]
H.J. Macho and G. Robles. Preliminary lessons from a software evolution analysis of moodle. In 1st International Conference on Technological Ecosystem for Enhancing Multiculturality, TEEM 2013, pages 157–161, 2013. (doi:10.1145/2536536.2536560)
[98]
Satya V. Gupta and Prashant Shenoy. System and methods for run time detection and correction of memory corruption. United States Patent 8,510,596, August 2013. Assignee: Virsec Systems, Inc. (Acton, MA).
[99]
E. Perel and U. Yechiali. On customers acting as servers. Asia-Pacific Journal of Operational Research, 30(5), 2013. (doi:10.1142/S021759591350019X)
[100]
T. Delot and M. Thilliez. Data access and ambient computing. Computer Science and Ambient Intelligence, pages 121–134, 2013. (doi:10.1002/9781118580974.ch7)
[101]
E. Pérez-Cortés and H. Sato. On the impact of path redundancy awareness in evolutionary P2P networking. Journal of Advanced Computational Intelligence and Intelligent Informatics, 17(6):872–882, 2013.
[102]
F. Wu. Scale-free characteristic in open source software: An empirical case study. International Journal of Advancements in Computing Technology, 5(1):792–799, 2013. (doi:10.4156/ijact.vol5.issue1.88)
[103]
M. Farooq-i Azam and M.N. Ayyaz. Embedded systems security. Software Design and Development: Concepts, Methodologies, Tools, and Applications, 2-4:980–998, 2013. (doi:10.4018/978-1-4666-4301-7.ch047)
[104]
P. Sendın-Raña, F.J. González-Castaño, F. Gómez-Cuba, R. Asorey-Cacheda, and J.M. Pousada-Carballo. Improving management performance of P2PSIP for mobile sensing in wireless overlays. Sensors (Switzerland), 13(11):15364–15384, 2013. (doi:10.3390/s131115364)
[105]
R. Olanda, M. Peŕez, and J.M. Ordunã. Hybrid P2P schemes for remote terrain interactive visualization systems. Future Generation Computer Systems, 29(6):1522–1532, 2013. (doi:10.1016/j.future.2012.11.002)
[106]
D. Stingl, C. Groß, and K. Saller. Decentralized monitoring in peer-to-peer systems. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 7847:81–111, 2013. (doi:10.1007/978-3-642-38673-2-6)
[107]
B. Turhan, A. Tosun Misirli, and A. Bener. Empirical evaluation of the effects of mixed project data on learning defect predictors. Information and Software Technology, 55(6):1101–1118, 2013.
[108]
T. Lukman, G. Godena, J. Gray, M. Heričko, and S. Strmčnik. Model-driven engineering of process control software — beyond device-centric abstractions. Control Engineering Practice, 21(8):1078–1096, 2013. (doi:10.1016/j.conengprac.2013.03.013)
[109]
M. Hammad, M. Hammad, and H. Bani-Salameh. Identifying designers and their design knowledge. International Journal of Software Engineering and its Applications, 7(6):277–288, 2013. (doi:10.14257/ijseia.2013.7.6.23)
[110]
C. Mateos, M. Crasso, A. Zunino, and J.L. Ordiales Coscia. Revising WSDL documents: Why and how, part 2. IEEE Internet Computing, 17(5):46–53, 2013. (doi:10.1109/MIC.2013.4)
[111]
J. Ferrer, F. Chicano, and E. Alba. Estimating software testing complexity. Information and Software Technology, 55(12):2125–2139, 2013. (doi:10.1016/j.infsof.2013.07.007)
[112]
S. Treter, N. Perrier, J.A. Sosa, and S. Roman. Telementoring: A multi-institutional experience with the introduction of a novel surgical approach for adrenalectomy. Annals of Surgical Oncology, 20(8):2754–2758, 2013. (doi:10.1245/s10434-013-2894-9)
[113]
S. Harrer, J. Lenhard, and G. Wirtz. Open source versus proprietary software in service-orientation: The case of BPEL engines. 11th International Conference on Service-Oriented Computing, ICSOC 2013, 8274 LNCS:99–113, 2013. (doi:10.1007/978-3-642-45005-1_8)
[114]
F. Peters, T. Menzies, and A. Marcus. Better cross company defect prediction. In 10th International Working Conference on Mining Software Repositories, MSR 2013, pages 409–418, 2013. (doi:10.1109/MSR.2013.6624057)
[115]
H. Naguib, N. Narayan, B. Brügge, and D. Helal. Bug report assignee recommendation using activity profiles. In 10th International Working Conference on Mining Software Repositories, MSR 2013, pages 22–30, 2013. (doi:10.1109/MSR.2013.6623999)
[116]
W. Hummer, P. Gaubatz, M. Strembeck, U. Zdun, and S. Dustdar. Enforcement of entailment constraints in distributed service-based business processes. Information and Software Technology, 55(11):1884–1903, 2013. (doi:10.1016/j.infsof.2013.05.001)
[117]
A. Solano, C. Collazos, C. Rusu, and L. Merchán. Evaluating the usability of interactive digital television applications. In 2013 10th International Conference on Information Technology: New Generations, ITNG 2013, pages 127–132, 2013. (doi:10.1109/ITNG.2013.24)
[118]
A. Kasoju, K. Petersen, and M.V. Mäntylä. Analyzing an automotive testing process with evidence-based software engineering. Information and Software Technology, 55(7):1237–1259, 2013.
[119]
G. Epelde, X. Valencia, E. Carrasco, J. Posada, J. Abascal, U. Diaz-Orueta, I. Zinnikus, and C. Husodo-Schulz. Providing universally accessible interactive services through TV sets: Implementation and validation with elderly users. Multimedia Tools and Applications, 67(2):497–528, 2013. (doi:10.1007/s11042-011-0949-0)
[120]
G. Epelde, E. Carrasco, G. Zimmermann, J. Alexandersson, R. Neßelrath, and M. Dubielzig. Universal remote console-based next-generation accessible television. Universal Access in the Information Society, 12(1):73–87, 2013.
[121]
S. Mandal, S. Chakraborty, and S. Karmakar. Distributed deterministic 1–2 skip list for peer-to-peer system. Peer-to-Peer Networking and Applications, 8(1):63–86, 2013. (doi:10.1007/s12083-013-0222-6)
[122]
Y. Thomas, C. Tsilopoulos, G. Xylomenos, and G.C. Polyzos. Multisource and multipath file transfers through publish-subscribe internetworking. In 2013 3rd ACM SIGCOMM Workshop on Information-Centric Networking, ICN 2013, pages 43–44, 2013. (doi:10.1145/2491224.2491238)
[123]
M.A. Ismail, T. Altaf, and S.H. Mirza. MCSMC: A new parallel multi-level cache simulator for multi-core processors. In 2013 Saudi International Electronics, Communications and Photonics Conference, SIECPC 2013, 2013. (doi:10.1109/SIECPC.2013.6550746)
[124]
W.K. Dédzoé, P. Lamarre, R. Akbarinia, and P. Valduriez. As-soon-as-possible top-k query processing in P2P systems. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 7980:1–27, 2013. (doi:10.1007/978-3-642-40069-8-1)
[125]
David Broman, Jonathan Keljo, Vance Morrison, Sean Selitrennikoff, and Hsu-chieh Yuan. Detaching profilers. United States Patent 8,601,445, December 2013. Assignee: Microsoft Corporation (Redmond, WA).
[126]
Elissa E. S. Murphy, Yan V. Leshinsky, and John D. Mehr. Dynamic placement of replica data. United States Patent 8,560,639, October 2013. Assignee: Microsoft Corporation (Redmond, WA).
[127]
Salvatore J. Stolfo, Angelos D. Keromytis, and Stylianos Sidiroglou. Methods, media, and systems for detecting anomalous program executions. United States Patent 8,601,322, December 2013. Assignee: The Trustees of Columbia University in the City of New York (New York, NY).
[128]
M. Martin Bel, O. Dugeon, J. Fasson, A. Abou El Kalam, M. Maachaoui, B. Paillassa, F.J. Ramón Salguero, and W. Werapun. Service management. Digital Home Networking, pages 259–307, 2013. (doi:10.1002/9781118602829.ch8)
[129]
A.S.M.M. Rahman and A. El Saddik. Mobile pointme-based spatial haptic interaction with annotated media for learning purposes. Multimedia Systems, 19(2):131–149, 2013.
[130]
M. Umarji and S.E. Sim. Archetypal internet-scale source code searching. Finding Source Code on the Web for Remix and Reuse, pages 35–52, 2013. (doi:10.1007/978-1-4614-6596-6_3)
[131]
M.Y. Allaho and W.-C. Lee. Analyzing the social ties and structure of contributors in open source software community. In 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2013, pages 56–60. Association for Computing Machinery, 2013. (doi:10.1145/2492517.2492627)
[132]
G. Ghezzi and H.C. Gall. Replicating mining studies with SOFAS. In 10th International Working Conference on Mining Software Repositories, MSR 2013, pages 363–372, 2013. (doi:10.1109/MSR.2013.6624050)
[133]
Z. Khanam and S.A.M. Rizvi. An evaluative study of software refactoring in procedural programming. In 2013 World Congress on Engineering and Computer Science, WCECS 2013, volume 1, pages 102–107. Newswood Limited, 2013.
[134]
D. Zissis and D. Lekkas. Trust coercion in the name of usable public key infrastructure. Security and Communication Networks, 7(11):1734–1745, 2013. (doi:10.1002/sec.870)
[135]
M. Sarrab and O.M.H. Rehman. Selection criteria of open source software: First stage for adoption. International Journal of Information Processing and Management, 4(4):51–58, 2013. (doi:10.4156/ijipm.vol4.issue4.6)
[136]
J. Marlow and L. Dabbish. Activity traces and signals in software developer recruitment and hiring. In Proceedings of the ACM Conference on Computer Supported Cooperative Work, CSCW, pages 145–155, 2013.
[137]
S.D. Larson and M.E. Martone. Neurolex.org: An online framework for neuroscience knowledge. Frontiers in Neuroinformatics, 7(AUG), 2013. (doi:10.3389/fninf.2013.00018)
[138]
M. Weiher and R. Hirschfeld. Polymorphic identifiers: Uniform resource access in objective-smalltalk. In 9th Dynamic Languages Symposium, DLS 2013 - Co-located with the 4th Annual ACM International Conference on Systems, Programming, Languages, and Applications: Software for Humanity, SPLASH 2013, pages 61–71. Association for Computing Machinery, 2013. (doi:10.1145/2508168.2508169)
[139]
S. Banani and K. Wipusitwarakun. A multipath routing protocol over chord-based internet indirection infrastructure (13). Information Technology Journal, 12(1):1–14, 2013. (doi:10.3923/itj.2013.1.14)
[140]
E. Murphy-Hill, T. Zimmermann, C. Bird, and N. Nagappan. The design of bug fixes. In 2013 35th International Conference on Software Engineering, ICSE 2013, pages 332–341, 2013. (doi:10.1109/ICSE.2013.6606579)
[141]
C.-S. Lin. Balanced dynamic buffering for scalable video-on-demand streaming on peer-to-peer networks. Multimedia Tools and Applications, 62(3):701–718, 2013. (doi:10.1007/s11042-011-0872-4)
[142]
S. Khatoon, G. Li, and A. Mahmood. Comparison and evaluation of source code mining tools and techniques: A qualitative approach. Intelligent Data Analysis, 17(3):459–484, 2013.
[143]
A. Rastogi, A. Gupta, and A. Sureka. Samiksha: Mining issue tracking system for contribution and performance assessment. In ACM International Conference Proceeding Series, pages 13–22, 2013.
[144]
M. Gardner, P. Sathre, W.-C. Feng, and G. Martinez. Characterizing the challenges and evaluating the efficacy of a CUDA-to-OpenCL translator. Parallel Computing, 39(12):769–786, 2013. (doi:10.1016/j.parco.2013.09.003)
[145]
J. Lenhard, S. Harrer, and G. Wirtz. Measuring the installability of service orchestrations using the SQuaRE method. In 6th IEEE International Conference on Service-Oriented Computing and Applications, SOCA 2013, pages 118–125. IEEE Computer Society, 2013. (doi:10.1109/SOCA.2013.30)
[146]
I. Astrova, A. Koschel, L. Renners, T. Rossow, and M. Schaaf. Integrating structured peer-to-peer networks into OM4SPACE project. In 27th International Conference on Advanced Information Networking and Applications Workshops, WAINA 2013, pages 1211–1216, 2013. (doi:10.1109/WAINA.2013.88)
[147]
T. Wegeler, F. Gutzeit, A. Destailleur, and B. Dock. Evaluating the benefits of using domain-specific modeling languages — an experience report. In 2013 13th ACM Workshop on Domain-Specific Modeling, DSM 2013, pages 7–12. Association for Computing Machinery, 2013. (doi:10.1145/2541928.2541930)
[148]
T. Vaimann, A. Kallaste, A. Kilk, and A. Belahcen. Lifecycle-based design and optimization of electrical motor-drives — challenges and possibilities. In 2013 3rd International Conference on Electric Power and Energy Conversion Systems, EPECS 2013, 2013. (doi:10.1109/EPECS.2013.6713037)
[149]
L. Meneses, H. Barthwal, S. Singh, R. Furuta, and F. Shipman. Restoring semantically incomplete document collections using lexical signatures. International Conference on Theory and Practice of Digital Libraries, TPDL 2013, 8092 LNCS:321–332, 2013. (doi:10.1007/978-3-642-40501-3_33)
[150]
T. Koskela, O. Kassinen, E. Harjula, and M. Ylianttila. P2P group management systems: A conceptual analysis. ACM Computing Surveys, 45(2), 2013.
[151]
I. Herraiz, D. Rodriguez, G. Robles, and J.M. Gonzalez-Barahona. The evolution of the laws of software evolution: A discussion based on a systematic literature review. ACM Computing Surveys, 46(2), 2013. (doi:10.1145/2543581.2543595)
[152]
Q.D. Soetens, J. Perez, and S. Demeyer. An initial investigation into change-based reconstruction of floss-refactorings. In 29th IEEE International Conference on Software Maintenance, ICSM 2013, pages 384–387, 2013. (doi:10.1109/ICSM.2013.53)
[153]
J.M. Marquès, D. Lazaro, A.A. Juan, X. Vilajosana, M. Domingo, and J. Jorba. Planetlab@UOC: A real lab over the internet to experiment with distributed systems. Computer Applications in Engineering Education, 21(2):265–275, 2013.
[154]
H.R. Ghaeini, B. Akbari, and B. Barekatain. An adaptive packet loss recovery method for peer-to-peer video streaming over wireless mesh network. Lecture Notes in Electrical Engineering, 236 LNEE:713–721, 2013.
[155]
M.B. Lehmann, R.S. Antunes, and M.P. Barcellos. Exploring your neighborhood: Comparing connection strategies in swarming networks through evolving graphs. In 13th IEEE International Conference on Peer-to-Peer Computing, IEEE P2P 2013. IEEE Computer Society, 2013. (doi:10.1109/P2P.2013.6688701)
[156]
A.J. Reinoso, J.M. Gonzalez-Barahona, R. Muñoz Mansilla, and I. Herraiz. Temporal characterization of the requests to Wikipedia. Studies in Computational Intelligence, 439:71–89, 2013. (doi:10.1007/978-3-642-31546-6-5)
[157]
T.S. Lendvay, B. Hannaford, and R.M. Satava. Future of robotic surgery. Cancer Journal (United States), 19(2):109–119, 2013.
[158]
E.C.S. Hayashi, L.S.G. Piccolo, and M.C.C. Baranauskas. Perspectives on the evaluation of affective quality in social software. International Journal of Web Based Communities, 9(4):519–534, 2013. (doi:10.1504/IJWBC.2013.057217)
[159]
Nicola Jane Lessing, Christophe Schnelle, and Peter Mariani. Maltweb multi-axis viewing interface and higher level scoping. United States Patent 8,386,484, February 2013. Assignee: TimeBase Pty Limited (Sydney, New South Wales, AU).
[160]
Varadarajan Sridhar, Ravi G. Amur, and Korrapati Kalyane Rao. System and method for automated safe reprogramming of software radios. United States Patent 8,347,108, January 2013. Assignee: Satyam Computer Services Limited of Mayfair Centre (Secunderabad, IN).
[161]
Marcus Peinado and Weidong Cui. Malware investigation by analyzing computer memory. United States Patent 8,566,944, October 2013. Assignee: Microsoft Corporation (Redmond, WA).
[162]
M.H. Yarmand and D.G. Down. Server allocation for zero buffer tandem queues. European Journal of Operational Research, 230(3):596–603, 2013.
[163]
P. Rivière and O. Rosec. Model-based interchange formats: A generic set of tools for validating structured data against a knowledge base. In 2013 Complex Systems Design and Management Conference, CSDM 2013, volume 1085, pages 127–138. CEUR-WS, 2013.
[164]
Ashok Vadekar and Brian Neill. Retrofitting authentication onto firmware. United States Patent 8,566,791, October 2013. Assignee: BlackBerry Limited (Waterloo, Ontario, CA).
[165]
David Howard Spencer and Darla Renae Agard. Systems, methods and software for researching statutory information. United States Patent 8,458,190, June 2013. Assignee: Thomson Reuters Global Resources (Baar, CH).
[166]
P. Nistala and P. Kumari. An approach to carry out consistency analysis on requirements: Validating and tracking requirements through a configuration structure. In 2013 21st IEEE International Requirements Engineering Conference, RE 2013, pages 320–325. IEEE Computer Society, 2013. (doi:10.1109/RE.2013.6636737)
[167]
Z. Czirkos and G. Hosszú. Solution for the broadcasting in the Kademlia peer-to-peer overlay. Computer Networks, 57(8):1853–1862, 2013.
[168]
A. Rastogi and A. Sureka. Samikshaumbra: Contribution and performance assessment of software maintenance professionals by mining software repositories. In 2013 20th Asia-Pacific Software Engineering Conference, APSEC 2013, pages 170–175. IEEE Computer Society, 2013. (doi:10.1109/APSEC.2013.134)
[169]
T. Busjahn and C. Schulte. The use of code reading in teaching programming. In 13th Koli Calling International Conference on Computing Education Research, Koli Calling 2013, pages 3–11, 2013. (doi:10.1145/2526968.2526969)
[170]
I. Bluemke and R. Roguski. Metrics in assessing the quality and evolution of jEdit. Lecture Notes in Electrical Engineering, 151 LNEE:717–727, 2013. (doi:10.1007/978-1-4614-3558-7_61)
[171]
R. Agarwal and Y. Pradeep. Bridging the gap between traditional and online shopping methods for Indian customers through digital interactive experience. In 2013 2nd International Conference on Advances in Computing, Communications and Informatics, ICACCI 2013, pages 1184–1189, 2013. (doi:10.1109/ICACCI.2013.6637345)
[172]
A. Garrido and R. Johnson. Embracing the C preprocessor during refactoring. Journal of software: Evolution and Process, 25(12):1285–1304, 2013. (doi:10.1002/smr.1603)
[173]
A.H. Mardani and M. Sangari. An analysis of the availability and persistence of web citations in Iranian LIS journals. International Journal of Information Science and Management, 11(1):29–42, 2013.
[174]
H.M.N.D. Bandara and A.P. Jayasumana. Community-based caching for enhanced lookup performance in P2P systems. IEEE Transactions on Parallel and Distributed Systems, 24(9):1752–1762, 2013. (doi:10.1109/TPDS.2012.270)
[175]
B.T. Sampath Kumar and D. Vinay Kumar. HTTP 404-page (not) found: Recovery of decayed url citations. Journal of Informetrics, 7(1):145–157, 2013. (doi:10.1016/j.joi.2012.09.007)
[176]
V. Šešum Čavić and E. Kühn. Algorithms and framework for comparison of bee-intelligence based peer-to-peer lookup. 4th International Conference on Advances in Swarm Intelligence, ICSI 2013, 7928 LNCS(PART 1):404–413, 2013. (doi:10.1007/978-3-642-38703-6_48)
[177]
D.R. Delgado Sobrino and P. Koštál. A few analysis and customization issues of a new iCIM 3000 system: The case of the material flow, its complexity and a few issues to improve. Academic Journal of Manufacturing Engineering, 11(4):36–41, 2013.
[178]
A. Pino. Free assistive technology software for persons with motor disabilities. Assistive Technologies and Computer Access for Motor Disabilities, pages 110–152, 2013. (doi:10.4018/978-1-4666-4438-0.ch005)
[179]
B. Choi. Multiagent social computing. IGI Global, 2013. (doi:10.4018/978-1-4666-2779-6.ch018)
[180]
A. Pino. Augmentative and alternative communication systems for the motor disabled. Disability Informatics and Web Accessibility for Motor Limitations, pages 105–152, 2013. (doi:10.4018/978-1-4666-4442-7.ch004)
[181]
Rod Cope. Noise reduction for content matching analysis results for protectable content. United States Patent 8,498,982, July 2013. Assignee: OpenLogic, Inc. (Broomfield, CO).
[182]
R. Kawahara, K. Ono, T. Nakada, H. Okabayashi, K. Hisazumi, T. Nakanishi, A. Fukuda, Y. Sakamoto, and T. Nagano. A model transformation method for evaluation of non-functional requirements of an embedded system architecture. Computer Software, 30(1):203–210, 2013.
[183]
J. Mercadal, Z. Drey, and C. Consel. Denotational semantics of a user-oriented, domain-specific language. In Semantics, Abstract Interpretation, and Reasoning About Programs: Essays Dedicated to David A. Schmidt on the Occasion of His 60th Birthday, volume 129, pages 229–249, 2013. (doi:10.4204/EPTCS.129.14)
[184]
A. Malatras, F. Peng, and B.A. Hirsbrunner. Energy-efficient peer-to-peer networking and overlays. In Handbook of Green Information and Communication Systems, pages 513–540. Elsevier Inc., 2013. (doi:10.1016/B978-0-12-415844-3.00020-6)
[185]
M. Goeminne, M. Claes, and T. Mens. A historical dataset for the GNOME ecosystem. In 10th International Working Conference on Mining Software Repositories, MSR 2013, pages 225–228, 2013. (doi:10.1109/MSR.2013.6624032)
[186]
P. Oliveira, H. Borges, M.T. Valente, and H.A.X. Costa. Metrics-based detection of similar software. In 25th International Conference on Software Engineering and Knowledge Engineering, SEKE 2013, pages 447–450. Knowledge Systems Institute Graduate School, January 2013.
[187]
M. Gligoric, F. Behrang, Y. Li, J. Overbey, M. Hafiz, and D. Marinov. Systematic testing of refactoring engines on real software projects. 27th European Conference on Object-Oriented Programming, ECOOP 2013, 7920 LNCS:629–653, 2013. (doi:10.1007/978-3-642-39038-8-26)
[188]
M. Shojafar, J.H. Abawajy, Z. Delkhah, A. Ahmadi, Z. Pooranian, and A. Abraham. An efficient and distributed file search in unstructured peer-to-peer networks. Peer-to-Peer Networking and Applications, 8(1):120–136, 2013. (doi:10.1007/s12083-013-0236-0)
[189]
M. Ghorbani, M.R. Meybodi, and A.M. Saghiri. A new version of k-random walks algorithm in peer-to-peer networks utilizing learning automata. In 2013 5th Conference on Information and Knowledge Technology, IKT 2013, pages 1–6, 2013. (doi:10.1109/IKT.2013.6620028)
[190]
M. Ghorbani, M.R. Meybodi, and A.M. Saghiri. A novel self-adaptive search algorithm for unstructured peer-to-peer networks utilizing learning automata. In 2013 3rd Joint Conference of AI and Robotics and 5th RoboCup Iran Open International Symposium: Learning, Glorious Future, RIOS 2013, 2013. (doi:10.1109/RIOS.2013.6595306)
[191]
S. Alhusain, S. Coupland, R. John, and M. Kavanagh. Design pattern recognition by using adaptive neuro fuzzy inference system. In 25th IEEE International Conference on Tools with Artificial Intelligence, ICTAI 2013, pages 581–587, 2013. (doi:10.1109/ICTAI.2013.92)
[192]
S. Alhusain, S. Coupland, R. John, and M. Kavanagh. Towards machine learning based design pattern recognition. In 2013 13th UK Workshop on Computational Intelligence, UKCI 2013, pages 244–251, 2013. (doi:10.1109/UKCI.2013.6651312)
[193]
S. Almugrin, W. Albattah, and A. Melton. Frequent pattern mining in software engineering. In 22nd International Conference on Software Engineering and Data Engineering, SEDE 2013, pages 97–104, 2013.
[194]
G. Einziger, R. Friedman, and E. Kibbar. Kaleidoscope: Adding colors to Kademlia. In 13th IEEE International Conference on Peer-to-Peer Computing, IEEE P2P 2013. IEEE Computer Society, 2013. (doi:10.1109/P2P.2013.6688703)
[195]
S. Pavalkis, L. Nemuraite, and R. Butkiene. Derived properties: A user friendly approach to improving model traceability. Information Technology and Control, 42(1):48–60, 2013.
[196]
H. Muhammad, F. Mascarenhas, and R. Ierusalimschy. LuaRocks — a declarative and extensible package management system for lua. 17th Brazilian Symposium on Programming Languages, SBLP 2013, 8129 LNCS:16–30, 2013. (doi:10.1007/978-3-642-40922-6_2)
[197]
M.V. Belmonte, M. Dıaz, and A. Reyna. Improving file sharing experience with incentive based coalitions. 3rd International Conference on Agents and Artificial Intelligence, ICAART 2011, 271:287–301, 2013. (doi:10.1007/978-3-642-29966-7_19)
[198]
S.M. Bellovin, M. Blaze, S. Clark, and S. Landau. Going bright: Wiretapping without weakening communications infrastructure. IEEE Security and Privacy, 11(1):62–72, 2013. (doi:10.1109/MSP.2012.138)
[199]
W.D. Sunindyo, T. Moser, D. Winkler, and S. Biffl. Analyzing OSS project health with heterogeneous data sources. In Open Source Software Dynamics, Processes, and Applications, pages 207–230. IGI Global, 2013. (doi:10.4018/978-1-4666-2937-0.ch011)
[200]
L.P. Ferreira, E.A. Gómez, G.P. Lourido, and B. Tjahjono. Modeling a complex production line using virtual cells. Lecture Notes in Electrical Engineering, 130 LNEE:361–373, 2013. (doi:10.1007/978-1-4614-2317-1_30)
[201]
H.U. Asuncion, M. Shonle, R. Porter, K. Potts, N. Duncan, and Jr. Matthies, W.J. Using change entries to collect software project information. In 25th International Conference on Software Engineering and Knowledge Engineering, SEKE 2013, pages 184–189. Knowledge Systems Institute Graduate School, January 2013.
[202]
A.K. Tsadiras, C.T. Papadopoulos, and M.E.J. O'Kelly. An artificial neural network based decision support system for solving the buffer allocation problem in reliable production lines. Computers and Industrial Engineering, 66(4):1150–1162, 2013. (doi:10.1016/j.cie.2013.07.024)
[203]
Valery Golender, Ido Ben Moshe, and Shlomo Wygodny. System and method for software diagnostics using a combination of visual and dynamic tracing. United States Patent 8,504,994, August 2013. Assignee: Identify Software, Ltd. (Petach-Tikva, IL).
[204]
P. Karmakar and R. Roy. Evolution of trust and formation of preference clusters in distributed networked structure. Studies in Virtual Communities, Blogs, and Modern Social Networking: Measurements, Analysis, and Investigations, pages 62–96, 2013. (doi:10.4018/978-1-4666-4022-1.ch006)
[205]
S. Prstacic and M. Zagar. A model for web application and web service peer-to-peer hosting network architecture. In 35th International Conference on Information Technology Interfaces, ITI 2013, pages 335–340, 2013.
[206]
C. Fieseler and M. Fleck. The pursuit of empowerment through social media: Structural social capital dynamics in CSR-blogging. Journal of Business Ethics, 118(4):759–775, 2013. (doi:10.1007/s10551-013-1959-9)
[207]
S. Shuraida and H. Barki. The influence of analyst communication in IS projects. Journal of the Association of Information Systems, 14(9):482–520, 2013.
[208]
Christoph Schnelle and Geoffrey John Nolan. Mapping of data from XML to SQL. United States Patent 8,396,901, March 2013. Assignee: Timebase Pty Limited (Sydney, New South Wales, AU).
[209]
J. Loveland and J. Reagle. Wikipedia and encyclopedic production. New Media and Society, 15(8):1294–1311, 2013. (doi:10.1177/1461444812470428)
[210]
E. Abdullah and S. Fujita. Reputation-based colluder detection schemes for peer-to-peer content delivery networks''. IEICE Transactions on Information and Systems, E96-D(12):2696–2703, 2013. (doi:10.1587/transinf.E96.D.2696)
[211]
V. Mansilla and M.-C. Marcos. Experiencia de usuario en televisión conectada: Un estudio con usuarios. Profesional de la Informacion, 22(2):122–127, 2013.
[212]
H. Yamamoto and K. Yamazaki. LISP-based application-layer multicasting system for a content distribution network. Journal of Information Processing, 21(2):226–236, 2013.
[213]
H. Yamamoto and K. Yamazaki. Location-aware optimal resource selection method for P2P-based contents management and real-time distribution. IEICE Transactions on Information and Systems, E96-D(2):213–225, 2013. (doi:10.1587/transinf.E96.D.213)
[214]
L. Aversano and M. Tortorella. Quality evaluation of floss projects: Application to ERP systems. Information and Software Technology, 55(7):1260–1276, 2013.
[215]
F. Blanchet-Sadri, B. Chen, and S. Munteanu. A note on constructing infinite binary words with polynomial subword complexity. RAIRO - Theoretical Informatics and Applications, 47(2):171–180, 2013.
[216]
J.L. Ordiales Coscia, C. Mateos, M. Crasso, and A. Zunino. Anti-pattern free code-first web services for state-of-the-art Java WSDL generation tools. International Journal of Web and Grid Services, 9(2):107–126, 2013.
[217]
J.M. Gonzalez-Barahona, D. Izquierdo-Cortazar, S. Maffulli, and G. Robles. Understanding how companies interact with free software communities. IEEE Software, 30(5):38–45, 2013. (doi:10.1109/MS.2013.95)
[218]
H. Zafar. Human resource information systems: Information security concerns for organizations. Human Resource Management Review, 23(1):105–113, 2013. (doi:10.1016/j.hrmr.2012.06.010)
[219]
P. Eeles. Building a platform for innovation: Architecture and agile as key enablers. Agile Software Architecture: Aligning Agile Processes and Software Architectures, pages 315–333, 2013. (doi:10.1016/B978-0-12-407772-0.00012-5)
[220]
A. Narayanan, Y. Chen, S. Pang, and B. Tao. The effects of different representations on static structure analysis of computer malware signatures. The Scientific World Journal, 2013, 2013. (doi:10.1155/2013/671096)
[221]
D. Rodriguez, R. Ruiz, J.C. Riquelme, and R. Harrison. A study of subgroup discovery approaches for defect prediction. Information and Software Technology, 55(10):1810–1822, 2013. (doi:10.1016/j.infsof.2013.05.002)
[222]
J. Augustine, A.R. Molla, E. Morsy, G. Pandurangan, P. Robinson, and E. Upfal. Storage and search in dynamic peer-to-peer networks. In 25th ACM Symposium on Parallelism in Algorithms and Architectures, SPAA 2013, pages 53–62, 2013.
[223]
E. Gebennini, A. Grassi, C. Fantuzzi, S.B. Gershwin, and I.C. Schick. Discrete time model for two-machine one-buffer transfer lines with restart policy. Annals of Operations Research, 209(1):41–65, 2013. (doi:10.1007/s10479-011-0868-5)
[224]
B. Vasilescu, V. Filkov, and A. Serebrenik. Stackoverflow and GitHub: Associations between software development and crowdsourced knowledge. In 2013 ASE/IEEE Int. Conf. on Social Computing, SocialCom 2013, the 2013 ASE/IEEE Int. Conf. on Big Data, BigData 2013, the 2013 Int. Conf. on Economic Computing, EconCom 2013, the 2013 PASSAT 2013, and the 2013 ASE/IEEE Int. Conf. on BioMedCom 2013, pages 188–195, 2013. (doi:10.1109/SocialCom.2013.35)
[225]
E. Tsekleves, R. Whitham, K. Kondo, and A. Hill. Investigating pay-as-you-go to address issues of trust, privacy and security around media use at home. Universal Access in the Information Society, 12(2):217–231, 2013.
[226]
S. Vasilakos, C.D. Stylios, and J. Garofalakis. An analytical hierarchy process methodology to evaluate it solutions for organizations. In 25th European Modeling and Simulation Symposium, EMSS 2013, pages 593–600, 2013.
[227]
M. Colledani, G. Pedrielli, W. Terkaj, and M. Urgo. Integrated virtual platform for manufacturing systems design. In 46th CIRP Conference on Manufacturing Systems, CIRP CMS 2013, volume 7, pages 425–430, 2013. (doi:10.1016/j.procir.2013.06.010)
[228]
A. Hannemann, M. Hackstein, R. Klamma, and M. Jarke. An adaptive filter-framework for the quality improvement of open-source software analysis. In 2013 Conference on Software Engineering, SE 2013, volume P-213, pages 143–156. Gesellschaft fur Informatik (GI), 2013.
[229]
J.B. Fernández, B.S. De Abajo, J.M. Ramirez, E.G. Salcines, and C. de Castro Lozano. How the user behavior is affected by the use of secondary screens on interactive television: An affective usability dimension. Communications in Computer and Information Science, 278:557–562, 2013. (doi:10.1007/978-3-642-35879-1_70)
[230]
T.F. Bissyandé, F. Thung, D. Lo, L. Jiang, and L. Réveillère. Orion: A software project search engine with integrated diverse software artifacts. In 18th International Conference on Engineering of Complex Computer Systems, ICECCS 2013, pages 242–245, 2013. (doi:10.1109/ICECCS.2013.42)
[231]
M.S. Sivakumar, J. Murji, L.D. Jacob, F. Nyange, and M. Banupriya. Speech controlled automatic wheelchair. In 2013 Pan African International Conference on Information Science, Computing and Telecommunications, PACT 2013, pages 70–73. Institute of Electrical and Electronics Engineers Inc., 2013. (doi:10.1109/SCAT.2013.7055093)
[232]
C.G. Cegielski, D.M. Bourrie, and B.T. Hazen. Evaluating adoption of emerging IT for corporate IT strategy: Developing a model using a qualitative method. Information Systems Management, 30(3):235–249, 2013. (doi:10.1080/10580530.2013.794632)
[233]
K.M. Lavassani, B. Movahedi, and V. Kumar. From integration to social media: Understanding electronic marketplace. Trends in E-Business, E-Services, and E-Commerce: Impact of Technology on Goods, Services, and Business Transactions, pages 1–19, 2013. (doi:10.4018/978-1-4666-4510-3.ch001)
[234]
T.N. Gutierrez, L. Ciarletta, and V. Chevrier. Multi-agent simulation based governance of complex systems: Architecture and example implementation on free-riding. In 2013 Mexican International Conference on Computer Science, ENC 2013, pages 89–98. IEEE Computer Society, 2013. (doi:10.1109/ENC.2013.19)
[235]
I.M.T. Hernandez, A.M. Viveros, and E.H. Rubio. Analysis for the design of open applications on mobile devices. In 23rd International Conference on Electronics, Communications and Computing, CONIELECOMP 2013, pages 126–131, 2013. (doi:10.1109/CONIELECOMP.2013.6525772)
[236]
M. Allamanis and C. Sutton. Mining source code repositories at massive scale using language modeling. In 10th International Working Conference on Mining Software Repositories, MSR 2013, pages 207–216, 2013. (doi:10.1109/MSR.2013.6624029)
[237]
Angelos D. Keromytis and Salvatore J. Stolfo. Methods, media, and systems for detecting an anomalous sequence of function calls. United States Patent 8,489,931, July 2013. Assignee: The Trustees of Columbia University in the City of New York (New York, NY).
[238]
M. Marchetti and M. Colajanni. Cooperative approaches to siem and intrusion detection. Advances in Security Information Management: Perceptions and Outcomes, pages 79–116, 2013.
[239]
M. Jankowski-Lorek, L. Ostrowski, P. Turek, and A. Wierzbicki. Modeling Wikipedia admin elections using multidimensional behavioral social networks. Social Network Analysis and Mining, 3(4):787–801, 2013. (doi:10.1007/s13278-012-0092-6)
[240]
B. Henderson-Sellers, T. Clark, and C. Gonzalez-Perez. On the search for a level-agnostic modelling language. 25th International Conference on Advanced Information Systems Engineering, CAiSE 2013, 7908 LNCS:240–255, 2013. (doi:10.1007/978-3-642-38709-8_16)
[241]
C.R. Suthikshn Kumar. Portable speech encryption based anti-tapping device. In 135th Audio Engineering Society Convention 2013, pages 523–528. Audio Engineering Society, 2013.
[242]
O. Mizuno. On effects of tokens in source code to accuracy of fault-prone module prediction. In 2013 17th International Computer Science and Engineering Conference, ICSEC 2013, pages 103–108, 2013. (doi:10.1109/ICSEC.2013.6694761)
[243]
M. Mernik. An object-oriented approach to language compositions for software language engineering. Journal of Systems and Software, 86(9):2451–2464, 2013. (doi:10.1016/j.jss.2013.04.087)
[244]
S. Wagner. Software product quality control. Springer Berlin Heidelberg, 2013. (doi:10.1007/978-3-642-38571-1)
[245]
A. Barham. The emergence of quality assurance practices in free/libre open source software: A case study. 9th IFIP WG 2.13 International Conference on Open Source Software, OSS 2013, 404:271–276, 2013.
[246]
D.J. Pearce. Sound and complete flow typing with unions, intersections and negations. 14th International Conference on Verification, Model Checking, and Abstract Interpretation, VMCAI 2013, 7737 LNCS:335–354, 2013. (doi:10.1007/978-3-642-35873-9_21)
[247]
K.A. Hawick. Fluent interfaces to a java-based internal domain-specific languages for graph generation and analysis. In IASTED Multiconferences - Proceedings of the IASTED International Conference on Software Engineering, SE 2013, pages 752–759, 2013.
[248]
J.J. Cusick. Durable ideas in software engineering: Concepts, methods and approaches from my virtual toolbox. Bentham Science Publishers Ltd., 2013. (doi:10.2174/97816080547631130101)
[249]
S. Astromskis, A. Janes, A. Sillitti, and G. Succi. Supporting governance in disciplined agile delivery using noninvasive measurement and process mining. Cutter IT Journal, 26(11):25–29, 2013.
[250]
J. Feigenspan, C. Kästner, S. Apel, J. Liebig, M. Schulze, R. Dachselt, M. Papendieck, T. Leich, and G. Saake. Do background colors improve program comprehension in the #ifdef hell? Empirical Software Engineering, 18(4):699–745, 2013. (doi:10.1007/s10664-012-9208-x)
[251]
A. Logvinenko, C. Gremzow, and D. Tutsch. RecMIN: A reconfiguration architecture for network on chip. In 2013 8th International Workshop on Reconfigurable and Communication-Centric Systems-on-Chip, ReCoSoC 2013, 2013. (doi:10.1109/ReCoSoC.2013.6581547)
[252]
V. Chiprianov, Y. Kermarrec, and S. Rouvrais. Integrating DSLs into a software engineering process: Application to collaborative construction of telecom services. Software Design and Development: Concepts, Methodologies, Tools, and Applications, 2-4:570–595, 2013. (doi:10.4018/978-1-4666-4301-7.ch028)
[253]
E. Kocaguneli, T. Zimmermann, C. Bird, N. Nagappan, and T. Menzies. Distributed development considered harmful? In 2013 35th International Conference on Software Engineering, ICSE 2013, pages 882–890, 2013. (doi:10.1109/ICSE.2013.6606637)
[254]
G. Samarthyam, G. Suryanarayana, T. Sharma, and S. Gupta. MIDAS: A design quality assessment method for industrial software. In 2013 35th International Conference on Software Engineering, ICSE 2013, pages 911–920, 2013. (doi:10.1109/ICSE.2013.6606640)
[255]
S.S. Kolesnikov, S. Apel, N. Siegmund, S. Sobernig, C. Kästner, and S. Senkaya. Predicting quality attributes of software product lines using software and network measures and sampling. In ACM International Conference Proceeding Series, 2013.
[256]
K.K. Chaturvedi, V.B. Sing, and P. Singh. Tools in mining software repositories. In 2013 13th International Conference on Computational Science and Its Applications, ICCSA 2013, pages 89–98. IEEE Computer Society, 2013. (doi:10.1109/ICCSA.2013.22)
[257]
M.J. Villanueva, F. Valverde, and O. Pastor. Involving end-users in domain-specific languages development experiences from a bioinformatics SME. In 8th International Conference on Evaluation of Novel Approaches to Software Engineering, ENASE 2013, pages 97–108, 2013.
[258]
Stylianos Sidiroglou, Angelos D. Keromytis, and Salvatore J. Stolfo. Systems, methods, and media protecting a digital data processing device from attack. United States Patent 8,407,785, March 2013. Assignee: The Trustees of Columbia University in the City of New York (New York, NY).
[259]
S.H. Kannangara and W.M.J.I. Wijayanayake. Impact of refactoring on external code quality improvement: An empirical evaluation. In 2013 International Conference on Advances in ICT for Emerging Regions, ICTer 2, pages 60–67. IEEE Computer Society, 2013. (doi:10.1109/ICTer.2013.6761156)
[260]
M. Johnson. Buy-side barriers to e-business technology in the healthcare sector. International Journal of Healthcare Technology and Management, 14(1-2):110–142, 2013. (doi:10.1504/IJHTM.2013.055090)
[261]
E. Mourtou. Modeling access control in healthcare organizations. In IT Policy and Ethics: Concepts, Methodologies, Tools, and Applications, volume 2-3, pages 835–856. IGI Global, 2013. (doi:10.4018/978-1-4666-2919-6.ch038)
[262]
M. Johnson. Critical success factors for B2B e-markets: A strategic fit perspective. Marketing Intelligence and Planning, 31(4):337–366, 2013.
[263]
M. Johnson. Critical success factors for B2B e-markets: A strategic fit perspective. Marketing Intelligence and Planning, 31(6):698–727, 2013. (doi:10.1108/MIP-10-2013-001)
[264]
W. Djoleto. Electronic commerce and organizational leadership: Perspectives and methodologies. IGI Global, 2013. (doi:10.4018/978-1-4666-2982-0)
[265]
E. Pantano. Ubiquitous retailing innovative scenario: From the fixed point of sale to the flexible ubiquitous store. Journal of Technology Management and Innovation, 8(2):84–92, 2013.
[266]
A.F. Dragoni. Health services through digital terrestrial television. Telehealth Networks for Hospital Services: New Methodologies, pages 207–227, 2013. (doi:10.4018/978-1-4666-2979-0.ch014)
[267]
K. Kolomvatsos, G. Valkanas, P. Patelis, and S. Hadjiefthymiades. Creating, debugging, and testing mobile applications with the IPAC application creation environment. Software Design and Development: Concepts, Methodologies, Tools, and Applications, 2-4:695–718, 2013. (doi:10.4018/978-1-4666-4301-7.ch033)
[268]
G. Paschalidou, E. Stiakakis, and A. Chatzigeorgiou. An application of data envelopment analysis to software quality assessment. In 6th Balkan Conference in Informatics, BCI 2013, pages 228–235, 2013. (doi:10.1145/2490257.2490264)
[269]
G. Kakarontzas, E. Constantinou, A. Ampatzoglou, and I. Stamelos. Layer assessment of object-oriented software: A metric facilitating white-box reuse. Journal of Systems and Software, 86(2):349–366, 2013. (doi:10.1016/j.jss.2012.08.041)
[270]
M. Klotzbücher and H. Bruyninckx. A lightweight, composable metamodelling language for specification and validation of internal domain specific languages. 8th International Workshop on Model-Based Methodologies for Pervasive and Embedded Software, MOMPES 2012, 7706 LNCS:58–68, 2013. (doi:10.1007/978-3-642-38209-3_4)
[271]
T. Gavrielides and V. Artinopoulou. Restorative justice and violence against women: Comparing greece and the united kingdom. Asian Journal of Criminology, 8(1):25–40, 2013.
[272]
X. Bonnaire. Fixed interval nodes estimation: An accurate and low cost algorithm to estimate the number of nodes in distributed hash tables. Information Sciences, 218:165–181, 2013. (doi:10.1016/j.ins.2012.06.004)
[273]
T. Hasegawa. A survey of the research on future internet and network architectures. IEICE Transactions on Communications, E96-B(6):1385–1401, 2013.
[274]
E. Costello. Opening up to open source: Looking at how moodle was adopted in higher education. Open Learning, 28(3):187–200, 2013. (doi:10.1080/02680513.2013.856289)
[275]
M. Lindberg. Feedback-based cooperative content distribution for mobile networks. In 8th ACM Int. Workshop on Performance Monitoring, Measurement, and Evaluation of Heterogeneous Wireless and Wired Networks, PM2HW2N 2013, Held in Conjunction with the 16th ACM Int. Conf. on MSWiM 2013, pages 107–115, 2013. (doi:10.1145/2512840.2512855)
[276]
C.A. Mattmann. Computing: A vision for data science. Nature, 493(7433):473–475, 2013. (doi:10.1038/493473a)
[277]
B. Schoenmakers, N. Van Den Broek, I. Nagy, B. Vasilescu, and A. Serebrenik. Assessing the complexity of upgrading software modules. In 20th Working Conference on Reverse Engineering, WCRE 2013, pages 433–440, 2013. (doi:10.1109/WCRE.2013.6671319)
[278]
T. Johanndeiter, A. Goldstein, and U. Frank. Towards business process models at runtime. In 8th Workshop on Models @ Run.time, MRT 2013 - Co-located with 16th International Conference on Model Driven Engineering Languages and Systems, MODELS 2013, volume 1079, pages 13–25. CEUR-WS, 2013.
[279]
C.T. Papadopoulos, M.E.J. Okelly, and A.K. Tsadiras. A DSS for the buffer allocation of production lines based on a comparative evaluation of a set of search algorithms. International Journal of Production Research, 51(14):4175–4199, 2013. (doi:10.1080/00207543.2012.752585)
[280]
P.M. Papadopoulos, I.G. Stamelos, and A. Meiszner. Enhancing software engineering education through open source projects: Four years of students' perspectives. Education and Information Technologies, 18(2):381–397, 2013.
[281]
I.N. Athanasiadis and F. Villa. A roadmap to domain specific programming languages for environmental modeling: Key requirements and concepts. In 2013 13th ACM Workshop on Domain-Specific Modeling, DSM 2013, pages 27–32. Association for Computing Machinery, 2013. (doi:10.1145/2541928.2541934)
[282]
S. Boonkrong. A more secure and efficient Andrew secure RPC protocol. Security and Communication Networks, 7(11):2063–2077, 2013. (doi:10.1002/sec.918)
[283]
M. Brandtner. Fostering software quality assessment. In 2013 35th International Conference on Software Engineering, ICSE 2013, pages 1393–1396, 2013. (doi:10.1109/ICSE.2013.6606725)
[284]
M. Colledani. Performance evaluation of two-stage buffered production systems with discrete general Markovian machines. In 7th IFAC Conference on Manufacturing Modelling, Management, and Control, MIM 2013, pages 1638–1643, 2013. (doi:10.3182/20130619-3-RU-3018.00516)
[285]
L.Z. Granville. Peer-to-peer (P2P)-based network management. Network-Embedded Management and Applications: Understanding Programmable Networking Infrastructure, pages 291–315, 2013. (doi:10.1007/978-1-4419-6769-5_14)
[286]
D. Papadimitriou, D. Colle, P. Audenaert, and P. Demeester. Geometric information routing. In 2013 IEEE International Conference on Advanced Networks and Telecommunications Systems, ANTS 2013. IEEE Computer Society, 2013. (doi:10.1109/ANTS.2013.6802893)
[287]
J. Schaeffler. Digital video recorders: DVRs changing TV and advertising forever. Taylor and Francis, 2013. (doi:10.4324/9780080928333)
[288]
J. Fitsanakis. Digital Sparta: Information operations and cyber-warfare in Greece. Cyber Conflict: Competing National Perspectives, pages 135–164, 2013. (doi:10.1002/9781118562666.ch4)
[289]
V.Y. Kharitonov. A software architecture for high-level development of component-based distributed virtual reality systems. In 2013 IEEE 27th International Parallel and Distributed Processing Symposium Workshops and PhD Forum, IPDPSW 2013, pages 696–705, 2013. (doi:10.1109/COMPSAC.2013.111)
[290]
A. Mouhtaropoulos, P. Dimotikalis, and C.-T. Li. Applying a digital forensic readiness framework: Three case studies. In 2013 13th IEEE International Conference on Technologies for Homeland Security, HST 2013, pages 217–223, 2013. (doi:10.1109/THS.2013.6699003)
[291]
A. Chatzigeorgiou and E. Stiakakis. Combining metrics for software evolution assessment by means of data envelopment analysis. Journal of software: Evolution and Process, 25(3):303–324, 2013.
[1]
E. Abdullah and S. Fujita. Reputation-based colluder detection schemes for peer-to-peer content delivery networks''. IEICE Transactions on Information and Systems, E96-D(12):2696–2703, 2013. (doi:10.1587/transinf.E96.D.2696)

[2]
R. Agarwal and Y. Pradeep. Bridging the gap between traditional and online shopping methods for Indian customers through digital interactive experience. In 2013 2nd International Conference on Advances in Computing, Communications and Informatics, ICACCI 2013, pages 1184–1189, 2013. (doi:10.1109/ICACCI.2013.6637345)

[3]
M.I. Ahmed and M. Abo-Rizka. Remote internet voting: Security and performance issues. In 2013 World Congress on Internet Security, WorldCIS 2013, pages 56–64. IEEE Computer Society, 2013. (doi:10.1109/WorldCIS.2013.6751017)

[4]
J. Al Dallal. Incorporating transitive relations in low-level design-based class cohesion measurement. Software - Practice and Experience, 43(6):685–704, 2013.

[5]
J. Al Dallal. Object-oriented class maintainability prediction using internal quality attributes. Information and Software Technology, 55(11):2028–2048, 2013. (doi:10.1016/j.infsof.2013.07.005)

[6]
S. Alhusain, S. Coupland, R. John, and M. Kavanagh. Design pattern recognition by using adaptive neuro fuzzy inference system. In 25th IEEE International Conference on Tools with Artificial Intelligence, ICTAI 2013, pages 581–587, 2013. (doi:10.1109/ICTAI.2013.92)

[7]
S. Alhusain, S. Coupland, R. John, and M. Kavanagh. Towards machine learning based design pattern recognition. In 2013 13th UK Workshop on Computational Intelligence, UKCI 2013, pages 244–251, 2013. (doi:10.1109/UKCI.2013.6651312)

[8]
M.Y. Allaho and W.-C. Lee. Analyzing the social ties and structure of contributors in open source software community. In 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2013, pages 56–60. Association for Computing Machinery, 2013. (doi:10.1145/2492517.2492627)

[9]
M. Allamanis and C. Sutton. Mining source code repositories at massive scale using language modeling. In 10th International Working Conference on Mining Software Repositories, MSR 2013, pages 207–216, 2013. (doi:10.1109/MSR.2013.6624029)

[10]
S. Almugrin, W. Albattah, and A. Melton. Frequent pattern mining in software engineering. In 22nd International Conference on Software Engineering and Data Engineering, SEDE 2013, pages 97–104, 2013.

[11]
S. Astromskis, A. Janes, A. Sillitti, and G. Succi. Supporting governance in disciplined agile delivery using noninvasive measurement and process mining. Cutter IT Journal, 26(11):25–29, 2013.

[12]
I. Astrova, A. Koschel, L. Renners, T. Rossow, and M. Schaaf. Integrating structured peer-to-peer networks into OM4SPACE project. In 27th International Conference on Advanced Information Networking and Applications Workshops, WAINA 2013, pages 1211–1216, 2013. (doi:10.1109/WAINA.2013.88)

[13]
I.N. Athanasiadis and F. Villa. A roadmap to domain specific programming languages for environmental modeling: Key requirements and concepts. In 2013 13th ACM Workshop on Domain-Specific Modeling, DSM 2013, pages 27–32. Association for Computing Machinery, 2013. (doi:10.1145/2541928.2541934)

[14]
J. Augustine, A.R. Molla, E. Morsy, G. Pandurangan, P. Robinson, and E. Upfal. Storage and search in dynamic peer-to-peer networks. In 25th ACM Symposium on Parallelism in Algorithms and Architectures, SPAA 2013, pages 53–62, 2013.

[15]
L. Aversano and M. Tortorella. Quality evaluation of floss projects: Application to ERP systems. Information and Software Technology, 55(7):1260–1276, 2013.

[16]
S. Banani and K. Wipusitwarakun. A multipath routing protocol over chord-based internet indirection infrastructure (13). Information Technology Journal, 12(1):1–14, 2013. (doi:10.3923/itj.2013.1.14)

[17]
H.M.N.D. Bandara and A.P. Jayasumana. Community-based caching for enhanced lookup performance in P2P systems. IEEE Transactions on Parallel and Distributed Systems, 24(9):1752–1762, 2013. (doi:10.1109/TPDS.2012.270)

[18]
D. Bell and S.R. Shirzad. Social media business intelligence: A pharmaceutical domain analysis study. International Journal of Sociotechnology and Knowledge Development, 5(3):51–73, 2013. (doi:10.4018/ijskd.2013070104)

[19]
S.M. Bellovin, M. Blaze, S. Clark, and S. Landau. Going bright: Wiretapping without weakening communications infrastructure. IEEE Security and Privacy, 11(1):62–72, 2013. (doi:10.1109/MSP.2012.138)

[20]
M.V. Belmonte, M. Dıaz, and A. Reyna. Improving file sharing experience with incentive based coalitions. 3rd International Conference on Agents and Artificial Intelligence, ICAART 2011, 271:287–301, 2013. (doi:10.1007/978-3-642-29966-7_19)

[21]
X. Ben, S. Beijun, and Y. Weicheng. Mining developer contribution in open source software using visualization techniques. In Proceedings of the 2013 3rd International Conference on Intelligent System Design and Engineering Applications, ISDEA 2013, pages 934–937, 2013.

[22]
T.F. Bissyandé, F. Thung, D. Lo, L. Jiang, and L. Réveillère. Orion: A software project search engine with integrated diverse software artifacts. In 18th International Conference on Engineering of Complex Computer Systems, ICECCS 2013, pages 242–245, 2013. (doi:10.1109/ICECCS.2013.42)

[23]
F. Blanchet-Sadri, B. Chen, and S. Munteanu. A note on constructing infinite binary words with polynomial subword complexity. RAIRO - Theoretical Informatics and Applications, 47(2):171–180, 2013.

[24]
I. Bluemke and R. Roguski. Metrics in assessing the quality and evolution of jEdit. Lecture Notes in Electrical Engineering, 151 LNEE:717–727, 2013. (doi:10.1007/978-1-4614-3558-7_61)

[25]
X. Bonnaire. Fixed interval nodes estimation: An accurate and low cost algorithm to estimate the number of nodes in distributed hash tables. Information Sciences, 218:165–181, 2013. (doi:10.1016/j.ins.2012.06.004)

[26]
Brian M. Bowen, Pratap V. Prabhu, Vasileios P. Kemerlis, Stylianos Sidiroglou, Salvatore J. Stolfo, and Angelos D. Keromytis. Methods, systems, and media for detecting covert malware. United States Patent 8,528,091, September 2013. Assignee: The Trustees of Columbia University in the City of New York (New York, NY).

[27]
M. Brandtner. Fostering software quality assessment. In 2013 35th International Conference on Software Engineering, ICSE 2013, pages 1393–1396, 2013. (doi:10.1109/ICSE.2013.6606725)

[28]
David Broman, Jonathan Keljo, Vance Morrison, Sean Selitrennikoff, and Hsu-chieh Yuan. Detaching profilers. United States Patent 8,601,445, December 2013. Assignee: Microsoft Corporation (Redmond, WA).

[29]
D. Bueno, K.J. Compton, K.A. Sakallah, and M. Bailey. Detecting traditional packers, decisively. 16th International Symposium on Research in Attacks, Intrusions, and Defenses, RAID 2013, 8145 LNCS:184–203, 2013. (doi:10.1007/978-3-642-41284-4_10)

[30]
T. Busjahn and C. Schulte. The use of code reading in teaching programming. In 13th Koli Calling International Conference on Computing Education Research, Koli Calling 2013, pages 3–11, 2013. (doi:10.1145/2526968.2526969)

[31]
C.G. Cegielski, D.M. Bourrie, and B.T. Hazen. Evaluating adoption of emerging IT for corporate IT strategy: Developing a model using a qualitative method. Information Systems Management, 30(3):235–249, 2013. (doi:10.1080/10580530.2013.794632)

[32]
K.K. Chaturvedi, V.B. Sing, and P. Singh. Tools in mining software repositories. In 2013 13th International Conference on Computational Science and Its Applications, ICCSA 2013, pages 89–98. IEEE Computer Society, 2013. (doi:10.1109/ICCSA.2013.22)

[33]
A. Chatzigeorgiou and E. Stiakakis. Combining metrics for software evolution assessment by means of data envelopment analysis. Journal of software: Evolution and Process, 25(3):303–324, 2013.

[34]
C. Chen, P. Wang, Y. Liu, G. Wu, and P. Wang. Impacts of government website information on social sciences and humanities in China: A citation analysis. Government Information Quarterly, 30(4):450–463, 2013. (doi:10.1016/j.giq.2013.05.008)

[35]
M. Colledani, G. Pedrielli, W. Terkaj, and M. Urgo. Integrated virtual platform for manufacturing systems design. In 46th CIRP Conference on Manufacturing Systems, CIRP CMS 2013, volume 7, pages 425–430, 2013. (doi:10.1016/j.procir.2013.06.010)

[36]
M. Colledani. Performance evaluation of two-stage buffered production systems with discrete general Markovian machines. In 7th IFAC Conference on Manufacturing Modelling, Management, and Control, MIM 2013, pages 1638–1643, 2013. (doi:10.3182/20130619-3-RU-3018.00516)

[37]
Rod Cope. Noise reduction for content matching analysis results for protectable content. United States Patent 8,498,982, July 2013. Assignee: OpenLogic, Inc. (Broomfield, CO).

[38]
H.K. Cora, H. Turgut Uyar, and A.  c Sima Etaner-Uyar. HH-DSL: A domain specific language for selection hyper-heuristics. In 15th Annual Conference on Genetic and Evolutionary Computation, GECCO 2013, pages 1317–1324, 2013. (doi:10.1145/2464576.2482711)

[39]
E. Costello. Opening up to open source: Looking at how moodle was adopted in higher education. Open Learning, 28(3):187–200, 2013. (doi:10.1080/02680513.2013.856289)

[40]
J.J. Cusick. Durable ideas in software engineering: Concepts, methods and approaches from my virtual toolbox. Bentham Science Publishers Ltd., 2013. (doi:10.2174/97816080547631130101)

[41]
Z. Czirkos and G. Hosszú. Solution for the broadcasting in the Kademlia peer-to-peer overlay. Computer Networks, 57(8):1853–1862, 2013.

[42]
F. De Asıs López-Fuentes. An incentives model based on reputation for P2P systems. Journal of Telecommunications and Information Technology, 2013(4):92–101, 2013.

[43]
W.K. Dédzoé, P. Lamarre, R. Akbarinia, and P. Valduriez. As-soon-as-possible top-k query processing in P2P systems. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 7980:1–27, 2013. (doi:10.1007/978-3-642-40069-8-1)

[44]
T. Delot and M. Thilliez. Data access and ambient computing. Computer Science and Ambient Intelligence, pages 121–134, 2013. (doi:10.1002/9781118580974.ch7)

[45]
L. Demir, A. Diamantidis, D.T. Eliiyi, M.E.J. O'Kelly, C.T. Papadopoulos, A.K. Tsadiras, and S. Tunali. A comparison of three search algorithms for solving the buffer allocation problem in reliable production lines. In 7th IFAC Conference on Manufacturing Modelling, Management, and Control, MIM 2013, pages 1626–1631, 2013. (doi:10.3182/20130619-3-RU-3018.00345)

[46]
L. Demir, S. Tunali, D.T. Eliiyi, and A. Løkketangen. Two approaches for solving the buffer allocation problem in unreliable production lines. Computers and Operations Research, 40(10):2556–2563, 2013.

[47]
G. Dévai, D. Leskó, and M. Tejfel. Embedding and parsing combined for efficient language design. In 8th International Joint conference on Software Technologies, ICSOFT 2013, pages 244–250, 2013.

[48]
S. Dey, Y. Liu, S. Wang, and Y. Lu. Addressing response time of cloud-based mobile applications. In 1st International Workshop on Mobile Cloud Computing and Networking, MobileCloud 2013, pages 3–10, 2013. (doi:10.1145/2492348.2492359)

[49]
A.F. Dragoni. Health services through digital terrestrial television. Telehealth Networks for Hospital Services: New Methodologies, pages 207–227, 2013. (doi:10.4018/978-1-4666-2979-0.ch014)

[50]
H. E, X. Jin, J. Tong, M. Song, and X. Zhu. Measure method and metrics for network characteristics in service systems. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 7719 LNCS:180–193, 2013.

[51]
P. Eeles. Building a platform for innovation: Architecture and agile as key enablers. Agile Software Architecture: Aligning Agile Processes and Software Architectures, pages 315–333, 2013. (doi:10.1016/B978-0-12-407772-0.00012-5)

[52]
G. Einziger, R. Friedman, and E. Kibbar. Kaleidoscope: Adding colors to Kademlia. In 13th IEEE International Conference on Peer-to-Peer Computing, IEEE P2P 2013. IEEE Computer Society, 2013. (doi:10.1109/P2P.2013.6688703)

[53]
G. Epelde, E. Carrasco, G. Zimmermann, J. Alexandersson, R. Neßelrath, and M. Dubielzig. Universal remote console-based next-generation accessible television. Universal Access in the Information Society, 12(1):73–87, 2013.

[54]
G. Epelde, X. Valencia, E. Carrasco, J. Posada, J. Abascal, U. Diaz-Orueta, I. Zinnikus, and C. Husodo-Schulz. Providing universally accessible interactive services through TV sets: Implementation and validation with elderly users. Multimedia Tools and Applications, 67(2):497–528, 2013. (doi:10.1007/s11042-011-0949-0)

[55]
J. Fang, Y. Han, and Z. Zhao. A hierarchical service community model for cross-organizational service management. In 2013 International Conference on Service Science, ICSS 2013, pages 84–89, 2013. (doi:10.1109/ICSS.2013.57)

[56]
J. Feigenspan, C. Kästner, S. Apel, J. Liebig, M. Schulze, R. Dachselt, M. Papendieck, T. Leich, and G. Saake. Do background colors improve program comprehension in the #ifdef hell? Empirical Software Engineering, 18(4):699–745, 2013. (doi:10.1007/s10664-012-9208-x)

[57]
J.B. Fernández, B.S. De Abajo, J.M. Ramirez, E.G. Salcines, and C. de Castro Lozano. How the user behavior is affected by the use of secondary screens on interactive television: An affective usability dimension. Communications in Computer and Information Science, 278:557–562, 2013. (doi:10.1007/978-3-642-35879-1_70)

[58]
L.P. Ferreira, E.A. Gómez, G.P. Lourido, and B. Tjahjono. Modeling a complex production line using virtual cells. Lecture Notes in Electrical Engineering, 130 LNEE:361–373, 2013. (doi:10.1007/978-1-4614-2317-1_30)

[59]
J. Ferrer, F. Chicano, and E. Alba. Estimating software testing complexity. Information and Software Technology, 55(12):2125–2139, 2013. (doi:10.1016/j.infsof.2013.07.007)

[60]
C. Fieseler and M. Fleck. The pursuit of empowerment through social media: Structural social capital dynamics in CSR-blogging. Journal of Business Ethics, 118(4):759–775, 2013. (doi:10.1007/s10551-013-1959-9)

[61]
J. Fitsanakis. Digital Sparta: Information operations and cyber-warfare in Greece. Cyber Conflict: Competing National Perspectives, pages 135–164, 2013. (doi:10.1002/9781118562666.ch4)

[62]
S. Frey, W. Hasselbring, and B. Schnoor. Automatic conformance checking for migrating software systems to cloud infrastructures and platforms. Journal of software: Evolution and Process, 25(10):1089–1115, 2013. (doi:10.1002/smr.582)

[63]
J. Gao and W. Ding. A sensory data integrating bus under the intelligent transportation environment. In 2013 10th Web Information System and Application Conference, WISA 2013, pages 328–332. IEEE Computer Society, 2013. (doi:10.1109/WISA.2013.68)

[64]
M. Gardner, P. Sathre, W.-C. Feng, and G. Martinez. Characterizing the challenges and evaluating the efficacy of a CUDA-to-OpenCL translator. Parallel Computing, 39(12):769–786, 2013. (doi:10.1016/j.parco.2013.09.003)

[65]
A. Garrido and R. Johnson. Embracing the C preprocessor during refactoring. Journal of software: Evolution and Process, 25(12):1285–1304, 2013. (doi:10.1002/smr.1603)

[66]
T. Gavrielides and V. Artinopoulou. Restorative justice and violence against women: Comparing greece and the united kingdom. Asian Journal of Criminology, 8(1):25–40, 2013.

[67]
E. Gebennini, A. Grassi, C. Fantuzzi, S.B. Gershwin, and I.C. Schick. Discrete time model for two-machine one-buffer transfer lines with restart policy. Annals of Operations Research, 209(1):41–65, 2013. (doi:10.1007/s10479-011-0868-5)

[68]
M. Geva and A. Herzberg. DOT-COM: Decentralized online trading and commerce. 8th International Workshop on Security and Trust Management, STM 2012, 7783 LNCS:177–192, 2013. (doi:10.1007/978-3-642-38004-4_12)

[69]
H.R. Ghaeini, B. Akbari, and B. Barekatain. An adaptive packet loss recovery method for peer-to-peer video streaming over wireless mesh network. Lecture Notes in Electrical Engineering, 236 LNEE:713–721, 2013.

[70]
G. Ghezzi and H.C. Gall. Replicating mining studies with SOFAS. In 10th International Working Conference on Mining Software Repositories, MSR 2013, pages 363–372, 2013. (doi:10.1109/MSR.2013.6624050)

[71]
M. Ghorbani, M.R. Meybodi, and A.M. Saghiri. A new version of k-random walks algorithm in peer-to-peer networks utilizing learning automata. In 2013 5th Conference on Information and Knowledge Technology, IKT 2013, pages 1–6, 2013. (doi:10.1109/IKT.2013.6620028)

[72]
M. Ghorbani, M.R. Meybodi, and A.M. Saghiri. A novel self-adaptive search algorithm for unstructured peer-to-peer networks utilizing learning automata. In 2013 3rd Joint Conference of AI and Robotics and 5th RoboCup Iran Open International Symposium: Learning, Glorious Future, RIOS 2013, 2013. (doi:10.1109/RIOS.2013.6595306)

[73]
Y. Gil and V. Ratnakar. Knowledge capture in the wild: A perspective from semantic wiki communities. In 7th International Conference on Knowledge Capture: "Knowledge Capture in the Age of Massive Web Data", K-CAP 2013, 2013. (doi:10.1145/2479832.2479858)

[74]
Y. Gil, A. Knight, K. Zhang, L. Zhang, V. Ratnakar, and R. Sethi. The democratization of semantic properties: An analysis of semantic wikis. In 2013 IEEE 7th International Conference on Semantic Computing, ICSC 2013, pages 206–211, 2013. (doi:10.1109/ICSC.2013.44)

[75]
M. Gligoric, F. Behrang, Y. Li, J. Overbey, M. Hafiz, and D. Marinov. Systematic testing of refactoring engines on real software projects. 27th European Conference on Object-Oriented Programming, ECOOP 2013, 7920 LNCS:629–653, 2013. (doi:10.1007/978-3-642-39038-8-26)

[76]
M. Goeminne, M. Claes, and T. Mens. A historical dataset for the GNOME ecosystem. In 10th International Working Conference on Mining Software Repositories, MSR 2013, pages 225–228, 2013. (doi:10.1109/MSR.2013.6624032)

[77]
Valery Golender, Ido Ben Moshe, and Shlomo Wygodny. System and method for software diagnostics using a combination of visual and dynamic tracing. United States Patent 8,504,994, August 2013. Assignee: Identify Software, Ltd. (Petach-Tikva, IL).

[78]
J.M. Gonzalez-Barahona, D. Izquierdo-Cortazar, S. Maffulli, and G. Robles. Understanding how companies interact with free software communities. IEEE Software, 30(5):38–45, 2013. (doi:10.1109/MS.2013.95)

[79]
J. Gu, W. Wang, A. Huang, and H. Shan. Proactive storage at caching-enable base stations in cellular networks. In 2013 IEEE 24th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications, PIMRC 2013, pages 1543–1547, 2013. (doi:10.1109/PIMRC.2013.6666387)

[80]
Y. Guo, Z.-X. Zhao, and W. Wang. Complexity analysis of software based on function-call graph. In 19th International Conference on Industrial Engineering and Engineering Management, pages 269–277, 2013. (doi:10.1007/978-3-642-37270-4_26)

[81]
Satya V. Gupta and Prashant Shenoy. System and methods for run time detection and correction of memory corruption. United States Patent 8,510,596, August 2013. Assignee: Virsec Systems, Inc. (Acton, MA).

[82]
T.N. Gutierrez, L. Ciarletta, and V. Chevrier. Multi-agent simulation based governance of complex systems: Architecture and example implementation on free-riding. In 2013 Mexican International Conference on Computer Science, ENC 2013, pages 89–98. IEEE Computer Society, 2013. (doi:10.1109/ENC.2013.19)

[83]
M. Hammad, M. Hammad, and H. Bani-Salameh. Identifying designers and their design knowledge. International Journal of Software Engineering and its Applications, 7(6):277–288, 2013. (doi:10.14257/ijseia.2013.7.6.23)

[84]
S. Harrer, J. Lenhard, and G. Wirtz. Open source versus proprietary software in service-orientation: The case of BPEL engines. 11th International Conference on Service-Oriented Computing, ICSOC 2013, 8274 LNCS:99–113, 2013. (doi:10.1007/978-3-642-45005-1_8)

[85]
T. Hasegawa. A survey of the research on future internet and network architectures. IEICE Transactions on Communications, E96-B(6):1385–1401, 2013.

[86]
K.A. Hawick. Fluent interfaces to a java-based internal domain-specific languages for graph generation and analysis. In IASTED Multiconferences - Proceedings of the IASTED International Conference on Software Engineering, SE 2013, pages 752–759, 2013.

[87]
E.C.S. Hayashi, L.S.G. Piccolo, and M.C.C. Baranauskas. Perspectives on the evaluation of affective quality in social software. International Journal of Web Based Communities, 9(4):519–534, 2013. (doi:10.1504/IJWBC.2013.057217)

[88]
P. He, B. Li, Y. Ma, and L. He. Using software dependency to bug prediction. Mathematical Problems in Engineering, 2013, 2013. (doi:10.1155/2013/869356)

[89]
Q. He, Y. Wang, Y. Linlin, and Q.K. Key. P2PRPIPS: A P2P and reverse proxy based web intrusion protection system. Research Journal of Applied Sciences, Engineering and Technology, 5(7):2439–2444, 2013.

[90]
B. Henderson-Sellers, T. Clark, and C. Gonzalez-Perez. On the search for a level-agnostic modelling language. 25th International Conference on Advanced Information Systems Engineering, CAiSE 2013, 7908 LNCS:240–255, 2013. (doi:10.1007/978-3-642-38709-8_16)

[91]
I.M.T. Hernandez, A.M. Viveros, and E.H. Rubio. Analysis for the design of open applications on mobile devices. In 23rd International Conference on Electronics, Communications and Computing, CONIELECOMP 2013, pages 126–131, 2013. (doi:10.1109/CONIELECOMP.2013.6525772)

[92]
I. Herraiz, D. Rodriguez, G. Robles, and J.M. Gonzalez-Barahona. The evolution of the laws of software evolution: A discussion based on a systematic literature review. ACM Computing Surveys, 46(2), 2013. (doi:10.1145/2543581.2543595)

[93]
B. Hoisl, S. Sobernig, and M. Strembeck. Higher-order rewriting of model-to-text templates for integrating domain-specific modeling languages. In MODELSWARD 2013 - Proceedings of the 1st International Conference on Model-Driven Engineering and Software Development, pages 49–61, 2013.

[94]
H. Holm, M. Ekstedt, and T. Sommestad. Effort estimates on web application vulnerability discovery. In Proceedings of the Annual Hawaii International Conference on System Sciences, pages 5029–5038, 2013.

[95]
Z.-K. Hu, X.-L. Zheng, Y.-F. Wu, and D.-R. Chen. Product recommendation algorithm based on users' reviews mining. Zhejiang Daxue Xuebao (Gongxue Ban)/Journal of Zhejiang University (Engineering Science), 47(8):1475–1485, 2013. (doi:10.3785/j.issn.1008-973X.2013.08.023)

[96]
H. Huang, J. Xiao, Q. Yang, Q. Wang, and H. Wu. Creating process-agents incrementally by mining process asset library. Information Sciences, 233:183–199, 2013.

[97]
X. Huang, X. Ding, C.P. Lee, T. Lu, and N. Gu. Meanings and boundaries of scientific software sharing. In Proceedings of the ACM Conference on Computer Supported Cooperative Work, CSCW, pages 423–434, 2013.

[98]
X. Huang, T. Lu, X. Ding, T. Liu, and N. Gu. A provenance-based solution for software selection in scientific software sharing. In 2013 IEEE 17th International Conference on Computer Supported Cooperative Work in Design, CSCWD 2013, pages 172–177, 2013. (doi:10.1109/CSCWD.2013.6580958)

[99]
X. Huang, T. Zhao, and Y. Cao. PIR: A domain specific language for multimedia retrieval. In 15th IEEE International Symposium on Multimedia, ISM 2013, pages 359–363, 2013. (doi:10.1109/ISM.2013.68)

[100]
W. Hummer, P. Gaubatz, M. Strembeck, U. Zdun, and S. Dustdar. Enforcement of entailment constraints in distributed service-based business processes. Information and Software Technology, 55(11):1884–1903, 2013. (doi:10.1016/j.infsof.2013.05.001)

[101]
M.A. Ismail, T. Altaf, and S.H. Mirza. MCSMC: A new parallel multi-level cache simulator for multi-core processors. In 2013 Saudi International Electronics, Communications and Photonics Conference, SIECPC 2013, 2013. (doi:10.1109/SIECPC.2013.6550746)

[102]
B. Jay and J. Vergara. Growing a language in pattern calculus. In 2013 International Symposium on Theoretical Aspects of Software Engineering, TASE 2013, pages 233–240, 2013. (doi:10.1109/TASE.2013.37)

[103]
J. Jiang, L. Zhang, and L. Li. Understanding project dissemination on a social coding site. In 20th Working Conference on Reverse Engineering, WCRE 2013, pages 132–141, 2013. (doi:10.1109/WCRE.2013.6671288)

[104]
M. Jin, L. Huang, and P. Ren. RFID based space-time navigation scheduling for low-carbon ecotourism management system. International Journal of Applied Environmental Sciences, 8(20):2533–2546, 2013.

[105]
M. Johnson. Buy-side barriers to e-business technology in the healthcare sector. International Journal of Healthcare Technology and Management, 14(1-2):110–142, 2013. (doi:10.1504/IJHTM.2013.055090)

[106]
M. Johnson. Critical success factors for B2B e-markets: A strategic fit perspective. Marketing Intelligence and Planning, 31(4):337–366, 2013.

[107]
M. Johnson. Critical success factors for B2B e-markets: A strategic fit perspective. Marketing Intelligence and Planning, 31(6):698–727, 2013. (doi:10.1108/MIP-10-2013-001)

[108]
G. Kakarontzas, E. Constantinou, A. Ampatzoglou, and I. Stamelos. Layer assessment of object-oriented software: A metric facilitating white-box reuse. Journal of Systems and Software, 86(2):349–366, 2013. (doi:10.1016/j.jss.2012.08.041)

[109]
S.H. Kannangara and W.M.J.I. Wijayanayake. Impact of refactoring on external code quality improvement: An empirical evaluation. In 2013 International Conference on Advances in ICT for Emerging Regions, ICTer 2, pages 60–67. IEEE Computer Society, 2013. (doi:10.1109/ICTer.2013.6761156)

[110]
M. Kas, L. Richard Carley, and K.M. Carley. Monitoring social centrality for peer-to-peer network protection. IEEE Communications Magazine, 51(12):155–161, 2013. (doi:10.1109/MCOM.2013.6685771)

[111]
A. Kasoju, K. Petersen, and M.V. Mäntylä. Analyzing an automotive testing process with evidence-based software engineering. Information and Software Technology, 55(7):1237–1259, 2013.

[112]
R. Kawahara, K. Ono, T. Nakada, H. Okabayashi, K. Hisazumi, T. Nakanishi, A. Fukuda, Y. Sakamoto, and T. Nagano. A model transformation method for evaluation of non-functional requirements of an embedded system architecture. Computer Software, 30(1):203–210, 2013.

[113]
Angelos D. Keromytis and Salvatore J. Stolfo. Methods, media, and systems for detecting an anomalous sequence of function calls. United States Patent 8,489,931, July 2013. Assignee: The Trustees of Columbia University in the City of New York (New York, NY).

[114]
Z. Khanam and S.A.M. Rizvi. An evaluative study of software refactoring in procedural programming. In 2013 World Congress on Engineering and Computer Science, WCECS 2013, volume 1, pages 102–107. Newswood Limited, 2013.

[115]
V.Y. Kharitonov. A software architecture for high-level development of component-based distributed virtual reality systems. In 2013 IEEE 27th International Parallel and Distributed Processing Symposium Workshops and PhD Forum, IPDPSW 2013, pages 696–705, 2013. (doi:10.1109/COMPSAC.2013.111)

[116]
S. Khatoon, G. Li, and A. Mahmood. Comparison and evaluation of source code mining tools and techniques: A qualitative approach. Intelligent Data Analysis, 17(3):459–484, 2013.

[117]
J. Kim and S. Lee. Efficient and flexible storage visualization system based on distributed hash tables. Information (Japan), 16(1 A):383–392, 2013.

[118]
B. Kitts, D. Au, and B. Burdick. A high-dimensional set top box ad targeting algorithm including experimental comparisons to traditional tv algorithms. In 13th IEEE International Conference on Data Mining, ICDM 2013, pages 370–378, 2013. (doi:10.1109/ICDM.2013.169)

[119]
M. Klotzbücher and H. Bruyninckx. A lightweight, composable metamodelling language for specification and validation of internal domain specific languages. 8th International Workshop on Model-Based Methodologies for Pervasive and Embedded Software, MOMPES 2012, 7706 LNCS:58–68, 2013. (doi:10.1007/978-3-642-38209-3_4)

[120]
E. Kocaguneli, T. Zimmermann, C. Bird, N. Nagappan, and T. Menzies. Distributed development considered harmful? In 2013 35th International Conference on Software Engineering, ICSE 2013, pages 882–890, 2013. (doi:10.1109/ICSE.2013.6606637)

[121]
S.S. Kolesnikov, S. Apel, N. Siegmund, S. Sobernig, C. Kästner, and S. Senkaya. Predicting quality attributes of software product lines using software and network measures and sampling. In ACM International Conference Proceeding Series, 2013.

[122]
T. Koskela, O. Kassinen, E. Harjula, and M. Ylianttila. P2P group management systems: A conceptual analysis. ACM Computing Surveys, 45(2), 2013.

[123]
S.D. Larson and M.E. Martone. Neurolex.org: An online framework for neuroscience knowledge. Frontiers in Neuroinformatics, 7(AUG), 2013. (doi:10.3389/fninf.2013.00018)

[124]
H.J. Lee, B.-K. Seo, and E. Seo. A git source repository analysis tool based on a novel branch-oriented approach. In 2013 4th International Conference on Information Science and Applications, ICISA 2013, 2013. (doi:10.1109/ICISA.2013.6579457)

[125]
M.B. Lehmann, R.S. Antunes, and M.P. Barcellos. Exploring your neighborhood: Comparing connection strategies in swarming networks through evolving graphs. In 13th IEEE International Conference on Peer-to-Peer Computing, IEEE P2P 2013. IEEE Computer Society, 2013. (doi:10.1109/P2P.2013.6688701)

[126]
T.S. Lendvay, B. Hannaford, and R.M. Satava. Future of robotic surgery. Cancer Journal (United States), 19(2):109–119, 2013.

[127]
J. Lenhard, S. Harrer, and G. Wirtz. Measuring the installability of service orchestrations using the SQuaRE method. In 6th IEEE International Conference on Service-Oriented Computing and Applications, SOCA 2013, pages 118–125. IEEE Computer Society, 2013. (doi:10.1109/SOCA.2013.30)

[128]
Nicola Jane Lessing, Christophe Schnelle, and Peter Mariani. Maltweb multi-axis viewing interface and higher level scoping. United States Patent 8,386,484, February 2013. Assignee: TimeBase Pty Limited (Sydney, New South Wales, AU).

[129]
L. Li and H. Leung. Predicting fault-proneness of object-oriented system developed with agile process using learned bayesian network. In 15th International Conference on Enterprise Information Systems, ICEIS 2013, volume 2, pages 5–16, 2013.

[130]
W. Li, Y. Meng, and L.-F. Kwok. Enhancing trust evaluation using intrusion sensitivity in collaborative intrusion detection networks: Feasibility and challenges. In 9th International Conference on Computational Intelligence and Security, CIS 2013, pages 518–522, 2013. (doi:10.1109/CIS.2013.115)

[131]
Y. Li, H.M. Jiang, and T. Hu. A study on distributed license authorization system based on threshold secret sharing. 2013 International Conference on Vehicle and Mechanical Engineering and Information Technology, VMEIT 2013, 380-384:2749–2752, 2013. (doi:10.4028/www.scientific.net/AMM.380-384.2749)

[132]
Y. Li, C.-H. Tan, and X. Yang. It is all about what we have: A discriminant analysis of organizations' decision to adopt open source software. Decision Support Systems, 56(1):56–62, 2013. (doi:10.1016/j.dss.2013.05.006)

[133]
C.-Y. Lien, T.-L. Yang, C.-H. Hsiao, and T. Kao. Realizing digital signatures for medical imaging and reporting in a PACS environment. Journal of Medical Systems, 37(1), 2013. (doi:10.1007/s10916-012-9924-1)

[134]
S.-J. Lin and W.-H. Chung. An efficient (n,k) information dispersal algorithm based on fermat number transforms. IEEE Transactions on Information Forensics and Security, 8(8):1371–1383, 2013. (doi:10.1109/TIFS.2013.2270892)

[135]
C.-S. Lin. Balanced dynamic buffering for scalable video-on-demand streaming on peer-to-peer networks. Multimedia Tools and Applications, 62(3):701–718, 2013. (doi:10.1007/s11042-011-0872-4)

[136]
M. Lindberg. Feedback-based cooperative content distribution for mobile networks. In 8th ACM Int. Workshop on Performance Monitoring, Measurement, and Evaluation of Heterogeneous Wireless and Wired Networks, PM2HW2N 2013, Held in Conjunction with the 16th ACM Int. Conf. on MSWiM 2013, pages 107–115, 2013. (doi:10.1145/2512840.2512855)

[137]
M. Liu, T. Leppanen, E. Harjula, Z. Ou, A. Ramalingam, M. Ylianttila, and T. Ojala. Distributed resource directory architecture in machine-to-machine communications. In 2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications, WiMob 2013, pages 319–324, 2013. (doi:10.1109/WiMOB.2013.6673379)

[138]
M. Liu, T. Leppanen, E. Harjula, Z. Ou, M. Ylianttila, and T. Ojala. Distributed resource discovery in the machine-to-machine applications. In 10th IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, MASS 2013, pages 411–412, 2013. (doi:10.1109/MASS.2013.46)

[139]
P. Liu, T.F. LaPorta, and K. Kotapati. Cellular network security. In Network and System Security: Second Edition, pages 319–351. Elsevier Inc., 2013. (doi:10.1016/B978-0-12-416689-9.00011-3)

[140]
P. Liu, T.F. LaPorta, and K. Kotapati. Cellular network security. In Computer and Information Security Handbook, pages 323–343. Elsevier Inc., 2013. (doi:10.1016/B978-0-12-394397-2.00017-9)

[141]
A. Logvinenko, C. Gremzow, and D. Tutsch. RecMIN: A reconfiguration architecture for network on chip. In 2013 8th International Workshop on Reconfigurable and Communication-Centric Systems-on-Chip, ReCoSoC 2013, 2013. (doi:10.1109/ReCoSoC.2013.6581547)

[142]
J. Loveland and J. Reagle. Wikipedia and encyclopedic production. New Media and Society, 15(8):1294–1311, 2013. (doi:10.1177/1461444812470428)

[143]
G. Lu and K. Lü. Logical trees: An essential method of parsing SQL statement with semantic analysis. International Journal of Advancements in Computing Technology, 5(1):270–278, 2013. (doi:10.4156/ijact.vol5.issue1.30)

[144]
T. Lukman, G. Godena, J. Gray, M. Heričko, and S. Strmčnik. Model-driven engineering of process control software — beyond device-centric abstractions. Control Engineering Practice, 21(8):1078–1096, 2013. (doi:10.1016/j.conengprac.2013.03.013)

[145]
H.J. Macho and G. Robles. Preliminary lessons from a software evolution analysis of moodle. In 1st International Conference on Technological Ecosystem for Enhancing Multiculturality, TEEM 2013, pages 157–161, 2013. (doi:10.1145/2536536.2536560)

[146]
A. Malatras, F. Peng, and B.A. Hirsbrunner. Energy-efficient peer-to-peer networking and overlays. In Handbook of Green Information and Communication Systems, pages 513–540. Elsevier Inc., 2013. (doi:10.1016/B978-0-12-415844-3.00020-6)

[147]
D. Mancl and S. Fraser. Software tools research: SPLASH panel discussion. IEEE Software, 30(2):16–17, 2013.

[148]
V. Mansilla and M.-C. Marcos. Experiencia de usuario en televisión conectada: Un estudio con usuarios. Profesional de la Informacion, 22(2):122–127, 2013.

[149]
M. Marchetti and M. Colajanni. Cooperative approaches to siem and intrusion detection. Advances in Security Information Management: Perceptions and Outcomes, pages 79–116, 2013.

[150]
A.H. Mardani and M. Sangari. An analysis of the availability and persistence of web citations in Iranian LIS journals. International Journal of Information Science and Management, 11(1):29–42, 2013.

[151]
J. Marlow and L. Dabbish. Activity traces and signals in software developer recruitment and hiring. In Proceedings of the ACM Conference on Computer Supported Cooperative Work, CSCW, pages 145–155, 2013.

[152]
J.M. Marquès, D. Lazaro, A.A. Juan, X. Vilajosana, M. Domingo, and J. Jorba. Planetlab@UOC: A real lab over the internet to experiment with distributed systems. Computer Applications in Engineering Education, 21(2):265–275, 2013.

[153]
M. Martin Bel, O. Dugeon, J. Fasson, A. Abou El Kalam, M. Maachaoui, B. Paillassa, F.J. Ramón Salguero, and W. Werapun. Service management. Digital Home Networking, pages 259–307, 2013. (doi:10.1002/9781118602829.ch8)

[154]
C. Mateos, M. Crasso, A. Zunino, and J.L. Ordiales Coscia. Revising WSDL documents: Why and how, part 2. IEEE Internet Computing, 17(5):46–53, 2013. (doi:10.1109/MIC.2013.4)

[155]
C.A. Mattmann. Computing: A vision for data science. Nature, 493(7433):473–475, 2013. (doi:10.1038/493473a)

[156]
L. Meneses, H. Barthwal, S. Singh, R. Furuta, and F. Shipman. Restoring semantically incomplete document collections using lexical signatures. International Conference on Theory and Practice of Digital Libraries, TPDL 2013, 8092 LNCS:321–332, 2013. (doi:10.1007/978-3-642-40501-3_33)

[157]
J. Mercadal, Z. Drey, and C. Consel. Denotational semantics of a user-oriented, domain-specific language. In Semantics, Abstract Interpretation, and Reasoning About Programs: Essays Dedicated to David A. Schmidt on the Occasion of His 60th Birthday, volume 129, pages 229–249, 2013. (doi:10.4204/EPTCS.129.14)

[158]
M. Mernik. An object-oriented approach to language compositions for software language engineering. Journal of Systems and Software, 86(9):2451–2464, 2013. (doi:10.1016/j.jss.2013.04.087)

[159]
O. Mizuno. On effects of tokens in source code to accuracy of fault-prone module prediction. In 2013 17th International Computer Science and Engineering Conference, ICSEC 2013, pages 103–108, 2013. (doi:10.1109/ICSEC.2013.6694761)

[160]
H.S. Moon, J.K. Kim, and Y.U. Ryu. A sequence-based filtering method for exhibition booth visit recommendations. International Journal of Information Management, 33(4):620–626, 2013.

[161]
A. Mouhtaropoulos, P. Dimotikalis, and C.-T. Li. Applying a digital forensic readiness framework: Three case studies. In 2013 13th IEEE International Conference on Technologies for Homeland Security, HST 2013, pages 217–223, 2013. (doi:10.1109/THS.2013.6699003)

[162]
H. Muhammad, F. Mascarenhas, and R. Ierusalimschy. LuaRocks — a declarative and extensible package management system for lua. 17th Brazilian Symposium on Programming Languages, SBLP 2013, 8129 LNCS:16–30, 2013. (doi:10.1007/978-3-642-40922-6_2)

[163]
Elissa E. S. Murphy, Yan V. Leshinsky, and John D. Mehr. Dynamic placement of replica data. United States Patent 8,560,639, October 2013. Assignee: Microsoft Corporation (Redmond, WA).

[164]
E. Murphy-Hill, T. Zimmermann, C. Bird, and N. Nagappan. The design of bug fixes. In 2013 35th International Conference on Software Engineering, ICSE 2013, pages 332–341, 2013. (doi:10.1109/ICSE.2013.6606579)

[165]
S. Nadi, C. Dietrich, R. Tartler, R.C. Holt, and D. Lohmann. Linux variability anomalies: What causes them and how do they get fixed? In 10th International Working Conference on Mining Software Repositories, MSR 2013, pages 111–120, 2013. (doi:10.1109/MSR.2013.6624017)

[166]
H. Naguib, N. Narayan, B. Brügge, and D. Helal. Bug report assignee recommendation using activity profiles. In 10th International Working Conference on Mining Software Repositories, MSR 2013, pages 22–30, 2013. (doi:10.1109/MSR.2013.6623999)

[167]
A. Narayanan, Y. Chen, S. Pang, and B. Tao. The effects of different representations on static structure analysis of computer malware signatures. The Scientific World Journal, 2013, 2013. (doi:10.1155/2013/671096)

[168]
B.S. Neto, V.T. Da Silva, M. Ribeiro, E. Costa, and C. Lucena. Using jason to develop refactoring agents. In 2nd Brazilian Conference on Intelligent Systems, BRACIS 2013, pages 44–50. IEEE Computer Society, 2013. (doi:10.1109/BRACIS.2013.16)

[169]
P. Nistala and P. Kumari. An approach to carry out consistency analysis on requirements: Validating and tracking requirements through a configuration structure. In 2013 21st IEEE International Requirements Engineering Conference, RE 2013, pages 320–325. IEEE Computer Society, 2013. (doi:10.1109/RE.2013.6636737)

[170]
R. Olanda, M. Peŕez, and J.M. Ordunã. Hybrid P2P schemes for remote terrain interactive visualization systems. Future Generation Computer Systems, 29(6):1522–1532, 2013. (doi:10.1016/j.future.2012.11.002)

[171]
J.L. Ordiales Coscia, C. Mateos, M. Crasso, and A. Zunino. Anti-pattern free code-first web services for state-of-the-art Java WSDL generation tools. International Journal of Web and Grid Services, 9(2):107–126, 2013.

[172]
Raymond E. Ozzie, Jack E. Ozzie, George P. Moromisato, Paresh S. Suthar, Raman Narayanan, and Matthew S. Augustine. Data synchronization and sharing relationships. United States Patent 8,370,423, February 2013. Assignee: Microsoft Corporation (Redmond, WA).

[173]
Raymond E. Ozzie, Jack E. Ozzie, Paresh S. Suthar, Raman Naravanan, and Matthew S. Augustine. Clipboard augmentation with references. United States Patent 8,453,066, May 2013. Assignee: Microsoft Corporation (Redmond, WA).

[174]
T.Y. Pang and S. Maslov. Universal distribution of component frequencies in biological and technological systems. Proceedings of the National Academy of Sciences of the United States of America, 110(15):6235–6239, 2013.

[175]
E. Pantano. Ubiquitous retailing innovative scenario: From the fixed point of sale to the flexible ubiquitous store. Journal of Technology Management and Innovation, 8(2):84–92, 2013.

[176]
D. Papadimitriou, D. Colle, P. Audenaert, and P. Demeester. Geometric information routing. In 2013 IEEE International Conference on Advanced Networks and Telecommunications Systems, ANTS 2013. IEEE Computer Society, 2013. (doi:10.1109/ANTS.2013.6802893)

[177]
C.T. Papadopoulos, M.E.J. Okelly, and A.K. Tsadiras. A DSS for the buffer allocation of production lines based on a comparative evaluation of a set of search algorithms. International Journal of Production Research, 51(14):4175–4199, 2013. (doi:10.1080/00207543.2012.752585)

[178]
P.M. Papadopoulos, I.G. Stamelos, and A. Meiszner. Enhancing software engineering education through open source projects: Four years of students' perspectives. Education and Information Technologies, 18(2):381–397, 2013.

[179]
G. Paschalidou, E. Stiakakis, and A. Chatzigeorgiou. An application of data envelopment analysis to software quality assessment. In 6th Balkan Conference in Informatics, BCI 2013, pages 228–235, 2013. (doi:10.1145/2490257.2490264)

[180]
S. Pavalkis, L. Nemuraite, and R. Butkiene. Derived properties: A user friendly approach to improving model traceability. Information Technology and Control, 42(1):48–60, 2013.

[181]
D.J. Pearce. Sound and complete flow typing with unions, intersections and negations. 14th International Conference on Verification, Model Checking, and Abstract Interpretation, VMCAI 2013, 7737 LNCS:335–354, 2013. (doi:10.1007/978-3-642-35873-9_21)

[182]
Marcus Peinado and Weidong Cui. Malware investigation by analyzing computer memory. United States Patent 8,566,944, October 2013. Assignee: Microsoft Corporation (Redmond, WA).

[183]
E. Perel and U. Yechiali. On customers acting as servers. Asia-Pacific Journal of Operational Research, 30(5), 2013. (doi:10.1142/S021759591350019X)

[184]
E. Pérez-Cortés and H. Sato. On the impact of path redundancy awareness in evolutionary P2P networking. Journal of Advanced Computational Intelligence and Intelligent Informatics, 17(6):872–882, 2013.

[185]
F. Peters, T. Menzies, and A. Marcus. Better cross company defect prediction. In 10th International Working Conference on Mining Software Repositories, MSR 2013, pages 409–418, 2013. (doi:10.1109/MSR.2013.6624057)

[186]
S. Prstacic and M. Zagar. A model for web application and web service peer-to-peer hosting network architecture. In 35th International Conference on Information Technology Interfaces, ITI 2013, pages 335–340, 2013.

[187]
A.S.M.M. Rahman and A. El Saddik. Mobile pointme-based spatial haptic interaction with annotated media for learning purposes. Multimedia Systems, 19(2):131–149, 2013.

[188]
A. Rastogi and A. Sureka. Samikshaumbra: Contribution and performance assessment of software maintenance professionals by mining software repositories. In 2013 20th Asia-Pacific Software Engineering Conference, APSEC 2013, pages 170–175. IEEE Computer Society, 2013. (doi:10.1109/APSEC.2013.134)

[189]
A. Rastogi, A. Gupta, and A. Sureka. Samiksha: Mining issue tracking system for contribution and performance assessment. In ACM International Conference Proceeding Series, pages 13–22, 2013.

[190]
N. Ratti and P. Kaur. Case study: Version control in component-based systems. In Designing, Engineering, and Analyzing Reliable and Efficient Software, pages 283–297. IGI Global, 2013. (doi:10.4018/978-1-4666-2958-5.ch016)

[191]
A.J. Reinoso, J.M. Gonzalez-Barahona, R. Muñoz Mansilla, and I. Herraiz. Temporal characterization of the requests to Wikipedia. Studies in Computational Intelligence, 439:71–89, 2013. (doi:10.1007/978-3-642-31546-6-5)

[192]
H. Ren, W. Mo, S. Liu, D. Li, Y. Sun, and G. Zhao. Code automation technology based COSINE software development. In ASME 2013 Power Conference, POWER 2013, volume 2. American Society of Mechanical Engineers, 2013. (doi:10.1115/POWER2013-98109)

[193]
H. Ren, W.-T. Mo, G. Zhao, and S. Liu. Automation algorithm of COSINE software code framework based on breadth first search. Yuanzineng Kexue Jishu/Atomic Energy Science and Technology, 47(SUPPL.):717–720, 2013. (doi:10.7538/yzk.2013.47.S1.0717)

[194]
D. Rodriguez, R. Ruiz, J.C. Riquelme, and R. Harrison. A study of subgroup discovery approaches for defect prediction. Information and Software Technology, 55(10):1810–1822, 2013. (doi:10.1016/j.infsof.2013.05.002)

[195]
G. Samarthyam, G. Suryanarayana, T. Sharma, and S. Gupta. MIDAS: A design quality assessment method for industrial software. In 2013 35th International Conference on Software Engineering, ICSE 2013, pages 911–920, 2013. (doi:10.1109/ICSE.2013.6606640)

[196]
B.T. Sampath Kumar and D. Vinay Kumar. HTTP 404-page (not) found: Recovery of decayed url citations. Journal of Informetrics, 7(1):145–157, 2013. (doi:10.1016/j.joi.2012.09.007)

[197]
L. Sang-Hyun, J.-G. Lee, and M. Kyung-Il. Smart home security system using multiple ANFIS. International Journal of Smart Home, 7(3):121–132, 2013.

[198]
M. Sarrab and O.M.H. Rehman. Selection criteria of open source software: First stage for adoption. International Journal of Information Processing and Management, 4(4):51–58, 2013. (doi:10.4156/ijipm.vol4.issue4.6)

[199]
Christoph Schnelle and Geoffrey John Nolan. Mapping of data from XML to SQL. United States Patent 8,396,901, March 2013. Assignee: Timebase Pty Limited (Sydney, New South Wales, AU).

[200]
B. Schoenmakers, N. Van Den Broek, I. Nagy, B. Vasilescu, and A. Serebrenik. Assessing the complexity of upgrading software modules. In 20th Working Conference on Reverse Engineering, WCRE 2013, pages 433–440, 2013. (doi:10.1109/WCRE.2013.6671319)

[201]
P. Sendın-Raña, F.J. González-Castaño, F. Gómez-Cuba, R. Asorey-Cacheda, and J.M. Pousada-Carballo. Improving management performance of P2PSIP for mobile sensing in wireless overlays. Sensors (Switzerland), 13(11):15364–15384, 2013. (doi:10.3390/s131115364)

[202]
S. Shuraida and H. Barki. The influence of analyst communication in IS projects. Journal of the Association of Information Systems, 14(9):482–520, 2013.

[203]
Stylianos Sidiroglou, Angelos D. Keromytis, and Salvatore J. Stolfo. Systems, methods, and media protecting a digital data processing device from attack. United States Patent 8,407,785, March 2013. Assignee: The Trustees of Columbia University in the City of New York (New York, NY).

[204]
Q.D. Soetens, J. Perez, and S. Demeyer. An initial investigation into change-based reconstruction of floss-refactorings. In 29th IEEE International Conference on Software Maintenance, ICSM 2013, pages 384–387, 2013. (doi:10.1109/ICSM.2013.53)

[205]
A. Solano, C. Collazos, C. Rusu, and L. Merchán. Evaluating the usability of interactive digital television applications. In 2013 10th International Conference on Information Technology: New Generations, ITNG 2013, pages 127–132, 2013. (doi:10.1109/ITNG.2013.24)

[206]
G. Song, B. Yang, Z. Wu, J. Chuai, and Y. Zheng. ROIN: Reputation-oriented inverted indexing for the P2P network. Journal of Supercomputing, 64(3):968–986, 2013. (doi:10.1007/s11227-013-0878-y)

[207]
M.E. Sosa-Rodrıguez and E. Pérez-Cortés. The evolution of cooperation in file sharing P2P systems: First steps. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 7630 LNAI(PART 2):151–162, 2013.

[208]
David Howard Spencer and Darla Renae Agard. Systems, methods and software for researching statutory information. United States Patent 8,458,190, June 2013. Assignee: Thomson Reuters Global Resources (Baar, CH).

[209]
Varadarajan Sridhar, Ravi G. Amur, and Korrapati Kalyane Rao. System and method for automated safe reprogramming of software radios. United States Patent 8,347,108, January 2013. Assignee: Satyam Computer Services Limited of Mayfair Centre (Secunderabad, IN).

[210]
D. Stingl, C. Groß, and K. Saller. Decentralized monitoring in peer-to-peer systems. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 7847:81–111, 2013. (doi:10.1007/978-3-642-38673-2-6)

[211]
Salvatore J. Stolfo, Angelos D. Keromytis, and Stylianos Sidiroglou. Methods, media, and systems for detecting anomalous program executions. United States Patent 8,601,322, December 2013. Assignee: The Trustees of Columbia University in the City of New York (New York, NY).

[212]
Z. Sun, S. Pan, Y.C. Su, and P. Zhang. Headio: Zero-configured heading acquisition for indoor mobile devices through multimodal context sensing. In 2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing, UbiComp 2013, pages 33–42, 2013. (doi:10.1145/2493432.2493434)

[213]
C.R. Suthikshn Kumar. Portable speech encryption based anti-tapping device. In 135th Audio Engineering Society Convention 2013, pages 523–528. Audio Engineering Society, 2013.

[214]
Y. Thomas, C. Tsilopoulos, G. Xylomenos, and G.C. Polyzos. Multisource and multipath file transfers through publish-subscribe internetworking. In 2013 3rd ACM SIGCOMM Workshop on Information-Centric Networking, ICN 2013, pages 43–44, 2013. (doi:10.1145/2491224.2491238)

[215]
P. Tomas, M.J. Escalona, and M. Mejias. Open source tools for measuring the internal quality of Java software products. a survey. Computer Standards and Interfaces, 36(1):244–255, 2013. (doi:10.1016/j.csi.2013.08.006)

[216]
S. Treter, N. Perrier, J.A. Sosa, and S. Roman. Telementoring: A multi-institutional experience with the introduction of a novel surgical approach for adrenalectomy. Annals of Surgical Oncology, 20(8):2754–2758, 2013. (doi:10.1245/s10434-013-2894-9)

[217]
A.K. Tsadiras, C.T. Papadopoulos, and M.E.J. O'Kelly. An artificial neural network based decision support system for solving the buffer allocation problem in reliable production lines. Computers and Industrial Engineering, 66(4):1150–1162, 2013. (doi:10.1016/j.cie.2013.07.024)

[218]
E. Tsekleves, R. Whitham, K. Kondo, and A. Hill. Investigating pay-as-you-go to address issues of trust, privacy and security around media use at home. Universal Access in the Information Society, 12(2):217–231, 2013.

[219]
B. Turhan, A. Tosun Misirli, and A. Bener. Empirical evaluation of the effects of mixed project data on learning defect predictors. Information and Software Technology, 55(6):1101–1118, 2013.

[220]
I. Turnu, G. Concas, M. Marchesi, and R. Tonelli. The fractal dimension of software networks as a global quality metric. Information Sciences, 245:290–303, 2013. (doi:10.1016/j.ins.2013.05.014)

[221]
V. Urovi, A.C. Olivieri, S. Bromuri, N. Fornara, and M.I. Schumacher. A peer to peer agent coordination framework for IHE based cross-community health record exchange. In Proceedings of the ACM Symposium on Applied Computing, pages 1355–1362, 2013.

[222]
Ashok Vadekar and Brian Neill. Retrofitting authentication onto firmware. United States Patent 8,566,791, October 2013. Assignee: BlackBerry Limited (Waterloo, Ontario, CA).

[223]
T. Vaimann, A. Kallaste, A. Kilk, and A. Belahcen. Lifecycle-based design and optimization of electrical motor-drives — challenges and possibilities. In 2013 3rd International Conference on Electric Power and Energy Conversion Systems, EPECS 2013, 2013. (doi:10.1109/EPECS.2013.6713037)

[224]
S. Vasilakos, C.D. Stylios, and J. Garofalakis. An analytical hierarchy process methodology to evaluate it solutions for organizations. In 25th European Modeling and Simulation Symposium, EMSS 2013, pages 593–600, 2013.

[225]
B. Vasilescu, V. Filkov, and A. Serebrenik. Stackoverflow and GitHub: Associations between software development and crowdsourced knowledge. In 2013 ASE/IEEE Int. Conf. on Social Computing, SocialCom 2013, the 2013 ASE/IEEE Int. Conf. on Big Data, BigData 2013, the 2013 Int. Conf. on Economic Computing, EconCom 2013, the 2013 PASSAT 2013, and the 2013 ASE/IEEE Int. Conf. on BioMedCom 2013, pages 188–195, 2013. (doi:10.1109/SocialCom.2013.35)

[226]
M.J. Villanueva, F. Valverde, and O. Pastor. Involving end-users in domain-specific languages development experiences from a bioinformatics SME. In 8th International Conference on Evaluation of Novel Approaches to Software Engineering, ENASE 2013, pages 97–108, 2013.

[227]
V. Šešum Čavić and E. Kühn. Algorithms and framework for comparison of bee-intelligence based peer-to-peer lookup. 4th International Conference on Advances in Swarm Intelligence, ICSI 2013, 7928 LNCS(PART 1):404–413, 2013. (doi:10.1007/978-3-642-38703-6_48)

[228]
J. Wang, X. Chen, and D. Yang. A study of important node rank based on KAD network. Advanced Science Letters, 19(8):2266–2270, 2013.

[229]
J. Wang, Z. Zhang, K. Xu, Y. Yin, and P. Guo. A research on security and privacy issues for patient related data in medical organization system. International Journal of Security and its Applications, 7(4):287–298, 2013.

[230]
L. Wang, P. Yu, Z. Wang, C. Yang, and Q. Ye. On the evolution of linux kernels: A complex network perspective. Journal of software: Evolution and Process, 25(5):439–458, 2013.

[231]
T. Wegeler, F. Gutzeit, A. Destailleur, and B. Dock. Evaluating the benefits of using domain-specific modeling languages — an experience report. In 2013 13th ACM Workshop on Domain-Specific Modeling, DSM 2013, pages 7–12. Association for Computing Machinery, 2013. (doi:10.1145/2541928.2541930)

[232]
M. Weiher and R. Hirschfeld. Polymorphic identifiers: Uniform resource access in objective-smalltalk. In 9th Dynamic Languages Symposium, DLS 2013 - Co-located with the 4th Annual ACM International Conference on Systems, Programming, Languages, and Applications: Software for Humanity, SPLASH 2013, pages 61–71. Association for Computing Machinery, 2013. (doi:10.1145/2508168.2508169)

[233]
F. Wu. Scale-free characteristic in open source software: An empirical case study. International Journal of Advancements in Computing Technology, 5(1):792–799, 2013. (doi:10.4156/ijact.vol5.issue1.88)

[234]
H. Xia, L. Meng, and S. Lou. Research on spatial image streaming model based on bittorrent. Cehui Xuebao/Acta Geodaetica et Cartographica Sinica, 42(2):225–232, 2013.

[235]
D.-G. Xu, L.-H. Qin, J.-H. Park, and J.-L. Zhou. ODSA: Chord-based object discovery service architecture for the internet of things. Wireless Personal Communications, 73(4):1455–1476, 2013. (doi:10.1007/s11277-013-1260-3)

[236]
H. Yamamoto and K. Yamazaki. LISP-based application-layer multicasting system for a content distribution network. Journal of Information Processing, 21(2):226–236, 2013.

[237]
H. Yamamoto and K. Yamazaki. Location-aware optimal resource selection method for P2P-based contents management and real-time distribution. IEICE Transactions on Information and Systems, E96-D(2):213–225, 2013. (doi:10.1587/transinf.E96.D.213)

[238]
Q. Yan, Y. Li, and R.H. Deng. Malware protection on RFID-enabled supply chain management systems in the EPCglobal network. In Advanced Security and Privacy for RFID Technologies, pages 153–175. IGI Global, 2013. (doi:10.4018/978-1-4666-3685-9.ch010)

[239]
M.H. Yarmand and D.G. Down. Server allocation for zero buffer tandem queues. European Journal of Operational Research, 230(3):596–603, 2013.

[240]
H. Zafar. Human resource information systems: Information security concerns for organizations. Human Resource Management Review, 23(1):105–113, 2013. (doi:10.1016/j.hrmr.2012.06.010)

[241]
C. Zhai and H. Liu. Factors affecting SMEs adoption decision of B2B e-marketplace: A case study in China. In 2013 10th International Conference on Service Systems and Service Management, ICSSSM 2013, pages 262–266, 2013. (doi:10.1109/ICSSSM.2013.6602643)

[242]
F. Zhang, A. Mockus, Y. Zou, F. Khomh, and A.E. Hassan. How does context affect the distribution of software maintainability metrics? In 29th IEEE International Conference on Software Maintenance, ICSM 2013, pages 350–359, 2013. (doi:10.1109/ICSM.2013.46)

[243]
W. Zhang, S. Wang, Y. Yang, and Q. Wang. Heterogeneous network analysis of developer contribution in bug repositories. In 2013 International Conference on Cloud and Service Computing, CSC 2013, pages 98–105. IEEE Computer Society, 2013. (doi:10.1109/CSC.2013.23)

[244]
Z. Zhao and Y. Guo. Scale-free model in software engineering: A new design method. 2013 International Conference on Geo-Informatics in Resource Management and Sustainable Ecosystem, GRMSE 2013, 399 PART II:346–353, 2013. (doi:10.1007/978-3-642-41908-9_35)

[245]
Y. Zhao, X. Pan, C.C. Li, G. Yao, J. Wu, X. Fu, D. Lai, D. Li, and Q. Zhang. Modeling and case study of the production line layout system. Open Automation and Control Systems Journal, 5(1):51–58, 2013. (doi:10.2174/1874444301305010051)

[246]
Y. Zhao, X.Y. Pan, and C.C. Li. Modeling and case study of the production line layout system. 9th International Symposium on Linear Drives for Industry Applications, LDIA 2013, 416-417:1373–1380, 2013. (doi:10.4028/www.scientific.net/AMM.416-417.1373)

[247]
Y. Zhao, X.Y. Pan, C.C. Li, G.H. Yao, J. Wu, X. Fu, D. Lai, D. Li, and Q.W. Zhang. Optimal production linelayout model based on integer programming. Advanced Materials Research, 690 693:2896–2900, 2013.

[248]
Yu Zheng, Lizhu Zhang, and Xing Xie. Mining correlation between locations using location history. United States Patent 8,612,134, December 2013. Assignee: Microsoft Corporation (Redmond, WA).

[249]
Z. Zhu and A. Afanasyev. Let's ChronoSync: Decentralized dataset state synchronization in named data networking. In 2013 21st IEEE International Conference on Network Protocols, ICNP 2013. IEEE Computer Society, 2013. (doi:10.1109/ICNP.2013.6733578)

[250]
J. Zhu, J. He, H. Zhou, and B. Zhao. EPCache: In-network video caching for LTE core networks. In 2013 International Conference on Wireless Communications and Signal Processing, WCSP 2013. IEEE Computer Society, 2013. (doi:10.1109/WCSP.2013.6677228)