301 - 400 out of 2,563Page size: 100
  1. An Extensive Catalog of Operators for the Coupled Evolution of Metamodels and Models

    Herrmannsdoerfer, M., Vermolen, S. D. & Wachsmuth, G. H. 2010 Proceedings of the Third International Conference on Software Language Engineering, SLE 2010. van den Brand, M., Malloy, B. & Staab, S. (eds.). Berlin: Springer, p. -

    Research output: Scientific - peer-reviewConference contribution

  2. An ICT Design Approach for Privacy Protection of Contexual Information

    Ali Eldin, A. M. T. 2003 Proceedings. Klagenfurt: Velden, p. 1-11 11 p.

    Research output: Scientific - peer-reviewConference contribution

  3. An ICT Design Approach for Privacy Protection of Contexual Information.

    Ali Eldin, A. M. T. 2003 Proceedings. Klagenfurt: Velden, p. -

    Research output: Scientific - peer-reviewConference contribution

  4. An Industrial Case Study in Reconstructing Requirements Views

    Lormans, M., van Deursen, A. & Gross, H. G. 2008 In : Empirical Software Engineering. 13

    Research output: Scientific - peer-reviewArticle

  5. An Industrial Evaluation of Technological Support for Overhearing Conversations in Global Software Engineering

    Dullemond, K. & van Gameren, B. J. A. 2012 Global Software Engineering (ICGSE), 2012 7th IEEE International Conference on. Carmel, E. & van Solingen, R. (eds.). IEEE Society, p. 65-74 10 p.

    Research output: Scientific - peer-reviewConference contribution

  6. An Integrated Crosscutting Concern Migration Strategy and its Application to JHotDraw

    Marin, A. M., Moonen, L. M. F. & van Deursen, A. 2007 Proceedings Seventh International Working Conference on Source Code Analysis and Manipulation (SCAM). Korel, B. & Godfrey, M. W. (eds.). s.l.: IEEE Computer Society, p. 101-110 10 p.

    Research output: Scientific - peer-reviewConference contribution

  7. An Integrated System to Manage Crosscutting Concerns in Source Code

    Marin, A. M. 2008

    Research output: ScientificDissertation (TU Delft)

  8. An Inter-Organizational System Approach For Strategic Supply Network Modelling

    Muessigmann, N., Albani, A. & Turowski, K. 2006 Proceedings of the Seventh Annual Global Information Technology Management World Conference.. Palvia, P., Pinjani, P. & Baqir, M. N. (eds.). Global Information Technology Management Association (GITMA), p. 88-90 3 p.

    Research output: Scientific - peer-reviewConference contribution

  9. An Introduction to Human Computation and Games with a Purpose

    Bozzon, A. & Galli, L. 1 Jul 2013 Web Engineering - 13th International Conference, ICWE 2013. S. (ed.). Vol. 7977, p. 514-517 4 p. (Lecture Notes in Computer Science)

    Research output: Scientific - peer-reviewConference contribution

  10. An Observation-based Model for Fault Localization

    Abreu, R. F., Zoeteweij, P. & van Gemund, A. J. C. 2008 6th Workshop on Dynamic Analysis (WODA'08). Liblit, B. & Rountev, A. (eds.). New York, USA: Association for Computing Machinery (ACM), p. 64-70 7 p.

    Research output: Scientific - peer-reviewConference contribution

  11. An Overview of Cooperative and Competitive Multiagent Learning

    t Hoen, P. J., Tuyls, K., Panait, L., Luke, S. & La Poutré, J. A. 2006 Learning and Adaption in Multi-Agent Systems, First International Workshop, LAMAS 2005, Revised Selected Papers. Tuyls, K., Hoen, P. J., Verbeeck, K. & Sen, S. (eds.). Springer, p. 1-46 46 p.

    Research output: Scientific - peer-reviewConference contribution

  12. An XML structured representation for nested-parallel programming languages

    González-Escribano, A. & van Gemund, A. J. C. 2004 CPC 2004 Proceedings of the Eleventh international workshop on compilers for parallel computers. Gerndt, M. & Kereku, E. (eds.). Herzogenrath: Shaker Verlag, p. 149-160 12 p.

    Research output: Scientific - peer-reviewConference contribution

  13. An adaptive energy-efficient MAC protocol for wireless sensor networks

    van Dam, T. & Langendoen, K. G. 2003 SenSys'03; proceedings of the first international conference on embedded networked sensor systems. s.n. (ed.). New York: Association for Computing Machinery (ACM), p. 171-180 10 p.

    Research output: Scientific - peer-reviewConference contribution

  14. An algebraic approach to petri nets - based representation of complex discrete systems

    Bobeanu, C. V. & Kerckhoffs, E. J. H. 2001 ESS'2001. N Giambiasi & C Frydman (eds.). Ghent: SCS Europe BVBA, p. 959-964 6 p.

    Research output: Scientific - peer-reviewConference contribution

  15. An algorithm for replanning

    van der Krogt, R. P. J., Bos, A., de Weerdt, M. M. & Witteveen, C. 2000 Proceedings of the twelfth Belgium-Nethelands artificial intelligence conference. A Bosch, V. D. & H Weigand (eds.). Kaatsheuvel: BNAIC, p. 21-28 8 p.

    Research output: Scientific - peer-reviewConference contribution

  16. An analysis of arithmetic constraints on integer intervals

    Apt, K. R. & Zoeteweij, P. 2007 In : Constraints. 12, p. 429-468 40 p.

    Research output: Scientific - peer-reviewArticle

  17. An analysis of implicit social networks in multiplayer online games

    Iosup, A., van de Bovenkamp, R., Shen, S., Jia, A. L. & Kuipers, F. A. 2014 In : IEEE Internet Computing. special issue on Networked Games

    Research output: Scientific - peer-reviewArticle

  18. An analysis of multi-agent diagnosis

    Roos, N., ten Teije, A., Bos, A. & Witteveen, C. 2002 Bringing people and agents together; Autonomous agents & multiagent systems, Part 1. Castelfranchi, C. & Johnson, W. L. (eds.). New York: Association for Computing Machinery (ACM), p. 986-987 2 p.

    Research output: Scientific - peer-reviewConference contribution

  19. An analysis of online match-based games

    Guo, Y., Shen, S., Visser, O. W. & Iosup, A. 2012 Proceedings ICT.OPEN 2012. Utrecht, The Netherlands: STW, p. 123-128 6 p.

    Research output: Scientific - peer-reviewConference contribution

  20. An analysis of online match-based games

    Guo, Y., Shen, S., Visser, O. W. & Iosup, A. 2012 Proceedings of the 2012 IEEE International Symposium on Haptic Audiovisual Environments and Games. Saddik, A. E. & Steinbach, E. (eds.). Piscatawy, NJ, USA: IEEE Society, p. 134-139 6 p.

    Research output: Scientific - peer-reviewConference contribution

  21. An analysis of the BBO fans online social gaming community

    Posea, V., Balint, M., Dimitriu, A. & Iosup, A. 2010 9th Roedunet International Conference (RoEduNet). Brad, R. (ed.). Los Alamitos: IEEE Society, p. 218-223 6 p.

    Research output: Scientific - peer-reviewConference contribution

  22. An anomaly analysis framework for database systems

    Vavilis, S., Egner, A. I., Petković, M. & Zannone, N. 20 Jul 2015 In : Computers and Security. 53, p. 156-173 18 p.

    Research output: Scientific - peer-reviewArticle

  23. An application-centric evaluation of OpenCL on multi-core CPUs

    Shen Jie, S., Fang, J., Sips, H. J. & Varbanescu, A. L. 2013 In : Parallel Computing. 39, 12, p. 834-850 17 p.

    Research output: Scientific - peer-reviewArticle

  24. An approach to a scalable wide-area web service

    Kuz, I. T. 2003 s.l.: s.n.. 222 p.

    Research output: ScientificDissertation (TU Delft)

  25. An approach to aspect refactoring based on crosscutting concern types

    Marin, A. M., Moonen, L. M. F. & van Deursen, A. 2005 Proceedings of the ICSE 2005 first international workshop on modeling and analysis of concerns in software. s.n. (ed.). New York (NY) USA: Association for Computing Machinery (ACM), p. 1-5 5 p.

    Research output: Scientific - peer-reviewConference contribution

  26. An approach to evaluate real-time software architectures for safety-critical systems

    van Katwijk, J., Sandén, B. & Zalewski, J. 2003 Critical systems development with UML - Proceedings of the UML'03 workshop. Jürjens, J., Rumpe, B., France, R. & Fernandez, E. B. (eds.). München: Technische Universität München, p. 121-128 8 p.

    Research output: ScientificConference contribution

  27. An approach towards formal verification of object-oriented real-time systems

    de Rooij, R. C. M. & van Katwijk, J. 1999 RTCSA'99: proceedings. Los Alamitos: IEEE Computer Society, p. 474-483 10 p.

    Research output: Scientific - peer-reviewConference contribution

  28. An approximation algorithm for a logistic planning problem

    Valk, J. M., Bos, A., Rogier, J., Tonino, J. F. M. & Witteveen, C. 2000 Proceedings of the twelfth Belgium-Nethelands artificial intelligence conference. A Bosch, V. D. & H Weigand (eds.). Kaatsheuvel: BNAIC, p. 251-259 9 p.

    Research output: Scientific - peer-reviewConference contribution

  29. An architecture for two-player games

    Meijer, A. B. & Koppelaar, H. 2002 Building blocks for effective telematics development and evaluation. Verbraeck, A. & Dahayanake, A. (eds.). Delft: Delft University of Technology, p. 59-68 10 p.

    Research output: ScientificChapter

  30. An audio-visual corpus for multimodal speech recognition in Dutch language

    Wojdel, J., Wiggers, P. & Rothkrantz, L. J. M. 2002 ICSLP - 2002 7th International Conference on Spoken Language Processing. Hansen, J. H. L. & Pellom, B. (eds.). s.l.: Causal Productions, p. 1917-1920 4 p.

    Research output: ScientificConference contribution

  31. An authorization service for collaborative situation awareness

    Egner, A. I., Luu, D., Den Hartog, J. & Zannone, N. 9 Mar 2016 CODASPY 2016 - Proceedings of the 6th ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery (ACM), p. 136-138 3 p.

    Research output: Scientific - peer-reviewConference contribution

  32. An electronic archive for academic communities

    Dekker, R., Dürr, E. H., Slabbertje, M. & van der Meer, K. 2002 Proceedings of the 2nd International Workshop on new developments in digital libraries. Isaias, P. (ed.). Setubal, Portugal: ICEIS Press, p. 1-11 11 p.

    Research output: ScientificConference contribution

  33. An empirical research design for analyzing information diversity in Twitter for Dutch and Turkish users

    Bozdag, V. E. & Gao, Q. 2013 The possibilities of ethical ICT - Proceedings ETHICOMP 2013. Ward Bynum, T., Fleishman, W., Gerdes, A., Møldrup Nielsen, G. & Rogerson, S. (eds.). Odense, Denmark: University of Southern Denmark, p. 369-380 12 p.

    Research output: Scientific - peer-reviewConference contribution

  34. An epidemic-based P2P recommender system

    Yang, J., Clements, M., Pouwelse, J. A., de Vries, A. P. & Reinders, M. J. T. 2007 Proceedings of the 1st workshop on Large-Scale Distributed Systems for Information Retrieval. Kraaij, W., de Vries, A. P., Clarke, C. L. A., Fuhr, N. & Kando, N. (eds.). New York: Association for Computing Machinery (ACM), p. 11-15 5 p.

    Research output: Scientific - peer-reviewConference contribution

  35. An evaluation of business solutions in manufacturing enterprises

    Asnar, Y., Giorgini, P., Ciancarini, P., Moretti, R., Sebastianis, M. & Zannone, N. 2008 In : International Journal of Business Intelligence and Data Mining. 3, 3, p. 305-329 25 p.

    Research output: Scientific - peer-reviewArticle

  36. An evaluation of clone detection techniques for identifying crosscutting concerns

    Bruntink, M., van Deursen, A., Tourwe, T. & van Engelen, R. 2004 ICSM 2004; Proceedings of the 20th IEEE international conference on software maintenance. Los Alamitos, CA. USA: IEEE Computer Society, p. 200-209 10 p.

    Research output: Scientific - peer-reviewConference contribution

  37. An evaluation of processor co-allocation for different system configurations and job structures

    Bucur, A. I. D. & Epema, D. H. J. 2002 Proceedings 14th symposium on computer architecture and high performance computing. Ferreira De Souza, A., de Amorim, C. L. & Costa Reis Jr, N. (eds.). Los Alamitos, CA, USA: IEEE Society, p. 195-203 9 p.

    Research output: Scientific - peer-reviewConference contribution

  38. An evaluation of the close-to-files processor and data co-allocation policy in multiclusters

    Mohamed, H. H. & Epema, D. H. J. 2004 Proceedings of the 2004 IEEE International conference on cluster computing. Piscataway: IEEE Society, p. 287-298 12 p.

    Research output: Scientific - peer-reviewConference contribution

  39. An event-based task framework for disaster planning and decision support

    ter Mors, A. W., Valk, J. M. & Witteveen, C. 2005 Proceedings of ISCRAM2005 - Second international ISCRAM conference. van de Walle, B. & Carle, B. (eds.). Brussels, Belgium: KVAB, p. 151-153 3 p.

    Research output: Scientific - peer-reviewConference contribution

  40. An expert system for multiple emotional classification of facial expressions

    Pantic, M. & Rothkrantz, L. J. M. 1999 Proceedings. N Bourbakis & DC Martin (eds.). Los Alamitos: IEEE Society, p. 113-120 8 p.

    Research output: Scientific - peer-reviewConference contribution

  41. An expert system for recognition of facial actions and their intensity

    Pantic, M. & Rothkrantz, L. J. M. 2000 AAAI-2000 - IAAI-2000: proceedings. Menlo Park: AAAI , p. 1026-1033 8 p.

    Research output: Scientific - peer-reviewConference contribution

  42. An exploratory study on functional size measurement based on code

    Huijgens, H., Bruntink, M., Van Deursen, A., Van Der Storm, T. & Vogelezang, F. 14 May 2016 Proceedings - International Conference on Software and System Process, ICSSP 2016. Association for Computing Machinery (ACM), p. 56-65 10 p. 2904360

    Research output: Scientific - peer-reviewConference contribution

  43. An exploratory study on the effects of perceived value and stakeholder satisfaction on software projects

    Huijgens, H., Van Deursen, A. & Van Solingen, R. 1 Jun 2016 Proceedings of the 20th International Conference on Evaluation and Assessment in Software Engineering, EASE 2016. Association for Computing Machinery (ACM), a31

    Research output: Scientific - peer-reviewConference contribution

  44. An implementation of the GMDH on a hypercube parallel computer and network of workstations

    Water, P. R. & Kerckhoffs, E. J. H. 2000 PDPTA'2000: proceedings, vol. III. HR Arabnia (ed.). S.l.: CSREA, p. 1651-1657 7 p.

    Research output: Scientific - peer-reviewConference contribution

  45. An improved Universal Virtual Computer approach for long-term preservation of digital objects

    Kol, N. J. C., van Diessen, R. J. & van der Meer, K. 2006 In : Information Services and Use. 26, p. 283-291 9 p.

    Research output: Scientific - peer-reviewArticle

  46. An improved system approach towards future cochlear implants

    Lawand, N. S., Ngamkham, W., Nazarian, G., French, P. J., Serdijn, W. A., Gaydadjiev, G. N., Briaire, J. J. & Frijns, J. H. M. 2013 Proceedings - 35th Annual International Conference of the IEEE Engineering in Medicine and Biology Society in conjuction with the 52nd Annual Conference of Japanese Society for Medical and Biological Engineering (JSMBE). Wheeler, B. (ed.). Piscataway, NJ, USA: IEEE Society, p. 5163-5166 4 p.

    Research output: Scientific - peer-reviewConference contribution

  47. An initial experiment in reverse engineering aspects

    Bruntink, M., van Deursen, A. & Tourwe, T. 2004 Proceedings of the 11th Working Conference on Reverse Engineering (WCRE). Piscataway: IEEE Society, p. 306-307 2 p.

    Research output: ProfessionalConference contribution

  48. An integrated annotation and compilation framework for task anddata parallel programming in Java

    Sips, H. J. & van Reeuwijk, C. 2004 Parallel computing: Software technology, algorithms, architectures and applications. Joubert, G. R., Nagel, W. E., Peters, F. J. & Walter, W. V. (eds.). Amsterdam: Elsevier, p. 111-118 8 p.

    Research output: Scientific - peer-reviewChapter

  49. An integrated approach for investigation, modeling and simulation of an organization

    Barjis, J., Dietz, J. L. G. & Schouten, H. 1999 Proceedings. S.l.: s.n., p. 6-17 12 p.

    Research output: Scientific - peer-reviewConference contribution

  50. An integrated component-based approach to enterprise system specification and development

    Stojanovic, Z., Dahanayake, A. N. W. & Sol, H. G. 2001 Proceedings ICEIS 2001, Vol. 2. P Miranda & ... [et Al] (eds.). Setúbal: ICEIS Press, p. 667-672 6 p.

    Research output: Scientific - peer-reviewConference contribution

  51. An integrated crosscutting concern migration strategy and its semi-automated application to JHotDraw

    Marin, A. M., van Deursen, A., Moonen, L. M. F. & van der Rijst, R. 2009 In : Automated Software Engineering. 26, 2, p. 323-356 34 p.

    Research output: Scientific - peer-reviewArticle

  52. An introduction to enterprise engineering

    Dietz, J. L. G., Albani, A. & Barjis, J. 2009 Advances in enterprise engineering III. Albani, A., Barjis, J. & Dietz, J. L. G. (eds.). Berlin, Germany: Springer Verlag, p. 7-14 200 p.

    Research output: ScientificChapter

  53. An object-oriented implementation of the group method of data handling (GMDH) for time-series based relationship detection

    Water, P. R. & Kerckhoffs, E. J. H. 1999 MESM'99: proceedings. M Al-Akaidi & B Honary (eds.). Delft: Society for Computer Simulation International, p. 83-89 7 p.

    Research output: Scientific - peer-reviewConference contribution

  54. An ontology for secure socio-technical systems

    Massacci, F., Mylopoulos, J. & Zannone, N. 2007 Handbook of Ontologies for Business Interaction. IGI Global, p. 188-206 19 p.

    Research output: Scientific - peer-reviewChapter

  55. An ontology for the ¿-theory of enterprise engineering

    Dietz, J. L. G., Aveiro, D., Pombinho, J. & Hoogervorst, J. A. P. 2014 Formal ontology in information systems,. Garbacz, P. & Kutz, O. (eds.). Amsterdam: IOS Press, p. 386-395 10 p. (Frontiers in Artificial Intelligence and Applications; vol. 267)

    Research output: Scientific - peer-reviewConference contribution

  56. An operational semantics for the goal life-cycle in BDI agents

    Harland, J., Morley, D. N., Thangarajah, J. & Yorke-Smith, N. Jul 2014 In : Autonomous Agents and Multi-Agent Systems. 28, 4, p. 682-719 38 p.

    Research output: Scientific - peer-reviewArticle

  57. An unified annotation model for task and data parallel programming in Java

    Sips, H. J. & van Reeuwijk, C. 2004 CPC 2004 Proceedings of the Eleventh international workshop on compilers for parallel computers. Gerndt, M. & Kereku, E. (eds.). Herzogenrath: Shaker Verlag, p. 99-110 12 p.

    Research output: Scientific - peer-reviewConference contribution

  58. Analysing IEEE 802.15.3c protocol in Fi-Wi hybrid networks

    Venkatesha Prasad, R. R., Quang, B., Chandra, K., An, X., Niemegeers, I. G. M. M. & Nguyen, H. 2013 Proceedings 2013 IEEE 10th Consumer Communications and Networking Conference (CCNC 2013). s.n. (ed.). Piscataway, NJ, USA: IEEE Society, p. 749-752 4 p.

    Research output: Scientific - peer-reviewConference contribution

  59. Analysing the Linux kernel feature model changes using FMDiff

    Dintzner, N., van Deursen, A. & Pinzger, M. Feb 2017 In : Software and Systems Modeling. 16, 1, p. 55-76

    Research output: Scientific - peer-reviewArticle

  60. Analysis and Modeling of Time-Correlated Failures in Large-Scale Distributed Systems

    Yigitbasi, M. N., Gallet, M., Kondo, D., Iosup, A. & Epema, D. H. J. 2010 Proc. of the 11th IEEE/ACM International Conference on Grid Computing (Grid 2010). Chue Hong et al, N. (ed.). Los Alamitos, CA, USA: IEEE Society, p. 65-72 8 p.

    Research output: Scientific - peer-reviewConference contribution

  61. Analysis and Testing of Ajax-based Single-Page Web Applications

    Mesbah, A. 2009 Delft. 208 p.

    Research output: ScientificDissertation (TU Delft)

  62. Analysis and Transformation of Idiomatic Crosscutting Concerns in Legacy Software Systems

    Bruntink, M. 2007 Proceedings of the IEEE International Conference on Software Maintenance (ICSM). IEEE Computer Society, p. 499-500 2 p.

    Research output: Scientific - peer-reviewConference contribution

  63. Analysis and simulation modeling of glycolitic pathway using Patri net

    Barjis, I., Barjis, I. & Barjis, J. 2001 Proceedings EUROSIM 2001. AW Heemink & ... [et Al] (eds.). Delft: Technische Universiteit Delft, p. 1-6 6 p.

    Research output: Scientific - peer-reviewConference contribution

  64. Analysis of XACML policies with SMT

    Turkmen, F., Den Hartog, J., Ranise, S. & Zannone, N. 2015 Principles of Security and Trust- 4th International Conference, POST 2015 held as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015, Proceedings. Springer Verlag, Vol. 9036, p. 115-134 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9036)

    Research output: Scientific - peer-reviewConference contribution

  65. Analysis of a shared-memory multiprocessor via a novel queuing model

    Reijns, G. L. & van Gemund, A. J. C. 1999 In : Journal of Systems Architecture. 45, p. 1189-1193 5 p.

    Research output: Scientific - peer-reviewArticle

  66. Analysis of a system of telecenters as a distributed network

    Shishkov, B. B. & Barjis, J. 2000 SAER'2000 proceedings. Sofia: SAER Forum Group, p. 108-113 6 p.

    Research output: ScientificConference contribution

  67. Analysis of data communication networks for systems of telecenters

    Barjis, J., Shishkov, B. B. & Dietz, J. L. G. 2000 SCI 2000 proceedings, vol. IV: Communication systems and networks. B Sanchez & T Watanabe (eds.). Orlando: IIIS, p. 219-224 6 p.

    Research output: ScientificConference contribution

  68. Analysis of facial expressions based on silhouettes

    Wojdel, J. C., Wojdel, A. W. & Rothkrantz, L. J. M. 1999 ASCI'99: proceedings. M Boasson, JA Kaandorp, JFM Tonino & MG Vosselman (eds.). Delft: Advanced School for Computing and Imaging, p. 199-206 8 p.

    Research output: Scientific - peer-reviewConference contribution

  69. Analysis of facial expressions using silhouettes

    Rothkrantz, L. J. M., Wojdel, J. C. & Wojdel, A. W. 1999 Euromedia'99: featuring webtec-mediatec,comtec-aptec. Proceedings. W Hahn, E Walther-Klaus & J Knop (eds.). Delft: Society for Computer Simulation International, p. 98-105 8 p.

    Research output: Scientific - peer-reviewConference contribution

  70. Analysis of service diagnosis improvement through increased monitoring granularity

    Chen, C., Gross, H. G. & Zaidman, A. E. Jun 2017 In : Software Quality Journal. 25, 2, p. 437-471 35 p.

    Research output: Scientific - peer-reviewArticle

  71. Analysis of suitability, appropriateness and adequacy of use cases combined with activity diagram for business systems modeling

    Shishkov, B. B. & Dietz, J. L. G. 2001 Proceedings ICEIS 2001, Vol. 2. P Miranda & ... [et Al] (eds.). Setúbal: ICEIS Press, p. 854-858 5 p.

    Research output: Scientific - peer-reviewConference contribution

  72. Analytical model for mesh-based P2PVoD

    Lu, Y., Mol, J. J. D., Kuipers, F. A. & Van Mieghem, P. F. A. 2008 Proceedings Tenth IEEE International Symposium on Multimedia. s.n. (ed.). Los Alamitos, CA: IEEE Society, p. 364-371 8 p.

    Research output: Scientific - peer-reviewConference contribution

  73. Analytische eigenschappen datawarehouse liggen vast in sterren of sneeuwvlokken

    Gerhardt-Hackl, W. 2000 In : Beyond. 5, 2, p. 12-17 6 p.

    Research output: ProfessionalArticle

  74. Analyzing BitTorrent: Three lessons from one-peer level view

    Iosup, A., Garbacki, P. J., Pouwelse, J. A. & Epema, D. H. J. 2005 ASCI 2005 Proceedings of the eleventh annual conference of the Advanced School for Computing and Imaging. Kröse, B. J. A., Bos, H. J., Hendriks, E. A. & Heijnsdijk, J. W. J. (eds.). Delft: ASCI, p. 96-103 8 p.

    Research output: Scientific - peer-reviewConference contribution

  75. Analyzing Cascading Failures in Power Grids under the AC and DC Power Flow Models

    Cetinay-Iyicil, H., Soltan, S., Kuipers, F., Zussman, G. & Van Mieghem, P. 2017 35th International Symposium on Computer Performance, Modeling, Measurements and Evaluation (IFIP Performance 2017). IFIP

    Research output: Scientific - peer-reviewConference contribution

  76. Analyzing Cross-System User Modeling on the Social Web

    Abel, F., Cardoso de Araujo, S. F., Gao, Q. & Houben, G. J. P. M. 2011 Proceedings of the Eleventh International Conference on Web Engineering (ICWE). Auer, S., Diaz, O. & Papadopoulos, G. A. (eds.). Berlin: Springer, p. 28-43 16 p. (Lecture Notes in Computer Science; vol. 6757)

    Research output: Scientific - peer-reviewConference contribution

  77. Analyzing MAC Protocols for Low Data-Rate Applications

    Langendoen, K. G. & Meier, A. 2010 In : ACM Transactions on Sensor Networks. 7, 2, p. 1-40 40 p.

    Research output: Scientific - peer-reviewArticle

  78. Analyzing Temporal Dynamics in Twitter Profiles for Personalized Recommendations in the Social Web

    Abel, F., Gao, Q., Houben, G. J. P. M. & Tao, K. 2011 Proceedings of ACM WebSci '11, 3rd International Conference on Web Science. Staab, S., Sure, Y., Wolf, C. & Walsh, G. (eds.). New York, USA: Association for Computing Machinery (ACM), p. 1-8 8 p.

    Research output: Scientific - peer-reviewConference contribution

  79. Analyzing User Behavior across Social Sharing Environments

    de Meo, P., ferrara, E., Abel, F., Aroyo, L. & Houben, G-J. 2013 In : ACM Transactions on Intelligent Systems and Technology. 5, 1, p. 14:1-14:31 31 p., 14

    Research output: Scientific - peer-reviewArticle

  80. Analyzing User Modeling on Twitter for Personalized News Recommendations

    Abel, F., Gao, Q., Houben, G. J. P. M. & Tao, K. 2011 User Modeling, Adaptation and Personalization. Konstan, J., Conejo, R. & Marzo, J. L. (eds.). Berlin: Springer, p. 1-12 12 p. (Lecture Notes in Computer Science; vol. 6787)

    Research output: Scientific - peer-reviewConference contribution

  81. Analyzing access control policies with SMT

    Turkmen, F., Den Hartog, J. & Zannone, N. 3 Nov 2014 Proceedings of the ACM Conference on Computer and Communications Security. Association for Computing Machinery (ACM), p. 1508-1510 3 p.

    Research output: Scientific - peer-reviewConference contribution

  82. Analyzing and visualizing spreadsheets

    Hermans, F. F. J. 2013 162 p.

    Research output: ScientificDissertation (TU Delft)

  83. Analyzing the Evolution of Web Services using Fine-Grained Changes

    Romano, D. & Pinzger, M. 2012 Proceedings of the International Conference on Web Services (ICWS). Goble, C., Chen, P. & Zhang, J. (eds.). Los Alamitos: IEEE Society, p. 392-399 8 p.

    Research output: Scientific - peer-reviewConference contribution

  84. Analyzing the Impact of Antipatterns on Change-Proneness Using Fine-Grained Source Code Changes

    Romano, D., Raila, P. & Pinzger, M. 2012 Proceedings of the Working Conference on Reverse Engineering (WCRE). Oliveto, R. & Poshyvanyk, D. (eds.). IEEE Society, p. 437-446 10 p.

    Research output: Scientific - peer-reviewConference contribution

  85. Analyzing the State of Static Analysis: A Large-Scale Evaluation in Open Source Software

    Beller, M., Bholanath, R., McIntosh, S. & Zaidman, A. Mar 2016 Proceedings of the 23rd IEEE International Conference on Software Analysis, Evolution, and Reengineering. Piscataway, NJ: IEEE, p. 470-481 12 p.

    Research output: Scientific - peer-reviewConference contribution

  86. Analyzing the change-proneness of service-oriented systems from an industrial perspective

    Romano, D. 2013 Proceedings of the 35th International Conference on Software Engineering (ICSE 2013). Notkin, D., Cheng, B. H. C. & Pohl, K. (eds.). Piscataway, NJ, USA: IEEE Society, p. 1365-1368 4 p.

    Research output: Scientific - peer-reviewConference contribution

  87. Analyzing viewpoint diversity in twitter

    Bozdag, V. E., Gao, Q., Warnier, M. E. & Houben, G. J. P. M. 2013 Proceedings Workshop Designing Social Media for Change - CHI 2013. Kamal, N., Fels, S. & Fergusson et al, M. (eds.). New York, NY, USA: Association for Computing Machinery (ACM), p. 1-4 4 p.

    Research output: Scientific - peer-reviewConference contribution

  88. Annotating Spar/Java for data-parallel programming

    van Reeuwijk, C., Kuijlman, F., Sips, H. J. & Niemeijer, S. V. 2000 Proceedings of the sixth annual conference of the Advanced School for Computing and Imaging. LJ Vliet, V. (ed.). Delft: Advanced School for Computing and Imaging, p. 185-194 10 p.

    Research output: Scientific - peer-reviewConference contribution

  89. Annotating Spar/Java for the placement of tasks and data on heterogeneous parralel systems

    van Reeuwijk, C., Denissen, W. J. A., Kuijlman, F. & Sips, H. J. 2000 Proceedings of the eight international workshop on compilers for parallel computers. Aussois, p. 45-58 14 p.

    Research output: Scientific - peer-reviewConference contribution

  90. Ant based routing algorithms

    Rothkrantz, L. J. M., Wojdel, J. C., Wojdel, A. W. & Knibbe, H. 2000 In : Neural Network World: international journal on non-standard computing and artificial intelligence. 10, 3, p. 455-462 8 p.

    Research output: ScientificArticle

  91. Apples, Oranges, and Testbeds

    Langendoen, K. G. 2006 3rd IEEE Conf. on Mobile Ad-hoc and Sensor Systems (MASS 2006). s.n. (ed.). Vancouver, Canada: IEEE Society, p. 367-396 30 p.

    Research output: Scientific - peer-reviewConference contribution

  92. Application of ARC in system design

    van Dijk, H., Langendoen, K. G. & Sips, H. J. 2000 Proceedings. RL Lagendijk & ... [et Al] (eds.). S.l.: s.n., p. 118-125 8 p.

    Research output: ScientificConference contribution

  93. Application of ARC in system design

    van Dijk, H., Langendoen, K. G. & Sips, H. J. 2000 Proceedings of the 2nd international symposium on mobile multimedia systems and applications. RL Lagendijk (ed.). Delft: Delft University of Technology, p. 118-125 8 p.

    Research output: Scientific - peer-reviewConference contribution

  94. Application of Hybrid Metaheuristics in Sensor Management

    de Jong, J. L. & van Norden, W. L. 2006 Proceedings COGIS 2006. M.Minoux (ed.). Societe de l'Electricite, de l'Electronique et des Techno, p. 1-7 7 p.

    Research output: Scientific - peer-reviewConference contribution

  95. Application of hybrid metaheuristics in sensor management

    de Jong, J. L. & van Norden, W. L. 2007 In : Aerospace Science and Technology. 11, p. 205-302 98 p.

    Research output: Scientific - peer-reviewArticle

  96. Application of parametric model checking-the root contention protocol

    Bandini, G., Lutje Spelberg, R. F., de Rooij, R. C. M. & Toetenel, W. J. 2000 ASCI 2000 proceedings. LJ Vliet, V., JWJ Heijnsdijk, T Kielmann & PMW Knijnenburg (eds.). Delft: Advanced School for Computing and Imaging, p. 21-28 8 p.

    Research output: Scientific - peer-reviewConference contribution

  97. Application-Oriented Scheduling in Multicluster Grids

    Sonmez, O. O. 2010

    Research output: ScientificDissertation (TU Delft)

  98. Application-based scheduling for highly stochastic task graphs. IMPACT-NLI-1999-1

    van Lohuizen, M. P. 1999 Delft: Faculty of information technology and systems. 27 p.

    Research output: ProfessionalReport

  99. Application-directed automatic 802.11 rate control; Design rationale and preliminary results

    Haratcherev, I. J., Langendoen, K. G., Lagendijk, R. L. & Sips, H. J. 2003 ASCI 2003; Proceedings of the ninth annual conference of the advanced school for computing and imaging. Vassiliadis, S., Florack, L. M. J., Heijnsdijk, J. W. J. & Steen, van der, A. (eds.). Delft: Advanced School for Computing and Imaging, p. 56-60 5 p.

    Research output: ScientificConference contribution

Previous 1 2 3 4 5 6 7 8 ...26 Next