Register
|
Login
Full Text
Author
Title
Submit manuscript
About
Articles
Issues
Author Guidelines
Special Issues
Call for Papers
Imprint
Editorial Team
Contacts
Filter
Search
Full Text
Author
Title
by Subject
Topic A - General Literature
Topic B - Hardware
Topic C - Computer Systems Organization
Topic D - Software
Topic E - Data
Topic F - Theory of Computation
Topic G - Mathematics of Computing
Topic H - Information Systems
Topic I - Computing Methodologies
Topic J - Computer Applications
Topic K - Computing Milieux
Topic L - Science and Technology of Learning
Topic M - Knowledge Management
by Publication Date (dd/mm/yyyy)
from
to
by Publication Type
Research Article
(2629)
Editorial
(398)
by Journal
by Funding Agency
Clear filters
Powered by
424 items matching your criteria
Sort by:
Publication date newest
Publication date oldest
Total views
Unique views
Best match
Citations count
Highly accessed (last month)
Highly accessed (last 3 months)
Highly accessed (last 6 months)
Highly accessed (last year)
Filter By:
Subject: D.2 - SOFTWARE ENGINEERING
Clear All
Copy link
RSS Feed
RSS Feed filters articles only by Classification type, Date (from/to), Publication type
1
2
3
4
5
Select:
All
None
Download:
Citation
XML
PDF
Export format
RIS
BIBTEX
Bookends
EasyBib
EndNote (tagged)
EndNote 8 (xml)
Medlars
Mendeley
Papers
RefWorks Tagged
Ref Manager
Zotero
Mods (xml)
Plain text (txt)
Download
Research Article
Disassemble Byte Sequence Using Graph Attention Network
Jing Qiu
,
Feng Dong
,
Guanglu Sun
10.3897/jucs.76528
28-07-2022
Unique: 1126 | Total: 1935
| Access Period:
758-775
HTML
XML
PDF
Research Article
A Neuro-Fuzzy Hybridized Approach for Software Reliability Prediction
Ajay Kumar
10.3897/jucs.80537
28-07-2022
Unique: 1106 | Total: 1833
| Access Period:
708-732
HTML
XML
PDF
Research Article
Pattern Language as Support to Software Measurement Planning for Statistical Process Control
Daisy Ferreira Brito
,
Monalessa Perini Barcellos
,
Gleison Santos
10.3897/jucs.68237
28-07-2022
Unique: 1100 | Total: 1957
| Access Period:
671-707
HTML
XML
PDF
Research Article
MODELFY: A Model-driven Solution for Decision Making based on Fuzzy Information
María Castañeda
,
Mercedes G. Merayo
,
Juan Boubeta-Puig
,
Iván Calvo
10.3897/jucs.76030
28-05-2022
Unique: 1278 | Total: 2133
| Access Period:
445-474
HTML
XML
PDF
Research Article
Scrum Watch
: a tool for monitoring the performance of Scrum-based work teams
Florencia Vega
,
Guillermo Rodríguez
,
Fabio Rocha
,
Rodrigo Pereira dos Santos
10.3897/jucs.67593
28-01-2022
Unique: 1574 | Total: 2671
| Access Period:
98-117
HTML
XML
PDF
Research Article
SoREn, How Dynamic Software Update Tools Can Help Cybersecurity Systems to Improve Monitoring and Actions
Sébastien Martinez
,
Christophe Gransart
,
Olivier Stienne
,
Virginie Deniau
,
Philippe Bon
10.3897/jucs.66857
28-01-2022
Unique: 1244 | Total: 2187
| Access Period:
27-53
HTML
XML
PDF
Research Article
Understanding the Impact of Development Efforts in Code Quality
Ricardo Perez-Castillo
,
Mario Piattini
10.3897/jucs.72475
28-10-2021
Unique: 1171 | Total: 2463
| Access Period:
1096-1127
HTML
XML
PDF
Research Article
A Compiler and Language Support for Designing Mixed-Criticality Applications
Nermin Kajtazovic
,
Peter Hödl
,
Leo Happ Botler
Part of: Recent Advances in Cybersecurity and Safety Architectures in Automotive, IT, and Connected Services
10.3897/jucs.71831
28-08-2021
Unique: 1349 | Total: 3067
| Access Period:
894-911
HTML
XML
PDF
Research Article
Lean integration of IT security and data privacy governance aspects into product development in agile organizations
Alexander Poth
,
Mario Kottke
,
Kerstin Middelhauve
,
Torsten Mahr
,
Andreas Riel
Part of: Recent Advances in Cybersecurity and Safety Architectures in Automotive, IT, and Connected Services
10.3897/jucs.71770
28-08-2021
Unique: 1902 | Total: 3255
| Access Period:
868-893
HTML
XML
PDF
Research Article
Cybersecurity Verification and Validation Testing in Automotive
Damjan Ekert
,
Jürgen Dobaj
,
Alen Salamun
Part of: Recent Advances in Cybersecurity and Safety Architectures in Automotive, IT, and Connected Services
10.3897/jucs.71833
28-08-2021
Unique: 1932 | Total: 3343
| Access Period:
850-867
HTML
XML
PDF
Research Article
Cybersecurity Threat Analysis, Risk Assessment and Design Patterns for Automotive Networked Embedded Systems: A Case Study
Jürgen Dobaj
,
Damjan Ekert
,
Jakub Stolfa
,
Svatopluk Stolfa
,
Georg Macher
,
Richard Messnarz
Part of: Recent Advances in Cybersecurity and Safety Architectures in Automotive, IT, and Connected Services
10.3897/jucs.72367
28-08-2021
Unique: 2064 | Total: 3722
| Access Period:
830-849
HTML
XML
PDF
Research Article
ODD description methods for automated driving vehicle and verifiability for safety
Masao Ito
Part of: Recent Advances in Cybersecurity and Safety Architectures in Automotive, IT, and Connected Services
10.3897/jucs.72333
28-08-2021
Unique: 2342 | Total: 4094
| Access Period:
796-810
HTML
XML
PDF
1
2
3
4
5
This website uses cookies in order to improve your web experience.
Read our Cookies Policy
OK