Found 3444 results
Filters: News is [Clear All Filters]
Understanding the Relationships Within the Medi SPICE Framework. The Seventh International Conference on Software Engineering Advances (ICSEA 2012)The Seventh International Conference on Software Engineering Advances (ICSEA 2012).
.
2012. Understanding the Software Product Line Derivation Process: An Industrial Example. The 20th EuroSPI ConferenceThe 20th EuroSPI Conference.
.
2013. Understanding the Value of Business Process Configuration. Business Process and Service Computing (BPSC 2010)Business Process and Service Computing (BPSC 2010).
.
2010. A Unified Approach to Automate the Usage of Plagiarism Detection Tools in Programming Courses. 12th IEEE International Conference on Computer Science & Education (ICCSE 2017)12th IEEE International Conference on Computer Science & Education (ICCSE 2017).
.
2017. On Unit-Refutation Complete Formulae with Existentially Quantified Variables. 13th International Conference on Principles of Knowledge Representation and Reasoning (KR 2012)13th International Conference on Principles of Knowledge Representation and Reasoning (KR 2012).
.
2012. Untangling the Complexity of Connected Health Evaluations. IEEE International Conference on Healthcare Informatics 2015 (ICHI 2015)IEEE International Conference on Healthcare Informatics 2015 (ICHI 2015).
.
2015. Untitled. Proceedings Software Engineering Conference SE’2008Proceedings Software Engineering Conference SE’2008.
.
2008. Untitled. Proceedings of 10th International Software Product Line Conference (SPLC 2006)Proceedings of 10th International Software Product Line Conference (SPLC 2006).
.
2006. Up Close & Personal: Exploring User-Preferred Image Schemas for Intuitive Privacy Awareness and Control. Proceedings of the Fifteenth International Conference on Tangible, Embedded, and Embodied Interaction.
.
2021. Uplink Adaptive Multimedia Delivery (UAMD) scheme for Video Sensor Network. 2017 IEEE International Conference on Communications Workshops (ICC Workshops).
.
2017. URAN: Utility-based Reputation-oriented Access Network Selection Strategy for HetNets. IEEE International Symposium on Broadband Multimedia Systems and Broadcasting (IEEE BMSB)IEEE International Symposium on Broadband Multimedia Systems and Broadcasting (IEEE BMSB).
.
2015. A Usage Analytics Model for Analysing User Behaviour in IBM Academic Cloud. The 6th International IBM Cloud Academy Conference .
.
2018. Use of Organisational Topologies for Forensic Investigations. Proceedings of the 1st ACM SIGSOFT International Workshop on Software Engineering and Digital Forensics.
.
2017. User Interface Engineering for Software Product Lines – The Dilemma between Automation and Usability. Proceedings of the 4th ACM SIGCHI Symposium on Engineering Interactive Computing Systems (EICS 2012)Proceedings of the 4th ACM SIGCHI Symposium on Engineering Interactive Computing Systems (EICS 2012).
.
2012. User Location-Aware Video Delivery over Wireless Mesh Networks. IEEE International Symposium on Broadband Multimedia Systems and Broadcasting, BMSB 2013IEEE International Symposium on Broadband Multimedia Systems and Broadcasting, BMSB 2013.
.
2013. User-centric adaptation of multi-tenant services: preference-based analysis for service reconfiguration. 9th International Symposium on Software Engineering for Adaptive and Self-Managing Systems9th International Symposium on Software Engineering for Adaptive and Self-Managing Systems.
.
2014. .
2014. User-Changeable Visibility: Resolving Unanticipated Name Clashes in Traits. Proceedings of the 2007 OOPSLA conferenceProceedings of the 2007 OOPSLA conference.
.
2007. User-oriented Cluster-based Solution for Multimedia Content Delivery over VANETs. IEEE International Symposium on Broadband Multimedia Systems and Broadcasting (BMSB)IEEE International Symposium on Broadband Multimedia Systems and Broadcasting (BMSB).
.
2012. Using a Nearest-Neighbour, BERT-Based Approach for Scalable Clone Detection. 2022 IEEE International Conference on Software Maintenance and Evolution (ICSME).
.
2022. .
2022. Using analysis of temporal variances within a honeypot dataset to better predict attack type probability. 2017 12th International Conference for Internet Technology and Secured Transactions (ICITST).
.
2017. Using changeset descriptions as a data source to assist feature location. 2015 IEEE 15th International Working Conference on Source Code Analysis and Manipulation (SCAM).
.
2015. Using Data Analytics to Detect Possible Collusion in a Multiple Choice Quiz Test . IFIP Conference on e-Business, e-Services, and e-Society .
.
2021. Using Dempster-Shafer Theory of Evidence for Situation Inference. 4th European Conference on Smart Sensing and Context (EuroSSC)4th European Conference on Smart Sensing and Context (EuroSSC).
.
2009.