Volume 50, Number 12, December 2020
CREW: Cost and Reliability aware Eagle-Whale optimiser for service placement in Fog.

John Paul Martin A. Kandasamy K. Chandrasekaran

Effective approaches to combining lexical and syntactical information for code summarization.

Ziyi Zhou Huiqun Yu Guisheng Fan

Integrated machine learning with semantic web for open government data recommendation based on cloud computing.

I-Ching Hsu Yin-Hung Lin

Tice: A real-time language compilable using C++ compilers.

Tadeus Prastowo Luigi Palopoli Luca Abeni

HEART: Unrelated parallel machines problem with precedence constraints for task scheduling in cloud computing using heuristic and meta-heuristic algorithms.

Amit Kumar Bhardwaj Yuvraj Gajpal Chirag Surti Sukhpal Singh Gill

Joint computation offloading and resource provisioning for edge-cloud computing environment: A machine learning-based approach.

Ali Shahidinejad Mostafa Ghobaei-Arani

Easily solving dynamic programming problems in Haskell by memoization of hylomorphisms.

David Llorens Juan Miguel Vilar

On the synthesis of metadata tags for HTML files.

Patricia Jiménez Juan C. Roldán Fernando O. Gallego Rafael Corchuelo

Usability implications in software architecture: The case study of a mobile app.

Rafael Capilla Rick Kazman Carlos Romera Carlos Carrillo

Analyzing spatial analytics systems based on Hadoop and Spark: A user perspective.

Joao Pedro de Carvalho Castro Anderson Chaves Carniel Cristina Dutra de Aguiar Ciferri


Volume 50, Number 11, November 2020
Field of experts optimization-based noisy image retrieval.

Junqi Guo Guicheng Shen Yichen Sun Jin Zhao Hao Wu Zhilin Zhu

Secure and efficient data transfer using spreading and assimilation in MANET.

Samina Kausar Muhammad Habib Muhammad Yasir Shabir Ata Ullah Xu Huahu Rashid Mehmood Rongfang Bie Muhammad Shahid Iqbal

The role of superior image composition in children's analogical reasoning.

Xiao Yu Congcong Han Junqi Guo Yinghe Chen

ADARC: An anomaly detection algorithm based on relative outlier distance and biseries correlation.

Cun Ji Xiunan Zou Shijun Liu Li Pan

A physiological data-driven model for learners' cognitive load detection using HRV-PRV feature fusion and optimized XGBoost classification.

Junqi Guo Yazhu Dai Chixiang Wang Hao Wu Tianyou Xu Kai Lin

Dynamic human contact prediction based on naive Bayes algorithm in mobile social networks.

Feng Zeng Lan Yao Baoling Wu Wenjia Li Lin Meng

Load balancing aware scheduling algorithms for fog networks.

Anil Singh Nitin Auluck

Special Issue: Identification, Information, and Knowledge in the Internet of Things.

Hao Wu Rongfang Bie Charith Pereira Omer F. Rana


Volume 50, Number 10, October 2020
Impact of etcd deployment on Kubernetes, Istio, and application performance.

Lars Larsson William Tärneberg Cristian Klein Erik Elmroth Maria Kihl

R2D2: A scalable deep learning toolkit for medical imaging segmentation.

Soulaimane Guedria Noël De Palma Félix Renard Nicolas Vuillerme

Improving LSM-trie performance by parallel search.

Wen Cheng Tao Guo Lingfang Zeng Yang Wang Lars Nagel Tim Süß André Brinkmann

"The Canary in the Coal Mine..." A cautionary tale from the decline of SourceForge.

Damian Andrew Tamburri Kelly Blincoe Fabio Palomba Rick Kazman

Privacy and security constraints for code contributions.

Rodrigo Andrade Paulo Borba

PFACC: An OpenACC-like programming model for irregular nested parallelism.

Ming-Hsiang Huang Wuu Yang


Volume 50, Number 9, September 2020
Burrows-Wheeler post-transformation with effective clustering and interpolative coding.

Arto Niemi Jukka Teuhola

An empirical comparison of commercial and open-source web vulnerability scanners.

Richard Amankwah Jinfu Chen Patrick Kwaku Kudjo Dave Towey

Proximate sharing of geo data using the credit-considered mobile edge computing server switching control scheme.

Chung-Ming Huang Pin-Jui Chen

Component-aware orchestration of cloud-based enterprise applications, from TOSCA to Docker and Kubernetes.

Matteo Bogo Jacopo Soldani Davide Neri Antonio Brogi

Recommending software features to designers: From the perspective of users.

Chun Liu Wei Yang Zheng Li Yijun Yu

Timing isolation and improved scheduling of deep neural networks for real-time systems.

Daniel Casini Alessandro Biondi Giorgio C. Buttazzo

A review on the computation offloading approaches in mobile edge computing: A game-theoretic perspective.

Ali Shakarami Ali Shahidinejad Mostafa Ghobaei-Arani

Sensei: Enforcing secure coding guidelines in the integrated development environment.

Pieter De Cremer Nathan Desmet Matias Madou Bjorn De Sutter

Microservice transition and its granularity problem: A systematic mapping study.

Sara Hassan Rami Bahsoon Rick Kazman

Two decades of live coding and debugging of virtual machines through simulation.

Daniel Ingalls Eliot Miranda Clément Béra Elisa Gonzalez Boix


Volume 50, Number 8, August 2020
Autonomic resource provisioning for multilayer cloud applications with K-nearest neighbor resource scaling and priority-based resource allocation.

Arash Mazidi Mehdi Golsorkhtabaramiri Meisam Yadollahzadeh Tabari

Configurable three-way model merging.

Mohammadreza Sharbaf Bahman Zamani

Vocabulary and time based bug-assignment: A recommender system for open-source projects.

Ali Sajedi Badashian Eleni Stroulia

Application of security reference architecture to Big Data ecosystems in an industrial scenario.

Julio Moreno Javier Gómez Manuel A. Serrano Eduardo B. Fernández Eduardo Fernández-Medina

A semantic and social-based collaborative recommendation of friends in social networks.

Lamia Berkani

MFHS: A modular scheduling framework for heterogeneous system.

Abdelhamid Khiat Abdelkamel Tari Tom Guérout

OPAL: An extensible framework for ontology-based program analysis.

Dileep Kumar Pattipati Rupesh Nasre Sreenivasa Kumar Puligundla

Cetratus: A framework for zero downtime secure software updates in safety-critical systems.

Imanol Mugarza Jorge Parra Eduardo Jacob

Self-adaptive brainstorming for jobshop scheduling in multicloud environment.

Ashutosh Bhatt Priti Dimri Ambika Aggarwal

Tabular-expression-based method for constructing metamorphic relations.

Jingyao Li Lei Liu Peng Zhang

Designing real-time systems using imprecise discrete-event system specifications.

Gabriel A. Wainer Mohammad Moallemi


Volume 50, Number 7, July 2020
VR-Rides: An object-oriented application framework for immersive virtual reality exergames.

Yifan Wang Kiran Ijaz Dong Yuan Rafael A. Calvo

Flexible data anonymization using ARX - Current status and challenges ahead.

Fabian Prasser Johanna Eicher Helmut Spengler Raffael Bild Klaus A. Kuhn

Healthcare software design and implementation - A project failure case.

Shouki A. Ebad

A real-time attack defense framework for 5G network slicing.

Michel S. Bonfim Marcelo Anderson Santos Kelvin L. Dias Stenio Fernandes

MMLT: A mutual multilevel trust framework based on trusted third parties in multicloud environments.

Golnaz Aghaee Ghazvini Mehran Mohsenzadeh Ramin Nasiri Amir Masoud Rahmani

Compact Fenwick trees for dynamic ranking and selection.

Stefano Marchini Sebastiano Vigna

Predicting Hadoop misconfigurations using machine learning.

Andrew Robert Apaar Gupta Vinayak Shenoy Dinkar Sitaram Subramaniam Kalambur

Inline wireless mobile sensors and fog nodes placement for leakage detection in water distribution systems.

Chengyu Hu Xin Shu Xuesong Yan Deze Zeng Wenyin Gong Lei Wang

Robust and efficient memory management in Apache AsterixDB.

Taewoo Kim Alexander Behm Michael Blow Vinayak R. Borkar Yingyi Bu Michael J. Carey Murtadha Al Hubail Shiva Jahangiri Jianfeng Jia Chen Li Chen Luo Ian Maxon Pouria Pirzadeh

Big data deployment in containerized infrastructures through the interconnection of network namespaces.

Carla Sauvanaud Ajay Dholakia Jordi Guitart Chulho Kim Peter Mayes

All about activity injection: Threats, semantics, detection, and defense.

Sungjae Hwang Sungho Lee Sukyoung Ryu

A survey on the service interoperability in cloud computing: Client-centric and provider-centric perspectives.

Nour El Houda Bouzerzour Souad Ghazouani Yahya Slimani


Volume 50, Number 6, June 2020
Analysis of a cloud migration framework for offline risk assessment of cloud service providers.

Amartya Sen Sanjay Madria

A systematic approach toward security in Fog computing: Assets, vulnerabilities, possible countermeasures.

Mozhdeh Farhadi Jean-Louis Lanet Guillaume Pierre Daniele Miorandi

Partial migration technique for GPGPU tasks to Prevent GPU Memory Starvation in RPC-based GPU Virtualization.

Jihun Kang JongBeom Lim HeonChang Yu

A multicriteria optimization model for cloud service provider selection in multicloud environments.

Amany M. Mohamed Hisham M. Abdelsalam

Optimizing computational resource management for the scientific gateways ecosystems based on the service-oriented paradigm.

Edvard Martins de Oliveira Júlio Cezar Estrella Alexandre Cláudio Botazzo Delbem Mario Henrique de Souza Pardo Fausto Guzzo da Costa Alexandre Defelicibus Stephan Reiff-Marganiec

Deployment of a cloud pipeline for real-time visual inspection using fast streaming high-definition images.

Aishwarya Srivastava Siddhant Aggarwal Amy W. Apon Edward B. Duffy Ken Kennedy André Luckow Brandon Posey Marcin Ziolkowski

IoTSim-Edge: A simulation framework for modeling the behavior of Internet of Things and edge computing environments.

Devki Nandan Jha Khaled Alwasel Areeb Alshoshan Xianghua Huang Ranesh Kumar Naha Sudheer Kumar Battula Saurabh Garg Deepak Puthal Philip James Albert Y. Zomaya Schahram Dustdar Rajiv Ranjan

Toward scalable cloud data center simulation using high-level architecture.

Bukhtawar Elahi Asad Waqar Malik Anis Ur Rahman Muazzam Ali Khan

Availability analysis of design configurations to compose virtual performance-optimized data center systems in next-generation cloud data centers.

Daniel Rosendo Demis Gomes Guto Leoni Santos Leylane Silva André L. C. Moreira Judith Kelner Djamel Sadok Glauco Estácio Gonçalves Amardeep Mehta Mattias Wildeman Patricia Takako Endo

New generation cloud computing.

Blesson Varghese Marco A. S. Netto Ignacio Martín Llorente Rajkumar Buyya


Volume 50, Number 5, May 2020
SDN/NFV security framework for fog-to-things computing infrastructure.

Prabhakar Krishnan Subhasri Duttagupta Krishnashree Achuthan

SELFNET 5G mobile edge computing infrastructure: Design and prototyping.

Enrique Chirivella-Perez Ricardo Marco Alaez Alba Hita Ana Serrano Mamolar Jose M. Alcaraz Calero Qi Wang Pedro Miguel Neves Giacomo Bernini Konstantinos Koutsopoulos Manuel Gil Pérez Gregorio Martínez Pérez Maria João Barros Anastasius Gavras

How to place your apps in the fog: State of the art and open challenges.

Antonio Brogi Stefano Forti Carlos Guerrero Isaac Lera

DewSim: A trace-driven toolkit for simulating mobile device clusters in Dew computing environments.

Matías Hirsch Cristian Mateos Juan Manuel Rodriguez Alejandro Zunino

Socially aware microcloud service overlay optimization in community networks.

Nuno Apolónia Felix Freitag Leandro Navarro Sarunas Girdzijauskas

Pipeline provenance for cloud-based big data analytics.

Ruoyu Wang Daniel Sun Guoqiang Li Raymond K. Wong Shiping Chen

Intelligent sentiment analysis approach using edge computing-based deep learning technique.

H. Sankar V. Subramaniyaswamy Varadarajan Vijayakumar Arun Kumar Sangaiah Logesh Ravi A. Umamakeswari

A crosswalk pedestrian recognition system by using deep learning and zebra-crossing recognition techniques.

Chyi-Ren Dow Ngo Huu Huy Liang-Hsuan Lee Po-Yu Lai Kuan-Chieh Wang Van-Tung Bui

SEWMS: An edge-based smart wearable maintenance system in communication network.

Lanlan Rui Yabin Qin Biyao Li Ying Wang Haoqiu Huang

Cloud-aided online EEG classification system for brain healthcare: A case study of depression evaluation with a lightweight CNN.

Hengjin Ke Dan Chen Tejal Shah Xianzeng Liu Xinhua Zhang Lei Zhang Xiaoli Li

Characterizing application scheduling on edge, fog, and cloud computing resources.

Prateeksha Varshney Yogesh Simmhan

An osmotic computing infrastructure for urban pollution monitoring.

Antonella Longo Marco Zappatore Andrea De Matteis

Developing applications in large scale, dynamic fog computing: A case study.

Nam Ky Giang Rodger Lea Victor C. M. Leung

A secure fog-based platform for SCADA-based IoT critical infrastructure.

Thar Baker Muhammad Asim Áine MacDermott Farkhund Iqbal Faouzi Kamoun Babar Shah Omar Alfandi Mohammad Hammoudeh

User allocation-aware edge cloud placement in mobile edge computing.

Yan Guo Shangguang Wang Ao Zhou Jinliang Xu Jie Yuan Ching-Hsien Hsu

Abnormal visual event detection based on multi-instance learning and autoregressive integrated moving average model in edge-based Smart City surveillance.

Xianghua Xu LiQiming Liu Lingjun Zhang Ping Li Jinjun Chen

Software tools and techniques for fog and edge computing.

Rajiv Ranjan Massimo Villari Haiying Shen Omer F. Rana Rajkumar Buyya


Volume 50, Number 4, April 2020
Bringing semantics to multicloud service compositions.

Souad Ghazouani Haithem Mezni Yahya Slimani

Standalone noise and anomaly detection in wireless sensor networks: A novel time-series and adaptive Bayesian-network-based approach.

Mahmood Safaei Abul Samad Ismail Hassan Chizari Maha Driss Wadii Boulila Shahla Asadi Mitra Safaei

Software fault prediction using particle swarm algorithm with genetic algorithm and support vector machine classifier.

Hiba Alsghaier Mohammed Akour

Deep locality-sensitive discriminative dictionary learning for semantic video analysis.

Ben-Bright Benuwa Benjamin Ghansah Ernest K. Ansah

Orthogonal persistence in nonvolatile memory architectures: A persistent heap design and its implementation for a Java Virtual Machine.

Taciano Perez Marcelo Veiga Neves Diego Medaglia Pedro H. G. Monteiro César A. F. De Rose

Temporal determinization of mutating finite automata: Reconstructing or restructuring.

Gianfranco Lamperti

MOAManager: A tool to support data stream experiments.

Bruno Iran Ferreira Maciel Silas G. T. C. Santos Roberto S. M. Barros


Volume 50, Number 3, March 2020
Unsupervised software repositories mining and its application to code search.

Gang Hu Min Peng Yihan Zhang Qianqian Xie Wang Gao Mengting Yuan

Interventions for long-term software security: Creating a lightweight program of assurance techniques for developers.

Charles Weir Ingolf Becker James Noble Lynne Blair M. Angela Sasse Awais Rashid

Automated industrial IoT-device integration using the OpenPnP reference architecture.

Heiko Koziolek Andreas Burger Marie Platenius-Mohr Julius Rückert Francisco Mendoza Roland Braun

Does your code need comment?

Yuan Huang Nan Jia Junhuai Shu Xinyu Hu Xiangping Chen Qiang Zhou

DevDocOps: Enabling continuous documentation in alignment with DevOps.

Guoping Rong Zefeng Jin He Zhang Youwen Zhang Wenhua Ye Dong Shao

Automatic recommendation to appropriate log levels.

Taeyoung Kim Suntae Kim Sooyong Park YoungBeom Park

Introduction to the special issue on software engineering in practice.

Judith Bishop Kendra M. L. Cooper Helen Sharp Michael W. Whalen


Volume 50, Number 2, February 2020
Adaptive Markov-based approach for dynamic virtual machine consolidation in cloud data centers with quality-of-service constraints.

Hossein Monshizadeh Naeen Esmaeil Zeinali Khosraghi Abolfazl Toroghi Haghighat

Effective and efficient Java-type obfuscation.

Christophe Foket Koen De Bosschere Bjorn De Sutter

A deep recurrent Q network towards self-adapting distributed microservice architecture.

Basel Magableh Muder Almiani

Domain-specific visualization system based on automatic multiseed recommendations: Extracting stratigraphic structures.

Richen Liu Genlin Ji Mingjun Su

Base64 encoding and decoding at almost the speed of a memory copy.

Wojciech Mula Daniel Lemire


Volume 50, Number 1, January 2020
Medical social network content analysis for medical image retrieval purpose.

Mouhamed Gaith Ayadi Riadh Bouslimi Jalel Akaichi

Torii: An aspect-based sentiment analysis system that can mine conditions.

Fernando O. Gallego Rafael Corchuelo

IBFET: Index-based features extraction technique for scalable code clone detection at file level granularity.

Junaid Akram Majid Mumtaz Ping Luo

Flexible service consolidation with nested virtualization and library operating systems.

Kenichi Kourai Kouta Sannomiya