[1]
T. Abdou, P. Grogono, and P. Kamthan. Managing corrective actions to closure in open source software test process. In 25th International Conference on Software Engineering and Knowledge Engineering, SEKE 2013, pages 306–311. Knowledge Systems Institute Graduate School, January 2013.

[2]
E. Abdullah and S. Fujita. Reputation-based colluder detection schemes for peer-to-peer content delivery networks''. IEICE Transactions on Information and Systems, E96-D(12):2696–2703, 2013. (doi:10.1587/transinf.E96.D.2696)

[3]
R. Agarwal and Y. Pradeep. Bridging the gap between traditional and online shopping methods for Indian customers through digital interactive experience. In 2013 2nd International Conference on Advances in Computing, Communications and Informatics, ICACCI 2013, pages 1184–1189, 2013. (doi:10.1109/ICACCI.2013.6637345)

[4]
M.I. Ahmed and M. Abo-Rizka. Remote internet voting: Security and performance issues. In 2013 World Congress on Internet Security, WorldCIS 2013, pages 56–64. IEEE Computer Society, 2013. (doi:10.1109/WorldCIS.2013.6751017)

[5]
J. Al Dallal. Incorporating transitive relations in low-level design-based class cohesion measurement. Software - Practice and Experience, 43(6):685–704, 2013.

[6]
J. Al Dallal. Object-oriented class maintainability prediction using internal quality attributes. Information and Software Technology, 55(11):2028–2048, 2013. (doi:10.1016/j.infsof.2013.07.005)

[7]
S. Alhusain, S. Coupland, R. John, and M. Kavanagh. Design pattern recognition by using adaptive neuro fuzzy inference system. In 25th IEEE International Conference on Tools with Artificial Intelligence, ICTAI 2013, pages 581–587, 2013. (doi:10.1109/ICTAI.2013.92)

[8]
S. Alhusain, S. Coupland, R. John, and M. Kavanagh. Towards machine learning based design pattern recognition. In 2013 13th UK Workshop on Computational Intelligence, UKCI 2013, pages 244–251, 2013. (doi:10.1109/UKCI.2013.6651312)

[9]
M.Y. Allaho and W.-C. Lee. Analyzing the social ties and structure of contributors in open source software community. In 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2013, pages 56–60. Association for Computing Machinery, 2013. (doi:10.1145/2492517.2492627)

[10]
M. Allamanis and C. Sutton. Mining source code repositories at massive scale using language modeling. In 10th International Working Conference on Mining Software Repositories, MSR 2013, pages 207–216, 2013. (doi:10.1109/MSR.2013.6624029)

[11]
S. Almugrin, W. Albattah, and A. Melton. Frequent pattern mining in software engineering. In 22nd International Conference on Software Engineering and Data Engineering, SEDE 2013, pages 97–104, 2013.

[12]
S. Astromskis, A. Janes, A. Sillitti, and G. Succi. Supporting governance in disciplined agile delivery using noninvasive measurement and process mining. Cutter IT Journal, 26(11):25–29, 2013.

[13]
I. Astrova, A. Koschel, L. Renners, T. Rossow, and M. Schaaf. Integrating structured peer-to-peer networks into OM4SPACE project. In 27th International Conference on Advanced Information Networking and Applications Workshops, WAINA 2013, pages 1211–1216, 2013. (doi:10.1109/WAINA.2013.88)

[14]
H.U. Asuncion, M. Shonle, R. Porter, K. Potts, N. Duncan, and Jr. Matthies, W.J. Using change entries to collect software project information. In 25th International Conference on Software Engineering and Knowledge Engineering, SEKE 2013, pages 184–189. Knowledge Systems Institute Graduate School, January 2013.

[15]
I.N. Athanasiadis and F. Villa. A roadmap to domain specific programming languages for environmental modeling: Key requirements and concepts. In 2013 13th ACM Workshop on Domain-Specific Modeling, DSM 2013, pages 27–32. Association for Computing Machinery, 2013. (doi:10.1145/2541928.2541934)

[16]
J. Augustine, A.R. Molla, E. Morsy, G. Pandurangan, P. Robinson, and E. Upfal. Storage and search in dynamic peer-to-peer networks. In 25th ACM Symposium on Parallelism in Algorithms and Architectures, SPAA 2013, pages 53–62, 2013.

[17]
L. Aversano and M. Tortorella. Quality evaluation of floss projects: Application to ERP systems. Information and Software Technology, 55(7):1260–1276, 2013.

[18]
S. Banani and K. Wipusitwarakun. A multipath routing protocol over chord-based internet indirection infrastructure (13). Information Technology Journal, 12(1):1–14, 2013. (doi:10.3923/itj.2013.1.14)

[19]
H.M.N.D. Bandara and A.P. Jayasumana. Community-based caching for enhanced lookup performance in P2P systems. IEEE Transactions on Parallel and Distributed Systems, 24(9):1752–1762, 2013. (doi:10.1109/TPDS.2012.270)

[20]
A. Barham. The emergence of quality assurance practices in free/libre open source software: A case study. 9th IFIP WG 2.13 International Conference on Open Source Software, OSS 2013, 404:271–276, 2013.

[21]
D. Bell and S.R. Shirzad. Social media business intelligence: A pharmaceutical domain analysis study. International Journal of Sociotechnology and Knowledge Development, 5(3):51–73, 2013. (doi:10.4018/ijskd.2013070104)

[22]
S.M. Bellovin, M. Blaze, S. Clark, and S. Landau. Going bright: Wiretapping without weakening communications infrastructure. IEEE Security and Privacy, 11(1):62–72, 2013. (doi:10.1109/MSP.2012.138)

[23]
M.V. Belmonte, M. Dıaz, and A. Reyna. Improving file sharing experience with incentive based coalitions. 3rd International Conference on Agents and Artificial Intelligence, ICAART 2011, 271:287–301, 2013. (doi:10.1007/978-3-642-29966-7_19)

[24]
X. Ben, S. Beijun, and Y. Weicheng. Mining developer contribution in open source software using visualization techniques. In Proceedings of the 2013 3rd International Conference on Intelligent System Design and Engineering Applications, ISDEA 2013, pages 934–937, 2013.

[25]
T.F. Bissyandé, F. Thung, D. Lo, L. Jiang, and L. Réveillère. Orion: A software project search engine with integrated diverse software artifacts. In 18th International Conference on Engineering of Complex Computer Systems, ICECCS 2013, pages 242–245, 2013. (doi:10.1109/ICECCS.2013.42)

[26]
F. Blanchet-Sadri, B. Chen, and S. Munteanu. A note on constructing infinite binary words with polynomial subword complexity. RAIRO - Theoretical Informatics and Applications, 47(2):171–180, 2013.

[27]
I. Bluemke and R. Roguski. Metrics in assessing the quality and evolution of jEdit. Lecture Notes in Electrical Engineering, 151 LNEE:717–727, 2013. (doi:10.1007/978-1-4614-3558-7_61)

[28]
X. Bonnaire. Fixed interval nodes estimation: An accurate and low cost algorithm to estimate the number of nodes in distributed hash tables. Information Sciences, 218:165–181, 2013. (doi:10.1016/j.ins.2012.06.004)

[29]
S. Boonkrong. A more secure and efficient Andrew secure RPC protocol. Security and Communication Networks, 7(11):2063–2077, 2013. (doi:10.1002/sec.918)

[30]
Brian M. Bowen, Pratap V. Prabhu, Vasileios P. Kemerlis, Stylianos Sidiroglou, Salvatore J. Stolfo, and Angelos D. Keromytis. Methods, systems, and media for detecting covert malware. United States Patent 8,528,091, September 2013. Assignee: The Trustees of Columbia University in the City of New York (New York, NY).

[31]
M. Brandtner. Fostering software quality assessment. In 2013 35th International Conference on Software Engineering, ICSE 2013, pages 1393–1396, 2013. (doi:10.1109/ICSE.2013.6606725)

[32]
David Broman, Jonathan Keljo, Vance Morrison, Sean Selitrennikoff, and Hsu-chieh Yuan. Detaching profilers. United States Patent 8,601,445, December 2013. Assignee: Microsoft Corporation (Redmond, WA).

[33]
D. Bueno, K.J. Compton, K.A. Sakallah, and M. Bailey. Detecting traditional packers, decisively. 16th International Symposium on Research in Attacks, Intrusions, and Defenses, RAID 2013, 8145 LNCS:184–203, 2013. (doi:10.1007/978-3-642-41284-4_10)

[34]
T. Busjahn and C. Schulte. The use of code reading in teaching programming. In 13th Koli Calling International Conference on Computing Education Research, Koli Calling 2013, pages 3–11, 2013. (doi:10.1145/2526968.2526969)

[35]
C.G. Cegielski, D.M. Bourrie, and B.T. Hazen. Evaluating adoption of emerging IT for corporate IT strategy: Developing a model using a qualitative method. Information Systems Management, 30(3):235–249, 2013. (doi:10.1080/10580530.2013.794632)

[36]
K.K. Chaturvedi, V.B. Sing, and P. Singh. Tools in mining software repositories. In 2013 13th International Conference on Computational Science and Its Applications, ICCSA 2013, pages 89–98. IEEE Computer Society, 2013. (doi:10.1109/ICCSA.2013.22)

[37]
A. Chatzigeorgiou and E. Stiakakis. Combining metrics for software evolution assessment by means of data envelopment analysis. Journal of software: Evolution and Process, 25(3):303–324, 2013.

[38]
C. Chen, P. Wang, Y. Liu, G. Wu, and P. Wang. Impacts of government website information on social sciences and humanities in China: A citation analysis. Government Information Quarterly, 30(4):450–463, 2013. (doi:10.1016/j.giq.2013.05.008)

[39]
V. Chiprianov, Y. Kermarrec, and S. Rouvrais. Integrating DSLs into a software engineering process: Application to collaborative construction of telecom services. Software Design and Development: Concepts, Methodologies, Tools, and Applications, 2-4:570–595, 2013. (doi:10.4018/978-1-4666-4301-7.ch028)

[40]
B. Choi. Multiagent social computing. IGI Global, 2013. (doi:10.4018/978-1-4666-2779-6.ch018)

[41]
T. Clark and B.S. Barn. Domain engineering for software tools. In Domain Engineering: Product Lines, Languages, and Conceptual Models, pages 187–209. Springer Berlin Heidelberg, 2013. (doi:10.1007/978-3-642-36654-3_8)

[42]
M. Colledani, G. Pedrielli, W. Terkaj, and M. Urgo. Integrated virtual platform for manufacturing systems design. In 46th CIRP Conference on Manufacturing Systems, CIRP CMS 2013, volume 7, pages 425–430, 2013. (doi:10.1016/j.procir.2013.06.010)

[43]
M. Colledani. Performance evaluation of two-stage buffered production systems with discrete general Markovian machines. In 7th IFAC Conference on Manufacturing Modelling, Management, and Control, MIM 2013, pages 1638–1643, 2013. (doi:10.3182/20130619-3-RU-3018.00516)

[44]
Rod Cope. Noise reduction for content matching analysis results for protectable content. United States Patent 8,498,982, July 2013. Assignee: OpenLogic, Inc. (Broomfield, CO).

[45]
H.K. Cora, H. Turgut Uyar, and A.  c Sima Etaner-Uyar. HH-DSL: A domain specific language for selection hyper-heuristics. In 15th Annual Conference on Genetic and Evolutionary Computation, GECCO 2013, pages 1317–1324, 2013. (doi:10.1145/2464576.2482711)

[46]
E. Costello. Opening up to open source: Looking at how moodle was adopted in higher education. Open Learning, 28(3):187–200, 2013. (doi:10.1080/02680513.2013.856289)

[47]
J.J. Cusick. Durable ideas in software engineering: Concepts, methods and approaches from my virtual toolbox. Bentham Science Publishers Ltd., 2013. (doi:10.2174/97816080547631130101)

[48]
Z. Czirkos and G. Hosszú. Solution for the broadcasting in the Kademlia peer-to-peer overlay. Computer Networks, 57(8):1853–1862, 2013.

[49]
I. Dávid and L. Gönczy. Ontology-supported design of domain-specific languages: A complex event processing case study. Advances and Applications in Model-Driven Engineering, pages 106–133, 2013. (doi:10.4018/978-1-4666-4494-6.ch006)

[50]
F. De Asıs López-Fuentes. An incentives model based on reputation for P2P systems. Journal of Telecommunications and Information Technology, 2013(4):92–101, 2013.

[51]
R.A. De Carvalho and B. Johansson. Key aspects of free and open source enterprise resource planning systems. Enterprise Resource Planning: Concepts, Methodologies, Tools, and Applications, 1-3:35–51, 2013. (doi:10.4018/978-1-4666-4153-2.ch004)

[52]
P. De Filippi. Ubiquitous computing in the cloud: User empowerment vs. user obsequity. User Behavior in Ubiquitous Online Environments, pages 44–63, 2013. (doi:10.4018/978-1-4666-4566-0.ch003)

[53]
W.K. Dédzoé, P. Lamarre, R. Akbarinia, and P. Valduriez. As-soon-as-possible top-k query processing in P2P systems. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 7980:1–27, 2013. (doi:10.1007/978-3-642-40069-8-1)

[54]
D.R. Delgado Sobrino and P. Koštál. A few analysis and customization issues of a new iCIM 3000 system: The case of the material flow, its complexity and a few issues to improve. Academic Journal of Manufacturing Engineering, 11(4):36–41, 2013.

[55]
T. Delot and M. Thilliez. Data access and ambient computing. Computer Science and Ambient Intelligence, pages 121–134, 2013. (doi:10.1002/9781118580974.ch7)

[56]
L. Demir, A. Diamantidis, D.T. Eliiyi, M.E.J. O'Kelly, C.T. Papadopoulos, A.K. Tsadiras, and S. Tunali. A comparison of three search algorithms for solving the buffer allocation problem in reliable production lines. In 7th IFAC Conference on Manufacturing Modelling, Management, and Control, MIM 2013, pages 1626–1631, 2013. (doi:10.3182/20130619-3-RU-3018.00345)

[57]
L. Demir, S. Tunali, D.T. Eliiyi, and A. Løkketangen. Two approaches for solving the buffer allocation problem in unreliable production lines. Computers and Operations Research, 40(10):2556–2563, 2013.

[58]
G. Dévai, D. Leskó, and M. Tejfel. Embedding and parsing combined for efficient language design. In 8th International Joint conference on Software Technologies, ICSOFT 2013, pages 244–250, 2013.

[59]
S. Dey, Y. Liu, S. Wang, and Y. Lu. Addressing response time of cloud-based mobile applications. In 1st International Workshop on Mobile Cloud Computing and Networking, MobileCloud 2013, pages 3–10, 2013. (doi:10.1145/2492348.2492359)

[60]
W. Djoleto. Electronic commerce and organizational leadership: Perspectives and methodologies. IGI Global, 2013. (doi:10.4018/978-1-4666-2982-0)

[61]
A.F. Dragoni. Health services through digital terrestrial television. Telehealth Networks for Hospital Services: New Methodologies, pages 207–227, 2013. (doi:10.4018/978-1-4666-2979-0.ch014)

[62]
H. E, X. Jin, J. Tong, M. Song, and X. Zhu. Measure method and metrics for network characteristics in service systems. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 7719 LNCS:180–193, 2013.

[63]
P. Eeles. Building a platform for innovation: Architecture and agile as key enablers. Agile Software Architecture: Aligning Agile Processes and Software Architectures, pages 315–333, 2013. (doi:10.1016/B978-0-12-407772-0.00012-5)

[64]
G. Einziger, R. Friedman, and E. Kibbar. Kaleidoscope: Adding colors to Kademlia. In 13th IEEE International Conference on Peer-to-Peer Computing, IEEE P2P 2013. IEEE Computer Society, 2013. (doi:10.1109/P2P.2013.6688703)

[65]
G. Epelde, E. Carrasco, G. Zimmermann, J. Alexandersson, R. Neßelrath, and M. Dubielzig. Universal remote console-based next-generation accessible television. Universal Access in the Information Society, 12(1):73–87, 2013.

[66]
G. Epelde, X. Valencia, E. Carrasco, J. Posada, J. Abascal, U. Diaz-Orueta, I. Zinnikus, and C. Husodo-Schulz. Providing universally accessible interactive services through TV sets: Implementation and validation with elderly users. Multimedia Tools and Applications, 67(2):497–528, 2013. (doi:10.1007/s11042-011-0949-0)

[67]
J. Fang, Y. Han, and Z. Zhao. A hierarchical service community model for cross-organizational service management. In 2013 International Conference on Service Science, ICSS 2013, pages 84–89, 2013. (doi:10.1109/ICSS.2013.57)

[68]
M. Farooq-i Azam and M.N. Ayyaz. Embedded systems security. Software Design and Development: Concepts, Methodologies, Tools, and Applications, 2-4:980–998, 2013. (doi:10.4018/978-1-4666-4301-7.ch047)

[69]
J. Feigenspan, C. Kästner, S. Apel, J. Liebig, M. Schulze, R. Dachselt, M. Papendieck, T. Leich, and G. Saake. Do background colors improve program comprehension in the #ifdef hell? Empirical Software Engineering, 18(4):699–745, 2013. (doi:10.1007/s10664-012-9208-x)

[70]
J.B. Fernández, B.S. De Abajo, J.M. Ramirez, E.G. Salcines, and C. de Castro Lozano. How the user behavior is affected by the use of secondary screens on interactive television: An affective usability dimension. Communications in Computer and Information Science, 278:557–562, 2013. (doi:10.1007/978-3-642-35879-1_70)

[71]
L.P. Ferreira, E.A. Gómez, G.P. Lourido, and B. Tjahjono. Modeling a complex production line using virtual cells. Lecture Notes in Electrical Engineering, 130 LNEE:361–373, 2013. (doi:10.1007/978-1-4614-2317-1_30)

[72]
J. Ferrer, F. Chicano, and E. Alba. Estimating software testing complexity. Information and Software Technology, 55(12):2125–2139, 2013. (doi:10.1016/j.infsof.2013.07.007)

[73]
C. Fieseler and M. Fleck. The pursuit of empowerment through social media: Structural social capital dynamics in CSR-blogging. Journal of Business Ethics, 118(4):759–775, 2013. (doi:10.1007/s10551-013-1959-9)

[74]
J. Fitsanakis. Digital Sparta: Information operations and cyber-warfare in Greece. Cyber Conflict: Competing National Perspectives, pages 135–164, 2013. (doi:10.1002/9781118562666.ch4)

[75]
S. Frey, W. Hasselbring, and B. Schnoor. Automatic conformance checking for migrating software systems to cloud infrastructures and platforms. Journal of software: Evolution and Process, 25(10):1089–1115, 2013. (doi:10.1002/smr.582)

[76]
J. Gao and W. Ding. A sensory data integrating bus under the intelligent transportation environment. In 2013 10th Web Information System and Application Conference, WISA 2013, pages 328–332. IEEE Computer Society, 2013. (doi:10.1109/WISA.2013.68)

[77]
M. Gardner, P. Sathre, W.-C. Feng, and G. Martinez. Characterizing the challenges and evaluating the efficacy of a CUDA-to-OpenCL translator. Parallel Computing, 39(12):769–786, 2013. (doi:10.1016/j.parco.2013.09.003)

[78]
A. Garrido and R. Johnson. Embracing the C preprocessor during refactoring. Journal of software: Evolution and Process, 25(12):1285–1304, 2013. (doi:10.1002/smr.1603)

[79]
T. Gavrielides and V. Artinopoulou. Restorative justice and violence against women: Comparing greece and the united kingdom. Asian Journal of Criminology, 8(1):25–40, 2013.

[80]
E. Gebennini, A. Grassi, C. Fantuzzi, S.B. Gershwin, and I.C. Schick. Discrete time model for two-machine one-buffer transfer lines with restart policy. Annals of Operations Research, 209(1):41–65, 2013. (doi:10.1007/s10479-011-0868-5)

[81]
M. Geva and A. Herzberg. DOT-COM: Decentralized online trading and commerce. 8th International Workshop on Security and Trust Management, STM 2012, 7783 LNCS:177–192, 2013. (doi:10.1007/978-3-642-38004-4_12)

[82]
H.R. Ghaeini, B. Akbari, and B. Barekatain. An adaptive packet loss recovery method for peer-to-peer video streaming over wireless mesh network. Lecture Notes in Electrical Engineering, 236 LNEE:713–721, 2013.

[83]
G. Ghezzi and H.C. Gall. Replicating mining studies with SOFAS. In 10th International Working Conference on Mining Software Repositories, MSR 2013, pages 363–372, 2013. (doi:10.1109/MSR.2013.6624050)

[84]
M. Ghorbani, M.R. Meybodi, and A.M. Saghiri. A new version of k-random walks algorithm in peer-to-peer networks utilizing learning automata. In 2013 5th Conference on Information and Knowledge Technology, IKT 2013, pages 1–6, 2013. (doi:10.1109/IKT.2013.6620028)

[85]
M. Ghorbani, M.R. Meybodi, and A.M. Saghiri. A novel self-adaptive search algorithm for unstructured peer-to-peer networks utilizing learning automata. In 2013 3rd Joint Conference of AI and Robotics and 5th RoboCup Iran Open International Symposium: Learning, Glorious Future, RIOS 2013, 2013. (doi:10.1109/RIOS.2013.6595306)

[86]
Y. Gil and V. Ratnakar. Knowledge capture in the wild: A perspective from semantic wiki communities. In 7th International Conference on Knowledge Capture: "Knowledge Capture in the Age of Massive Web Data", K-CAP 2013, 2013. (doi:10.1145/2479832.2479858)

[87]
Y. Gil, A. Knight, K. Zhang, L. Zhang, V. Ratnakar, and R. Sethi. The democratization of semantic properties: An analysis of semantic wikis. In 2013 IEEE 7th International Conference on Semantic Computing, ICSC 2013, pages 206–211, 2013. (doi:10.1109/ICSC.2013.44)

[88]
M. Gligoric, F. Behrang, Y. Li, J. Overbey, M. Hafiz, and D. Marinov. Systematic testing of refactoring engines on real software projects. 27th European Conference on Object-Oriented Programming, ECOOP 2013, 7920 LNCS:629–653, 2013. (doi:10.1007/978-3-642-39038-8-26)

[89]
M. Goeminne, M. Claes, and T. Mens. A historical dataset for the GNOME ecosystem. In 10th International Working Conference on Mining Software Repositories, MSR 2013, pages 225–228, 2013. (doi:10.1109/MSR.2013.6624032)

[90]
Valery Golender, Ido Ben Moshe, and Shlomo Wygodny. System and method for software diagnostics using a combination of visual and dynamic tracing. United States Patent 8,504,994, August 2013. Assignee: Identify Software, Ltd. (Petach-Tikva, IL).

[91]
J.M. Gonzalez-Barahona, D. Izquierdo-Cortazar, S. Maffulli, and G. Robles. Understanding how companies interact with free software communities. IEEE Software, 30(5):38–45, 2013. (doi:10.1109/MS.2013.95)

[92]
L.Z. Granville. Peer-to-peer (P2P)-based network management. Network-Embedded Management and Applications: Understanding Programmable Networking Infrastructure, pages 291–315, 2013. (doi:10.1007/978-1-4419-6769-5_14)

[93]
J. Gu, W. Wang, A. Huang, and H. Shan. Proactive storage at caching-enable base stations in cellular networks. In 2013 IEEE 24th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications, PIMRC 2013, pages 1543–1547, 2013. (doi:10.1109/PIMRC.2013.6666387)

[94]
Y. Guo, Z.-X. Zhao, and W. Wang. Complexity analysis of software based on function-call graph. In 19th International Conference on Industrial Engineering and Engineering Management, pages 269–277, 2013. (doi:10.1007/978-3-642-37270-4_26)

[95]
Satya V. Gupta and Prashant Shenoy. System and methods for run time detection and correction of memory corruption. United States Patent 8,510,596, August 2013. Assignee: Virsec Systems, Inc. (Acton, MA).

[96]
T.N. Gutierrez, L. Ciarletta, and V. Chevrier. Multi-agent simulation based governance of complex systems: Architecture and example implementation on free-riding. In 2013 Mexican International Conference on Computer Science, ENC 2013, pages 89–98. IEEE Computer Society, 2013. (doi:10.1109/ENC.2013.19)

[97]
M. Hammad, M. Hammad, and H. Bani-Salameh. Identifying designers and their design knowledge. International Journal of Software Engineering and its Applications, 7(6):277–288, 2013. (doi:10.14257/ijseia.2013.7.6.23)

[98]
A. Hannemann, M. Hackstein, R. Klamma, and M. Jarke. An adaptive filter-framework for the quality improvement of open-source software analysis. In 2013 Conference on Software Engineering, SE 2013, volume P-213, pages 143–156. Gesellschaft fur Informatik (GI), 2013.

[99]
S. Harrer, J. Lenhard, and G. Wirtz. Open source versus proprietary software in service-orientation: The case of BPEL engines. 11th International Conference on Service-Oriented Computing, ICSOC 2013, 8274 LNCS:99–113, 2013. (doi:10.1007/978-3-642-45005-1_8)

[100]
T. Hasegawa. A survey of the research on future internet and network architectures. IEICE Transactions on Communications, E96-B(6):1385–1401, 2013.

[101]
S. Haun and A. Nürnberger. Towards persistent identification of resources in personal information management. In 3rd International Workshop on Semantic Digital Archives, SDA 2013 - Co-located with 17th International Conference on Theory and Practice of Digital Libraries, TPDL 2013, volume 1091, pages 73–80. CEUR-WS, 2013.

[102]
K.A. Hawick. Fluent interfaces to a java-based internal domain-specific languages for graph generation and analysis. In IASTED Multiconferences - Proceedings of the IASTED International Conference on Software Engineering, SE 2013, pages 752–759, 2013.

[103]
E.C.S. Hayashi, L.S.G. Piccolo, and M.C.C. Baranauskas. Perspectives on the evaluation of affective quality in social software. International Journal of Web Based Communities, 9(4):519–534, 2013. (doi:10.1504/IJWBC.2013.057217)

[104]
P. He, B. Li, Y. Ma, and L. He. Using software dependency to bug prediction. Mathematical Problems in Engineering, 2013, 2013. (doi:10.1155/2013/869356)

[105]
Q. He, Y. Wang, Y. Linlin, and Q.K. Key. P2PRPIPS: A P2P and reverse proxy based web intrusion protection system. Research Journal of Applied Sciences, Engineering and Technology, 5(7):2439–2444, 2013.

[106]
B. Henderson-Sellers, T. Clark, and C. Gonzalez-Perez. On the search for a level-agnostic modelling language. 25th International Conference on Advanced Information Systems Engineering, CAiSE 2013, 7908 LNCS:240–255, 2013. (doi:10.1007/978-3-642-38709-8_16)

[107]
I.M.T. Hernandez, A.M. Viveros, and E.H. Rubio. Analysis for the design of open applications on mobile devices. In 23rd International Conference on Electronics, Communications and Computing, CONIELECOMP 2013, pages 126–131, 2013. (doi:10.1109/CONIELECOMP.2013.6525772)

[108]
I. Herraiz, D. Rodriguez, G. Robles, and J.M. Gonzalez-Barahona. The evolution of the laws of software evolution: A discussion based on a systematic literature review. ACM Computing Surveys, 46(2), 2013. (doi:10.1145/2543581.2543595)

[109]
B. Hoisl, S. Sobernig, and M. Strembeck. Higher-order rewriting of model-to-text templates for integrating domain-specific modeling languages. In MODELSWARD 2013 - Proceedings of the 1st International Conference on Model-Driven Engineering and Software Development, pages 49–61, 2013.

[110]
H. Holm, M. Ekstedt, and T. Sommestad. Effort estimates on web application vulnerability discovery. In Proceedings of the Annual Hawaii International Conference on System Sciences, pages 5029–5038, 2013.

[111]
Z.-K. Hu, X.-L. Zheng, Y.-F. Wu, and D.-R. Chen. Product recommendation algorithm based on users' reviews mining. Zhejiang Daxue Xuebao (Gongxue Ban)/Journal of Zhejiang University (Engineering Science), 47(8):1475–1485, 2013. (doi:10.3785/j.issn.1008-973X.2013.08.023)

[112]
H. Huang, J. Xiao, Q. Yang, Q. Wang, and H. Wu. Creating process-agents incrementally by mining process asset library. Information Sciences, 233:183–199, 2013.

[113]
X. Huang, X. Ding, C.P. Lee, T. Lu, and N. Gu. Meanings and boundaries of scientific software sharing. In Proceedings of the ACM Conference on Computer Supported Cooperative Work, CSCW, pages 423–434, 2013.

[114]
X. Huang, T. Lu, X. Ding, T. Liu, and N. Gu. A provenance-based solution for software selection in scientific software sharing. In 2013 IEEE 17th International Conference on Computer Supported Cooperative Work in Design, CSCWD 2013, pages 172–177, 2013. (doi:10.1109/CSCWD.2013.6580958)

[115]
X. Huang, T. Zhao, and Y. Cao. PIR: A domain specific language for multimedia retrieval. In 15th IEEE International Symposium on Multimedia, ISM 2013, pages 359–363, 2013. (doi:10.1109/ISM.2013.68)

[116]
W. Hummer, P. Gaubatz, M. Strembeck, U. Zdun, and S. Dustdar. Enforcement of entailment constraints in distributed service-based business processes. Information and Software Technology, 55(11):1884–1903, 2013. (doi:10.1016/j.infsof.2013.05.001)

[117]
M.A. Ismail, T. Altaf, and S.H. Mirza. MCSMC: A new parallel multi-level cache simulator for multi-core processors. In 2013 Saudi International Electronics, Communications and Photonics Conference, SIECPC 2013, 2013. (doi:10.1109/SIECPC.2013.6550746)

[118]
M. Jankowski-Lorek, L. Ostrowski, P. Turek, and A. Wierzbicki. Modeling Wikipedia admin elections using multidimensional behavioral social networks. Social Network Analysis and Mining, 3(4):787–801, 2013. (doi:10.1007/s13278-012-0092-6)

[119]
B. Jay and J. Vergara. Growing a language in pattern calculus. In 2013 International Symposium on Theoretical Aspects of Software Engineering, TASE 2013, pages 233–240, 2013. (doi:10.1109/TASE.2013.37)

[120]
J. Jiang, L. Zhang, and L. Li. Understanding project dissemination on a social coding site. In 20th Working Conference on Reverse Engineering, WCRE 2013, pages 132–141, 2013. (doi:10.1109/WCRE.2013.6671288)

[121]
M. Jin, L. Huang, and P. Ren. RFID based space-time navigation scheduling for low-carbon ecotourism management system. International Journal of Applied Environmental Sciences, 8(20):2533–2546, 2013.

[122]
T. Johanndeiter, A. Goldstein, and U. Frank. Towards business process models at runtime. In 8th Workshop on Models @ Run.time, MRT 2013 - Co-located with 16th International Conference on Model Driven Engineering Languages and Systems, MODELS 2013, volume 1079, pages 13–25. CEUR-WS, 2013.

[123]
M. Johnson. Buy-side barriers to e-business technology in the healthcare sector. International Journal of Healthcare Technology and Management, 14(1-2):110–142, 2013. (doi:10.1504/IJHTM.2013.055090)

[124]
M. Johnson. Critical success factors for B2B e-markets: A strategic fit perspective. Marketing Intelligence and Planning, 31(4):337–366, 2013.

[125]
M. Johnson. Critical success factors for B2B e-markets: A strategic fit perspective. Marketing Intelligence and Planning, 31(6):698–727, 2013. (doi:10.1108/MIP-10-2013-001)

[126]
G. Kakarontzas, E. Constantinou, A. Ampatzoglou, and I. Stamelos. Layer assessment of object-oriented software: A metric facilitating white-box reuse. Journal of Systems and Software, 86(2):349–366, 2013. (doi:10.1016/j.jss.2012.08.041)

[127]
S.H. Kannangara and W.M.J.I. Wijayanayake. Impact of refactoring on external code quality improvement: An empirical evaluation. In 2013 International Conference on Advances in ICT for Emerging Regions, ICTer 2, pages 60–67. IEEE Computer Society, 2013. (doi:10.1109/ICTer.2013.6761156)

[128]
P. Karmakar and R. Roy. Evolution of trust and formation of preference clusters in distributed networked structure. Studies in Virtual Communities, Blogs, and Modern Social Networking: Measurements, Analysis, and Investigations, pages 62–96, 2013. (doi:10.4018/978-1-4666-4022-1.ch006)

[129]
M. Kas, L. Richard Carley, and K.M. Carley. Monitoring social centrality for peer-to-peer network protection. IEEE Communications Magazine, 51(12):155–161, 2013. (doi:10.1109/MCOM.2013.6685771)

[130]
A. Kasoju, K. Petersen, and M.V. Mäntylä. Analyzing an automotive testing process with evidence-based software engineering. Information and Software Technology, 55(7):1237–1259, 2013.

[131]
R. Kawahara, K. Ono, T. Nakada, H. Okabayashi, K. Hisazumi, T. Nakanishi, A. Fukuda, Y. Sakamoto, and T. Nagano. A model transformation method for evaluation of non-functional requirements of an embedded system architecture. Computer Software, 30(1):203–210, 2013.

[132]
D. Kelly, D. Hook, and R. Sanders. A framework for testing code in computational applications. Software Design and Development: Concepts, Methodologies, Tools, and Applications, 1-4:479–505, 2013. (doi:10.4018/978-1-4666-4301-7.ch024)

[133]
Angelos D. Keromytis and Salvatore J. Stolfo. Methods, media, and systems for detecting an anomalous sequence of function calls. United States Patent 8,489,931, July 2013. Assignee: The Trustees of Columbia University in the City of New York (New York, NY).

[134]
Z. Khanam and S.A.M. Rizvi. An evaluative study of software refactoring in procedural programming. In 2013 World Congress on Engineering and Computer Science, WCECS 2013, volume 1, pages 102–107. Newswood Limited, 2013.

[135]
V.Y. Kharitonov. A software architecture for high-level development of component-based distributed virtual reality systems. In 2013 IEEE 27th International Parallel and Distributed Processing Symposium Workshops and PhD Forum, IPDPSW 2013, pages 696–705, 2013. (doi:10.1109/COMPSAC.2013.111)

[136]
S. Khatoon, G. Li, and A. Mahmood. Comparison and evaluation of source code mining tools and techniques: A qualitative approach. Intelligent Data Analysis, 17(3):459–484, 2013.

[137]
J. Kim and S. Lee. Efficient and flexible storage visualization system based on distributed hash tables. Information (Japan), 16(1 A):383–392, 2013.

[138]
B. Kitts, D. Au, and B. Burdick. A high-dimensional set top box ad targeting algorithm including experimental comparisons to traditional tv algorithms. In 13th IEEE International Conference on Data Mining, ICDM 2013, pages 370–378, 2013. (doi:10.1109/ICDM.2013.169)

[139]
M. Klotzbücher and H. Bruyninckx. A lightweight, composable metamodelling language for specification and validation of internal domain specific languages. 8th International Workshop on Model-Based Methodologies for Pervasive and Embedded Software, MOMPES 2012, 7706 LNCS:58–68, 2013. (doi:10.1007/978-3-642-38209-3_4)

[140]
E. Kocaguneli, T. Zimmermann, C. Bird, N. Nagappan, and T. Menzies. Distributed development considered harmful? In 2013 35th International Conference on Software Engineering, ICSE 2013, pages 882–890, 2013. (doi:10.1109/ICSE.2013.6606637)

[141]
S.S. Kolesnikov, S. Apel, N. Siegmund, S. Sobernig, C. Kästner, and S. Senkaya. Predicting quality attributes of software product lines using software and network measures and sampling. In ACM International Conference Proceeding Series, 2013.

[142]
K. Kolomvatsos, G. Valkanas, P. Patelis, and S. Hadjiefthymiades. Creating, debugging, and testing mobile applications with the IPAC application creation environment. Software Design and Development: Concepts, Methodologies, Tools, and Applications, 2-4:695–718, 2013. (doi:10.4018/978-1-4666-4301-7.ch033)

[143]
T. Koskela, O. Kassinen, E. Harjula, and M. Ylianttila. P2P group management systems: A conceptual analysis. ACM Computing Surveys, 45(2), 2013.

[144]
S.D. Larson and M.E. Martone. Neurolex.org: An online framework for neuroscience knowledge. Frontiers in Neuroinformatics, 7(AUG), 2013. (doi:10.3389/fninf.2013.00018)

[145]
K.M. Lavassani, B. Movahedi, and V. Kumar. From integration to social media: Understanding electronic marketplace. Trends in E-Business, E-Services, and E-Commerce: Impact of Technology on Goods, Services, and Business Transactions, pages 1–19, 2013. (doi:10.4018/978-1-4666-4510-3.ch001)

[146]
H.J. Lee, B.-K. Seo, and E. Seo. A git source repository analysis tool based on a novel branch-oriented approach. In 2013 4th International Conference on Information Science and Applications, ICISA 2013, 2013. (doi:10.1109/ICISA.2013.6579457)

[147]
M.B. Lehmann, R.S. Antunes, and M.P. Barcellos. Exploring your neighborhood: Comparing connection strategies in swarming networks through evolving graphs. In 13th IEEE International Conference on Peer-to-Peer Computing, IEEE P2P 2013. IEEE Computer Society, 2013. (doi:10.1109/P2P.2013.6688701)

[148]
T.S. Lendvay, B. Hannaford, and R.M. Satava. Future of robotic surgery. Cancer Journal (United States), 19(2):109–119, 2013.

[149]
J. Lenhard, S. Harrer, and G. Wirtz. Measuring the installability of service orchestrations using the SQuaRE method. In 6th IEEE International Conference on Service-Oriented Computing and Applications, SOCA 2013, pages 118–125. IEEE Computer Society, 2013. (doi:10.1109/SOCA.2013.30)

[150]
Nicola Jane Lessing, Christophe Schnelle, and Peter Mariani. Maltweb multi-axis viewing interface and higher level scoping. United States Patent 8,386,484, February 2013. Assignee: TimeBase Pty Limited (Sydney, New South Wales, AU).

[151]
L. Li and H. Leung. Predicting fault-proneness of object-oriented system developed with agile process using learned bayesian network. In 15th International Conference on Enterprise Information Systems, ICEIS 2013, volume 2, pages 5–16, 2013.

[152]
W. Li, Y. Meng, and L.-F. Kwok. Enhancing trust evaluation using intrusion sensitivity in collaborative intrusion detection networks: Feasibility and challenges. In 9th International Conference on Computational Intelligence and Security, CIS 2013, pages 518–522, 2013. (doi:10.1109/CIS.2013.115)

[153]
Y. Li, H.M. Jiang, and T. Hu. A study on distributed license authorization system based on threshold secret sharing. 2013 International Conference on Vehicle and Mechanical Engineering and Information Technology, VMEIT 2013, 380-384:2749–2752, 2013. (doi:10.4028/www.scientific.net/AMM.380-384.2749)

[154]
Y. Li, C.-H. Tan, and X. Yang. It is all about what we have: A discriminant analysis of organizations' decision to adopt open source software. Decision Support Systems, 56(1):56–62, 2013. (doi:10.1016/j.dss.2013.05.006)

[155]
Y. Li, W. Wang, Y. Zhu, and J. Chen. What accounts for organizations' different usage of B2B e-marketplaces? In 17th Pacific Asia Conference on Information Systems, PACIS 2013. Pacific Asia Conference on Information Systems, 2013.

[156]
C.-Y. Lien, T.-L. Yang, C.-H. Hsiao, and T. Kao. Realizing digital signatures for medical imaging and reporting in a PACS environment. Journal of Medical Systems, 37(1), 2013. (doi:10.1007/s10916-012-9924-1)

[157]
E. Ligu, T. Chaikalis, and A. Chatzigeorgiou. BuCo reporter: Mining software and bug repositories. In 6th Balkan Conference in Informatics, BCI-LOCAL 2013, volume 1036, pages 121–127. CEUR-WS, 2013.

[158]
S.-J. Lin and W.-H. Chung. An efficient (n,k) information dispersal algorithm based on fermat number transforms. IEEE Transactions on Information Forensics and Security, 8(8):1371–1383, 2013. (doi:10.1109/TIFS.2013.2270892)

[159]
C.-S. Lin. Balanced dynamic buffering for scalable video-on-demand streaming on peer-to-peer networks. Multimedia Tools and Applications, 62(3):701–718, 2013. (doi:10.1007/s11042-011-0872-4)

[160]
M. Lindberg. Feedback-based cooperative content distribution for mobile networks. In 8th ACM Int. Workshop on Performance Monitoring, Measurement, and Evaluation of Heterogeneous Wireless and Wired Networks, PM2HW2N 2013, Held in Conjunction with the 16th ACM Int. Conf. on MSWiM 2013, pages 107–115, 2013. (doi:10.1145/2512840.2512855)

[161]
M. Liu, T. Leppanen, E. Harjula, Z. Ou, A. Ramalingam, M. Ylianttila, and T. Ojala. Distributed resource directory architecture in machine-to-machine communications. In 2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications, WiMob 2013, pages 319–324, 2013. (doi:10.1109/WiMOB.2013.6673379)

[162]
M. Liu, T. Leppanen, E. Harjula, Z. Ou, M. Ylianttila, and T. Ojala. Distributed resource discovery in the machine-to-machine applications. In 10th IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, MASS 2013, pages 411–412, 2013. (doi:10.1109/MASS.2013.46)

[163]
P. Liu, T.F. LaPorta, and K. Kotapati. Cellular network security. In Network and System Security: Second Edition, pages 319–351. Elsevier Inc., 2013. (doi:10.1016/B978-0-12-416689-9.00011-3)

[164]
P. Liu, T.F. LaPorta, and K. Kotapati. Cellular network security. In Computer and Information Security Handbook, pages 323–343. Elsevier Inc., 2013. (doi:10.1016/B978-0-12-394397-2.00017-9)

[165]
A. Logvinenko, C. Gremzow, and D. Tutsch. RecMIN: A reconfiguration architecture for network on chip. In 2013 8th International Workshop on Reconfigurable and Communication-Centric Systems-on-Chip, ReCoSoC 2013, 2013. (doi:10.1109/ReCoSoC.2013.6581547)

[166]
J. Loveland and J. Reagle. Wikipedia and encyclopedic production. New Media and Society, 15(8):1294–1311, 2013. (doi:10.1177/1461444812470428)

[167]
G. Lu and K. Lü. Logical trees: An essential method of parsing SQL statement with semantic analysis. International Journal of Advancements in Computing Technology, 5(1):270–278, 2013. (doi:10.4156/ijact.vol5.issue1.30)

[168]
T. Lukman, G. Godena, J. Gray, M. Heričko, and S. Strmčnik. Model-driven engineering of process control software — beyond device-centric abstractions. Control Engineering Practice, 21(8):1078–1096, 2013. (doi:10.1016/j.conengprac.2013.03.013)

[169]
H.J. Macho and G. Robles. Preliminary lessons from a software evolution analysis of moodle. In 1st International Conference on Technological Ecosystem for Enhancing Multiculturality, TEEM 2013, pages 157–161, 2013. (doi:10.1145/2536536.2536560)

[170]
A. Malatras, F. Peng, and B.A. Hirsbrunner. Energy-efficient peer-to-peer networking and overlays. In Handbook of Green Information and Communication Systems, pages 513–540. Elsevier Inc., 2013. (doi:10.1016/B978-0-12-415844-3.00020-6)

[171]
D. Mancl and S. Fraser. Software tools research: SPLASH panel discussion. IEEE Software, 30(2):16–17, 2013.

[172]
S. Mandal, S. Chakraborty, and S. Karmakar. Distributed deterministic 1–2 skip list for peer-to-peer system. Peer-to-Peer Networking and Applications, 8(1):63–86, 2013. (doi:10.1007/s12083-013-0222-6)

[173]
V. Mansilla and M.-C. Marcos. Experiencia de usuario en televisión conectada: Un estudio con usuarios. Profesional de la Informacion, 22(2):122–127, 2013.

[174]
M. Marchetti and M. Colajanni. Cooperative approaches to siem and intrusion detection. Advances in Security Information Management: Perceptions and Outcomes, pages 79–116, 2013.

[175]
A.H. Mardani and M. Sangari. An analysis of the availability and persistence of web citations in Iranian LIS journals. International Journal of Information Science and Management, 11(1):29–42, 2013.

[176]
J. Marlow and L. Dabbish. Activity traces and signals in software developer recruitment and hiring. In Proceedings of the ACM Conference on Computer Supported Cooperative Work, CSCW, pages 145–155, 2013.

[177]
J.M. Marquès, D. Lazaro, A.A. Juan, X. Vilajosana, M. Domingo, and J. Jorba. Planetlab@UOC: A real lab over the internet to experiment with distributed systems. Computer Applications in Engineering Education, 21(2):265–275, 2013.

[178]
M. Martin Bel, O. Dugeon, J. Fasson, A. Abou El Kalam, M. Maachaoui, B. Paillassa, F.J. Ramón Salguero, and W. Werapun. Service management. Digital Home Networking, pages 259–307, 2013. (doi:10.1002/9781118602829.ch8)

[179]
C. Mateos, M. Crasso, A. Zunino, and J.L. Ordiales Coscia. Revising WSDL documents: Why and how, part 2. IEEE Internet Computing, 17(5):46–53, 2013. (doi:10.1109/MIC.2013.4)

[180]
C.A. Mattmann. Computing: A vision for data science. Nature, 493(7433):473–475, 2013. (doi:10.1038/493473a)

[181]
L. Meneses, H. Barthwal, S. Singh, R. Furuta, and F. Shipman. Restoring semantically incomplete document collections using lexical signatures. International Conference on Theory and Practice of Digital Libraries, TPDL 2013, 8092 LNCS:321–332, 2013. (doi:10.1007/978-3-642-40501-3_33)

[182]
J. Mercadal, Z. Drey, and C. Consel. Denotational semantics of a user-oriented, domain-specific language. In Semantics, Abstract Interpretation, and Reasoning About Programs: Essays Dedicated to David A. Schmidt on the Occasion of His 60th Birthday, volume 129, pages 229–249, 2013. (doi:10.4204/EPTCS.129.14)

[183]
M. Mernik. An object-oriented approach to language compositions for software language engineering. Journal of Systems and Software, 86(9):2451–2464, 2013. (doi:10.1016/j.jss.2013.04.087)

[184]
O. Mizuno. On effects of tokens in source code to accuracy of fault-prone module prediction. In 2013 17th International Computer Science and Engineering Conference, ICSEC 2013, pages 103–108, 2013. (doi:10.1109/ICSEC.2013.6694761)

[185]
H.S. Moon, Y.H. Cho, and J.K. Kim. IERMS: An intelligent exhibition rule management system using PMML. In 17th Pacific Asia Conference on Information Systems, PACIS 2013. Pacific Asia Conference on Information Systems, 2013.

[186]
H.S. Moon, J.K. Kim, and Y.U. Ryu. A sequence-based filtering method for exhibition booth visit recommendations. International Journal of Information Management, 33(4):620–626, 2013.

[187]
A. Mouhtaropoulos, P. Dimotikalis, and C.-T. Li. Applying a digital forensic readiness framework: Three case studies. In 2013 13th IEEE International Conference on Technologies for Homeland Security, HST 2013, pages 217–223, 2013. (doi:10.1109/THS.2013.6699003)

[188]
E. Mourtou. Modeling access control in healthcare organizations. In IT Policy and Ethics: Concepts, Methodologies, Tools, and Applications, volume 2-3, pages 835–856. IGI Global, 2013. (doi:10.4018/978-1-4666-2919-6.ch038)

[189]
H. Muhammad, F. Mascarenhas, and R. Ierusalimschy. LuaRocks — a declarative and extensible package management system for lua. 17th Brazilian Symposium on Programming Languages, SBLP 2013, 8129 LNCS:16–30, 2013. (doi:10.1007/978-3-642-40922-6_2)

[190]
Elissa E. S. Murphy, Yan V. Leshinsky, and John D. Mehr. Dynamic placement of replica data. United States Patent 8,560,639, October 2013. Assignee: Microsoft Corporation (Redmond, WA).

[191]
E. Murphy-Hill, T. Zimmermann, C. Bird, and N. Nagappan. The design of bug fixes. In 2013 35th International Conference on Software Engineering, ICSE 2013, pages 332–341, 2013. (doi:10.1109/ICSE.2013.6606579)

[192]
S. Nadi, C. Dietrich, R. Tartler, R.C. Holt, and D. Lohmann. Linux variability anomalies: What causes them and how do they get fixed? In 10th International Working Conference on Mining Software Repositories, MSR 2013, pages 111–120, 2013. (doi:10.1109/MSR.2013.6624017)

[193]
H. Naguib, N. Narayan, B. Brügge, and D. Helal. Bug report assignee recommendation using activity profiles. In 10th International Working Conference on Mining Software Repositories, MSR 2013, pages 22–30, 2013. (doi:10.1109/MSR.2013.6623999)

[194]
A. Narayanan, Y. Chen, S. Pang, and B. Tao. The effects of different representations on static structure analysis of computer malware signatures. The Scientific World Journal, 2013, 2013. (doi:10.1155/2013/671096)

[195]
B.S. Neto, V.T. Da Silva, M. Ribeiro, E. Costa, and C. Lucena. Using jason to develop refactoring agents. In 2nd Brazilian Conference on Intelligent Systems, BRACIS 2013, pages 44–50. IEEE Computer Society, 2013. (doi:10.1109/BRACIS.2013.16)

[196]
P. Nistala and P. Kumari. An approach to carry out consistency analysis on requirements: Validating and tracking requirements through a configuration structure. In 2013 21st IEEE International Requirements Engineering Conference, RE 2013, pages 320–325. IEEE Computer Society, 2013. (doi:10.1109/RE.2013.6636737)

[197]
R. Olanda, M. Peŕez, and J.M. Ordunã. Hybrid P2P schemes for remote terrain interactive visualization systems. Future Generation Computer Systems, 29(6):1522–1532, 2013. (doi:10.1016/j.future.2012.11.002)

[198]
P. Oliveira, H. Borges, M.T. Valente, and H.A.X. Costa. Metrics-based detection of similar software. In 25th International Conference on Software Engineering and Knowledge Engineering, SEKE 2013, pages 447–450. Knowledge Systems Institute Graduate School, January 2013.

[199]
J.L. Ordiales Coscia, C. Mateos, M. Crasso, and A. Zunino. Anti-pattern free code-first web services for state-of-the-art Java WSDL generation tools. International Journal of Web and Grid Services, 9(2):107–126, 2013.

[200]
Raymond E. Ozzie, Jack E. Ozzie, George P. Moromisato, Paresh S. Suthar, Raman Narayanan, and Matthew S. Augustine. Data synchronization and sharing relationships. United States Patent 8,370,423, February 2013. Assignee: Microsoft Corporation (Redmond, WA).

[201]
Raymond E. Ozzie, Jack E. Ozzie, Paresh S. Suthar, Raman Naravanan, and Matthew S. Augustine. Clipboard augmentation with references. United States Patent 8,453,066, May 2013. Assignee: Microsoft Corporation (Redmond, WA).

[202]
T.Y. Pang and S. Maslov. Universal distribution of component frequencies in biological and technological systems. Proceedings of the National Academy of Sciences of the United States of America, 110(15):6235–6239, 2013.

[203]
E. Pantano. Ubiquitous retailing innovative scenario: From the fixed point of sale to the flexible ubiquitous store. Journal of Technology Management and Innovation, 8(2):84–92, 2013.

[204]
D. Papadimitriou, D. Colle, P. Audenaert, and P. Demeester. Geometric information routing. In 2013 IEEE International Conference on Advanced Networks and Telecommunications Systems, ANTS 2013. IEEE Computer Society, 2013. (doi:10.1109/ANTS.2013.6802893)

[205]
C.T. Papadopoulos, M.E.J. Okelly, and A.K. Tsadiras. A DSS for the buffer allocation of production lines based on a comparative evaluation of a set of search algorithms. International Journal of Production Research, 51(14):4175–4199, 2013. (doi:10.1080/00207543.2012.752585)

[206]
P.M. Papadopoulos, I.G. Stamelos, and A. Meiszner. Enhancing software engineering education through open source projects: Four years of students' perspectives. Education and Information Technologies, 18(2):381–397, 2013.

[207]
G. Paschalidou, E. Stiakakis, and A. Chatzigeorgiou. An application of data envelopment analysis to software quality assessment. In 6th Balkan Conference in Informatics, BCI 2013, pages 228–235, 2013. (doi:10.1145/2490257.2490264)

[208]
S. Pavalkis, L. Nemuraite, and R. Butkiene. Derived properties: A user friendly approach to improving model traceability. Information Technology and Control, 42(1):48–60, 2013.

[209]
D.J. Pearce. Sound and complete flow typing with unions, intersections and negations. 14th International Conference on Verification, Model Checking, and Abstract Interpretation, VMCAI 2013, 7737 LNCS:335–354, 2013. (doi:10.1007/978-3-642-35873-9_21)

[210]
Marcus Peinado and Weidong Cui. Malware investigation by analyzing computer memory. United States Patent 8,566,944, October 2013. Assignee: Microsoft Corporation (Redmond, WA).

[211]
E. Perel and U. Yechiali. On customers acting as servers. Asia-Pacific Journal of Operational Research, 30(5), 2013. (doi:10.1142/S021759591350019X)

[212]
E. Pérez-Cortés and H. Sato. On the impact of path redundancy awareness in evolutionary P2P networking. Journal of Advanced Computational Intelligence and Intelligent Informatics, 17(6):872–882, 2013.

[213]
F. Peters, T. Menzies, and A. Marcus. Better cross company defect prediction. In 10th International Working Conference on Mining Software Repositories, MSR 2013, pages 409–418, 2013. (doi:10.1109/MSR.2013.6624057)

[214]
A. Pino. Augmentative and alternative communication systems for the motor disabled. Disability Informatics and Web Accessibility for Motor Limitations, pages 105–152, 2013. (doi:10.4018/978-1-4666-4442-7.ch004)

[215]
A. Pino. Free assistive technology software for persons with motor disabilities. Assistive Technologies and Computer Access for Motor Disabilities, pages 110–152, 2013. (doi:10.4018/978-1-4666-4438-0.ch005)

[216]
S. Prstacic and M. Zagar. A model for web application and web service peer-to-peer hosting network architecture. In 35th International Conference on Information Technology Interfaces, ITI 2013, pages 335–340, 2013.

[217]
A.S.M.M. Rahman and A. El Saddik. Mobile pointme-based spatial haptic interaction with annotated media for learning purposes. Multimedia Systems, 19(2):131–149, 2013.

[218]
A. Rastogi and A. Sureka. Samikshaumbra: Contribution and performance assessment of software maintenance professionals by mining software repositories. In 2013 20th Asia-Pacific Software Engineering Conference, APSEC 2013, pages 170–175. IEEE Computer Society, 2013. (doi:10.1109/APSEC.2013.134)

[219]
A. Rastogi, A. Gupta, and A. Sureka. Samiksha: Mining issue tracking system for contribution and performance assessment. In ACM International Conference Proceeding Series, pages 13–22, 2013.

[220]
N. Ratti and P. Kaur. Case study: Version control in component-based systems. In Designing, Engineering, and Analyzing Reliable and Efficient Software, pages 283–297. IGI Global, 2013. (doi:10.4018/978-1-4666-2958-5.ch016)

[221]
A.J. Reinoso, J.M. Gonzalez-Barahona, R. Muñoz Mansilla, and I. Herraiz. Temporal characterization of the requests to Wikipedia. Studies in Computational Intelligence, 439:71–89, 2013. (doi:10.1007/978-3-642-31546-6-5)

[222]
H. Ren, W. Mo, S. Liu, D. Li, Y. Sun, and G. Zhao. Code automation technology based COSINE software development. In ASME 2013 Power Conference, POWER 2013, volume 2. American Society of Mechanical Engineers, 2013. (doi:10.1115/POWER2013-98109)

[223]
H. Ren, W.-T. Mo, G. Zhao, and S. Liu. Automation algorithm of COSINE software code framework based on breadth first search. Yuanzineng Kexue Jishu/Atomic Energy Science and Technology, 47(SUPPL.):717–720, 2013. (doi:10.7538/yzk.2013.47.S1.0717)

[224]
P. Rivière and O. Rosec. Model-based interchange formats: A generic set of tools for validating structured data against a knowledge base. In 2013 Complex Systems Design and Management Conference, CSDM 2013, volume 1085, pages 127–138. CEUR-WS, 2013.

[225]
D. Rodriguez, R. Ruiz, J.C. Riquelme, and R. Harrison. A study of subgroup discovery approaches for defect prediction. Information and Software Technology, 55(10):1810–1822, 2013. (doi:10.1016/j.infsof.2013.05.002)

[226]
C. Ruiz and W. Robinson. Measuring open source quality: A literature review. In Open Source Software Dynamics, Processes, and Applications, pages 189–206. IGI Global, 2013. (doi:10.4018/978-1-4666-2937-0.ch010)

[227]
G. Samarthyam, G. Suryanarayana, T. Sharma, and S. Gupta. MIDAS: A design quality assessment method for industrial software. In 2013 35th International Conference on Software Engineering, ICSE 2013, pages 911–920, 2013. (doi:10.1109/ICSE.2013.6606640)

[228]
B.T. Sampath Kumar and D. Vinay Kumar. HTTP 404-page (not) found: Recovery of decayed url citations. Journal of Informetrics, 7(1):145–157, 2013. (doi:10.1016/j.joi.2012.09.007)

[229]
L. Sang-Hyun, J.-G. Lee, and M. Kyung-Il. Smart home security system using multiple ANFIS. International Journal of Smart Home, 7(3):121–132, 2013.

[230]
M. Sarrab and O.M.H. Rehman. Selection criteria of open source software: First stage for adoption. International Journal of Information Processing and Management, 4(4):51–58, 2013. (doi:10.4156/ijipm.vol4.issue4.6)

[231]
J. Schaeffler. Digital video recorders: DVRs changing TV and advertising forever. Taylor and Francis, 2013. (doi:10.4324/9780080928333)

[232]
Christoph Schnelle and Geoffrey John Nolan. Mapping of data from XML to SQL. United States Patent 8,396,901, March 2013. Assignee: Timebase Pty Limited (Sydney, New South Wales, AU).

[233]
B. Schoenmakers, N. Van Den Broek, I. Nagy, B. Vasilescu, and A. Serebrenik. Assessing the complexity of upgrading software modules. In 20th Working Conference on Reverse Engineering, WCRE 2013, pages 433–440, 2013. (doi:10.1109/WCRE.2013.6671319)

[234]
P. Sendın-Raña, F.J. González-Castaño, F. Gómez-Cuba, R. Asorey-Cacheda, and J.M. Pousada-Carballo. Improving management performance of P2PSIP for mobile sensing in wireless overlays. Sensors (Switzerland), 13(11):15364–15384, 2013. (doi:10.3390/s131115364)

[235]
M. Shojafar, J.H. Abawajy, Z. Delkhah, A. Ahmadi, Z. Pooranian, and A. Abraham. An efficient and distributed file search in unstructured peer-to-peer networks. Peer-to-Peer Networking and Applications, 8(1):120–136, 2013. (doi:10.1007/s12083-013-0236-0)

[236]
S. Shuraida and H. Barki. The influence of analyst communication in IS projects. Journal of the Association of Information Systems, 14(9):482–520, 2013.

[237]
Stylianos Sidiroglou, Angelos D. Keromytis, and Salvatore J. Stolfo. Systems, methods, and media protecting a digital data processing device from attack. United States Patent 8,407,785, March 2013. Assignee: The Trustees of Columbia University in the City of New York (New York, NY).

[238]
M.S. Sivakumar, J. Murji, L.D. Jacob, F. Nyange, and M. Banupriya. Speech controlled automatic wheelchair. In 2013 Pan African International Conference on Information Science, Computing and Telecommunications, PACT 2013, pages 70–73. Institute of Electrical and Electronics Engineers Inc., 2013. (doi:10.1109/SCAT.2013.7055093)

[239]
Q.D. Soetens, J. Perez, and S. Demeyer. An initial investigation into change-based reconstruction of floss-refactorings. In 29th IEEE International Conference on Software Maintenance, ICSM 2013, pages 384–387, 2013. (doi:10.1109/ICSM.2013.53)

[240]
A. Solano, C. Collazos, C. Rusu, and L. Merchán. Evaluating the usability of interactive digital television applications. In 2013 10th International Conference on Information Technology: New Generations, ITNG 2013, pages 127–132, 2013. (doi:10.1109/ITNG.2013.24)

[241]
G. Song, B. Yang, Z. Wu, J. Chuai, and Y. Zheng. ROIN: Reputation-oriented inverted indexing for the P2P network. Journal of Supercomputing, 64(3):968–986, 2013. (doi:10.1007/s11227-013-0878-y)

[242]
M.E. Sosa-Rodrıguez and E. Pérez-Cortés. The evolution of cooperation in file sharing P2P systems: First steps. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 7630 LNAI(PART 2):151–162, 2013.

[243]
David Howard Spencer and Darla Renae Agard. Systems, methods and software for researching statutory information. United States Patent 8,458,190, June 2013. Assignee: Thomson Reuters Global Resources (Baar, CH).

[244]
Varadarajan Sridhar, Ravi G. Amur, and Korrapati Kalyane Rao. System and method for automated safe reprogramming of software radios. United States Patent 8,347,108, January 2013. Assignee: Satyam Computer Services Limited of Mayfair Centre (Secunderabad, IN).

[245]
D. Stingl, C. Groß, and K. Saller. Decentralized monitoring in peer-to-peer systems. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 7847:81–111, 2013. (doi:10.1007/978-3-642-38673-2-6)

[246]
Salvatore J. Stolfo, Angelos D. Keromytis, and Stylianos Sidiroglou. Methods, media, and systems for detecting anomalous program executions. United States Patent 8,601,322, December 2013. Assignee: The Trustees of Columbia University in the City of New York (New York, NY).

[247]
Z. Sun, S. Pan, Y.C. Su, and P. Zhang. Headio: Zero-configured heading acquisition for indoor mobile devices through multimodal context sensing. In 2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing, UbiComp 2013, pages 33–42, 2013. (doi:10.1145/2493432.2493434)

[248]
W.D. Sunindyo, T. Moser, D. Winkler, and S. Biffl. Analyzing OSS project health with heterogeneous data sources. In Open Source Software Dynamics, Processes, and Applications, pages 207–230. IGI Global, 2013. (doi:10.4018/978-1-4666-2937-0.ch011)

[249]
C.R. Suthikshn Kumar. Portable speech encryption based anti-tapping device. In 135th Audio Engineering Society Convention 2013, pages 523–528. Audio Engineering Society, 2013.

[250]
Y. Thomas, C. Tsilopoulos, G. Xylomenos, and G.C. Polyzos. Multisource and multipath file transfers through publish-subscribe internetworking. In 2013 3rd ACM SIGCOMM Workshop on Information-Centric Networking, ICN 2013, pages 43–44, 2013. (doi:10.1145/2491224.2491238)

[251]
P. Tomas, M.J. Escalona, and M. Mejias. Open source tools for measuring the internal quality of Java software products. a survey. Computer Standards and Interfaces, 36(1):244–255, 2013. (doi:10.1016/j.csi.2013.08.006)

[252]
S. Treter, N. Perrier, J.A. Sosa, and S. Roman. Telementoring: A multi-institutional experience with the introduction of a novel surgical approach for adrenalectomy. Annals of Surgical Oncology, 20(8):2754–2758, 2013. (doi:10.1245/s10434-013-2894-9)

[253]
A.K. Tsadiras, C.T. Papadopoulos, and M.E.J. O'Kelly. An artificial neural network based decision support system for solving the buffer allocation problem in reliable production lines. Computers and Industrial Engineering, 66(4):1150–1162, 2013. (doi:10.1016/j.cie.2013.07.024)

[254]
E. Tsekleves, R. Whitham, K. Kondo, and A. Hill. Investigating pay-as-you-go to address issues of trust, privacy and security around media use at home. Universal Access in the Information Society, 12(2):217–231, 2013.

[255]
B. Turhan, A. Tosun Misirli, and A. Bener. Empirical evaluation of the effects of mixed project data on learning defect predictors. Information and Software Technology, 55(6):1101–1118, 2013.

[256]
I. Turnu, G. Concas, M. Marchesi, and R. Tonelli. The fractal dimension of software networks as a global quality metric. Information Sciences, 245:290–303, 2013. (doi:10.1016/j.ins.2013.05.014)

[257]
M. Umarji and S.E. Sim. Archetypal internet-scale source code searching. Finding Source Code on the Web for Remix and Reuse, pages 35–52, 2013. (doi:10.1007/978-1-4614-6596-6_3)

[258]
V. Urovi, A.C. Olivieri, S. Bromuri, N. Fornara, and M.I. Schumacher. A peer to peer agent coordination framework for IHE based cross-community health record exchange. In Proceedings of the ACM Symposium on Applied Computing, pages 1355–1362, 2013.

[259]
Ashok Vadekar and Brian Neill. Retrofitting authentication onto firmware. United States Patent 8,566,791, October 2013. Assignee: BlackBerry Limited (Waterloo, Ontario, CA).

[260]
T. Vaimann, A. Kallaste, A. Kilk, and A. Belahcen. Lifecycle-based design and optimization of electrical motor-drives — challenges and possibilities. In 2013 3rd International Conference on Electric Power and Energy Conversion Systems, EPECS 2013, 2013. (doi:10.1109/EPECS.2013.6713037)

[261]
S. Vasilakos, C.D. Stylios, and J. Garofalakis. An analytical hierarchy process methodology to evaluate it solutions for organizations. In 25th European Modeling and Simulation Symposium, EMSS 2013, pages 593–600, 2013.

[262]
B. Vasilescu, V. Filkov, and A. Serebrenik. Stackoverflow and GitHub: Associations between software development and crowdsourced knowledge. In 2013 ASE/IEEE Int. Conf. on Social Computing, SocialCom 2013, the 2013 ASE/IEEE Int. Conf. on Big Data, BigData 2013, the 2013 Int. Conf. on Economic Computing, EconCom 2013, the 2013 PASSAT 2013, and the 2013 ASE/IEEE Int. Conf. on BioMedCom 2013, pages 188–195, 2013. (doi:10.1109/SocialCom.2013.35)

[263]
M.J. Villanueva, F. Valverde, and O. Pastor. Involving end-users in domain-specific languages development experiences from a bioinformatics SME. In 8th International Conference on Evaluation of Novel Approaches to Software Engineering, ENASE 2013, pages 97–108, 2013.

[264]
V. Šešum Čavić and E. Kühn. Algorithms and framework for comparison of bee-intelligence based peer-to-peer lookup. 4th International Conference on Advances in Swarm Intelligence, ICSI 2013, 7928 LNCS(PART 1):404–413, 2013. (doi:10.1007/978-3-642-38703-6_48)

[265]
S. Wagner. Software product quality control. Springer Berlin Heidelberg, 2013. (doi:10.1007/978-3-642-38571-1)

[266]
C.-S. Wang, C.-L. Chen, and D.-J. Deng. P2P-based mobile navigation system with location service. Peer-to-Peer Networking and Applications, 8(1):22–31, 2013. (doi:10.1007/s12083-013-0204-8)

[267]
J. Wang, X. Chen, and D. Yang. A study of important node rank based on KAD network. Advanced Science Letters, 19(8):2266–2270, 2013.

[268]
J. Wang, Z. Zhang, K. Xu, Y. Yin, and P. Guo. A research on security and privacy issues for patient related data in medical organization system. International Journal of Security and its Applications, 7(4):287–298, 2013.

[269]
L. Wang, P. Yu, Z. Wang, C. Yang, and Q. Ye. On the evolution of linux kernels: A complex network perspective. Journal of software: Evolution and Process, 25(5):439–458, 2013.

[270]
T. Wegeler, F. Gutzeit, A. Destailleur, and B. Dock. Evaluating the benefits of using domain-specific modeling languages — an experience report. In 2013 13th ACM Workshop on Domain-Specific Modeling, DSM 2013, pages 7–12. Association for Computing Machinery, 2013. (doi:10.1145/2541928.2541930)

[271]
M. Weiher and R. Hirschfeld. Polymorphic identifiers: Uniform resource access in objective-smalltalk. In 9th Dynamic Languages Symposium, DLS 2013 - Co-located with the 4th Annual ACM International Conference on Systems, Programming, Languages, and Applications: Software for Humanity, SPLASH 2013, pages 61–71. Association for Computing Machinery, 2013. (doi:10.1145/2508168.2508169)

[272]
F. Wu. Scale-free characteristic in open source software: An empirical case study. International Journal of Advancements in Computing Technology, 5(1):792–799, 2013. (doi:10.4156/ijact.vol5.issue1.88)

[273]
H. Xia, L. Meng, and S. Lou. Research on spatial image streaming model based on bittorrent. Cehui Xuebao/Acta Geodaetica et Cartographica Sinica, 42(2):225–232, 2013.

[274]
D.-G. Xu, L.-H. Qin, J.-H. Park, and J.-L. Zhou. ODSA: Chord-based object discovery service architecture for the internet of things. Wireless Personal Communications, 73(4):1455–1476, 2013. (doi:10.1007/s11277-013-1260-3)

[275]
H. Yamamoto and K. Yamazaki. LISP-based application-layer multicasting system for a content distribution network. Journal of Information Processing, 21(2):226–236, 2013.

[276]
H. Yamamoto and K. Yamazaki. Location-aware optimal resource selection method for P2P-based contents management and real-time distribution. IEICE Transactions on Information and Systems, E96-D(2):213–225, 2013. (doi:10.1587/transinf.E96.D.213)

[277]
Q. Yan, Y. Li, and R.H. Deng. Malware protection on RFID-enabled supply chain management systems in the EPCglobal network. In Advanced Security and Privacy for RFID Technologies, pages 153–175. IGI Global, 2013. (doi:10.4018/978-1-4666-3685-9.ch010)

[278]
Q. Yan, Y. Li, and R.H. Deng. Malware protection on RFID-enabled supply chain management systems in the EPCglobal network. Crisis Management: Concepts, Methodologies, Tools, and Applications, 2-3:1166–1188, 2013. (doi:10.4018/978-1-4666-4707-7.ch058)

[279]
M.H. Yarmand and D.G. Down. Server allocation for zero buffer tandem queues. European Journal of Operational Research, 230(3):596–603, 2013.

[280]
H. Zafar. Human resource information systems: Information security concerns for organizations. Human Resource Management Review, 23(1):105–113, 2013. (doi:10.1016/j.hrmr.2012.06.010)

[281]
C. Zhai and H. Liu. Factors affecting SMEs adoption decision of B2B e-marketplace: A case study in China. In 2013 10th International Conference on Service Systems and Service Management, ICSSSM 2013, pages 262–266, 2013. (doi:10.1109/ICSSSM.2013.6602643)

[282]
F. Zhang, A. Mockus, Y. Zou, F. Khomh, and A.E. Hassan. How does context affect the distribution of software maintainability metrics? In 29th IEEE International Conference on Software Maintenance, ICSM 2013, pages 350–359, 2013. (doi:10.1109/ICSM.2013.46)

[283]
W. Zhang, S. Wang, Y. Yang, and Q. Wang. Heterogeneous network analysis of developer contribution in bug repositories. In 2013 International Conference on Cloud and Service Computing, CSC 2013, pages 98–105. IEEE Computer Society, 2013. (doi:10.1109/CSC.2013.23)

[284]
Z. Zhao and Y. Guo. Scale-free model in software engineering: A new design method. 2013 International Conference on Geo-Informatics in Resource Management and Sustainable Ecosystem, GRMSE 2013, 399 PART II:346–353, 2013. (doi:10.1007/978-3-642-41908-9_35)

[285]
Y. Zhao, X. Pan, C.C. Li, G. Yao, J. Wu, X. Fu, D. Lai, D. Li, and Q. Zhang. Modeling and case study of the production line layout system. Open Automation and Control Systems Journal, 5(1):51–58, 2013. (doi:10.2174/1874444301305010051)

[286]
Y. Zhao, X.Y. Pan, and C.C. Li. Modeling and case study of the production line layout system. 9th International Symposium on Linear Drives for Industry Applications, LDIA 2013, 416-417:1373–1380, 2013. (doi:10.4028/www.scientific.net/AMM.416-417.1373)

[287]
Y. Zhao, X.Y. Pan, C.C. Li, G.H. Yao, J. Wu, X. Fu, D. Lai, D. Li, and Q.W. Zhang. Optimal production linelayout model based on integer programming. Advanced Materials Research, 690 693:2896–2900, 2013.

[288]
Yu Zheng, Lizhu Zhang, and Xing Xie. Mining correlation between locations using location history. United States Patent 8,612,134, December 2013. Assignee: Microsoft Corporation (Redmond, WA).

[289]
Z. Zhu and A. Afanasyev. Let's ChronoSync: Decentralized dataset state synchronization in named data networking. In 2013 21st IEEE International Conference on Network Protocols, ICNP 2013. IEEE Computer Society, 2013. (doi:10.1109/ICNP.2013.6733578)

[290]
J. Zhu, J. He, H. Zhou, and B. Zhao. EPCache: In-network video caching for LTE core networks. In 2013 International Conference on Wireless Communications and Signal Processing, WCSP 2013. IEEE Computer Society, 2013. (doi:10.1109/WCSP.2013.6677228)

[291]
D. Zissis and D. Lekkas. Trust coercion in the name of usable public key infrastructure. Security and Communication Networks, 7(11):1734–1745, 2013. (doi:10.1002/sec.870)

[1]
E. Abdullah and S. Fujita. Reputation-based colluder detection schemes for peer-to-peer content delivery networks''. IEICE Transactions on Information and Systems, E96-D(12):2696–2703, 2013. (doi:10.1587/transinf.E96.D.2696)

[2]
R. Agarwal and Y. Pradeep. Bridging the gap between traditional and online shopping methods for Indian customers through digital interactive experience. In 2013 2nd International Conference on Advances in Computing, Communications and Informatics, ICACCI 2013, pages 1184–1189, 2013. (doi:10.1109/ICACCI.2013.6637345)

[3]
M.I. Ahmed and M. Abo-Rizka. Remote internet voting: Security and performance issues. In 2013 World Congress on Internet Security, WorldCIS 2013, pages 56–64. IEEE Computer Society, 2013. (doi:10.1109/WorldCIS.2013.6751017)

[4]
J. Al Dallal. Incorporating transitive relations in low-level design-based class cohesion measurement. Software - Practice and Experience, 43(6):685–704, 2013.

[5]
J. Al Dallal. Object-oriented class maintainability prediction using internal quality attributes. Information and Software Technology, 55(11):2028–2048, 2013. (doi:10.1016/j.infsof.2013.07.005)

[6]
S. Alhusain, S. Coupland, R. John, and M. Kavanagh. Design pattern recognition by using adaptive neuro fuzzy inference system. In 25th IEEE International Conference on Tools with Artificial Intelligence, ICTAI 2013, pages 581–587, 2013. (doi:10.1109/ICTAI.2013.92)

[7]
S. Alhusain, S. Coupland, R. John, and M. Kavanagh. Towards machine learning based design pattern recognition. In 2013 13th UK Workshop on Computational Intelligence, UKCI 2013, pages 244–251, 2013. (doi:10.1109/UKCI.2013.6651312)

[8]
M.Y. Allaho and W.-C. Lee. Analyzing the social ties and structure of contributors in open source software community. In 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2013, pages 56–60. Association for Computing Machinery, 2013. (doi:10.1145/2492517.2492627)

[9]
M. Allamanis and C. Sutton. Mining source code repositories at massive scale using language modeling. In 10th International Working Conference on Mining Software Repositories, MSR 2013, pages 207–216, 2013. (doi:10.1109/MSR.2013.6624029)

[10]
S. Almugrin, W. Albattah, and A. Melton. Frequent pattern mining in software engineering. In 22nd International Conference on Software Engineering and Data Engineering, SEDE 2013, pages 97–104, 2013.

[11]
S. Astromskis, A. Janes, A. Sillitti, and G. Succi. Supporting governance in disciplined agile delivery using noninvasive measurement and process mining. Cutter IT Journal, 26(11):25–29, 2013.

[12]
I. Astrova, A. Koschel, L. Renners, T. Rossow, and M. Schaaf. Integrating structured peer-to-peer networks into OM4SPACE project. In 27th International Conference on Advanced Information Networking and Applications Workshops, WAINA 2013, pages 1211–1216, 2013. (doi:10.1109/WAINA.2013.88)

[13]
I.N. Athanasiadis and F. Villa. A roadmap to domain specific programming languages for environmental modeling: Key requirements and concepts. In 2013 13th ACM Workshop on Domain-Specific Modeling, DSM 2013, pages 27–32. Association for Computing Machinery, 2013. (doi:10.1145/2541928.2541934)

[14]
J. Augustine, A.R. Molla, E. Morsy, G. Pandurangan, P. Robinson, and E. Upfal. Storage and search in dynamic peer-to-peer networks. In 25th ACM Symposium on Parallelism in Algorithms and Architectures, SPAA 2013, pages 53–62, 2013.

[15]
L. Aversano and M. Tortorella. Quality evaluation of floss projects: Application to ERP systems. Information and Software Technology, 55(7):1260–1276, 2013.

[16]
S. Banani and K. Wipusitwarakun. A multipath routing protocol over chord-based internet indirection infrastructure (13). Information Technology Journal, 12(1):1–14, 2013. (doi:10.3923/itj.2013.1.14)

[17]
H.M.N.D. Bandara and A.P. Jayasumana. Community-based caching for enhanced lookup performance in P2P systems. IEEE Transactions on Parallel and Distributed Systems, 24(9):1752–1762, 2013. (doi:10.1109/TPDS.2012.270)

[18]
D. Bell and S.R. Shirzad. Social media business intelligence: A pharmaceutical domain analysis study. International Journal of Sociotechnology and Knowledge Development, 5(3):51–73, 2013. (doi:10.4018/ijskd.2013070104)

[19]
S.M. Bellovin, M. Blaze, S. Clark, and S. Landau. Going bright: Wiretapping without weakening communications infrastructure. IEEE Security and Privacy, 11(1):62–72, 2013. (doi:10.1109/MSP.2012.138)

[20]
M.V. Belmonte, M. Dıaz, and A. Reyna. Improving file sharing experience with incentive based coalitions. 3rd International Conference on Agents and Artificial Intelligence, ICAART 2011, 271:287–301, 2013. (doi:10.1007/978-3-642-29966-7_19)

[21]
X. Ben, S. Beijun, and Y. Weicheng. Mining developer contribution in open source software using visualization techniques. In Proceedings of the 2013 3rd International Conference on Intelligent System Design and Engineering Applications, ISDEA 2013, pages 934–937, 2013.

[22]
T.F. Bissyandé, F. Thung, D. Lo, L. Jiang, and L. Réveillère. Orion: A software project search engine with integrated diverse software artifacts. In 18th International Conference on Engineering of Complex Computer Systems, ICECCS 2013, pages 242–245, 2013. (doi:10.1109/ICECCS.2013.42)

[23]
F. Blanchet-Sadri, B. Chen, and S. Munteanu. A note on constructing infinite binary words with polynomial subword complexity. RAIRO - Theoretical Informatics and Applications, 47(2):171–180, 2013.

[24]
I. Bluemke and R. Roguski. Metrics in assessing the quality and evolution of jEdit. Lecture Notes in Electrical Engineering, 151 LNEE:717–727, 2013. (doi:10.1007/978-1-4614-3558-7_61)

[25]
X. Bonnaire. Fixed interval nodes estimation: An accurate and low cost algorithm to estimate the number of nodes in distributed hash tables. Information Sciences, 218:165–181, 2013. (doi:10.1016/j.ins.2012.06.004)

[26]
Brian M. Bowen, Pratap V. Prabhu, Vasileios P. Kemerlis, Stylianos Sidiroglou, Salvatore J. Stolfo, and Angelos D. Keromytis. Methods, systems, and media for detecting covert malware. United States Patent 8,528,091, September 2013. Assignee: The Trustees of Columbia University in the City of New York (New York, NY).

[27]
M. Brandtner. Fostering software quality assessment. In 2013 35th International Conference on Software Engineering, ICSE 2013, pages 1393–1396, 2013. (doi:10.1109/ICSE.2013.6606725)

[28]
David Broman, Jonathan Keljo, Vance Morrison, Sean Selitrennikoff, and Hsu-chieh Yuan. Detaching profilers. United States Patent 8,601,445, December 2013. Assignee: Microsoft Corporation (Redmond, WA).

[29]
D. Bueno, K.J. Compton, K.A. Sakallah, and M. Bailey. Detecting traditional packers, decisively. 16th International Symposium on Research in Attacks, Intrusions, and Defenses, RAID 2013, 8145 LNCS:184–203, 2013. (doi:10.1007/978-3-642-41284-4_10)

[30]
T. Busjahn and C. Schulte. The use of code reading in teaching programming. In 13th Koli Calling International Conference on Computing Education Research, Koli Calling 2013, pages 3–11, 2013. (doi:10.1145/2526968.2526969)

[31]
C.G. Cegielski, D.M. Bourrie, and B.T. Hazen. Evaluating adoption of emerging IT for corporate IT strategy: Developing a model using a qualitative method. Information Systems Management, 30(3):235–249, 2013. (doi:10.1080/10580530.2013.794632)

[32]
K.K. Chaturvedi, V.B. Sing, and P. Singh. Tools in mining software repositories. In 2013 13th International Conference on Computational Science and Its Applications, ICCSA 2013, pages 89–98. IEEE Computer Society, 2013. (doi:10.1109/ICCSA.2013.22)

[33]
A. Chatzigeorgiou and E. Stiakakis. Combining metrics for software evolution assessment by means of data envelopment analysis. Journal of software: Evolution and Process, 25(3):303–324, 2013.

[34]
C. Chen, P. Wang, Y. Liu, G. Wu, and P. Wang. Impacts of government website information on social sciences and humanities in China: A citation analysis. Government Information Quarterly, 30(4):450–463, 2013. (doi:10.1016/j.giq.2013.05.008)

[35]
M. Colledani, G. Pedrielli, W. Terkaj, and M. Urgo. Integrated virtual platform for manufacturing systems design. In 46th CIRP Conference on Manufacturing Systems, CIRP CMS 2013, volume 7, pages 425–430, 2013. (doi:10.1016/j.procir.2013.06.010)

[36]
M. Colledani. Performance evaluation of two-stage buffered production systems with discrete general Markovian machines. In 7th IFAC Conference on Manufacturing Modelling, Management, and Control, MIM 2013, pages 1638–1643, 2013. (doi:10.3182/20130619-3-RU-3018.00516)

[37]
Rod Cope. Noise reduction for content matching analysis results for protectable content. United States Patent 8,498,982, July 2013. Assignee: OpenLogic, Inc. (Broomfield, CO).

[38]
H.K. Cora, H. Turgut Uyar, and A.  c Sima Etaner-Uyar. HH-DSL: A domain specific language for selection hyper-heuristics. In 15th Annual Conference on Genetic and Evolutionary Computation, GECCO 2013, pages 1317–1324, 2013. (doi:10.1145/2464576.2482711)

[39]
E. Costello. Opening up to open source: Looking at how moodle was adopted in higher education. Open Learning, 28(3):187–200, 2013. (doi:10.1080/02680513.2013.856289)

[40]
J.J. Cusick. Durable ideas in software engineering: Concepts, methods and approaches from my virtual toolbox. Bentham Science Publishers Ltd., 2013. (doi:10.2174/97816080547631130101)

[41]
Z. Czirkos and G. Hosszú. Solution for the broadcasting in the Kademlia peer-to-peer overlay. Computer Networks, 57(8):1853–1862, 2013.

[42]
F. De Asıs López-Fuentes. An incentives model based on reputation for P2P systems. Journal of Telecommunications and Information Technology, 2013(4):92–101, 2013.

[43]
W.K. Dédzoé, P. Lamarre, R. Akbarinia, and P. Valduriez. As-soon-as-possible top-k query processing in P2P systems. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 7980:1–27, 2013. (doi:10.1007/978-3-642-40069-8-1)

[44]
T. Delot and M. Thilliez. Data access and ambient computing. Computer Science and Ambient Intelligence, pages 121–134, 2013. (doi:10.1002/9781118580974.ch7)

[45]
L. Demir, A. Diamantidis, D.T. Eliiyi, M.E.J. O'Kelly, C.T. Papadopoulos, A.K. Tsadiras, and S. Tunali. A comparison of three search algorithms for solving the buffer allocation problem in reliable production lines. In 7th IFAC Conference on Manufacturing Modelling, Management, and Control, MIM 2013, pages 1626–1631, 2013. (doi:10.3182/20130619-3-RU-3018.00345)

[46]
L. Demir, S. Tunali, D.T. Eliiyi, and A. Løkketangen. Two approaches for solving the buffer allocation problem in unreliable production lines. Computers and Operations Research, 40(10):2556–2563, 2013.

[47]
G. Dévai, D. Leskó, and M. Tejfel. Embedding and parsing combined for efficient language design. In 8th International Joint conference on Software Technologies, ICSOFT 2013, pages 244–250, 2013.

[48]
S. Dey, Y. Liu, S. Wang, and Y. Lu. Addressing response time of cloud-based mobile applications. In 1st International Workshop on Mobile Cloud Computing and Networking, MobileCloud 2013, pages 3–10, 2013. (doi:10.1145/2492348.2492359)

[49]
A.F. Dragoni. Health services through digital terrestrial television. Telehealth Networks for Hospital Services: New Methodologies, pages 207–227, 2013. (doi:10.4018/978-1-4666-2979-0.ch014)

[50]
H. E, X. Jin, J. Tong, M. Song, and X. Zhu. Measure method and metrics for network characteristics in service systems. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 7719 LNCS:180–193, 2013.

[51]
P. Eeles. Building a platform for innovation: Architecture and agile as key enablers. Agile Software Architecture: Aligning Agile Processes and Software Architectures, pages 315–333, 2013. (doi:10.1016/B978-0-12-407772-0.00012-5)

[52]
G. Einziger, R. Friedman, and E. Kibbar. Kaleidoscope: Adding colors to Kademlia. In 13th IEEE International Conference on Peer-to-Peer Computing, IEEE P2P 2013. IEEE Computer Society, 2013. (doi:10.1109/P2P.2013.6688703)

[53]
G. Epelde, E. Carrasco, G. Zimmermann, J. Alexandersson, R. Neßelrath, and M. Dubielzig. Universal remote console-based next-generation accessible television. Universal Access in the Information Society, 12(1):73–87, 2013.

[54]
G. Epelde, X. Valencia, E. Carrasco, J. Posada, J. Abascal, U. Diaz-Orueta, I. Zinnikus, and C. Husodo-Schulz. Providing universally accessible interactive services through TV sets: Implementation and validation with elderly users. Multimedia Tools and Applications, 67(2):497–528, 2013. (doi:10.1007/s11042-011-0949-0)

[55]
J. Fang, Y. Han, and Z. Zhao. A hierarchical service community model for cross-organizational service management. In 2013 International Conference on Service Science, ICSS 2013, pages 84–89, 2013. (doi:10.1109/ICSS.2013.57)

[56]
J. Feigenspan, C. Kästner, S. Apel, J. Liebig, M. Schulze, R. Dachselt, M. Papendieck, T. Leich, and G. Saake. Do background colors improve program comprehension in the #ifdef hell? Empirical Software Engineering, 18(4):699–745, 2013. (doi:10.1007/s10664-012-9208-x)

[57]
J.B. Fernández, B.S. De Abajo, J.M. Ramirez, E.G. Salcines, and C. de Castro Lozano. How the user behavior is affected by the use of secondary screens on interactive television: An affective usability dimension. Communications in Computer and Information Science, 278:557–562, 2013. (doi:10.1007/978-3-642-35879-1_70)

[58]
L.P. Ferreira, E.A. Gómez, G.P. Lourido, and B. Tjahjono. Modeling a complex production line using virtual cells. Lecture Notes in Electrical Engineering, 130 LNEE:361–373, 2013. (doi:10.1007/978-1-4614-2317-1_30)

[59]
J. Ferrer, F. Chicano, and E. Alba. Estimating software testing complexity. Information and Software Technology, 55(12):2125–2139, 2013. (doi:10.1016/j.infsof.2013.07.007)

[60]
C. Fieseler and M. Fleck. The pursuit of empowerment through social media: Structural social capital dynamics in CSR-blogging. Journal of Business Ethics, 118(4):759–775, 2013. (doi:10.1007/s10551-013-1959-9)

[61]
J. Fitsanakis. Digital Sparta: Information operations and cyber-warfare in Greece. Cyber Conflict: Competing National Perspectives, pages 135–164, 2013. (doi:10.1002/9781118562666.ch4)

[62]
S. Frey, W. Hasselbring, and B. Schnoor. Automatic conformance checking for migrating software systems to cloud infrastructures and platforms. Journal of software: Evolution and Process, 25(10):1089–1115, 2013. (doi:10.1002/smr.582)

[63]
J. Gao and W. Ding. A sensory data integrating bus under the intelligent transportation environment. In 2013 10th Web Information System and Application Conference, WISA 2013, pages 328–332. IEEE Computer Society, 2013. (doi:10.1109/WISA.2013.68)

[64]
M. Gardner, P. Sathre, W.-C. Feng, and G. Martinez. Characterizing the challenges and evaluating the efficacy of a CUDA-to-OpenCL translator. Parallel Computing, 39(12):769–786, 2013. (doi:10.1016/j.parco.2013.09.003)

[65]
A. Garrido and R. Johnson. Embracing the C preprocessor during refactoring. Journal of software: Evolution and Process, 25(12):1285–1304, 2013. (doi:10.1002/smr.1603)

[66]
T. Gavrielides and V. Artinopoulou. Restorative justice and violence against women: Comparing greece and the united kingdom. Asian Journal of Criminology, 8(1):25–40, 2013.

[67]
E. Gebennini, A. Grassi, C. Fantuzzi, S.B. Gershwin, and I.C. Schick. Discrete time model for two-machine one-buffer transfer lines with restart policy. Annals of Operations Research, 209(1):41–65, 2013. (doi:10.1007/s10479-011-0868-5)

[68]
M. Geva and A. Herzberg. DOT-COM: Decentralized online trading and commerce. 8th International Workshop on Security and Trust Management, STM 2012, 7783 LNCS:177–192, 2013. (doi:10.1007/978-3-642-38004-4_12)

[69]
H.R. Ghaeini, B. Akbari, and B. Barekatain. An adaptive packet loss recovery method for peer-to-peer video streaming over wireless mesh network. Lecture Notes in Electrical Engineering, 236 LNEE:713–721, 2013.

[70]
G. Ghezzi and H.C. Gall. Replicating mining studies with SOFAS. In 10th International Working Conference on Mining Software Repositories, MSR 2013, pages 363–372, 2013. (doi:10.1109/MSR.2013.6624050)

[71]
M. Ghorbani, M.R. Meybodi, and A.M. Saghiri. A new version of k-random walks algorithm in peer-to-peer networks utilizing learning automata. In 2013 5th Conference on Information and Knowledge Technology, IKT 2013, pages 1–6, 2013. (doi:10.1109/IKT.2013.6620028)

[72]
M. Ghorbani, M.R. Meybodi, and A.M. Saghiri. A novel self-adaptive search algorithm for unstructured peer-to-peer networks utilizing learning automata. In 2013 3rd Joint Conference of AI and Robotics and 5th RoboCup Iran Open International Symposium: Learning, Glorious Future, RIOS 2013, 2013. (doi:10.1109/RIOS.2013.6595306)

[73]
Y. Gil and V. Ratnakar. Knowledge capture in the wild: A perspective from semantic wiki communities. In 7th International Conference on Knowledge Capture: "Knowledge Capture in the Age of Massive Web Data", K-CAP 2013, 2013. (doi:10.1145/2479832.2479858)

[74]
Y. Gil, A. Knight, K. Zhang, L. Zhang, V. Ratnakar, and R. Sethi. The democratization of semantic properties: An analysis of semantic wikis. In 2013 IEEE 7th International Conference on Semantic Computing, ICSC 2013, pages 206–211, 2013. (doi:10.1109/ICSC.2013.44)

[75]
M. Gligoric, F. Behrang, Y. Li, J. Overbey, M. Hafiz, and D. Marinov. Systematic testing of refactoring engines on real software projects. 27th European Conference on Object-Oriented Programming, ECOOP 2013, 7920 LNCS:629–653, 2013. (doi:10.1007/978-3-642-39038-8-26)

[76]
M. Goeminne, M. Claes, and T. Mens. A historical dataset for the GNOME ecosystem. In 10th International Working Conference on Mining Software Repositories, MSR 2013, pages 225–228, 2013. (doi:10.1109/MSR.2013.6624032)

[77]
Valery Golender, Ido Ben Moshe, and Shlomo Wygodny. System and method for software diagnostics using a combination of visual and dynamic tracing. United States Patent 8,504,994, August 2013. Assignee: Identify Software, Ltd. (Petach-Tikva, IL).

[78]
J.M. Gonzalez-Barahona, D. Izquierdo-Cortazar, S. Maffulli, and G. Robles. Understanding how companies interact with free software communities. IEEE Software, 30(5):38–45, 2013. (doi:10.1109/MS.2013.95)

[79]
J. Gu, W. Wang, A. Huang, and H. Shan. Proactive storage at caching-enable base stations in cellular networks. In 2013 IEEE 24th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications, PIMRC 2013, pages 1543–1547, 2013. (doi:10.1109/PIMRC.2013.6666387)

[80]
Y. Guo, Z.-X. Zhao, and W. Wang. Complexity analysis of software based on function-call graph. In 19th International Conference on Industrial Engineering and Engineering Management, pages 269–277, 2013. (doi:10.1007/978-3-642-37270-4_26)

[81]
Satya V. Gupta and Prashant Shenoy. System and methods for run time detection and correction of memory corruption. United States Patent 8,510,596, August 2013. Assignee: Virsec Systems, Inc. (Acton, MA).

[82]
T.N. Gutierrez, L. Ciarletta, and V. Chevrier. Multi-agent simulation based governance of complex systems: Architecture and example implementation on free-riding. In 2013 Mexican International Conference on Computer Science, ENC 2013, pages 89–98. IEEE Computer Society, 2013. (doi:10.1109/ENC.2013.19)

[83]
M. Hammad, M. Hammad, and H. Bani-Salameh. Identifying designers and their design knowledge. International Journal of Software Engineering and its Applications, 7(6):277–288, 2013. (doi:10.14257/ijseia.2013.7.6.23)

[84]
S. Harrer, J. Lenhard, and G. Wirtz. Open source versus proprietary software in service-orientation: The case of BPEL engines. 11th International Conference on Service-Oriented Computing, ICSOC 2013, 8274 LNCS:99–113, 2013. (doi:10.1007/978-3-642-45005-1_8)

[85]
T. Hasegawa. A survey of the research on future internet and network architectures. IEICE Transactions on Communications, E96-B(6):1385–1401, 2013.

[86]
K.A. Hawick. Fluent interfaces to a java-based internal domain-specific languages for graph generation and analysis. In IASTED Multiconferences - Proceedings of the IASTED International Conference on Software Engineering, SE 2013, pages 752–759, 2013.

[87]
E.C.S. Hayashi, L.S.G. Piccolo, and M.C.C. Baranauskas. Perspectives on the evaluation of affective quality in social software. International Journal of Web Based Communities, 9(4):519–534, 2013. (doi:10.1504/IJWBC.2013.057217)

[88]
P. He, B. Li, Y. Ma, and L. He. Using software dependency to bug prediction. Mathematical Problems in Engineering, 2013, 2013. (doi:10.1155/2013/869356)

[89]
Q. He, Y. Wang, Y. Linlin, and Q.K. Key. P2PRPIPS: A P2P and reverse proxy based web intrusion protection system. Research Journal of Applied Sciences, Engineering and Technology, 5(7):2439–2444, 2013.

[90]
B. Henderson-Sellers, T. Clark, and C. Gonzalez-Perez. On the search for a level-agnostic modelling language. 25th International Conference on Advanced Information Systems Engineering, CAiSE 2013, 7908 LNCS:240–255, 2013. (doi:10.1007/978-3-642-38709-8_16)

[91]
I.M.T. Hernandez, A.M. Viveros, and E.H. Rubio. Analysis for the design of open applications on mobile devices. In 23rd International Conference on Electronics, Communications and Computing, CONIELECOMP 2013, pages 126–131, 2013. (doi:10.1109/CONIELECOMP.2013.6525772)

[92]
I. Herraiz, D. Rodriguez, G. Robles, and J.M. Gonzalez-Barahona. The evolution of the laws of software evolution: A discussion based on a systematic literature review. ACM Computing Surveys, 46(2), 2013. (doi:10.1145/2543581.2543595)

[93]
B. Hoisl, S. Sobernig, and M. Strembeck. Higher-order rewriting of model-to-text templates for integrating domain-specific modeling languages. In MODELSWARD 2013 - Proceedings of the 1st International Conference on Model-Driven Engineering and Software Development, pages 49–61, 2013.

[94]
H. Holm, M. Ekstedt, and T. Sommestad. Effort estimates on web application vulnerability discovery. In Proceedings of the Annual Hawaii International Conference on System Sciences, pages 5029–5038, 2013.

[95]
Z.-K. Hu, X.-L. Zheng, Y.-F. Wu, and D.-R. Chen. Product recommendation algorithm based on users' reviews mining. Zhejiang Daxue Xuebao (Gongxue Ban)/Journal of Zhejiang University (Engineering Science), 47(8):1475–1485, 2013. (doi:10.3785/j.issn.1008-973X.2013.08.023)

[96]
H. Huang, J. Xiao, Q. Yang, Q. Wang, and H. Wu. Creating process-agents incrementally by mining process asset library. Information Sciences, 233:183–199, 2013.

[97]
X. Huang, X. Ding, C.P. Lee, T. Lu, and N. Gu. Meanings and boundaries of scientific software sharing. In Proceedings of the ACM Conference on Computer Supported Cooperative Work, CSCW, pages 423–434, 2013.

[98]
X. Huang, T. Lu, X. Ding, T. Liu, and N. Gu. A provenance-based solution for software selection in scientific software sharing. In 2013 IEEE 17th International Conference on Computer Supported Cooperative Work in Design, CSCWD 2013, pages 172–177, 2013. (doi:10.1109/CSCWD.2013.6580958)

[99]
X. Huang, T. Zhao, and Y. Cao. PIR: A domain specific language for multimedia retrieval. In 15th IEEE International Symposium on Multimedia, ISM 2013, pages 359–363, 2013. (doi:10.1109/ISM.2013.68)

[100]
W. Hummer, P. Gaubatz, M. Strembeck, U. Zdun, and S. Dustdar. Enforcement of entailment constraints in distributed service-based business processes. Information and Software Technology, 55(11):1884–1903, 2013. (doi:10.1016/j.infsof.2013.05.001)

[101]
M.A. Ismail, T. Altaf, and S.H. Mirza. MCSMC: A new parallel multi-level cache simulator for multi-core processors. In 2013 Saudi International Electronics, Communications and Photonics Conference, SIECPC 2013, 2013. (doi:10.1109/SIECPC.2013.6550746)

[102]
B. Jay and J. Vergara. Growing a language in pattern calculus. In 2013 International Symposium on Theoretical Aspects of Software Engineering, TASE 2013, pages 233–240, 2013. (doi:10.1109/TASE.2013.37)

[103]
J. Jiang, L. Zhang, and L. Li. Understanding project dissemination on a social coding site. In 20th Working Conference on Reverse Engineering, WCRE 2013, pages 132–141, 2013. (doi:10.1109/WCRE.2013.6671288)

[104]
M. Jin, L. Huang, and P. Ren. RFID based space-time navigation scheduling for low-carbon ecotourism management system. International Journal of Applied Environmental Sciences, 8(20):2533–2546, 2013.

[105]
M. Johnson. Buy-side barriers to e-business technology in the healthcare sector. International Journal of Healthcare Technology and Management, 14(1-2):110–142, 2013. (doi:10.1504/IJHTM.2013.055090)

[106]
M. Johnson. Critical success factors for B2B e-markets: A strategic fit perspective. Marketing Intelligence and Planning, 31(4):337–366, 2013.

[107]
M. Johnson. Critical success factors for B2B e-markets: A strategic fit perspective. Marketing Intelligence and Planning, 31(6):698–727, 2013. (doi:10.1108/MIP-10-2013-001)

[108]
G. Kakarontzas, E. Constantinou, A. Ampatzoglou, and I. Stamelos. Layer assessment of object-oriented software: A metric facilitating white-box reuse. Journal of Systems and Software, 86(2):349–366, 2013. (doi:10.1016/j.jss.2012.08.041)

[109]
S.H. Kannangara and W.M.J.I. Wijayanayake. Impact of refactoring on external code quality improvement: An empirical evaluation. In 2013 International Conference on Advances in ICT for Emerging Regions, ICTer 2, pages 60–67. IEEE Computer Society, 2013. (doi:10.1109/ICTer.2013.6761156)

[110]
M. Kas, L. Richard Carley, and K.M. Carley. Monitoring social centrality for peer-to-peer network protection. IEEE Communications Magazine, 51(12):155–161, 2013. (doi:10.1109/MCOM.2013.6685771)

[111]
A. Kasoju, K. Petersen, and M.V. Mäntylä. Analyzing an automotive testing process with evidence-based software engineering. Information and Software Technology, 55(7):1237–1259, 2013.

[112]
R. Kawahara, K. Ono, T. Nakada, H. Okabayashi, K. Hisazumi, T. Nakanishi, A. Fukuda, Y. Sakamoto, and T. Nagano. A model transformation method for evaluation of non-functional requirements of an embedded system architecture. Computer Software, 30(1):203–210, 2013.

[113]
Angelos D. Keromytis and Salvatore J. Stolfo. Methods, media, and systems for detecting an anomalous sequence of function calls. United States Patent 8,489,931, July 2013. Assignee: The Trustees of Columbia University in the City of New York (New York, NY).

[114]
Z. Khanam and S.A.M. Rizvi. An evaluative study of software refactoring in procedural programming. In 2013 World Congress on Engineering and Computer Science, WCECS 2013, volume 1, pages 102–107. Newswood Limited, 2013.

[115]
V.Y. Kharitonov. A software architecture for high-level development of component-based distributed virtual reality systems. In 2013 IEEE 27th International Parallel and Distributed Processing Symposium Workshops and PhD Forum, IPDPSW 2013, pages 696–705, 2013. (doi:10.1109/COMPSAC.2013.111)

[116]
S. Khatoon, G. Li, and A. Mahmood. Comparison and evaluation of source code mining tools and techniques: A qualitative approach. Intelligent Data Analysis, 17(3):459–484, 2013.

[117]
J. Kim and S. Lee. Efficient and flexible storage visualization system based on distributed hash tables. Information (Japan), 16(1 A):383–392, 2013.

[118]
B. Kitts, D. Au, and B. Burdick. A high-dimensional set top box ad targeting algorithm including experimental comparisons to traditional tv algorithms. In 13th IEEE International Conference on Data Mining, ICDM 2013, pages 370–378, 2013. (doi:10.1109/ICDM.2013.169)

[119]
M. Klotzbücher and H. Bruyninckx. A lightweight, composable metamodelling language for specification and validation of internal domain specific languages. 8th International Workshop on Model-Based Methodologies for Pervasive and Embedded Software, MOMPES 2012, 7706 LNCS:58–68, 2013. (doi:10.1007/978-3-642-38209-3_4)

[120]
E. Kocaguneli, T. Zimmermann, C. Bird, N. Nagappan, and T. Menzies. Distributed development considered harmful? In 2013 35th International Conference on Software Engineering, ICSE 2013, pages 882–890, 2013. (doi:10.1109/ICSE.2013.6606637)

[121]
S.S. Kolesnikov, S. Apel, N. Siegmund, S. Sobernig, C. Kästner, and S. Senkaya. Predicting quality attributes of software product lines using software and network measures and sampling. In ACM International Conference Proceeding Series, 2013.

[122]
T. Koskela, O. Kassinen, E. Harjula, and M. Ylianttila. P2P group management systems: A conceptual analysis. ACM Computing Surveys, 45(2), 2013.

[123]
S.D. Larson and M.E. Martone. Neurolex.org: An online framework for neuroscience knowledge. Frontiers in Neuroinformatics, 7(AUG), 2013. (doi:10.3389/fninf.2013.00018)

[124]
H.J. Lee, B.-K. Seo, and E. Seo. A git source repository analysis tool based on a novel branch-oriented approach. In 2013 4th International Conference on Information Science and Applications, ICISA 2013, 2013. (doi:10.1109/ICISA.2013.6579457)

[125]
M.B. Lehmann, R.S. Antunes, and M.P. Barcellos. Exploring your neighborhood: Comparing connection strategies in swarming networks through evolving graphs. In 13th IEEE International Conference on Peer-to-Peer Computing, IEEE P2P 2013. IEEE Computer Society, 2013. (doi:10.1109/P2P.2013.6688701)

[126]
T.S. Lendvay, B. Hannaford, and R.M. Satava. Future of robotic surgery. Cancer Journal (United States), 19(2):109–119, 2013.

[127]
J. Lenhard, S. Harrer, and G. Wirtz. Measuring the installability of service orchestrations using the SQuaRE method. In 6th IEEE International Conference on Service-Oriented Computing and Applications, SOCA 2013, pages 118–125. IEEE Computer Society, 2013. (doi:10.1109/SOCA.2013.30)

[128]
Nicola Jane Lessing, Christophe Schnelle, and Peter Mariani. Maltweb multi-axis viewing interface and higher level scoping. United States Patent 8,386,484, February 2013. Assignee: TimeBase Pty Limited (Sydney, New South Wales, AU).

[129]
L. Li and H. Leung. Predicting fault-proneness of object-oriented system developed with agile process using learned bayesian network. In 15th International Conference on Enterprise Information Systems, ICEIS 2013, volume 2, pages 5–16, 2013.

[130]
W. Li, Y. Meng, and L.-F. Kwok. Enhancing trust evaluation using intrusion sensitivity in collaborative intrusion detection networks: Feasibility and challenges. In 9th International Conference on Computational Intelligence and Security, CIS 2013, pages 518–522, 2013. (doi:10.1109/CIS.2013.115)

[131]
Y. Li, H.M. Jiang, and T. Hu. A study on distributed license authorization system based on threshold secret sharing. 2013 International Conference on Vehicle and Mechanical Engineering and Information Technology, VMEIT 2013, 380-384:2749–2752, 2013. (doi:10.4028/www.scientific.net/AMM.380-384.2749)

[132]
Y. Li, C.-H. Tan, and X. Yang. It is all about what we have: A discriminant analysis of organizations' decision to adopt open source software. Decision Support Systems, 56(1):56–62, 2013. (doi:10.1016/j.dss.2013.05.006)

[133]
C.-Y. Lien, T.-L. Yang, C.-H. Hsiao, and T. Kao. Realizing digital signatures for medical imaging and reporting in a PACS environment. Journal of Medical Systems, 37(1), 2013. (doi:10.1007/s10916-012-9924-1)

[134]
S.-J. Lin and W.-H. Chung. An efficient (n,k) information dispersal algorithm based on fermat number transforms. IEEE Transactions on Information Forensics and Security, 8(8):1371–1383, 2013. (doi:10.1109/TIFS.2013.2270892)

[135]
C.-S. Lin. Balanced dynamic buffering for scalable video-on-demand streaming on peer-to-peer networks. Multimedia Tools and Applications, 62(3):701–718, 2013. (doi:10.1007/s11042-011-0872-4)

[136]
M. Lindberg. Feedback-based cooperative content distribution for mobile networks. In 8th ACM Int. Workshop on Performance Monitoring, Measurement, and Evaluation of Heterogeneous Wireless and Wired Networks, PM2HW2N 2013, Held in Conjunction with the 16th ACM Int. Conf. on MSWiM 2013, pages 107–115, 2013. (doi:10.1145/2512840.2512855)

[137]
M. Liu, T. Leppanen, E. Harjula, Z. Ou, A. Ramalingam, M. Ylianttila, and T. Ojala. Distributed resource directory architecture in machine-to-machine communications. In 2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications, WiMob 2013, pages 319–324, 2013. (doi:10.1109/WiMOB.2013.6673379)

[138]
M. Liu, T. Leppanen, E. Harjula, Z. Ou, M. Ylianttila, and T. Ojala. Distributed resource discovery in the machine-to-machine applications. In 10th IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, MASS 2013, pages 411–412, 2013. (doi:10.1109/MASS.2013.46)

[139]
P. Liu, T.F. LaPorta, and K. Kotapati. Cellular network security. In Network and System Security: Second Edition, pages 319–351. Elsevier Inc., 2013. (doi:10.1016/B978-0-12-416689-9.00011-3)

[140]
P. Liu, T.F. LaPorta, and K. Kotapati. Cellular network security. In Computer and Information Security Handbook, pages 323–343. Elsevier Inc., 2013. (doi:10.1016/B978-0-12-394397-2.00017-9)

[141]
A. Logvinenko, C. Gremzow, and D. Tutsch. RecMIN: A reconfiguration architecture for network on chip. In 2013 8th International Workshop on Reconfigurable and Communication-Centric Systems-on-Chip, ReCoSoC 2013, 2013. (doi:10.1109/ReCoSoC.2013.6581547)

[142]
J. Loveland and J. Reagle. Wikipedia and encyclopedic production. New Media and Society, 15(8):1294–1311, 2013. (doi:10.1177/1461444812470428)

[143]
G. Lu and K. Lü. Logical trees: An essential method of parsing SQL statement with semantic analysis. International Journal of Advancements in Computing Technology, 5(1):270–278, 2013. (doi:10.4156/ijact.vol5.issue1.30)

[144]
T. Lukman, G. Godena, J. Gray, M. Heričko, and S. Strmčnik. Model-driven engineering of process control software — beyond device-centric abstractions. Control Engineering Practice, 21(8):1078–1096, 2013. (doi:10.1016/j.conengprac.2013.03.013)

[145]
H.J. Macho and G. Robles. Preliminary lessons from a software evolution analysis of moodle. In 1st International Conference on Technological Ecosystem for Enhancing Multiculturality, TEEM 2013, pages 157–161, 2013. (doi:10.1145/2536536.2536560)

[146]
A. Malatras, F. Peng, and B.A. Hirsbrunner. Energy-efficient peer-to-peer networking and overlays. In Handbook of Green Information and Communication Systems, pages 513–540. Elsevier Inc., 2013. (doi:10.1016/B978-0-12-415844-3.00020-6)

[147]
D. Mancl and S. Fraser. Software tools research: SPLASH panel discussion. IEEE Software, 30(2):16–17, 2013.

[148]
V. Mansilla and M.-C. Marcos. Experiencia de usuario en televisión conectada: Un estudio con usuarios. Profesional de la Informacion, 22(2):122–127, 2013.

[149]
M. Marchetti and M. Colajanni. Cooperative approaches to siem and intrusion detection. Advances in Security Information Management: Perceptions and Outcomes, pages 79–116, 2013.

[150]
A.H. Mardani and M. Sangari. An analysis of the availability and persistence of web citations in Iranian LIS journals. International Journal of Information Science and Management, 11(1):29–42, 2013.

[151]
J. Marlow and L. Dabbish. Activity traces and signals in software developer recruitment and hiring. In Proceedings of the ACM Conference on Computer Supported Cooperative Work, CSCW, pages 145–155, 2013.

[152]
J.M. Marquès, D. Lazaro, A.A. Juan, X. Vilajosana, M. Domingo, and J. Jorba. Planetlab@UOC: A real lab over the internet to experiment with distributed systems. Computer Applications in Engineering Education, 21(2):265–275, 2013.

[153]
M. Martin Bel, O. Dugeon, J. Fasson, A. Abou El Kalam, M. Maachaoui, B. Paillassa, F.J. Ramón Salguero, and W. Werapun. Service management. Digital Home Networking, pages 259–307, 2013. (doi:10.1002/9781118602829.ch8)

[154]
C. Mateos, M. Crasso, A. Zunino, and J.L. Ordiales Coscia. Revising WSDL documents: Why and how, part 2. IEEE Internet Computing, 17(5):46–53, 2013. (doi:10.1109/MIC.2013.4)

[155]
C.A. Mattmann. Computing: A vision for data science. Nature, 493(7433):473–475, 2013. (doi:10.1038/493473a)

[156]
L. Meneses, H. Barthwal, S. Singh, R. Furuta, and F. Shipman. Restoring semantically incomplete document collections using lexical signatures. International Conference on Theory and Practice of Digital Libraries, TPDL 2013, 8092 LNCS:321–332, 2013. (doi:10.1007/978-3-642-40501-3_33)

[157]
J. Mercadal, Z. Drey, and C. Consel. Denotational semantics of a user-oriented, domain-specific language. In Semantics, Abstract Interpretation, and Reasoning About Programs: Essays Dedicated to David A. Schmidt on the Occasion of His 60th Birthday, volume 129, pages 229–249, 2013. (doi:10.4204/EPTCS.129.14)

[158]
M. Mernik. An object-oriented approach to language compositions for software language engineering. Journal of Systems and Software, 86(9):2451–2464, 2013. (doi:10.1016/j.jss.2013.04.087)

[159]
O. Mizuno. On effects of tokens in source code to accuracy of fault-prone module prediction. In 2013 17th International Computer Science and Engineering Conference, ICSEC 2013, pages 103–108, 2013. (doi:10.1109/ICSEC.2013.6694761)

[160]
H.S. Moon, J.K. Kim, and Y.U. Ryu. A sequence-based filtering method for exhibition booth visit recommendations. International Journal of Information Management, 33(4):620–626, 2013.

[161]
A. Mouhtaropoulos, P. Dimotikalis, and C.-T. Li. Applying a digital forensic readiness framework: Three case studies. In 2013 13th IEEE International Conference on Technologies for Homeland Security, HST 2013, pages 217–223, 2013. (doi:10.1109/THS.2013.6699003)

[162]
H. Muhammad, F. Mascarenhas, and R. Ierusalimschy. LuaRocks — a declarative and extensible package management system for lua. 17th Brazilian Symposium on Programming Languages, SBLP 2013, 8129 LNCS:16–30, 2013. (doi:10.1007/978-3-642-40922-6_2)

[163]
Elissa E. S. Murphy, Yan V. Leshinsky, and John D. Mehr. Dynamic placement of replica data. United States Patent 8,560,639, October 2013. Assignee: Microsoft Corporation (Redmond, WA).

[164]
E. Murphy-Hill, T. Zimmermann, C. Bird, and N. Nagappan. The design of bug fixes. In 2013 35th International Conference on Software Engineering, ICSE 2013, pages 332–341, 2013. (doi:10.1109/ICSE.2013.6606579)

[165]
S. Nadi, C. Dietrich, R. Tartler, R.C. Holt, and D. Lohmann. Linux variability anomalies: What causes them and how do they get fixed? In 10th International Working Conference on Mining Software Repositories, MSR 2013, pages 111–120, 2013. (doi:10.1109/MSR.2013.6624017)

[166]
H. Naguib, N. Narayan, B. Brügge, and D. Helal. Bug report assignee recommendation using activity profiles. In 10th International Working Conference on Mining Software Repositories, MSR 2013, pages 22–30, 2013. (doi:10.1109/MSR.2013.6623999)

[167]
A. Narayanan, Y. Chen, S. Pang, and B. Tao. The effects of different representations on static structure analysis of computer malware signatures. The Scientific World Journal, 2013, 2013. (doi:10.1155/2013/671096)

[168]
B.S. Neto, V.T. Da Silva, M. Ribeiro, E. Costa, and C. Lucena. Using jason to develop refactoring agents. In 2nd Brazilian Conference on Intelligent Systems, BRACIS 2013, pages 44–50. IEEE Computer Society, 2013. (doi:10.1109/BRACIS.2013.16)

[169]
P. Nistala and P. Kumari. An approach to carry out consistency analysis on requirements: Validating and tracking requirements through a configuration structure. In 2013 21st IEEE International Requirements Engineering Conference, RE 2013, pages 320–325. IEEE Computer Society, 2013. (doi:10.1109/RE.2013.6636737)

[170]
R. Olanda, M. Peŕez, and J.M. Ordunã. Hybrid P2P schemes for remote terrain interactive visualization systems. Future Generation Computer Systems, 29(6):1522–1532, 2013. (doi:10.1016/j.future.2012.11.002)

[171]
J.L. Ordiales Coscia, C. Mateos, M. Crasso, and A. Zunino. Anti-pattern free code-first web services for state-of-the-art Java WSDL generation tools. International Journal of Web and Grid Services, 9(2):107–126, 2013.

[172]
Raymond E. Ozzie, Jack E. Ozzie, George P. Moromisato, Paresh S. Suthar, Raman Narayanan, and Matthew S. Augustine. Data synchronization and sharing relationships. United States Patent 8,370,423, February 2013. Assignee: Microsoft Corporation (Redmond, WA).

[173]
Raymond E. Ozzie, Jack E. Ozzie, Paresh S. Suthar, Raman Naravanan, and Matthew S. Augustine. Clipboard augmentation with references. United States Patent 8,453,066, May 2013. Assignee: Microsoft Corporation (Redmond, WA).

[174]
T.Y. Pang and S. Maslov. Universal distribution of component frequencies in biological and technological systems. Proceedings of the National Academy of Sciences of the United States of America, 110(15):6235–6239, 2013.

[175]
E. Pantano. Ubiquitous retailing innovative scenario: From the fixed point of sale to the flexible ubiquitous store. Journal of Technology Management and Innovation, 8(2):84–92, 2013.

[176]
D. Papadimitriou, D. Colle, P. Audenaert, and P. Demeester. Geometric information routing. In 2013 IEEE International Conference on Advanced Networks and Telecommunications Systems, ANTS 2013. IEEE Computer Society, 2013. (doi:10.1109/ANTS.2013.6802893)

[177]
C.T. Papadopoulos, M.E.J. Okelly, and A.K. Tsadiras. A DSS for the buffer allocation of production lines based on a comparative evaluation of a set of search algorithms. International Journal of Production Research, 51(14):4175–4199, 2013. (doi:10.1080/00207543.2012.752585)

[178]
P.M. Papadopoulos, I.G. Stamelos, and A. Meiszner. Enhancing software engineering education through open source projects: Four years of students' perspectives. Education and Information Technologies, 18(2):381–397, 2013.

[179]
G. Paschalidou, E. Stiakakis, and A. Chatzigeorgiou. An application of data envelopment analysis to software quality assessment. In 6th Balkan Conference in Informatics, BCI 2013, pages 228–235, 2013. (doi:10.1145/2490257.2490264)

[180]
S. Pavalkis, L. Nemuraite, and R. Butkiene. Derived properties: A user friendly approach to improving model traceability. Information Technology and Control, 42(1):48–60, 2013.

[181]
D.J. Pearce. Sound and complete flow typing with unions, intersections and negations. 14th International Conference on Verification, Model Checking, and Abstract Interpretation, VMCAI 2013, 7737 LNCS:335–354, 2013. (doi:10.1007/978-3-642-35873-9_21)

[182]
Marcus Peinado and Weidong Cui. Malware investigation by analyzing computer memory. United States Patent 8,566,944, October 2013. Assignee: Microsoft Corporation (Redmond, WA).

[183]
E. Perel and U. Yechiali. On customers acting as servers. Asia-Pacific Journal of Operational Research, 30(5), 2013. (doi:10.1142/S021759591350019X)

[184]
E. Pérez-Cortés and H. Sato. On the impact of path redundancy awareness in evolutionary P2P networking. Journal of Advanced Computational Intelligence and Intelligent Informatics, 17(6):872–882, 2013.

[185]
F. Peters, T. Menzies, and A. Marcus. Better cross company defect prediction. In 10th International Working Conference on Mining Software Repositories, MSR 2013, pages 409–418, 2013. (doi:10.1109/MSR.2013.6624057)

[186]
S. Prstacic and M. Zagar. A model for web application and web service peer-to-peer hosting network architecture. In 35th International Conference on Information Technology Interfaces, ITI 2013, pages 335–340, 2013.

[187]
A.S.M.M. Rahman and A. El Saddik. Mobile pointme-based spatial haptic interaction with annotated media for learning purposes. Multimedia Systems, 19(2):131–149, 2013.

[188]
A. Rastogi and A. Sureka. Samikshaumbra: Contribution and performance assessment of software maintenance professionals by mining software repositories. In 2013 20th Asia-Pacific Software Engineering Conference, APSEC 2013, pages 170–175. IEEE Computer Society, 2013. (doi:10.1109/APSEC.2013.134)

[189]
A. Rastogi, A. Gupta, and A. Sureka. Samiksha: Mining issue tracking system for contribution and performance assessment. In ACM International Conference Proceeding Series, pages 13–22, 2013.

[190]
N. Ratti and P. Kaur. Case study: Version control in component-based systems. In Designing, Engineering, and Analyzing Reliable and Efficient Software, pages 283–297. IGI Global, 2013. (doi:10.4018/978-1-4666-2958-5.ch016)

[191]
A.J. Reinoso, J.M. Gonzalez-Barahona, R. Muñoz Mansilla, and I. Herraiz. Temporal characterization of the requests to Wikipedia. Studies in Computational Intelligence, 439:71–89, 2013. (doi:10.1007/978-3-642-31546-6-5)

[192]
H. Ren, W. Mo, S. Liu, D. Li, Y. Sun, and G. Zhao. Code automation technology based COSINE software development. In ASME 2013 Power Conference, POWER 2013, volume 2. American Society of Mechanical Engineers, 2013. (doi:10.1115/POWER2013-98109)

[193]
H. Ren, W.-T. Mo, G. Zhao, and S. Liu. Automation algorithm of COSINE software code framework based on breadth first search. Yuanzineng Kexue Jishu/Atomic Energy Science and Technology, 47(SUPPL.):717–720, 2013. (doi:10.7538/yzk.2013.47.S1.0717)

[194]
D. Rodriguez, R. Ruiz, J.C. Riquelme, and R. Harrison. A study of subgroup discovery approaches for defect prediction. Information and Software Technology, 55(10):1810–1822, 2013. (doi:10.1016/j.infsof.2013.05.002)

[195]
G. Samarthyam, G. Suryanarayana, T. Sharma, and S. Gupta. MIDAS: A design quality assessment method for industrial software. In 2013 35th International Conference on Software Engineering, ICSE 2013, pages 911–920, 2013. (doi:10.1109/ICSE.2013.6606640)

[196]
B.T. Sampath Kumar and D. Vinay Kumar. HTTP 404-page (not) found: Recovery of decayed url citations. Journal of Informetrics, 7(1):145–157, 2013. (doi:10.1016/j.joi.2012.09.007)

[197]
L. Sang-Hyun, J.-G. Lee, and M. Kyung-Il. Smart home security system using multiple ANFIS. International Journal of Smart Home, 7(3):121–132, 2013.

[198]
M. Sarrab and O.M.H. Rehman. Selection criteria of open source software: First stage for adoption. International Journal of Information Processing and Management, 4(4):51–58, 2013. (doi:10.4156/ijipm.vol4.issue4.6)

[199]
Christoph Schnelle and Geoffrey John Nolan. Mapping of data from XML to SQL. United States Patent 8,396,901, March 2013. Assignee: Timebase Pty Limited (Sydney, New South Wales, AU).

[200]
B. Schoenmakers, N. Van Den Broek, I. Nagy, B. Vasilescu, and A. Serebrenik. Assessing the complexity of upgrading software modules. In 20th Working Conference on Reverse Engineering, WCRE 2013, pages 433–440, 2013. (doi:10.1109/WCRE.2013.6671319)

[201]
P. Sendın-Raña, F.J. González-Castaño, F. Gómez-Cuba, R. Asorey-Cacheda, and J.M. Pousada-Carballo. Improving management performance of P2PSIP for mobile sensing in wireless overlays. Sensors (Switzerland), 13(11):15364–15384, 2013. (doi:10.3390/s131115364)

[202]
S. Shuraida and H. Barki. The influence of analyst communication in IS projects. Journal of the Association of Information Systems, 14(9):482–520, 2013.

[203]
Stylianos Sidiroglou, Angelos D. Keromytis, and Salvatore J. Stolfo. Systems, methods, and media protecting a digital data processing device from attack. United States Patent 8,407,785, March 2013. Assignee: The Trustees of Columbia University in the City of New York (New York, NY).

[204]
Q.D. Soetens, J. Perez, and S. Demeyer. An initial investigation into change-based reconstruction of floss-refactorings. In 29th IEEE International Conference on Software Maintenance, ICSM 2013, pages 384–387, 2013. (doi:10.1109/ICSM.2013.53)

[205]
A. Solano, C. Collazos, C. Rusu, and L. Merchán. Evaluating the usability of interactive digital television applications. In 2013 10th International Conference on Information Technology: New Generations, ITNG 2013, pages 127–132, 2013. (doi:10.1109/ITNG.2013.24)

[206]
G. Song, B. Yang, Z. Wu, J. Chuai, and Y. Zheng. ROIN: Reputation-oriented inverted indexing for the P2P network. Journal of Supercomputing, 64(3):968–986, 2013. (doi:10.1007/s11227-013-0878-y)

[207]
M.E. Sosa-Rodrıguez and E. Pérez-Cortés. The evolution of cooperation in file sharing P2P systems: First steps. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 7630 LNAI(PART 2):151–162, 2013.

[208]
David Howard Spencer and Darla Renae Agard. Systems, methods and software for researching statutory information. United States Patent 8,458,190, June 2013. Assignee: Thomson Reuters Global Resources (Baar, CH).

[209]
Varadarajan Sridhar, Ravi G. Amur, and Korrapati Kalyane Rao. System and method for automated safe reprogramming of software radios. United States Patent 8,347,108, January 2013. Assignee: Satyam Computer Services Limited of Mayfair Centre (Secunderabad, IN).

[210]
D. Stingl, C. Groß, and K. Saller. Decentralized monitoring in peer-to-peer systems. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 7847:81–111, 2013. (doi:10.1007/978-3-642-38673-2-6)

[211]
Salvatore J. Stolfo, Angelos D. Keromytis, and Stylianos Sidiroglou. Methods, media, and systems for detecting anomalous program executions. United States Patent 8,601,322, December 2013. Assignee: The Trustees of Columbia University in the City of New York (New York, NY).

[212]
Z. Sun, S. Pan, Y.C. Su, and P. Zhang. Headio: Zero-configured heading acquisition for indoor mobile devices through multimodal context sensing. In 2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing, UbiComp 2013, pages 33–42, 2013. (doi:10.1145/2493432.2493434)

[213]
C.R. Suthikshn Kumar. Portable speech encryption based anti-tapping device. In 135th Audio Engineering Society Convention 2013, pages 523–528. Audio Engineering Society, 2013.

[214]
Y. Thomas, C. Tsilopoulos, G. Xylomenos, and G.C. Polyzos. Multisource and multipath file transfers through publish-subscribe internetworking. In 2013 3rd ACM SIGCOMM Workshop on Information-Centric Networking, ICN 2013, pages 43–44, 2013. (doi:10.1145/2491224.2491238)

[215]
P. Tomas, M.J. Escalona, and M. Mejias. Open source tools for measuring the internal quality of Java software products. a survey. Computer Standards and Interfaces, 36(1):244–255, 2013. (doi:10.1016/j.csi.2013.08.006)

[216]
S. Treter, N. Perrier, J.A. Sosa, and S. Roman. Telementoring: A multi-institutional experience with the introduction of a novel surgical approach for adrenalectomy. Annals of Surgical Oncology, 20(8):2754–2758, 2013. (doi:10.1245/s10434-013-2894-9)

[217]
A.K. Tsadiras, C.T. Papadopoulos, and M.E.J. O'Kelly. An artificial neural network based decision support system for solving the buffer allocation problem in reliable production lines. Computers and Industrial Engineering, 66(4):1150–1162, 2013. (doi:10.1016/j.cie.2013.07.024)

[218]
E. Tsekleves, R. Whitham, K. Kondo, and A. Hill. Investigating pay-as-you-go to address issues of trust, privacy and security around media use at home. Universal Access in the Information Society, 12(2):217–231, 2013.

[219]
B. Turhan, A. Tosun Misirli, and A. Bener. Empirical evaluation of the effects of mixed project data on learning defect predictors. Information and Software Technology, 55(6):1101–1118, 2013.

[220]
I. Turnu, G. Concas, M. Marchesi, and R. Tonelli. The fractal dimension of software networks as a global quality metric. Information Sciences, 245:290–303, 2013. (doi:10.1016/j.ins.2013.05.014)

[221]
V. Urovi, A.C. Olivieri, S. Bromuri, N. Fornara, and M.I. Schumacher. A peer to peer agent coordination framework for IHE based cross-community health record exchange. In Proceedings of the ACM Symposium on Applied Computing, pages 1355–1362, 2013.

[222]
Ashok Vadekar and Brian Neill. Retrofitting authentication onto firmware. United States Patent 8,566,791, October 2013. Assignee: BlackBerry Limited (Waterloo, Ontario, CA).

[223]
T. Vaimann, A. Kallaste, A. Kilk, and A. Belahcen. Lifecycle-based design and optimization of electrical motor-drives — challenges and possibilities. In 2013 3rd International Conference on Electric Power and Energy Conversion Systems, EPECS 2013, 2013. (doi:10.1109/EPECS.2013.6713037)

[224]
S. Vasilakos, C.D. Stylios, and J. Garofalakis. An analytical hierarchy process methodology to evaluate it solutions for organizations. In 25th European Modeling and Simulation Symposium, EMSS 2013, pages 593–600, 2013.

[225]
B. Vasilescu, V. Filkov, and A. Serebrenik. Stackoverflow and GitHub: Associations between software development and crowdsourced knowledge. In 2013 ASE/IEEE Int. Conf. on Social Computing, SocialCom 2013, the 2013 ASE/IEEE Int. Conf. on Big Data, BigData 2013, the 2013 Int. Conf. on Economic Computing, EconCom 2013, the 2013 PASSAT 2013, and the 2013 ASE/IEEE Int. Conf. on BioMedCom 2013, pages 188–195, 2013. (doi:10.1109/SocialCom.2013.35)

[226]
M.J. Villanueva, F. Valverde, and O. Pastor. Involving end-users in domain-specific languages development experiences from a bioinformatics SME. In 8th International Conference on Evaluation of Novel Approaches to Software Engineering, ENASE 2013, pages 97–108, 2013.

[227]
V. Šešum Čavić and E. Kühn. Algorithms and framework for comparison of bee-intelligence based peer-to-peer lookup. 4th International Conference on Advances in Swarm Intelligence, ICSI 2013, 7928 LNCS(PART 1):404–413, 2013. (doi:10.1007/978-3-642-38703-6_48)

[228]
J. Wang, X. Chen, and D. Yang. A study of important node rank based on KAD network. Advanced Science Letters, 19(8):2266–2270, 2013.

[229]
J. Wang, Z. Zhang, K. Xu, Y. Yin, and P. Guo. A research on security and privacy issues for patient related data in medical organization system. International Journal of Security and its Applications, 7(4):287–298, 2013.

[230]
L. Wang, P. Yu, Z. Wang, C. Yang, and Q. Ye. On the evolution of linux kernels: A complex network perspective. Journal of software: Evolution and Process, 25(5):439–458, 2013.

[231]
T. Wegeler, F. Gutzeit, A. Destailleur, and B. Dock. Evaluating the benefits of using domain-specific modeling languages — an experience report. In 2013 13th ACM Workshop on Domain-Specific Modeling, DSM 2013, pages 7–12. Association for Computing Machinery, 2013. (doi:10.1145/2541928.2541930)

[232]
M. Weiher and R. Hirschfeld. Polymorphic identifiers: Uniform resource access in objective-smalltalk. In 9th Dynamic Languages Symposium, DLS 2013 - Co-located with the 4th Annual ACM International Conference on Systems, Programming, Languages, and Applications: Software for Humanity, SPLASH 2013, pages 61–71. Association for Computing Machinery, 2013. (doi:10.1145/2508168.2508169)

[233]
F. Wu. Scale-free characteristic in open source software: An empirical case study. International Journal of Advancements in Computing Technology, 5(1):792–799, 2013. (doi:10.4156/ijact.vol5.issue1.88)

[234]
H. Xia, L. Meng, and S. Lou. Research on spatial image streaming model based on bittorrent. Cehui Xuebao/Acta Geodaetica et Cartographica Sinica, 42(2):225–232, 2013.

[235]
D.-G. Xu, L.-H. Qin, J.-H. Park, and J.-L. Zhou. ODSA: Chord-based object discovery service architecture for the internet of things. Wireless Personal Communications, 73(4):1455–1476, 2013. (doi:10.1007/s11277-013-1260-3)

[236]
H. Yamamoto and K. Yamazaki. LISP-based application-layer multicasting system for a content distribution network. Journal of Information Processing, 21(2):226–236, 2013.

[237]
H. Yamamoto and K. Yamazaki. Location-aware optimal resource selection method for P2P-based contents management and real-time distribution. IEICE Transactions on Information and Systems, E96-D(2):213–225, 2013. (doi:10.1587/transinf.E96.D.213)

[238]
Q. Yan, Y. Li, and R.H. Deng. Malware protection on RFID-enabled supply chain management systems in the EPCglobal network. In Advanced Security and Privacy for RFID Technologies, pages 153–175. IGI Global, 2013. (doi:10.4018/978-1-4666-3685-9.ch010)

[239]
M.H. Yarmand and D.G. Down. Server allocation for zero buffer tandem queues. European Journal of Operational Research, 230(3):596–603, 2013.

[240]
H. Zafar. Human resource information systems: Information security concerns for organizations. Human Resource Management Review, 23(1):105–113, 2013. (doi:10.1016/j.hrmr.2012.06.010)

[241]
C. Zhai and H. Liu. Factors affecting SMEs adoption decision of B2B e-marketplace: A case study in China. In 2013 10th International Conference on Service Systems and Service Management, ICSSSM 2013, pages 262–266, 2013. (doi:10.1109/ICSSSM.2013.6602643)

[242]
F. Zhang, A. Mockus, Y. Zou, F. Khomh, and A.E. Hassan. How does context affect the distribution of software maintainability metrics? In 29th IEEE International Conference on Software Maintenance, ICSM 2013, pages 350–359, 2013. (doi:10.1109/ICSM.2013.46)

[243]
W. Zhang, S. Wang, Y. Yang, and Q. Wang. Heterogeneous network analysis of developer contribution in bug repositories. In 2013 International Conference on Cloud and Service Computing, CSC 2013, pages 98–105. IEEE Computer Society, 2013. (doi:10.1109/CSC.2013.23)

[244]
Z. Zhao and Y. Guo. Scale-free model in software engineering: A new design method. 2013 International Conference on Geo-Informatics in Resource Management and Sustainable Ecosystem, GRMSE 2013, 399 PART II:346–353, 2013. (doi:10.1007/978-3-642-41908-9_35)

[245]
Y. Zhao, X. Pan, C.C. Li, G. Yao, J. Wu, X. Fu, D. Lai, D. Li, and Q. Zhang. Modeling and case study of the production line layout system. Open Automation and Control Systems Journal, 5(1):51–58, 2013. (doi:10.2174/1874444301305010051)

[246]
Y. Zhao, X.Y. Pan, and C.C. Li. Modeling and case study of the production line layout system. 9th International Symposium on Linear Drives for Industry Applications, LDIA 2013, 416-417:1373–1380, 2013. (doi:10.4028/www.scientific.net/AMM.416-417.1373)

[247]
Y. Zhao, X.Y. Pan, C.C. Li, G.H. Yao, J. Wu, X. Fu, D. Lai, D. Li, and Q.W. Zhang. Optimal production linelayout model based on integer programming. Advanced Materials Research, 690 693:2896–2900, 2013.

[248]
Yu Zheng, Lizhu Zhang, and Xing Xie. Mining correlation between locations using location history. United States Patent 8,612,134, December 2013. Assignee: Microsoft Corporation (Redmond, WA).

[249]
Z. Zhu and A. Afanasyev. Let's ChronoSync: Decentralized dataset state synchronization in named data networking. In 2013 21st IEEE International Conference on Network Protocols, ICNP 2013. IEEE Computer Society, 2013. (doi:10.1109/ICNP.2013.6733578)

[250]
J. Zhu, J. He, H. Zhou, and B. Zhao. EPCache: In-network video caching for LTE core networks. In 2013 International Conference on Wireless Communications and Signal Processing, WCSP 2013. IEEE Computer Society, 2013. (doi:10.1109/WCSP.2013.6677228)