All Stories

  1. Using a process algebra interface for verification and validation of UML statecharts
  2. Anomaly detection of policies in distributed firewalls using data log analysis
  3. Federated Geo-Distributed Clouds: Optimizing Resource Allocation Based on Request Type Using Autonomous and Multi-objective Resource Sharing Model
  4. Fast Duplicate Bug Reports Detector Training using Sampling for Dimension Reduction: Using Instance-based Learning for Continous Query in Real-World
  5. IoT-Based Model in Smart Urban Traffic Control: Graph theory and Genetic Algorithm
  6. Query processing optimization in broadcasting XML data in mobile communications
  7. A model driven and clustering method for service identification directed by metrics
  8. Identification of Protein Complexes Based on Core-Attachment Structure and Combination of Centrality Measures and Biological Properties in PPI Weighted Networks
  9. Efficient feature extraction model for validation performance improvement of duplicate bug report detection in software bug triage systems
  10. Autonomic task scheduling algorithm for dynamic workloads through a load balancing technique for the cloud-computing environment
  11. Scheduling scientific workflows on virtual machines using a Pareto and hypervolume based black hole optimization algorithm
  12. The clustering algorithm for efficient energy management in mobile ad-hoc networks
  13. Estimating Bifurcating Consensus Phylogenetic Trees Using Evolutionary Imperialist Competitive Algorithm
  14. New labeled dataset of interconnected lexical typos for automatic correction in the bug reports
  15. Test-data generation directed by program path coverage through imperialist competitive algorithm
  16. Evaluation of Clustering Algorithms in Ad Hoc Mobile Networks
  17. Runtime deadlock tracking and prevention of concurrent multithreaded programs: A learning‐based approach
  18. New Methodology for Contextual Features Usage in Duplicate Bug Reports Detection : Dimension Expansion based on Manhattan Distance Similarity of Topics
  19. Improving Performance of Automatic Duplicate Bug Reports Detection using Longest Common Sequence : Introducing New Textual Features for Textual Similarity Detection
  20. A Firefly-based Task Scheduling Algorithm for the Cloud Computing Environment: Formal Verification and Simulation Analyses
  21. Moocart Compatiblety Building Strategy (For the College of Art - University of Baghdad)
  22. A hierarchical structure for optimal resource allocation in geographically distributed clouds
  23. VM selection for task scheduling in geographically distributed clouds
  24. Identification of essential proteins based on a new combination of topological and biological features in weighted protein-protein interaction networks
  25. A modified black hole-based multi-objective workflow scheduling improved using the priority queues for cloud computing environment
  26. Model-Based Monitoring and Adaptation of Pacemaker Behavior Using Hierarchical Fuzzy Colored Petri-Nets
  27. Makespan reduction for dynamic workloads in cluster-based data grids using reinforcement-learning based scheduling
  28. A PSO-based task scheduling algorithm improved using a load-balancing technique for the cloud computing environment
  29. Using a recurrent artificial neural network for dynamic self-adaptation of cluster-based web-server systems
  30. An Innovative Model-Driven SlicingApproach for Testing Adaptive Software
  31. Modeling and verifying timed event-based systems
  32. A GA based method for search-space reduction of chess game-tree
  33. Optimizing multi objective based workflow scheduling in cloud computing using black hole algorithm
  34. A method for the optimum selection of datacenters in geographically distributed clouds
  35. Optimal scheduling workflows in cloud computing environment using Pareto-based Grey Wolf Optimizer
  36. Runtime Verification of Pacemaker Functionality Using Hierarchical Fuzzy Colored Petri-nets
  37. A new data-intensive task scheduling in optorsim, an open source grid simulator
  38. Toward extending apache thrift open source to alleviate SOAP service consumption
  39. Indefinite block ciphering based on variable and great length key
  40. A Multi-Objective Optimization Model for Data-Intensive Workflow Scheduling in Data Grids
  41. A cryptography approach on security layer of web service
  42. A new approach to detecting and preventing the Worm Hole attacks for secure routing in mobile ad-hoc networks based on the SPR protocol
  43. Towards optimization of availability and cost in selection of geo-distributed clouds datacenter
  44. Utilizing Fuzzy colored Petri-Nets to monitor cardiac pacemaker behavior
  45. A class-based link prediction using Distance Dependent Chinese Restaurant Process
  46. A predictive framework for load balancing clustered web servers
  47. Automatic verification of uml state chart by bogor model checking tool: Automatic formal verification of network and distributed systems
  48. Formal verification of UML statecharts using the LOTOS formal language
  49. Runtime verification of pacemaker using fuzzy logic and colored Petri-nets
  50. Predicting potential deadlocks in multithreaded programs
  51. Evaluating software architectural styles based on quality features through hierarchical analysis and Fuzzy Integral (FAHP)
  52. Makespan improvement of PSO-based dynamic scheduling in cloud environment
  53. Medical software runtime checking using Petri-nets & software agents
  54. Mutation score evaluation in terms of object-oriented metrics
  55. A new approach for test case generation by discrete particle swarm optimization algorithm
  56. Software test case generation & test oracle design using neural network
  57. A New Sparse Representation Algorithm for Semi-supervised Signal Classification
  58. Specification and simulation of behavior of the Continuous Infusion Insulin Pump system
  59. An ABC based approach to test case generation for BPEL processes
  60. Achieving Key Privacy and Invisibility for Unattended Wireless Sensor Networks in Healthcare
  61. Runtime verification of service-oriented systems: a well-rounded survey
  62. Specification and verification of reliability in dispatching multicast messages
  63. Improving Service Accessibility in Service-Oriented HIS
  64. An artificial neural network based model for online prediction of potential deadlock in multithread programs
  65. Real-Time Systems, Architecture, Scheduling, and Application
  66. Construction of Real-Time Oracle Using Timed Automata
  67. M2M Architecture: Can It Realize Ubiquitous Computing in Daily life?
  68. Synthesizing a Composite Model for Runtime Monitoring and Adapting Goal Oriented Systems
  69. Formal Verification of Medical Monitoring Software Using Z Language: A Representative Sample
  70. Design and evaluation of a broker for secure web service composition
  71. Constructing formal rules to verify message communication in distributed systems
  72. Resolving Impassiveness in Service Oriented Architecture
  73. From UML State Machines to Verifiable Lotos Specifications
  74. A Straightforward Algorithm to Transform Robot Control State Machines into Verifiable Lotos Specifications
  75. A Framework for Specifying Safe Behavior of the CIIP Medical System
  76. An event based formal specification method to diabetic’s behavior monitor system
  77. A Broker-Based Architecture for Quality-Driven Web Services Composition
  78. Constructing a Model-Based Software Monitor for the Insulin Pump Behavior
  79. Mining Bluetooth Attacks in Smart Phones
  80. Application of Genetic Algorithm in Automatic Software Testing
  81. Behavioral Specification of Real-Time Requirements
  82. Developing a Web-Based Cooperative Environment to Software Project Development
  83. Developing a Web-Based Cooperative Environment to Software Project Development