1 | -- | 11 | Hui Liu, Yang Liu, Xue Guo, Yuan Gao. Case study on software refactoring tactics |
5 | -- | 13 | Richard E. Courtney, David A. Gustafson. Shotgun correlations in software measures |
12 | -- | 18 | Tingyuan Nie, Lijian Zhou, Zhe-Ming Lu. Power evaluation methods for data encryption algorithms |
14 | -- | 20 | Arthur H. M. ter Hofstede, E. R. Nieuwland. Task structure semantics through process algebra |
19 | -- | 32 | Patricia Miravet, Ignacio Marín 0003, Francisco Ortin, Javier Rodríguez. Framework for the declarative implementation of native mobile applications |
21 | -- | 29 | Hong Zhu, Patrick A. V. Hall. Test data adequacy measurement |
31 | -- | 39 | Agnes Kaposi, Ian Pyle. Systems are not only software |
33 | -- | 41 | Wenhu Tang, Long Yan, Zhen Yang, Q. Henry Wu. Improved document ranking in ontology-based document search engine using evidential reasoning |
41 | -- | 48 | Claudio Nascimento, Jean Dollimore. A model for co-operative object-orientated programming |
42 | -- | 51 | Philip O'Kane, Sakir Sezer, Kieran McLaughlin, Eul-Gyu Im. Malware detection: program run length against detection rate |
52 | -- | 0 | Mohammad Azzeh, Marwan Alseid. Errata 'Value of ranked voting methods for estimation by analogy', IET Softw., 2013, 7, (4), pp 195-202 |