Displaying works 141 - 160 of 299 in total
Sorted by most recent date added to the index first, which may not be the same as publication date order.
2015 conference paper
Service definition semantics for optical services on a choice-based network
2015 International Conference on Optical Network Design and Modeling (ONDM), 98–103.
2015 conference paper
Securing software application chains in a cloud
2015 2nd International Conference on Information Science and Security (ICISS), 50–53.
2015 conference paper
SDSecurity: A software defined security experimental framework
2015 IEEE International Conference on Communication Workshop, 1871–1876.
2015 article
Questions Developers Ask While Diagnosing Potential Security Vulnerabilities with Static Analysis
2015 10TH JOINT MEETING OF THE EUROPEAN SOFTWARE ENGINEERING CONFERENCE AND THE ACM SIGSOFT SYMPOSIUM ON THE FOUNDATIONS OF SOFTWARE ENGINEERING (ESEC/FSE 2015) PROCEEDINGS, pp. 248–259.
2015 article
Quantifying Developers' Adoption of Security Tools
2015 10TH JOINT MEETING OF THE EUROPEAN SOFTWARE ENGINEERING CONFERENCE AND THE ACM SIGSOFT SYMPOSIUM ON THE FOUNDATIONS OF SOFTWARE ENGINEERING (ESEC/FSE 2015) PROCEEDINGS, pp. 260–271.
2015 conference paper
LACE2: Better privacy-preserving data sharing for cross project defect prediction
2015 IEEE/ACM 37th IEEE International Conference on Software Engineering, Vol 1, 801–811.
2015 article
Cost-Efficient and Attack-Resilient Approaches for State Estimation in Power Grids
30TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, VOLS I AND II, pp. 2192–2197.
2015 article
Bespoke Tools: Adapted to the Concepts Developers Know
2015 10TH JOINT MEETING OF THE EUROPEAN SOFTWARE ENGINEERING CONFERENCE AND THE ACM SIGSOFT SYMPOSIUM ON THE FOUNDATIONS OF SOFTWARE ENGINEERING (ESEC/FSE 2015) PROCEEDINGS, pp. 878–881.
2015 conference paper
Automated attack surface approximation
2015 10th Joint Meeting of the European Software Engineering Conference and the ACM Sigsoft Symposium on the Foundations of Software Engineering (ESEC/FSE 2015) Proceedings, 1063–1065.
2015 article
AppContext: Differentiating Malicious and Benign Mobile App Behaviors Using Context
2015 IEEE/ACM 37TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, VOL 1, Vol. 1, pp. 303–313.
Event: IEEE
2015 conference paper
2015 multimodal learning and analytics grand challenge
ICMI'15: Proceedings of the 2015 ACM International Conference on Multimodal Interaction, 525–529.
2015 conference paper
"With most of it being pictures now, I rarely use it": Understanding Twitter's evolving accessibility to blind users
34th Annual CHI Conference on Human Factors in Computing Systems, CHI 2016, 5506–5516.
2015 conference paper
Spectrum assignment in rings with shortest-path routing: Complexity and approximation algorithms
2015 International Conference on Computing, Networking and Communications (ICNC), 642–647.
2015 conference paper
GPS tethering for energy conservation
2015 ieee wireless communications and networking conference (wcnc), 1320–1325.
2015 article
Virtual Reality in Software Engineering: Affordances, Applications, and Challenges
2015 IEEE/ACM 37TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, VOL 2, pp. 547–550.
2015 article
Understanding Real World Data Corruptions in Cloud Systems
2015 IEEE INTERNATIONAL CONFERENCE ON CLOUD ENGINEERING (IC2E 2015), pp. 116–125.
2015 article
The Art and Science of Analyzing Software Data; Quantitative Methods
2015 IEEE/ACM 37th IEEE International Conference on Software Engineering, Vol 2, pp. 959–960.
2015 article
Securing Scientific Workflows
2015 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY - COMPANION (QRS-C 2015), pp. 95–104.
2015 article
SDStorage: A Software Defined Storage Experimental Framework
2015 IEEE INTERNATIONAL CONFERENCE ON CLOUD ENGINEERING (IC2E 2015), pp. 341–346.
2015 journal article
Resolving Goal Conflicts via Argumentation-Based Analysis of Competing Hypotheses
IEEE 25TH INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE (RE), 156–165.
Contributors: P. Murukannaiah n, P. Telang*, A. Kalia n & M. Singh n
Citation Index includes data from a number of different sources. If you have questions about the sources of data in the Citation Index or need a set of data which is free to re-distribute, please contact us.
Certain data included herein are derived from the Web of Science© and InCites© (2024) of Clarivate Analytics. All rights reserved. You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.