Register
|
Login
Full Text
Author
Title
Submit manuscript
About
Articles
Issues
Author Guidelines
Special Issues
Call for Papers
Imprint
Editorial Team
Contacts
Filter
Search
Full Text
Author
Title
by Subject
Topic A - General Literature
Topic B - Hardware
Topic C - Computer Systems Organization
Topic D - Software
Topic E - Data
Topic F - Theory of Computation
Topic G - Mathematics of Computing
Topic H - Information Systems
Topic I - Computing Methodologies
Topic J - Computer Applications
Topic K - Computing Milieux
Topic L - Science and Technology of Learning
Topic M - Knowledge Management
by Publication Date (dd/mm/yyyy)
from
to
by Publication Type
Research Article
(2629)
Editorial
(398)
by Journal
by Funding Agency
Clear filters
Powered by
631 items matching your criteria
Sort by:
Publication date newest
Publication date oldest
Total views
Unique views
Best match
Citations count
Highly accessed (last month)
Highly accessed (last 3 months)
Highly accessed (last 6 months)
Highly accessed (last year)
Filter By:
Subject: Topic D - Software
Clear All
Copy link
RSS Feed
RSS Feed filters articles only by Classification type, Date (from/to), Publication type
1
2
3
4
5
Select:
All
None
Download:
Citation
XML
PDF
Export format
RIS
BIBTEX
Bookends
EasyBib
EndNote (tagged)
EndNote 8 (xml)
Medlars
Mendeley
Papers
RefWorks Tagged
Ref Manager
Zotero
Mods (xml)
Plain text (txt)
Download
Research Article
MODELFY: A Model-driven Solution for Decision Making based on Fuzzy Information
María Castañeda
,
Mercedes G. Merayo
,
Juan Boubeta-Puig
,
Iván Calvo
10.3897/jucs.76030
28-05-2022
Unique: 1274 | Total: 2124
| Access Period:
445-474
HTML
XML
PDF
Research Article
Scrum Watch
: a tool for monitoring the performance of Scrum-based work teams
Florencia Vega
,
Guillermo Rodríguez
,
Fabio Rocha
,
Rodrigo Pereira dos Santos
10.3897/jucs.67593
28-01-2022
Unique: 1568 | Total: 2664
| Access Period:
98-117
HTML
XML
PDF
Research Article
Middleware for the Internet of Things: a systematic literature review
Rodolfo Medeiros
,
Sílvio Fernandes
,
Paulo G. G Queiroz
10.3897/jucs.71693
28-01-2022
Unique: 1586 | Total: 2659
| Access Period:
54-79
HTML
XML
PDF
Research Article
SoREn, How Dynamic Software Update Tools Can Help Cybersecurity Systems to Improve Monitoring and Actions
Sébastien Martinez
,
Christophe Gransart
,
Olivier Stienne
,
Virginie Deniau
,
Philippe Bon
10.3897/jucs.66857
28-01-2022
Unique: 1238 | Total: 2174
| Access Period:
27-53
HTML
XML
PDF
Research Article
Leveraging multifaceted proximity measures among developers in predicting future collaborations to improve the social capital of software projects
Amit Kumar
,
Sonali Agarwal
Part of: Challenges for Smart Environments - Human-Centered Computing, Data Science, and Ambient Intelligence I
10.3897/jucs.76602
28-11-2021
Unique: 1244 | Total: 2261
| Access Period:
1240-1271
HTML
XML
PDF
Research Article
Understanding the Impact of Development Efforts in Code Quality
Ricardo Perez-Castillo
,
Mario Piattini
10.3897/jucs.72475
28-10-2021
Unique: 1163 | Total: 2453
| Access Period:
1096-1127
HTML
XML
PDF
Research Article
Continuations and Aspects to Tame Callback Hell on the Web
Paul Leger
,
Hiroaki Fukuda
,
Ismael Figueroa
10.3897/jucs.72205
28-09-2021
Unique: 1143 | Total: 2128
| Access Period:
955-978
HTML
XML
PDF
Research Article
A Compiler and Language Support for Designing Mixed-Criticality Applications
Nermin Kajtazovic
,
Peter Hödl
,
Leo Happ Botler
Part of: Recent Advances in Cybersecurity and Safety Architectures in Automotive, IT, and Connected Services
10.3897/jucs.71831
28-08-2021
Unique: 1344 | Total: 3060
| Access Period:
894-911
HTML
XML
PDF
Research Article
Lean integration of IT security and data privacy governance aspects into product development in agile organizations
Alexander Poth
,
Mario Kottke
,
Kerstin Middelhauve
,
Torsten Mahr
,
Andreas Riel
Part of: Recent Advances in Cybersecurity and Safety Architectures in Automotive, IT, and Connected Services
10.3897/jucs.71770
28-08-2021
Unique: 1894 | Total: 3244
| Access Period:
868-893
HTML
XML
PDF
Research Article
Cybersecurity Verification and Validation Testing in Automotive
Damjan Ekert
,
Jürgen Dobaj
,
Alen Salamun
Part of: Recent Advances in Cybersecurity and Safety Architectures in Automotive, IT, and Connected Services
10.3897/jucs.71833
28-08-2021
Unique: 1923 | Total: 3325
| Access Period:
850-867
HTML
XML
PDF
Research Article
Cybersecurity Threat Analysis, Risk Assessment and Design Patterns for Automotive Networked Embedded Systems: A Case Study
Jürgen Dobaj
,
Damjan Ekert
,
Jakub Stolfa
,
Svatopluk Stolfa
,
Georg Macher
,
Richard Messnarz
Part of: Recent Advances in Cybersecurity and Safety Architectures in Automotive, IT, and Connected Services
10.3897/jucs.72367
28-08-2021
Unique: 2045 | Total: 3699
| Access Period:
830-849
HTML
XML
PDF
Research Article
ODD description methods for automated driving vehicle and verifiability for safety
Masao Ito
Part of: Recent Advances in Cybersecurity and Safety Architectures in Automotive, IT, and Connected Services
10.3897/jucs.72333
28-08-2021
Unique: 2330 | Total: 4076
| Access Period:
796-810
HTML
XML
PDF
1
2
3
4
5
This website uses cookies in order to improve your web experience.
Read our Cookies Policy
OK