Loading…
A comparison of approaches for modeling software security requirements using unified modeling language extensions
Hassan, Syed Muhammad Junaid, Shahab, Aamir, Tabba, Fatima Ali, Alrammal, Muath, Abu-Amara, Fadi, Nadeem, Muhammad
Published in International journal of electrical and computer engineering (Malacca, Malacca) (01.06.2025)
Published in International journal of electrical and computer engineering (Malacca, Malacca) (01.06.2025)
Get full text
Journal Article
Loading…
Loading…
Improved Technology Similarity Measurement in the Medical Field based on Subject-Action-Object Semantic Structure: A Case Study of Alzheimer's Disease
Li, Rongrong, Wang, Xuefeng, Liu, Yuqin, Zhang, Shuo
Published in IEEE transactions on engineering management (01.01.2023)
Published in IEEE transactions on engineering management (01.01.2023)
Get full text
Journal Article
Loading…
Loading…
Loading…
A Novel Telerehabilitation Approach for Cognitive-Language Therapy in Chronic Stroke Subjects With Aphasia: Neurocognitive Intervention Through Neurorehabilitation Exercises and Assessments
Infarinato, Francesco, Romano, Paola, Adinolfi, Francesco, Franceschini, Marco, Ginocchi, Roberta, Goffredo, Michela, Ottaviani, Marco, Valente, Marianna, Pournajaf, Sanaz
Published in IEEE robotics & automation magazine (01.03.2023)
Published in IEEE robotics & automation magazine (01.03.2023)
Get full text
Journal Article
Loading…
Loading…
Supporting Process Model Validation through Natural Language Generation
Leopold, Henrik, Mendling, Jan, Polyvyanyy, Artem
Published in IEEE transactions on software engineering (01.08.2014)
Published in IEEE transactions on software engineering (01.08.2014)
Get full text
Journal Article
Loading…
How Developers Choose Names
Feitelson, Dror G., Mizrahi, Ayelet, Noy, Nofar, Shabat, Aviad Ben, Eliyahu, Or, Sheffer, Roy
Published in IEEE transactions on software engineering (01.01.2022)
Published in IEEE transactions on software engineering (01.01.2022)
Get full text
Journal Article
Loading…
Loading…
Loading…
RefactorScore: Evaluating Refactor Prone Code
Jesse, Kevin, Kuhmuench, Christoph, Sawant, Anand
Published in IEEE transactions on software engineering (01.11.2023)
Published in IEEE transactions on software engineering (01.11.2023)
Get full text
Journal Article
Loading…
Ontology Building for Cyber-Physical Systems: Application in the Manufacturing Domain
Hildebrandt, Constantin, Kocher, Aljosha, Kustner, Christof, Lopez-Enriquez, Carlos-Manuel, Muller, Andreas W., Caesar, Birte, Gundlach, Claas Steffen, Fay, Alexander
Published in IEEE transactions on automation science and engineering (01.07.2020)
Published in IEEE transactions on automation science and engineering (01.07.2020)
Get full text
Journal Article
Loading…
Loading…
Loading…
ABAC-Based Security Model for DDS
Kim, Hwimin, Kim, Dae-Kyoo, Alaerjan, Alaa
Published in IEEE transactions on dependable and secure computing (01.09.2022)
Published in IEEE transactions on dependable and secure computing (01.09.2022)
Get full text
Journal Article
Loading…
Ensuring the Compatibility of Autonomous Electric Vehicles Components Through a Formal Approach Based on Interaction Protocols
Chouali, Samir, Boukerche, Azzedine, Mostefaoui, Ahmed, Merzoug, Mohammed Amine
Published in IEEE transactions on vehicular technology (01.02.2023)
Published in IEEE transactions on vehicular technology (01.02.2023)
Get full text
Journal Article
Loading…
MOSAIK: A Formal Model for Self-Organizing Manufacturing Systems
Charpenay, Victor, Schraudner, Daniel, Seidelmann, Thomas, Spieldenner, Torsten, Weise, Jens, Schubotz, Rene, Mostaghim, Sanaz, Harth, Andreas
Published in IEEE pervasive computing (01.01.2021)
Published in IEEE pervasive computing (01.01.2021)
Get full text
Journal Article
Loading…
Extending the UML Statecharts Notation to Model Security Aspects
El-Attar, Mohamed, Luqman, Hamza, Karpati, Peter, Sindre, Guttorm, Opdahl, Andreas L.
Published in IEEE transactions on software engineering (01.07.2015)
Published in IEEE transactions on software engineering (01.07.2015)
Get full text
Journal Article
Loading…
Automated Refactoring of OCL Constraints with Search
Lu, Hong, Wang, Shuai, Yue, Tao, Ali, Shaukat, Nygard, Jan F.
Published in IEEE transactions on software engineering (01.02.2019)
Published in IEEE transactions on software engineering (01.02.2019)
Get full text
Journal Article