Register
|
Login
Full Text
Author
Title
Submit manuscript
About
Articles
Issues
Author Guidelines
Special Issues
Call for Papers
Imprint
Editorial Team
Contacts
Filter
Search
Full Text
Author
Title
by Subject
Topic A - General Literature
Topic B - Hardware
Topic C - Computer Systems Organization
Topic D - Software
Topic E - Data
Topic F - Theory of Computation
Topic G - Mathematics of Computing
Topic H - Information Systems
Topic I - Computing Methodologies
Topic J - Computer Applications
Topic K - Computing Milieux
Topic L - Science and Technology of Learning
Topic M - Knowledge Management
by Publication Date (dd/mm/yyyy)
from
to
by Publication Type
Research Article
(2642)
Editorial
(400)
by Journal
by Funding Agency
Clear filters
Powered by
425 items matching your criteria
Sort by:
Publication date newest
Publication date oldest
Total views
Unique views
Best match
Citations count
Highly accessed (last month)
Highly accessed (last 3 months)
Highly accessed (last 6 months)
Highly accessed (last year)
Filter By:
Subject: D.2 - SOFTWARE ENGINEERING
Clear All
Copy link
RSS Feed
RSS Feed filters articles only by Classification type, Date (from/to), Publication type
1
2
3
4
5
Select:
All
None
Download:
Citation
XML
PDF
Export format
RIS
BIBTEX
Bookends
EasyBib
EndNote (tagged)
EndNote 8 (xml)
Medlars
Mendeley
Papers
RefWorks Tagged
Ref Manager
Zotero
Mods (xml)
Plain text (txt)
Download
Research Article
Development and Evaluation of a Software Product Line for M-Learning Applications
Venilton FalvoJr
,
Anderson da Silva Marcolino
,
Nemésio Freitas Duarte Filho
,
Edson OliveiraJr
,
Ellen Francine Barbosa
10.3897/jucs.90663
28-10-2022
Unique: 1762 | Total: 2776
| Access Period:
1058-1086
HTML
XML
PDF
Research Article
Disassemble Byte Sequence Using Graph Attention Network
Jing Qiu
,
Feng Dong
,
Guanglu Sun
10.3897/jucs.76528
28-07-2022
Unique: 1169 | Total: 2006
| Access Period:
758-775
HTML
XML
PDF
Research Article
A Neuro-Fuzzy Hybridized Approach for Software Reliability Prediction
Ajay Kumar
10.3897/jucs.80537
28-07-2022
Unique: 1146 | Total: 1885
| Access Period:
708-732
HTML
XML
PDF
Research Article
Pattern Language as Support to Software Measurement Planning for Statistical Process Control
Daisy Ferreira Brito
,
Monalessa Perini Barcellos
,
Gleison Santos
10.3897/jucs.68237
28-07-2022
Unique: 1169 | Total: 2048
| Access Period:
671-707
HTML
XML
PDF
Research Article
MODELFY: A Model-driven Solution for Decision Making based on Fuzzy Information
María Castañeda
,
Mercedes G. Merayo
,
Juan Boubeta-Puig
,
Iván Calvo
10.3897/jucs.76030
28-05-2022
Unique: 1322 | Total: 2201
| Access Period:
445-474
HTML
XML
PDF
Research Article
Scrum Watch
: a tool for monitoring the performance of Scrum-based work teams
Florencia Vega
,
Guillermo Rodríguez
,
Fabio Rocha
,
Rodrigo Pereira dos Santos
10.3897/jucs.67593
28-01-2022
Unique: 1612 | Total: 2743
| Access Period:
98-117
HTML
XML
PDF
Research Article
SoREn, How Dynamic Software Update Tools Can Help Cybersecurity Systems to Improve Monitoring and Actions
Sébastien Martinez
,
Christophe Gransart
,
Olivier Stienne
,
Virginie Deniau
,
Philippe Bon
10.3897/jucs.66857
28-01-2022
Unique: 1284 | Total: 2253
| Access Period:
27-53
HTML
XML
PDF
Research Article
Understanding the Impact of Development Efforts in Code Quality
Ricardo Perez-Castillo
,
Mario Piattini
10.3897/jucs.72475
28-10-2021
Unique: 1264 | Total: 2591
| Access Period:
1096-1127
HTML
XML
PDF
Research Article
A Compiler and Language Support for Designing Mixed-Criticality Applications
Nermin Kajtazovic
,
Peter Hödl
,
Leo Happ Botler
Part of: Recent Advances in Cybersecurity and Safety Architectures in Automotive, IT, and Connected Services
10.3897/jucs.71831
28-08-2021
Unique: 1393 | Total: 3138
| Access Period:
894-911
HTML
XML
PDF
Research Article
Lean integration of IT security and data privacy governance aspects into product development in agile organizations
Alexander Poth
,
Mario Kottke
,
Kerstin Middelhauve
,
Torsten Mahr
,
Andreas Riel
Part of: Recent Advances in Cybersecurity and Safety Architectures in Automotive, IT, and Connected Services
10.3897/jucs.71770
28-08-2021
Unique: 1946 | Total: 3346
| Access Period:
868-893
HTML
XML
PDF
Research Article
Cybersecurity Verification and Validation Testing in Automotive
Damjan Ekert
,
Jürgen Dobaj
,
Alen Salamun
Part of: Recent Advances in Cybersecurity and Safety Architectures in Automotive, IT, and Connected Services
10.3897/jucs.71833
28-08-2021
Unique: 1982 | Total: 3420
| Access Period:
850-867
HTML
XML
PDF
Research Article
Cybersecurity Threat Analysis, Risk Assessment and Design Patterns for Automotive Networked Embedded Systems: A Case Study
Jürgen Dobaj
,
Damjan Ekert
,
Jakub Stolfa
,
Svatopluk Stolfa
,
Georg Macher
,
Richard Messnarz
Part of: Recent Advances in Cybersecurity and Safety Architectures in Automotive, IT, and Connected Services
10.3897/jucs.72367
28-08-2021
Unique: 2122 | Total: 3808
| Access Period:
830-849
HTML
XML
PDF
1
2
3
4
5
This website uses cookies in order to improve your web experience.
Read our Cookies Policy
OK