Displaying works 1 - 20 of 222 in total
Sorted by most recent date added to the index first, which may not be the same as publication date order.
2020 journal article
Practical detection of CMS plugin conflicts in large plugin sets
Information and Software Technology.
2020 conference paper
In Opinion Holders’ Shoes: Modeling Cumulative Influence for View Change in Online Argumentation
Proceedings of The Web Conference 2020, 2388–2399.
Event: at Taipei
2020 article
Text mining to identify and extract novel disease treatments from unstructured datasets
ArXiv.
Contributors: R. Yedida , S. Abrar, C. Melo-Filho, E. Muratov, R. Chirkova & A. Tropsha
2020 article
Parsimonious computing: A minority training regime for effective prediction in large microarray expression data sets
ArXiv.
Contributors: .. Sridhar, .. Saha, .. Shaikh, .. Yedida* & .. Saha
2020 article
On the value of oversampling for deep learning in software defect prediction
ArXiv.
Contributors: R. Yedida* & T. Menzies
2020 article
How to Recognize Actionable Static Code Warnings (Using Linear SVMs)
ArXiv.
Contributors: X. Yang n, J. Chen n, R. Yedida n , Z. Yu n & T. Menzies n
2020 chapter
Infrastructure
In The Food-Energy-Water Nexus.
2020 conference paper
Analysis of Access Control Enforcement in Android
Proceedings of the 25th ACM Symposium on Access Control Models and Technologies, 117–118.
2020 conference paper
Actions speak louder than words: Entity-sensitive privacy policy and data flow analysis with policheck
Proceedings of the 29th USENIX Security Symposium (USENIX Security'20).
2020 conference paper
nm-Variant Systems: Adversarial-Resistant Software Rejuvenation for Cloud-Based Web Applications
Proceedings of the Tenth ACM Conference on Data and Application Security and Privacy, 235–246.
2020 journal article
Optimizing Vulnerability-Driven Honey Traffic Using Game Theory
ArXiv Preprint ArXiv:2002.09069.
2020 conference paper
Do configuration management tools make systems more secure? an empirical research plan
Proceedings of the 7th Symposium on Hot Topics in the Science of Security, 1–2.
2020 conference paper
Cardpliance: PCI DSS compliance of android applications
Proceedings of the 29th USENIX Conference on Security Symposium, 1517–1533.
2020 journal article
Finding Faster Configurations Using FLASH
IEEE Transactions on Software Engineering, 46(7), 794–811.
2020 conference paper
Cloudy with a Chance of Misconceptions: Exploring Users’ Perceptions and Expectations of Security and Privacy in Cloud Office Suites
Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020), 359–377.
2020 conference paper
Typing Exercises as Interactive Worked Examples for Deliberate Practice in CS Courses
In Proceedings of the Twenty-Second Australasian Computing Education Conference, 1–9.
Event: ACM
2020 journal article
Student Teamwork on Programming Projects: What can GitHub logs show us?
ArXiv Preprint ArXiv:2008.11262.
2020 conference paper
Integrating Testing Throughout the CS Curriculum
2020 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW), 441–444.
Event: IEEE
2020 chapter
Routing and Wavelength (Spectrum) Assignment
In B. Mukherjee, I. Tomkos, M. Tornatore, P. Winzer, & Y. Zhao (Eds.), Springer Handbook of Optical Networks (pp. 447–484).
Ed(s): B. Mukherjee, I. Tomkos, M. Tornatore, P. Winzer & Y. Zhao
2020 conference paper
Predicting lower limb 3D kinematics during gait using reduced number of wearable sensors via deep learning
Proceedings of the 44th Meetings of the American Society of Biomechanics (ASB). Presented at the 44th Meetings of the American Society of Biomechanics (ASB).
Event: 44th Meetings of the American Society of Biomechanics (ASB)
Citation Index includes data from a number of different sources. If you have questions about the sources of data in the Citation Index or need a set of data which is free to re-distribute, please contact us.
Certain data included herein are derived from the Web of Science© and InCites© (2024) of Clarivate Analytics. All rights reserved. You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.