Software-Practice & Experience

Papers
(The TQCC of Software-Practice & Experience is 4. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-04-01 to 2024-04-01.)
ArticleCitations
Quantum computing: A taxonomy, systematic review and future directions127
A review on the computation offloading approaches in mobile edge computing: A game‐theoretic perspective62
Senti‐eSystem: A sentiment‐based eSystem‐using hybridized fuzzy and deep neural network for measuring customer satisfaction58
Joint computation offloading and resource provisioning for edge‐cloud computing environment: A machine learning‐based approach57
NovidChain: Blockchain‐based privacy‐preserving platform for COVID‐19 test/vaccine certificates51
An Internet of Things‐enabled decision support system for circular economy business model44
An approach to forecast impact of Covid‐19 using supervised machine learning model44
FPFTS: A joint fuzzy particle swarm optimization mobility‐aware approach to fog task scheduling algorithm for Internet of Things devices44
An efficient radix trie‐based semantic visual indexing model for large‐scale image retrieval in cloud environment42
Integrated model‐driven engineering of blockchain applications for business processes and asset management35
IoT‐fog‐cloud based architecture for smart systems: Prototypes of autism and COVID‐19 monitoring systems34
Software effort estimation accuracy prediction of machine learning techniques: A systematic performance evaluation31
A graph‐based convolutional neural network stock price prediction with leading indicators30
Spatiotemporal‐based sentiment analysis on tweets for risk assessment of event using deep learning approach27
PARCIV: Recognizing physical activities having complex interclass variations using semantic data of smartphone26
Microservice transition and its granularity problem: A systematic mapping study26
Software reuse analytics using integrated random forest and gradient boosting machine learning algorithm25
Function delivery network: Extending serverless computing for heterogeneous platforms25
An empirical comparison of commercial and open‐source web vulnerability scanners23
Advanced data integration in banking, financial, and insurance software in the age of COVID‐1922
EFFORT: Energy efficient framework for offload communication in mobile cloud computing22
Impact of etcd deployment on Kubernetes, Istio, and application performance21
Design and evaluation of a scalable Internet of Things backend for smart ports20
An autonomous IoT service placement methodology in fog computing20
A semantic and social‐based collaborative recommendation of friends in social networks19
Comparative study of support vector machines and random forests machine learning algorithms on credit operation19
PDMA: Probabilistic service migration approach for delay‐aware and mobility‐aware mobile edge computing19
SafeMan: A unified framework to manage cybersecurity and safety in manufacturing industry19
Practical and secure multifactor authentication protocol for autonomous vehicles in 5G18
Container lifecycle‐aware scheduling for serverless computing17
Data dimensionality reduction techniques for Industry 4.0: Research results, challenges, and future research directions17
Energy‐Saving Multisensor Data Sampling and Fusion with Decision‐Making for Monitoring Health Risk Using WBSNs17
AuctionWhisk: Using an auction‐inspired approach for function placement in serverless fog platforms17
From zero to fog: Efficient engineering of fog‐based Internet of Things applications16
Cybersecurity protection on in‐vehicle networks for distributed automotive cyber‐physical systems: State‐of‐the‐art and future challenges16
An energy‐aware virtual machines consolidation method for cloud computing: Simulation and verification15
Service offloading oriented edge server placement in smart farming15
A Blockchain‐based Cyber Attack Detection Scheme for Decentralized Internet of Things using Software‐Defined Network15
RESCUE: Enabling green healthcare services using integrated IoT‐edge‐fog‐cloud computing environments13
Finite‐state model extraction and visualization from Java program execution13
The μTOSCA toolchain: Mining, analyzing, and refactoring microservice‐based architectures13
Dual‐grained representation for hand, foot, and mouth disease prediction within public health cyber‐physical systems13
Exploring reliable edge‐cloud computing for service latency optimization in sustainable cyber‐physical systems13
Component‐aware orchestration of cloud‐based enterprise applications, from TOSCA to Docker and Kubernetes13
CREW: Cost and Reliability aware Eagle‐Whale optimiser for service placement in Fog13
Server configuration optimization in mobile edge computing: A cost‐performance tradeoff perspective13
Toward an autonomic approach for Internet of Things service placement using gray wolf optimization in the fog computing environment12
Edge‐adaptable serverless acceleration for machine learning Internet of Things applications12
KubCG: A dynamic Kubernetes scheduler for heterogeneous clusters12
Code‐level model checking in the software development workflow at Amazon Web Services12
Applying artificial bee colony algorithm to the multidepot vehicle routing problem12
Root causing, detecting, and fixing flaky tests: State of the art and future roadmap12
Notebook‐as‐a‐VRE (NaaVRE): From private notebooks to a collaborative cloud virtual research environment12
Autonomic resource provisioning for multilayer cloud applications with K‐nearest neighbor resource scaling and priority‐based resource allocation11
What factors influence the lifetime of pull requests?11
Migrating production monolithic systems to microservices using aspect oriented programming11
Timing isolation and improved scheduling of deep neural networks for real‐time systems11
Software system to predict the infection in COVID‐19 patients using deep learning and web of things11
Human microservices: A framework for turning humans into service providers11
A decade of research in fog computing: Relevance, challenges, and future directions10
Control and data acquisition software of the high‐energy particle detector on board the China Seismo‐Electromagnetic Satellite space mission10
Keywords‐driven web APIs group recommendation for automatic app service creation process10
Vocabulary and time based bug‐assignment: A recommender system for open‐source projects10
Journey from cloud of things to fog of things: Survey, new trends, and research directions10
A cache‐based approach toward improved scheduling in fog computing10
HEART: Unrelated parallel machines problem with precedence constraints for task scheduling in cloud computing using heuristic and meta‐heuristic algorithms10
A cloud‐based integration platform for enterprise application integration: A Model‐Driven Engineering approach9
Systematic scalability analysis for microservices granularity adaptation design decisions9
Valuating requirements arguments in the online user's forum for requirements decision‐making: The CrowdRE‐VArg framework9
STOPPAGE: Spatio‐temporal data driven cloud‐fog‐edge computing framework for pandemic monitoring and management9
A flexible approach for virtual machine selection in cloud data centers with AHP9
Android malware detection using network traffic based on sequential deep learning models9
Practical dynamic reconstruction of control flow graphs8
Data fusion analysis for attention‐deficit hyperactivity disorder emotion recognition with thermal image and Internet of Things devices8
A lightweight virtualization model to enable edge computing in deeply embedded systems8
Post‐quantum cryptography techniques for secure communication in resource‐constrained Internet of Things devices: A comprehensive survey8
Profiling and controlling I/O‐related memory contention in COTS heterogeneous platforms8
NAS Parallel Benchmarks with CUDA and beyond8
BigDataSDNSim: A simulator for analyzing big data applications in software‐defined cloud data centers8
Software fault prediction using Whale algorithm with genetics algorithm8
SQVDT: A scalable quantitative vulnerability detection technique for source code security assessment8
A service graph based extraction of microservices from monolith services of service‐oriented architecture8
Real time flood disaster monitoring based on energy efficient ensemble clustering mechanism in wireless sensor network8
A community‐based hierarchical user authentication scheme for Industry 4.08
Providing high‐level self‐adaptive abstractions for stream parallelism on multicores8
Effective approaches to combining lexical and syntactical information for code summarization8
Global outliers detection in wireless sensor networks: A novel approach integrating time‐series analysis, entropy, and random forest‐based classification.8
Proactive content caching in edge computing environment: A review8
An autonomous model for self‐optimizing virtual machine selection by learning automata in cloud environment8
Retracted: An unmanned aerial vehicles navigation system on the basis of pattern recognition applications—Review of implementation options and prospects for development8
QuantumPath: A quantum software development platform7
A tool for the semantic annotation, validation and optimization of business process models7
Unit of measurement libraries, their popularity and suitability7
Reformulation of the performance portability metric7
Predicting just‐in‐time software defects to reduce post‐release quality costs in the maritime industry7
DevOps benefits: A systematic literature review7
Resource management of IoT edge devices: Challenges, techniques, and solutions7
On the (un‐)adoption of JavaScript front‐end frameworks6
Optimizing checkpoint‐based fault‐tolerance in distributed stream processing systems: Theory to practice6
Evaluating system architectures for driving range estimation and charge planning for electric vehicles6
A scalable framework for healthcare monitoring application using the Internet of Medical Things6
Sensei: Enforcing secure coding guidelines in the integrated development environment6
Using Ginkgo's memory accessor for improving the accuracy of memory‐bound low precision BLAS6
Equivalent mutant identification using hybrid wavelet convolutional rain optimization6
Network traffic prediction method based on echo state network with adaptive reservoir6
A framework for microservices synchronization6
Engineering faster sorters for small sets of items6
Managing data replication and distribution in the fog with FReD6
Blockchain for Health IoT: A privacy‐preserving data sharing system6
Autonomic rejuvenation of cloud applications as a countermeasure to software anomalies6
Standards‐based modeling and deployment of serverless function orchestrations using BPMN and TOSCA6
Edge intelligence based digital twins for internet of autonomous unmanned vehicles6
Validating UTF‐8 in less than one instruction per byte5
Availability analysis of design configurations to compose virtual performance‐optimized data center systems in next‐generation cloud data centers5
Standard versus uniform binary search and their variants in learned static indexing: The case of the searching on sorted data benchmarking software platform5
A metaheuristic‐based data replica placement approach for data‐intensive IoT applications in the fog computing environment5
A systematic gray literature review: The technologies and concerns of microservice application programming interfaces5
ThingsMigrate: Platform‐independent migration of stateful JavaScript Internet of Things applications5
Synthesizing secure software development activities for linear and agile lifecycle models5
Software assistants in software engineering: A systematic mapping study5
Configurable three‐way model merging5
Reusability affecting factors and software metrics for reusability: A systematic literature review5
Scaling scrum with a customized nexus framework: A report from a joint industry‐academia research project5
APISonar: Mining API usage examples5
Author classification using transfer learning and predicting stars in co‐author networks5
Drug investigation tool: Identifying the effect of drug on cell image by using improved correlation5
A comprehensive survey on nature‐inspired algorithms and their applications in edge computing: Challenges and future directions5
Computationally easy, spectrally good multipliers for congruential pseudorandom number generators5
Number parsing at a gigabyte per second5
Usability implications in software architecture: The case study of a mobile app5
The human in model‐driven engineering loop: A case study on integrating handwritten code in model‐driven engineering repositories5
On the relative value of imbalanced learning for code smell detection5
Bug detection in Java code: An extensive evaluation of static analysis tools using Juliet Test Suites4
Practical trade‐offs for the prefix‐sum problem4
xDEVS: A toolkit for interoperable modeling and simulation of formal discrete event systems4
Towards efficient federated learning‐based scheme in medical cyber‐physical systems for distributed data4
Analyzing spatial analytics systems based on Hadoop and Spark: A user perspective4
An efficient Hadoop‐based brain tumor detection framework using big data analytic4
Multiuser collaborative illustration and visualization for volumetric scientific data4
A procedural and flexible approach for specification, modeling, definition, and analysis for self‐adaptive systems4
Message‐sensing classified transmission scheme based on mobile edge computing in the Internet of Vehicles4
Integrated machine learning with semantic web for open government data recommendation based on cloud computing4
Recommending software features to designers: From the perspective of users4
OntoSuSD: Software engineering approaches integration ontology for sustainable software development4
Trilateration‐based indoor localization engineering technique for visible light communication system4
Leveraging machine learning for software redocumentation—A comprehensive comparison of methods in practice4
Constraint‐aware and multi‐objective optimization for micro‐service composition in mobile edge computing4
Charging stations‐oriented electric vehicle charging strategy based on battery characteristics4
On the synthesis of metadata tags for HTML files4
Energy‐efficiency and sustainability in new generation cloud computing: A vision and directions for integrated management of data centre resources and workloads4
Detecting functional and security‐related issues in smart contracts: A systematic literature review4
RIFLING: A reinforcement learning‐based GPU scheduler for deep learning research and development platforms4
Better Scrum through Essence4
Deploying IoT services on the fog infrastructure: A graph partitioning‐based approach4
MyNeutronDAQ: A general program for data acquisition of neutron scattering spectrometers at China Mianyang Research Reactor and on‐line data‐analysis4
0.023801803588867