Software-Practice & Experience

Papers
(The median citation count of Software-Practice & Experience is 1. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-04-01 to 2024-04-01.)
ArticleCitations
Quantum computing: A taxonomy, systematic review and future directions127
A review on the computation offloading approaches in mobile edge computing: A game‐theoretic perspective62
Senti‐eSystem: A sentiment‐based eSystem‐using hybridized fuzzy and deep neural network for measuring customer satisfaction58
Joint computation offloading and resource provisioning for edge‐cloud computing environment: A machine learning‐based approach57
NovidChain: Blockchain‐based privacy‐preserving platform for COVID‐19 test/vaccine certificates51
FPFTS: A joint fuzzy particle swarm optimization mobility‐aware approach to fog task scheduling algorithm for Internet of Things devices44
An Internet of Things‐enabled decision support system for circular economy business model44
An approach to forecast impact of Covid‐19 using supervised machine learning model44
An efficient radix trie‐based semantic visual indexing model for large‐scale image retrieval in cloud environment42
Integrated model‐driven engineering of blockchain applications for business processes and asset management35
IoT‐fog‐cloud based architecture for smart systems: Prototypes of autism and COVID‐19 monitoring systems34
Software effort estimation accuracy prediction of machine learning techniques: A systematic performance evaluation31
A graph‐based convolutional neural network stock price prediction with leading indicators30
Spatiotemporal‐based sentiment analysis on tweets for risk assessment of event using deep learning approach27
PARCIV: Recognizing physical activities having complex interclass variations using semantic data of smartphone26
Microservice transition and its granularity problem: A systematic mapping study26
Function delivery network: Extending serverless computing for heterogeneous platforms25
Software reuse analytics using integrated random forest and gradient boosting machine learning algorithm25
An empirical comparison of commercial and open‐source web vulnerability scanners23
EFFORT: Energy efficient framework for offload communication in mobile cloud computing22
Advanced data integration in banking, financial, and insurance software in the age of COVID‐1922
Impact of etcd deployment on Kubernetes, Istio, and application performance21
An autonomous IoT service placement methodology in fog computing20
Design and evaluation of a scalable Internet of Things backend for smart ports20
SafeMan: A unified framework to manage cybersecurity and safety in manufacturing industry19
A semantic and social‐based collaborative recommendation of friends in social networks19
Comparative study of support vector machines and random forests machine learning algorithms on credit operation19
PDMA: Probabilistic service migration approach for delay‐aware and mobility‐aware mobile edge computing19
Practical and secure multifactor authentication protocol for autonomous vehicles in 5G18
AuctionWhisk: Using an auction‐inspired approach for function placement in serverless fog platforms17
Container lifecycle‐aware scheduling for serverless computing17
Data dimensionality reduction techniques for Industry 4.0: Research results, challenges, and future research directions17
Energy‐Saving Multisensor Data Sampling and Fusion with Decision‐Making for Monitoring Health Risk Using WBSNs17
Cybersecurity protection on in‐vehicle networks for distributed automotive cyber‐physical systems: State‐of‐the‐art and future challenges16
From zero to fog: Efficient engineering of fog‐based Internet of Things applications16
An energy‐aware virtual machines consolidation method for cloud computing: Simulation and verification15
Service offloading oriented edge server placement in smart farming15
A Blockchain‐based Cyber Attack Detection Scheme for Decentralized Internet of Things using Software‐Defined Network15
Component‐aware orchestration of cloud‐based enterprise applications, from TOSCA to Docker and Kubernetes13
CREW: Cost and Reliability aware Eagle‐Whale optimiser for service placement in Fog13
Server configuration optimization in mobile edge computing: A cost‐performance tradeoff perspective13
RESCUE: Enabling green healthcare services using integrated IoT‐edge‐fog‐cloud computing environments13
Finite‐state model extraction and visualization from Java program execution13
The μTOSCA toolchain: Mining, analyzing, and refactoring microservice‐based architectures13
Dual‐grained representation for hand, foot, and mouth disease prediction within public health cyber‐physical systems13
Exploring reliable edge‐cloud computing for service latency optimization in sustainable cyber‐physical systems13
Root causing, detecting, and fixing flaky tests: State of the art and future roadmap12
Notebook‐as‐a‐VRE (NaaVRE): From private notebooks to a collaborative cloud virtual research environment12
Toward an autonomic approach for Internet of Things service placement using gray wolf optimization in the fog computing environment12
Edge‐adaptable serverless acceleration for machine learning Internet of Things applications12
KubCG: A dynamic Kubernetes scheduler for heterogeneous clusters12
Code‐level model checking in the software development workflow at Amazon Web Services12
Applying artificial bee colony algorithm to the multidepot vehicle routing problem12
Software system to predict the infection in COVID‐19 patients using deep learning and web of things11
Human microservices: A framework for turning humans into service providers11
Autonomic resource provisioning for multilayer cloud applications with K‐nearest neighbor resource scaling and priority‐based resource allocation11
What factors influence the lifetime of pull requests?11
Migrating production monolithic systems to microservices using aspect oriented programming11
Timing isolation and improved scheduling of deep neural networks for real‐time systems11
A cache‐based approach toward improved scheduling in fog computing10
HEART: Unrelated parallel machines problem with precedence constraints for task scheduling in cloud computing using heuristic and meta‐heuristic algorithms10
A decade of research in fog computing: Relevance, challenges, and future directions10
Control and data acquisition software of the high‐energy particle detector on board the China Seismo‐Electromagnetic Satellite space mission10
Keywords‐driven web APIs group recommendation for automatic app service creation process10
Vocabulary and time based bug‐assignment: A recommender system for open‐source projects10
Journey from cloud of things to fog of things: Survey, new trends, and research directions10
A flexible approach for virtual machine selection in cloud data centers with AHP9
Android malware detection using network traffic based on sequential deep learning models9
A cloud‐based integration platform for enterprise application integration: A Model‐Driven Engineering approach9
Systematic scalability analysis for microservices granularity adaptation design decisions9
Valuating requirements arguments in the online user's forum for requirements decision‐making: The CrowdRE‐VArg framework9
STOPPAGE: Spatio‐temporal data driven cloud‐fog‐edge computing framework for pandemic monitoring and management9
Effective approaches to combining lexical and syntactical information for code summarization8
Global outliers detection in wireless sensor networks: A novel approach integrating time‐series analysis, entropy, and random forest‐based classification.8
Proactive content caching in edge computing environment: A review8
An autonomous model for self‐optimizing virtual machine selection by learning automata in cloud environment8
Retracted: An unmanned aerial vehicles navigation system on the basis of pattern recognition applications—Review of implementation options and prospects for development8
NAS Parallel Benchmarks with CUDA and beyond8
Practical dynamic reconstruction of control flow graphs8
Data fusion analysis for attention‐deficit hyperactivity disorder emotion recognition with thermal image and Internet of Things devices8
A lightweight virtualization model to enable edge computing in deeply embedded systems8
Post‐quantum cryptography techniques for secure communication in resource‐constrained Internet of Things devices: A comprehensive survey8
Profiling and controlling I/O‐related memory contention in COTS heterogeneous platforms8
Providing high‐level self‐adaptive abstractions for stream parallelism on multicores8
BigDataSDNSim: A simulator for analyzing big data applications in software‐defined cloud data centers8
Software fault prediction using Whale algorithm with genetics algorithm8
SQVDT: A scalable quantitative vulnerability detection technique for source code security assessment8
A service graph based extraction of microservices from monolith services of service‐oriented architecture8
Real time flood disaster monitoring based on energy efficient ensemble clustering mechanism in wireless sensor network8
A community‐based hierarchical user authentication scheme for Industry 4.08
QuantumPath: A quantum software development platform7
A tool for the semantic annotation, validation and optimization of business process models7
Unit of measurement libraries, their popularity and suitability7
Reformulation of the performance portability metric7
Predicting just‐in‐time software defects to reduce post‐release quality costs in the maritime industry7
DevOps benefits: A systematic literature review7
Resource management of IoT edge devices: Challenges, techniques, and solutions7
On the (un‐)adoption of JavaScript front‐end frameworks6
Optimizing checkpoint‐based fault‐tolerance in distributed stream processing systems: Theory to practice6
Evaluating system architectures for driving range estimation and charge planning for electric vehicles6
A scalable framework for healthcare monitoring application using the Internet of Medical Things6
Sensei: Enforcing secure coding guidelines in the integrated development environment6
Using Ginkgo's memory accessor for improving the accuracy of memory‐bound low precision BLAS6
Equivalent mutant identification using hybrid wavelet convolutional rain optimization6
Network traffic prediction method based on echo state network with adaptive reservoir6
A framework for microservices synchronization6
Engineering faster sorters for small sets of items6
Managing data replication and distribution in the fog with FReD6
Blockchain for Health IoT: A privacy‐preserving data sharing system6
Autonomic rejuvenation of cloud applications as a countermeasure to software anomalies6
Standards‐based modeling and deployment of serverless function orchestrations using BPMN and TOSCA6
Edge intelligence based digital twins for internet of autonomous unmanned vehicles6
Validating UTF‐8 in less than one instruction per byte5
Availability analysis of design configurations to compose virtual performance‐optimized data center systems in next‐generation cloud data centers5
Standard versus uniform binary search and their variants in learned static indexing: The case of the searching on sorted data benchmarking software platform5
A metaheuristic‐based data replica placement approach for data‐intensive IoT applications in the fog computing environment5
A systematic gray literature review: The technologies and concerns of microservice application programming interfaces5
ThingsMigrate: Platform‐independent migration of stateful JavaScript Internet of Things applications5
Synthesizing secure software development activities for linear and agile lifecycle models5
Software assistants in software engineering: A systematic mapping study5
Configurable three‐way model merging5
Reusability affecting factors and software metrics for reusability: A systematic literature review5
Scaling scrum with a customized nexus framework: A report from a joint industry‐academia research project5
APISonar: Mining API usage examples5
Author classification using transfer learning and predicting stars in co‐author networks5
Drug investigation tool: Identifying the effect of drug on cell image by using improved correlation5
A comprehensive survey on nature‐inspired algorithms and their applications in edge computing: Challenges and future directions5
Computationally easy, spectrally good multipliers for congruential pseudorandom number generators5
Number parsing at a gigabyte per second5
Usability implications in software architecture: The case study of a mobile app5
The human in model‐driven engineering loop: A case study on integrating handwritten code in model‐driven engineering repositories5
On the relative value of imbalanced learning for code smell detection5
Bug detection in Java code: An extensive evaluation of static analysis tools using Juliet Test Suites4
Practical trade‐offs for the prefix‐sum problem4
xDEVS: A toolkit for interoperable modeling and simulation of formal discrete event systems4
Towards efficient federated learning‐based scheme in medical cyber‐physical systems for distributed data4
Analyzing spatial analytics systems based on Hadoop and Spark: A user perspective4
An efficient Hadoop‐based brain tumor detection framework using big data analytic4
Multiuser collaborative illustration and visualization for volumetric scientific data4
A procedural and flexible approach for specification, modeling, definition, and analysis for self‐adaptive systems4
Message‐sensing classified transmission scheme based on mobile edge computing in the Internet of Vehicles4
Integrated machine learning with semantic web for open government data recommendation based on cloud computing4
Recommending software features to designers: From the perspective of users4
OntoSuSD: Software engineering approaches integration ontology for sustainable software development4
Trilateration‐based indoor localization engineering technique for visible light communication system4
Leveraging machine learning for software redocumentation—A comprehensive comparison of methods in practice4
Constraint‐aware and multi‐objective optimization for micro‐service composition in mobile edge computing4
Charging stations‐oriented electric vehicle charging strategy based on battery characteristics4
On the synthesis of metadata tags for HTML files4
Energy‐efficiency and sustainability in new generation cloud computing: A vision and directions for integrated management of data centre resources and workloads4
Detecting functional and security‐related issues in smart contracts: A systematic literature review4
RIFLING: A reinforcement learning‐based GPU scheduler for deep learning research and development platforms4
Better Scrum through Essence4
Deploying IoT services on the fog infrastructure: A graph partitioning‐based approach4
MyNeutronDAQ: A general program for data acquisition of neutron scattering spectrometers at China Mianyang Research Reactor and on‐line data‐analysis4
Data interplay: A model to optimize data usage in the Internet of Things3
MFHS: A modular scheduling framework for heterogeneous system3
Large‐scale semi‐automated migration of legacy C/C++ test code3
Performance analysis of distributed storage clusters based on kernel and userspace traces3
DevOps project management success factors: A decision‐making framework3
Designing real‐time systems using imprecise discrete‐event system specifications3
Algorithms for all‐pairs Hamming distance based similarity3
Feature location enhancement based on source code augmentation with synonyms of terms3
Posits and the state of numerical representations in the age of exascale and edge computing3
Mutual Information and Feature Importance Gradient Boosting: Automatic byte n‐gram feature reranking for Android malware detection3
Software design pattern selection approaches: A systematic literature review3
EdgeAuth: An intelligent token‐based collaborative authentication scheme3
Design of frameworks for self‐adaptive service‐oriented applications: A systematic analysis3
Multi‐objective materialized view selection using flamingo search optimization algorithm3
Impacts, causes, and solutions of architectural smells in microservices: An industrial investigation3
R2D2: A scalable deep learning toolkit for medical imaging segmentation3
DEPO: A dynamic energy‐performance optimizer tool for automatic power capping for energy efficient high‐performance computing3
Collaborative experience between scientific software projects using Agile Scrum development3
Modified deep belief network based human emotion recognition with multiscale features from video sequences3
Dissimilarity‐based test case prioritization through data fusion3
CppyABM: An open‐source agent‐based modeling library to integrate C++ and Python3
Towards cloud‐based unobtrusive monitoring in remote multi‐vendor environments3
“The Canary in the Coal Mine…” A cautionary tale from the decline of SourceForge3
Big data analytics in Industry 4.0 ecosystems3
HSCR: Hierarchical structured cluster routing protocol for load balanced wireless sensor networks3
SPIDER: An availability‐aware framework for the service function chain placement in distributed scenarios3
Transcoding billions of Unicode characters per second with SIMD instructions3
LLAMA: The low‐level abstraction for memory access3
Continuous engineering for Industry 4.0 architectures and systems3
Is the edge really necessary for drone computing offloading? An experimental assessment in carrier‐grade 5G operator networks3
PAS: A new powerful and simple quantum computing simulator3
Energy‐efficient task scheduling and resource management in a cloud environment using optimized hybrid technology3
Plumb: Efficient stream processing of multi‐user pipelines3
Adopting microservices and DevOps in the cyber‐physical systems domain: A rapid review and case study3
The Floyd‐Warshall all‐pairs shortest paths algorithm for disconnected and very sparse graphs3
Deep domain adversarial residual neural network for sustainable wind turbine cyber‐physical system fault diagnosis3
Semantics to the rescue of document‐based XML diff: A JATS case study3
How the adoption of feature toggles correlates with branch merges and defects in open‐source projects?3
Architecture violations detection and visualization in the continuous integration pipeline3
Ajalon: Simplifying the authoring of wearable cognitive assistants2
Security analytics for real‐time forecasting of cyberattacks2
Two decades of live coding and debugging of virtual machines through simulation2
Code samples summarization for knowledge exchange in developer community2
A federated learning attack method based on edge collaboration via cloud2
QoS‐aware resource scheduling using whale optimization algorithm for microservice applications2
Implementing scripted conversations by means of smart assistants2
faas‐sim: A trace‐driven simulation framework for serverless edge computing platforms2
Generation of logic designs for efficiently solving ordinary differential equations on field programmable gate arrays2
A new evolutionism based self‐adaptive multi‐objective optimization method to predict software cost estimation2
The effect of distance metrics in a general purpose synthesizer: An empirical study on integer domain imperative programs2
GDBApex: A graph‐based system to enable efficient transformation of enterprise infrastructures2
Unearthing open source decision‐making processes: A case study of python enhancement proposals2
EESSI: A cross‐platform ready‐to‐use optimised scientific software stack2
An efficient list‐based task scheduling algorithm for heterogeneous distributed computing environment2
Efficiency in the serverless cloud paradigm: A survey on the reusing and approximation aspects2
Availability modeling in redundant OpenStack private clouds2
Energy allocation for activity recognition in wearable devices with kinetic energy harvesting2
ARTful: A model for user‐defined schedulers targeting multiple high‐performance computing runtime systems2
IoTSim‐Osmosis‐RES: Towards autonomic renewable energy‐aware osmotic computing2
Privacy and security constraints for code contributions2
Microservice‐driven privacy‐aware cross‐platform social relationship prediction based on sequential information2
Exploring the use of blockchain in resource‐constrained fog computing environments2
Three practical workflow schedulers for easy maximum parallelism2
Hierarchical fuzzy‐based Quality of Experience (QoE)‐aware application placement in fog nodes2
An industry survey on approaches, success factors, and barriers for technology transfer in software engineering2
Improving LSM‐trie performance by parallel search2
A model‐based framework for inter‐app Vulnerability analysis of Android applications2
Benchmarking and learning garbage collection delays for resource‐restricted graphical user interfaces2
ParTransgrid: A scalable parallel preprocessing tool for unstructured‐grid cell‐centered computational fluid dynamics applications2
A blockchain‐based privacy‐preserving advertising attribution architecture: Requirements, design, and a prototype implementation2
A large scale parallel fluid‐structure interaction computing platform for simulating structural responses to a detonation shock2
An optimal container update method for edge‐cloud collaboration2
Federated learning based multi‐task feature fusion framework for code expressive semantic extraction2
Decentralized identifier based illegal digital content distribution tracking system using the format‐preserving encryption algorithm2
Intelligent antiphishing framework to detect phishing scam: A hybrid classification approach2
Microservice reference architecture design: A multi‐case study2
Evaluating management and orchestration impact on closed‐loop orchestration delay2
A systematic mapping study of software performance research2
Distributed computation of the critical path from execution traces2
Dynamic code compression for JavaScript engine2
Efficient task offloading with swarm intelligence evolution for edge‐cloud collaboration in vehicular edge computing1
CONST: Continuous online NoSQL schema tuning1
Vectorized and performance‐portable quicksort1
DRS: A deep reinforcement learning enhanced Kubernetes scheduler for microservice‐based system1
A probabilistic modeling and evolutionary optimization approach for serverless workflow configuration1
Container‐based data‐intensive application scheduling in hybrid cloud‐edge collaborative environment1
Toward a novel engine for compiler optimization space exploration of big data workloads1
On the comprehension of application programming interface usability in game engines1
Proximate sharing of geo data using the credit‐considered mobile edge computing server switching control scheme1
1
Just‐in‐time defect prediction for software hunks1
DOMICO: Checking conformance between domain models and implementations1
1
A secure neural network‐based ranking approach for document searching in cloud data center1
New generation cloud computing1
0.024873971939087