Medical image security and EPR hiding using Shamir's secret sharing schemeTowards automated traceability maintenanceSecurity problems with improper implementations of improved FEA-MHuman agency and responsible computing: Implications for computer system designThe daily stand-up meeting: A grounded theory studyTesting and Validating Machine Learning Classifiers by Metamorphic TestingA posteriori operation detection in evolving software models.Joint application design (JAD) in practiceLinks between the personalities, styles and performance in computer programmingEvaluating performances of pair designing in industryRapid quality assurance with Requirements SmellsModeling the evolution of operating systems: An empirical studyRCDA: Architecting as a risk- and cost management disciplineWhat do software architects really do?Industrial architectural assessment using TARAOn the similarity between requirements and architectureSustainability of Open Source software communities beyond a fork: How and why has the LibreOffice project evolved?SentiStrength-SE: Exploiting Domain Specificity for Improved Sentiment Analysis in Software Engineering TextSmells in software test code: A survey of knowledge in industry and academiaA survey on software smellsNotable design patterns for domain-specific languagesCoopetitive relationships in cross-functional software development teams: How to model and measure?A Self-adaptive hierarchical monitoring mechanism for CloudsSmartTutor: An intelligent tutoring system in web-based adult educationTowards the automatic generation of mobile agents for distributed intrusion detection systemLightweight agents for intrusion detectionOpen source software––an evaluationShorter hash-based signaturesEmbedded architecture description languageGompertz software reliability model: Estimation algorithm and empirical validationIntrusion detection for mobile devices using the knowledge-based, temporal abstraction methodEiffel: A language and environment for software engineeringDependency solving: A separate concern in component evolution managementReconciling perspectives: A grounded theory of how people manage the process of software developmentA general model of software architecture design derived from five industrial approachesAnalogy-based software effort estimation using Fuzzy numbersSimulating autonomous agents in augmented realityAutomated discovery of concise predictive rules for intrusion detectionAutonomous agents for coordinated distributed parameterized heuristic routing in large dynamic communication networksSMART mobile agent facility
P1433
Q27996630-400BF1BC-AE05-4BF9-B44E-3CD3EA554403Q28705415-CC16C2C0-E28B-4F72-B5B8-A8F305DD76C2Q29011800-71B6377C-2DEE-4ADE-8422-CA0FAEC19A1EQ29028369-A21E2E58-4376-467C-B059-14DC981D9352Q29041469-5543AC2E-271C-4417-89DD-A13B6516088BQ34853880-9113F1BA-AC99-46C7-9765-94CAD7165A5CQ41645023-F990E1AA-D9CB-4897-940E-E7D35F7D7D19Q54110166-E877FAB0-102A-4F21-8F32-664A6B4C6064Q54262429-9313A813-C220-43BD-AEDE-09FEF7022DE0Q54262484-7E8BFED2-5C8A-4CE9-A001-C599E9DF9515Q54281121-0DB75B04-CD28-47CA-A241-EE444BE1CA84Q56048423-FCAA6F93-FD0A-403B-909D-B77440325C62Q56083386-CB4CA23C-2292-4D85-8088-A29182221086Q56083387-08470CB6-E282-4B27-B39B-68CE059A51D1Q56083389-B725D681-D9C0-4991-8662-D71529DE24BFQ56083393-E8BBEE27-C565-4AC0-94D0-ABDCBB4331D6Q56095862-CE079F88-EBF9-4886-BA2B-90F87C71258DQ56118439-236FE06E-A24C-4976-BF8C-1758A5F1AEA2Q56171646-1EC0C855-ED69-4B0B-B85B-0704F3FA300AQ56171647-E989E2AD-1456-40ED-9D93-3DDE63E50C08Q56335155-D338B223-B70A-4F32-89A8-21C30D378E48Q56502970-A2294D4F-2E79-466A-99C3-7070DEB7A1EBQ56531284-D8425F9B-CF09-4223-9AE1-AB5B5983570CQ56622458-3C3FADC3-BE52-42B8-9060-C60412D31E9FQ56675417-2524DE15-5624-4196-8CE8-226257513275Q56675419-FEE82D70-0FF1-47EC-9B77-D649F3AEC7D6Q56686881-AE14F157-821A-4F9C-808F-ABC55B3990DEQ56700424-E2102F9A-4A2F-4F21-9BBE-E114C8027D45Q56767713-5C1DC7B5-09B5-4770-BD14-EE7FC7744AA1Q56815130-397CE5F9-DF11-4782-B3DF-7EAD744AA75BQ56853979-59700D9E-241F-41B8-808F-3E86B8BE7253Q56901502-1692A52D-9B2F-4830-9786-960A9006CA5AQ56901823-2107D1E1-0291-46C2-996A-19A091A814E5Q56944074-DEDBBF47-A530-4666-BFA8-D5505A65CE18Q56944334-A236992D-F027-4AE8-8839-F4152AD6E774Q56981260-15DCBBA4-7916-4775-9567-4F8B9D1E1317Q56992213-17A40138-E8E6-4CBE-8386-B9A8F4919D23Q57015318-9AC59286-B1C5-4139-B72F-43832E6D691BQ57015324-6EEEF28D-BCC5-4E54-8F84-0E5C02252198Q57015336-4D310234-8AD6-4BD4-B0FE-0049284FBBDF
P1433
description
journal
@en
revista científica
@es
rivista scientifica
@it
vědecký časopis
@cs
wetenschappelijk tijdschrift van Elsevier
@nl
wissenschaftliche Fachzeitschrift
@de
مجلة
@ar
वैज्ञानिक पत्रिका
@hi
name
Journal of Systems and Software
@ast
Journal of Systems and Software
@da
Journal of Systems and Software
@en
Journal of Systems and Software
@es
Journal of Systems and Software
@fi
Journal of Systems and Software
@fr
Journal of Systems and Software
@it
Journal of Systems and Software
@nb
Journal of Systems and Software
@nl
Journal of Systems and Software
@nn
type
label
Journal of Systems and Software
@ast
Journal of Systems and Software
@da
Journal of Systems and Software
@en
Journal of Systems and Software
@es
Journal of Systems and Software
@fi
Journal of Systems and Software
@fr
Journal of Systems and Software
@it
Journal of Systems and Software
@nb
Journal of Systems and Software
@nl
Journal of Systems and Software
@nn
prefLabel
Journal of Systems and Software
@ast
Journal of Systems and Software
@da
Journal of Systems and Software
@en
Journal of Systems and Software
@es
Journal of Systems and Software
@fi
Journal of Systems and Software
@fr
Journal of Systems and Software
@it
Journal of Systems and Software
@nb
Journal of Systems and Software
@nl
Journal of Systems and Software
@nn
P243
P3181
P1055
P1058
P1156
P1160
J. Syst. Software
P123
P1277
P1476
Journal of Systems and Software
@en
P236
P243
P3181
P3417
Journal-of-Systems-and-Software
P407
P571
1979-01-01T00:00:00Z
P5963
journal-of-systems-and-software