1 | -- | 7 | Harsh Bhasin. Cost-priority cognizant regression testing |
1 | -- | 6 | Lalit Kumar Singh, Gopika Vinod, Anil Kumar Tripathi. Impact of change in component reliabilities on system reliability estimation |
1 | -- | 3 | Satwinder Singh, Raminder Kaur. Clone detection in UML class models using class metrics |
1 | -- | 6 | Shashank Mouli Satapathy, Barada Prasanna Acharya, Santanu Kumar Rath. Class point approach for software effort estimation using stochastic gradient boosting technique |
1 | -- | 6 | R. Nandakumar, A. K. Lal, R. M. Parmar. State of the art in software quality assurance |
1 | -- | 4 | Ramesh A., Anusha J., Clarence J. M. Tauro. A novel, generalized recommender system for social media using the collaborative-filtering technique |
1 | -- | 14 | Sonia, Archana Singhal, Hema Banati. FISA-XP: an agile-based integration of security activities with extreme programming |
1 | -- | 5 | Raminder Kaur, Satwinder Singh. Clone detection in software source code using operational similarity of statements |
6 | -- | 7 | Alex Groce. Passages |
7 | -- | 8 | Robert Schaefer. Rockstar |
9 | -- | 17 | Mark Doernhoefer. Surfing the net for software engineering notes |
18 | -- | 22 | Peter G. Neumann. Risks to the public |
24 | -- | 25 | Arzu Behiye Tarimci. Core Java® volume II: advanced features (ninth edition) by Cay S. Horstmann and Gary Cornell |
24 | -- | 0 | Harisankar Krishna Swamy. Core python applications programming (third edition) by Wesley J. Chun |
25 | -- | 0 | Ronald Finkbine. Programming in CoffeeScript by Mark Bates |