Andriy V. Miranskyy
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – today
- 2019
- [j10]Lei Zhang
, Diego Lai, Andriy V. Miranskyy:
The impact of position errors on crowd simulation. Simulation Modelling Practice and Theory 90: 45-63 (2019) - [c37]Andriy V. Miranskyy, Lei Zhang:
On testing quantum programs. ICSE (NIER) 2019: 57-60 - [c36]William Pourmajidi, Lei Zhang, John Steinbacher, Tony Erwin, Andriy V. Miranskyy:
Immutable log storage as a service. ICSE (Companion Volume) 2019: 280-281 - [c35]Sravya Polisetty, Andriy V. Miranskyy, Ayse Basar:
On Usefulness of the Deep-Learning-Based Bug Localization Models to Practitioners. PROMISE 2019: 16-25 - [i19]Lei Zhang, Sean Howard, Tom Montpool, Jessica Moore, Krittika Mahajan, Andriy V. Miranskyy:
RESTORE: Automated Regression Testing for Datasets. CoRR abs/1903.03676 (2019) - [i18]William Pourmajidi, Andriy V. Miranskyy, John Steinbacher, Tony Erwin, David Godwin:
Dogfooding: use IBM Cloud services to monitor IBM Cloud infrastructure. CoRR abs/1907.06094 (2019) - [i17]Sravya Polisetty, Andriy V. Miranskyy, Ayse Bener:
On Usefulness of the Deep-Learning-Based Bug Localization Models to Practitioners. CoRR abs/1907.08588 (2019) - [i16]Lei Zhang, Andriy V. Miranskyy, Walid Rjaibi:
Quantum Advantage and Y2K Bug: Comparison. CoRR abs/1907.10454 (2019) - [i15]William Pourmajidi, Lei Zhang, John Steinbacher, Tony Erwin, Andriy V. Miranskyy:
Immutable Log Storage as a Service. CoRR abs/1908.10944 (2019) - 2018
- [j9]Hongyu Zhang, Andriy V. Miranskyy, Ayse Basar Bener:
Editorial: Special Section on Best Papers of PROMISE 2016. Information & Software Technology 95: 295 (2018) - [j8]Andriy V. Miranskyy
, Zainab Al-zanbouri, David Godwin, Ayse Basar Bener:
Database engines: Evolution of greenness. Journal of Software: Evolution and Process 30(4) (2018) - [j7]Mayy Habayeb
, Syed Shariyar Murtaza, Andriy V. Miranskyy
, Ayse Basar Bener:
On the Use of Hidden Markov Model to Predict the Time to Fix Bugs. IEEE Trans. Software Eng. 44(12): 1224-1244 (2018) - [c34]William Pourmajidi, Andriy V. Miranskyy:
Logchain: Blockchain-Assisted Log Storage. IEEE CLOUD 2018: 978-982 - [c33]Sheik Hoque, Andriy V. Miranskyy:
Architecture for Analysis of Streaming Data. IC2E 2018: 263-269 - [c32]Sheik Hoque, Andriy V. Miranskyy:
Online and Offline Analysis of Streaming Data. ICSA Companion 2018: 68-71 - [c31]Mayy Habayeb, Syed Shariyar Murtaza, Andriy V. Miranskyy, Ayse Basar Bener:
On the use of hidden Markov model to predict the time to fix bugs. ICSE 2018: 700 - [c30]Sedef Akinli Koçak, Gülfem Isiklar Alptekin, Andriy V. Miranskyy, Ayse Bener, Enzo Cialini:
An Empirical Evaluation of Database Software Features on Energy Consumption. ICT4S 2018: 1-19 - [c29]Mujahid Sultan
, Andriy V. Miranskyy:
Ordering stakeholder viewpoint concerns for holistic enterprise architecture: the W6H framework. SAC 2018: 78-85 - [i14]Sheik Hoque, Andriy V. Miranskyy:
Online and Offline Analysis of Streaming Data. CoRR abs/1805.01021 (2018) - [i13]Sheik Hoque, Andriy V. Miranskyy:
Architecture for Analysis of Streaming Data. CoRR abs/1805.01025 (2018) - [i12]William Pourmajidi, Andriy V. Miranskyy:
Logchain: Blockchain-assisted Log Storage. CoRR abs/1805.08868 (2018) - [i11]William Pourmajidi, John Steinbacher, Tony Erwin, Andriy V. Miranskyy:
On Challenges of Cloud Monitoring. CoRR abs/1806.05914 (2018) - [i10]Lei Zhang, Diego Lai, Andriy V. Miranskyy:
The Impact of Position Errors on Crowd Simulation. CoRR abs/1810.11131 (2018) - [i9]Andriy V. Miranskyy, Lei Zhang:
On Testing Quantum Programs. CoRR abs/1812.09261 (2018) - 2017
- [c28]Parisa Lak, Can Kavaklioglu, Mefta Sadat, Martin Petitclerc, Graham Wills, Andriy V. Miranskyy, Ayse Basar Bener:
A probabilistic approach for modelling user preferences in recommender systems: a case study on IBM watson analytics. CASCON 2017: 38-47 - [c27]William Pourmajidi, John Steinbacher, Tony Erwin, Andriy V. Miranskyy:
On Challenges of Cloud Monitoring. CASCON 2017: 259-265 - [c26]Domenic Curro, Konstantinos G. Derpanis, Andriy V. Miranskyy:
Building Usage Profiles Using Deep Neural Nets. ICSE-NIER 2017: 43-46 - [c25]Mefta Sadat, Ayse Basar Bener, Andriy V. Miranskyy:
Rediscovery datasets: connecting duplicate reports. MSR 2017: 527-530 - [i8]Andriy V. Miranskyy, Zainab Al-zanbouri, David Godwin, Ayse Basar Bener:
Database Engines: Evolution of Greenness. CoRR abs/1701.02344 (2017) - [i7]Domenic Curro, Konstantinos G. Derpanis, Andriy V. Miranskyy:
Building Usage Profiles Using Deep Neural Nets. CoRR abs/1702.07424 (2017) - [i6]Mefta Sadat, Ayse Basar Bener, Andriy V. Miranskyy:
Rediscovery Datasets: Connecting Duplicate Reports. CoRR abs/1703.06337 (2017) - 2016
- [j6]Andriy V. Miranskyy, Abdelwahab Hamou-Lhadj, Enzo Cialini, Alf Larsson:
Operational-Log Analysis for Big Data Systems: Challenges and Solutions. IEEE Software 33(2): 52-59 (2016) - [c24]Biruk K. Habtemariam, Andriy V. Miranskyy, Ali Miri, Saeed Samet
, Matthew Davison:
Privacy Preserving Predictive Analytics with Smart Meters. BigData Congress 2016: 190-197 - [c23]Parisa Lak, Mefta Sadat, Carl Julien Barrelet, Martin Petitclerc, Andriy V. Miranskyy, Craig Statchuk, Ayse Basar Bener:
Preliminary investigation on user interaction with IBM watson analytics. CASCON 2016: 218-225 - [c22]Shirin Akbarinasaji, Behjat Soltanifar, Bora Çaglayan, Ayse Basar Bener, Andriy V. Miranskyy, Asli Filiz, Bryan M. Kramer, Ayse Tosun:
A metric suite proposal for logical dependency. WETSoM@ICSE 2016: 57-63 - [c21]Sokratis Tsakiltsidis, Andriy V. Miranskyy, Elie Mazzawi:
On Automatic Detection of Performance Bugs. ISSRE Workshops 2016: 132-139 - [i5]Sokratis Tsakiltsidis, Andriy V. Miranskyy, Elie Mazzawi:
Towards Automated Performance Bug Identification in Python. CoRR abs/1607.08506 (2016) - 2015
- [j5]Bora Caglayan, Ayse Tosun Misirli, Ayse Basar Bener, Andriy V. Miranskyy:
Predicting defective modules in different test phases. Software Quality Journal 23(2): 205-227 (2015) - [c20]Craig Statchuk, Nazim H. Madhavji, Andriy V. Miranskyy, Frank Dehne:
Taming a Tiger: software engineering in the era of big data & continuous development. CASCON 2015: 303-306 - [c19]Nazim H. Madhavji, Andriy V. Miranskyy, Kostas Kontogiannis:
Big Picture of Big Data Software Engineering: With Example Research Challenges. BIGDSE@ICSE 2015: 11-14 - [c18]Bora Caglayan, Burak Turhan
, Ayse Basar Bener, Mayy Habayeb, Andriy V. Miranskyy, Enzo Cialini:
Merits of Organizational Metrics in Defect Prediction: An Industrial Replication. ICSE (2) 2015: 89-98 - [c17]Burak Turhan
, Ayse Basar Bener, Rachel Harrison, Andriy V. Miranskyy, Çetin Meriçli, Leandro L. Minku
:
4th International Workshop on Realizing AI Synergies in Software Engineering (RAISE 2015). ICSE (2) 2015: 991-992 - [c16]Mayy Habayeb, Andriy V. Miranskyy, Syed Shariyar Murtaza, Leotis Buchanan, Ayse Bener:
The Firefox Temporal Defect Dataset. MSR 2015: 498-501 - [c15]Mujahid Sultan
, Andriy V. Miranskyy:
Ordering interrogative questions for effective requirements engineering: The W6H pattern. RePa@RE 2015: 1-8 - [i4]Mujahid Sultan, Andriy V. Miranskyy:
Ordering Interrogative Questions for Effective Requirements Engineering: The W6H Pattern. CoRR abs/1508.01954 (2015) - [i3]Mujahid Sultan, Andriy V. Miranskyy:
Ordering stakeholder viewpoint concerns for holistic and incremental Enterprise Architecture: the W6H framework. CoRR abs/1509.07360 (2015) - 2014
- [j4]Ayse Basar Bener, Maurizio Morisio, Andriy V. Miranskyy:
Green Software. IEEE Software 31(3): 36-39 (2014) - [j3]Ayse Basar Bener, Andriy V. Miranskyy, Steve Raspudic:
Deploying and Provisioning Green Software. IEEE Software 31(3): 76-78 (2014) - [c14]Andriy V. Miranskyy, Bora Caglayan, Ayse Bener, Enzo Cialini:
Effect of temporal collaboration network, maintenance activity, and experience on defect exposure. ESEM 2014: 27:1-27:8 - [c13]Bora Çaglayan, Ayse Basar Bener, Andriy V. Miranskyy:
Factors affecting team evolution during software projects. CHASE 2014: 16-23 - [e2]Xavier Franch, Nazim H. Madhavji, P. C. Anitha, Andriy V. Miranskyy:
Proceedings of the 2nd International Workshop on Conducting Empirical Studies in Industry, CESI 2014, Hyderabad, India, June 2, 2014. ACM 2014, ISBN 978-1-4503-2843-2 [contents] - [e1]Burak Turhan, Ayse Basar Bener, Çetin Meriçli, Andriy V. Miranskyy, Leandro L. Minku:
3rd International Workshop on Realizing Artificial Intelligence Synergies in Software Engineering, RAISE 2014, Hyderabad, India, June 3, 2014. ACM 2014, ISBN 978-1-4503-2846-3 [contents] - 2013
- [c12]Bora Caglayan, Ayse Basar Bener, Andriy V. Miranskyy:
Emergence of developer teams in the collaboration network. CHASE@ICSE 2013: 33-40 - 2012
- [j2]Andriy V. Miranskyy, Matthew Davison
, R. Mark Reesor, Syed Shariyar Murtaza:
Using entropy measures for comparison of software traces. Inf. Sci. 203: 59-72 (2012) - [c11]Bora Caglayan, Ayse Tosun Misirli, Andriy V. Miranskyy, Burak Turhan
, Ayse Bener:
Factors characterizing reopened issues: a case study. PROMISE 2012: 1-10 - 2011
- [j1]Zude Li, Nazim H. Madhavji, Syed Shariyar Murtaza, Mechelle Gittens, Andriy V. Miranskyy, David Godwin, Enzo Cialini:
Characteristics of multiple-component defects and architectural hotspots: a large system case study. Empirical Software Engineering 16(5): 667-702 (2011) - [c10]Ayse Tosun Misirli, Bora Çaglayan, Andriy V. Miranskyy, Ayse Bener, Nuzio Ruffolo:
Different strokes for different folks: a case study on software metrics for different defect categories. WETSoM 2011: 45-51 - [c9]Colin A. Taylor, Andriy V. Miranskyy, Nazim H. Madhavji:
Request-implementation ratio as an indicator for requirements prioritisation imbalance. IWSPM 2011: 3-6 - [i2]Andriy V. Miranskyy, Matthew Davison, Mark Reesor:
Metrics of Risk Associated with Defects Rediscovery. CoRR abs/1107.4016 (2011) - 2010
- [c8]Bora Caglayan, Ayse Tosun, Andriy V. Miranskyy, Ayse Basar Bener, Nuzio Ruffolo:
Usage of multiple prediction models based on defect categories. PROMISE 2010: 8 - [i1]Andriy V. Miranskyy, Matthew Davison, Mark Reesor, Syed Shariyar Murtaza:
Using entropy measures for comparison of software traces. CoRR abs/1010.5537 (2010)
2000 – 2009
- 2009
- [c7]Zude Li, Mechelle Gittens, Syed Shariyar Murtaza, Nazim H. Madhavji, Andriy V. Miranskyy, David Godwin, Enzo Cialini:
Analysis of pervasive multiple-component defects in a large software system. ICSM 2009: 265-273 - [c6]Andriy V. Miranskyy, Enzo Cialini, David Godwin:
Selection of customers for operational and usage profiling. DBTest 2009 - 2008
- [c5]Andriy V. Miranskyy, Nazim H. Madhavji, Mechelle Gittens, Matthew Davison
, Mark Wilding, David Godwin, Colin A. Taylor:
SIFT: a scalable iterative-unfolding technique for filtering execution traces. CASCON 2008: 21 - [c4]Colin A. Taylor, Mechelle Gittens, Andriy V. Miranskyy:
A case study in database reliability: component types, usage profiles, and testing. DBTest 2008: 11 - 2007
- [c3]Andriy V. Miranskyy, Nazim H. Madhavji, Mechelle Gittens, Matthew Davison
, Mark Wilding, David Godwin:
An iterative, multi-level, and scalable approach to comparing execution traces. ESEC/SIGSOFT FSE 2007: 537-540 - [c2]Andriy V. Miranskyy, Nazim H. Madhavji, Mechelle Gittens, Matthew Davison, Mark Wilding, David Godwin:
An iterative, multi-level, and scalable approach to comparing execution traces. ESEC/SIGSOFT FSE (Companion) 2007: 537-540 - 2005
- [c1]Andriy V. Miranskyy, Nazim H. Madhavji, Matthew Davison, Mark Reesor:
Modelling Assumptions and Requirements in the Context of Project Risk. RE 2005: 471-472
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org and opencitations.net to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy.
Citation data
Add a list of citing articles from to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter accout. At the same time, Twitter will persitently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2019-10-20 23:29 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint