Found 3465 results
SchröDinger's Security: Opening the Box on App Developers' Security Rationale. Proceedings of the ACM/IEEE 42nd International Conference on Software Engineering.
.
2020. Security and privacy of mHealth applications: a scoping review. IEEE Access. :1-1.
.
2020. Security but Not for Security's Sake: The Impact of Social Considerations on App Developers' Choices. Proceedings of the IEEE/ACM 42nd International Conference on Software Engineering Workshops.
.
2020. .
2020. .
2020. Simulating Resource Management across the Cloud-to-Thing Continuum: A Survey and Future Directions. Future Internet. 12:95.
.
2020. Smart Cities and Sustainable Development, Adoption of Green IS Projects in Local Authorities. AISWN International Research Workshop on Women, IS and Grand Challenges 2020.
.
2020. .
2020. Software Engineering in Society. IEEE Software. 37:7-9.
.
2020. Software Engineering Issues: An exploratory study into the development of Health Information Systems for people with Mild Intellectual and Developmental Disability. 2020 IEEE First International Workshop on Requirements Engineering for Well-Being, Aging, and Health (REWBAH).
.
2020. .
2020. Some novel aspects of the positive linear observer problem: Differential privacy and optimal l1 sensitivity. Journal of the Franklin Institute. 357:13923-13940.
.
2020. SQuAP-Ont: An ontology of software quality relational factors from financial systems. Semantic Web. :1-15.
.
2020. SQuAP-Ont: An ontology of software quality relational factors from financial systems. Semantic Web. 11:1-15.
.
2020. Student Engagement in Sensitive Design Contexts: A Case Study in Dementia Care. Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems.
.
2020. A Survey on IoT Big Data: Current Status, 13 V’s Challenges, and Future Directions. ACM Comput. Surv.. 53
.
2020. Sustaining Open Source Communities by Understanding the Influence of Discursive Manifestations on Sentiment . Information Systems Frontiers.
.
2020. Tailored Retrieval of Health Information from the Web for Facilitating Communication and Empowerment of Elderly People . 6th International Conference on Information and Communication Technologies for Ageing Well and e-Health.
.
2020. Taking the Middle Path: Learning About Security Through Online Social Interaction. IEEE Software. 37:25-30.
.
2020. TASO: Time and Space Optimization for Memory-Constrained DNN Inference. 2020 IEEE 32nd International Symposium on Computer Architecture and High Performance Computing (SBAC-PAD).
.
2020. .
2020. Tight Polynomial Worst-Case Bounds for Loop Programs . Logical Methods in Computer Science. Volume 16, Issue 2
.
2020. Tight Polynomial Worst-Case Bounds for Loop Programs . Logical Methods in Computer Science. 16(2)
.
2020. .
2020. Towards an Explainable Approach for Insider Threat Detection: Constraint Network Learning. 2020 International Conference on Intelligent Data Science Technologies and Applications (IDSTA).
.
2020.