Register
|
Login
Full Text
Author
Title
Submit manuscript
About
Articles
Issues
Author Guidelines
Special Issues
Call for Papers
Imprint
Editorial Team
Contacts
Filter
Search
Full Text
Author
Title
by Subject
Topic A - General Literature
Topic B - Hardware
Topic C - Computer Systems Organization
Topic D - Software
Topic E - Data
Topic F - Theory of Computation
Topic G - Mathematics of Computing
Topic H - Information Systems
Topic I - Computing Methodologies
Topic J - Computer Applications
Topic K - Computing Milieux
Topic L - Science and Technology of Learning
Topic M - Knowledge Management
by Publication Date (dd/mm/yyyy)
from
to
by Publication Type
Research Article
(2648)
Editorial
(401)
by Journal
by Funding Agency
Clear filters
Powered by
426 items matching your criteria
Sort by:
Publication date newest
Publication date oldest
Total views
Unique views
Best match
Citations count
Highly accessed (last month)
Highly accessed (last 3 months)
Highly accessed (last 6 months)
Highly accessed (last year)
Filter By:
Subject: D.2 - SOFTWARE ENGINEERING
Clear All
Copy link
RSS Feed
RSS Feed filters articles only by Classification type, Date (from/to), Publication type
11
12
13
14
15
Select:
All
None
Download:
Citation
XML
PDF
Export format
RIS
BIBTEX
Bookends
EasyBib
EndNote (tagged)
EndNote 8 (xml)
Medlars
Mendeley
Papers
RefWorks Tagged
Ref Manager
Zotero
Mods (xml)
Plain text (txt)
Download
Research Article
Behavioral and Temporal Pattern Detection within Financial Data with Hidden Information
Doron Drusinsky
10.3217/jucs-018-14-1950
28-07-2012
Unique: 519 | Total: 674
| Access Period:
1950-1966
HTML
XML
PDF
Research Article
Risk-Driven Security Metrics in Agile Software Development - An Industrial Pilot Study
Reijo Savola
,
Christian Frühwirth
,
Ari Pietikäinen
Part of: An Overview of Current Information Systems Security Challenges and Innovations
10.3217/jucs-018-12-1679
28-06-2012
Unique: 668 | Total: 899
| Access Period:
1679-1702
HTML
XML
PDF
Research Article
Aligning Security and Privacy to Support the Development of Secure Information Systems
Haralambos Mouratidis
,
Christos Kalloniatis
,
Shareeful Islam
,
Marc-Philippe Huget
,
Stefanos Gritzalis
Part of: An Overview of Current Information Systems Security Challenges and Innovations
10.3217/jucs-018-12-1608
28-06-2012
Unique: 549 | Total: 744
| Access Period:
1608-1627
HTML
XML
PDF
Research Article
Interoperability Framework for Multimodal Biometry: Open Source in Action
Miloš Milovanović
,
Miroslav Minović
,
Starčević Dušan
Part of: Some Reflections about Service Oriented Architectures, Cloud Computing Applications, Services and Interoperability
10.3217/jucs-018-11-1558
01-06-2012
Unique: 538 | Total: 710
| Access Period:
1558-1575
HTML
XML
PDF
Research Article
Human and Intellectual Capital Management in the Cloud: Software Vendor Perspective
Ricardo Colomo-Palacios
,
Eduardo Fernandes
,
Marc Sabbagh
,
Antonio Seco
Part of: Some Reflections about Service Oriented Architectures, Cloud Computing Applications, Services and Interoperability
10.3217/jucs-018-11-1544
01-06-2012
Unique: 580 | Total: 764
| Access Period:
1544-1557
HTML
XML
PDF
Research Article
Docs4Learning: Getting Google Docs to work within the LMS with IMS BLTI
Marc Forment
,
María Casany
,
Enric Mayol
,
Jordi Piguillem
,
Nikolas Galanis
,
Francisco García-Peñalvo
,
Miguel Conde
Part of: Some Reflections about Service Oriented Architectures, Cloud Computing Applications, Services and Interoperability
10.3217/jucs-018-11-1483
01-06-2012
Unique: 703 | Total: 949
| Access Period:
1483-1500
HTML
XML
PDF
Research Article
Syntactic and Semantic Extensions to Secure Tropos to Support Security Risk Management
Raimundas Matulevičius
,
Haralambos Mouratidis
,
Nicolas Mayer
,
Eric Dubois
,
Patrick Heymans
Part of: Security in Information Systems: New Challenges and Opportunities
10.3217/jucs-018-06-0816
28-03-2012
Unique: 547 | Total: 713
| Access Period:
816-844
HTML
XML
PDF
Research Article
Qos-Security Metrics Based on ITIL and COBIT Standard for Measurement Web Services
Pattama Charuenporn
,
Sarun Intakosum
Part of: Security in Information Systems: New Challenges and Opportunities
10.3217/jucs-018-06-0775
28-03-2012
Unique: 645 | Total: 838
| Access Period:
775-797
HTML
XML
PDF
Research Article
Success Rate of Remote Code Execution Attacks - Expert Assessments and Observations
Hannes Holm
,
Teodor Sommestad
,
Ulrik Franke
,
Mathias Ekstedt
Part of: Security in Information Systems: New Challenges and Opportunities
10.3217/jucs-018-06-0732
28-03-2012
Unique: 615 | Total: 847
| Access Period:
732-749
HTML
XML
PDF
Research Article
Applying a Modular Framework to Develop Mobile Applications and Services
Mabel Vazquez-Briseno
,
Pierre Vincent
,
Juan Nieto-Hipolito
,
Juan Sanchez-Lopez
10.3217/jucs-018-05-0704
01-03-2012
Unique: 573 | Total: 716
| Access Period:
704-727
HTML
XML
PDF
Research Article
Supporting End-User Development through a New Composition Model: An Empirical Study
David Lizcano
,
Fernando Alonso
,
Javier Soriano
,
Genoveva López
10.3217/jucs-018-02-0143
28-01-2012
Unique: 521 | Total: 714
| Access Period:
143-176
HTML
XML
PDF
Research Article
Clustering Projects for eLearning Interoperability
Marc Alier
,
Enric Mayol
,
Maria Casañ
,
Jordi Piguillem
,
Jeffrey Merriman
,
Miguel Conde
,
Francisco García-Peñalvo
,
Wouter Tebben
,
Charles Severance
Part of: Outcomes of International Research Projects on Technology Applied to Education
10.3217/jucs-018-01-0106
01-01-2012
Unique: 682 | Total: 1014
| Access Period:
106-122
HTML
XML
PDF
11
12
13
14
15
This website uses cookies in order to improve your web experience.
Read our Cookies Policy
OK