101 - 200 out of 2,562Page size: 100
  1. Article
  2. Change-based test selection: An empirical evaluation

    Soetens, Q. D., Demeyer, S., Zaidman, A. & Perez, J. 11 Nov 2015 In : Empirical Software Engineering. 21, 5, p. 1990-2032 43 p.

    Research output: Scientific - peer-reviewArticle

  3. Code Generation by Model Transformation. A Case Study in Transformation Modularity

    Hemel, Z., Kats, L. C. L. & Visser, E. 2008 In : Lecture Notes in Computer Science. 5063, p. 183-198 16 p.

    Research output: Scientific - peer-reviewArticle

  4. Code Generation by Model Transformation: A Case Study in Transformation Modularity

    Hemel, Z., Kats, L. C. L., Groenewegen, D. M. & Visser, E. 2009 In : Software and Systems Modeling. p. 1-28 28 p.

    Research output: Scientific - peer-reviewArticle

  5. Code smells for Model-View-Controller architectures

    Finavaro Aniche, M., Bavota, G., Treude, C., Gerosa, M. A. & van Deursen, A. Sep 2017 In : Empirical Software Engineering.

    Research output: Scientific - peer-reviewArticle

  6. Coevolution of variability models and related software artifacts: A fresh look at evolution patterns in the Linux kernel

    Passos, L., Teixeira, L., Dintzner, N., Apel, S., Wąsowski, A., Czarnecki, K., Borba, P. & Guo, J. 5 May 2015 In : Empirical Software Engineering. 21, 4, p. 1744-1793 50 p.

    Research output: Scientific - peer-reviewArticle

  7. CogCell: Cognitive interplay between 60 GHz picocells and 2.4/5 GHz hotspots in the 5G era

    Chandra, K., Venkatesha Prasad, R. R., Quang, B. & Niemegeers, I. G. M. M. 2015 In : IEEE Communications Magazine. 53, 7, p. 118-125 8 p.

    Research output: Scientific - peer-reviewArticle

  8. Communicatie in Holland: van ondersteuning tot superstructuur

    Hermans, J. & de Wit, O. 2014 In : Holland: regionaal-historisch tijdschrift. 49, 4

    Research output: ProfessionalArticle

  9. Communicative action-based business process and information systems modelling with DEMO

    van Reijswoud, V. E., Mulder, J. B. F. & Dietz, J. L. G. 1999 In : Information Systems Journal: an international journal promoting the study and practice of information systems. 9, p. 117-138 22 p.

    Research output: Scientific - peer-reviewArticle

  10. Comparative tropical land cover classification of optical landsat TM data using statistical and artificial neural network techniques

    van Coillie, F. M. B., de Wulf, R. R. & Kerckhoffs, E. J. H. 1999 In : South African Journal of Surveying and Geo-Information. 1, 2, p. 65-74 10 p.

    Research output: ScientificArticle

  11. Comparing energy-saving MAC protocols for wireless sensor networks

    Halkes, G. P., van Dam, T. & Langendoen, K. G. 2005 In : Mobile Networks and Applications. 10, 5, p. 783-791 9 p.

    Research output: Scientific - peer-reviewArticle

  12. Comparing the Effects of Failures in Power Grids under the AC and DC Power Flow Models

    Cetinay-Iyicil, H., Soltan, S., Kuipers, F. A., Zussman, G. & Van Mieghem, P. 2017 In : IEEE Transactions on Network Science and Engineering. PP, 99

    Research output: Scientific - peer-reviewArticle

  13. Comparison between different feature extraction techniques for audio-visual speech recognition

    Chitu, A. G., Rothkrantz, L. J. M., Wiggers, P. & Wojdel, J. C. 2007 In : Journal on Multimodal User Interfaces. 1, 1, p. 7-20 14 p.

    Research output: Scientific - peer-reviewArticle

  14. Computer-aided support for secure tropos

    Massacci, F., Mylopoulos, J. & Zannone, N. Sep 2007 In : Automated Software Engineering. 14, 3, p. 341-364 24 p.

    Research output: Scientific - peer-reviewArticle

  15. Computing all-pairs shortest paths by leveraging low treewidth

    Planken, L. R., de Weerdt, M. M. & van der Krogt, P. J. 2012 In : The Journal of Artificial Intelligence Research. 43, p. 353-388 36 p.

    Research output: Scientific - peer-reviewArticle

  16. Computing the Impact of Disasters on Networks

    Oostenbrink, J. & Kuipers, F. Sep 2017 In : ACM SIGMETRICS Performance Evaluation Review. p. 107 110 p.

    Research output: ScientificArticle

  17. Computing the fault tolerance of multi-agent deployment

    Zhang, Y., Manisterski, E., Kraus, S., Subrahmanian, V. S. & Peleg, D. 2009 In : Artificial Intelligence. 173, 3-4, p. 437-465 29 p.

    Research output: Scientific - peer-reviewArticle

  18. Concerns on architecture-centered software development: a survey

    Kyaruzi, J. K. & van Katwijk, J. 2000 In : Journal of Integrated Design & Process Science. 4, 3, p. 13-33 21 p.

    Research output: Scientific - peer-reviewArticle

  19. Conducting quantitative software engineering studies with Alitheia Core

    Gousios, G. & Spinellis, D. 2014 In : Empirical Software Engineering. 19, 4, p. 885-925 41 p.

    Research output: Scientific - peer-reviewArticle

  20. Connection between phase singularities and the radiation pattern of a slit in a metal plate

    Schouten, H., Visser, T. D., Gbur, G. & Lenstra, D. 2004 In : Physical Review Letters. 93, 17, p. 173901-1-173901-4

    Research output: Scientific - peer-reviewArticle

  21. Cooperative Density Estimation in Random Wireless Ad Hoc Networks

    Onur, E., Durmus, Y. & Niemegeers, I. G. M. M. 2012 In : IEEE Communications Letters. p. 331-333 3 p.

    Research output: Scientific - peer-reviewArticle

  22. Coordinating Self-Interested Planning Agents

    Buzing, P. C., ter Mors, A. W., Valk, J. M. & Witteveen, C. 2006 In : Autonomous Agents and Multi-Agent Systems. 12, 2, p. 199-218 20 p.

    Research output: Scientific - peer-reviewArticle

  23. Coordination by design and the price of autonomy

    ter Mors, A. W., Yadati Narasihma, C., Witteveen, C. & Zhang, Y. 2010 In : Autonomous Agents and Multi-Agent Systems. 20, 3, p. 308-341 34 p.

    Research output: Scientific - peer-reviewArticle

  24. Correlations between Horn fractions, satisfiability and solver performance for fixed density random 3-CNF instances

    van Maaren, H. & van Norden, L. 2005 In : Annals of Mathematics and Artificial Intelligence. 44, 1-2, p. 157-177 21 p.

    Research output: Scientific - peer-reviewArticle

  25. Cost-driven scheduling of grid workflows using partial critical paths

    Abrishami, S., Naghibzadeh, M. & Epema, D. H. J. 2012 In : IEEE Transactions on Parallel and Distributed Systems. 23, 8, p. 1400-1414 15 p.

    Research output: Scientific - peer-reviewArticle

  26. Crawl-based analysis of web applications: Prospects and challenges

    van Deursen, A., Mesbah, A. & Nederlof, A. 2014 In : Science of Computer Programming. 97, 1, p. 173-180 8 p.

    Research output: Scientific - peer-reviewArticle

  27. Crawling Ajax-based web applications through dynamic analysis of user interface state changes

    Mesbah, A., van Deursen, A. & Lenselink, S. 2012 In : ACM Transactions on the Web. 6, 1, article 3, p. 1-30 30 p.

    Research output: Scientific - peer-reviewArticle

  28. Cross-system User Modeling and Personalization on the Social Web

    Abel, F., Herder, E., Houben, G. J. P. M., Henze, N. & Krause, D. 2013 In : User Modeling and User-Adapted Interaction: the journal of personalization research. 23, 2-3, p. 169-209 41 p.

    Research output: Scientific - peer-reviewArticle

  29. Current Trends in Modeling Inter-Organizational Cooperation

    Albani, A. & Dietz, J. L. G. 2009 In : Journal of Enterprise Information Management. 22, 3, p. 275-297 23 p.

    Research output: Scientific - peer-reviewArticle

  30. Custom architecture for multicore audio Beamforming systems

    Theodoropoulos, D., Kuzmanov, G. K. & Gaydadjiev, G. N. 2013 In : ACM Transactions on Embedded Computing Systems. 13, 2, p. 1-26 26 p.

    Research output: Scientific - peer-reviewArticle

  31. DEC: Diversity-based Energy-aware Clustering for heterogeneous sensor networks

    Malazi, H. T., Zamanifar, K., Khalili, A. & Dulman, S. O. 2012 In : Ad-Hoc & Sensor Wireless Networks. 17, 1-2, p. 53-72 20 p.

    Research output: Scientific - peer-reviewArticle

  32. Data minimisation in communication protocols: a formal analysis framework and application to identity management

    Veeningen, M., de Weger, B. & Zannone, N. 16 Oct 2014 In : International Journal of Information Security. 13, 6, p. 529-569 41 p.

    Research output: Scientific - peer-reviewArticle

  33. Data-integratie en -validatie is niet enkel met tools op te lossen

    Gerhardt-Hackl, W. 2000 In : Beyond. 5, 4, p. 10-13 4 p.

    Research output: ProfessionalArticle

  34. Dataset preservation for the long term: results of the dareLux project

    Dürr, E. H., Luxemburg, W. M. J., van der Meer, K. & Dekker, R. 2008 In : International Journal of Digital Curation. 3, p. 29-43 15 p.

    Research output: Scientific - peer-reviewArticle

  35. De Architectuur van Ajax Ontrafeld

    Mesbah, A. & van Deursen, A. 2006 In : Informatie: maandblad voor informatievoorziening. December, p. 50-56 7 p.

    Research output: ProfessionalArticle

  36. De DEMO-methode bij de Stichting Geschillencommissie

    Mulder, H., van Reijswoud, V. E. & Dietz, J. L. G. 2000 In : Workflow Magazine. 6, 1, p. 8-12 5 p.

    Research output: ProfessionalArticle

  37. De bemiddeling van ....

    Mulder, J. B. F. & Mulder, T. 2005 In : ADR Actueel. 9, 4, p. 3-6 4 p.

    Research output: ProfessionalArticle

  38. De kernbegrippen rond enterprise architectuur

    Hoogervorst, J. A. P. & Dietz, J. L. G. 2005 In : Tiem: tijdschrift voor informatie en management. 10, p. 40-48 9 p.

    Research output: ProfessionalArticle

  39. De valkuilen van documentmanagement: over zoekmachines, standaarden en digitale duurzaamheid

    van der Meer, K. 2000 In : Workflow Magazine. 6, 4, p. 20-21 2 p.

    Research output: ProfessionalArticle

  40. De waarde van informatie

    van der Meer, K. 2001 In : Praktijkgids de controller en informatiemanagement. 33, 10, p. 1-11 11 p.

    Research output: ProfessionalArticle

  41. Deadline-constrained workflow scheduling algorithms for infrastructure as a service clouds

    Abrishami, S., Naghibzadeh, M. & Epema, D. H. J. 2013 In : Future Generation Computer Systems: the international journal of grid computing: theory, methods and applications. 29, 1, p. 158-169 12 p.

    Research output: Scientific - peer-reviewArticle

  42. Decay-usage scheduling in multiprocessors

    Epema, D. H. J. 1999 In : ACM Transactions on Computer Systems. 16, 4, p. 367-415 49 p.

    Research output: Scientific - peer-reviewArticle

  43. Decorated Attribute Grammars. {A}ttribute Evaluation Meets Strategic Programming

    Kats, L. C. L., Sloane, A. M. & Visser, E. 2009 In : Lecture Notes in Computer Science. 5501, p. 142-157 16 p.

    Research output: Scientific - peer-reviewArticle

  44. Design and Implementation of a GUI for the TLC model checker

    Wang, B. & Pronk, C. 2006 In : ACM SIGPLAN Notices. 41, 12, p. 38-43 6 p.

    Research output: Scientific - peer-reviewArticle

  45. Design and use of the Simple Event Model (SEM)

    van Hage, W. R., Malaisé, V., Segers, R., Hollink, L. & Schreiber, G. 2011 In : Journal of Web Semantics. 9, 2, p. 128-136 9 p.

    Research output: Scientific - peer-reviewArticle

  46. Designing Syntax Embeddings and Assimilations for Language Libraries

    Bravenboer, M. & Visser, E. 2008 In : Lecture Notes in Computer Science. 5002, p. 34-46 13 p.

    Research output: Scientific - peer-reviewArticle

  47. Designing complex crowdsourcing applications covering multiple platforms and tasks

    Bozzon, A., Brambilla, M., Ceri, S., Mauri, A. & Volonterio, R. 2015 In : Journal of Web Engineering. 14, 5-6, p. 443-473 31 p.

    Research output: Scientific - peer-reviewArticle

  48. Designing cultural heritage sector brokers using SDBC

    Shishkov, B. B. 2005 In : International Journal On Information Theories & Applications. 10, p. 1-8 8 p.

    Research output: Scientific - peer-reviewArticle

  49. Designing virus-resistant, high-performance networks: A game-formation approach

    Trajanovski, S., Kuipers, F. A., Hayel, Y., Altman, E. & Van Mieghem, P. 2017 In : IEEE Transactions on Control of Network Systems. PP, 99, p. 1-10 10 p.

    Research output: Scientific - peer-reviewArticle

  50. Detecting and analyzing I/O performance regressions

    Bezemer, C., Milon Beltran, E., Zaidman, A. E. & Pouwelse, J. A. 2014 In : Journal of Software: Evolution and Process. 26, 12, p. 1193-1212 20 p.

    Research output: Scientific - peer-reviewArticle

  51. Detecting and refactoring code smells in spreadsheet formulas

    Hermans, F. F. J., Pinzger, M. & van Deursen, A. 2014 In : Empirical Software Engineering. 20, 2, p. 549-575 27 p.

    Research output: Scientific - peer-reviewArticle

  52. Development of a Universal Virtual Computer (UVC) for long-term preservation of digital objects

    van der Meer, K., van der Hoeven, J. R. & van Diessen, R. J. 2005 In : Journal of Information Science. 31, 3, p. 196-208 13 p.

    Research output: Scientific - peer-reviewArticle

  53. Diagnosing Intermittent Faults Using Maximum Likelihood Estimation

    Lima Maranhao De Abreu, R. F. & van Gemund, A. J. C. 2010 In : Artificial Intelligence. 174, 18, p. 1481-1497 17 p.

    Research output: Scientific - peer-reviewArticle

  54. Disnix: A toolset for distributed deployment

    van der Burg, S. & Dolstra, E. 2012 In : Science of Computer Programming.

    Research output: Scientific - peer-reviewArticle

  55. Distributed antenna system for mitigating shadowing effect in 60 GHz WLAN

    Wang, Q., Debbarma, D., Lo, A. C. C., Cao, Z., Niemegeers, I. G. M. M. & Heemstra de Groot, S. M. 2015 In : Wireless Personal Communications. 82, 2, p. 1-22 22 p.

    Research output: Scientific - peer-reviewArticle

  56. Distributed autoregressive moving average graph filters

    Loukas, A., Simonetto, A. & Leus, G. 2015 In : IEEE Signal Processing Letters. 22, 11, p. 1931-1935 5 p.

    Research output: Scientific - peer-reviewArticle

  57. Distributed computation particle filters on GPU architectures for real-time control applications

    Chitchian, M., Simonetto, A., van Amesfoort, A. S. & Keviczky, T. 2013 In : IEEE Transactions on Control Systems Technology. 21, 6, p. 2224-2238 15 p.

    Research output: Scientific - peer-reviewArticle

  58. Distributed localization in wireless sensor networks: a quantitative comparison

    Langendoen, K. G. & Reijers, N. 2003 In : Computer Networks. 43, p. 499-518 20 p.

    Research output: Scientific - peer-reviewArticle

  59. Distributed online flash-crowd detection in P2P swarming systems

    Pruteanu, A. S., D'acunto, L. & Dulman, S. O. 2013 In : Computer Communications. 36, 5, p. 533-541 9 p.

    Research output: Scientific - peer-reviewArticle

  60. Documenting Software Systems Using Types

    van Deursen, A. & Moonen, L. M. F. 2006 In : Science of Computer Programming. 60, 2, p. 205-220 16 p.

    Research output: Scientific - peer-reviewArticle

  61. Does offline political segregation affect the filter bubble? An empirical analysis of information diversity for Dutch and Turkish Twitter users

    Bozdag, V. E., Gao, Q., Houben, G. J. P. M. & Warnier, M. E. 2014 In : Computers in Human Behavior. 41, p. 405-415 11 p.

    Research output: Scientific - peer-reviewArticle

  62. Does single blind peer review hinder newcomers?

    Seeber, M. & Bacchelli, A. 2017 In : Scientometrics: an international journal for all quantitative aspects of the science of science, communication in science and science policy. 113, 1, p. 567-585 19 p.

    Research output: Scientific - peer-reviewArticle

  63. Domain-Specific Languages for Composable Editor Plugins

    Kats, L. C. L., Kalleberg, K. T. & Visser, E. 2010 In : Electronic Notes in Theoretical Computer Science. 253, 7, p. 149-163 15 p.

    Research output: Scientific - peer-reviewArticle

  64. Domain-independent multi-agent plan repair

    Komenda, A., Novak, P. & Pechoucek, M. 2014 In : Journal of Network and Computer Applications. 37, 1, p. 76-88 13 p.

    Research output: Scientific - peer-reviewArticle

  65. Dwelling in the canyons: Dwelling detection in urban environments using GPS, Wi-Fi, and geolocation

    Brouwers, N. & Woehrle, M. 2013 In : Pervasive and Mobile Computing. 9, 5, p. 665-680 16 p.

    Research output: Scientific - peer-reviewArticle

  66. Dynamic Resource Provisioning in Massively Multiplayer Online Games

    Nae, V., Iosup, A. & Prodan, R. 2011 In : IEEE Transactions on Parallel and Distributed Systems. 22, 3, p. 380-395 16 p.

    Research output: Scientific - peer-reviewArticle

  67. EEG alpha asymmetry, heart rate variability and cortisol in response to virtual reality induced stress

    Brouwer, A. M., Neerincx, M. A., Kallen, V. L., van der Leer, L. & ten Brinke, M. 2011 In : Journal of Cybertherapy and Rehabilitation. 4, 1, p. 27-56 30 p.

    Research output: Scientific - peer-reviewArticle

  68. Editorial Preface

    Barjis, J., Winter, R. & Albani, A. 2010 In : Enterprise Modelling and Information Systems Architectures. 5, 1, p. 1-2 2 p.

    Research output: Scientific - peer-reviewArticle

  69. Editorial: Introduction to the special issue on mining software repositories

    Xie, T., Zimmermann, T. & van Deursen, A. 2013 In : Empirical Software Engineering. 18, 6, p. 1043-1046 4 p.

    Research output: Scientific - peer-reviewArticle

  70. Efficiently identifying deterministic real-time automata from labeled data

    Verwer, S. E., de Weerdt, M. M. & Witteveen, C. 2012 In : Machine Learning. 86, 3, p. 295-333 39 p.

    Research output: Scientific - peer-reviewArticle

  71. Embedded software engineering: the state of the practice

    Graaf, B. S., Lormans, M. & Toetenel, W. J. 2003 In : IEEE Software. 20, 6, p. 61-69 9 p.

    Research output: Scientific - peer-reviewArticle

  72. Emerging Communication and Cooperation in Evolving Agent Societies

    Buzing, P. C., Eiben, A. E. & Schut, M. C. 2005 In : Journal of Artificial Societies and Social Simulation. 8, 1

    Research output: Scientific - peer-reviewArticle

  73. Empirical Evaluation of Diagnostic Algorithm Performance Using a Generic Framework

    Feldman, A. B., Kurtoglu, T., Narasimhan, S., Poll, S., Garcia, D., de Kleer, J., Kuhn, L. & van Gemund, A. J. C. 2010 In : International Journal of Prognostics and Health Management. September

    Research output: Scientific - peer-reviewArticle

  74. Empirical research in software architecture: opportunities, challenges, and approaches

    Babar, M. A., Lago, P. & van Deursen, A. 2011 In : Empirical Software Engineering. 16, 5, p. 539-543 5 p.

    Research output: Scientific - peer-reviewArticle

  75. Engineering and verifying agent-oriented requirements augmented by business constraints with B-Tropos

    Montali, M., Torroni, P., Zannone, N., Mello, P. & Bryl, V. Sep 2011 In : Autonomous Agents and Multi-Agent Systems. 23, 2, p. 193-223 31 p.

    Research output: Scientific - peer-reviewArticle

  76. Enterprise Architecture in Enterprise Engineering

    Hoogervorst, J. A. 2008 In : Enterprise Modelling and Information Systems Architectures. 3, p. 3-11 9 p.

    Research output: Scientific - peer-reviewArticle

  77. Enterprise Ontology and Enterprise Architecture

    Dietz, J. L. G. & Hoogervorst, J. A. P. 2007 In : Journal of Enterprise Architecture. 2, 1, p. 3-20 18 p.

    Research output: Scientific - peer-reviewArticle

  78. Erratum: Measuring dissimilarity between respiratory effort signals based on uniform scaling for sleep staging

    Long, X., Yang, J., Weysen, T., Haakma, R., Foussier, J., Fonseca, P. & Aarts, R. M. 2015 In : Physiological Measurement. 36, 3, p. 625-625 1 p.

    Research output: Scientific - peer-reviewArticle

  79. Evaluating and comparing language workbenches: Existing results and benchmarks for the future

    Erdweg, S. , Gerritsen, A. , Konat, G. , Vergu, V. , Visser, E. , Wachsmuth, G. & 16 others van der Storm, T., Völter, M., Tratt, L., Bosman, R., Cook, W. R., Hulshout, A., Kelly, S., Loh, A., Molina, P. J., Palatnik, M., Pohjonen, R., Schindler, E., Schindler, K., Solmi, R., Van Der Vlist, K. & Van Der Woning, J. 1 Dec 2015 In : Computer Languages, Systems and Structures. 44, p. 24-47 24 p.

    Research output: Scientific - peer-reviewArticle

  80. Evaluating application scenarios on the Cell/B.E.

    Varbanescu, A. L., Sips, H. J., Ross, K. A., Liu, Q., Natsev, A., Smith, J. R. & Liu, L-K. 2009 In : Concurrency and Computation: Practice & Experience. 21, p. 85-100 16 p.

    Research output: Scientific - peer-reviewArticle

  81. Evaluating vector data type usage in OpenCL kernels

    Fang, J., Varbanescu, A. L., Liao, X. & Sips, H. J. 2015 In : Concurrency and Computation: Practice & Experience. 27, 17, p. 4586-4602 17 p.

    Research output: Scientific - peer-reviewArticle

  82. Evaluation of strategic supply networks

    Albani, A. & Müssigmann, N. 2005 In : Lecture Notes in Computer Science. 3762, p. 582-591 10 p.

    Research output: Scientific - peer-reviewArticle

  83. Exception handling bug hazards in Android: Results from a mining study and an exploratory survey

    Coelho, R., Almeida, L., Gousios, G., van Deursen, A. & Treude, C. Jun 2017 In : Empirical Software Engineering. 22, 3, p. 1264–1304

    Research output: Scientific - peer-reviewArticle

  84. Execution Trace Analysis through Massive Sequence and Circular Bundle Views

    Cornelissen, S. G. M., Zaidman, A. E., Holten, D., Moonen, L. M. F., van Deursen, A. & van Wijk, J. J. 2008 In : Journal of Systems and Software. 81, p. 2252-2268 17 p.

    Research output: Scientific - peer-reviewArticle

  85. Experimental Evaluation of Simulation Abstractions for Wireless Sensor Network {MAC} Protocols

    Halkes, G. P. & Langendoen, K. G. 2010 In : Eurasip Journal on Wireless Communications and Networking. 2010, p. 1-10 10 p.

    Research output: Scientific - peer-reviewArticle

  86. Expert system for automatic analysis of facial expressions

    Pantic, M. & Rothkrantz, L. J. M. 2000 In : Image and Vision Computing. 18, p. 881-905 25 p.

    Research output: ScientificArticle

  87. Exploiting user tags to build a semantic cultural heritage portal

    van der Sluijs, K. & Houben, G. J. P. M. 2010 In : IEEE Intelligent Systems. 25, 6, p. 84-92 9 p.

    Research output: Scientific - peer-reviewArticle

  88. Extensible architecture framework (xAF)

    Dietz, J. L. G., Op 't Land, M. & Baldinger, F. 2005 In : I&A Tijdschrift Voor Informatie en Architectuur. 1, 3, p. 26-29 4 p.

    Research output: ProfessionalArticle

  89. Extentions to the modula-2 language

    Pronk, C., Schonhacker, M., Sutcliffe, R. J. & Wiedemann, A. 2000 In : Journal of Object - Oriented Programming. 13, 7, p. 1-6 6 p.

    Research output: ScientificArticle

  90. FED: Fuzzy Event Detection model for Wireless Sensor Networks

    Malazi, H. T., Zamanifar, K. & Dulman, S. O. 2011 In : International Journal of Wireless and Mobile Networks. 3, 6, p. 29-45 17 p.

    Research output: Scientific - peer-reviewArticle

  91. FEVER: Feature-oriented Changes and Artefact Co-evolution in Highly Configurable Systems

    Dintzner, N., van Deursen, A. & Pinzger, M. 4 Nov 2017 In : Empirical Software Engineering.

    Research output: Scientific - peer-reviewArticle

  92. Facial action recognition for facial expression analysis from static face images

    Pantic, M. & Rothkrantz, L. J. M. 2004 In : IEEE Transactions on Systems, Man and Cybernetics, Part B: Cybernetics. 34, 3, p. 1449-1461 13 p.

    Research output: Scientific - peer-reviewArticle

  93. Fairness in wireless networks: Issues, measures and challenges

    Shi, H. Z., Venkatesha Prasad, R. R., Onur, E. & Niemegeers, I. G. M. M. 2014 In : IEEE Communications Surveys and Tutorials. 16, 1, p. 5-24 20 p.

    Research output: Scientific - peer-reviewArticle

  94. Filling the gap between requirements engineering and public key/trust management infrastructures

    Giorgini, P., Massacci, F., Mylopoulos, J. & Zannone, N. 2004 In : Lecture Notes in Computer Science. 3093, p. 98-111 14 p.

    Research output: Scientific - peer-reviewArticle

  95. Finding performance bugs with the TNO HPF benchmark suite

    Denissen, W. & Sips, H. J. 2002 In : Concurrency: Practice and Experience. 14, 8-9, p. 691-712 22 p.

    Research output: Scientific - peer-reviewArticle

  96. Flow-based reputation: More than just ranking

    Simone, A., Škorić, B. & Zannone, N. May 2012 In : International Journal of Information Technology and Decision Making. 11, 3, p. 551-578 28 p.

    Research output: Scientific - peer-reviewArticle

  97. Flow-based reputation with uncertainty: evidence-based subjective logic

    Škorić, B., de Hoogh, S. J. A. & Zannone, N. 1 Aug 2016 In : International Journal of Information Security. 15, 4, p. 381-402 22 p.

    Research output: Scientific - peer-reviewArticle

  98. Formal analysis of XACML policies using SMT

    Turkmen, F., den Hartog, J., Ranise, S. & Zannone, N. 1 May 2017 In : Computers and Security. 66, p. 185-203 19 p.

    Research output: Scientific - peer-reviewArticle

  99. Formal analysis of trace conditioning

    Bosse, T., Jonker, C. M., Los, S. A., van der Torre, L. & Treur, J. 2007 In : Cognitive Systems Research (Online). 8, 1, p. 36-47 12 p.

    Research output: Scientific - peer-reviewArticle

  100. Formal definition of programming language standards

    Pronk, C. & Schonhacker, M. 2003 In : ACM SIGPLAN Notices. 38, 8, p. 20-21 2 p.

    Research output: Scientific - peer-reviewArticle

  101. From Hippocratic databases to Secure Tropos: A computer-aided re-engineering approach

    Massacci, F., Mylopoulos, J. & Zannone, N. Apr 2007 In : International Journal of Software Engineering and Knowledge Engineering. 17, 2, p. 265-284 20 p.

    Research output: Scientific - peer-reviewArticle

Previous 1 2 3 4 5 6 7 8 ...26 Next