Found 117 results
Filters: First Letter Of Last Name is T [Clear All Filters]
A Lattice-Theoretic Model for an Algebra of Communicating Sequential Processes. International Conference of Theoretical Aspects of Computing (ICTAC 2006)International Conference of Theoretical Aspects of Computing (ICTAC 2006).
.
2006. Do deepfake videos undermine our epistemic trust? A thematic analysis of tweets that discuss deepfakes in the Russian invasion of Ukraine PLOS ONE. 18:1-22.
.
2023. .
2022. Specifying Software Features for Composition: A Tool-Supported Approach. Computer Networks. 57(12)
.
2013. Privacy Arguments: Analysing Selective Disclosure Requirements for Mobile Applications. 20th IEEE International Requirements Engineering Conference (RE).
.
2012. OASIS: Weakening User Obligations for Security-critical Systems. 2020 IEEE 28th International Requirements Engineering Conference (RE).
.
2020. The role of environmental assumptions in failures of DNA nano systems. Proceedings of Workshop on Complex Faults and Failures in Large Software Systems (COUFLESS 2015) co-located with ICSE 2015.
.
2015. Requirements and Specifications for Adaptive Security: Concepts and Analysis. Proceedings of the 13th International Conference on Software Engineering for Adaptive and Self-Managing Systems.
.
2018. Digital Contact Tracing Apps for COVID-19: Development of a Citizen-Centered Evaluation Framework. JMIR Mhealth Uhealth. 10:e30691.
.
2022. On the Interplay Between Cyber and Physical Spaces for Adaptive Security. IEEE Transactions on Dependable and Secure Computing. PP
.
2018. Ariadne: Topology Aware Adaptive Security for Cyber-Physical Systems. 37th International Conference on Software Engineering (ICSE 2015)37th International Conference on Software Engineering (ICSE 2015).
.
2015. Autonomous and Autonomic Systems: With Applications to NASA Intelligent Spacecraft Operations and Exploration Systems. NASA Monographs in Systems and Software EngineeringNASA Monographs in Systems and Software Engineering.
.
2010. Autonomous and Autonomic Systems: With Applications to NASA Intelligent Spacecraft Operations and Exploration Systems. published in Chinese by National Defense Industry Presspublished in Chinese by National Defense Industry Press.
.
2012. A Comparative Study of an Evolvability Indicator and a Predictor of Expected Performance for Genetic Programming. GECCO 2012: Proceedings of the 14th Annual Conference on Genetic and Evolutionary ComputationGECCO 2012: Proceedings of the 14th Annual Conference on Genetic and Evolutionary Computation.
.
2012. Predicting problem difficulty for genetic programming applied to data classification. GECCO 2011: Proceedings of the 12th Annual Conference on Genetic and Evolutionary ComputationGECCO 2011: Proceedings of the 12th Annual Conference on Genetic and Evolutionary Computation.
.
2011. SEDS-Lite: Using Open Source Tools (R, BIRT, MySQL) to Report and Analyze Performance Data. Computer Measurement Group (CMG) ConferenceComputer Measurement Group (CMG) Conference.
.
2012. Responsible AI for Digital Health: a Synthesis and a Research Agenda. Information Systems Frontiers.
.
2021. Do I Belong? Modeling Sense of Virtual Community Among Linux Kernel Contributors International Conference on Software Engineering .
.
2023. Do I Belong? Modeling Sense of Virtual Community Among Linux Kernel Contributors 2023 IEEE/ACM 45th International Conference on Software Engineering (ICSE).
.
2023. Uplink Adaptive Multimedia Delivery (UAMD) scheme for Video Sensor Network. 2017 IEEE International Conference on Communications Workshops (ICC Workshops).
.
2017. Uplink Adaptive Multimedia Delivery (UAMD) scheme for Video Sensor Network. 2017 IEEE International Conference on Communications Workshops (ICC Workshops).
.
2017. A Reference Architecture for Consumer Electronics Products and its Application in Requirements Engineering. Relating Software Requirements and ArchitectureRelating Software Requirements and Architecture.
.
2011. OFLoad: An OpenFlow-Based Dynamic Load Balancing Strategy for Datacenter Networks. IEEE Transactions on Network and Service Management. 14:792-803.
.
2017. Privacy in a Time of COVID-19: How Concerned Are You? IEEE Security Privacy. 19:26-35.
.
2021. .
2021.