Abstract is missing.
- Practical language-independent detection of near-miss clonesJames R. Cordy, Thomas R. Dean, Nikita Synytskyy. 2 [doi]
- Recommending software experts using code similarity and social heuristicsGhadeer A. Kintab, Chanchal K. Roy, Gordon I. McCalla. 4-18 [doi]
- Involvement, contribution and influence in GitHub and stack overflowAli Sajedi Badashian, Afsaneh Esteki, Ameneh Gholipour, Abram Hindle, Eleni Stroulia. 19-33 [doi]
- Monitoring sentiment in open source mailing lists: exploratory study on the apache ecosystemParastou Tourani, Yujuan Jiang, Bram Adams. 34-44 [doi]
- The (5+1) architectural view model for cloud applicationsMohammad Hamdaqa, Ladan Tahvildari. 46-60 [doi]
- Chorus: an interactive approach to incremental modeling and validation in cloudsJin Chen, Gokul Soundararajan, Saeed Ghanbari, Zartab Jamil, Mike Dai Wang, Ali B. Hashemi, Cristiana Amza. 61-74 [doi]
- Analyzing auto-scaling issues in cloud environmentsHanieh Alipour, Yan Liu, Abdelwahab Hamou-Lhadj. 75-89 [doi]
- Reverse engineering of object-oriented code into Umple using an incremental and rule-based approachMiguel A. Garzón, Timothy C. Lethbridge, Hamoud I. Aljamaan, Omar Badreddin. 91-105 [doi]
- Modeling and analysis of video games based on workflow nets and state graphsFranciny Medeiros Barreto, Stéphane Julia. 106-119 [doi]
- Towards a framework for ontology learning from interactions in natural language and reasoningRyan Ribeiro de Azevedo, Fred Freitas, Rodrigo G. C. Rocha, José Antônio Alvez de Menezes, Cleyton M. O. Rodrigues, Mikaela Campos Gomes. 120-132 [doi]
- Exploiting social context in personalized web-tasking applicationsLorena Castañeda, Norha M. Villegas, Hausi A. Müller. 134-147 [doi]
- Tempesta: a framework for HTTP DDoS attacks mitigationAlexander Krizhanovsky. 148-162 [doi]
- Simulation and performance evaluation of the hadoop capacity schedulerJagmohan Chauhan, Dwight J. Makaroff, Winfried K. Grassmann. 163-177 [doi]
- Mining common morphological fragments from process event logsAsef Pourmasoumi Hasan Kiyadeh, Mohsen Kahani, Ebrahim Bagheri, Mohsen Asadi. 179-191 [doi]
- A systematic approach for dynamic targeted monitoring of KPIsAlejandro Maté, Kostas Zoumpatianos, Themis Palpanas, Juan Trujillo, John Mylopoulos, Elvis Koci. 192-206 [doi]
- Relational OLAP query optimizationLarry Luo, Martin Petitclerc. 207-217 [doi]
- The power of system call traces: predicting the software energy consumption impact of changesKaran Aggarwal, Chenlei Zhang, Joshua Charles Campbell, Abram Hindle, Eleni Stroulia. 219-233 [doi]
- On improving green mining for energy-aware software analysisStephen Romansky, Abram Hindle. 234-245 [doi]
- Towards understanding digital information discovery and curationElena Voyloshnikova, Margaret-Anne D. Storey. 247-261 [doi]
- Supporting the evaluation of complex search tasks with the searchtrails toolSebastian Franken, Ulrich Norbisrath. 262-274 [doi]
- Enterprise application development in the cloud with IBM BluemixKris Kobylinski, Jon Bennett, Norman Seto, Grace Lo, Fred Tucci. 276-279 [doi]
- IBM Community Hackathon 2014: IBM BluemixMurali Pattathe, Chinh Hoang, Vince Yuen, Lucy Li. 280-282 [doi]
- Introduction to Node.jsAndrew Low, Joran Siu, Ivy Ho, Gary Liu. 283-284 [doi]
- Mobile application with IBM Bluemix and social services (using Apache Cordova and RAD)Leopoldo Miranda Martinez, Cesar Ivan Orozco Cervantes, Victor Adrian Sosa Herrera, Troy Bishop. 285-287 [doi]
- 5th workshop on cloud computingMarin Litoiu, Joe Wigglesworth, Tinny Ng. 288-289 [doi]
- Business process management (BPM) in a dayGary Bist. 290-291 [doi]
- 13th compiler-driven performance workshop (CDP)Chen Ding, Tarek Abdelrahman, Roch Archambault, Mark Stoodley, Olivier Tardieu. 292-294 [doi]
- 9th workshop on challenges for parallel computingPriya Unnikrishnan, Jeremy S. Bradbury, Kit Barton, Robert Ho. 295-296 [doi]
- Acceleration of cloud computingAlon Shalev Housfater, Muhammad Sohaib Aslam, Danny Gupta, Sina Meraji, Rahmane Bennis. 297-298 [doi]
- Convergent paradigms in the internet of things (CT-IoT)Hanan Lutfiyya, Sharief M. A. Oteafy. 299-300 [doi]
- Mobile application development with IBM Worklight and IBM BlueMixSalman Moghal, Serjik GharapetDikaleh, Ozair Sheikh, John Marini. 301-302 [doi]
- Web interaction server: a web tasking middleware a position paperJoanna W. Ng, Diana H. Lau, Tinny Ng. 303-305 [doi]
- Web tasking: a position paperJoanna W. Ng. 306-313 [doi]
- Accelerating analytic queries in OLTP environment using DB2 shadow tablesPetrus Chan, Aruna De Silva, Calisto Zuzarte. 314-316 [doi]
- Master data management fundamental and integrated solutionKenneth Cheung, Tera Chung. 317-319 [doi]
- The 6th workshop on interoperability and smart interactions in healthcare: interoperability in contextCraig E. Kuziemsky, Liam Peyton, Jens H. Weber, Thodoros Topaloglou. 320-322 [doi]
- Big data analytics using hadoopMohammad Mahdi Mohammadi, Bijan Raahemi, Fatemeh Cheraghchi, Waeal J. Obidallah, Elnaz Bigdeli. 323-325 [doi]
- Smart big data analytics as a service framework: a proposalShady Khalifa, Patrick Martin. 327-330 [doi]
- Derive: finding semantic concepts with property-values from natural language textJohn Cuzzola, Ebrahim Bagheri. 331-334 [doi]
- Distributed policy based management for wireless sensor networks to support the internet of things environmentNidal Qwasmi, Ramiro Liscano. 335-338 [doi]
- Static application security testing for crypto-currency ecosystemsShu Wang, Bingzhou Zheng. 339-342 [doi]
- Smart autoflight control systemsStephan Heinemann, Hausi A. Müller, Afzal Suleman. 343-346 [doi]
- Towards a uniform data model in multi-database environmentsDiego Serrano, Eleni Stroulia. 347-350 [doi]
- Materialized views in CassandraTilmann Rabl, Hans-Arno Jacobsen. 351-354 [doi]
- Optimizing key-value stores for hybrid storage architecturesPrashanth Menon, Tilmann Rabl, Mohammad Sadoghi, Hans-Arno Jacobsen. 355-358 [doi]
- Toward a solution for the cloud account delegation problemBradley Simmons, Mark Shtern, Marin Litoiu, Michael Smit. 359-362 [doi]
- ARDev: a methodology based on scrum principles to support research management on software technologiesDaniella Rodrigues Bezerra, Arilo Claudio Dias Neto, Raimundo da Silva Barreto. 363-366 [doi]
- Category-based user interaction with online user-generated videos: workload characterizationShaiful Alam Chowdhury, Dwight J. Makaroff. 367-370 [doi]
- Exploiting emergent technologies to create systems that meet shifting expectationsAlexei Lapouchnian, Eric S. K. Yu. 371-374 [doi]
- Mitigating dynamic attacks using multi-agent game-theoretic techniquesMahsa Emami-Taba, Mehdi Amoui, Ladan Tahvildari. 375-378 [doi]