Abstract is missing.
- Big data: A requirements engineering perspectiveLawrence Chung. 1 [doi]
- Cloud software development platforms: A comparative overviewKyle Schutt, Osman Balci. 3-13 [doi]
- Trust analysis of composite service evolutionLi Liao, ShanShan Qi, Bixin Li. 15-22 [doi]
- An experimental exploration of the impact of multi-level packet loss on network intrusion detectionSidney C. Smith, Robert J. Hammell, Kin W. Wong, Carlos J. Mateo. 23-30 [doi]
- A streaming-based network monitoring and threat detection systemZhijiang Chen, Hanlin Zhang, William G. Hatcher, James Nguyen, Wei Yu 0002. 31-37 [doi]
- Building thesaurus lexicon using dictionary-based approach for sentiment classificationSeong Ik Park, Yanggon Kim. 39-44 [doi]
- Efficient genetic K-Means clustering for health care knowledge discoveryAhmed Alsayat, Hoda El-Sayed. 45-52 [doi]
- Data mining of genomic data generated from soybean treated with different phytohormonesMona Tavakolan, Nadim W. Alkharouf. 53-60 [doi]
- Social media analysis using optimized K-Means clusteringAhmed Alsayat, Hoda El-Sayed. 61-66 [doi]
- Machine learning-based mobile threat monitoring and detectionWilliam G. Hatcher, David Maloney, Wei Yu 0002. 67-73 [doi]
- Detecting hidden structures from Arabic electronic documents: Application to the legal fieldImen Bouaziz Mezghanni, Faïez Gargouri. 75-81 [doi]
- Multi-threaded message dispatcher framework for Mission Critical ApplicationsMarcel-Titus Marginean, Chao Lu. 83-89 [doi]
- A case study in object-oriented patterns identified during manual refactoringBrian S. Dillon. 91-98 [doi]
- Execution and code reuse between test classesLucas Pereira da Silva, Patricia Vilain. 99-106 [doi]
- Planning Enterprise Architecture: Creating organizational knowledge using the Theory of Structuration to build Information TechnologyDominic M. Mezzanotte Sr.. 107-115 [doi]
- Survey of works that transform requirements into UML diagramsMariem Abdouli, Wahiba Ben Abdessalem Karaa, Henda Ben Ghézala. 117-123 [doi]
- Narratives and sensor driven cognitive behavior training game platformKyungeun Park, Taesuk Kihl, Seungie Park, Min-jae Kim, Juno Chang. 125-131 [doi]
- A hybrid DS-FH-THSS approach anti-jamming in Wireless Sensor NetworksNejla Rouissi, Hamza Gharsellaoui, Sadok Bouamama. 133-139 [doi]
- On the prevalence of function side effects in general purpose open source software systemsSaleh M. Alnaeli, Amanda D. Ali Taha, Tyler Timm. 141-148 [doi]
- Reliability modeling and verification of BPEL-based web services composition by probabilistic model checkingChengyang Mi, Huaikou Miao, Jinyu Kai, Honghao Gao. 149-154 [doi]
- EMA2AOP: From the AADL Error Model Annex to aspect language towards fault tolerant systemsWafa Gabsi, Bechir Zalila, Mohamed Jmaïel. 155-162 [doi]
- Java-based approach for high level OpenMP loops synthesisEmna Kallel, Yassine Aoudni, Mohamed Abid. 163-170 [doi]
- Business sustainability frameworks a surveyArunasalam Sambhanthan, Vidyasagar Potdar. 171-177 [doi]
- Waste management strategies for Software Development companies: An explorative text analysis of business sustainability reportsArunasalam Sambhanthan, Vidyasagar Potdar. 179-184 [doi]
- Towards understanding and exploiting developers' emotional variations in software engineeringMd Rakibul Islam, Minhaz F. Zibran. 185-192 [doi]
- On the gamification of human-centric traceability tasks in software testing and codingReza Meimandi Parizi. 193-200 [doi]
- Variability modeling with a SPL-UML profileJihen Maâzoun, Nadia Bouassida, Hanêne Ben-Abdallah. 201-207 [doi]
- Model-driven development of simulation-based system design toolsSven Jager, Ralph Maschotta, Tino Jungebloud, Alexander Wichmann, Armin Zimmermann. 209-215 [doi]
- Evaluation and improvements for agile planning toolsSultan Alyahya, Manal Alqahtani, Mohamed Maddeh. 217-224 [doi]
- A survey of Western Australian Software Businesses an exlporative web content analysisArunasalam Sambhanthan, Vidyasagar Potdar. 225-234 [doi]
- Organizational and project process definition: A lightweight framework, supporting tool, and industry experienceXiaofeng Cui. 235-241 [doi]
- Stakeholder's expected value of Enterprise Architecture: An Enterprise Architecture solution based on stakeholder perspectiveIra Puspitasari. 243-248 [doi]
- Comparison of the performance of Drools and Jena rule-based systems for event processing on the semantic webAndrew Fobel, Nary Subramanian. 249-256 [doi]
- Port based software architecture and its analysisHongyun Huang, Zuohua Ding. 257-262 [doi]
- Software Architectures: Multi-Scale RefinementIlhem Khlif, Mohamed Hadj Kacem, Patricia Stolf, Ahmed Hadj Kacem. 265-272 [doi]
- A technique to evaluate software evolution based on architecture metricBixin Li, Li Liao, Jingwen Si. 273 [doi]
- Automatic 3D face preprocessingSoumaya Zribi, Taher Khadhraoui, Faouzi Benzarti, Hamid Amiri. 280-284 [doi]
- Critical success factors behind the sustainability of the Sharing EconomyRaza Hasan, Mehdi Birgach. 287-293 [doi]