default search action
Search dblp for Publications
export results for "stream:streams/journals/ac:"
@article{DBLP:journals/ac/0001L24, author = {Pan Zheng and Bee Theng Lau}, title = {Chapter Seven - Internet of things and data science methods for enhanced data processing}, journal = {Adv. Comput.}, volume = {133}, pages = {181--199}, year = {2024}, url = {https://doi.org/10.1016/bs.adcom.2023.10.006}, doi = {10.1016/BS.ADCOM.2023.10.006}, timestamp = {Tue, 20 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ac/0001L24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/DavidA24, author = {Preetha Evangeline David and P. Anandhakumar}, title = {Chapter One - Why is implementing computational intelligence for social good so challenging? Principles and its application}, journal = {Adv. Comput.}, volume = {132}, pages = {1--17}, year = {2024}, url = {https://doi.org/10.1016/bs.adcom.2023.08.001}, doi = {10.1016/BS.ADCOM.2023.08.001}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ac/DavidA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/DavidA24a, author = {Preetha Evangeline David and P. Anandhakumar}, title = {Chapter Five - Articulating the power of reasoning and gathering data for information security and justice}, journal = {Adv. Comput.}, volume = {132}, pages = {67--83}, year = {2024}, url = {https://doi.org/10.1016/bs.adcom.2023.08.003}, doi = {10.1016/BS.ADCOM.2023.08.003}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ac/DavidA24a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/DavidA24b, author = {Preetha Evangeline David and P. Anandhakumar}, title = {Chapter Twelve - ClubNet: Deep learning model for computation, calibration and estimation of biotic stress in crops}, journal = {Adv. Comput.}, volume = {132}, pages = {235--250}, year = {2024}, url = {https://doi.org/10.1016/bs.adcom.2023.08.004}, doi = {10.1016/BS.ADCOM.2023.08.004}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ac/DavidA24b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/DavidCA24, author = {Preetha Evangeline David and Pethuru Raj Chelliah and P. Anandhakumar}, title = {Chapter Nine - Reshaping agriculture using intelligent edge computing}, journal = {Adv. Comput.}, volume = {132}, pages = {167--204}, year = {2024}, url = {https://doi.org/10.1016/bs.adcom.2023.08.007}, doi = {10.1016/BS.ADCOM.2023.08.007}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ac/DavidCA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/DavidMA24, author = {Preetha Evangeline David and S. Malathi and P. Anandhakumar}, title = {Chapter Thirteen - Automatic programming (source code generator) based on an ontological model}, journal = {Adv. Comput.}, volume = {132}, pages = {251--272}, year = {2024}, url = {https://doi.org/10.1016/bs.adcom.2023.08.008}, doi = {10.1016/BS.ADCOM.2023.08.008}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ac/DavidMA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/DavidS24, author = {Preetha Evangeline David and Atma Sahu}, title = {Chapter Eight - Cyber data trend and intelligent computing}, journal = {Adv. Comput.}, volume = {132}, pages = {141--165}, year = {2024}, url = {https://doi.org/10.1016/bs.adcom.2023.08.005}, doi = {10.1016/BS.ADCOM.2023.08.005}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ac/DavidS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/DavidVA24, author = {Preetha Evangeline David and V. Vivek and P. Anandhakumar}, title = {Chapter Eleven - Delineating computational intelligence during epidemic emergencies and outbreaks}, journal = {Adv. Comput.}, volume = {132}, pages = {219--234}, year = {2024}, url = {https://doi.org/10.1016/bs.adcom.2023.10.001}, doi = {10.1016/BS.ADCOM.2023.10.001}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ac/DavidVA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Edward24, author = {V. Cephas Paul Edward}, title = {Chapter Two - Smart crisis management system for road accidents based on Modified Convolutional Neural Networks-Particle Swarm Optimization hybrid algorithm}, journal = {Adv. Comput.}, volume = {132}, pages = {19--31}, year = {2024}, url = {https://doi.org/10.1016/bs.adcom.2023.07.002}, doi = {10.1016/BS.ADCOM.2023.07.002}, timestamp = {Tue, 20 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ac/Edward24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/JayaramanATC24, author = {Ashok Kumar Jayaraman and Gayathri Ananthakrishnan and Tina Esther Trueman and Erik Cambria}, title = {Chapter Four - Text-based personality prediction using XLNet}, journal = {Adv. Comput.}, volume = {132}, pages = {49--65}, year = {2024}, url = {https://doi.org/10.1016/bs.adcom.2023.08.002}, doi = {10.1016/BS.ADCOM.2023.08.002}, timestamp = {Tue, 20 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ac/JayaramanATC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/KhanFTQAAA0A00A24, author = {Muhammad Zakir Khan and Muhammad Farooq and Ahmad Taha and Adnan Qayyum and Fehaid Alqahtani and Adnan Nadeem AlHassan and Kamran Arshad and Khaled Assaleh and Shuja Ansari and Muhammad Usman and Muhammad Ali Imran and Qammer H. Abbasi}, title = {Chapter Three - Indoor localization technologies for activity-assisted living: Opportunities, challenges, and future directions}, journal = {Adv. Comput.}, volume = {133}, pages = {59--98}, year = {2024}, url = {https://doi.org/10.1016/bs.adcom.2023.11.001}, doi = {10.1016/BS.ADCOM.2023.11.001}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ac/KhanFTQAAA0A00A24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/KopackovaH24, author = {Hana Kopackova and Miloslav Hub}, title = {Chapter Five - Usability evaluation for the IoT use in Enhanced Living Environments}, journal = {Adv. Comput.}, volume = {133}, pages = {127--151}, year = {2024}, url = {https://doi.org/10.1016/bs.adcom.2023.10.004}, doi = {10.1016/BS.ADCOM.2023.10.004}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ac/KopackovaH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/KuppuswamyK24, author = {Sathiyamurthy Kuppuswamy and Lakshminarayana Kodavali}, title = {Chapter Six - Bayesian network-based quality assessment of blockchain smart contracts}, journal = {Adv. Comput.}, volume = {132}, pages = {85--110}, year = {2024}, url = {https://doi.org/10.1016/bs.adcom.2023.07.004}, doi = {10.1016/BS.ADCOM.2023.07.004}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ac/KuppuswamyK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/LiuHXL24, author = {Jie Liu and Hanyang Hu and Weiguo Xu and Dan Luo}, title = {Chapter Eight - Internet of things challenges and future scope for enhanced living environments}, journal = {Adv. Comput.}, volume = {133}, pages = {201--246}, year = {2024}, url = {https://doi.org/10.1016/bs.adcom.2023.10.007}, doi = {10.1016/BS.ADCOM.2023.10.007}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ac/LiuHXL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/LukeDA24, author = {K. A. Alex Luke and Preetha Evangeline David and P. Anandhakumar}, title = {Chapter Seven - Short-term wind power prediction using deep learning approaches}, journal = {Adv. Comput.}, volume = {132}, pages = {111--139}, year = {2024}, url = {https://doi.org/10.1016/bs.adcom.2023.08.006}, doi = {10.1016/BS.ADCOM.2023.08.006}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ac/LukeDA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Marques24, author = {Gon{\c{c}}alo Marques}, title = {Preface}, journal = {Adv. Comput.}, volume = {133}, pages = {xiii--xvi}, year = {2024}, url = {https://doi.org/10.1016/S0065-2458(24)00020-2}, doi = {10.1016/S0065-2458(24)00020-2}, timestamp = {Tue, 20 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ac/Marques24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/MoralesSOC24, author = {Anal{\'{u}}cia Schiaffino Morales and Ione Jayce Ceola Schneider and Fabr{\'{\i}}cio de Oliveira Ourique and S{\'{\i}}lvio C{\'{e}}sar Cazella}, title = {Chapter Six - Internet of Things to enhanced living and care environments for elderly: Applications and challenges}, journal = {Adv. Comput.}, volume = {133}, pages = {153--180}, year = {2024}, url = {https://doi.org/10.1016/bs.adcom.2023.10.005}, doi = {10.1016/BS.ADCOM.2023.10.005}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ac/MoralesSOC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/MuthurajkumarRK24, author = {S. Muthurajkumar and B. Rahul and L. S. Sanjay Kumar and E. Gokkul}, title = {Chapter Ten - An automatic path navigation for visually challenged people using deep {Q} learning}, journal = {Adv. Comput.}, volume = {132}, pages = {205--218}, year = {2024}, url = {https://doi.org/10.1016/bs.adcom.2023.07.005}, doi = {10.1016/BS.ADCOM.2023.07.005}, timestamp = {Tue, 20 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ac/MuthurajkumarRK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/RamyaR24, author = {G. Ramya and R. Ramaprabha}, title = {Chapter Three - Residential energy management system {(REMS)} using machine learning}, journal = {Adv. Comput.}, volume = {132}, pages = {33--47}, year = {2024}, url = {https://doi.org/10.1016/bs.adcom.2023.07.003}, doi = {10.1016/BS.ADCOM.2023.07.003}, timestamp = {Tue, 20 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ac/RamyaR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/SainiDM24, author = {Jagriti Saini and Maitreyee Dutta and Gon{\c{c}}alo Marques}, title = {Chapter Four - Smart indoor air quality monitoring for enhanced living environments and ambient assisted living}, journal = {Adv. Comput.}, volume = {133}, pages = {99--125}, year = {2024}, url = {https://doi.org/10.1016/bs.adcom.2023.10.008}, doi = {10.1016/BS.ADCOM.2023.10.008}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ac/SainiDM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Sanchez-GarciaD24, author = {Rosario S{\'{a}}nchez{-}Garc{\'{\i}}a and Alejandro Dominguez{-}Rodriguez and Violeta Ocegueda{-}Miramontes and Leocundo Aguilar and Antonio Rodr{\'{\i}}guez{-}D{\'{\i}}az and Sergio Cervera{-}Torres and Mauricio A. Sanchez}, title = {Chapter Two - Human behavioral anomaly pattern mining within an IoT environment: An exploratory study}, journal = {Adv. Comput.}, volume = {133}, pages = {33--57}, year = {2024}, url = {https://doi.org/10.1016/bs.adcom.2023.10.003}, doi = {10.1016/BS.ADCOM.2023.10.003}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ac/Sanchez-GarciaD24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/WickramanayakeR24, author = {Sandareka Wickramanayake and Sanka Rasnayaka and Madushika Gamage and Dulani Meedeniya and Indika Perera}, title = {Chapter One - Explainable artificial intelligence for enhanced living environments: {A} study on user perspective}, journal = {Adv. Comput.}, volume = {133}, pages = {1--32}, year = {2024}, url = {https://doi.org/10.1016/bs.adcom.2023.10.002}, doi = {10.1016/BS.ADCOM.2023.10.002}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ac/WickramanayakeR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/AgrawalM23, author = {Divyansh Agrawal and Sachin Minocha}, title = {Chapter Eight - Securing confidential data in the cloud environment by using {DNA} computing}, journal = {Adv. Comput.}, volume = {129}, pages = {281--316}, year = {2023}, url = {https://doi.org/10.1016/bs.adcom.2022.08.006}, doi = {10.1016/BS.ADCOM.2022.08.006}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/AgrawalM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/AlhaddadAA23, author = {Ahmed Alhaddad and Anneliese Andrews and Zeinab Abdalla}, title = {Chapter One - FSMApp: Testing mobile apps}, journal = {Adv. Comput.}, volume = {130}, pages = {1--65}, year = {2023}, url = {https://doi.org/10.1016/bs.adcom.2022.09.001}, doi = {10.1016/BS.ADCOM.2022.09.001}, timestamp = {Wed, 12 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/AlhaddadAA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/BhayaPI23, author = {Chiranjeev Bhaya and Arup Kumar Pal and SK Hafizul Islam}, title = {Chapter Four - {A} novel image encryption and decryption scheme by using {DNA} computing}, journal = {Adv. Comput.}, volume = {129}, pages = {129--172}, year = {2023}, url = {https://doi.org/10.1016/bs.adcom.2022.08.010}, doi = {10.1016/BS.ADCOM.2022.08.010}, timestamp = {Mon, 01 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/BhayaPI23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/BiswasB23, author = {Anupam Biswas and Bhaskar Biswas}, title = {Chapter One - {CESDAM:} Centered subgraph data matrix for large graph representation}, journal = {Adv. Comput.}, volume = {128}, pages = {1--38}, year = {2023}, url = {https://doi.org/10.1016/bs.adcom.2021.09.005}, doi = {10.1016/BS.ADCOM.2021.09.005}, timestamp = {Sun, 02 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/BiswasB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/DasB23, author = {Soumita Das and Anupam Biswas}, title = {Chapter Four - Analyzing correlation between quality and accuracy of graph clustering}, journal = {Adv. Comput.}, volume = {128}, pages = {135--163}, year = {2023}, url = {https://doi.org/10.1016/bs.adcom.2021.09.008}, doi = {10.1016/BS.ADCOM.2021.09.008}, timestamp = {Sun, 02 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/DasB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/DevarapalliB23, author = {Ravi Kishore Devarapalli and Anupam Biswas}, title = {Chapter Six - Processing large graphs with an alternative representation}, journal = {Adv. Comput.}, volume = {128}, pages = {185--212}, year = {2023}, url = {https://doi.org/10.1016/bs.adcom.2021.10.001}, doi = {10.1016/BS.ADCOM.2021.10.001}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/DevarapalliB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/DeviRK23, author = {P. Bharathi Devi and P. Ravindra and R. Kiran Kumar}, title = {Chapter Five - Hiding information in an image using {DNA} cryptography}, journal = {Adv. Comput.}, volume = {129}, pages = {173--210}, year = {2023}, url = {https://doi.org/10.1016/bs.adcom.2022.08.003}, doi = {10.1016/BS.ADCOM.2022.08.003}, timestamp = {Sun, 02 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/DeviRK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/FernandesDC23, author = {Maria Fernandes and J{\'{e}}r{\'{e}}mie Decouchant and Francisco M. Couto}, title = {Chapter Two - Security, privacy, and trust management in {DNA} computing}, journal = {Adv. Comput.}, volume = {129}, pages = {39--81}, year = {2023}, url = {https://doi.org/10.1016/bs.adcom.2022.08.009}, doi = {10.1016/BS.ADCOM.2022.08.009}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/FernandesDC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/GaoX23, author = {Jiechao Gao and Tiange Xie}, title = {Chapter Three - {DNA} computing in cryptography}, journal = {Adv. Comput.}, volume = {129}, pages = {83--128}, year = {2023}, url = {https://doi.org/10.1016/bs.adcom.2022.08.002}, doi = {10.1016/BS.ADCOM.2022.08.002}, timestamp = {Sun, 02 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/GaoX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/GebreegziabherP23, author = {Fitsum Gebreegziabher and Ripon Patgiri}, title = {Chapter Sixteen - The major challenges of big graph and their solutions: {A} review}, journal = {Adv. Comput.}, volume = {128}, pages = {399--421}, year = {2023}, url = {https://doi.org/10.1016/bs.adcom.2021.10.010}, doi = {10.1016/BS.ADCOM.2021.10.010}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/GebreegziabherP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/GuertinH23, author = {Tim Guertin and Ali R. Hurson}, title = {Chapter Four - The multicore architecture}, journal = {Adv. Comput.}, volume = {130}, pages = {139--162}, year = {2023}, url = {https://doi.org/10.1016/bs.adcom.2022.09.003}, doi = {10.1016/BS.ADCOM.2022.09.003}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ac/GuertinH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/GunasekaranK23, author = {Sathish Gunasekaran and Manish Kumar}, title = {Chapter Nine - Secure data communication using {DNA} computing adaptable to wireless sensor network}, journal = {Adv. Comput.}, volume = {129}, pages = {317--361}, year = {2023}, url = {https://doi.org/10.1016/bs.adcom.2022.08.008}, doi = {10.1016/BS.ADCOM.2022.08.008}, timestamp = {Sun, 02 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/GunasekaranK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Hurson23, author = {Ali R. Hurson}, title = {Preface}, journal = {Adv. Comput.}, volume = {130}, pages = {ix--x}, year = {2023}, url = {https://doi.org/10.1016/S0065-2458(23)00034-7}, doi = {10.1016/S0065-2458(23)00034-7}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ac/Hurson23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Hurson23a, author = {Ali R. Hurson}, title = {Preface}, journal = {Advances in Computers}, volume = {131}, pages = {xi--xii}, year = {2023}, url = {https://doi.org/10.1016/S0065-2458(23)00065-7}, doi = {10.1016/S0065-2458(23)00065-7}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ac/Hurson23a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/KadiyalaP23, author = {V. S. Nageswara Rao Kadiyala and Ripon Patgiri}, title = {Chapter Seventeen - An investigation on socio-cyber crime graph}, journal = {Adv. Comput.}, volume = {128}, pages = {423--443}, year = {2023}, url = {https://doi.org/10.1016/bs.adcom.2021.10.011}, doi = {10.1016/BS.ADCOM.2021.10.011}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/KadiyalaP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/KhanLAA23, author = {Samiya Khan and Xiufeng Liu and Syed Arshad Ali and Mansaf Alam}, title = {Chapter Two - Bivariate, cluster, and suitability analysis of NoSQL solutions for big graph applications}, journal = {Adv. Comput.}, volume = {128}, pages = {39--105}, year = {2023}, url = {https://doi.org/10.1016/bs.adcom.2021.09.006}, doi = {10.1016/BS.ADCOM.2021.09.006}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ac/KhanLAA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/KingJBS23, author = {Justin L. King and Elanor Jackson and Curtis Brinker and Sahra Sedigh Sarvestani}, title = {Chapter Two - Wheel tracks, rutting a new Oregon Trail: {A} survey of autonomous vehicle cybersecurity and survivability analysis research}, journal = {Adv. Comput.}, volume = {130}, pages = {67--106}, year = {2023}, url = {https://doi.org/10.1016/bs.adcom.2022.12.002}, doi = {10.1016/BS.ADCOM.2022.12.002}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/KingJBS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/KumarN23, author = {Tarun Kumar and Suyel Namasudra}, title = {Chapter One - Introduction to {DNA} computing}, journal = {Adv. Comput.}, volume = {129}, pages = {1--38}, year = {2023}, url = {https://doi.org/10.1016/bs.adcom.2022.08.001}, doi = {10.1016/BS.ADCOM.2022.08.001}, timestamp = {Sun, 02 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/KumarN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Kushwaha23, author = {Rahul Chandra Kushwaha}, title = {Chapter Twelve - Big graph based online learning through social networks}, journal = {Adv. Comput.}, volume = {128}, pages = {313--328}, year = {2023}, url = {https://doi.org/10.1016/bs.adcom.2021.10.012}, doi = {10.1016/BS.ADCOM.2021.10.012}, timestamp = {Sun, 02 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Kushwaha23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/MakinaLR23, author = {Hela Makina and Asma Ben Letaifa and Abderazek Rachedi}, title = {Chapter One - eHealth: Enabling technologies, opportunities and challenges}, journal = {Advances in Computers}, volume = {131}, pages = {1--47}, year = {2023}, url = {https://doi.org/10.1016/bs.adcom.2023.04.001}, doi = {10.1016/BS.ADCOM.2023.04.001}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/MakinaLR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/MathewM23, author = {Arul Treesa Mathew and Prasanna Mani}, title = {Chapter Five - Collaborating fog/edge computing with industry 4.0 - Architecture, challenges and benefits}, journal = {Advances in Computers}, volume = {131}, pages = {181--200}, year = {2023}, url = {https://doi.org/10.1016/bs.adcom.2023.06.001}, doi = {10.1016/BS.ADCOM.2023.06.001}, timestamp = {Wed, 13 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/MathewM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/MinochaN23, author = {Sachin Minocha and Suyel Namasudra}, title = {Chapter Ten - Research challenges and future work directions in {DNA} computing}, journal = {Adv. Comput.}, volume = {129}, pages = {363--387}, year = {2023}, url = {https://doi.org/10.1016/bs.adcom.2022.08.007}, doi = {10.1016/BS.ADCOM.2022.08.007}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/MinochaN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Namasudra23, author = {Suyel Namasudra}, title = {Preface}, journal = {Adv. Comput.}, volume = {129}, pages = {xi--xii}, year = {2023}, url = {https://doi.org/10.1016/S0065-2458(23)00023-2}, doi = {10.1016/S0065-2458(23)00023-2}, timestamp = {Sun, 02 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Namasudra23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/NayakP23, author = {Sabuzima Nayak and Ripon Patgiri}, title = {Chapter Five - geneBF: Filtering protein-coded gene graph data using Bloom filter}, journal = {Adv. Comput.}, volume = {128}, pages = {165--183}, year = {2023}, url = {https://doi.org/10.1016/bs.adcom.2021.09.009}, doi = {10.1016/BS.ADCOM.2021.09.009}, timestamp = {Mon, 01 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/NayakP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/NayyerRH23, author = {Muhammad Ziad Nayyer and Imran Raza and Syed Asad Hussain}, title = {Chapter Three - ClPyZ: {A} testbed for cloudlet federation}, journal = {Adv. Comput.}, volume = {130}, pages = {107--138}, year = {2023}, url = {https://doi.org/10.1016/bs.adcom.2022.09.002}, doi = {10.1016/BS.ADCOM.2022.09.002}, timestamp = {Wed, 12 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/NayyerRH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/PatgiriDB23, author = {Ripon Patgiri and Ganesh Chandra Deka and Anupam Biswas}, title = {Preface}, journal = {Adv. Comput.}, volume = {128}, pages = {xiii}, year = {2023}, url = {https://doi.org/10.1016/S0065-2458(23)00008-6}, doi = {10.1016/S0065-2458(23)00008-6}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/PatgiriDB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/PatnaikP23, author = {U. Kartheek Chandra Patnaik and Ripon Patgiri}, title = {Chapter Seven - MapReduce based convolutional graph neural networks: {A} comprehensive review}, journal = {Adv. Comput.}, volume = {128}, pages = {213--231}, year = {2023}, url = {https://doi.org/10.1016/bs.adcom.2021.10.002}, doi = {10.1016/BS.ADCOM.2021.10.002}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/PatnaikP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/PengJWZW23, author = {Jun Peng and Shangzhu Jin and Yingxu Wang and Xi Zheng and Xiangren Wang}, title = {Chapter Six - The design of a S-box based on {DNA} computing and chaos theories}, journal = {Adv. Comput.}, volume = {129}, pages = {211--248}, year = {2023}, url = {https://doi.org/10.1016/bs.adcom.2022.08.004}, doi = {10.1016/BS.ADCOM.2022.08.004}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ac/PengJWZW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/RavichandranSAK23, author = {Kaushik Ravichandran and Akshara Subramaniasivam and P. S. Aishwarya and N. S. Kumar}, title = {Chapter Eight - Fast exact triangle counting in large graphs using {SIMD} acceleration}, journal = {Adv. Comput.}, volume = {128}, pages = {233--250}, year = {2023}, url = {https://doi.org/10.1016/bs.adcom.2021.10.003}, doi = {10.1016/BS.ADCOM.2021.10.003}, timestamp = {Wed, 05 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/RavichandranSAK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/RayM23, author = {Partha Pratim Ray and Poulami Majumder}, title = {Chapter Two - {A} review on cancer data management using blockchain: Progress and challenges}, journal = {Advances in Computers}, volume = {131}, pages = {49--78}, year = {2023}, url = {https://doi.org/10.1016/bs.adcom.2023.04.002}, doi = {10.1016/BS.ADCOM.2023.04.002}, timestamp = {Wed, 13 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/RayM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/RoyPS23, author = {Arnab Roy and Joseph L. Pachuau and Anish Kumar Saha}, title = {Chapter Ten - Qubit representation of a binary tree and its operations in quantum computation}, journal = {Adv. Comput.}, volume = {128}, pages = {273--286}, year = {2023}, url = {https://doi.org/10.1016/bs.adcom.2021.10.005}, doi = {10.1016/BS.ADCOM.2021.10.005}, timestamp = {Mon, 01 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/RoyPS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/SahaPRB23, author = {Anish Kumar Saha and Joseph L. Pachuau and Arnab Roy and Chandan Tilak Bhunia}, title = {Chapter Fifteen - GA-based energy efficient modeling of a wireless sensor network}, journal = {Adv. Comput.}, volume = {128}, pages = {381--398}, year = {2023}, url = {https://doi.org/10.1016/bs.adcom.2021.10.009}, doi = {10.1016/BS.ADCOM.2021.10.009}, timestamp = {Mon, 01 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/SahaPRB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/SharmaR23, author = {Deepak Sharma and Manojkumar Ramteke}, title = {Chapter Seven - {DNA} computing-based Big Data storage}, journal = {Adv. Comput.}, volume = {129}, pages = {249--279}, year = {2023}, url = {https://doi.org/10.1016/bs.adcom.2022.08.005}, doi = {10.1016/BS.ADCOM.2022.08.005}, timestamp = {Sun, 02 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/SharmaR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/SinghC23, author = {Dhananjay Kumar Singh and Prasenjit Choudhury}, title = {Chapter Thirteen - Community detection in large-scale real-world networks}, journal = {Adv. Comput.}, volume = {128}, pages = {329--352}, year = {2023}, url = {https://doi.org/10.1016/bs.adcom.2021.10.007}, doi = {10.1016/BS.ADCOM.2021.10.007}, timestamp = {Mon, 01 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/SinghC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/SinghaP23, author = {M. Franckie Singha and Ripon Patgiri}, title = {Chapter Nine - {A} comprehensive investigation on attack graphs}, journal = {Adv. Comput.}, volume = {128}, pages = {251--272}, year = {2023}, url = {https://doi.org/10.1016/bs.adcom.2021.10.004}, doi = {10.1016/BS.ADCOM.2021.10.004}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/SinghaP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/SrivastavaVS23, author = {Saurabh Kumar Srivastava and Ankit Vidyarthi and Sandeep Kumar Singh}, title = {Chapter Eleven - Modified {ML-KNN:} Role of similarity measures and nearest neighbor configuration in multi-label text classification on big social network graph data}, journal = {Adv. Comput.}, volume = {128}, pages = {287--312}, year = {2023}, url = {https://doi.org/10.1016/bs.adcom.2021.10.006}, doi = {10.1016/BS.ADCOM.2021.10.006}, timestamp = {Mon, 01 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/SrivastavaVS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/TanqueB23, author = {Marcus Tanque and Phillip G. Bradford}, title = {Chapter Six - Virtual Raspberry Pi-s with blockchain and cybersecurity applications}, journal = {Advances in Computers}, volume = {131}, pages = {201--232}, year = {2023}, url = {https://doi.org/10.1016/bs.adcom.2023.04.005}, doi = {10.1016/BS.ADCOM.2023.04.005}, timestamp = {Wed, 13 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/TanqueB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/TanqueF23, author = {Marcus Tanque and Harry J. Foxwell}, title = {Chapter Three - Cyber risks on IoT platforms and zero trust solutions}, journal = {Advances in Computers}, volume = {131}, pages = {79--148}, year = {2023}, url = {https://doi.org/10.1016/bs.adcom.2023.04.003}, doi = {10.1016/BS.ADCOM.2023.04.003}, timestamp = {Wed, 13 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/TanqueF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/VidyarthiS23, author = {Ankit Vidyarthi and Pawan Singh}, title = {Chapter Fourteen - Power rank: An interactive web page ranking algorithm}, journal = {Adv. Comput.}, volume = {128}, pages = {353--379}, year = {2023}, url = {https://doi.org/10.1016/bs.adcom.2021.10.008}, doi = {10.1016/BS.ADCOM.2021.10.008}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/VidyarthiS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/WaikhomP23, author = {Lilapati Waikhom and Ripon Patgiri}, title = {Chapter Three - An empirical investigation on BigGraph using deep learning}, journal = {Adv. Comput.}, volume = {128}, pages = {107--133}, year = {2023}, url = {https://doi.org/10.1016/bs.adcom.2021.09.007}, doi = {10.1016/BS.ADCOM.2021.09.007}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/WaikhomP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/XiaLCY23, author = {Ming Xia and Siwei Li and Weibing Chen and Gaobo Yang}, title = {Chapter Five - Perceptual image hashing using rotation invariant uniform local binary patterns and color feature}, journal = {Adv. Comput.}, volume = {130}, pages = {163--205}, year = {2023}, url = {https://doi.org/10.1016/bs.adcom.2022.12.001}, doi = {10.1016/BS.ADCOM.2022.12.001}, timestamp = {Wed, 12 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/XiaLCY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/YuanZWW23, author = {Chengsheng Yuan and Qianyue Zhang and Sheng Wu and Q. M. Jonathan Wu}, title = {Chapter Four - {A} realtime fingerprint liveness detection method for fingerprint authentication systems}, journal = {Advances in Computers}, volume = {131}, pages = {149--180}, year = {2023}, url = {https://doi.org/10.1016/bs.adcom.2023.04.004}, doi = {10.1016/BS.ADCOM.2023.04.004}, timestamp = {Wed, 13 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/YuanZWW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/AlazemiCB22, author = {Fawaz Alazemi and Lizhong Chen and Bella Bose}, title = {Chapter Four - Routerless networks-on-chip}, journal = {Adv. Comput.}, volume = {124}, pages = {81--116}, year = {2022}, url = {https://doi.org/10.1016/bs.adcom.2021.11.002}, doi = {10.1016/BS.ADCOM.2021.11.002}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/AlazemiCB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/AnuradhaR22, author = {M. P. Anuradha and K. Lino Fathima Chinna Rani}, title = {Chapter Fourteen - Blockchain technology for IoT edge devices and data security}, journal = {Adv. Comput.}, volume = {127}, pages = {379--412}, year = {2022}, url = {https://doi.org/10.1016/bs.adcom.2022.02.011}, doi = {10.1016/BS.ADCOM.2022.02.011}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/AnuradhaR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Ausavarungnirun22, author = {Rachata Ausavarungnirun and Onur Mutlu}, title = {Chapter Eight - The design of an energy-efficient deflection-based on-chip network}, journal = {Adv. Comput.}, volume = {124}, pages = {257--318}, year = {2022}, url = {https://doi.org/10.1016/bs.adcom.2021.12.002}, doi = {10.1016/BS.ADCOM.2021.12.002}, timestamp = {Mon, 21 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ac/Ausavarungnirun22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/CaretteJS22, author = {Jacques Carette and Roshan P. James and Amr Sabry}, title = {Chapter Two - Embracing the laws of physics: Three reversible models of computation}, journal = {Adv. Comput.}, volume = {126}, pages = {15--63}, year = {2022}, url = {https://doi.org/10.1016/bs.adcom.2021.11.009}, doi = {10.1016/BS.ADCOM.2021.11.009}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/CaretteJS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/ChenE22, author = {Kun{-}Chih Jimmy Chen and Masoumeh Ebrahimi}, title = {Chapter Five - Routing algorithm design for power- and temperature-aware NoCs}, journal = {Adv. Comput.}, volume = {124}, pages = {117--150}, year = {2022}, url = {https://doi.org/10.1016/bs.adcom.2021.11.012}, doi = {10.1016/BS.ADCOM.2021.11.012}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/ChenE22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/FarrokhbakhtHJ22, author = {Hossein Farrokhbakht and Shaahin Hessabi and Natalie D. Enright Jerger}, title = {Chapter Nine - Power-gating in NoCs}, journal = {Adv. Comput.}, volume = {124}, pages = {319--356}, year = {2022}, url = {https://doi.org/10.1016/bs.adcom.2021.11.013}, doi = {10.1016/BS.ADCOM.2021.11.013}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/FarrokhbakhtHJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Hurson22, author = {Ali R. Hurson}, title = {Preface}, journal = {Adv. Comput.}, volume = {126}, pages = {ix--x}, year = {2022}, url = {https://doi.org/10.1016/S0065-2458(22)00054-7}, doi = {10.1016/S0065-2458(22)00054-7}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ac/Hurson22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/HursonS22, author = {Ali R. Hurson and Hamid Sarbazi{-}Azad}, title = {Preface}, journal = {Adv. Comput.}, volume = {124}, pages = {xi--xiv}, year = {2022}, url = {https://doi.org/10.1016/S0065-2458(22)00010-9}, doi = {10.1016/S0065-2458(22)00010-9}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ac/HursonS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/KorolijaBHM22, author = {Nenad Korolija and Dragan Bojic and Ali R. Hurson and Veljko Milutinovic}, title = {Chapter Five - {A} runtime job scheduling algorithm for cluster architectures with dataflow accelerators}, journal = {Adv. Comput.}, volume = {126}, pages = {201--245}, year = {2022}, url = {https://doi.org/10.1016/bs.adcom.2022.01.002}, doi = {10.1016/BS.ADCOM.2022.01.002}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ac/KorolijaBHM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/KotlarPM22, author = {Milos Kotlar and Marija Punt and Veljko Milutinovic}, title = {Chapter Four - Energy efficient implementation of tensor operations using dataflow paradigm for machine learning}, journal = {Adv. Comput.}, volume = {126}, pages = {151--199}, year = {2022}, url = {https://doi.org/10.1016/bs.adcom.2021.11.011}, doi = {10.1016/BS.ADCOM.2021.11.011}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/KotlarPM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/KrishnarajDSB22, author = {N. Krishnaraj and A. Daniel and Kavita Saini and Kiranmai Bellam}, title = {Chapter Fifteen - {EDGE/FOG} computing paradigm: Concept, platforms and toolchains}, journal = {Adv. Comput.}, volume = {127}, pages = {413--436}, year = {2022}, url = {https://doi.org/10.1016/bs.adcom.2022.02.012}, doi = {10.1016/BS.ADCOM.2022.02.012}, timestamp = {Wed, 01 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/KrishnarajDSB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Lotfi-KamranS22, author = {Pejman Lotfi{-}Kamran and Hamid Sarbazi{-}Azad}, title = {Preface}, journal = {Adv. Comput.}, volume = {125}, pages = {ix--x}, year = {2022}, url = {https://doi.org/10.1016/S0065-2458(22)00023-7}, doi = {10.1016/S0065-2458(22)00023-7}, timestamp = {Fri, 18 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ac/Lotfi-KamranS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Lotfi-KamranS22a, author = {Pejman Lotfi{-}Kamran and Hamid Sarbazi{-}Azad}, title = {Chapter One - Introduction to data prefetching}, journal = {Adv. Comput.}, volume = {125}, pages = {1--17}, year = {2022}, url = {https://doi.org/10.1016/bs.adcom.2021.11.003}, doi = {10.1016/BS.ADCOM.2021.11.003}, timestamp = {Fri, 18 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ac/Lotfi-KamranS22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Lotfi-KamranS22b, author = {Pejman Lotfi{-}Kamran and Hamid Sarbazi{-}Azad}, title = {Chapter Two - Spatial prefetching}, journal = {Adv. Comput.}, volume = {125}, pages = {19--29}, year = {2022}, url = {https://doi.org/10.1016/bs.adcom.2021.11.004}, doi = {10.1016/BS.ADCOM.2021.11.004}, timestamp = {Fri, 18 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ac/Lotfi-KamranS22b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Lotfi-KamranS22c, author = {Pejman Lotfi{-}Kamran and Hamid Sarbazi{-}Azad}, title = {Chapter Three - Temporal prefetching}, journal = {Adv. Comput.}, volume = {125}, pages = {31--41}, year = {2022}, url = {https://doi.org/10.1016/bs.adcom.2021.11.005}, doi = {10.1016/BS.ADCOM.2021.11.005}, timestamp = {Fri, 18 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ac/Lotfi-KamranS22c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Lotfi-KamranS22d, author = {Pejman Lotfi{-}Kamran and Hamid Sarbazi{-}Azad}, title = {Chapter Four - Beyond spatial or temporal prefetching}, journal = {Adv. Comput.}, volume = {125}, pages = {43--53}, year = {2022}, url = {https://doi.org/10.1016/bs.adcom.2021.11.006}, doi = {10.1016/BS.ADCOM.2021.11.006}, timestamp = {Fri, 18 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ac/Lotfi-KamranS22d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/MilutinovicKSSS22, author = {Veljko Milutinovic and Milos Kotlar and Jakob Salom and Sasa Stojanovic and Zivojin Sustran and Aleksandar Veljkovic and Jelena Markovic and Ali R. Hurson}, title = {Chapter One - {VLSI} for SuperComputing: Creativity in {R+D} from applications and algorithms to masks and chips}, journal = {Adv. Comput.}, volume = {126}, pages = {1--14}, year = {2022}, url = {https://doi.org/10.1016/bs.adcom.2022.01.001}, doi = {10.1016/BS.ADCOM.2022.01.001}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ac/MilutinovicKSSS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/MirhosseiniSSS22, author = {Amirhossein Mirhosseini and Mohammad Sadrosadati and Behnaz Soltani and Hamid Sarbazi{-}Azad}, title = {Chapter Three - {A} power-performance balanced network-on-chip for mixed {CPU-GPU} systems}, journal = {Adv. Comput.}, volume = {124}, pages = {45--80}, year = {2022}, url = {https://doi.org/10.1016/bs.adcom.2021.09.003}, doi = {10.1016/BS.ADCOM.2021.09.003}, timestamp = {Mon, 21 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ac/MirhosseiniSSS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/ModarressiR22, author = {Mehdi Modarressi and Seyyed Hossein Seyyedaghaei Rezaei}, title = {Chapter Seven - Power-efficient network-on-chip design by partial topology reconfiguration}, journal = {Adv. Comput.}, volume = {124}, pages = {217--255}, year = {2022}, url = {https://doi.org/10.1016/bs.adcom.2021.11.001}, doi = {10.1016/BS.ADCOM.2021.11.001}, timestamp = {Mon, 21 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ac/ModarressiR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/NB22, author = {Jayashree N. and B. Sathish Babu}, title = {Chapter Seven - Edge data analytics technologies and tools}, journal = {Adv. Comput.}, volume = {127}, pages = {209--236}, year = {2022}, url = {https://doi.org/10.1016/bs.adcom.2022.02.004}, doi = {10.1016/BS.ADCOM.2022.02.004}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/NB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/NagarajanSM22, author = {G. Nagarajan and Serin V. Simpson and R. I. Minu}, title = {Chapter Thirteen - Edge computing security: Layered classification of attacks and possible countermeasures}, journal = {Adv. Comput.}, volume = {127}, pages = {359--377}, year = {2022}, url = {https://doi.org/10.1016/bs.adcom.2022.02.010}, doi = {10.1016/BS.ADCOM.2022.02.010}, timestamp = {Wed, 01 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/NagarajanSM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/NigamSK22, author = {Swati Nigam and Urvashi Sugandh and Manju Khari}, title = {Chapter Eighteen - The integration of blockchain and IoT edge devices for smart agriculture: Challenges and use cases}, journal = {Adv. Comput.}, volume = {127}, pages = {507--537}, year = {2022}, url = {https://doi.org/10.1016/bs.adcom.2022.02.015}, doi = {10.1016/BS.ADCOM.2022.02.015}, timestamp = {Mon, 13 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/NigamSK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/RajAM22, author = {Pethuru Raj and J. Akilandeswari and M. Marimuthu}, title = {Chapter Five - The edge {AI} paradigm: Technologies, platforms and use cases}, journal = {Adv. Comput.}, volume = {127}, pages = {139--182}, year = {2022}, url = {https://doi.org/10.1016/bs.adcom.2022.02.003}, doi = {10.1016/BS.ADCOM.2022.02.003}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/RajAM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/RajL22, author = {Pethuru Raj and Jenn{-}Wei Lin}, title = {Chapter One - Exploring the edge {AI} space: Industry use cases}, journal = {Adv. Comput.}, volume = {127}, pages = {1--34}, year = {2022}, url = {https://doi.org/10.1016/bs.adcom.2022.02.001}, doi = {10.1016/BS.ADCOM.2022.02.001}, timestamp = {Wed, 01 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/RajL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Ranganath22, author = {Sunku Ranganath}, title = {Chapter Two - Edge computing: Types and attributes}, journal = {Adv. Comput.}, volume = {127}, pages = {35--62}, year = {2022}, url = {https://doi.org/10.1016/bs.adcom.2022.03.001}, doi = {10.1016/BS.ADCOM.2022.03.001}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Ranganath22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Ranganath22a, author = {Sunku Ranganath}, title = {Chapter Three - Industry initiatives across edge computing}, journal = {Adv. Comput.}, volume = {127}, pages = {63--115}, year = {2022}, url = {https://doi.org/10.1016/bs.adcom.2022.03.002}, doi = {10.1016/BS.ADCOM.2022.03.002}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Ranganath22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Ray22, author = {Partha Pratim Ray}, title = {Chapter Four - IoT-edge analytics for BACON-assisted multivariate health data anomalies}, journal = {Adv. Comput.}, volume = {127}, pages = {117--137}, year = {2022}, url = {https://doi.org/10.1016/bs.adcom.2022.02.002}, doi = {10.1016/BS.ADCOM.2022.02.002}, timestamp = {Wed, 01 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Ray22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/SadrosadatiMAAS22, author = {Mohammad Sadrosadati and Amirhossein Mirhosseini and Negar Akbarzadeh and Homa Aghilinasab and Hamid Sarbazi{-}Azad}, title = {Chapter Two - An efficient {DVS} scheme for on-chip networks}, journal = {Adv. Comput.}, volume = {124}, pages = {21--43}, year = {2022}, url = {https://doi.org/10.1016/bs.adcom.2021.09.002}, doi = {10.1016/BS.ADCOM.2021.09.002}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/SadrosadatiMAAS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/SadrosadatiMAMS22, author = {Mohammad Sadrosadati and Amirhossein Mirhosseini and Negar Akbarzadeh and Mehdi Modarressi and Hamid Sarbazi{-}Azad}, title = {Chapter One - Traffic-load-aware virtual channel power-gating in network-on-chips}, journal = {Adv. Comput.}, volume = {124}, pages = {1--19}, year = {2022}, url = {https://doi.org/10.1016/bs.adcom.2021.09.001}, doi = {10.1016/BS.ADCOM.2021.09.001}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/SadrosadatiMAMS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/SainiPR22, author = {Kavita Saini and Uttama Pandey and Pethuru Raj}, title = {Chapter Nine - Edge computing challenges and concerns}, journal = {Adv. Comput.}, volume = {127}, pages = {259--278}, year = {2022}, url = {https://doi.org/10.1016/bs.adcom.2022.02.006}, doi = {10.1016/BS.ADCOM.2022.02.006}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/SainiPR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/SainiR22, author = {Kavita Saini and Pethuru Raj}, title = {Chapter Eight - Edge platforms, frameworks and applications}, journal = {Adv. Comput.}, volume = {127}, pages = {237--258}, year = {2022}, url = {https://doi.org/10.1016/bs.adcom.2022.02.005}, doi = {10.1016/BS.ADCOM.2022.02.005}, timestamp = {Wed, 01 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/SainiR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/SatheeshkumarSD22, author = {R. Satheeshkumar and Kavita Saini and A. Daniel and Manju Khari}, title = {Chapter Seventeen - 5G - Communication in HealthCare applications}, journal = {Adv. Comput.}, volume = {127}, pages = {485--506}, year = {2022}, url = {https://doi.org/10.1016/bs.adcom.2022.02.014}, doi = {10.1016/BS.ADCOM.2022.02.014}, timestamp = {Wed, 01 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/SatheeshkumarSD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/ShakerinavaGALS22, author = {Mehran Shakerinava and Fatemeh Golshan and Ali Ansari and Pejman Lotfi{-}Kamran and Hamid Sarbazi{-}Azad}, title = {Chapter Five - State-of-the-art data prefetchers}, journal = {Adv. Comput.}, volume = {125}, pages = {55--67}, year = {2022}, url = {https://doi.org/10.1016/bs.adcom.2021.11.007}, doi = {10.1016/BS.ADCOM.2021.11.007}, timestamp = {Fri, 18 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ac/ShakerinavaGALS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/ShakerinavaGALS22a, author = {Mehran Shakerinava and Fatemeh Golshan and Ali Ansari and Pejman Lotfi{-}Kamran and Hamid Sarbazi{-}Azad}, title = {Chapter Six - Evaluation of data prefetchers}, journal = {Adv. Comput.}, volume = {125}, pages = {69--89}, year = {2022}, url = {https://doi.org/10.1016/bs.adcom.2021.11.008}, doi = {10.1016/BS.ADCOM.2021.11.008}, timestamp = {Fri, 18 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ac/ShakerinavaGALS22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/SinghSNASPC22, author = {Anubhav Singh and Kavita Saini and Varad Nagar and Vinay Aseri and Mahipal Singh Sankhla and Pritam P. Pandit and Rushikesh L. Chopade}, title = {Chapter Sixteen - Artificial intelligence in edge devices}, journal = {Adv. Comput.}, volume = {127}, pages = {437--484}, year = {2022}, url = {https://doi.org/10.1016/bs.adcom.2022.02.013}, doi = {10.1016/BS.ADCOM.2022.02.013}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/SinghSNASPC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/SononeSJSN22, author = {Swaroop S. Sonone and Kavita Saini and Swapnali Jadhav and Mahipal Singh Sankhla and Varad Nagar}, title = {Chapter Twelve - The future of edge computing}, journal = {Adv. Comput.}, volume = {127}, pages = {333--358}, year = {2022}, url = {https://doi.org/10.1016/bs.adcom.2022.02.009}, doi = {10.1016/BS.ADCOM.2022.02.009}, timestamp = {Wed, 01 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/SononeSJSN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/SugandhKN22, author = {Urvashi Sugandh and Manju Khari and Swati Nigam}, title = {Preface}, journal = {Adv. Comput.}, volume = {127}, pages = {xvii--xx}, year = {2022}, url = {https://doi.org/10.1016/S0065-2458(22)00068-7}, doi = {10.1016/S0065-2458(22)00068-7}, timestamp = {Wed, 01 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/SugandhKN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/SumathiKSS22, author = {D. Sumathi and S. Karthikeyan and P. Sivaprakash and Prabha Selvaraj}, title = {Chapter Eleven - 5G Communication for edge computing}, journal = {Adv. Comput.}, volume = {127}, pages = {307--331}, year = {2022}, url = {https://doi.org/10.1016/bs.adcom.2022.02.008}, doi = {10.1016/BS.ADCOM.2022.02.008}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/SumathiKSS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Surianarayanan22, author = {Chellammal Surianarayanan}, title = {Chapter Six - Microservices architecture for edge computing environments}, journal = {Adv. Comput.}, volume = {127}, pages = {183--208}, year = {2022}, url = {https://doi.org/10.1016/bs.adcom.2021.12.001}, doi = {10.1016/BS.ADCOM.2021.12.001}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Surianarayanan22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Tafa22, author = {Zhilbert Tafa}, title = {Chapter Three - WSNs in environmental monitoring: Data acquisition and dissemination aspects}, journal = {Adv. Comput.}, volume = {126}, pages = {65--149}, year = {2022}, url = {https://doi.org/10.1016/bs.adcom.2021.11.010}, doi = {10.1016/BS.ADCOM.2021.11.010}, timestamp = {Fri, 22 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Tafa22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/VenkateshRA22, author = {Veeramuthu Venkatesh and Pethuru Raj and R. Anushiadevi}, title = {Chapter Ten - {A} smart framework through the Internet of Things and machine learning for precision agriculture}, journal = {Adv. Comput.}, volume = {127}, pages = {279--306}, year = {2022}, url = {https://doi.org/10.1016/bs.adcom.2022.02.007}, doi = {10.1016/BS.ADCOM.2022.02.007}, timestamp = {Wed, 01 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/VenkateshRA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/WangW22, author = {Ling Wang and Xiaohang Wang}, title = {Chapter Six - Approximate communication for energy-efficient network-on-chip}, journal = {Adv. Comput.}, volume = {124}, pages = {151--215}, year = {2022}, url = {https://doi.org/10.1016/bs.adcom.2021.09.004}, doi = {10.1016/BS.ADCOM.2021.09.004}, timestamp = {Wed, 24 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/WangW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/AbarLA21, author = {Tasnim Abar and Asma Ben Letaifa and Sadok El Asmi}, title = {Chapter Five - User behavior-ensemble learning based improving QoE fairness in {HTTP} adaptive streaming over {SDN} approach}, journal = {Adv. Comput.}, volume = {123}, pages = {245--269}, year = {2021}, url = {https://doi.org/10.1016/bs.adcom.2021.01.004}, doi = {10.1016/BS.ADCOM.2021.01.004}, timestamp = {Mon, 14 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/AbarLA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/AggarwalK21, author = {Shubhani Aggarwal and Neeraj Kumar}, title = {Chapter Two - Data structures}, journal = {Adv. Comput.}, volume = {121}, pages = {43--81}, year = {2021}, url = {https://doi.org/10.1016/bs.adcom.2020.08.002}, doi = {10.1016/BS.ADCOM.2020.08.002}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ac/AggarwalK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/AggarwalK21a, author = {Shubhani Aggarwal and Neeraj Kumar}, title = {Chapter Three - Hashes}, journal = {Adv. Comput.}, volume = {121}, pages = {83--93}, year = {2021}, url = {https://doi.org/10.1016/bs.adcom.2020.08.003}, doi = {10.1016/BS.ADCOM.2020.08.003}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ac/AggarwalK21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/AggarwalK21b, author = {Shubhani Aggarwal and Neeraj Kumar}, title = {Chapter Four - Digital signatures}, journal = {Adv. Comput.}, volume = {121}, pages = {95--107}, year = {2021}, url = {https://doi.org/10.1016/bs.adcom.2020.08.004}, doi = {10.1016/BS.ADCOM.2020.08.004}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ac/AggarwalK21b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/AggarwalK21c, author = {Shubhani Aggarwal and Neeraj Kumar}, title = {Chapter Five - Signature primitives}, journal = {Adv. Comput.}, volume = {121}, pages = {109--121}, year = {2021}, url = {https://doi.org/10.1016/bs.adcom.2020.08.005}, doi = {10.1016/BS.ADCOM.2020.08.005}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ac/AggarwalK21c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/AggarwalK21d, author = {Shubhani Aggarwal and Neeraj Kumar}, title = {Chapter Six - Accumulators}, journal = {Adv. Comput.}, volume = {121}, pages = {123--128}, year = {2021}, url = {https://doi.org/10.1016/bs.adcom.2020.08.006}, doi = {10.1016/BS.ADCOM.2020.08.006}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ac/AggarwalK21d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/AggarwalK21e, author = {Shubhani Aggarwal and Neeraj Kumar}, title = {Chapter Seven - Basics of blockchain}, journal = {Adv. Comput.}, volume = {121}, pages = {129--146}, year = {2021}, url = {https://doi.org/10.1016/bs.adcom.2020.08.007}, doi = {10.1016/BS.ADCOM.2020.08.007}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ac/AggarwalK21e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/AggarwalK21f, author = {Shubhani Aggarwal and Neeraj Kumar}, title = {Chapter Eight - History of blockchain-Blockchain 1.0: Currency}, journal = {Adv. Comput.}, volume = {121}, pages = {147--169}, year = {2021}, url = {https://doi.org/10.1016/bs.adcom.2020.08.008}, doi = {10.1016/BS.ADCOM.2020.08.008}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ac/AggarwalK21f.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/AggarwalK21g, author = {Shubhani Aggarwal and Neeraj Kumar}, title = {Chapter Nine - Architecture of blockchain}, journal = {Adv. Comput.}, volume = {121}, pages = {171--192}, year = {2021}, url = {https://doi.org/10.1016/bs.adcom.2020.08.009}, doi = {10.1016/BS.ADCOM.2020.08.009}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ac/AggarwalK21g.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/AggarwalK21h, author = {Shubhani Aggarwal and Neeraj Kumar}, title = {Chapter Ten - Core components of blockchain}, journal = {Adv. Comput.}, volume = {121}, pages = {193--209}, year = {2021}, url = {https://doi.org/10.1016/bs.adcom.2020.08.010}, doi = {10.1016/BS.ADCOM.2020.08.010}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ac/AggarwalK21h.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/AggarwalK21i, author = {Shubhani Aggarwal and Neeraj Kumar}, title = {Chapter Eleven - Cryptographic consensus mechanisms}, journal = {Adv. Comput.}, volume = {121}, pages = {211--226}, year = {2021}, url = {https://doi.org/10.1016/bs.adcom.2020.08.011}, doi = {10.1016/BS.ADCOM.2020.08.011}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ac/AggarwalK21i.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/AggarwalK21j, author = {Shubhani Aggarwal and Neeraj Kumar}, title = {Chapter Twelve - Cryptocurrencies}, journal = {Adv. Comput.}, volume = {121}, pages = {227--266}, year = {2021}, url = {https://doi.org/10.1016/bs.adcom.2020.08.012}, doi = {10.1016/BS.ADCOM.2020.08.012}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ac/AggarwalK21j.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/AggarwalK21k, author = {Shubhani Aggarwal and Neeraj Kumar}, title = {Chapter Fourteen - Phases of operation}, journal = {Adv. Comput.}, volume = {121}, pages = {285--299}, year = {2021}, url = {https://doi.org/10.1016/bs.adcom.2020.08.014}, doi = {10.1016/BS.ADCOM.2020.08.014}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ac/AggarwalK21k.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/AggarwalK21l, author = {Shubhani Aggarwal and Neeraj Kumar}, title = {Chapter Fifteen - Blockchain 2.0: Smart contracts}, journal = {Adv. Comput.}, volume = {121}, pages = {301--322}, year = {2021}, url = {https://doi.org/10.1016/bs.adcom.2020.08.015}, doi = {10.1016/BS.ADCOM.2020.08.015}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ac/AggarwalK21l.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/AggarwalK21m, author = {Shubhani Aggarwal and Neeraj Kumar}, title = {Chapter Sixteen - Hyperledger}, journal = {Adv. Comput.}, volume = {121}, pages = {323--343}, year = {2021}, url = {https://doi.org/10.1016/bs.adcom.2020.08.016}, doi = {10.1016/BS.ADCOM.2020.08.016}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ac/AggarwalK21m.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/AggarwalK21n, author = {Shubhani Aggarwal and Neeraj Kumar}, title = {Chapter Seventeen - Blockchain for enterprise}, journal = {Adv. Comput.}, volume = {121}, pages = {345--354}, year = {2021}, url = {https://doi.org/10.1016/bs.adcom.2020.08.017}, doi = {10.1016/BS.ADCOM.2020.08.017}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ac/AggarwalK21n.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/AggarwalK21o, author = {Shubhani Aggarwal and Neeraj Kumar}, title = {Chapter Nineteen - Blockchain components and concepts}, journal = {Adv. Comput.}, volume = {121}, pages = {387--398}, year = {2021}, url = {https://doi.org/10.1016/bs.adcom.2020.08.019}, doi = {10.1016/BS.ADCOM.2020.08.019}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ac/AggarwalK21o.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/AggarwalK21p, author = {Shubhani Aggarwal and Neeraj Kumar}, title = {Chapter Twenty - Attacks on blockchain}, journal = {Adv. Comput.}, volume = {121}, pages = {399--410}, year = {2021}, url = {https://doi.org/10.1016/bs.adcom.2020.08.020}, doi = {10.1016/BS.ADCOM.2020.08.020}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ac/AggarwalK21p.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/AggarwalK21q, author = {Shubhani Aggarwal and Neeraj Kumar}, title = {Chapter Twenty-One - Financial system}, journal = {Adv. Comput.}, volume = {121}, pages = {411--429}, year = {2021}, url = {https://doi.org/10.1016/bs.adcom.2020.08.021}, doi = {10.1016/BS.ADCOM.2020.08.021}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ac/AggarwalK21q.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/AggarwalK21r, author = {Shubhani Aggarwal and Neeraj Kumar}, title = {Chapter Twenty-Two - Transportation system}, journal = {Adv. Comput.}, volume = {121}, pages = {431--454}, year = {2021}, url = {https://doi.org/10.1016/bs.adcom.2020.08.022}, doi = {10.1016/BS.ADCOM.2020.08.022}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ac/AggarwalK21r.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/AggarwalK21s, author = {Shubhani Aggarwal and Neeraj Kumar}, title = {Chapter Twenty-Three - Smart grid}, journal = {Adv. Comput.}, volume = {121}, pages = {455--481}, year = {2021}, url = {https://doi.org/10.1016/bs.adcom.2020.08.023}, doi = {10.1016/BS.ADCOM.2020.08.023}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ac/AggarwalK21s.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/AggarwalK21t, author = {Shubhani Aggarwal and Neeraj Kumar}, title = {Chapter Twenty-Four - Healthcare system}, journal = {Adv. Comput.}, volume = {121}, pages = {483--493}, year = {2021}, url = {https://doi.org/10.1016/bs.adcom.2020.08.024}, doi = {10.1016/BS.ADCOM.2020.08.024}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ac/AggarwalK21t.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/AggarwalK21u, author = {Shubhani Aggarwal and Neeraj Kumar}, title = {Chapter Twenty-Five - Voting system}, journal = {Adv. Comput.}, volume = {121}, pages = {495--500}, year = {2021}, url = {https://doi.org/10.1016/bs.adcom.2020.08.025}, doi = {10.1016/BS.ADCOM.2020.08.025}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ac/AggarwalK21u.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/AlsharoaZA21, author = {Ahmad Alsharoa and Emna Zedini and Mohamed{-}Slim Alouini}, title = {Chapter One - Downlink resource allocations of satellite-airborne-terrestrial networks integration}, journal = {Adv. Comput.}, volume = {123}, pages = {1--40}, year = {2021}, url = {https://doi.org/10.1016/bs.adcom.2021.01.005}, doi = {10.1016/BS.ADCOM.2021.01.005}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/AlsharoaZA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Bir21, author = {Parth Bir}, title = {Chapter Four - Generic quantum hardware accelerators for conventional systems}, journal = {Adv. Comput.}, volume = {122}, pages = {97--133}, year = {2021}, url = {https://doi.org/10.1016/bs.adcom.2021.01.007}, doi = {10.1016/BS.ADCOM.2021.01.007}, timestamp = {Wed, 19 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Bir21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/BiswalBH21, author = {Amitabh Biswal and Malaya Dutta Borah and Zakir Hussain}, title = {Chapter Eleven - Music recommender system using restricted Boltzmann machine with implicit feedback}, journal = {Adv. Comput.}, volume = {122}, pages = {367--402}, year = {2021}, url = {https://doi.org/10.1016/bs.adcom.2021.01.001}, doi = {10.1016/BS.ADCOM.2021.01.001}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/BiswalBH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/DagheroPP21, author = {Francesco Daghero and Daniele Jahier Pagliari and Massimo Poncino}, title = {Chapter Eight - Energy-efficient deep learning inference on edge devices}, journal = {Adv. Comput.}, volume = {122}, pages = {247--301}, year = {2021}, url = {https://doi.org/10.1016/bs.adcom.2020.07.002}, doi = {10.1016/BS.ADCOM.2020.07.002}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/DagheroPP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/GordienkoKTGRAS21, author = {Yuri G. Gordienko and Yuriy Kochura and Vlad Taran and Nikita Gordienko and Oleksandr Rokovyi and Oleg Alienin and Sergii G. Stirenko}, title = {Chapter Nine - "Last mile" optimization of edge computing ecosystem with deep learning models and specialized tensor processing architectures}, journal = {Adv. Comput.}, volume = {122}, pages = {303--341}, year = {2021}, url = {https://doi.org/10.1016/bs.adcom.2020.10.003}, doi = {10.1016/BS.ADCOM.2020.10.003}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/GordienkoKTGRAS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Gupta21, author = {Neha Gupta}, title = {Chapter One - Introduction to hardware accelerator systems for artificial intelligence and machine learning}, journal = {Adv. Comput.}, volume = {122}, pages = {1--21}, year = {2021}, url = {https://doi.org/10.1016/bs.adcom.2020.07.001}, doi = {10.1016/BS.ADCOM.2020.07.001}, timestamp = {Wed, 28 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Gupta21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Hurson21, author = {Ali R. Hurson}, title = {Preface}, journal = {Adv. Comput.}, volume = {123}, pages = {ix--x}, year = {2021}, url = {https://doi.org/10.1016/S0065-2458(21)00051-6}, doi = {10.1016/S0065-2458(21)00051-6}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ac/Hurson21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/HursonW21, author = {Ali R. Hurson and Sheng Wu}, title = {Preface}, journal = {Adv. Comput.}, volume = {120}, pages = {xi--xii}, year = {2021}, url = {https://doi.org/10.1016/S0065-2458(21)00008-5}, doi = {10.1016/S0065-2458(21)00008-5}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/HursonW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/JeonKLLHR21, author = {Won Jeon and Gun Ko and Jiwon Lee and Hyunwuk Lee and Dongho Ha and Won Woo Ro}, title = {Chapter Six - Deep learning with GPUs}, journal = {Adv. Comput.}, volume = {122}, pages = {167--215}, year = {2021}, url = {https://doi.org/10.1016/bs.adcom.2020.11.003}, doi = {10.1016/BS.ADCOM.2020.11.003}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/JeonKLLHR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/JiangXS21, author = {Leqi Jiang and Zhihua Xia and Xingming Sun}, title = {Chapter Three - Review on privacy-preserving data comparison protocols in cloud computing}, journal = {Adv. Comput.}, volume = {120}, pages = {81--119}, year = {2021}, url = {https://doi.org/10.1016/bs.adcom.2020.09.002}, doi = {10.1016/BS.ADCOM.2020.09.002}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/JiangXS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Kim21, author = {Joo{-}Young Kim}, title = {Chapter Five - {FPGA} based neural network accelerators}, journal = {Adv. Comput.}, volume = {122}, pages = {135--165}, year = {2021}, url = {https://doi.org/10.1016/bs.adcom.2020.11.002}, doi = {10.1016/BS.ADCOM.2020.11.002}, timestamp = {Wed, 05 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Kim21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/KimD21, author = {Shiho Kim and Ganesh Chandra Deka}, title = {Preface}, journal = {Adv. Comput.}, volume = {122}, pages = {xi--xii}, year = {2021}, url = {https://doi.org/10.1016/S0065-2458(21)00040-1}, doi = {10.1016/S0065-2458(21)00040-1}, timestamp = {Wed, 21 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/KimD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Lee21, author = {Kyuho J. Lee}, title = {Chapter Seven - Architecture of neural processing unit for deep neural networks}, journal = {Adv. Comput.}, volume = {122}, pages = {217--245}, year = {2021}, url = {https://doi.org/10.1016/bs.adcom.2020.11.001}, doi = {10.1016/BS.ADCOM.2020.11.001}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Lee21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/LiDSB21, author = {Xiangbo Li and Mahmoud Darwich and Mohsen Amini Salehi and Magdy A. Bayoumi}, title = {Chapter Four - {A} survey on cloud-based video streaming services}, journal = {Adv. Comput.}, volume = {123}, pages = {193--244}, year = {2021}, url = {https://doi.org/10.1016/bs.adcom.2021.01.003}, doi = {10.1016/BS.ADCOM.2021.01.003}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/LiDSB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/MayedaA21, author = {Mitchell Mayeda and Anneliese Andrews}, title = {Chapter Two - Evaluating software testing techniques: {A} systematic mapping study}, journal = {Adv. Comput.}, volume = {123}, pages = {41--114}, year = {2021}, url = {https://doi.org/10.1016/bs.adcom.2021.01.002}, doi = {10.1016/BS.ADCOM.2021.01.002}, timestamp = {Mon, 14 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/MayedaA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/ParkK21, author = {Hyunbin Park and Shiho Kim}, title = {Chapter Three - Hardware accelerator systems for artificial intelligence and machine learning}, journal = {Adv. Comput.}, volume = {122}, pages = {51--95}, year = {2021}, url = {https://doi.org/10.1016/bs.adcom.2020.11.005}, doi = {10.1016/BS.ADCOM.2020.11.005}, timestamp = {Wed, 21 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/ParkK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/ParkK21a, author = {Hyunbin Park and Shiho Kim}, title = {Chapter Ten - Hardware accelerator for training with integer backpropagation and probabilistic weight update}, journal = {Adv. Comput.}, volume = {122}, pages = {343--365}, year = {2021}, url = {https://doi.org/10.1016/bs.adcom.2020.11.006}, doi = {10.1016/BS.ADCOM.2020.11.006}, timestamp = {Wed, 21 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/ParkK21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Raj21, author = {Pethuru Raj}, title = {Preface}, journal = {Adv. Comput.}, volume = {121}, pages = {xv--xvi}, year = {2021}, url = {https://doi.org/10.1016/S0065-2458(21)00021-8}, doi = {10.1016/S0065-2458(21)00021-8}, timestamp = {Thu, 15 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Raj21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Raj21a, author = {Pethuru Raj}, title = {Chapter One - Demystifying the blockchain technology}, journal = {Adv. Comput.}, volume = {121}, pages = {1--42}, year = {2021}, url = {https://doi.org/10.1016/bs.adcom.2020.08.001}, doi = {10.1016/BS.ADCOM.2020.08.001}, timestamp = {Thu, 15 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Raj21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Raj21b, author = {Pethuru Raj}, title = {Chapter Thirteen - Empowering digital twins with blockchain}, journal = {Adv. Comput.}, volume = {121}, pages = {267--283}, year = {2021}, url = {https://doi.org/10.1016/bs.adcom.2020.08.013}, doi = {10.1016/BS.ADCOM.2020.08.013}, timestamp = {Thu, 15 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Raj21b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Raj21c, author = {Pethuru Raj}, title = {Chapter Eighteen - Industrial use cases at the cusp of the IoT and blockchain paradigms}, journal = {Adv. Comput.}, volume = {121}, pages = {355--385}, year = {2021}, url = {https://doi.org/10.1016/bs.adcom.2020.08.018}, doi = {10.1016/BS.ADCOM.2020.08.018}, timestamp = {Thu, 15 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Raj21c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/RozancM21, author = {Igor Rozanc and Marjan Mernik}, title = {Chapter Three - The screening phase in systematic reviews: Can we speed up the process?}, journal = {Adv. Comput.}, volume = {123}, pages = {115--191}, year = {2021}, url = {https://doi.org/10.1016/bs.adcom.2021.01.006}, doi = {10.1016/BS.ADCOM.2021.01.006}, timestamp = {Mon, 14 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/RozancM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Song21, author = {William J. Song}, title = {Chapter Two - Hardware accelerator systems for embedded systems}, journal = {Adv. Comput.}, volume = {122}, pages = {23--49}, year = {2021}, url = {https://doi.org/10.1016/bs.adcom.2020.11.004}, doi = {10.1016/BS.ADCOM.2020.11.004}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Song21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/WangZZZWZ21, author = {Lizhi Wang and Zhaohui Zhang and Xiaobo Zhang and Xinxin Zhou and Pengwei Wang and Yongjun Zheng}, title = {Chapter One - {A} Deep-forest based approach for detecting fraudulent online transaction}, journal = {Adv. Comput.}, volume = {120}, pages = {1--38}, year = {2021}, url = {https://doi.org/10.1016/bs.adcom.2020.10.001}, doi = {10.1016/BS.ADCOM.2020.10.001}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/WangZZZWZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/YangC0021, author = {Zhen Yang and Yingying Chen and Yongfeng Huang and Xing Li}, title = {Chapter Six - Protecting personal sensitive data security in the cloud with blockchain}, journal = {Adv. Comput.}, volume = {120}, pages = {195--231}, year = {2021}, url = {https://doi.org/10.1016/bs.adcom.2020.09.004}, doi = {10.1016/BS.ADCOM.2020.09.004}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/YangC0021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/YangGC21, author = {Bin Yang and Honglei Guo and Enguo Cao}, title = {Chapter Two - Design of cyber-physical-social systems with forensic-awareness based on deep learning}, journal = {Adv. Comput.}, volume = {120}, pages = {39--79}, year = {2021}, url = {https://doi.org/10.1016/bs.adcom.2020.09.001}, doi = {10.1016/BS.ADCOM.2020.09.001}, timestamp = {Tue, 24 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ac/YangGC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/YuLZT021, author = {Jinxia Yu and Huanhuan Lian and Zongqu Zhao and Yongli Tang and Xiaojun Wang}, title = {Chapter Four - Provably secure verifier-based password authenticated key exchange based on lattices}, journal = {Adv. Comput.}, volume = {120}, pages = {121--156}, year = {2021}, url = {https://doi.org/10.1016/bs.adcom.2020.09.003}, doi = {10.1016/BS.ADCOM.2020.09.003}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/YuLZT021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/YuanCSWW21, author = {Chengsheng Yuan and Qi Cui and Xingming Sun and Q. M. Jonathan Wu and Sheng Wu}, title = {Chapter Five - Fingerprint liveness detection using an improved {CNN} with the spatial pyramid pooling structure}, journal = {Adv. Comput.}, volume = {120}, pages = {157--193}, year = {2021}, url = {https://doi.org/10.1016/bs.adcom.2020.10.002}, doi = {10.1016/BS.ADCOM.2020.10.002}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/YuanCSWW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/AbiramiC20, author = {S. Abirami and P. Chitra}, title = {Chapter Fourteen - Energy-efficient edge based real-time healthcare support system}, journal = {Adv. Comput.}, volume = {117}, pages = {339--368}, year = {2020}, url = {https://doi.org/10.1016/bs.adcom.2019.09.007}, doi = {10.1016/BS.ADCOM.2019.09.007}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/AbiramiC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/AlosilyB20, author = {Nora Alosily and Sanjiv K. Bhatia}, title = {Chapter Five - Eigenvideo for video indexing}, journal = {Adv. Comput.}, volume = {119}, pages = {157--179}, year = {2020}, url = {https://doi.org/10.1016/bs.adcom.2020.03.004}, doi = {10.1016/BS.ADCOM.2020.03.004}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/AlosilyB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/AsadiniaS20, author = {Marjan Asadinia and Hamid Sarbazi{-}Azad}, title = {Chapter One - Introduction to non-volatile memory technologies}, journal = {Adv. Comput.}, volume = {118}, pages = {1--13}, year = {2020}, url = {https://doi.org/10.1016/bs.adcom.2019.09.001}, doi = {10.1016/BS.ADCOM.2019.09.001}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/AsadiniaS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/AsadiniaS20a, author = {Marjan Asadinia and Hamid Sarbazi{-}Azad}, title = {Chapter Two - The emerging phase change memory}, journal = {Adv. Comput.}, volume = {118}, pages = {15--28}, year = {2020}, url = {https://doi.org/10.1016/bs.adcom.2019.09.002}, doi = {10.1016/BS.ADCOM.2019.09.002}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/AsadiniaS20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/AsadiniaS20b, author = {Marjan Asadinia and Hamid Sarbazi{-}Azad}, title = {Chapter Three - Phase-change memory architectures}, journal = {Adv. Comput.}, volume = {118}, pages = {29--48}, year = {2020}, url = {https://doi.org/10.1016/bs.adcom.2019.10.001}, doi = {10.1016/BS.ADCOM.2019.10.001}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/AsadiniaS20b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/AsadiniaS20c, author = {Marjan Asadinia and Hamid Sarbazi{-}Azad}, title = {Chapter Four - Inter-line level schemes for handling hard errors in PCMs}, journal = {Adv. Comput.}, volume = {118}, pages = {49--78}, year = {2020}, url = {https://doi.org/10.1016/bs.adcom.2019.10.002}, doi = {10.1016/BS.ADCOM.2019.10.002}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/AsadiniaS20c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/AsadiniaS20d, author = {Marjan Asadinia and Hamid Sarbazi{-}Azad}, title = {Chapter Five - Handling hard errors in PCMs by using intra-line level schemes}, journal = {Adv. Comput.}, volume = {118}, pages = {79--109}, year = {2020}, url = {https://doi.org/10.1016/bs.adcom.2019.10.003}, doi = {10.1016/BS.ADCOM.2019.10.003}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/AsadiniaS20d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/AsadiniaS20e, author = {Marjan Asadinia and Hamid Sarbazi{-}Azad}, title = {Chapter Six - Addressing issues with {MLC} phase-change memory}, journal = {Adv. Comput.}, volume = {118}, pages = {111--133}, year = {2020}, url = {https://doi.org/10.1016/bs.adcom.2019.10.004}, doi = {10.1016/BS.ADCOM.2019.10.004}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/AsadiniaS20e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Augustine20, author = {Peter Augustine}, title = {Chapter Four - The industry use cases for the Digital Twin idea}, journal = {Adv. Comput.}, volume = {117}, pages = {79--105}, year = {2020}, url = {https://doi.org/10.1016/bs.adcom.2019.10.008}, doi = {10.1016/BS.ADCOM.2019.10.008}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ac/Augustine20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/BankovicFGHHKKK20, author = {Milan Bankovic and Vladimir Filipovic and Jelena Graovac and Jelena Hadzi{-}Puric and Ali R. Hurson and Aleksandar Kartelj and Jovana J. Kovacevic and Nenad Korolija and Milos Kotlar and Nenad B. Krdzavac and Filip Maric and Sasa N. Malkov and Veljko Milutinovic and Nenad S. Mitic and Stefan Miskovic and Mladen Nikolic and Gordana Pavlovic{-}Lazetic and Danijela Simic and Miodrag V. Zivkovic}, title = {Chapter One - Teaching graduate students how to review research articles and respond to reviewer comments}, journal = {Adv. Comput.}, volume = {116}, pages = {1--63}, year = {2020}, url = {https://doi.org/10.1016/bs.adcom.2019.07.001}, doi = {10.1016/BS.ADCOM.2019.07.001}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/BankovicFGHHKKK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/BarnabasR20, author = {Janet Barnabas and Pethuru Raj}, title = {Chapter Nine - The human body: {A} digital twin of the cyber physical systems}, journal = {Adv. Comput.}, volume = {117}, pages = {219--246}, year = {2020}, url = {https://doi.org/10.1016/bs.adcom.2019.09.004}, doi = {10.1016/BS.ADCOM.2019.09.004}, timestamp = {Thu, 15 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/BarnabasR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Dobravec20, author = {Tomaz Dobravec}, title = {Chapter Two - ALGator - An automatic algorithm evaluation system}, journal = {Adv. Comput.}, volume = {116}, pages = {65--131}, year = {2020}, url = {https://doi.org/10.1016/bs.adcom.2019.07.002}, doi = {10.1016/BS.ADCOM.2019.07.002}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Dobravec20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/EvangelineA20, author = {Preetha Evangeline and P. Anandhakumar}, title = {Chapter Two - Digital twin technology for "smart manufacturing"}, journal = {Adv. Comput.}, volume = {117}, pages = {35--49}, year = {2020}, url = {https://doi.org/10.1016/bs.adcom.2019.10.009}, doi = {10.1016/BS.ADCOM.2019.10.009}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/EvangelineA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/FurstMM20, author = {Luka F{\"{u}}rst and Marjan Mernik and Viljan Mahnic}, title = {Chapter Three - Graph grammar induction}, journal = {Adv. Comput.}, volume = {116}, pages = {133--181}, year = {2020}, url = {https://doi.org/10.1016/bs.adcom.2019.07.003}, doi = {10.1016/BS.ADCOM.2019.07.003}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/FurstMM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/GajraniLTGZMC20, author = {Jyoti Gajrani and Vijay Laxmi and Meenakshi Tripathi and Manoj Singh Gaur and Akka Zemmari and Mohamed Mosbah and Mauro Conti}, title = {Chapter Three - Effectiveness of state-of-the-art dynamic analysis techniques in identifying diverse Android malware and future enhancements}, journal = {Adv. Comput.}, volume = {119}, pages = {73--120}, year = {2020}, url = {https://doi.org/10.1016/bs.adcom.2020.03.002}, doi = {10.1016/BS.ADCOM.2020.03.002}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/GajraniLTGZMC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/HajiaminiS20, author = {Shervin Hajiamini and Behrooz A. Shirazi}, title = {Chapter Two - {A} study of {DVFS} methodologies for multicore systems with islanding feature}, journal = {Adv. Comput.}, volume = {119}, pages = {35--71}, year = {2020}, url = {https://doi.org/10.1016/bs.adcom.2020.03.005}, doi = {10.1016/BS.ADCOM.2020.03.005}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/HajiaminiS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/HungudA20, author = {Vidya Hungud and Senthil Kumar Arunachalam}, title = {Chapter Five - Digital twin: Empowering edge devices to be intelligent}, journal = {Adv. Comput.}, volume = {117}, pages = {107--127}, year = {2020}, url = {https://doi.org/10.1016/bs.adcom.2019.10.005}, doi = {10.1016/BS.ADCOM.2019.10.005}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/HungudA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Hurson20, author = {Ali R. Hurson}, title = {Preface}, journal = {Adv. Comput.}, volume = {118}, pages = {ix--x}, year = {2020}, url = {https://doi.org/10.1016/S0065-2458(20)30034-6}, doi = {10.1016/S0065-2458(20)30034-6}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Hurson20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Hurson20a, author = {Ali R. Hurson}, title = {Preface}, journal = {Adv. Comput.}, volume = {119}, pages = {vii--viii}, year = {2020}, url = {https://doi.org/10.1016/S0065-2458(20)30051-6}, doi = {10.1016/S0065-2458(20)30051-6}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Hurson20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/HursonM20, author = {Ali R. Hurson and Veljko Milutinovic}, title = {Preface}, journal = {Adv. Comput.}, volume = {116}, pages = {ix--x}, year = {2020}, url = {https://doi.org/10.1016/S0065-2458(20)30016-4}, doi = {10.1016/S0065-2458(20)30016-4}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/HursonM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/IndrakumariPSB20, author = {Ranganathan Indrakumari and Thangamuthu Poongodi and Palanimuthu Suresh and Balamurugan Balusamy}, title = {Chapter Seven - The growing role of integrated and insightful big and real-time data analytics platforms}, journal = {Adv. Comput.}, volume = {117}, pages = {165--186}, year = {2020}, url = {https://doi.org/10.1016/bs.adcom.2019.09.009}, doi = {10.1016/BS.ADCOM.2019.09.009}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ac/IndrakumariPSB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/LaneMBC20, author = {Matthew Lane and Alberto Maiocco and Sanjiv K. Bhatia and Sharlee Climer}, title = {Chapter Four - Eyeing the patterns: Data visualization using doubly-seriated color heatmaps}, journal = {Adv. Comput.}, volume = {119}, pages = {121--156}, year = {2020}, url = {https://doi.org/10.1016/bs.adcom.2020.03.003}, doi = {10.1016/BS.ADCOM.2020.03.003}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/LaneMBC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/MazumdarS20, author = {Somnath Mazumdar and Alberto Scionti}, title = {Chapter One - Fast execution of {RDF} queries using Apache Hadoop}, journal = {Adv. Comput.}, volume = {119}, pages = {1--33}, year = {2020}, url = {https://doi.org/10.1016/bs.adcom.2020.03.001}, doi = {10.1016/BS.ADCOM.2020.03.001}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/MazumdarS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Munirathinam20, author = {Sathyan Munirathinam}, title = {Chapter Six - Industry 4.0: Industrial Internet of Things {(IIOT)}}, journal = {Adv. Comput.}, volume = {117}, pages = {129--164}, year = {2020}, url = {https://doi.org/10.1016/bs.adcom.2019.10.010}, doi = {10.1016/BS.ADCOM.2019.10.010}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Munirathinam20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Paranthaman20, author = {Ambika Paranthaman}, title = {Chapter Thirteen - Machine learning and deep learning algorithms on the Industrial Internet of Things (IIoT)}, journal = {Adv. Comput.}, volume = {117}, pages = {321--338}, year = {2020}, url = {https://doi.org/10.1016/bs.adcom.2019.10.007}, doi = {10.1016/BS.ADCOM.2019.10.007}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Paranthaman20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/PozenelS20, author = {Marko Pozenel and Bostjan Slivnik}, title = {Chapter Six - Using clickstream data to enhance reverse engineering of Web applications}, journal = {Adv. Comput.}, volume = {116}, pages = {305--349}, year = {2020}, url = {https://doi.org/10.1016/bs.adcom.2019.07.006}, doi = {10.1016/BS.ADCOM.2019.07.006}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/PozenelS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/PushpaK20, author = {J. Pushpa and S. A. Kalyani}, title = {Chapter Three - The fog computing/edge computing to leverage Digital Twin}, journal = {Adv. Comput.}, volume = {117}, pages = {51--77}, year = {2020}, url = {https://doi.org/10.1016/bs.adcom.2019.09.003}, doi = {10.1016/BS.ADCOM.2019.09.003}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/PushpaK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/RajL20, author = {Pethuru Raj and Jenn{-}Wei Lin}, title = {Chapter One - Stepping into the digitally instrumented and interconnected era}, journal = {Adv. Comput.}, volume = {117}, pages = {1--34}, year = {2020}, url = {https://doi.org/10.1016/bs.adcom.2019.09.008}, doi = {10.1016/BS.ADCOM.2019.09.008}, timestamp = {Thu, 15 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/RajL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/RajS20, author = {Pethuru Raj and Chellammal Surianarayanan}, title = {Chapter Twelve - Digital twin: The industry use cases}, journal = {Adv. Comput.}, volume = {117}, pages = {285--320}, year = {2020}, url = {https://doi.org/10.1016/bs.adcom.2019.09.006}, doi = {10.1016/BS.ADCOM.2019.09.006}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/RajS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Rozman20, author = {Robert Rozman}, title = {Chapter Four - Asymmetric windows in digital signal processing}, journal = {Adv. Comput.}, volume = {116}, pages = {183--249}, year = {2020}, url = {https://doi.org/10.1016/bs.adcom.2019.07.004}, doi = {10.1016/BS.ADCOM.2019.07.004}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Rozman20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/ShettySSS20, author = {Chetan Shetty and B. J. Sowmya and S. Seema and K. G. Srinivasa}, title = {Chapter Eight - Air pollution control model using machine learning and IoT techniques}, journal = {Adv. Comput.}, volume = {117}, pages = {187--218}, year = {2020}, url = {https://doi.org/10.1016/bs.adcom.2019.10.006}, doi = {10.1016/BS.ADCOM.2019.10.006}, timestamp = {Wed, 19 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/ShettySSS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/SusilaSU20, author = {Nagarajan Susila and Anand Sruthi and Sakthivel Usha}, title = {Chapter Ten - Impact of cloud security in digital twin}, journal = {Adv. Comput.}, volume = {117}, pages = {247--263}, year = {2020}, url = {https://doi.org/10.1016/bs.adcom.2019.09.005}, doi = {10.1016/BS.ADCOM.2019.09.005}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/SusilaSU20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Vijayakumar20, author = {D. Sudaroli Vijayakumar}, title = {Chapter Eleven - Digital twin in consumer choice modeling}, journal = {Adv. Comput.}, volume = {117}, pages = {265--284}, year = {2020}, url = {https://doi.org/10.1016/bs.adcom.2019.09.010}, doi = {10.1016/BS.ADCOM.2019.09.010}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Vijayakumar20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/VitekP20, author = {Matej Vitek and Peter Peer}, title = {Chapter Five - Intelligent agents in games: Review with an open-source tool}, journal = {Adv. Comput.}, volume = {116}, pages = {251--303}, year = {2020}, url = {https://doi.org/10.1016/bs.adcom.2019.07.005}, doi = {10.1016/BS.ADCOM.2019.07.005}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/VitekP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/0034SWD19, author = {Peng Zhang and Douglas C. Schmidt and Jules White and Abhishek Dubey}, title = {Chapter Seven - Consensus mechanisms and information security technologies}, journal = {Adv. Comput.}, volume = {115}, pages = {181--209}, year = {2019}, url = {https://doi.org/10.1016/bs.adcom.2019.05.001}, doi = {10.1016/BS.ADCOM.2019.05.001}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/0034SWD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/AbujamraR19, author = {Ramzi Abujamra and David Randall}, title = {Chapter Five - Blockchain applications in healthcare and the opportunities and the advancements due to the new information technology framework}, journal = {Adv. Comput.}, volume = {115}, pages = {141--154}, year = {2019}, url = {https://doi.org/10.1016/bs.adcom.2018.12.002}, doi = {10.1016/BS.ADCOM.2018.12.002}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/AbujamraR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/AhmadvandPK19, author = {Mohsen Ahmadvand and Alexander Pretschner and Florian Kelbert}, title = {Chapter Eight - {A} Taxonomy of Software Integrity Protection Techniques}, journal = {Adv. Comput.}, volume = {112}, pages = {413--486}, year = {2019}, url = {https://doi.org/10.1016/bs.adcom.2017.12.007}, doi = {10.1016/BS.ADCOM.2017.12.007}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/AhmadvandPK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/AtlamW19, author = {Hany F. Atlam and Gary B. Wills}, title = {Chapter One - Technical aspects of blockchain and IoT}, journal = {Adv. Comput.}, volume = {115}, pages = {1--39}, year = {2019}, url = {https://doi.org/10.1016/bs.adcom.2018.10.006}, doi = {10.1016/BS.ADCOM.2018.10.006}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ac/AtlamW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/AtlamW19a, author = {Hany F. Atlam and Gary B. Wills}, title = {Chapter Three - Intersections between IoT and distributed ledger}, journal = {Adv. Comput.}, volume = {115}, pages = {73--113}, year = {2019}, url = {https://doi.org/10.1016/bs.adcom.2018.12.001}, doi = {10.1016/BS.ADCOM.2018.12.001}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/AtlamW19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Banerjee19, author = {Arnab Banerjee}, title = {Chapter Nine - Blockchain with {IOT:} Applications and use cases for a new paradigm of supply chain driving efficiency and cost}, journal = {Adv. Comput.}, volume = {115}, pages = {259--292}, year = {2019}, url = {https://doi.org/10.1016/bs.adcom.2019.07.007}, doi = {10.1016/BS.ADCOM.2019.07.007}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Banerjee19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Chen19, author = {Qian Chen}, title = {Chapter Three - Toward realizing self-protecting healthcare information systems: Design and security challenges}, journal = {Adv. Comput.}, volume = {114}, pages = {113--149}, year = {2019}, url = {https://doi.org/10.1016/bs.adcom.2019.02.003}, doi = {10.1016/BS.ADCOM.2019.02.003}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ac/Chen19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/FerdousBCCM19, author = {Md. Sadek Ferdous and Kamanashis Biswas and Mohammad Jabed Morshed Chowdhury and Niaz Chowdhury and Vallipuram Muthukkumarasamy}, title = {Chapter Two - Integrated platforms for blockchain enablement}, journal = {Adv. Comput.}, volume = {115}, pages = {41--72}, year = {2019}, url = {https://doi.org/10.1016/bs.adcom.2019.01.001}, doi = {10.1016/BS.ADCOM.2019.01.001}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/FerdousBCCM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Hemmati19, author = {Hadi Hemmati}, title = {Chapter Four - Advances in Techniques for Test Prioritization}, journal = {Adv. Comput.}, volume = {112}, pages = {185--221}, year = {2019}, url = {https://doi.org/10.1016/bs.adcom.2017.12.004}, doi = {10.1016/BS.ADCOM.2017.12.004}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Hemmati19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/HerboldTHHG19, author = {Steffen Herbold and Fabian Trautsch and Patrick Harms and Verena Herbold and Jens Grabowski}, title = {Chapter Seven - Experiences With Replicable Experiments and Replication Kits for Software Engineering Research}, journal = {Adv. Comput.}, volume = {113}, pages = {315--344}, year = {2019}, url = {https://doi.org/10.1016/bs.adcom.2018.10.003}, doi = {10.1016/BS.ADCOM.2018.10.003}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/HerboldTHHG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/HollE19, author = {Konstantin Holl and Frank Elberzhager}, title = {Chapter One - Mobile Application Quality Assurance}, journal = {Adv. Comput.}, volume = {112}, pages = {1--77}, year = {2019}, url = {https://doi.org/10.1016/bs.adcom.2017.12.001}, doi = {10.1016/BS.ADCOM.2017.12.001}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/HollE19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/HomayouniGR19, author = {Hajar Homayouni and Sudipto Ghosh and Indrakshi Ray}, title = {Chapter Five - Data Warehouse Testing}, journal = {Adv. Comput.}, volume = {112}, pages = {223--273}, year = {2019}, url = {https://doi.org/10.1016/bs.adcom.2017.12.005}, doi = {10.1016/BS.ADCOM.2017.12.005}, timestamp = {Wed, 26 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/HomayouniGR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Hurson19, author = {Ali R. Hurson}, title = {Preface}, journal = {Adv. Comput.}, volume = {114}, pages = {vii--viii}, year = {2019}, url = {https://doi.org/10.1016/S0065-2458(19)30021-X}, doi = {10.1016/S0065-2458(19)30021-X}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Hurson19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/JilaniIK019, author = {Atif A. A. Jilani and Muhammad Zohaib Iqbal and Muhammad Uzair Khan and Muhammad Usman}, title = {Chapter Three - Advances in Applications of Object Constraint Language for Software Engineering}, journal = {Adv. Comput.}, volume = {112}, pages = {135--184}, year = {2019}, url = {https://doi.org/10.1016/bs.adcom.2017.12.003}, doi = {10.1016/BS.ADCOM.2017.12.003}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/JilaniIK019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/JinL19, author = {Youngbin Jin and Ben Lee}, title = {Chapter One - {A} comprehensive survey of issues in solid state drives}, journal = {Adv. Comput.}, volume = {114}, pages = {1--69}, year = {2019}, url = {https://doi.org/10.1016/bs.adcom.2019.02.001}, doi = {10.1016/BS.ADCOM.2019.02.001}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/JinL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Kanade19, author = {Aditya Kanade}, title = {Chapter Seven - Event-Based Concurrency: Applications, Abstractions, and Analyses}, journal = {Adv. Comput.}, volume = {112}, pages = {379--412}, year = {2019}, url = {https://doi.org/10.1016/bs.adcom.2017.12.006}, doi = {10.1016/BS.ADCOM.2017.12.006}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Kanade19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/KimD019, author = {Shiho Kim and Ganesh Chandra Deka and Peng Zhang}, title = {Preface}, journal = {Adv. Comput.}, volume = {115}, pages = {ix--x}, year = {2019}, url = {https://doi.org/10.1016/S0065-2458(19)30041-5}, doi = {10.1016/S0065-2458(19)30041-5}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/KimD019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Letaifa19, author = {Asma Ben Letaifa}, title = {Chapter Four - {SSIM} and {ML} based QoE enhancement approach in {SDN} context}, journal = {Adv. Comput.}, volume = {114}, pages = {151--196}, year = {2019}, url = {https://doi.org/10.1016/bs.adcom.2019.02.004}, doi = {10.1016/BS.ADCOM.2019.02.004}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Letaifa19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Lou0ZH19, author = {Yiling Lou and Junjie Chen and Lingming Zhang and Dan Hao}, title = {Chapter One - {A} Survey on Regression Test-Case Prioritization}, journal = {Adv. Comput.}, volume = {113}, pages = {1--46}, year = {2019}, url = {https://doi.org/10.1016/bs.adcom.2018.10.001}, doi = {10.1016/BS.ADCOM.2018.10.001}, timestamp = {Wed, 15 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ac/Lou0ZH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Memon19, author = {Atif M. Memon}, title = {Preface}, journal = {Adv. Comput.}, volume = {112}, pages = {ix--xii}, year = {2019}, url = {https://doi.org/10.1016/S0065-2458(18)30076-7}, doi = {10.1016/S0065-2458(18)30076-7}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Memon19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Memon19a, author = {Atif M. Memon}, title = {Preface}, journal = {Adv. Comput.}, volume = {113}, pages = {ix--xi}, year = {2019}, url = {https://doi.org/10.1016/S0065-2458(19)30008-7}, doi = {10.1016/S0065-2458(19)30008-7}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Memon19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/MussaK19, author = {Mohamed Mussa and Ferhat Khendek}, title = {Chapter Two - Model-Based Test Cases Reuse and Optimization}, journal = {Adv. Comput.}, volume = {113}, pages = {47--87}, year = {2019}, url = {https://doi.org/10.1016/bs.adcom.2018.01.001}, doi = {10.1016/BS.ADCOM.2018.01.001}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/MussaK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/NayyerRH19, author = {Muhammad Ziad Nayyer and Imran Raza and Syed Asad Hussain}, title = {Chapter Two - Revisiting {VM} performance and optimization challenges for big data}, journal = {Adv. Comput.}, volume = {114}, pages = {71--112}, year = {2019}, url = {https://doi.org/10.1016/bs.adcom.2019.02.002}, doi = {10.1016/BS.ADCOM.2019.02.002}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/NayyerRH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Ouaddah19, author = {Aafaf Ouaddah}, title = {Chapter Eight - {A} blockchain based access control framework for the security and privacy of IoT with strong anonymity unlinkability and intractability guarantees}, journal = {Adv. Comput.}, volume = {115}, pages = {211--258}, year = {2019}, url = {https://doi.org/10.1016/bs.adcom.2018.11.001}, doi = {10.1016/BS.ADCOM.2018.11.001}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Ouaddah19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/PapadakisK00TH19, author = {Mike Papadakis and Marinos Kintis and Jie Zhang and Yue Jia and Yves Le Traon and Mark Harman}, title = {Chapter Six - Mutation Testing Advances: An Analysis and Survey}, journal = {Adv. Comput.}, volume = {112}, pages = {275--378}, year = {2019}, url = {https://doi.org/10.1016/bs.adcom.2018.03.015}, doi = {10.1016/BS.ADCOM.2018.03.015}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/PapadakisK00TH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/PasareanuKLP19, author = {Corina S. Pasareanu and Rody Kersten and Kasper S{\o}e Luckow and Quoc{-}Sang Phan}, title = {Chapter Six - Symbolic Execution and Recent Applications to Worst-Case Execution, Load Testing, and Security Analysis}, journal = {Adv. Comput.}, volume = {113}, pages = {289--314}, year = {2019}, url = {https://doi.org/10.1016/bs.adcom.2018.10.004}, doi = {10.1016/BS.ADCOM.2018.10.004}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/PasareanuKLP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/RiccaL019, author = {Filippo Ricca and Maurizio Leotta and Andrea Stocco}, title = {Chapter Three - Three Open Problems in the Context of {E2E} Web Testing and a Vision: {NEONATE}}, journal = {Adv. Comput.}, volume = {113}, pages = {89--133}, year = {2019}, url = {https://doi.org/10.1016/bs.adcom.2018.10.005}, doi = {10.1016/BS.ADCOM.2018.10.005}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/RiccaL019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/RodriguezMOLSK19, author = {Pilar Rodr{\'{\i}}guez and Mika M{\"{a}}ntyl{\"{a}} and Markku Oivo and Lucy Ellen Lwakatare and Pertti Sepp{\"{a}}nen and Pasi Kuvaja}, title = {Chapter Four - Advances in Using Agile and Lean Processes for Software Development}, journal = {Adv. Comput.}, volume = {113}, pages = {135--224}, year = {2019}, url = {https://doi.org/10.1016/bs.adcom.2018.03.014}, doi = {10.1016/BS.ADCOM.2018.03.014}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ac/RodriguezMOLSK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/ShresthaK19, author = {Rakesh Shrestha and Shiho Kim}, title = {Chapter Ten - Integration of IoT with blockchain and homomorphic encryption: Challenging issues and opportunities}, journal = {Adv. Comput.}, volume = {115}, pages = {293--331}, year = {2019}, url = {https://doi.org/10.1016/bs.adcom.2019.06.002}, doi = {10.1016/BS.ADCOM.2019.06.002}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/ShresthaK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/SinghK19, author = {Madhusudan Singh and Shiho Kim}, title = {Chapter Four - Blockchain technology for decentralized autonomous organizations}, journal = {Adv. Comput.}, volume = {115}, pages = {115--140}, year = {2019}, url = {https://doi.org/10.1016/bs.adcom.2019.06.001}, doi = {10.1016/BS.ADCOM.2019.06.001}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/SinghK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Tzoref-Brill19, author = {Rachel Tzoref{-}Brill}, title = {Chapter Two - Advances in Combinatorial Testing}, journal = {Adv. Comput.}, volume = {112}, pages = {79--134}, year = {2019}, url = {https://doi.org/10.1016/bs.adcom.2017.12.002}, doi = {10.1016/BS.ADCOM.2017.12.002}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Tzoref-Brill19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/WalkerSD19, author = {Michael A. Walker and Douglas C. Schmidt and Abhishek Dubey}, title = {Chapter Six - Testing at scale of IoT blockchain applications}, journal = {Adv. Comput.}, volume = {115}, pages = {155--179}, year = {2019}, url = {https://doi.org/10.1016/bs.adcom.2019.07.008}, doi = {10.1016/BS.ADCOM.2019.07.008}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/WalkerSD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/YangFBCW19, author = {Guowei Yang and Antonio Filieri and Mateus Borges and Donato Clun and Junye Wen}, title = {Chapter Five - Advances in Symbolic Execution}, journal = {Adv. Comput.}, volume = {113}, pages = {225--287}, year = {2019}, url = {https://doi.org/10.1016/bs.adcom.2018.10.002}, doi = {10.1016/BS.ADCOM.2018.10.002}, timestamp = {Mon, 31 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ac/YangFBCW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/0034SWL18, author = {Peng Zhang and Douglas C. Schmidt and Jules White and Gunther Lenz}, title = {Chapter One - Blockchain Technology Use Cases in Healthcare}, journal = {Adv. Comput.}, volume = {111}, pages = {1--41}, year = {2018}, url = {https://doi.org/10.1016/bs.adcom.2018.03.006}, doi = {10.1016/BS.ADCOM.2018.03.006}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/0034SWL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/AhmadBFL18, author = {Abbas Ahmad and Fabrice Bouquet and Elizabeta Fourneret and Bruno Legeard}, title = {Chapter One - Model-Based Testing for Internet of Things Systems}, journal = {Adv. Comput.}, volume = {108}, pages = {1--58}, year = {2018}, url = {https://doi.org/10.1016/bs.adcom.2017.11.002}, doi = {10.1016/BS.ADCOM.2017.11.002}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/AhmadBFL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/AxonGC18, author = {Louise Axon and Michael Goldsmith and Sadie Creese}, title = {Chapter Eight - Privacy Requirements in Cybersecurity Applications of Blockchain}, journal = {Adv. Comput.}, volume = {111}, pages = {229--278}, year = {2018}, url = {https://doi.org/10.1016/bs.adcom.2018.03.004}, doi = {10.1016/BS.ADCOM.2018.03.004}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/AxonGC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Banerjee18, author = {Arnab Banerjee}, title = {Chapter Three - Blockchain Technology: Supply Chain Insights from {ERP}}, journal = {Adv. Comput.}, volume = {111}, pages = {69--98}, year = {2018}, url = {https://doi.org/10.1016/bs.adcom.2018.03.007}, doi = {10.1016/BS.ADCOM.2018.03.007}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Banerjee18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/BanescuP18, author = {Sebastian Banescu and Alexander Pretschner}, title = {Chapter Five - {A} Tutorial on Software Obfuscation}, journal = {Adv. Comput.}, volume = {108}, pages = {283--353}, year = {2018}, url = {https://doi.org/10.1016/bs.adcom.2017.09.004}, doi = {10.1016/BS.ADCOM.2017.09.004}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/BanescuP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Deka18, author = {Ganesh Chandra Deka}, title = {Chapter Three - NoSQL Web Crawler Application}, journal = {Adv. Comput.}, volume = {109}, pages = {77--100}, year = {2018}, url = {https://doi.org/10.1016/bs.adcom.2017.08.001}, doi = {10.1016/BS.ADCOM.2017.08.001}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Deka18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Deka18a, author = {Ganesh Chandra Deka}, title = {Chapter Nine - NoSQL Polyglot Persistence}, journal = {Adv. Comput.}, volume = {109}, pages = {357--390}, year = {2018}, url = {https://doi.org/10.1016/bs.adcom.2017.08.003}, doi = {10.1016/BS.ADCOM.2017.08.003}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Deka18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Duggirala18, author = {Siddhartha Duggirala}, title = {Chapter Two - NewSQL Databases and Scalable In-Memory Analytics}, journal = {Adv. Comput.}, volume = {109}, pages = {49--76}, year = {2018}, url = {https://doi.org/10.1016/bs.adcom.2018.01.004}, doi = {10.1016/BS.ADCOM.2018.01.004}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Duggirala18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Garg18, author = {Siddharth Garg}, title = {Chapter Five - Dynamic Power Management for Dark Silicon Multicore Processors\({}^{\mbox{{\unicode{9734}}}}\)}, journal = {Adv. Comput.}, volume = {110}, pages = {171--216}, year = {2018}, url = {https://doi.org/10.1016/bs.adcom.2018.03.016}, doi = {10.1016/BS.ADCOM.2018.03.016}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Garg18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Gharajeh18, author = {Mohammad Samadi Gharajeh}, title = {Chapter Eight - Biological Big Data Analytics}, journal = {Adv. Comput.}, volume = {109}, pages = {321--355}, year = {2018}, url = {https://doi.org/10.1016/bs.adcom.2017.08.002}, doi = {10.1016/BS.ADCOM.2017.08.002}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Gharajeh18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/GuptaA18, author = {Neha Gupta and Rashmi Agrawal}, title = {Chapter Four - NoSQL Security}, journal = {Adv. Comput.}, volume = {109}, pages = {101--132}, year = {2018}, url = {https://doi.org/10.1016/bs.adcom.2018.01.003}, doi = {10.1016/BS.ADCOM.2018.01.003}, timestamp = {Wed, 28 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/GuptaA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/HoveidaA0BAS18, author = {Mohaddeseh Hoveida and Fatemeh Aghaaliakbari and Majid Jalili and Ramin Bashizade and Mohammad Arjomand and Hamid Sarbazi{-}Azad}, title = {Chapter Two - Revisiting Processor Allocation and Application Mapping in Future CMPs in Dark Silicon Era}, journal = {Adv. Comput.}, volume = {110}, pages = {35--81}, year = {2018}, url = {https://doi.org/10.1016/bs.adcom.2018.04.001}, doi = {10.1016/BS.ADCOM.2018.04.001}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/HoveidaA0BAS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/HursonS18, author = {Ali R. Hurson and Hamid Sarbazi{-}Azad}, title = {Preface}, journal = {Adv. Comput.}, volume = {110}, pages = {ix--x}, year = {2018}, url = {https://doi.org/10.1016/S0065-2458(18)30049-4}, doi = {10.1016/S0065-2458(18)30049-4}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/HursonS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Ikeda18, author = {Kazuki Ikeda}, title = {Chapter Seven - Security and Privacy of Blockchain and Quantum Computation}, journal = {Adv. Comput.}, volume = {111}, pages = {199--228}, year = {2018}, url = {https://doi.org/10.1016/bs.adcom.2018.03.003}, doi = {10.1016/BS.ADCOM.2018.03.003}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Ikeda18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/IkedaH18, author = {Kazuki Ikeda and Md{-}Nafiz Hamid}, title = {Chapter Four - Applications of Blockchain in the Financial Sector and a Peer-to-Peer Global Barter Web}, journal = {Adv. Comput.}, volume = {111}, pages = {99--120}, year = {2018}, url = {https://doi.org/10.1016/bs.adcom.2018.03.008}, doi = {10.1016/BS.ADCOM.2018.03.008}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/IkedaH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/KhalilD18, author = {Amal Khalil and Juergen Dingel}, title = {Chapter Four - Optimizing the Symbolic Execution of Evolving Rhapsody Statecharts}, journal = {Adv. Comput.}, volume = {108}, pages = {145--281}, year = {2018}, url = {https://doi.org/10.1016/bs.adcom.2017.09.003}, doi = {10.1016/BS.ADCOM.2017.09.003}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/KhalilD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/KhdrP0H18, author = {Heba Khdr and Santiago Pagani and Muhammad Shafique and J{\"{o}}rg Henkel}, title = {Chapter Four - Dark Silicon Aware Resource Management for Many-Core Systems}, journal = {Adv. Comput.}, volume = {110}, pages = {127--170}, year = {2018}, url = {https://doi.org/10.1016/bs.adcom.2018.03.002}, doi = {10.1016/BS.ADCOM.2018.03.002}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/KhdrP0H18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Kim18, author = {Shiho Kim}, title = {Chapter Two - Blockchain for a Trust Network Among Intelligent Vehicles}, journal = {Adv. Comput.}, volume = {111}, pages = {43--68}, year = {2018}, url = {https://doi.org/10.1016/bs.adcom.2018.03.010}, doi = {10.1016/BS.ADCOM.2018.03.010}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Kim18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/LonettiM18, author = {Francesca Lonetti and Eda Marchetti}, title = {Chapter Three - Emerging Software Testing Technologies}, journal = {Adv. Comput.}, volume = {108}, pages = {91--143}, year = {2018}, url = {https://doi.org/10.1016/bs.adcom.2017.11.003}, doi = {10.1016/BS.ADCOM.2017.11.003}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/LonettiM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Lotfi-KamranS18, author = {Pejman Lotfi{-}Kamran and Hamid Sarbazi{-}Azad}, title = {Chapter One - Dark Silicon and the History of Computing}, journal = {Adv. Comput.}, volume = {110}, pages = {1--33}, year = {2018}, url = {https://doi.org/10.1016/bs.adcom.2018.03.001}, doi = {10.1016/BS.ADCOM.2018.03.001}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Lotfi-KamranS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Memon18, author = {Atif M. Memon}, title = {Preface}, journal = {Adv. Comput.}, volume = {108}, pages = {vii--ix}, year = {2018}, url = {https://doi.org/10.1016/S0065-2458(18)30010-X}, doi = {10.1016/S0065-2458(18)30010-X}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Memon18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/ModarressiS18, author = {Mehdi Modarressi and Hamid Sarbazi{-}Azad}, title = {Chapter Six - Topology Specialization for Networks-on-Chip in the Dark Silicon Era}, journal = {Adv. Comput.}, volume = {110}, pages = {217--258}, year = {2018}, url = {https://doi.org/10.1016/bs.adcom.2018.03.009}, doi = {10.1016/BS.ADCOM.2018.03.009}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/ModarressiS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/RaiC18, author = {Rebika Rai and Prashant Chettri}, title = {Chapter Six - NoSQL Hands On}, journal = {Adv. Comput.}, volume = {109}, pages = {157--277}, year = {2018}, url = {https://doi.org/10.1016/bs.adcom.2017.08.004}, doi = {10.1016/BS.ADCOM.2017.08.004}, timestamp = {Sun, 12 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ac/RaiC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Raj18, author = {Pethuru Raj}, title = {Chapter One - {A} Detailed Analysis of NoSQL and NewSQL Databases for Bigdata Analytics and Distributed Computing}, journal = {Adv. Comput.}, volume = {109}, pages = {1--48}, year = {2018}, url = {https://doi.org/10.1016/bs.adcom.2018.01.002}, doi = {10.1016/BS.ADCOM.2018.01.002}, timestamp = {Thu, 15 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Raj18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Raj18a, author = {Pethuru Raj}, title = {Chapter Seven - The Hadoop Ecosystem Technologies and Tools}, journal = {Adv. Comput.}, volume = {109}, pages = {279--320}, year = {2018}, url = {https://doi.org/10.1016/bs.adcom.2017.09.002}, doi = {10.1016/BS.ADCOM.2017.09.002}, timestamp = {Thu, 15 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Raj18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/RajD18, author = {Pethuru Raj and Ganesh Chandra Deka}, title = {Preface}, journal = {Adv. Comput.}, volume = {109}, pages = {ix--x}, year = {2018}, url = {https://doi.org/10.1016/S0065-2458(18)30039-1}, doi = {10.1016/S0065-2458(18)30039-1}, timestamp = {Thu, 15 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/RajD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/RajD18a, author = {Pethuru Raj and Ganesh Chandra Deka}, title = {Preface}, journal = {Adv. Comput.}, volume = {111}, pages = {ix--x}, year = {2018}, url = {https://doi.org/10.1016/S0065-2458(18)30058-5}, doi = {10.1016/S0065-2458(18)30058-5}, timestamp = {Thu, 15 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/RajD18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/RezaeiDZ18, author = {Amin Rezaei and Masoud Daneshtalab and Hai Zhou}, title = {Chapter Three - Multiobjectivism in Dark Silicon Age}, journal = {Adv. Comput.}, volume = {110}, pages = {83--126}, year = {2018}, url = {https://doi.org/10.1016/bs.adcom.2018.03.012}, doi = {10.1016/BS.ADCOM.2018.03.012}, timestamp = {Wed, 16 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/RezaeiDZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/RodriguesBS18, author = {Bruno Rodrigues and Thomas Bocek and Burkhard Stiller}, title = {Chapter Six - The Use of Blockchains: Application-Driven Analysis of Applicability}, journal = {Adv. Comput.}, volume = {111}, pages = {163--198}, year = {2018}, url = {https://doi.org/10.1016/bs.adcom.2018.03.011}, doi = {10.1016/BS.ADCOM.2018.03.011}, timestamp = {Fri, 25 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/RodriguesBS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/SeifooriEKA18, author = {Zeinab Seifoori and Zahra Ebrahimi and Behnam Khaleghi and Hossein Asadi}, title = {Chapter Seven - Introduction to Emerging SRAM-Based {FPGA} Architectures in Dark Silicon Era}, journal = {Adv. Comput.}, volume = {110}, pages = {259--294}, year = {2018}, url = {https://doi.org/10.1016/bs.adcom.2018.04.002}, doi = {10.1016/BS.ADCOM.2018.04.002}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/SeifooriEKA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/SiddiquiRG18, author = {Junaid Haroon Siddiqui and Affan Rauf and Maryam Abdul Ghafoor}, title = {Chapter Two - Advances in Software Model Checking}, journal = {Adv. Comput.}, volume = {108}, pages = {59--89}, year = {2018}, url = {https://doi.org/10.1016/bs.adcom.2017.11.001}, doi = {10.1016/BS.ADCOM.2017.11.001}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/SiddiquiRG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/SrinivasaH18, author = {Krishnarajanagar G. Srinivasa and Srinidhi Hiriyannaiah}, title = {Chapter Five - Comparative Study of Different In-Memory (No/New) {SQL} Databases}, journal = {Adv. Comput.}, volume = {109}, pages = {133--156}, year = {2018}, url = {https://doi.org/10.1016/bs.adcom.2017.09.001}, doi = {10.1016/BS.ADCOM.2017.09.001}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/SrinivasaH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Swan18, author = {Melanie Swan}, title = {Chapter Five - Blockchain for Business: Next-Generation Enterprise Artificial Intelligence Systems}, journal = {Adv. Comput.}, volume = {111}, pages = {121--162}, year = {2018}, url = {https://doi.org/10.1016/bs.adcom.2018.03.013}, doi = {10.1016/BS.ADCOM.2018.03.013}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Swan18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/AliLWYZ17, author = {Shaukat Ali and Hong Lu and Shuai Wang and Tao Yue and Man Zhang}, title = {Chapter Two - Uncertainty-Wise Testing of Cyber-Physical Systems}, journal = {Adv. Comput.}, volume = {107}, pages = {23--94}, year = {2017}, url = {https://doi.org/10.1016/bs.adcom.2017.06.001}, doi = {10.1016/BS.ADCOM.2017.06.001}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/AliLWYZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Banerjee17, author = {Ishan Banerjee}, title = {Chapter Two - Advances in Model-Based Testing of GUI-Based Software}, journal = {Adv. Comput.}, volume = {105}, pages = {45--78}, year = {2017}, url = {https://doi.org/10.1016/bs.adcom.2016.12.003}, doi = {10.1016/BS.ADCOM.2016.12.003}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Banerjee17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/BelliBBT17, author = {Fevzi Belli and Mutlu Beyazit and Christof J. Budnik and Tugkan Tuglular}, title = {Chapter Five - Advances in Model-Based Testing of Graphical User Interfaces}, journal = {Adv. Comput.}, volume = {107}, pages = {219--280}, year = {2017}, url = {https://doi.org/10.1016/bs.adcom.2017.06.004}, doi = {10.1016/BS.ADCOM.2017.06.004}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ac/BelliBBT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/BlagojevicBBCDD17, author = {Vladimir Blagojevic and Dragan Bojic and Miroslav Bojovic and Milos Cvetanovic and Jovan Dordevic and Dorde M. Durdevic and Bojan Furlan and Slavko Gajin and Zoran Jovanovic and Dragan Milicev and Veljko M. Milutinovic and Bosko Nikolic and Jelica Protic and Marija Punt and Zaharije Radivojevic and Zarko Stanisavljevic and Sasa Stojanovic and Igor Tartalja and Milo Tomasevic and Pavle V. Vuletic}, title = {Chapter One - {A} Systematic Approach to Generation of New Ideas for PhD Research in Computing}, journal = {Adv. Comput.}, volume = {104}, pages = {1--31}, year = {2017}, url = {https://doi.org/10.1016/bs.adcom.2016.09.001}, doi = {10.1016/BS.ADCOM.2016.09.001}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/BlagojevicBBCDD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/BojicB17, author = {Dragan Bojic and Miroslav Bojovic}, title = {Chapter Five - {A} Streaming Dataflow Implementation of Parallel Cocke-Younger-Kasami Parser}, journal = {Adv. Comput.}, volume = {104}, pages = {159--199}, year = {2017}, url = {https://doi.org/10.1016/bs.adcom.2016.09.004}, doi = {10.1016/BS.ADCOM.2016.09.004}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/BojicB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/ChauBFL17, author = {Thomas Chau and Pavel Burovskiy and Michael J. Flynn and Wayne Luk}, title = {Chapter Two - Advances in Dataflow Systems}, journal = {Adv. Comput.}, volume = {106}, pages = {21--62}, year = {2017}, url = {https://doi.org/10.1016/bs.adcom.2017.04.002}, doi = {10.1016/BS.ADCOM.2017.04.002}, timestamp = {Sun, 11 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/ChauBFL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/CibejM17, author = {Uros Cibej and Jurij Mihelic}, title = {Chapter Three - Adaptation and Evaluation of the Simplex Algorithm for a Data-Flow Architecture}, journal = {Adv. Comput.}, volume = {106}, pages = {63--105}, year = {2017}, url = {https://doi.org/10.1016/bs.adcom.2017.04.003}, doi = {10.1016/BS.ADCOM.2017.04.003}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/CibejM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/DssouliKEB17, author = {Rachida Dssouli and Ahmed Khoumsi and Mounia Elqortobi and Jamal Bentahar}, title = {Chapter Three - Testing the Control-Flow, Data-Flow, and Time Aspects of Communication Systems: {A} Survey}, journal = {Adv. Comput.}, volume = {107}, pages = {95--155}, year = {2017}, url = {https://doi.org/10.1016/bs.adcom.2017.06.002}, doi = {10.1016/BS.ADCOM.2017.06.002}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ac/DssouliKEB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Elsaka17, author = {Ethar Elsaka}, title = {Chapter Three - Fault Localization Using Hybrid Static/Dynamic Analysis}, journal = {Adv. Comput.}, volume = {105}, pages = {79--114}, year = {2017}, url = {https://doi.org/10.1016/bs.adcom.2016.12.004}, doi = {10.1016/BS.ADCOM.2016.12.004}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Elsaka17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/GanFMLY17, author = {Lin Gan and Haohuan Fu and Oskar Mencer and Wayne Luk and Guangwen Yang}, title = {Chapter Four - Data Flow Computing in Geoscience Applications}, journal = {Adv. Comput.}, volume = {104}, pages = {125--158}, year = {2017}, url = {https://doi.org/10.1016/bs.adcom.2016.09.005}, doi = {10.1016/BS.ADCOM.2016.09.005}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/GanFMLY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Giorgi17, author = {Roberto Giorgi}, title = {Chapter Two - Exploring Future Many-Core Architectures: The {TERAFLUX} Evaluation Framework}, journal = {Adv. Comput.}, volume = {104}, pages = {33--72}, year = {2017}, url = {https://doi.org/10.1016/bs.adcom.2016.09.002}, doi = {10.1016/BS.ADCOM.2016.09.002}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Giorgi17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/HursonM17, author = {Ali R. Hurson and Veljko Milutinovic}, title = {Preface}, journal = {Adv. Comput.}, volume = {104}, pages = {vii--viii}, year = {2017}, url = {https://doi.org/10.1016/S0065-2458(16)30068-7}, doi = {10.1016/S0065-2458(16)30068-7}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/HursonM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/HursonM17a, author = {Ali R. Hurson and Veljko Milutinovic}, title = {Preface}, journal = {Adv. Comput.}, volume = {106}, pages = {ix--x}, year = {2017}, url = {https://doi.org/10.1016/S0065-2458(17)30025-6}, doi = {10.1016/S0065-2458(17)30025-6}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/HursonM17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/KorolijaPCB17, author = {Nenad Korolija and Jovan Popovic and Milos Cvetanovic and Miroslav Bojovic}, title = {Chapter Three - Dataflow-Based Parallelization of Control-Flow Algorithms}, journal = {Adv. Comput.}, volume = {104}, pages = {73--124}, year = {2017}, url = {https://doi.org/10.1016/bs.adcom.2016.09.003}, doi = {10.1016/BS.ADCOM.2016.09.003}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/KorolijaPCB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/LacknerS17, author = {Hartmut Lackner and Bernd{-}Holger Schlingloff}, title = {Chapter Four - Advances in Testing Software Product Lines}, journal = {Adv. Comput.}, volume = {107}, pages = {157--217}, year = {2017}, url = {https://doi.org/10.1016/bs.adcom.2017.07.001}, doi = {10.1016/BS.ADCOM.2017.07.001}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/LacknerS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Leonard17, author = {Leslie C. Leonard}, title = {Chapter One - Web-Based Behavioral Modeling for Continuous User Authentication {(CUA)}}, journal = {Adv. Comput.}, volume = {105}, pages = {1--44}, year = {2017}, url = {https://doi.org/10.1016/bs.adcom.2016.12.001}, doi = {10.1016/BS.ADCOM.2016.12.001}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Leonard17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Memon17, author = {Atif M. Memon}, title = {Preface}, journal = {Adv. Comput.}, volume = {105}, pages = {vii--ix}, year = {2017}, url = {https://doi.org/10.1016/S0065-2458(17)30007-4}, doi = {10.1016/S0065-2458(17)30007-4}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Memon17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Memon17a, author = {Atif M. Memon}, title = {Preface}, journal = {Adv. Comput.}, volume = {107}, pages = {vii--ix}, year = {2017}, url = {https://doi.org/10.1016/S0065-2458(17)30041-4}, doi = {10.1016/S0065-2458(17)30041-4}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Memon17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/MilutinovicSJDM17, author = {Veljko Milutinovic and Stasa {Vujicic Stankovic} and Aleksandar Jovic and Drazen Draskovic and Marko Misic and Danilo Furundzic}, title = {Chapter One - {A} New Course on R{\&}D Project Management in Computer Science and Engineering: Subjects Taught, Rationales Behind, and Lessons Learned}, journal = {Adv. Comput.}, volume = {106}, pages = {1--19}, year = {2017}, url = {https://doi.org/10.1016/bs.adcom.2017.04.001}, doi = {10.1016/BS.ADCOM.2017.04.001}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/MilutinovicSJDM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Robbins17, author = {Bryan Robbins}, title = {Chapter Four - Characterizing Software Test Case Behavior With Regression Models}, journal = {Adv. Comput.}, volume = {105}, pages = {115--176}, year = {2017}, url = {https://doi.org/10.1016/bs.adcom.2016.12.002}, doi = {10.1016/BS.ADCOM.2016.12.002}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Robbins17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/SeshadriM17, author = {Vivek Seshadri and Onur Mutlu}, title = {Chapter Four - Simple Operations in Memory to Reduce Data Movement}, journal = {Adv. Comput.}, volume = {106}, pages = {107--166}, year = {2017}, url = {https://doi.org/10.1016/bs.adcom.2017.04.004}, doi = {10.1016/BS.ADCOM.2017.04.004}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/SeshadriM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/TrifunovicPTBH17, author = {Nemanja Trifunovic and Boris Perovic and Petar Trifunovic and Zoran Babovic and Ali R. Hurson}, title = {Chapter Five - {A} Novel Infrastructure for Synergistic Dataflow Research, Development, Education, and Deployment: The Maxeler AppGallery Project}, journal = {Adv. Comput.}, volume = {106}, pages = {167--213}, year = {2017}, url = {https://doi.org/10.1016/bs.adcom.2017.04.005}, doi = {10.1016/BS.ADCOM.2017.04.005}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/TrifunovicPTBH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Washizaki17, author = {Hironori Washizaki}, title = {Chapter One - Pitfalls and Countermeasures in Software Quality Measurements and Evaluations}, journal = {Adv. Comput.}, volume = {107}, pages = {1--22}, year = {2017}, url = {https://doi.org/10.1016/bs.adcom.2017.06.003}, doi = {10.1016/BS.ADCOM.2017.06.003}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Washizaki17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/AlouraniBG16, author = {Abdullah Alourani and Md. Abu Naser Bikas and Mark Grechanik}, title = {Input-Sensitive Profiling: {A} Survey}, journal = {Adv. Comput.}, volume = {103}, pages = {31--52}, year = {2016}, url = {https://doi.org/10.1016/bs.adcom.2016.04.002}, doi = {10.1016/BS.ADCOM.2016.04.002}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ac/AlouraniBG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Banerjee0R16, author = {Abhijeet Banerjee and Sudipta Chattopadhyay and Abhik Roychoudhury}, title = {On Testing Embedded Software}, journal = {Adv. Comput.}, volume = {101}, pages = {121--153}, year = {2016}, url = {https://doi.org/10.1016/bs.adcom.2015.11.005}, doi = {10.1016/BS.ADCOM.2015.11.005}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Banerjee0R16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/BikasAG16, author = {Md. Abu Naser Bikas and Abdullah Alourani and Mark Grechanik}, title = {How Elasticity Property Plays an Important Role in the Cloud: {A} Survey}, journal = {Adv. Comput.}, volume = {103}, pages = {1--30}, year = {2016}, url = {https://doi.org/10.1016/bs.adcom.2016.04.001}, doi = {10.1016/BS.ADCOM.2016.04.001}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ac/BikasAG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Do16, author = {Hyunsook Do}, title = {Recent Advances in Regression Testing Techniques}, journal = {Adv. Comput.}, volume = {103}, pages = {53--77}, year = {2016}, url = {https://doi.org/10.1016/bs.adcom.2016.04.004}, doi = {10.1016/BS.ADCOM.2016.04.004}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Do16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/FeldererBJBBP16, author = {Michael Felderer and Matthias B{\"{u}}chler and Martin Johns and Achim D. Brucker and Ruth Breu and Alexander Pretschner}, title = {Security Testing: {A} Survey}, journal = {Adv. Comput.}, volume = {101}, pages = {1--51}, year = {2016}, url = {https://doi.org/10.1016/bs.adcom.2015.11.003}, doi = {10.1016/BS.ADCOM.2015.11.003}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/FeldererBJBBP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/GoudarziP16, author = {Hadi Goudarzi and Massoud Pedram}, title = {Achieving Energy Efficiency in Datacenters by Virtual Machine Sizing, Replication, and Placement}, journal = {Adv. Comput.}, volume = {100}, pages = {161--200}, year = {2016}, url = {https://doi.org/10.1016/bs.adcom.2015.11.001}, doi = {10.1016/BS.ADCOM.2015.11.001}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/GoudarziP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/HeendaliyaWLSH16, author = {Lasanthi Heendaliya and Michael Wisely and Dan Lin and Sahra Sedigh Sarvestani and Ali R. Hurson}, title = {Indexing and Querying Techniques for Moving Objects in Both Euclidean Space and Road Network}, journal = {Adv. Comput.}, volume = {102}, pages = {111--170}, year = {2016}, url = {https://doi.org/10.1016/bs.adcom.2016.05.003}, doi = {10.1016/BS.ADCOM.2016.05.003}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/HeendaliyaWLSH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/HursonG16, author = {Ali R. Hurson and Maziar Goudarzi}, title = {Preface}, journal = {Adv. Comput.}, volume = {102}, pages = {vii--viii}, year = {2016}, url = {https://doi.org/10.1016/S0065-2458(16)30039-0}, doi = {10.1016/S0065-2458(16)30039-0}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/HursonG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/HursonS16, author = {Ali R. Hurson and Hamid Sarbazi{-}Azad}, title = {Preface}, journal = {Adv. Comput.}, volume = {100}, pages = {vii--viii}, year = {2016}, url = {https://doi.org/10.1016/S0065-2458(16)30007-9}, doi = {10.1016/S0065-2458(16)30007-9}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/HursonS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/LeottaCRT16, author = {Maurizio Leotta and Diego Clerissi and Filippo Ricca and Paolo Tonella}, title = {Approaches and Tools for Automated End-to-End Web Testing}, journal = {Adv. Comput.}, volume = {101}, pages = {193--237}, year = {2016}, url = {https://doi.org/10.1016/bs.adcom.2015.11.007}, doi = {10.1016/BS.ADCOM.2015.11.007}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/LeottaCRT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/MasriZ16, author = {Wes Masri and Fadi A. Zaraket}, title = {Coverage-Based Software Testing: Beyond Basic Test Requirements}, journal = {Adv. Comput.}, volume = {103}, pages = {79--142}, year = {2016}, url = {https://doi.org/10.1016/bs.adcom.2016.04.003}, doi = {10.1016/BS.ADCOM.2016.04.003}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/MasriZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/MehdipourNJ16, author = {Farhad Mehdipour and Hamid Noori and Bahman Javadi}, title = {Energy-Efficient Big Data Analytics in Datacenters}, journal = {Adv. Comput.}, volume = {100}, pages = {59--101}, year = {2016}, url = {https://doi.org/10.1016/bs.adcom.2015.10.002}, doi = {10.1016/BS.ADCOM.2015.10.002}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/MehdipourNJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Memon16, author = {Atif M. Memon}, title = {Preface}, journal = {Adv. Comput.}, volume = {101}, pages = {vii--ix}, year = {2016}, url = {https://doi.org/10.1016/S0065-2458(16)30019-5}, doi = {10.1016/S0065-2458(16)30019-5}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Memon16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Memon16a, author = {Atif M. Memon}, title = {Preface}, journal = {Adv. Comput.}, volume = {103}, pages = {vii--ix}, year = {2016}, url = {https://doi.org/10.1016/S0065-2458(16)30051-1}, doi = {10.1016/S0065-2458(16)30051-1}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Memon16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/NabavinejadG16, author = {Seyed Morteza Nabavinejad and Maziar Goudarzi}, title = {Communication-Awareness for Energy-Efficiency in Datacenters}, journal = {Adv. Comput.}, volume = {100}, pages = {201--254}, year = {2016}, url = {https://doi.org/10.1016/bs.adcom.2015.11.008}, doi = {10.1016/BS.ADCOM.2015.11.008}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/NabavinejadG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/OoTHRQ16, author = {Thant Zin Oo and Nguyen Hoang Tran and Choong Seon Hong and Shaolei Ren and Gang Quan}, title = {Power Management in Data Centers: Cost, Sustainability, and Demand Response}, journal = {Adv. Comput.}, volume = {100}, pages = {1--57}, year = {2016}, url = {https://doi.org/10.1016/bs.adcom.2015.10.001}, doi = {10.1016/BS.ADCOM.2015.10.001}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ac/OoTHRQ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/RahmanAAYW16, author = {Farzana Rahman and Ivor D. Addo and Sheikh Iqbal Ahamed and Ji{-}Jiang Yang and Qing Wang}, title = {Privacy Challenges and Goals in mHealth Systems}, journal = {Adv. Comput.}, volume = {102}, pages = {47--62}, year = {2016}, url = {https://doi.org/10.1016/bs.adcom.2016.05.004}, doi = {10.1016/BS.ADCOM.2016.05.004}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/RahmanAAYW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/SampaioB16, author = {Altino M. Sampaio and Jorge G. Barbosa}, title = {Energy-Efficient and SLA-Based Resource Management in Cloud Data Centers}, journal = {Adv. Comput.}, volume = {100}, pages = {103--159}, year = {2016}, url = {https://doi.org/10.1016/bs.adcom.2015.11.002}, doi = {10.1016/BS.ADCOM.2015.11.002}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/SampaioB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/SampathS16, author = {Sreedevi Sampath and Sara Sprenkle}, title = {Advances in Web Application Testing, 2010-2014}, journal = {Adv. Comput.}, volume = {101}, pages = {155--191}, year = {2016}, url = {https://doi.org/10.1016/bs.adcom.2015.11.006}, doi = {10.1016/BS.ADCOM.2015.11.006}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/SampathS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/ShoemakerWM16, author = {Daniel Shoemaker and Carol Woody and Nancy R. Mead}, title = {Advances in Software Engineering and Software Assurance}, journal = {Adv. Comput.}, volume = {102}, pages = {1--46}, year = {2016}, url = {https://doi.org/10.1016/bs.adcom.2016.05.001}, doi = {10.1016/BS.ADCOM.2016.05.001}, timestamp = {Tue, 28 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/ShoemakerWM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/UttingLBFPV16, author = {Mark Utting and Bruno Legeard and Fabrice Bouquet and Elizabeta Fourneret and Fabien Peureux and Alexandre Vernotte}, title = {Recent Advances in Model-Based Testing}, journal = {Adv. Comput.}, volume = {101}, pages = {53--120}, year = {2016}, url = {https://doi.org/10.1016/bs.adcom.2015.11.004}, doi = {10.1016/BS.ADCOM.2015.11.004}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/UttingLBFPV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/WoodardWS16, author = {Mark Woodard and Michael Wisely and Sahra Sedigh Sarvestani}, title = {A Survey of Data Cleansing Techniques for Cyber-Physical Critical Infrastructure Systems}, journal = {Adv. Comput.}, volume = {102}, pages = {63--110}, year = {2016}, url = {https://doi.org/10.1016/bs.adcom.2016.05.002}, doi = {10.1016/BS.ADCOM.2016.05.002}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/WoodardWS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/AhoKRR15, author = {Pekka Aho and Teemu Kanstr{\'{e}}n and Tomi R{\"{a}}ty and Juha R{\"{o}}ning}, title = {Automated Extraction of {GUI} Models for Testing}, journal = {Adv. Comput.}, volume = {95}, pages = {49--112}, year = {2015}, url = {https://doi.org/10.1016/B978-0-12-800160-8.00002-4}, doi = {10.1016/B978-0-12-800160-8.00002-4}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ac/AhoKRR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/BechikhKSG15, author = {Slim Bechikh and Marouane Kessentini and Lamjed Ben Said and Khaled Gh{\'{e}}dira}, title = {Chapter Four - Preference Incorporation in Evolutionary Multiobjective Optimization: {A} Survey of the State-of-the-Art}, journal = {Adv. Comput.}, volume = {98}, pages = {141--207}, year = {2015}, url = {https://doi.org/10.1016/bs.adcom.2015.03.001}, doi = {10.1016/BS.ADCOM.2015.03.001}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/BechikhKSG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Gasarch15, author = {William I. Gasarch}, title = {Classifying Problems into Complexity Classes}, journal = {Adv. Comput.}, volume = {95}, pages = {239--292}, year = {2015}, url = {https://doi.org/10.1016/B978-0-12-800160-8.00005-X}, doi = {10.1016/B978-0-12-800160-8.00005-X}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Gasarch15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Gasarch15a, author = {William I. Gasarch}, title = {Proving Programs Terminate Using Well-Founded Orderings, Ramsey's Theorem, and Matrices}, journal = {Adv. Comput.}, volume = {97}, pages = {147--200}, year = {2015}, url = {https://doi.org/10.1016/bs.adcom.2014.12.002}, doi = {10.1016/BS.ADCOM.2014.12.002}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Gasarch15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Gotlieb15, author = {Arnaud Gotlieb}, title = {Constraint-Based Testing: An Emerging Trend in Software Testing}, journal = {Adv. Comput.}, volume = {99}, pages = {67--101}, year = {2015}, url = {https://doi.org/10.1016/bs.adcom.2015.05.002}, doi = {10.1016/BS.ADCOM.2015.05.002}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Gotlieb15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Hurson15, author = {Ali R. Hurson}, title = {Preface}, journal = {Adv. Comput.}, volume = {98}, pages = {vii--viii}, year = {2015}, url = {https://doi.org/10.1016/S0065-2458(15)00042-X}, doi = {10.1016/S0065-2458(15)00042-X}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Hurson15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/HursonM15, author = {Ali R. Hurson and Veljko Milutinovic}, title = {Preface}, journal = {Adv. Comput.}, volume = {96}, pages = {vii--viii}, year = {2015}, url = {https://doi.org/10.1016/S0065-2458(15)00008-X}, doi = {10.1016/S0065-2458(15)00008-X}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/HursonM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/KaviSP15, author = {Krishna M. Kavi and Charles Shelor and Domenico Pace}, title = {Concurrency, Synchronization, and Speculation - The Dataflow Way}, journal = {Adv. Comput.}, volume = {96}, pages = {47--104}, year = {2015}, url = {https://doi.org/10.1016/bs.adcom.2014.10.004}, doi = {10.1016/BS.ADCOM.2014.10.004}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/KaviSP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/KosRT15, author = {Anton Kos and Vukasin Rankovic and Saso Tomazic}, title = {Sorting Networks on Maxeler Dataflow Supercomputing Systems}, journal = {Adv. Comput.}, volume = {96}, pages = {139--186}, year = {2015}, url = {https://doi.org/10.1016/bs.adcom.2014.10.001}, doi = {10.1016/BS.ADCOM.2014.10.001}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/KosRT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/KuhnBDGLK15, author = {D. Richard Kuhn and Ren{\'{e}}e C. Bryce and Feng Duan and Laleh Shikh Gholamhossein Ghandehari and Yu Lei and Raghu N. Kacker}, title = {Combinatorial Testing: Theory and Practice}, journal = {Adv. Comput.}, volume = {99}, pages = {1--66}, year = {2015}, url = {https://doi.org/10.1016/bs.adcom.2015.05.003}, doi = {10.1016/BS.ADCOM.2015.05.003}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ac/KuhnBDGLK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/MarianiPZ15, author = {Leonardo Mariani and Mauro Pezz{\`{e}} and Daniele Zuddas}, title = {Recent Advances in Automatic Black-Box Testing}, journal = {Adv. Comput.}, volume = {99}, pages = {157--193}, year = {2015}, url = {https://doi.org/10.1016/bs.adcom.2015.04.002}, doi = {10.1016/BS.ADCOM.2015.04.002}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/MarianiPZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/MarinescuSGP15, author = {Raluca Marinescu and Cristina Seceleanu and H{\'{e}}l{\`{e}}ne Le Guen and Paul Pettersson}, title = {Chapter Three - {A} Research Overview of Tool-Supported Model-based Testing of Requirements-based Designs}, journal = {Adv. Comput.}, volume = {98}, pages = {89--140}, year = {2015}, url = {https://doi.org/10.1016/bs.adcom.2015.03.003}, doi = {10.1016/BS.ADCOM.2015.03.003}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ac/MarinescuSGP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Masri15, author = {Wes Masri}, title = {Automated Fault Localization: Advances and Challenges}, journal = {Adv. Comput.}, volume = {99}, pages = {103--156}, year = {2015}, url = {https://doi.org/10.1016/bs.adcom.2015.05.001}, doi = {10.1016/BS.ADCOM.2015.05.001}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Masri15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Memon15, author = {Atif M. Memon}, title = {Preface}, journal = {Adv. Comput.}, volume = {95}, pages = {ix--xi}, year = {2015}, url = {https://doi.org/10.1016/B978-0-12-800160-8.10000-2}, doi = {10.1016/B978-0-12-800160-8.10000-2}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Memon15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Memon15a, author = {Atif M. Memon}, title = {Preface}, journal = {Adv. Comput.}, volume = {97}, pages = {ix--x}, year = {2015}, url = {https://doi.org/10.1016/S0065-2458(15)00021-2}, doi = {10.1016/S0065-2458(15)00021-2}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Memon15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Memon15b, author = {Atif M. Memon}, title = {Preface}, journal = {Adv. Comput.}, volume = {99}, pages = {vii--viii}, year = {2015}, url = {https://doi.org/10.1016/S0065-2458(15)00054-6}, doi = {10.1016/S0065-2458(15)00054-6}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Memon15b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Mesbah15, author = {Ali Mesbah}, title = {Advances in Testing JavaScript-Based Web Applications}, journal = {Adv. Comput.}, volume = {97}, pages = {201--235}, year = {2015}, url = {https://doi.org/10.1016/bs.adcom.2014.12.003}, doi = {10.1016/BS.ADCOM.2014.12.003}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Mesbah15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/MouelhiKT15, author = {Tejeddine Mouelhi and Donia El Kateb and Yves Le Traon}, title = {Inroads in Testing Access Control}, journal = {Adv. Comput.}, volume = {99}, pages = {195--222}, year = {2015}, url = {https://doi.org/10.1016/bs.adcom.2015.04.003}, doi = {10.1016/BS.ADCOM.2015.04.003}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/MouelhiKT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/OliveiraKN15, author = {Rafael A. P. Oliveira and Upulee Kanewala and Paulo Augusto Nardi}, title = {Automated Test Oracles: State of the Art, Taxonomies, and Trends}, journal = {Adv. Comput.}, volume = {95}, pages = {113--199}, year = {2015}, url = {https://doi.org/10.1016/B978-0-12-800160-8.00003-6}, doi = {10.1016/B978-0-12-800160-8.00003-6}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/OliveiraKN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/OriatoGM15, author = {Diego Oriato and Stephen Girdlestone and Oskar Mencer}, title = {Dataflow Computing in Extreme Performance Conditions}, journal = {Adv. Comput.}, volume = {96}, pages = {105--137}, year = {2015}, url = {https://doi.org/10.1016/bs.adcom.2014.11.002}, doi = {10.1016/BS.ADCOM.2014.11.002}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/OriatoGM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/PalombaLBO15, author = {Fabio Palomba and Andrea De Lucia and Gabriele Bavota and Rocco Oliveto}, title = {Anti-Pattern Detection: Methods, Challenges, and Open Issues}, journal = {Adv. Comput.}, volume = {95}, pages = {201--238}, year = {2015}, url = {https://doi.org/10.1016/B978-0-12-800160-8.00004-8}, doi = {10.1016/B978-0-12-800160-8.00004-8}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/PalombaLBO15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/PezzeZ15, author = {Mauro Pezz{\`{e}} and Cheng Zhang}, title = {Automated Test Oracles: {A} Survey}, journal = {Adv. Comput.}, volume = {95}, pages = {1--48}, year = {2015}, url = {https://doi.org/10.1016/B978-0-12-800160-8.00001-2}, doi = {10.1016/B978-0-12-800160-8.00001-2}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/PezzeZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/RatkovicBUCM15, author = {Ivan Ratkovic and Nikola Bezanic and Osman S. {\"{U}}nsal and Adri{\'{a}}n Cristal and Veljko Milutinovic}, title = {Chapter One - An Overview of Architecture-Level Power- and Energy-Efficient Design Techniques}, journal = {Adv. Comput.}, volume = {98}, pages = {1--57}, year = {2015}, url = {https://doi.org/10.1016/bs.adcom.2015.04.001}, doi = {10.1016/BS.ADCOM.2015.04.001}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/RatkovicBUCM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Ristevski15, author = {Blagoj Ristevski}, title = {Overview of Computational Approaches for Inference of MicroRNA-Mediated and Gene Regulatory Networks}, journal = {Adv. Comput.}, volume = {97}, pages = {111--145}, year = {2015}, url = {https://doi.org/10.1016/bs.adcom.2014.12.001}, doi = {10.1016/BS.ADCOM.2014.12.001}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Ristevski15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Roubtsova15, author = {Ella E. Roubtsova}, title = {Advances in Behavior Modeling}, journal = {Adv. Comput.}, volume = {97}, pages = {49--109}, year = {2015}, url = {https://doi.org/10.1016/bs.adcom.2014.10.003}, doi = {10.1016/BS.ADCOM.2014.10.003}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Roubtsova15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/StojanovicBB15, author = {Sasa Stojanovic and Dragan Bojic and Miroslav Bojovic}, title = {An Overview of Selected Heterogeneous and Reconfigurable Architectures}, journal = {Adv. Comput.}, volume = {96}, pages = {1--45}, year = {2015}, url = {https://doi.org/10.1016/bs.adcom.2014.11.003}, doi = {10.1016/BS.ADCOM.2014.11.003}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/StojanovicBB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/SustranRM15, author = {Zivojin Sustran and Goran Rakocevic and Veljko Milutinovic}, title = {Dual Data Cache Systems: Architecture and Analysis}, journal = {Adv. Comput.}, volume = {96}, pages = {187--233}, year = {2015}, url = {https://doi.org/10.1016/bs.adcom.2014.11.001}, doi = {10.1016/BS.ADCOM.2014.11.001}, timestamp = {Fri, 04 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/SustranRM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Varnell-Sarjeant15, author = {Julia F. Varnell{-}Sarjeant and Anneliese Amschler Andrews}, title = {Comparing Reuse Strategies in Different Development Environments}, journal = {Adv. Comput.}, volume = {97}, pages = {1--47}, year = {2015}, url = {https://doi.org/10.1016/bs.adcom.2014.10.002}, doi = {10.1016/BS.ADCOM.2014.10.002}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Varnell-Sarjeant15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/WoodardSH15, author = {Mark Woodard and Sahra Sedigh Sarvestani and Ali R. Hurson}, title = {Chapter Two - {A} Survey of Research on Data Corruption in Cyber-Physical Critical Infrastructure Systems}, journal = {Adv. Comput.}, volume = {98}, pages = {59--87}, year = {2015}, url = {https://doi.org/10.1016/bs.adcom.2015.03.002}, doi = {10.1016/BS.ADCOM.2015.03.002}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/WoodardSH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/ElmehdwiJH14, author = {Yousef Elmehdwi and Wei Jiang and Ali R. Hurson}, title = {Similarity of Private Keyword Search over Encrypted Document Collection}, journal = {Adv. Comput.}, volume = {94}, pages = {71--102}, year = {2014}, url = {https://doi.org/10.1016/B978-0-12-800161-5.00003-7}, doi = {10.1016/B978-0-12-800161-5.00003-7}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/ElmehdwiJH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Hurson14, author = {Ali R. Hurson}, title = {Preface}, journal = {Adv. Comput.}, volume = {92}, pages = {vii--viii}, year = {2014}, url = {https://doi.org/10.1016/B978-0-12-420232-0.09993-1}, doi = {10.1016/B978-0-12-420232-0.09993-1}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Hurson14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Hurson14a, author = {Ali R. Hurson}, title = {Preface}, journal = {Adv. Comput.}, volume = {94}, pages = {vii--viii}, year = {2014}, url = {https://doi.org/10.1016/B978-0-12-800161-5.09995-3}, doi = {10.1016/B978-0-12-800161-5.09995-3}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Hurson14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/JanjusicK14, author = {Tomislav Janjusic and Krishna M. Kavi}, title = {Hardware and Application Profiling Tools}, journal = {Adv. Comput.}, volume = {92}, pages = {105--160}, year = {2014}, url = {https://doi.org/10.1016/B978-0-12-420232-0.00003-9}, doi = {10.1016/B978-0-12-420232-0.00003-9}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/JanjusicK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/LarsenL14, author = {Steen Larsen and Ben Lee}, title = {Survey on System {I/O} Hardware Transactions and Impact on Latency, Throughput, and Other Factors}, journal = {Adv. Comput.}, volume = {92}, pages = {67--104}, year = {2014}, url = {https://doi.org/10.1016/B978-0-12-420232-0.00002-7}, doi = {10.1016/B978-0-12-420232-0.00002-7}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/LarsenL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/LiM14, author = {Feng Li and Bruce M. McMillin}, title = {A Survey on Zero-Knowledge Proofs}, journal = {Adv. Comput.}, volume = {94}, pages = {25--69}, year = {2014}, url = {https://doi.org/10.1016/B978-0-12-800161-5.00002-5}, doi = {10.1016/B978-0-12-800161-5.00002-5}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/LiM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/LucioZNAKVT14, author = {Levi Lucio and Qin Zhang and Phu Hong Nguyen and Moussa Amrani and Jacques Klein and Hans Vangheluwe and Yves Le Traon}, title = {Advances in Model-Driven Security}, journal = {Adv. Comput.}, volume = {93}, pages = {103--152}, year = {2014}, url = {https://doi.org/10.1016/B978-0-12-800162-2.00003-8}, doi = {10.1016/B978-0-12-800162-2.00003-8}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/LucioZNAKVT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/MkaouerK14, author = {Mohamed Wiem Mkaouer and Marouane Kessentini}, title = {Model Transformation Using Multiobjective Optimization}, journal = {Adv. Comput.}, volume = {92}, pages = {161--202}, year = {2014}, url = {https://doi.org/10.1016/B978-0-12-420232-0.00004-0}, doi = {10.1016/B978-0-12-420232-0.00004-0}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/MkaouerK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/OuniKS14, author = {Ali Ouni and Marouane Kessentini and Houari A. Sahraoui}, title = {Multiobjective Optimization for Software Refactoring and Evolution}, journal = {Adv. Comput.}, volume = {94}, pages = {103--167}, year = {2014}, url = {https://doi.org/10.1016/B978-0-12-800161-5.00004-9}, doi = {10.1016/B978-0-12-800161-5.00004-9}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/OuniKS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/RadulovicTM14, author = {Milan B. Radulovic and Milo Tomasevic and Veljko M. Milutinovic}, title = {Register-Level Communication in Speculative Chip Multiprocessors}, journal = {Adv. Comput.}, volume = {92}, pages = {1--66}, year = {2014}, url = {https://doi.org/10.1016/B978-0-12-420232-0.00001-5}, doi = {10.1016/B978-0-12-420232-0.00001-5}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/RadulovicTM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/SantelicesZCJ14, author = {Ra{\'{u}}l A. Santelices and Yiji Zhang and Haipeng Cai and Siyuan Jiang}, title = {Change-Effects Analysis for Evolving Software}, journal = {Adv. Comput.}, volume = {93}, pages = {227--285}, year = {2014}, url = {https://doi.org/10.1016/B978-0-12-800162-2.00005-1}, doi = {10.1016/B978-0-12-800162-2.00005-1}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/SantelicesZCJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/TonellaRM14, author = {Paolo Tonella and Filippo Ricca and Alessandro Marchetto}, title = {Recent Advances in Web Testing}, journal = {Adv. Comput.}, volume = {93}, pages = {1--51}, year = {2014}, url = {https://doi.org/10.1016/B978-0-12-800162-2.00001-4}, doi = {10.1016/B978-0-12-800162-2.00001-4}, timestamp = {Mon, 25 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/TonellaRM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/TrendowiczK14, author = {Adam Trendowicz and Sylwia Kopczynska}, title = {Adapting Multi-Criteria Decision Analysis for Assessing the Quality of Software Products. Current Approaches and Future Perspectives}, journal = {Adv. Comput.}, volume = {93}, pages = {153--226}, year = {2014}, url = {https://doi.org/10.1016/B978-0-12-800162-2.00004-X}, doi = {10.1016/B978-0-12-800162-2.00004-X}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/TrendowiczK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/VitorovicTM14, author = {Aleksandar Vitorovic and Milo Tomasevic and Veljko M. Milutinovic}, title = {Manual Parallelization Versus State-of-the-Art Parallelization Techniques: The {SPEC} {CPU2006} as a Case Study}, journal = {Adv. Comput.}, volume = {92}, pages = {203--251}, year = {2014}, url = {https://doi.org/10.1016/B978-0-12-420232-0.00005-2}, doi = {10.1016/B978-0-12-420232-0.00005-2}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/VitorovicTM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Walcott-Justice14, author = {Kristen Walcott{-}Justice}, title = {Exploiting Hardware Monitoring in Software Engineering}, journal = {Adv. Comput.}, volume = {93}, pages = {53--101}, year = {2014}, url = {https://doi.org/10.1016/B978-0-12-800162-2.00002-6}, doi = {10.1016/B978-0-12-800162-2.00002-6}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Walcott-Justice14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/WhiteS14, author = {Steven C. White and Sahra Sedigh Sarvestani}, title = {Comparison of Security Models: Attack Graphs Versus Petri Nets}, journal = {Adv. Comput.}, volume = {94}, pages = {1--24}, year = {2014}, url = {https://doi.org/10.1016/B978-0-12-800161-5.00001-3}, doi = {10.1016/B978-0-12-800161-5.00001-3}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/WhiteS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/AliS13, author = {Amjad Ali and Khalid Saifullah Syed}, title = {An Outlook of High Performance Computing Infrastructures for Scientific Computing}, journal = {Adv. Comput.}, volume = {91}, pages = {87--118}, year = {2013}, url = {https://doi.org/10.1016/B978-0-12-408089-8.00003-3}, doi = {10.1016/B978-0-12-408089-8.00003-3}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/AliS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/AmalfitanoFTR13, author = {Domenico Amalfitano and Anna Rita Fasolino and Porfirio Tramontana and Bryan Robbins}, title = {Testing Android Mobile Applications: Challenges, Strategies, and Approaches}, journal = {Adv. Comput.}, volume = {89}, pages = {1--52}, year = {2013}, url = {https://doi.org/10.1016/B978-0-12-408094-2.00001-1}, doi = {10.1016/B978-0-12-408094-2.00001-1}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ac/AmalfitanoFTR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/BabovicM13, author = {Zoran Babovic and Veljko Milutinovic}, title = {Novel System Architectures for Semantic-Based Integration of Sensor Networks}, journal = {Adv. Comput.}, volume = {90}, pages = {91--183}, year = {2013}, url = {https://doi.org/10.1016/B978-0-12-408091-1.00002-6}, doi = {10.1016/B978-0-12-408091-1.00002-6}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/BabovicM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/BerlNM13, author = {Andreas Berl and Michael Niedermeier and Hermann de Meer}, title = {Smart Grid Considerations: Energy Efficiency vs. Security}, journal = {Adv. Comput.}, volume = {88}, pages = {159--198}, year = {2013}, url = {https://doi.org/10.1016/B978-0-12-407725-6.00004-6}, doi = {10.1016/B978-0-12-407725-6.00004-6}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ac/BerlNM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/BohmeRO13, author = {Marcel B{\"{o}}hme and Abhik Roychoudhury and Bruno C. d. S. Oliveira}, title = {Regression Testing of Evolving Programs}, journal = {Adv. Comput.}, volume = {89}, pages = {53--88}, year = {2013}, url = {https://doi.org/10.1016/B978-0-12-408094-2.00002-3}, doi = {10.1016/B978-0-12-408094-2.00002-3}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/BohmeRO13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/ChellappanD13, author = {Sriram Chellappan and Neelanjana Dutta}, title = {Mobility in Wireless Sensor Networks}, journal = {Adv. Comput.}, volume = {90}, pages = {185--222}, year = {2013}, url = {https://doi.org/10.1016/B978-0-12-408091-1.00003-8}, doi = {10.1016/B978-0-12-408091-1.00003-8}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/ChellappanD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/DeSXST13, author = {Debraj De and Wen{-}Zhan Song and Mingsen Xu and Lei Shi and Song Tan}, title = {Advances in Real-World Sensor Network System}, journal = {Adv. Comput.}, volume = {90}, pages = {1--90}, year = {2013}, url = {https://doi.org/10.1016/B978-0-12-408091-1.00001-4}, doi = {10.1016/B978-0-12-408091-1.00001-4}, timestamp = {Wed, 19 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/DeSXST13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/GarousiKS13, author = {Vahid Garousi and Riley Kotchorek and Michael Smith}, title = {Test Cost-Effectiveness and Defect Density: {A} Case Study on the Android Platform}, journal = {Adv. Comput.}, volume = {89}, pages = {163--206}, year = {2013}, url = {https://doi.org/10.1016/B978-0-12-408094-2.00005-9}, doi = {10.1016/B978-0-12-408094-2.00005-9}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/GarousiKS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/GrosskopV13, author = {Kay Grosskop and Joost Visser}, title = {Energy Efficiency Optimization of Application Software}, journal = {Adv. Comput.}, volume = {88}, pages = {199--241}, year = {2013}, url = {https://doi.org/10.1016/B978-0-12-407725-6.00005-8}, doi = {10.1016/B978-0-12-407725-6.00005-8}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ac/GrosskopV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/GuptaGM13, author = {Rajeev Gupta and Himanshu Gupta and Mukesh K. Mohania}, title = {Efficient Data Analytics Over Cloud}, journal = {Adv. Comput.}, volume = {90}, pages = {367--401}, year = {2013}, url = {https://doi.org/10.1016/B978-0-12-408091-1.00006-3}, doi = {10.1016/B978-0-12-408091-1.00006-3}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/GuptaGM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/IrfanOG13, author = {Muhammad{-}Naeem Irfan and Catherine Oriat and Roland Groz}, title = {Model Inference and Testing}, journal = {Adv. Comput.}, volume = {89}, pages = {89--139}, year = {2013}, url = {https://doi.org/10.1016/B978-0-12-408094-2.00003-5}, doi = {10.1016/B978-0-12-408094-2.00003-5}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/IrfanOG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Knobloch13, author = {Michael Knobloch}, title = {Energy-Aware High Performance Computing - {A} Survey}, journal = {Adv. Comput.}, volume = {88}, pages = {1--78}, year = {2013}, url = {https://doi.org/10.1016/B978-0-12-407725-6.00001-0}, doi = {10.1016/B978-0-12-407725-6.00001-0}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Knobloch13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/MarsT13, author = {Jason Mars and Lingjia Tang}, title = {Understanding Application Contentiousness and Sensitivity on Modern Multicores}, journal = {Adv. Comput.}, volume = {91}, pages = {59--85}, year = {2013}, url = {https://doi.org/10.1016/B978-0-12-408089-8.00002-1}, doi = {10.1016/B978-0-12-408089-8.00002-1}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/MarsT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/MurrayLPS13, author = {Jacob Murray and Teng Lu and Partha Pratim Pande and Behrooz A. Shirazi}, title = {Sustainable DVFS-Enabled Multi-Core Architectures with On-Chip Wireless Links}, journal = {Adv. Comput.}, volume = {88}, pages = {125--158}, year = {2013}, url = {https://doi.org/10.1016/B978-0-12-407725-6.00003-4}, doi = {10.1016/B978-0-12-407725-6.00003-4}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/MurrayLPS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Qu13, author = {Xiao Qu}, title = {Testing of Configurable Systems}, journal = {Adv. Comput.}, volume = {89}, pages = {141--162}, year = {2013}, url = {https://doi.org/10.1016/B978-0-12-408094-2.00004-7}, doi = {10.1016/B978-0-12-408094-2.00004-7}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Qu13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/ShiS13, author = {Bing Shi and Ankur Srivastava}, title = {Micro-Fluidic Cooling for Stacked 3D-ICs: Fundamentals, Modeling and Design}, journal = {Adv. Comput.}, volume = {88}, pages = {79--124}, year = {2013}, url = {https://doi.org/10.1016/B978-0-12-407725-6.00002-2}, doi = {10.1016/B978-0-12-407725-6.00002-2}, timestamp = {Thu, 18 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ac/ShiS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/SlattenHK13, author = {Vidar Sl{\aa}tten and Peter Herrmann and Frank Alexander Kraemer}, title = {Model-Driven Engineering of Reliable Fault-Tolerant Systems - {A} State-of-the-Art Survey}, journal = {Adv. Comput.}, volume = {91}, pages = {119--205}, year = {2013}, url = {https://doi.org/10.1016/B978-0-12-408089-8.00004-5}, doi = {10.1016/B978-0-12-408089-8.00004-5}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/SlattenHK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/SousaPC13, author = {Bruno Sousa and Kostas Pentikousis and Mar{\'{\i}}lia Curado}, title = {Multihoming: {A} Comprehensive Review}, journal = {Adv. Comput.}, volume = {90}, pages = {285--365}, year = {2013}, url = {https://doi.org/10.1016/B978-0-12-408091-1.00005-1}, doi = {10.1016/B978-0-12-408091-1.00005-1}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/SousaPC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/StankovicKRVM13, author = {Stasa {Vujicic Stankovic} and Nemanja Kojic and Goran Rakocevic and Dusko Vitas and Veljko Milutinovic}, title = {A Classification of Data Mining Algorithms for Wireless Sensor Networks, and Classification Extension to Concept Modeling in System of Wireless Sensor Networks Based on Natural Language Processing}, journal = {Adv. Comput.}, volume = {90}, pages = {223--283}, year = {2013}, url = {https://doi.org/10.1016/B978-0-12-408091-1.00004-X}, doi = {10.1016/B978-0-12-408091-1.00004-X}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ac/StankovicKRVM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Walkinshaw13, author = {Neil Walkinshaw}, title = {Reverse-Engineering Software Behavior}, journal = {Adv. Comput.}, volume = {91}, pages = {1--58}, year = {2013}, url = {https://doi.org/10.1016/B978-0-12-408089-8.00001-X}, doi = {10.1016/B978-0-12-408089-8.00001-X}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Walkinshaw13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/ArltBPS12, author = {Stephan Arlt and Cristiano Bertolini and Simon Pahl and Martin Sch{\"{a}}f}, title = {Trends in Model-based {GUI} Testing}, journal = {Adv. Comput.}, volume = {86}, pages = {183--222}, year = {2012}, url = {https://doi.org/10.1016/B978-0-12-396535-6.00006-5}, doi = {10.1016/B978-0-12-396535-6.00006-5}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/ArltBPS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/AssuncaoL12, author = {Marcos Dias de Assun{\c{c}}{\~{a}}o and Laurent Lef{\`{e}}vre}, title = {State of the Art on Technology and Practices for Improving the Energy Efficiency of Data Storage}, journal = {Adv. Comput.}, volume = {87}, pages = {89--124}, year = {2012}, url = {https://doi.org/10.1016/B978-0-12-396528-8.00004-3}, doi = {10.1016/B978-0-12-396528-8.00004-3}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/AssuncaoL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/BelliBG12, author = {Fevzi Belli and Mutlu Beyazit and Nevin G{\"{u}}ler}, title = {Event-Oriented, Model-Based {GUI} Testing and Reliability Assessment - Approach and Case Study}, journal = {Adv. Comput.}, volume = {85}, pages = {277--326}, year = {2012}, url = {https://doi.org/10.1016/B978-0-12-396526-4.00006-0}, doi = {10.1016/B978-0-12-396526-4.00006-0}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/BelliBG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/BelliBMN12, author = {Fevzi Belli and Mutlu Beyazit and Aditya P. Mathur and Nimal Nissanke}, title = {Modeling, Analysis, and Testing of System Vulnerabilities}, journal = {Adv. Comput.}, volume = {84}, pages = {39--92}, year = {2012}, url = {https://doi.org/10.1016/B978-0-12-396525-7.00002-2}, doi = {10.1016/B978-0-12-396525-7.00002-2}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/BelliBMN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/CrouzetK12, author = {Yves Crouzet and Karama Kanoun}, title = {System Dependability: Characterization and Benchmarking}, journal = {Adv. Comput.}, volume = {84}, pages = {93--139}, year = {2012}, url = {https://doi.org/10.1016/B978-0-12-396525-7.00004-6}, doi = {10.1016/B978-0-12-396525-7.00004-6}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/CrouzetK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/DangBV12, author = {Nga Dang and Elaheh Bozorgzadeh and Nalini Venkatasubramanian}, title = {Energy Harvesting for Sustainable Smart Spaces}, journal = {Adv. Comput.}, volume = {87}, pages = {203--251}, year = {2012}, url = {https://doi.org/10.1016/B978-0-12-396528-8.00006-7}, doi = {10.1016/B978-0-12-396528-8.00006-7}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/DangBV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/DevJK12, author = {Rupesh Dev and Antti J{\"{a}}{\"{a}}skel{\"{a}}inen and Mika Katara}, title = {Model-Based {GUI} Testing: Case Smartphone Camera and Messaging Development}, journal = {Adv. Comput.}, volume = {85}, pages = {65--122}, year = {2012}, url = {https://doi.org/10.1016/B978-0-12-396526-4.00002-3}, doi = {10.1016/B978-0-12-396526-4.00002-3}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/DevJK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Eaton12, author = {Cyntrica Eaton}, title = {A Framework for Detecting and Diagnosing Configuration Faults in Web Applications}, journal = {Adv. Comput.}, volume = {86}, pages = {137--181}, year = {2012}, url = {https://doi.org/10.1016/B978-0-12-396535-6.00005-3}, doi = {10.1016/B978-0-12-396535-6.00005-3}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Eaton12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/GoelMS12, author = {Bhavishya Goel and Sally A. McKee and Magnus Sj{\"{a}}lander}, title = {Techniques to Measure, Model, and Manage Power}, journal = {Adv. Comput.}, volume = {87}, pages = {7--54}, year = {2012}, url = {https://doi.org/10.1016/B978-0-12-396528-8.00002-X}, doi = {10.1016/B978-0-12-396528-8.00002-X}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/GoelMS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/GoveF12, author = {Robert Gove and Jorge Faytong}, title = {Machine Learning and Event-Based Software Testing: Classifiers for Identifying Infeasible {GUI} Event Sequences}, journal = {Adv. Comput.}, volume = {86}, pages = {109--135}, year = {2012}, url = {https://doi.org/10.1016/B978-0-12-396535-6.00004-1}, doi = {10.1016/B978-0-12-396535-6.00004-1}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/GoveF12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/HamdaqaT12, author = {Mohammad Hamdaqa and Ladan Tahvildari}, title = {Cloud Computing Uncovered: {A} Research Landscape}, journal = {Adv. Comput.}, volume = {86}, pages = {41--85}, year = {2012}, url = {https://doi.org/10.1016/B978-0-12-396535-6.00002-8}, doi = {10.1016/B978-0-12-396535-6.00002-8}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/HamdaqaT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/HerboldBGW12, author = {Steffen Herbold and Uwe B{\"{u}}nting and Jens Grabowski and Stephan Waack}, title = {Deployable Capture/Replay Supported by Internal Messages}, journal = {Adv. Comput.}, volume = {85}, pages = {327--367}, year = {2012}, url = {https://doi.org/10.1016/B978-0-12-396526-4.00007-2}, doi = {10.1016/B978-0-12-396526-4.00007-2}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/HerboldBGW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/HursonS12, author = {Ali R. Hurson and Sahra Sedigh}, title = {Preface}, journal = {Adv. Comput.}, volume = {84}, pages = {vii--ix}, year = {2012}, url = {https://doi.org/10.1016/B978-0-12-396525-7.00006-X}, doi = {10.1016/B978-0-12-396525-7.00006-X}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/HursonS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Kasurinen12, author = {Jussi Kasurinen}, title = {Software Organizations and Test Process Development}, journal = {Adv. Comput.}, volume = {85}, pages = {1--63}, year = {2012}, url = {https://doi.org/10.1016/B978-0-12-396526-4.00001-1}, doi = {10.1016/B978-0-12-396526-4.00001-1}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Kasurinen12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/KhanP12, author = {M. Farrukh Khan and Raymond A. Paul}, title = {Pragmatic Directions in Engineering Secure Dependable Systems}, journal = {Adv. Comput.}, volume = {84}, pages = {141--167}, year = {2012}, url = {https://doi.org/10.1016/B978-0-12-396525-7.00005-8}, doi = {10.1016/B978-0-12-396525-7.00005-8}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/KhanP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/LanoR12, author = {Kevin Lano and Shekoufeh Kolahdouz Rahimi}, title = {Model Transformation Specification and Design}, journal = {Adv. Comput.}, volume = {85}, pages = {123--163}, year = {2012}, url = {https://doi.org/10.1016/B978-0-12-396526-4.00003-5}, doi = {10.1016/B978-0-12-396526-4.00003-5}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/LanoR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/MlynarskiGWE12, author = {Michael Mlynarski and Baris G{\"{u}}ldali and Stephan Wei{\ss}leder and Gregor Engels}, title = {Model-Based Testing: Achievements and Future Challenges}, journal = {Adv. Comput.}, volume = {86}, pages = {1--39}, year = {2012}, url = {https://doi.org/10.1016/B978-0-12-396535-6.00001-6}, doi = {10.1016/B978-0-12-396535-6.00001-6}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/MlynarskiGWE12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/NiedermeierLM12, author = {Florian Niedermeier and Gerg{\"{o}} Lov{\'{a}}sz and Hermann de Meer}, title = {Quantifying {IT} Energy Efficiency}, journal = {Adv. Comput.}, volume = {87}, pages = {55--87}, year = {2012}, url = {https://doi.org/10.1016/B978-0-12-396528-8.00003-1}, doi = {10.1016/B978-0-12-396528-8.00003-1}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/NiedermeierLM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/RunesonE12, author = {Per Runeson and Emelie Engstr{\"{o}}m}, title = {Regression Testing in Software Product Line Engineering}, journal = {Adv. Comput.}, volume = {86}, pages = {223--263}, year = {2012}, url = {https://doi.org/10.1016/B978-0-12-396535-6.00007-7}, doi = {10.1016/B978-0-12-396535-6.00007-7}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/RunesonE12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Sampath12, author = {Sreedevi Sampath}, title = {Advances in User-Session-Based Testing of Web Applications}, journal = {Adv. Comput.}, volume = {86}, pages = {87--108}, year = {2012}, url = {https://doi.org/10.1016/B978-0-12-396535-6.00003-X}, doi = {10.1016/B978-0-12-396535-6.00003-X}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Sampath12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/SedighH12, author = {Sahra Sedigh and Ali R. Hurson}, title = {Introduction and Preface}, journal = {Adv. Comput.}, volume = {87}, pages = {1--6}, year = {2012}, url = {https://doi.org/10.1016/B978-0-12-396528-8.00001-8}, doi = {10.1016/B978-0-12-396528-8.00001-8}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/SedighH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/TrivediAM12, author = {Kishor S. Trivedi and Ermeson C. Andrade and Fumio Machida}, title = {Combining Performance and Availability Analysis in Practice}, journal = {Adv. Comput.}, volume = {84}, pages = {1--38}, year = {2012}, url = {https://doi.org/10.1016/B978-0-12-396525-7.00001-0}, doi = {10.1016/B978-0-12-396525-7.00001-0}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ac/TrivediAM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/TsujiT12, author = {Shinji Tsuji and Takashi Takemoto}, title = {Optical Interconnects for Green Computers and Data Centers}, journal = {Adv. Comput.}, volume = {87}, pages = {125--201}, year = {2012}, url = {https://doi.org/10.1016/B978-0-12-396528-8.00005-5}, doi = {10.1016/B978-0-12-396528-8.00005-5}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/TsujiT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Vega12, author = {Diana Elena Vega}, title = {Automated Interoperability Testing of Healthcare Information Systems}, journal = {Adv. Comput.}, volume = {85}, pages = {213--276}, year = {2012}, url = {https://doi.org/10.1016/B978-0-12-396526-4.00005-9}, doi = {10.1016/B978-0-12-396526-4.00005-9}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Vega12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/XiaoTX12, author = {Xusheng Xiao and Suresh Thummalapenta and Tao Xie}, title = {Advances on Improving Automation in Developer Testing}, journal = {Adv. Comput.}, volume = {85}, pages = {165--212}, year = {2012}, url = {https://doi.org/10.1016/B978-0-12-396526-4.00004-7}, doi = {10.1016/B978-0-12-396526-4.00004-7}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/XiaoTX12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/BeloglazovBLZ11, author = {Anton Beloglazov and Rajkumar Buyya and Young Choon Lee and Albert Y. Zomaya}, title = {A Taxonomy and Survey of Energy-Efficient Data Centers and Cloud Computing Systems}, journal = {Adv. Comput.}, volume = {82}, pages = {47--111}, year = {2011}, url = {https://doi.org/10.1016/B978-0-12-385512-1.00003-7}, doi = {10.1016/B978-0-12-385512-1.00003-7}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/BeloglazovBLZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Braeckel11, author = {Paul Braeckel}, title = {Feeling Bluetooth: From a Security Perspective}, journal = {Adv. Comput.}, volume = {81}, pages = {161--236}, year = {2011}, url = {https://doi.org/10.1016/B978-0-12-385514-5.00004-5}, doi = {10.1016/B978-0-12-385514-5.00004-5}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Braeckel11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/ChellappaT11, author = {Rama Chellappa and Pavan K. Turaga}, title = {Advances in Video-Based Biometrics}, journal = {Adv. Comput.}, volume = {83}, pages = {183--203}, year = {2011}, url = {https://doi.org/10.1016/B978-0-12-385510-7.00004-7}, doi = {10.1016/B978-0-12-385510-7.00004-7}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/ChellappaT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/FischerMH11, author = {Carl Fischer and Kavitha Muthukrishnan and Mike Hazas}, title = {{SLAM} for Pedestrians and Ultrasonic Landmarks in Emergency Response Scenarios}, journal = {Adv. Comput.}, volume = {81}, pages = {103--160}, year = {2011}, url = {https://doi.org/10.1016/B978-0-12-385514-5.00003-3}, doi = {10.1016/B978-0-12-385514-5.00003-3}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/FischerMH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/GoldfarbT11, author = {Avi Goldfarb and Catherine Tucker}, title = {Online Advertising}, journal = {Adv. Comput.}, volume = {81}, pages = {289--315}, year = {2011}, url = {https://doi.org/10.1016/B978-0-12-385514-5.00006-9}, doi = {10.1016/B978-0-12-385514-5.00006-9}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/GoldfarbT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Gonzalez-ValenzuelaCL11, author = {Sergio Gonz{\'{a}}lez{-}Valenzuela and Min Chen and Victor C. M. Leung}, title = {Applications of Mobile Agents in Wireless Networks and Mobile Computing}, journal = {Adv. Comput.}, volume = {82}, pages = {113--163}, year = {2011}, url = {https://doi.org/10.1016/B978-0-12-385512-1.00004-9}, doi = {10.1016/B978-0-12-385512-1.00004-9}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Gonzalez-ValenzuelaCL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/GroverBC11, author = {Amit Grover and Hal Berghel and Dennis Cobb}, title = {The State of the Art in Identity Theft}, journal = {Adv. Comput.}, volume = {83}, pages = {1--50}, year = {2011}, url = {https://doi.org/10.1016/B978-0-12-385510-7.00001-1}, doi = {10.1016/B978-0-12-385510-7.00001-1}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/GroverBC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/HidalgoA11, author = {Jos{\'{e}} Mar{\'{\i}}a G{\'{o}}mez Hidalgo and Gonzalo {\'{A}}lvarez Mara{\~{n}}{\'{o}}n}, title = {CAPTCHAs: An Artificial Intelligence Application to Web Security}, journal = {Adv. Comput.}, volume = {83}, pages = {109--181}, year = {2011}, url = {https://doi.org/10.1016/B978-0-12-385510-7.00003-5}, doi = {10.1016/B978-0-12-385510-7.00003-5}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/HidalgoA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/KesslerH11, author = {Gary C. Kessler and Chet Hosmer}, title = {An Overview of Steganography}, journal = {Adv. Comput.}, volume = {83}, pages = {51--107}, year = {2011}, url = {https://doi.org/10.1016/B978-0-12-385510-7.00002-3}, doi = {10.1016/B978-0-12-385510-7.00002-3}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/KesslerH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Leung11, author = {Yiu{-}Wing Leung}, title = {Phone-to-Phone Configuration for Internet Telephony}, journal = {Adv. Comput.}, volume = {81}, pages = {51--102}, year = {2011}, url = {https://doi.org/10.1016/B978-0-12-385514-5.00002-1}, doi = {10.1016/B978-0-12-385514-5.00002-1}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Leung11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/MeinrathLP11, author = {Sascha D. Meinrath and James W. Losey and Victor W. Pickard}, title = {Digital Feudalism: Enclosures and Erasures from Digital Rights Management to the Digital Divide}, journal = {Adv. Comput.}, volume = {81}, pages = {237--287}, year = {2011}, url = {https://doi.org/10.1016/B978-0-12-385514-5.00005-7}, doi = {10.1016/B978-0-12-385514-5.00005-7}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/MeinrathLP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/RayACSM11, author = {Arnab Ray and Christopher Ackermann and Rance Cleaveland and Charles P. Shelton and Chris Martin}, title = {Functional and Nonfunctional Design Verification for Embedded Software Systems}, journal = {Adv. Comput.}, volume = {83}, pages = {277--321}, year = {2011}, url = {https://doi.org/10.1016/B978-0-12-385510-7.00006-0}, doi = {10.1016/B978-0-12-385510-7.00006-0}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/RayACSM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/SantosT11, author = {Paulo S{\'{e}}rgio Medeiros dos Santos and Guilherme Horta Travassos}, title = {Action Research Can Swing the Balance in Experimental Software Engineering}, journal = {Adv. Comput.}, volume = {83}, pages = {205--276}, year = {2011}, url = {https://doi.org/10.1016/B978-0-12-385510-7.00005-9}, doi = {10.1016/B978-0-12-385510-7.00005-9}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/SantosT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/SchulzeKWPBSD11, author = {J{\"{u}}rgen P. Schulze and Han Suk Kim and Philip P. Weber and Andrew Prudhomme and Roger E. Bohn and Maurizio Seracini and Thomas A. DeFanti}, title = {Advanced Applications of Virtual Reality}, journal = {Adv. Comput.}, volume = {82}, pages = {217--260}, year = {2011}, url = {https://doi.org/10.1016/B978-0-12-385512-1.00006-2}, doi = {10.1016/B978-0-12-385512-1.00006-2}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/SchulzeKWPBSD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/SeamanG11, author = {Carolyn B. Seaman and Yuepu Guo}, title = {Measuring and Monitoring Technical Debt}, journal = {Adv. Comput.}, volume = {82}, pages = {25--46}, year = {2011}, url = {https://doi.org/10.1016/B978-0-12-385512-1.00002-5}, doi = {10.1016/B978-0-12-385512-1.00002-5}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/SeamanG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Thomas11, author = {Graham A. Thomas}, title = {Virtual Graphics for Broadcast Production}, journal = {Adv. Comput.}, volume = {82}, pages = {165--216}, year = {2011}, url = {https://doi.org/10.1016/B978-0-12-385512-1.00005-0}, doi = {10.1016/B978-0-12-385512-1.00005-0}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Thomas11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/WangZ11, author = {Xinyuan Wang and Ruishan Zhang}, title = {VoIP Security: Vulnerabilities, Exploits, and Defenses}, journal = {Adv. Comput.}, volume = {81}, pages = {1--49}, year = {2011}, url = {https://doi.org/10.1016/B978-0-12-385514-5.00001-X}, doi = {10.1016/B978-0-12-385514-5.00001-X}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/WangZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/YassinH11, author = {Areej Yassin and Alan R. Hevner}, title = {The Hows and Whys of Information Markets}, journal = {Adv. Comput.}, volume = {82}, pages = {1--23}, year = {2011}, url = {https://doi.org/10.1016/B978-0-12-385512-1.00001-3}, doi = {10.1016/B978-0-12-385512-1.00001-3}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/YassinH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Zelkowitz11, author = {Marvin V. Zelkowitz}, title = {Preface}, journal = {Adv. Comput.}, volume = {81}, pages = {xiii--xv}, year = {2011}, url = {https://doi.org/10.1016/B978-0-12-385514-5.00011-2}, doi = {10.1016/B978-0-12-385514-5.00011-2}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Zelkowitz11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Zelkowitz11a, author = {Marvin V. Zelkowitz}, title = {Preface}, journal = {Adv. Comput.}, volume = {82}, pages = {xv--xvii}, year = {2011}, url = {https://doi.org/10.1016/B978-0-12-385512-1.00007-4}, doi = {10.1016/B978-0-12-385512-1.00007-4}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Zelkowitz11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Zelkowitz11b, author = {Marvin V. Zelkowitz}, title = {Preface}, journal = {Adv. Comput.}, volume = {83}, pages = {ix--xii}, year = {2011}, url = {https://doi.org/10.1016/B978-0-12-385510-7.00014-X}, doi = {10.1016/B978-0-12-385510-7.00014-X}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Zelkowitz11b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/CalefatoL10, author = {Fabio Calefato and Filippo Lanubile}, title = {Communication Media Selection for Remote Interaction of Ad Hoc Groups}, journal = {Adv. Comput.}, volume = {78}, pages = {271--313}, year = {2010}, url = {https://doi.org/10.1016/S0065-2458(10)78006-2}, doi = {10.1016/S0065-2458(10)78006-2}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/CalefatoL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Chung10, author = {Wingyan Chung}, title = {Web Searching and Browsing: {A} Multilingual Perspective}, journal = {Adv. Comput.}, volume = {78}, pages = {41--69}, year = {2010}, url = {https://doi.org/10.1016/S0065-2458(10)78002-5}, doi = {10.1016/S0065-2458(10)78002-5}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Chung10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Dias-NetoT10, author = {Arilo Claudio Dias Neto and Guilherme Horta Travassos}, title = {A Picture from the Model-Based Testing Area: Concepts, Techniques, and Challenges}, journal = {Adv. Comput.}, volume = {80}, pages = {45--120}, year = {2010}, url = {https://doi.org/10.1016/S0065-2458(10)80002-6}, doi = {10.1016/S0065-2458(10)80002-6}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Dias-NetoT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/GroverBLBC10, author = {Amit Grover and Paul Braeckel and Kevin Lindgren and Hal Berghel and Dennis Cobb}, title = {Parameters Effecting 2D Barcode Scanning Reliability}, journal = {Adv. Comput.}, volume = {80}, pages = {209--235}, year = {2010}, url = {https://doi.org/10.1016/S0065-2458(10)80006-3}, doi = {10.1016/S0065-2458(10)80006-3}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/GroverBLBC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/KienleM10, author = {Holger M. Kienle and Hausi A. M{\"{u}}ller}, title = {The Tools Perspective on Software Reverse Engineering: Requirements, Construction, and Evaluation}, journal = {Adv. Comput.}, volume = {79}, pages = {189--290}, year = {2010}, url = {https://doi.org/10.1016/S0065-2458(10)79005-7}, doi = {10.1016/S0065-2458(10)79005-7}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/KienleM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Loo10, author = {Alfred W. Loo}, title = {Illusion of Wireless Security}, journal = {Adv. Comput.}, volume = {79}, pages = {119--167}, year = {2010}, url = {https://doi.org/10.1016/S0065-2458(10)79003-3}, doi = {10.1016/S0065-2458(10)79003-3}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Loo10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Malaga10, author = {Ross A. Malaga}, title = {Search Engine Optimization - Black and White Hat Approaches}, journal = {Adv. Comput.}, volume = {78}, pages = {1--39}, year = {2010}, url = {https://doi.org/10.1016/S0065-2458(10)78001-3}, doi = {10.1016/S0065-2458(10)78001-3}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Malaga10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/MambrettiDB10, author = {Joe Mambretti and Thomas A. DeFanti and Maxine D. Brown}, title = {StarLight: Next-Generation Communication Services, Exchanges, and Global Facilities}, journal = {Adv. Comput.}, volume = {80}, pages = {191--207}, year = {2010}, url = {https://doi.org/10.1016/S0065-2458(10)80005-1}, doi = {10.1016/S0065-2458(10)80005-1}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/MambrettiDB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Marowka10, author = {Ami Marowka}, title = {Pitfalls and Issues of Manycore Programming}, journal = {Adv. Comput.}, volume = {79}, pages = {71--117}, year = {2010}, url = {https://doi.org/10.1016/S0065-2458(10)79002-1}, doi = {10.1016/S0065-2458(10)79002-1}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Marowka10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/McFarlandW10, author = {Dennis J. McFarland and Jonathan R. Wolpaw}, title = {Brain-Computer Interfaces for the Operation of Robotic and Prosthetic Devices}, journal = {Adv. Comput.}, volume = {79}, pages = {169--187}, year = {2010}, url = {https://doi.org/10.1016/S0065-2458(10)79004-5}, doi = {10.1016/S0065-2458(10)79004-5}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/McFarlandW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/MemonN10, author = {Atif M. Memon and Bao N. Nguyen}, title = {Advances in Automated Model-Based System Testing of Software Applications with a {GUI} Front-End}, journal = {Adv. Comput.}, volume = {80}, pages = {121--162}, year = {2010}, url = {https://doi.org/10.1016/S0065-2458(10)80003-8}, doi = {10.1016/S0065-2458(10)80003-8}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/MemonN10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Mendes10, author = {Emilia Mendes}, title = {An Overview of Web Effort Estimation}, journal = {Adv. Comput.}, volume = {78}, pages = {223--270}, year = {2010}, url = {https://doi.org/10.1016/S0065-2458(10)78005-0}, doi = {10.1016/S0065-2458(10)78005-0}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Mendes10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/MitrovicZB10, author = {Dalibor Mitrovic and Matthias Zeppelzauer and Christian Breiteneder}, title = {Features for Content-Based Audio Retrieval}, journal = {Adv. Comput.}, volume = {78}, pages = {71--150}, year = {2010}, url = {https://doi.org/10.1016/S0065-2458(10)78003-7}, doi = {10.1016/S0065-2458(10)78003-7}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/MitrovicZB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/PentikousisPPNS10, author = {Kostas Pentikousis and Jarno Pinola and Esa Piri and Pedro Neves and Susana Sargento}, title = {Multimedia Services over Wireless Metropolitan Area Networks}, journal = {Adv. Comput.}, volume = {78}, pages = {151--222}, year = {2010}, url = {https://doi.org/10.1016/S0065-2458(10)78004-9}, doi = {10.1016/S0065-2458(10)78004-9}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/PentikousisPPNS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/ShahABCCCGGHJJKMMMOPSVWa10, author = {Anuj R. Shah and Joshua N. Adkins and Douglas J. Baxter and William R. Cannon and Daniel G. Chavarr{\'{\i}}a{-}Miranda and Sutanay Choudhury and Ian Gorton and Deborah K. Gracio and Todd D. Halter and Navdeep Jaitly and John R. Johnson and Richard T. Kouzes and Matthew C. Macduff and Andr{\`{e}}s M{\'{a}}rquez and Matthew E. Monroe and Christopher S. Oehmen and William A. Pike and Chad Scherrer and Oreste Villa and Bobbie{-}Jo M. Webb{-}Robertson and Paul D. Whitney and Nino Zuljevic}, title = {Applications in Data-Intensive Computing}, journal = {Adv. Comput.}, volume = {79}, pages = {1--70}, year = {2010}, url = {https://doi.org/10.1016/S0065-2458(10)79001-X}, doi = {10.1016/S0065-2458(10)79001-X}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/ShahABCCCGGHJJKMMMOPSVWa10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/SinghM10, author = {Ravi I. Singh and James Miller}, title = {Empirical Knowledge Discovery by Triangulation in Computer Science}, journal = {Adv. Comput.}, volume = {80}, pages = {163--190}, year = {2010}, url = {https://doi.org/10.1016/S0065-2458(10)80004-X}, doi = {10.1016/S0065-2458(10)80004-X}, timestamp = {Fri, 26 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ac/SinghM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/TuragaCV10, author = {Pavan K. Turaga and Rama Chellappa and Ashok Veeraraghavan}, title = {Advances in Video-Based Human Activity Analysis: Challenges and Approaches}, journal = {Adv. Comput.}, volume = {80}, pages = {237--290}, year = {2010}, url = {https://doi.org/10.1016/S0065-2458(10)80007-5}, doi = {10.1016/S0065-2458(10)80007-5}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/TuragaCV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Williams10, author = {Laurie A. Williams}, title = {Agile Software Development Methodologies and Practices}, journal = {Adv. Comput.}, volume = {80}, pages = {1--44}, year = {2010}, url = {https://doi.org/10.1016/S0065-2458(10)80001-4}, doi = {10.1016/S0065-2458(10)80001-4}, timestamp = {Mon, 07 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Williams10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Zelkowitz10, author = {Marvin V. Zelkowitz}, title = {Preface}, journal = {Adv. Comput.}, volume = {78}, year = {2010}, url = {https://doi.org/10.1016/S0065-2458(10)78011-6}, doi = {10.1016/S0065-2458(10)78011-6}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Zelkowitz10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Zelkowitz10a, author = {Marvin V. Zelkowitz}, title = {Preface}, journal = {Adv. Comput.}, volume = {79}, pages = {xvii--xviii}, year = {2010}, url = {https://doi.org/10.1016/S0065-2458(10)79011-2}, doi = {10.1016/S0065-2458(10)79011-2}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Zelkowitz10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Zelkowitz10b, author = {Marvin V. Zelkowitz}, title = {Preface}, journal = {Adv. Comput.}, volume = {80}, pages = {xv--xvii}, year = {2010}, url = {https://doi.org/10.1016/S0065-2458(10)80009-9}, doi = {10.1016/S0065-2458(10)80009-9}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Zelkowitz10b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/AalbertsHPT09, author = {Robert J. Aalberts and David Hames and Percy Poon and Paul D. Thistle}, title = {The Common Law and Its Impact on the Internet}, journal = {Adv. Comput.}, volume = {77}, pages = {299--318}, year = {2009}, url = {https://doi.org/10.1016/S0065-2458(09)01208-X}, doi = {10.1016/S0065-2458(09)01208-X}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/AalbertsHPT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Allender09, author = {Eric Allender}, title = {A Status Report on the {P} Versus {NP} Question}, journal = {Adv. Comput.}, volume = {77}, pages = {117--147}, year = {2009}, url = {https://doi.org/10.1016/S0065-2458(09)01204-2}, doi = {10.1016/S0065-2458(09)01204-2}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Allender09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/CourtH09, author = {Tom Van Court and Martin C. Herbordt}, title = {Elements of High-Performance Reconfigurable Computing}, journal = {Adv. Comput.}, volume = {75}, pages = {113--157}, year = {2009}, url = {https://doi.org/10.1016/S0065-2458(08)00802-4}, doi = {10.1016/S0065-2458(08)00802-4}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/CourtH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/EatonM09, author = {Cyntrica Eaton and Atif M. Memon}, title = {Advances in Web Testing}, journal = {Adv. Comput.}, volume = {75}, pages = {281--306}, year = {2009}, url = {https://doi.org/10.1016/S0065-2458(08)00805-X}, doi = {10.1016/S0065-2458(08)00805-X}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/EatonM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Farid09, author = {Hany Farid}, title = {Photo Fakery and Forensics}, journal = {Adv. Comput.}, volume = {77}, pages = {1--55}, year = {2009}, url = {https://doi.org/10.1016/S0065-2458(09)01201-7}, doi = {10.1016/S0065-2458(09)01201-7}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Farid09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/HidalgoSGR09, author = {Jos{\'{e}} Mar{\'{\i}}a G{\'{o}}mez Hidalgo and Enrique Puertas Sanz and Francisco Carrero Garc{\'{\i}}a and Manuel de Buenaga Rodr{\'{\i}}guez}, title = {Web Content Filtering}, journal = {Adv. Comput.}, volume = {76}, pages = {257--306}, year = {2009}, url = {https://doi.org/10.1016/S0065-2458(09)01007-9}, doi = {10.1016/S0065-2458(09)01007-9}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/HidalgoSGR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/KinsellaPBDJ09, author = {Sheila Kinsella and Alexandre Passant and John G. Breslin and Stefan Decker and Ajit Jaokar}, title = {The Future of Social Web Sites: Sharing Data and Trusted Applications with Semantics}, journal = {Adv. Comput.}, volume = {76}, pages = {121--175}, year = {2009}, url = {https://doi.org/10.1016/S0065-2458(09)01004-3}, doi = {10.1016/S0065-2458(09)01004-3}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/KinsellaPBDJ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/KitchenG09, author = {Christine A. Kitchen and Martyn F. Guest}, title = {The {UK} {HPC} Integration Market: Commodity-Based Clusters}, journal = {Adv. Comput.}, volume = {75}, pages = {1--111}, year = {2009}, url = {https://doi.org/10.1016/S0065-2458(08)00801-2}, doi = {10.1016/S0065-2458(08)00801-2}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/KitchenG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/LeffR09, author = {Avraham Leff and James T. Rayfield}, title = {Issues and Approaches for Web 2.0 Client Access to Enterprise Data}, journal = {Adv. Comput.}, volume = {76}, pages = {225--255}, year = {2009}, url = {https://doi.org/10.1016/S0065-2458(09)01006-7}, doi = {10.1016/S0065-2458(09)01006-7}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/LeffR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/LeighJR09, author = {Jason Leigh and Andrew E. Johnson and Luc Renambot}, title = {Advances in Computer Displays}, journal = {Adv. Comput.}, volume = {77}, pages = {57--77}, year = {2009}, url = {https://doi.org/10.1016/S0065-2458(09)01202-9}, doi = {10.1016/S0065-2458(09)01202-9}, timestamp = {Mon, 17 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/LeighJR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Loviscach09, author = {J{\"{o}}rn Loviscach}, title = {Playing with All Senses: Human-Computer Interface Devices for Games}, journal = {Adv. Comput.}, volume = {77}, pages = {79--115}, year = {2009}, url = {https://doi.org/10.1016/S0065-2458(09)01203-0}, doi = {10.1016/S0065-2458(09)01203-0}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Loviscach09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Morgan09, author = {Graham Morgan}, title = {Highly Interactive Scalable Online Worlds}, journal = {Adv. Comput.}, volume = {76}, pages = {75--120}, year = {2009}, url = {https://doi.org/10.1016/S0065-2458(09)01003-1}, doi = {10.1016/S0065-2458(09)01003-1}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Morgan09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Nov09, author = {Oded Nov}, title = {Information Sharing and Social Computing: Why, What, and Where?}, journal = {Adv. Comput.}, volume = {76}, pages = {1--18}, year = {2009}, url = {https://doi.org/10.1016/S0065-2458(09)01001-8}, doi = {10.1016/S0065-2458(09)01001-8}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Nov09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/PaulOSPS09, author = {JoAnn M. Paul and Mwaffaq Otoom and Marc Somers and Sean M. Pieper and Michael J. Schulte}, title = {The Emerging Landscape of Computer Performance Evaluation}, journal = {Adv. Comput.}, volume = {75}, pages = {235--280}, year = {2009}, url = {https://doi.org/10.1016/S0065-2458(08)00804-8}, doi = {10.1016/S0065-2458(08)00804-8}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/PaulOSPS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/RanganathanRM09, author = {Parthasarathy Ranganathan and Suzanne Rivoire and Justin D. Moore}, title = {Models and Metrics for Energy-Efficient Computing}, journal = {Adv. Comput.}, volume = {75}, pages = {159--233}, year = {2009}, url = {https://doi.org/10.1016/S0065-2458(08)00803-6}, doi = {10.1016/S0065-2458(08)00803-6}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/RanganathanRM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/SaliuRLA09, author = {Moshood Omolade Saliu and G{\"{u}}nther Ruhe and Mikael Lindvall and Christopher Ackermann}, title = {Evaluating the Modifiability of Software Architectural Designs}, journal = {Adv. Comput.}, volume = {77}, pages = {243--297}, year = {2009}, url = {https://doi.org/10.1016/S0065-2458(09)01207-8}, doi = {10.1016/S0065-2458(09)01207-8}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/SaliuRLA09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Thelwall09, author = {Mike Thelwall}, title = {Social Network Sites: Users and Uses}, journal = {Adv. Comput.}, volume = {76}, pages = {19--73}, year = {2009}, url = {https://doi.org/10.1016/S0065-2458(09)01002-X}, doi = {10.1016/S0065-2458(09)01002-X}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Thelwall09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Tratt09, author = {Laurence Tratt}, title = {Dynamically Typed Languages}, journal = {Adv. Comput.}, volume = {77}, pages = {149--184}, year = {2009}, url = {https://doi.org/10.1016/S0065-2458(09)01205-4}, doi = {10.1016/S0065-2458(09)01205-4}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Tratt09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/TrendowiczM09, author = {Adam Trendowicz and J{\"{u}}rgen M{\"{u}}nch}, title = {Factors Influencing Software Development Productivity - State-of-the-Art and Industrial Experiences}, journal = {Adv. Comput.}, volume = {77}, pages = {185--241}, year = {2009}, url = {https://doi.org/10.1016/S0065-2458(09)01206-6}, doi = {10.1016/S0065-2458(09)01206-6}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/TrendowiczM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/VitvarKVMKF09, author = {Tomas Vitvar and Jacek Kopeck{\'{y}} and Jana Viskova and Adrian Mocan and Mick Kerrigan and Dieter Fensel}, title = {Semantic Web Services Architecture with Lightweight Descriptions of Services}, journal = {Adv. Comput.}, volume = {76}, pages = {177--224}, year = {2009}, url = {https://doi.org/10.1016/S0065-2458(09)01005-5}, doi = {10.1016/S0065-2458(09)01005-5}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/VitvarKVMKF09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Zelkowitz09, author = {Marvin V. Zelkowitz}, title = {Preface}, journal = {Adv. Comput.}, volume = {75}, year = {2009}, url = {https://doi.org/10.1016/S0065-2458(08)00808-5}, doi = {10.1016/S0065-2458(08)00808-5}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Zelkowitz09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Zelkowitz09a, author = {Marvin V. Zelkowitz}, title = {Preface}, journal = {Adv. Comput.}, volume = {76}, year = {2009}, url = {https://doi.org/10.1016/S0065-2458(09)01010-9}, doi = {10.1016/S0065-2458(09)01010-9}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Zelkowitz09a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Zelkowitz09b, author = {Marvin V. Zelkowitz}, title = {Preface}, journal = {Adv. Comput.}, volume = {77}, year = {2009}, url = {https://doi.org/10.1016/S0065-2458(09)01211-X}, doi = {10.1016/S0065-2458(09)01211-X}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Zelkowitz09b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/AndrewsM08, author = {Anneliese Amschler Andrews and Alireza Mahdian}, title = {Testing with Software Designs}, journal = {Adv. Comput.}, volume = {73}, pages = {57--98}, year = {2008}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/AndrewsM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/BerghelHS08, author = {Hal Berghel and David Hoelzer and Michael Sthultz}, title = {Data Hiding Tactics for Windows and Unix File Systems}, journal = {Adv. Comput.}, volume = {74}, pages = {1--17}, year = {2008}, url = {https://doi.org/10.1016/S0065-2458(08)00601-3}, doi = {10.1016/S0065-2458(08)00601-3}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/BerghelHS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/ChenKCCTS08, author = {Tzu{-}Yi Chen and Omid Khalili and Roy L. Campbell and Laura Carrington and Mustafa M. Tikir and Allan Snavely}, title = {Performance Prediction and Ranking of Supercomputers}, journal = {Adv. Comput.}, volume = {72}, pages = {135--172}, year = {2008}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/ChenKCCTS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/CusickPT08, author = {James J. Cusick and Alpana Prasad and William M. Tepfenhart}, title = {Global Software Development: Origins, Practices, and Directions}, journal = {Adv. Comput.}, volume = {74}, pages = {201--269}, year = {2008}, url = {https://doi.org/10.1016/S0065-2458(08)00606-2}, doi = {10.1016/S0065-2458(08)00606-2}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/CusickPT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/DongarraGHLLLMSVYACCCKMT08, author = {Jack J. Dongarra and Robert B. Graybill and William J. Harrod and Robert F. Lucas and Ewing L. Lusk and Piotr Luszczek and Janice McMahon and Allan Snavely and Jeffrey S. Vetter and Katherine A. Yelick and Sadaf R. Alam and Roy L. Campbell and Laura Carrington and Tzu{-}Yi Chen and Omid Khalili and Jeremy S. Meredith and Mustafa M. Tikir}, title = {DARPA's {HPCS} Program- History, Models, Tools, Languages}, journal = {Adv. Comput.}, volume = {72}, pages = {1--100}, year = {2008}, timestamp = {Thu, 02 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ac/DongarraGHLLLMSVYACCCKMT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Eeckhout08, author = {Lieven Eeckhout}, title = {Sampled Processor Simulation- {A} Survey}, journal = {Adv. Comput.}, volume = {72}, pages = {173--224}, year = {2008}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Eeckhout08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/GilbertRS08, author = {John R. Gilbert and Steven P. Reinhardt and Viral B. Shah}, title = {Distributed Sparse Matrices for Very High Level Languages}, journal = {Adv. Comput.}, volume = {72}, pages = {225--252}, year = {2008}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/GilbertRS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Ginsberg08, author = {Myron Ginsberg}, title = {Bibliographic Snapshots of High Performance/High Productivity Computing}, journal = {Adv. Comput.}, volume = {72}, pages = {253--318}, year = {2008}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Ginsberg08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Hac08, author = {Anna H{\'{a}}c}, title = {Multimedia and Sensor Security}, journal = {Adv. Comput.}, volume = {74}, pages = {19--43}, year = {2008}, url = {https://doi.org/10.1016/S0065-2458(08)00602-5}, doi = {10.1016/S0065-2458(08)00602-5}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Hac08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/HochsteinNSZBZ08, author = {Lorin Hochstein and Taiga Nakamura and Forrest Shull and Nico Zazworka and Victor R. Basili and Marvin V. Zelkowitz}, title = {An Environment for Conducting Families of Software Engineering Experiments}, journal = {Adv. Comput.}, volume = {74}, pages = {175--200}, year = {2008}, url = {https://doi.org/10.1016/S0065-2458(08)00605-0}, doi = {10.1016/S0065-2458(08)00605-0}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/HochsteinNSZBZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/KlasTWMKI08, author = {Michael Kl{\"{a}}s and Adam Trendowicz and Axel Wickenkamp and J{\"{u}}rgen M{\"{u}}nch and Nahomi Kikuchi and Yasushi Ishigai}, title = {The Use of Simulation Techniques for Hybrid Software Cost Estimation and Risk Analysis}, journal = {Adv. Comput.}, volume = {74}, pages = {115--174}, year = {2008}, url = {https://doi.org/10.1016/S0065-2458(08)00604-9}, doi = {10.1016/S0065-2458(08)00604-9}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/KlasTWMKI08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/RicoSF08, author = {David F. Rico and Hasan H. Sayani and Ralph F. Field}, title = {History of Computers, Electronic Commerce, and Agile Methods}, journal = {Adv. Comput.}, volume = {73}, pages = {1--55}, year = {2008}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/RicoSF08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Roussos08, author = {George Roussos}, title = {Computing with {RFID-} Drivers, Technology and Implications}, journal = {Adv. Comput.}, volume = {73}, pages = {161--217}, year = {2008}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Roussos08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/SanzHC08, author = {Enrique Puertas Sanz and Jos{\'{e}} Mar{\'{\i}}a G{\'{o}}mez Hidalgo and Jos{\'{e}} Carlos Cortizo}, title = {Email Spam Filtering}, journal = {Adv. Comput.}, volume = {74}, pages = {45--114}, year = {2008}, url = {https://doi.org/10.1016/S0065-2458(08)00603-7}, doi = {10.1016/S0065-2458(08)00603-7}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/SanzHC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/SterlingD08, author = {Thomas L. Sterling and Chirag Dekate}, title = {Productivity in High Performance Computing}, journal = {Adv. Comput.}, volume = {72}, pages = {101--134}, year = {2008}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/SterlingD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/TaylorK08, author = {Russell H. Taylor and Peter Kazanzides}, title = {Medical Robotics and Computer-Integrated Interventional Medicine}, journal = {Adv. Comput.}, volume = {73}, pages = {219--260}, year = {2008}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/TaylorK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/WenstromBH08, author = {Mark Wenstrom and Eloisa Bentivegna and Ali R. Hurson}, title = {Balancing Transparency, Efficiency, and Security in Pervasive Systems}, journal = {Adv. Comput.}, volume = {73}, pages = {99--159}, year = {2008}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/WenstromBH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/AtkinsonF07, author = {John Atkinson and Anita Ferreira}, title = {Interactive Explanatory and Descriptive Natural-Language based Dialogue for Intelligent Information Filtering}, journal = {Adv. Comput.}, volume = {70}, pages = {61--103}, year = {2007}, url = {https://doi.org/10.1016/S0065-2458(06)70002-X}, doi = {10.1016/S0065-2458(06)70002-X}, timestamp = {Tue, 08 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/AtkinsonF07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/AtkinsonK07, author = {Colin Atkinson and Thomas K{\"{u}}hne}, title = {A tour of language customization concepts}, journal = {Adv. Comput.}, volume = {70}, pages = {105--161}, year = {2007}, url = {https://doi.org/10.1016/S0065-2458(06)70003-1}, doi = {10.1016/S0065-2458(06)70003-1}, timestamp = {Mon, 15 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ac/AtkinsonK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/BerghelCJ07, author = {Hal Berghel and James Carpinter and Ju{-}Yeon Jo}, title = {Phish Phactors: Offensive and Defensive Strategies}, journal = {Adv. Comput.}, volume = {70}, pages = {223--268}, year = {2007}, url = {https://doi.org/10.1016/S0065-2458(06)70005-5}, doi = {10.1016/S0065-2458(06)70005-5}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/BerghelCJ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/CameronGF07, author = {Kirk W. Cameron and Rong Ge and Xizhou Feng}, title = {Designing Computational Clusters for Performance and Power}, journal = {Adv. Comput.}, volume = {69}, pages = {89--153}, year = {2007}, url = {https://doi.org/10.1016/S0065-2458(06)69002-5}, doi = {10.1016/S0065-2458(06)69002-5}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ac/CameronGF07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/CoultonEBCGR07, author = {Paul Coulton and Reuben Edwards and William Bamford and Fadi Chehimi and Paul Gilbertson and Omer Rashid}, title = {Mobile Games- Challenges and Opportunities}, journal = {Adv. Comput.}, volume = {69}, pages = {191--242}, year = {2007}, url = {https://doi.org/10.1016/S0065-2458(06)69004-9}, doi = {10.1016/S0065-2458(06)69004-9}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/CoultonEBCGR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Fisher07, author = {Erik Fisher}, title = {The Convergence of Nanotechnology, Policy, and Ethics}, journal = {Adv. Comput.}, volume = {71}, pages = {273--296}, year = {2007}, url = {https://doi.org/10.1016/S0065-2458(06)71006-3}, doi = {10.1016/S0065-2458(06)71006-3}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ac/Fisher07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/KaewkamnerdpongBB07, author = {Boonserm Kaewkamnerdpong and Navneet Bhalla and Peter J. Bentley}, title = {Programming Nanotechnology: Learning from Nature}, journal = {Adv. Comput.}, volume = {71}, pages = {1--37}, year = {2007}, url = {https://doi.org/10.1016/S0065-2458(06)71001-4}, doi = {10.1016/S0065-2458(06)71001-4}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ac/KaewkamnerdpongBB07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/KumarT07, author = {Rakesh Kumar and Dean M. Tullsen}, title = {The architecture of Efficient Multi-Core Processors: {A} Holistic Approach}, journal = {Adv. Comput.}, volume = {69}, pages = {1--87}, year = {2007}, url = {https://doi.org/10.1016/S0065-2458(06)69001-3}, doi = {10.1016/S0065-2458(06)69001-3}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/KumarT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Lee07, author = {Juhnyoung Lee}, title = {Advances in Business Transformation Technologies}, journal = {Adv. Comput.}, volume = {70}, pages = {163--221}, year = {2007}, url = {https://doi.org/10.1016/S0065-2458(06)70004-3}, doi = {10.1016/S0065-2458(06)70004-3}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Lee07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Neumann07, author = {Peter G. Neumann}, title = {Reflections on systems trustworthiness}, journal = {Adv. Comput.}, volume = {70}, pages = {269--310}, year = {2007}, url = {https://doi.org/10.1016/S0065-2458(06)70006-7}, doi = {10.1016/S0065-2458(06)70006-7}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Neumann07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Ravaioli07, author = {Umberto Ravaioli}, title = {Simulation of nanoscale electronic systems}, journal = {Adv. Comput.}, volume = {71}, pages = {167--249}, year = {2007}, url = {https://doi.org/10.1016/S0065-2458(06)71004-X}, doi = {10.1016/S0065-2458(06)71004-X}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Ravaioli07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Rolfe07, author = {Brigitte Rolfe}, title = {Toward Nanometer-Scale sensing Systems - Natural and Artificial Noses as Models for Ultra-Small, Ultra Dense Sensing Systems}, journal = {Adv. Comput.}, volume = {71}, pages = {103--166}, year = {2007}, url = {https://doi.org/10.1016/S0065-2458(06)71003-8}, doi = {10.1016/S0065-2458(06)71003-8}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Rolfe07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/RoschellePT07, author = {Jeremy Roschelle and Charles Patton and Deborah G. Tatar}, title = {Designing Networked Handheld Devices to Enhance School Learning}, journal = {Adv. Comput.}, volume = {70}, pages = {1--60}, year = {2007}, url = {https://doi.org/10.1016/S0065-2458(06)70001-8}, doi = {10.1016/S0065-2458(06)70001-8}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/RoschellePT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Scacchi07, author = {Walt Scacchi}, title = {Free/Open Source Software Development: Recent Research Results and Methods}, journal = {Adv. Comput.}, volume = {69}, pages = {243--295}, year = {2007}, url = {https://doi.org/10.1016/S0065-2458(06)69005-0}, doi = {10.1016/S0065-2458(06)69005-0}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Scacchi07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Tahan07, author = {Charles Tahan}, title = {Identifying Nanotechnology in Society}, journal = {Adv. Comput.}, volume = {71}, pages = {251--271}, year = {2007}, url = {https://doi.org/10.1016/S0065-2458(06)71005-1}, doi = {10.1016/S0065-2458(06)71005-1}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Tahan07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Zhang07, author = {Wei Zhang}, title = {Compiler-Assisted Leakage Energy Reduction for Cache Memories}, journal = {Adv. Comput.}, volume = {69}, pages = {155--189}, year = {2007}, url = {https://doi.org/10.1016/S0065-2458(06)69003-7}, doi = {10.1016/S0065-2458(06)69003-7}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Zhang07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/ZhaoZ07, author = {Yi Zhao and Xin Zhang}, title = {Nanobiotechnology: An Engineer's Foray into Biology}, journal = {Adv. Comput.}, volume = {71}, pages = {39--102}, year = {2007}, url = {https://doi.org/10.1016/S0065-2458(06)71002-6}, doi = {10.1016/S0065-2458(06)71002-6}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ac/ZhaoZ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/BaderRS06, author = {David A. Bader and Usman Roshan and Alexandros Stamatakis}, title = {Computational Grand Challenges in Assembling the Tree of Life: Problems and Solutions}, journal = {Adv. Comput.}, volume = {68}, pages = {128--179}, year = {2006}, url = {https://doi.org/10.1016/S0065-2458(06)68004-2}, doi = {10.1016/S0065-2458(06)68004-2}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/BaderRS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Bail06, author = {William G. Bail}, title = {Requirements Management for Dependable Software Systems}, journal = {Adv. Comput.}, volume = {66}, pages = {80--143}, year = {2006}, url = {https://doi.org/10.1016/S0065-2458(05)66003-2}, doi = {10.1016/S0065-2458(05)66003-2}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Bail06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Bail06a, author = {William G. Bail}, title = {Mechanics of Managing Software Risk}, journal = {Adv. Comput.}, volume = {66}, pages = {144--174}, year = {2006}, url = {https://doi.org/10.1016/S0065-2458(05)66004-4}, doi = {10.1016/S0065-2458(05)66004-4}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Bail06a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/BourqueZ06, author = {Guillaume Bourque and Louxin Zhang}, title = {Models and Methods in Comparative Genomics}, journal = {Adv. Comput.}, volume = {68}, pages = {60--105}, year = {2006}, url = {https://doi.org/10.1016/S0065-2458(06)68002-9}, doi = {10.1016/S0065-2458(06)68002-9}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/BourqueZ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Forte06, author = {Dario V. Forte}, title = {The State of the Art in Digital Forensics}, journal = {Adv. Comput.}, volume = {67}, pages = {254--300}, year = {2006}, url = {https://doi.org/10.1016/S0065-2458(05)67006-4}, doi = {10.1016/S0065-2458(05)67006-4}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Forte06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/HovavG06, author = {Anat Hovav and Paul Gray}, title = {Academic Electronic Journals: Past, Present, and Future}, journal = {Adv. Comput.}, volume = {67}, pages = {132--177}, year = {2006}, url = {https://doi.org/10.1016/S0065-2458(05)67003-9}, doi = {10.1016/S0065-2458(05)67003-9}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/HovavG06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/HuanPW06, author = {Jun Huan and Jan F. Prins and Wei Wang}, title = {Local Structure Comparison of Proteins}, journal = {Adv. Comput.}, volume = {68}, pages = {180--255}, year = {2006}, url = {https://doi.org/10.1016/S0065-2458(06)68005-4}, doi = {10.1016/S0065-2458(06)68005-4}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/HuanPW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/HursonJS06, author = {Ali R. Hurson and Yu Jiao and Behrooz A. Shirazi}, title = {Broadcasting a Means to Disseminate Public Data in a Wireless Environment: Issues and Solutions}, journal = {Adv. Comput.}, volume = {67}, pages = {3--85}, year = {2006}, url = {https://doi.org/10.1016/S0065-2458(05)67001-5}, doi = {10.1016/S0065-2458(05)67001-5}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/HursonJS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/LeffR06, author = {Avraham Leff and James T. Rayfield}, title = {Programming Models and Synchronization Techniques for Disconnected Business Applications}, journal = {Adv. Comput.}, volume = {67}, pages = {86--131}, year = {2006}, url = {https://doi.org/10.1016/S0065-2458(05)67002-7}, doi = {10.1016/S0065-2458(05)67002-7}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/LeffR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/LinT06, author = {Ying Chih Lin and Chuan Yi Tang}, title = {Exposing Phylogenetic Relationships by Genome Rearrangement}, journal = {Adv. Comput.}, volume = {68}, pages = {2--59}, year = {2006}, url = {https://doi.org/10.1016/S0065-2458(06)68001-7}, doi = {10.1016/S0065-2458(06)68001-7}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/LinT06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/NejmehR06, author = {Brian A. Nejmeh and William E. Riddle}, title = {The {PERFECT} Approach to Experience-Based Process Evolution}, journal = {Adv. Comput.}, volume = {66}, pages = {175--239}, year = {2006}, url = {https://doi.org/10.1016/S0065-2458(05)66005-6}, doi = {10.1016/S0065-2458(05)66005-6}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/NejmehR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/PostKL06, author = {Douglass E. Post and Richard P. Kendall and Robert F. Lucas}, title = {The Opportunities, Challenges and Risks of High Performance Computing in Computational Science and Engineering}, journal = {Adv. Comput.}, volume = {66}, pages = {240--300}, year = {2006}, url = {https://doi.org/10.1016/S0065-2458(05)66006-8}, doi = {10.1016/S0065-2458(05)66006-8}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/PostKL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/ReboursK06, author = {Pierre Rebours and Taghi M. Khoshgoftaar}, title = {Quality Problem in Software Measurement Data}, journal = {Adv. Comput.}, volume = {66}, pages = {44--79}, year = {2006}, url = {https://doi.org/10.1016/S0065-2458(05)66002-0}, doi = {10.1016/S0065-2458(05)66002-0}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/ReboursK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/SolingenR06, author = {Rini van Solingen and David F. Rico}, title = {Calculating Software Process Improvement's Return on Investment}, journal = {Adv. Comput.}, volume = {66}, pages = {2--43}, year = {2006}, url = {https://doi.org/10.1016/S0065-2458(05)66001-9}, doi = {10.1016/S0065-2458(05)66001-9}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/SolingenR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/SthultzUB06, author = {Michael Sthultz and Jacob Uecker and Hal Berghel}, title = {Wireless Insecurities}, journal = {Adv. Comput.}, volume = {67}, pages = {226--253}, year = {2006}, url = {https://doi.org/10.1016/S0065-2458(05)67005-2}, doi = {10.1016/S0065-2458(05)67005-2}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/SthultzUB06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/TianM06, author = {Jeff Tian and Li Ma}, title = {Web Testing for Reliability Improvement}, journal = {Adv. Comput.}, volume = {67}, pages = {178--225}, year = {2006}, url = {https://doi.org/10.1016/S0065-2458(05)67004-0}, doi = {10.1016/S0065-2458(05)67004-0}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/TianM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Wang06, author = {Lusheng Wang}, title = {Translocation Distance: Algorithms and Complexity}, journal = {Adv. Comput.}, volume = {68}, pages = {106--127}, year = {2006}, url = {https://doi.org/10.1016/S0065-2458(06)68003-0}, doi = {10.1016/S0065-2458(06)68003-0}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Wang06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/WuET06, author = {Xue Wu and Nathan Edwards and Chau{-}Wen Tseng}, title = {Peptide Identification via Tandem Mass Spectrometry}, journal = {Adv. Comput.}, volume = {68}, pages = {256--280}, year = {2006}, url = {https://doi.org/10.1016/S0065-2458(06)68006-6}, doi = {10.1016/S0065-2458(06)68006-6}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/WuET06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/AliBSMBBMRRTY05, author = {Shoukat Ali and Tracy D. Braun and Howard Jay Siegel and Anthony A. Maciejewski and Noah Beck and Ladislau B{\"{o}}l{\"{o}}ni and Muthucumaru Maheswaran and Albert I. Reuther and James P. Robertson and Mitchell D. Theys and Bin Yao}, title = {Characterizing Resource Allocation Heuristics for Heterogeneous Computing Systems}, journal = {Adv. Comput.}, volume = {63}, pages = {93--129}, year = {2005}, url = {https://doi.org/10.1016/S0065-2458(04)63003-8}, doi = {10.1016/S0065-2458(04)63003-8}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/AliBSMBBMRRTY05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/BayrakD05, author = {Coskun Bayrak and Chad Davis}, title = {Open Source Software Development: Structural Tension in the American Experiment}, journal = {Adv. Comput.}, volume = {64}, pages = {248--283}, year = {2005}, url = {https://doi.org/10.1016/S0065-2458(04)64006-X}, doi = {10.1016/S0065-2458(04)64006-X}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/BayrakD05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Card05, author = {David N. Card}, title = {Defect Analysis: Basic Techniques for Management and Learning}, journal = {Adv. Comput.}, volume = {65}, pages = {260--297}, year = {2005}, url = {https://doi.org/10.1016/S0065-2458(05)65006-1}, doi = {10.1016/S0065-2458(05)65006-1}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Card05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/ChedidYL05, author = {Wissam Chedid and Chansu Yu and Ben Lee}, title = {Power Analysis and Optimization Techniques for Energy Efficient Computer Systems}, journal = {Adv. Comput.}, volume = {63}, pages = {130--165}, year = {2005}, url = {https://doi.org/10.1016/S0065-2458(04)63004-X}, doi = {10.1016/S0065-2458(04)63004-X}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/ChedidYL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Chowdhury05, author = {Abdur Chowdhury}, title = {Automatic Evaluation of Web Search Services}, journal = {Adv. Comput.}, volume = {64}, pages = {2--45}, year = {2005}, url = {https://doi.org/10.1016/S0065-2458(04)64001-0}, doi = {10.1016/S0065-2458(04)64001-0}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Chowdhury05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/GaudiotKR05, author = {Jean{-}Luc Gaudiot and Jung{-}Yup Kang and Won Woo Ro}, title = {Techniques to Improve Performance Beyond Pipelining: Superpipelining, Superscalar, and {VLIW}}, journal = {Adv. Comput.}, volume = {63}, pages = {2--35}, year = {2005}, url = {https://doi.org/10.1016/S0065-2458(04)63001-4}, doi = {10.1016/S0065-2458(04)63001-4}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/GaudiotKR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Geusebroek05, author = {Jan{-}Mark Geusebroek}, title = {Early Cognitive Computer Vision}, journal = {Adv. Comput.}, volume = {65}, pages = {110--153}, year = {2005}, url = {https://doi.org/10.1016/S0065-2458(05)65003-6}, doi = {10.1016/S0065-2458(05)65003-6}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Geusebroek05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/GregorSN05, author = {Peter Gregor and David Sloan and Alan F. Newell}, title = {Disability and Technology: Building Barriers or Creating Opportunities?}, journal = {Adv. Comput.}, volume = {64}, pages = {284--343}, year = {2005}, url = {https://doi.org/10.1016/S0065-2458(04)64007-1}, doi = {10.1016/S0065-2458(04)64007-1}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/GregorSN05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/HarrisonB05, author = {John V. Harrison and Hal Berghel}, title = {A Protocol Layer Survey of Network Security}, journal = {Adv. Comput.}, volume = {64}, pages = {110--159}, year = {2005}, url = {https://doi.org/10.1016/S0065-2458(04)64003-4}, doi = {10.1016/S0065-2458(04)64003-4}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/HarrisonB05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Henderson05, author = {Peter B. Henderson}, title = {The Role of Mathematics in Computer Science and Software Engineering Education}, journal = {Adv. Comput.}, volume = {65}, pages = {350--396}, year = {2005}, url = {https://doi.org/10.1016/S0065-2458(05)65008-5}, doi = {10.1016/S0065-2458(05)65008-5}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Henderson05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Holzmann05, author = {Gerard J. Holzmann}, title = {Software model checking with {SPIN}}, journal = {Adv. Comput.}, volume = {65}, pages = {78--109}, year = {2005}, url = {https://doi.org/10.1016/S0065-2458(05)65002-4}, doi = {10.1016/S0065-2458(05)65002-4}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Holzmann05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Hopgood05, author = {Adrian A. Hopgood}, title = {The state of artificial intelligence}, journal = {Adv. Comput.}, volume = {65}, pages = {3--77}, year = {2005}, url = {https://doi.org/10.1016/S0065-2458(05)65001-2}, doi = {10.1016/S0065-2458(05)65001-2}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Hopgood05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/HuiskesP05, author = {Mark J. Huiskes and Eric J. Pauwels}, title = {Indexing, Learning and Content-based Retrieval for Special Purpose Image Databases}, journal = {Adv. Comput.}, volume = {65}, pages = {204--259}, year = {2005}, url = {https://doi.org/10.1016/S0065-2458(05)65005-X}, doi = {10.1016/S0065-2458(05)65005-X}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/HuiskesP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Lokan05, author = {Christopher J. Lokan}, title = {Function Points}, journal = {Adv. Comput.}, volume = {65}, pages = {298--349}, year = {2005}, url = {https://doi.org/10.1016/S0065-2458(05)65007-3}, doi = {10.1016/S0065-2458(05)65007-3}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Lokan05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/MenziesP05, author = {Tim Menzies and Charles Pecheur}, title = {Verification and Validation and Artificial Intelligence}, journal = {Adv. Comput.}, volume = {65}, pages = {154--203}, year = {2005}, url = {https://doi.org/10.1016/S0065-2458(05)65004-8}, doi = {10.1016/S0065-2458(05)65004-8}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/MenziesP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/MukherjeeZTSS05, author = {Amar Mukherjee and Nan Zhang and Tao Tao and Ravi Vijaya Satya and Weifeng Sun}, title = {Search and Retrieval of Compressed Text}, journal = {Adv. Comput.}, volume = {63}, pages = {208--262}, year = {2005}, url = {https://doi.org/10.1016/S0065-2458(04)63006-3}, doi = {10.1016/S0065-2458(04)63006-3}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/MukherjeeZTSS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/RustKR05, author = {Roland T. Rust and P. K. Kannan and Anupama D. Ramachandran}, title = {E-Service: The Revenue Expansion Path to E-Commerce Profitability}, journal = {Adv. Comput.}, volume = {64}, pages = {160--196}, year = {2005}, url = {https://doi.org/10.1016/S0065-2458(04)64004-6}, doi = {10.1016/S0065-2458(04)64004-6}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/RustKR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Saha05, author = {Debashis Saha}, title = {Pervasive Computing: {A} Vision to Realize}, journal = {Adv. Comput.}, volume = {64}, pages = {197--247}, year = {2005}, url = {https://doi.org/10.1016/S0065-2458(04)64005-8}, doi = {10.1016/S0065-2458(04)64005-8}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ac/Saha05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Shin05, author = {Sang Shin}, title = {Web Services}, journal = {Adv. Comput.}, volume = {64}, pages = {46--109}, year = {2005}, url = {https://doi.org/10.1016/S0065-2458(04)64002-2}, doi = {10.1016/S0065-2458(04)64002-2}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Shin05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/SungKS05, author = {Byung Y. Sung and Mohan Kumar and Behrooz A. Shirazi}, title = {Flexible and Adaptive Services in Pervasive Computing}, journal = {Adv. Comput.}, volume = {63}, pages = {166--207}, year = {2005}, url = {https://doi.org/10.1016/S0065-2458(04)63005-1}, doi = {10.1016/S0065-2458(04)63005-1}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/SungKS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/TheocharidesLVI05, author = {Theocharis Theocharides and Greg M. Link and Narayanan Vijaykrishnan and Mary Jane Irwin}, title = {Networks on Chip (NoC): Interconnects of Next Generation Systems on Chip}, journal = {Adv. Comput.}, volume = {63}, pages = {36--92}, year = {2005}, url = {https://doi.org/10.1016/S0065-2458(04)63002-6}, doi = {10.1016/S0065-2458(04)63002-6}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/TheocharidesLVI05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Bagert04, author = {Donald J. Bagert}, title = {Licensing and Certification of Software Professionals}, journal = {Adv. Comput.}, volume = {60}, pages = {1--34}, year = {2004}, url = {https://doi.org/10.1016/S0065-2458(03)60001-X}, doi = {10.1016/S0065-2458(03)60001-X}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Bagert04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/BanavarB04, author = {Guruduth Banavar and Abraham Bernstein}, title = {Challenges in design and software infrastructure for ubiquitous computing applications}, journal = {Adv. Comput.}, volume = {62}, pages = {179--202}, year = {2004}, url = {https://doi.org/10.1016/S0065-2458(03)62004-8}, doi = {10.1016/S0065-2458(03)62004-8}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/BanavarB04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/BinkleyH04, author = {David W. Binkley and Mark Harman}, title = {A survey of empirical results on program slicing}, journal = {Adv. Comput.}, volume = {62}, pages = {105--178}, year = {2004}, url = {https://doi.org/10.1016/S0065-2458(03)62003-6}, doi = {10.1016/S0065-2458(03)62003-6}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/BinkleyH04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/ChaudhuriDG04, author = {Surajit Chaudhuri and Umeshwar Dayal and Venkatesh Ganti}, title = {Data management technology for decision support systems}, journal = {Adv. Comput.}, volume = {62}, pages = {293--326}, year = {2004}, url = {https://doi.org/10.1016/S0065-2458(03)62007-3}, doi = {10.1016/S0065-2458(03)62007-3}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/ChaudhuriDG04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/CohenLC04, author = {David Cohen and Mikael Lindvall and Patricia Costa}, title = {An introduction to agile methods}, journal = {Adv. Comput.}, volume = {62}, pages = {1--66}, year = {2004}, url = {https://doi.org/10.1016/S0065-2458(03)62001-2}, doi = {10.1016/S0065-2458(03)62001-2}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/CohenLC04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/CopseyOC04, author = {Dean Copsey and Mark Oskin and Frederic T. Chong}, title = {Ions, atoms, and bits: An architectural approach to quantum computing}, journal = {Adv. Comput.}, volume = {61}, pages = {275--318}, year = {2004}, url = {https://doi.org/10.1016/S0065-2458(03)61005-3}, doi = {10.1016/S0065-2458(03)61005-3}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/CopseyOC04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Cowan04, author = {Crispin Cowan}, title = {Survivability: Synergizing Security and Reliability}, journal = {Adv. Comput.}, volume = {60}, pages = {121--146}, year = {2004}, url = {https://doi.org/10.1016/S0065-2458(03)60004-5}, doi = {10.1016/S0065-2458(03)60004-5}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Cowan04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/CybenkoGT04, author = {George Cybenko and Annarita Giani and Paul Thompson}, title = {Cognitive Hacking}, journal = {Adv. Comput.}, volume = {60}, pages = {35--73}, year = {2004}, url = {https://doi.org/10.1016/S0065-2458(03)60002-1}, doi = {10.1016/S0065-2458(03)60002-1}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/CybenkoGT04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/EeckhoutB04, author = {Lieven Eeckhout and Koen De Bosschere}, title = {Efficient architectural design of high performance microprocessors}, journal = {Adv. Comput.}, volume = {61}, pages = {45--106}, year = {2004}, url = {https://doi.org/10.1016/S0065-2458(03)61002-8}, doi = {10.1016/S0065-2458(03)61002-8}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/EeckhoutB04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Harrison04, author = {Warren Harrison}, title = {The Digital Detective: An Introduction to Digital Forensics}, journal = {Adv. Comput.}, volume = {60}, pages = {75--119}, year = {2004}, url = {https://doi.org/10.1016/S0065-2458(03)60003-3}, doi = {10.1016/S0065-2458(03)60003-3}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Harrison04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/HursonPJH04, author = {Ali R. Hurson and J. A. Ploskonka and Yu Jiao and Harshal Haridas}, title = {Security issues and solutions in distributed heterogeneous mobile database systems}, journal = {Adv. Comput.}, volume = {61}, pages = {107--198}, year = {2004}, url = {https://doi.org/10.1016/S0065-2458(03)61003-X}, doi = {10.1016/S0065-2458(03)61003-X}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/HursonPJH04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/JalotePK04, author = {Pankaj Jalote and Aveejeet Palit and Priya Kurien}, title = {The Timeboxing process model for iterative software development}, journal = {Adv. Comput.}, volume = {62}, pages = {67--103}, year = {2004}, url = {https://doi.org/10.1016/S0065-2458(03)62002-4}, doi = {10.1016/S0065-2458(03)62002-4}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/JalotePK04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/KhoshgoftaarS04, author = {Taghi M. Khoshgoftaar and Naeem Seliya}, title = {Software quality estimation with case-based reasoning}, journal = {Adv. Comput.}, volume = {62}, pages = {249--291}, year = {2004}, url = {https://doi.org/10.1016/S0065-2458(03)62006-1}, doi = {10.1016/S0065-2458(03)62006-1}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/KhoshgoftaarS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/KlappholtzP04, author = {David Klappholz and Daniel Port}, title = {Introduction to {MBASE} (Model-Based [System] Architecting and Software Engineering)}, journal = {Adv. Comput.}, volume = {62}, pages = {203--248}, year = {2004}, url = {https://doi.org/10.1016/S0065-2458(03)62005-X}, doi = {10.1016/S0065-2458(03)62005-X}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/KlappholtzP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/McClellanLT04, author = {Stan McClellan and Stephen Low and Wai{-}tian Tan}, title = {Disruptive technologies and their affect on global telecommunications}, journal = {Adv. Comput.}, volume = {61}, pages = {199--273}, year = {2004}, url = {https://doi.org/10.1016/S0065-2458(03)61004-1}, doi = {10.1016/S0065-2458(03)61004-1}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/McClellanLT04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Pop04, author = {Mihai Pop}, title = {Shotgun Sequence Assembly}, journal = {Adv. Comput.}, volume = {60}, pages = {193--248}, year = {2004}, url = {https://doi.org/10.1016/S0065-2458(03)60006-9}, doi = {10.1016/S0065-2458(03)60006-9}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Pop04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/ShelferCPD04, author = {Katherine M. Shelfer and Chris Corum and J. Drew Procaccino and Joseph Didier}, title = {Smartcards}, journal = {Adv. Comput.}, volume = {60}, pages = {147--192}, year = {2004}, url = {https://doi.org/10.1016/S0065-2458(03)60005-7}, doi = {10.1016/S0065-2458(03)60005-7}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/ShelferCPD04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/TvedtCL04, author = {Roseanne Tesoriero Tvedt and Patricia Costa and Mikael Lindvall}, title = {Evaluating software architectures}, journal = {Adv. Comput.}, volume = {61}, pages = {1--43}, year = {2004}, url = {https://doi.org/10.1016/S0065-2458(03)61001-6}, doi = {10.1016/S0065-2458(03)61001-6}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/TvedtCL04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/ZweigP04, author = {Geoffrey Zweig and Michael Picheny}, title = {Advances in Large Vocabulary Continuous Speech Recognition}, journal = {Adv. Comput.}, volume = {60}, pages = {249--291}, year = {2004}, url = {https://doi.org/10.1016/S0065-2458(03)60007-0}, doi = {10.1016/S0065-2458(03)60007-0}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/ZweigP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Bernstein03, author = {Lawrence Bernstein}, title = {Software fault tolerance forestalls crashes: To err is human; to forgive is fault tolerant}, journal = {Adv. Comput.}, volume = {58}, pages = {239--286}, year = {2003}, url = {https://doi.org/10.1016/S0065-2458(03)58006-8}, doi = {10.1016/S0065-2458(03)58006-8}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Bernstein03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/BiereCCSZ03, author = {Armin Biere and Alessandro Cimatti and Edmund M. Clarke and Ofer Strichman and Yunshan Zhu}, title = {Bounded model checking}, journal = {Adv. Comput.}, volume = {58}, pages = {117--148}, year = {2003}, url = {https://doi.org/10.1016/S0065-2458(03)58003-2}, doi = {10.1016/S0065-2458(03)58003-2}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/BiereCCSZ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/BoochB03, author = {Grady Booch and Alan W. Brown}, title = {Collaborative Development Environments}, journal = {Adv. Comput.}, volume = {59}, pages = {1--27}, year = {2003}, url = {https://doi.org/10.1016/S0065-2458(03)59001-5}, doi = {10.1016/S0065-2458(03)59001-5}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/BoochB03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Chawathe03, author = {Sudarshan S. Chawathe}, title = {Managing historical {XML} data}, journal = {Adv. Comput.}, volume = {57}, pages = {109--169}, year = {2003}, url = {https://doi.org/10.1016/S0065-2458(03)57003-6}, doi = {10.1016/S0065-2458(03)57003-6}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Chawathe03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Chen03, author = {Su{-}Shing Chen}, title = {Preserving digital records and the life cycle of information}, journal = {Adv. Comput.}, volume = {57}, pages = {69--107}, year = {2003}, url = {https://doi.org/10.1016/S0065-2458(03)57002-4}, doi = {10.1016/S0065-2458(03)57002-4}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Chen03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Henninger03, author = {Scott Henninger}, title = {Tool Support for Experience-based Software Development Methodologies}, journal = {Adv. Comput.}, volume = {59}, pages = {29--82}, year = {2003}, url = {https://doi.org/10.1016/S0065-2458(03)59002-7}, doi = {10.1016/S0065-2458(03)59002-7}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Henninger03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Lindvall03, author = {Mikael Lindvall}, title = {Impact Analysis in Software Evolution}, journal = {Adv. Comput.}, volume = {59}, pages = {127--210}, year = {2003}, url = {https://doi.org/10.1016/S0065-2458(03)59004-0}, doi = {10.1016/S0065-2458(03)59004-0}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Lindvall03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Maxwell03, author = {Katrina Maxwell}, title = {Software development productivity}, journal = {Adv. Comput.}, volume = {58}, pages = {1--46}, year = {2003}, url = {https://doi.org/10.1016/S0065-2458(03)58001-9}, doi = {10.1016/S0065-2458(03)58001-9}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Maxwell03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Memon03, author = {Atif M. Memon}, title = {Advances in {GUI} testing}, journal = {Adv. Comput.}, volume = {58}, pages = {149--201}, year = {2003}, url = {https://doi.org/10.1016/S0065-2458(03)58004-4}, doi = {10.1016/S0065-2458(03)58004-4}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Memon03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/PeruginiR03, author = {Saverio Perugini and Naren Ramakrishnan}, title = {Personalizing interactions with information systems}, journal = {Adv. Comput.}, volume = {57}, pages = {323--382}, year = {2003}, url = {https://doi.org/10.1016/S0065-2458(03)57007-3}, doi = {10.1016/S0065-2458(03)57007-3}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ac/PeruginiR03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Prechelt03, author = {Lutz Prechelt}, title = {Are scripting languages any good? {A} validation of Perl, Python, Rexx, and Tcl against C, C++, and Java}, journal = {Adv. Comput.}, volume = {57}, pages = {205--270}, year = {2003}, url = {https://doi.org/10.1016/S0065-2458(03)57005-X}, doi = {10.1016/S0065-2458(03)57005-X}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Prechelt03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/QuintanaKS03, author = {Chris Quintana and Joseph Krajcik and Elliot Soloway}, title = {Issues and approaches for developing lerner-centered technology}, journal = {Adv. Comput.}, volume = {57}, pages = {271--321}, year = {2003}, url = {https://doi.org/10.1016/S0065-2458(03)57006-1}, doi = {10.1016/S0065-2458(03)57006-1}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/QuintanaKS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Rifkin03, author = {Stan Rifkin}, title = {Why New Software Processes Are Not Adopted}, journal = {Adv. Comput.}, volume = {59}, pages = {83--126}, year = {2003}, url = {https://doi.org/10.1016/S0065-2458(03)59003-9}, doi = {10.1016/S0065-2458(03)59003-9}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Rifkin03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/RoperDW03, author = {Marc Roper and Alastair Dunsmore and Murray Wood}, title = {Software inspections}, journal = {Adv. Comput.}, volume = {58}, pages = {203--238}, year = {2003}, url = {https://doi.org/10.1016/S0065-2458(03)58005-6}, doi = {10.1016/S0065-2458(03)58005-6}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/RoperDW03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/SustersicH03, author = {John P. Sustersic and Ali R. Hurson}, title = {Coherence protocols for Bus-based and Scalable Multiprocessors, Internet, and Wireless Distributed Computing Environments: {A} Survey}, journal = {Adv. Comput.}, volume = {59}, pages = {211--278}, year = {2003}, url = {https://doi.org/10.1016/S0065-2458(03)59005-2}, doi = {10.1016/S0065-2458(03)59005-2}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/SustersicH03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Tibbo03, author = {Helen R. Tibbo}, title = {On the nature and importance of archiving in the digital age}, journal = {Adv. Comput.}, volume = {57}, pages = {1--67}, year = {2003}, url = {https://doi.org/10.1016/S0065-2458(03)57001-2}, doi = {10.1016/S0065-2458(03)57001-2}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Tibbo03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Vaughn03, author = {Rayford B. Vaughn}, title = {Advances in the provisions of system and software security - Thirty years of progress}, journal = {Adv. Comput.}, volume = {58}, pages = {287--340}, year = {2003}, url = {https://doi.org/10.1016/S0065-2458(03)58007-X}, doi = {10.1016/S0065-2458(03)58007-X}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Vaughn03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/WinterRW03, author = {Victor L. Winter and Steve Roach and Gregory L. Wickstrom}, title = {Transformation-oriented programming: {A} development methodology for high assurance software}, journal = {Adv. Comput.}, volume = {58}, pages = {47--116}, year = {2003}, url = {https://doi.org/10.1016/S0065-2458(03)58002-0}, doi = {10.1016/S0065-2458(03)58002-0}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/WinterRW03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/ZivianiM03, author = {Nivio Ziviani and Edleno Silva de Moura}, title = {Adding compression to next-generation text retrieval systems}, journal = {Adv. Comput.}, volume = {57}, pages = {171--204}, year = {2003}, url = {https://doi.org/10.1016/S0065-2458(03)57004-8}, doi = {10.1016/S0065-2458(03)57004-8}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/ZivianiM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/BennettRW02, author = {Keith H. Bennett and V{\'{a}}clav Rajlich and Norman Wilde}, title = {Software Evolution and the Staged Model of the Software Lifecycle}, journal = {Adv. Comput.}, volume = {56}, pages = {1--54}, year = {2002}, url = {https://doi.org/10.1016/S0065-2458(02)80003-1}, doi = {10.1016/S0065-2458(02)80003-1}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/BennettRW02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/BlackKW02, author = {Paul E. Black and D. Richard Kuhn and Carl J. Williams}, title = {Quantum computing and communication}, journal = {Adv. Comput.}, volume = {56}, pages = {189--244}, year = {2002}, url = {https://doi.org/10.1016/S0065-2458(02)80007-9}, doi = {10.1016/S0065-2458(02)80007-9}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/BlackKW02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/BriandW02, author = {Lionel C. Briand and J{\"{u}}rgen W{\"{u}}st}, title = {Empirical Studies of Quality Models in Object-Oriented Systems}, journal = {Adv. Comput.}, volume = {56}, pages = {97--166}, year = {2002}, url = {https://doi.org/10.1016/S0065-2458(02)80005-5}, doi = {10.1016/S0065-2458(02)80005-5}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/BriandW02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/BrownG02, author = {Donald E. Brown and Louise F. Gunderson}, title = {Using Data Mining to Discover the Preferences of Computer Criminals}, journal = {Adv. Comput.}, volume = {56}, pages = {343--373}, year = {2002}, url = {https://doi.org/10.1016/S0065-2458(02)80010-9}, doi = {10.1016/S0065-2458(02)80010-9}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/BrownG02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/BuhrHM02, author = {Peter A. Buhr and Ashif S. Harji and W. Y. Russell Mok}, title = {Exception Handling}, journal = {Adv. Comput.}, volume = {56}, pages = {245--303}, year = {2002}, url = {https://doi.org/10.1016/S0065-2458(02)80008-0}, doi = {10.1016/S0065-2458(02)80008-0}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/BuhrHM02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Fateman02, author = {Richard J. Fateman}, title = {Software Fault Prevention by Language Choice: Why {C} is Not My Favorite Language}, journal = {Adv. Comput.}, volume = {56}, pages = {167--188}, year = {2002}, url = {https://doi.org/10.1016/S0065-2458(02)80006-7}, doi = {10.1016/S0065-2458(02)80006-7}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Fateman02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Lee02, author = {Edward A. Lee}, title = {Embedded Software}, journal = {Adv. Comput.}, volume = {56}, pages = {55--95}, year = {2002}, url = {https://doi.org/10.1016/S0065-2458(02)80004-3}, doi = {10.1016/S0065-2458(02)80004-3}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Lee02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Oviatt02, author = {Sharon L. Oviatt}, title = {Breaking the Robustness Barrier: Recent Progress on the Design of Robust Multimodal Systems}, journal = {Adv. Comput.}, volume = {56}, pages = {305--341}, year = {2002}, url = {https://doi.org/10.1016/S0065-2458(02)80009-2}, doi = {10.1016/S0065-2458(02)80009-2}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Oviatt02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/AndersonSL01, author = {Ross J. Anderson and Frank Stajano and Jong{-}Hyeon Lee}, title = {Security policies}, journal = {Adv. Comput.}, volume = {55}, pages = {185--235}, year = {2001}, url = {https://doi.org/10.1016/S0065-2458(01)80030-9}, doi = {10.1016/S0065-2458(01)80030-9}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/AndersonSL01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/AtallahPRS01, author = {Mikhail J. Atallah and Konstantinos N. Pantazopoulos and John R. Rice and Eugene H. Spafford}, title = {Secure outsourcing of scientific computations}, journal = {Adv. Comput.}, volume = {54}, pages = {215--272}, year = {2001}, url = {https://doi.org/10.1016/S0065-2458(01)80019-X}, doi = {10.1016/S0065-2458(01)80019-X}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/AtallahPRS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Brown01, author = {Alan W. Brown}, title = {An overview of components and component-based development}, journal = {Adv. Comput.}, volume = {54}, pages = {1--34}, year = {2001}, url = {https://doi.org/10.1016/S0065-2458(01)80014-0}, doi = {10.1016/S0065-2458(01)80014-0}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Brown01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Harasim01, author = {Linda Harasim}, title = {The Virtual University: {A} State of the Art}, journal = {Adv. Comput.}, volume = {55}, pages = {1--47}, year = {2001}, url = {https://doi.org/10.1016/S0065-2458(01)80025-5}, doi = {10.1016/S0065-2458(01)80025-5}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Harasim01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Holmes01, author = {W. Neville Holmes}, title = {The Net, the Web, and the Children}, journal = {Adv. Comput.}, volume = {55}, pages = {49--85}, year = {2001}, url = {https://doi.org/10.1016/S0065-2458(01)80026-7}, doi = {10.1016/S0065-2458(01)80026-7}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Holmes01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/LeffPRS01, author = {Avraham Leff and John Prokopek and James T. Rayfield and Ignacio Silva{-}Lepe}, title = {Enterprise JavaBeans and Microsoft Transaction Server: Frameworks for Distributed Enterprise Components}, journal = {Adv. Comput.}, volume = {54}, pages = {99--152}, year = {2001}, url = {https://doi.org/10.1016/S0065-2458(01)80016-4}, doi = {10.1016/S0065-2458(01)80016-4}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/LeffPRS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/MihailaRV01, author = {George A. Mihaila and Louiqa Raschid and Maria{-}Esther Vidal}, title = {Source Selection and Ranking in the WebSemantics Architecture: Using Quality of Data Metadata}, journal = {Adv. Comput.}, volume = {55}, pages = {87--118}, year = {2001}, url = {https://doi.org/10.1016/S0065-2458(01)80027-9}, doi = {10.1016/S0065-2458(01)80027-9}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/MihailaRV01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Post01, author = {Gerald Post}, title = {Computer Technology Changes and Purchasing Strategies}, journal = {Adv. Comput.}, volume = {54}, pages = {183--213}, year = {2001}, url = {https://doi.org/10.1016/S0065-2458(01)80018-8}, doi = {10.1016/S0065-2458(01)80018-8}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Post01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/RamakrishnanG01, author = {Naren Ramakrishnan and Ananth Grama}, title = {Mining scientific data}, journal = {Adv. Comput.}, volume = {55}, pages = {119--169}, year = {2001}, url = {https://doi.org/10.1016/S0065-2458(01)80028-0}, doi = {10.1016/S0065-2458(01)80028-0}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ac/RamakrishnanG01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/SavageSS01, author = {John E. Savage and Alan L. Selman and Carl Smith}, title = {The history and contribution of theoretical computer science}, journal = {Adv. Comput.}, volume = {55}, pages = {171--183}, year = {2001}, url = {https://doi.org/10.1016/S0065-2458(01)80029-2}, doi = {10.1016/S0065-2458(01)80029-2}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/SavageSS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Schneidewind01, author = {Norman F. Schneidewind}, title = {Maintenance Process and Product Evaluation Using Reliability, Risk, and Test Metrics}, journal = {Adv. Comput.}, volume = {54}, pages = {153--181}, year = {2001}, url = {https://doi.org/10.1016/S0065-2458(01)80017-6}, doi = {10.1016/S0065-2458(01)80017-6}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Schneidewind01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Taur01, author = {Yuan Taur}, title = {Transistors and {IC} design}, journal = {Adv. Comput.}, volume = {55}, pages = {237--279}, year = {2001}, url = {https://doi.org/10.1016/S0065-2458(01)80031-0}, doi = {10.1016/S0065-2458(01)80031-0}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Taur01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/TravassosSC01, author = {Guilherme Horta Travassos and Forrest Shull and Jeffrey C. Carver}, title = {Working with {UML:} {A} software Design Process Based on Inspections for the Unified Modeling Language}, journal = {Adv. Comput.}, volume = {54}, pages = {35--98}, year = {2001}, url = {https://doi.org/10.1016/S0065-2458(01)80015-2}, doi = {10.1016/S0065-2458(01)80015-2}, timestamp = {Fri, 03 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/TravassosSC01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Agresti00, author = {William W. Agresti}, title = {Knowledge Management}, journal = {Adv. Comput.}, volume = {53}, pages = {171--283}, year = {2000}, url = {https://doi.org/10.1016/S0065-2458(00)80006-6}, doi = {10.1016/S0065-2458(00)80006-6}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Agresti00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/AsokanJSW00, author = {N. Asokan and Philippe A. Janson and Michael Steiner and Michael Waidner}, title = {State of the art in electronic payment systems}, journal = {Adv. Comput.}, volume = {53}, pages = {425--449}, year = {2000}, url = {https://doi.org/10.1016/S0065-2458(00)80009-1}, doi = {10.1016/S0065-2458(00)80009-1}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/AsokanJSW00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Baer00, author = {Ferdinand Baer}, title = {Numerical weather prediction}, journal = {Adv. Comput.}, volume = {52}, pages = {91--157}, year = {2000}, url = {https://doi.org/10.1016/S0065-2458(00)80017-0}, doi = {10.1016/S0065-2458(00)80017-0}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Baer00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/BernsenD00, author = {Niels Ole Bernsen and Laila Dybkj{\ae}r}, title = {From single word to natural dialogue}, journal = {Adv. Comput.}, volume = {52}, pages = {267--327}, year = {2000}, url = {https://doi.org/10.1016/S0065-2458(00)80020-0}, doi = {10.1016/S0065-2458(00)80020-0}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/BernsenD00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/EmanG00, author = {Khaled El Emam and Dennis R. Goldenson}, title = {An empirical review of software process assessments}, journal = {Adv. Comput.}, volume = {53}, pages = {319--423}, year = {2000}, url = {https://doi.org/10.1016/S0065-2458(00)80008-X}, doi = {10.1016/S0065-2458(00)80008-X}, timestamp = {Wed, 13 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/EmanG00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/HevnerB00, author = {Alan R. Hevner and Donald J. Berndt}, title = {Eras of business computing}, journal = {Adv. Comput.}, volume = {52}, pages = {1--90}, year = {2000}, url = {https://doi.org/10.1016/S0065-2458(00)80016-9}, doi = {10.1016/S0065-2458(00)80016-9}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/HevnerB00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/HollingsworthKR00, author = {Jeffrey K. Hollingsworth and Peter J. Keleher and Kyung Dong Ryu}, title = {Resource-aware meta-computing}, journal = {Adv. Comput.}, volume = {53}, pages = {109--169}, year = {2000}, url = {https://doi.org/10.1016/S0065-2458(00)80005-4}, doi = {10.1016/S0065-2458(00)80005-4}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/HollingsworthKR00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/KaviKLH00, author = {Krishna M. Kavi and Hyong{-}Shik Kim and Ben Lee and Ali R. Hurson}, title = {Shared memory and distributed shared memory systems: {A} survey}, journal = {Adv. Comput.}, volume = {53}, pages = {55--108}, year = {2000}, url = {https://doi.org/10.1016/S0065-2458(00)80004-2}, doi = {10.1016/S0065-2458(00)80004-2}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/KaviKLH00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/NirenburgW00, author = {Sergei Nirenburg and Yorick Wilks}, title = {Machine translation}, journal = {Adv. Comput.}, volume = {52}, pages = {159--188}, year = {2000}, url = {https://doi.org/10.1016/S0065-2458(00)80018-2}, doi = {10.1016/S0065-2458(00)80018-2}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/NirenburgW00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Rosenberg00, author = {Jarrett Rosenberg}, title = {A methodology for evaluating predictive metrics}, journal = {Adv. Comput.}, volume = {53}, pages = {285--318}, year = {2000}, url = {https://doi.org/10.1016/S0065-2458(00)80007-8}, doi = {10.1016/S0065-2458(00)80007-8}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Rosenberg00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Schaeffer00, author = {Jonathan Schaeffer}, title = {The games computers (and people) play}, journal = {Adv. Comput.}, volume = {52}, pages = {189--266}, year = {2000}, url = {https://doi.org/10.1016/S0065-2458(00)80019-4}, doi = {10.1016/S0065-2458(00)80019-4}, timestamp = {Thu, 19 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Schaeffer00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Schlett00, author = {Manfred Schlett}, title = {Embedded microprocessors: Evolution, trends and challenges}, journal = {Adv. Comput.}, volume = {52}, pages = {329--379}, year = {2000}, url = {https://doi.org/10.1016/S0065-2458(00)80021-2}, doi = {10.1016/S0065-2458(00)80021-2}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Schlett00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/StenstromHLMV00, author = {Per Stenstr{\"{o}}m and Erik Hagersten and David J. Lilja and Margaret Martonosi and Madan Venugopal}, title = {Shared-memory multiprocessing: Current state and future directions}, journal = {Adv. Comput.}, volume = {53}, pages = {1--53}, year = {2000}, url = {https://doi.org/10.1016/S0065-2458(00)80003-0}, doi = {10.1016/S0065-2458(00)80003-0}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/StenstromHLMV00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/VosslerV00, author = {Colleen K. Vossler and Jeffrey M. Voas}, title = {Defective software: An overview of legal remedies and technical measures available to consumers}, journal = {Adv. Comput.}, volume = {53}, pages = {451--497}, year = {2000}, url = {https://doi.org/10.1016/S0065-2458(00)80010-8}, doi = {10.1016/S0065-2458(00)80010-8}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/VosslerV00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Abu-GhazalehW99, author = {Nael B. Abu{-}Ghazaleh and Philip A. Wilsey}, title = {Managing control asynchrony on {SIMD} machines - {A} survey}, journal = {Adv. Comput.}, volume = {49}, pages = {239--302}, year = {1999}, url = {https://doi.org/10.1016/S0065-2458(08)60287-9}, doi = {10.1016/S0065-2458(08)60287-9}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Abu-GhazalehW99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/AgreCS99, author = {Jonathan R. Agre and Loren P. Clare and Shivakumar Sastry}, title = {A taxonomy of distributed real-time control systems}, journal = {Adv. Comput.}, volume = {49}, pages = {303--352}, year = {1999}, url = {https://doi.org/10.1016/S0065-2458(08)60288-0}, doi = {10.1016/S0065-2458(08)60288-0}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/AgreCS99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/AtkinsonK99, author = {Randall J. Atkinson and J. Eric Klinker}, title = {Progress in internet security}, journal = {Adv. Comput.}, volume = {48}, pages = {219--255}, year = {1999}, url = {https://doi.org/10.1016/S0065-2458(08)60021-2}, doi = {10.1016/S0065-2458(08)60021-2}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/AtkinsonK99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Bail99, author = {William Bail}, title = {Exception handling design patterns}, journal = {Adv. Comput.}, volume = {49}, pages = {191--238}, year = {1999}, url = {https://doi.org/10.1016/S0065-2458(08)60286-7}, doi = {10.1016/S0065-2458(08)60286-7}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Bail99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/BerghelB99, author = {Hal Berghel and Douglas Blank}, title = {The World Wide Web}, journal = {Adv. Comput.}, volume = {48}, pages = {179--218}, year = {1999}, url = {https://doi.org/10.1016/S0065-2458(08)60020-0}, doi = {10.1016/S0065-2458(08)60020-0}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/BerghelB99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/ChenH99, author = {Hsinchun Chen and Andrea L. Houston}, title = {Digital Libraries: Social issues and technological advances}, journal = {Adv. Comput.}, volume = {48}, pages = {257--314}, year = {1999}, url = {https://doi.org/10.1016/S0065-2458(08)60022-4}, doi = {10.1016/S0065-2458(08)60022-4}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/ChenH99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/DorrJB99, author = {Bonnie J. Dorr and Pamela W. Jordan and John W. Benoit}, title = {A survey of current paradigms in machine translation}, journal = {Adv. Comput.}, volume = {49}, pages = {1--68}, year = {1999}, url = {https://doi.org/10.1016/S0065-2458(08)60282-X}, doi = {10.1016/S0065-2458(08)60282-X}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/DorrJB99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Fitzgerald99, author = {John S. Fitzgerald}, title = {Formality in specification and modeling: developments in software engineering practice}, journal = {Adv. Comput.}, volume = {49}, pages = {69--94}, year = {1999}, url = {https://doi.org/10.1016/S0065-2458(08)60283-1}, doi = {10.1016/S0065-2458(08)60283-1}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Fitzgerald99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/LimH99, author = {James B. Lim and Ali R. Hurson}, title = {Heterogeneous data access in a mobile environment: Issues and solutions}, journal = {Adv. Comput.}, volume = {48}, pages = {119--178}, year = {1999}, url = {https://doi.org/10.1016/S0065-2458(08)60019-4}, doi = {10.1016/S0065-2458(08)60019-4}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/LimH99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/MayrhauserM99, author = {Anneliese von Mayrhauser and Richard T. Mraz}, title = {Using domain models for system testing}, journal = {Adv. Comput.}, volume = {49}, pages = {143--190}, year = {1999}, url = {https://doi.org/10.1016/S0065-2458(08)60285-5}, doi = {10.1016/S0065-2458(08)60285-5}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/MayrhauserM99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/RosenblattH99, author = {Julio Rosenblatt and James A. Hendler}, title = {Architectures for mobile robot control}, journal = {Adv. Comput.}, volume = {48}, pages = {315--353}, year = {1999}, url = {https://doi.org/10.1016/S0065-2458(08)60023-6}, doi = {10.1016/S0065-2458(08)60023-6}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/RosenblattH99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/SchmidtLC99, author = {Douglas C. Schmidt and David L. Levine and Chris Cleveland}, title = {Architectures and patterns for developing high performance real-time {ORB} endsystems}, journal = {Adv. Comput.}, volume = {48}, pages = {1--118}, year = {1999}, url = {https://doi.org/10.1016/S0065-2458(08)60018-2}, doi = {10.1016/S0065-2458(08)60018-2}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/SchmidtLC99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/StaplesB99, author = {Matthew L. Staples and James M. Bieman}, title = {3-D visualization of software structure}, journal = {Adv. Comput.}, volume = {49}, pages = {95--141}, year = {1999}, url = {https://doi.org/10.1016/S0065-2458(08)60284-3}, doi = {10.1016/S0065-2458(08)60284-3}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/StaplesB99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Goldfedder98, author = {Brandon Goldfedder}, title = {Patterns and System Development}, journal = {Adv. Comput.}, volume = {47}, pages = {255--292}, year = {1998}, url = {https://doi.org/10.1016/S0065-2458(08)60669-5}, doi = {10.1016/S0065-2458(08)60669-5}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Goldfedder98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/HoustisRRDWJH98, author = {Elias N. Houstis and John R. Rice and Naren Ramakrishnan and Tzvetan T. Drashansky and Sanjiva Weerawarana and Anupam Joshi and Catherine E. Houstis}, title = {Multidisciplinary Problem Solving Environments for Computational Science}, journal = {Adv. Comput.}, volume = {46}, pages = {401--438}, year = {1998}, url = {https://doi.org/10.1016/S0065-2458(08)60209-0}, doi = {10.1016/S0065-2458(08)60209-0}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ac/HoustisRRDWJH98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/KaviLH98, author = {Krishna M. Kavi and Ben Lee and Ali R. Hurson}, title = {Multithreaded Systems}, journal = {Adv. Comput.}, volume = {46}, pages = {287--328}, year = {1998}, url = {https://doi.org/10.1016/S0065-2458(08)60207-7}, doi = {10.1016/S0065-2458(08)60207-7}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/KaviLH98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Kontio98, author = {Jyrki Kontio}, title = {A Software Process Engineering Framework}, journal = {Adv. Comput.}, volume = {46}, pages = {35--108}, year = {1998}, url = {https://doi.org/10.1016/S0065-2458(08)60203-X}, doi = {10.1016/S0065-2458(08)60203-X}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Kontio98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Manaris98, author = {Bill Z. Manaris}, title = {Natural Language Processing: {A} Human-Computer Interaction Perspective}, journal = {Adv. Comput.}, volume = {47}, pages = {1--66}, year = {1998}, url = {https://doi.org/10.1016/S0065-2458(08)60665-8}, doi = {10.1016/S0065-2458(08)60665-8}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Manaris98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Nelson98, author = {Thomas Nelson}, title = {Ultrasound Visualization}, journal = {Adv. Comput.}, volume = {47}, pages = {185--253}, year = {1998}, url = {https://doi.org/10.1016/S0065-2458(08)60668-3}, doi = {10.1016/S0065-2458(08)60668-3}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Nelson98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/NelsonSR98, author = {Paul Nelson and Abraham Seidmann and William B. Richmond}, title = {Software Acquisition: The Custom/Package and Insource/Outsource Dimensions}, journal = {Adv. Comput.}, volume = {47}, pages = {341--367}, year = {1998}, url = {https://doi.org/10.1016/S0065-2458(08)60671-3}, doi = {10.1016/S0065-2458(08)60671-3}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/NelsonSR98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/PaekC98, author = {Seungyup Paek and Shih{-}Fu Chang}, title = {High Performance Digital Video Servers: Storage and Retrieval of Compressed Scalable Video}, journal = {Adv. Comput.}, volume = {47}, pages = {293--340}, year = {1998}, url = {https://doi.org/10.1016/S0065-2458(08)60670-1}, doi = {10.1016/S0065-2458(08)60670-1}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/PaekC98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/PapadopoulosA98, author = {George A. Papadopoulos and Farhad Arbab}, title = {Coordination Models and Languages}, journal = {Adv. Comput.}, volume = {46}, pages = {329--400}, year = {1998}, url = {https://doi.org/10.1016/S0065-2458(08)60208-9}, doi = {10.1016/S0065-2458(08)60208-9}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/PapadopoulosA98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Paulk98, author = {Mark C. Paulk}, title = {Software Process Appraisal and Improvement: Models and Standards}, journal = {Adv. Comput.}, volume = {46}, pages = {1--33}, year = {1998}, url = {https://doi.org/10.1016/S0065-2458(08)60202-8}, doi = {10.1016/S0065-2458(08)60202-8}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Paulk98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/ReggiaCL98, author = {James A. Reggia and Hui{-}Hsien Chou and Jason D. Lohn}, title = {Cellular Automata Models of Self-Replicating Systems}, journal = {Adv. Comput.}, volume = {47}, pages = {141--183}, year = {1998}, url = {https://doi.org/10.1016/S0065-2458(08)60667-1}, doi = {10.1016/S0065-2458(08)60667-1}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/ReggiaCL98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Sandhu98, author = {Ravi S. Sandhu}, title = {Role-Based Access Control}, journal = {Adv. Comput.}, volume = {46}, pages = {237--286}, year = {1998}, url = {https://doi.org/10.1016/S0065-2458(08)60206-5}, doi = {10.1016/S0065-2458(08)60206-5}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Sandhu98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Selker98, author = {Ted Selker}, title = {Cognitive Adaptive Computer Help {(COACH):} {A} Case Study}, journal = {Adv. Comput.}, volume = {47}, pages = {67--140}, year = {1998}, url = {https://doi.org/10.1016/S0065-2458(08)60666-X}, doi = {10.1016/S0065-2458(08)60666-X}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Selker98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Simmons98, author = {Pamela Simmons}, title = {Gaining Business Value from {IT} Investments}, journal = {Adv. Comput.}, volume = {46}, pages = {109--157}, year = {1998}, url = {https://doi.org/10.1016/S0065-2458(08)60204-1}, doi = {10.1016/S0065-2458(08)60204-1}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Simmons98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Tian98, author = {Jeff Tian}, title = {Reliability Measurement, Analysis, and Improvement for Large Software Systems}, journal = {Adv. Comput.}, volume = {46}, pages = {159--235}, year = {1998}, url = {https://doi.org/10.1016/S0065-2458(08)60205-3}, doi = {10.1016/S0065-2458(08)60205-3}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Tian98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Bull97, author = {Glen Bull}, title = {Technology and Schools}, journal = {Adv. Comput.}, volume = {45}, pages = {321--356}, year = {1997}, url = {https://doi.org/10.1016/S0065-2458(08)60711-1}, doi = {10.1016/S0065-2458(08)60711-1}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Bull97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Charette97, author = {Robert N. Charette}, title = {Managing the Risks in Information Systems and Technology}, journal = {Adv. Comput.}, volume = {44}, pages = {1--58}, year = {1997}, url = {https://doi.org/10.1016/S0065-2458(08)60336-8}, doi = {10.1016/S0065-2458(08)60336-8}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Charette97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Duncan97, author = {Ralph Duncan}, title = {Parallel Computer Construction Outside the United States}, journal = {Adv. Comput.}, volume = {44}, pages = {169--218}, year = {1997}, url = {https://doi.org/10.1016/S0065-2458(08)60339-3}, doi = {10.1016/S0065-2458(08)60339-3}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Duncan97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/GoelY97, author = {Amrit L. Goel and Kune{-}Zang Yang}, title = {Software Reliability and Readiness Assessment Based on the Non-Homogeneous Poisson Process}, journal = {Adv. Comput.}, volume = {45}, pages = {197--267}, year = {1997}, url = {https://doi.org/10.1016/S0065-2458(08)60709-3}, doi = {10.1016/S0065-2458(08)60709-3}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/GoelY97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/GrudinP97, author = {Jonathan Grudin and Steven E. Poltrock}, title = {Computer Supported Cooperative Work and Groupware}, journal = {Adv. Comput.}, volume = {45}, pages = {269--320}, year = {1997}, url = {https://doi.org/10.1016/S0065-2458(08)60710-X}, doi = {10.1016/S0065-2458(08)60710-X}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/GrudinP97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Hauser97, author = {Ralf C. Hauser}, title = {Control of Information Distribution and Access}, journal = {Adv. Comput.}, volume = {44}, pages = {219--283}, year = {1997}, url = {https://doi.org/10.1016/S0065-2458(08)60340-X}, doi = {10.1016/S0065-2458(08)60340-X}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Hauser97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/HursonLKL97, author = {Ali R. Hurson and Joford T. Lim and Krishna M. Kavi and Ben Lee}, title = {Parallelization of {DOALL} and {DOACROSS} Loops - {A} Survey}, journal = {Adv. Comput.}, volume = {45}, pages = {53--103}, year = {1997}, url = {https://doi.org/10.1016/S0065-2458(08)60706-8}, doi = {10.1016/S0065-2458(08)60706-8}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/HursonLKL97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Kushilevitz97, author = {Eyal Kushilevitz}, title = {Communication Complexity}, journal = {Adv. Comput.}, volume = {44}, pages = {331--360}, year = {1997}, url = {https://doi.org/10.1016/S0065-2458(08)60342-3}, doi = {10.1016/S0065-2458(08)60342-3}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Kushilevitz97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Pfleeger97, author = {Shari Lawrence Pfleeger}, title = {Experimentation in Software Engineering}, journal = {Adv. Comput.}, volume = {44}, pages = {127--167}, year = {1997}, url = {https://doi.org/10.1016/S0065-2458(08)60338-1}, doi = {10.1016/S0065-2458(08)60338-1}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Pfleeger97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/RamanP97, author = {Srilata Raman and Lalit M. Patnaik}, title = {Optimization Via Evolutionary Processes}, journal = {Adv. Comput.}, volume = {45}, pages = {155--196}, year = {1997}, url = {https://doi.org/10.1016/S0065-2458(08)60708-1}, doi = {10.1016/S0065-2458(08)60708-1}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/RamanP97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/SaltzACDEHHMPSSU97, author = {Joel H. Saltz and Gagan Agrawal and Chialin Chang and Raja Das and Guy Edjlali and Paul Havlak and Yuan{-}Shin Hwang and Bongki Moon and Ravi Ponnusamy and Shamik D. Sharma and Alan Sussman and Mustafa Uysal}, title = {Programming Irregular Applications: Runtime Support, Compilation and Tools}, journal = {Adv. Comput.}, volume = {45}, pages = {105--153}, year = {1997}, url = {https://doi.org/10.1016/S0065-2458(08)60707-X}, doi = {10.1016/S0065-2458(08)60707-X}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ac/SaltzACDEHHMPSSU97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/StaubH97, author = {Pablo A. Straub and Carlos A. Hurtado}, title = {Control in Multi-Treaded Information Systems}, journal = {Adv. Comput.}, volume = {45}, pages = {1--52}, year = {1997}, url = {https://doi.org/10.1016/S0065-2458(08)60705-6}, doi = {10.1016/S0065-2458(08)60705-6}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/StaubH97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Vetter97, author = {Ronald J. Vetter}, title = {Asynchronous Transfer Mode: An Emerging Network Standard for High-Speed Communications}, journal = {Adv. Comput.}, volume = {44}, pages = {285--330}, year = {1997}, url = {https://doi.org/10.1016/S0065-2458(08)60341-1}, doi = {10.1016/S0065-2458(08)60341-1}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Vetter97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/WalkerdenJ97, author = {Fiona Walkerden and D. Ross Jeffery}, title = {Software Cost Estimation: {A} Review of Models, Process, and Practice}, journal = {Adv. Comput.}, volume = {44}, pages = {59--125}, year = {1997}, url = {https://doi.org/10.1016/S0065-2458(08)60337-X}, doi = {10.1016/S0065-2458(08)60337-X}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/WalkerdenJ97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/AtleeCG96, author = {Joanne M. Atlee and Marsha Chechik and John D. Gannon}, title = {Using Model Checking to Analyze Requirements and Designs}, journal = {Adv. Comput.}, volume = {43}, pages = {141--178}, year = {1996}, url = {https://doi.org/10.1016/S0065-2458(08)60643-9}, doi = {10.1016/S0065-2458(08)60643-9}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/AtleeCG96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/BinkleyG96, author = {David W. Binkley and Keith Brian Gallagher}, title = {Program Slicing}, journal = {Adv. Comput.}, volume = {43}, pages = {1--50}, year = {1996}, url = {https://doi.org/10.1016/S0065-2458(08)60641-5}, doi = {10.1016/S0065-2458(08)60641-5}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/BinkleyG96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/BrynjolfssonY96, author = {Erik Brynjolfsson and Shinkyu Yang}, title = {Information Technology and Productivity: {A} Review of the Literature}, journal = {Adv. Comput.}, volume = {43}, pages = {179--214}, year = {1996}, url = {https://doi.org/10.1016/S0065-2458(08)60644-0}, doi = {10.1016/S0065-2458(08)60644-0}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/BrynjolfssonY96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/DePieroT96, author = {Fred W. DePiero and Mohan M. Trivedi}, title = {3-D Computer Vision Using Structured Light: Design, Calibration, and Implementation Issues}, journal = {Adv. Comput.}, volume = {43}, pages = {243--278}, year = {1996}, url = {https://doi.org/10.1016/S0065-2458(08)60646-4}, doi = {10.1016/S0065-2458(08)60646-4}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/DePieroT96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Gasarch96, author = {William I. Gasarch}, title = {The Complexity of Problems}, journal = {Adv. Comput.}, volume = {43}, pages = {215--241}, year = {1996}, url = {https://doi.org/10.1016/S0065-2458(08)60645-2}, doi = {10.1016/S0065-2458(08)60645-2}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Gasarch96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/KirnerD96, author = {Tereza G. Kirner and Alan M. Davis}, title = {Nonfunctional Requirements of Real-Time Systems}, journal = {Adv. Comput.}, volume = {42}, pages = {1--37}, year = {1996}, url = {https://doi.org/10.1016/S0065-2458(08)60483-0}, doi = {10.1016/S0065-2458(08)60483-0}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/KirnerD96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Liu96, author = {Ming T. Liu}, title = {Network Interconnection and Protocol Conversion}, journal = {Adv. Comput.}, volume = {42}, pages = {119--239}, year = {1996}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Liu96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Motschnig-PitrikM96, author = {Renate Motschnig{-}Pitrik and Roland T. Mittermeir}, title = {Language Features for the Interconnection of Software Components}, journal = {Adv. Comput.}, volume = {43}, pages = {51--139}, year = {1996}, url = {https://doi.org/10.1016/S0065-2458(08)60642-7}, doi = {10.1016/S0065-2458(08)60642-7}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Motschnig-PitrikM96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/MusaE96, author = {John D. Musa and Willa K. Ehrlich}, title = {Advances in Software Reliability Engineering}, journal = {Adv. Comput.}, volume = {42}, pages = {77--117}, year = {1996}, url = {https://doi.org/10.1016/S0065-2458(08)60485-4}, doi = {10.1016/S0065-2458(08)60485-4}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/MusaE96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/PorterSV96, author = {Adam A. Porter and Harvey P. Siy and Lawrence G. Votta}, title = {A Review of Software Inspections}, journal = {Adv. Comput.}, volume = {42}, pages = {39--76}, year = {1996}, url = {https://doi.org/10.1016/S0065-2458(08)60484-2}, doi = {10.1016/S0065-2458(08)60484-2}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/PorterSV96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Venkataraman96, author = {S. T. Venkataraman}, title = {A Universal Model of Legged Locomotion Gaits}, journal = {Adv. Comput.}, volume = {42}, pages = {241--268}, year = {1996}, url = {https://doi.org/10.1016/S0065-2458(08)60487-8}, doi = {10.1016/S0065-2458(08)60487-8}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Venkataraman96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/AmaravadiGSN95, author = {Chandra S. Amaravadi and Joey F. George and Olivia R. Liu Sheng and Jay F. Nunamaker Jr.}, title = {The Adequacy of Office Models}, journal = {Adv. Comput.}, volume = {40}, pages = {181--253}, year = {1995}, url = {https://doi.org/10.1016/S0065-2458(08)60547-1}, doi = {10.1016/S0065-2458(08)60547-1}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/AmaravadiGSN95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Basili95, author = {Victor R. Basili}, title = {The Experience Factory and Its Relationship to Other Quality Approaches}, journal = {Adv. Comput.}, volume = {41}, pages = {65--82}, year = {1995}, url = {https://doi.org/10.1016/S0065-2458(08)60231-4}, doi = {10.1016/S0065-2458(08)60231-4}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Basili95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/CarneyB95, author = {David J. Carney and Alan W. Brown}, title = {On the Necessary Conditions for the Composition of Integrated Software Engineering Environments}, journal = {Adv. Comput.}, volume = {41}, pages = {157--189}, year = {1995}, url = {https://doi.org/10.1016/S0065-2458(08)60233-8}, doi = {10.1016/S0065-2458(08)60233-8}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/CarneyB95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/ConteH95, author = {Thomas M. Conte and Wen{-}mei W. Hwu}, title = {Advances in Benchmarking Techniques: New Standards and Quantitative Metrics}, journal = {Adv. Comput.}, volume = {41}, pages = {231--253}, year = {1995}, url = {https://doi.org/10.1016/S0065-2458(08)60235-1}, doi = {10.1016/S0065-2458(08)60235-1}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/ConteH95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Davis95, author = {Alan M. Davis}, title = {Software Prototyping}, journal = {Adv. Comput.}, volume = {40}, pages = {39--63}, year = {1995}, url = {https://doi.org/10.1016/S0065-2458(08)60544-6}, doi = {10.1016/S0065-2458(08)60544-6}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Davis95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/DollasB95, author = {Apostolos Dollas and J. D. Sterling Babcock}, title = {Rapid Prototyping of Microelectronic Systems}, journal = {Adv. Comput.}, volume = {40}, pages = {65--125}, year = {1995}, url = {https://doi.org/10.1016/S0065-2458(08)60545-8}, doi = {10.1016/S0065-2458(08)60545-8}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/DollasB95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Hamlet95, author = {Richard G. Hamlet}, title = {Software Quality, Software Process, and Software Testing}, journal = {Adv. Comput.}, volume = {41}, pages = {191--229}, year = {1995}, url = {https://doi.org/10.1016/S0065-2458(08)60234-X}, doi = {10.1016/S0065-2458(08)60234-X}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Hamlet95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/MayrhauserV95, author = {Anneliese von Mayrhauser and A. Marie Vans}, title = {Program Understanding: Models and Experiments}, journal = {Adv. Comput.}, volume = {40}, pages = {1--38}, year = {1995}, url = {https://doi.org/10.1016/S0065-2458(08)60543-4}, doi = {10.1016/S0065-2458(08)60543-4}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/MayrhauserV95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/PuLC95, author = {Calton Pu and Avraham Leff and Shu{-}Wie F. Chen}, title = {An Evolutionary Path for Transaction Processing Systems}, journal = {Adv. Comput.}, volume = {41}, pages = {255--296}, year = {1995}, url = {https://doi.org/10.1016/S0065-2458(08)60236-3}, doi = {10.1016/S0065-2458(08)60236-3}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/PuLC95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Rader95, author = {Jock A. Rader}, title = {{CASE} Adoption: {A} Process, Not an Event}, journal = {Adv. Comput.}, volume = {41}, pages = {83--156}, year = {1995}, url = {https://doi.org/10.1016/S0065-2458(08)60232-6}, doi = {10.1016/S0065-2458(08)60232-6}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Rader95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/RombachV95, author = {H. Dieter Rombach and Martin Verlage}, title = {Directions in Software Process Research}, journal = {Adv. Comput.}, volume = {41}, pages = {1--63}, year = {1995}, url = {https://doi.org/10.1016/S0065-2458(08)60230-2}, doi = {10.1016/S0065-2458(08)60230-2}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/RombachV95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/YousifTD95, author = {Mazin S. Yousif and Matthew Thazhuthaveetil and Chita R. Das}, title = {Cache Coherence in Multiprocessors: {A} Survey}, journal = {Adv. Comput.}, volume = {40}, pages = {127--179}, year = {1995}, url = {https://doi.org/10.1016/S0065-2458(08)60546-X}, doi = {10.1016/S0065-2458(08)60546-X}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/YousifTD95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Chandrasekaran94, author = {B. Chandrasekaran}, title = {Functional Representation and Causal Processes}, journal = {Adv. Comput.}, volume = {38}, pages = {73--143}, year = {1994}, url = {https://doi.org/10.1016/S0065-2458(08)60176-X}, doi = {10.1016/S0065-2458(08)60176-X}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Chandrasekaran94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/FortesWSG94, author = {Jos{\'{e}} A. B. Fortes and Benjamin W. Wah and Weijia Shang and Kumar N. Ganapathy}, title = {Algorithm-Specific Parallel Processing with Linear Processing Arrays}, journal = {Adv. Comput.}, volume = {38}, pages = {197--245}, year = {1994}, url = {https://doi.org/10.1016/S0065-2458(08)60178-3}, doi = {10.1016/S0065-2458(08)60178-3}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/FortesWSG94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Harrison94, author = {Warren Harrison}, title = {Software Measurement: {A} Decision-Process Approach}, journal = {Adv. Comput.}, volume = {39}, pages = {51--105}, year = {1994}, url = {https://doi.org/10.1016/S0065-2458(08)60378-2}, doi = {10.1016/S0065-2458(08)60378-2}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Harrison94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/KlingJ94, author = {Rob Kling and Tom Jewett}, title = {The Social Design of Worklife with Computers and Networks: {A} Natural Systems Perspective}, journal = {Adv. Comput.}, volume = {39}, pages = {239--293}, year = {1994}, url = {https://doi.org/10.1016/S0065-2458(08)60381-2}, doi = {10.1016/S0065-2458(08)60381-2}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/KlingJ94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Lo94, author = {Virginia Mary Lo}, title = {Operating Systems Enhancements for Distributed Shared Memory}, journal = {Adv. Comput.}, volume = {39}, pages = {191--237}, year = {1994}, url = {https://doi.org/10.1016/S0065-2458(08)60380-0}, doi = {10.1016/S0065-2458(08)60380-0}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Lo94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Long94, author = {John M. Long}, title = {Computer-Based Medical Systems}, journal = {Adv. Comput.}, volume = {38}, pages = {145--195}, year = {1994}, url = {https://doi.org/10.1016/S0065-2458(08)60177-1}, doi = {10.1016/S0065-2458(08)60177-1}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Long94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Mayrhauser94, author = {Anneliese von Mayrhauser}, title = {Maintenance and Evolution of Software Products}, journal = {Adv. Comput.}, volume = {39}, pages = {1--49}, year = {1994}, url = {https://doi.org/10.1016/S0065-2458(08)60377-0}, doi = {10.1016/S0065-2458(08)60377-0}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Mayrhauser94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Mowshowitz94, author = {Abbe Mowshowitz}, title = {Information as a Commodity: Assessment of Market Value}, journal = {Adv. Comput.}, volume = {38}, pages = {247--316}, year = {1994}, url = {https://doi.org/10.1016/S0065-2458(08)60179-5}, doi = {10.1016/S0065-2458(08)60179-5}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Mowshowitz94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Muck94, author = {Thomas A. M{\"{u}}ck}, title = {Active Databases: Concepts and Design Support}, journal = {Adv. Comput.}, volume = {39}, pages = {107--189}, year = {1994}, url = {https://doi.org/10.1016/S0065-2458(08)60379-4}, doi = {10.1016/S0065-2458(08)60379-4}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Muck94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Pernul94, author = {G{\"{u}}nther Pernul}, title = {Database Security}, journal = {Adv. Comput.}, volume = {38}, pages = {1--72}, year = {1994}, url = {https://doi.org/10.1016/S0065-2458(08)60175-8}, doi = {10.1016/S0065-2458(08)60175-8}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Pernul94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/DayB93, author = {Mary Carol Day and Susan J. Boyce}, title = {Human Factors in Human-Computer System Design}, journal = {Adv. Comput.}, volume = {36}, pages = {333--430}, year = {1993}, url = {https://doi.org/10.1016/S0065-2458(08)60274-0}, doi = {10.1016/S0065-2458(08)60274-0}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/DayB93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/DyerH93, author = {Stephen A. Dyer and Brian K. Harms}, title = {Digital Signal Processing}, journal = {Adv. Comput.}, volume = {37}, pages = {59--117}, year = {1993}, url = {https://doi.org/10.1016/S0065-2458(08)60403-9}, doi = {10.1016/S0065-2458(08)60403-9}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/DyerH93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Klir93, author = {George J. Klir}, title = {Developments in Uncertainty-Based Information}, journal = {Adv. Comput.}, volume = {36}, pages = {255--332}, year = {1993}, url = {https://doi.org/10.1016/S0065-2458(08)60273-9}, doi = {10.1016/S0065-2458(08)60273-9}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Klir93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/KothariO93, author = {Suresh C. Kothari and Heekuck Oh}, title = {Neural Networks for Pattern Recognition}, journal = {Adv. Comput.}, volume = {37}, pages = {119--166}, year = {1993}, url = {https://doi.org/10.1016/S0065-2458(08)60404-0}, doi = {10.1016/S0065-2458(08)60404-0}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/KothariO93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/LeeH93, author = {Ben Lee and Ali R. Hurson}, title = {Issues in Dataflow Computing}, journal = {Adv. Comput.}, volume = {37}, pages = {285--333}, year = {1993}, url = {https://doi.org/10.1016/S0065-2458(08)60407-6}, doi = {10.1016/S0065-2458(08)60407-6}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ac/LeeH93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Micheli93, author = {Giovanni De Micheli}, title = {High-Level Synthesis of Digital Circuits}, journal = {Adv. Comput.}, volume = {37}, pages = {207--283}, year = {1993}, url = {https://doi.org/10.1016/S0065-2458(08)60406-4}, doi = {10.1016/S0065-2458(08)60406-4}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Micheli93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Mills93, author = {Harlan D. Mills}, title = {Zero Defect Software: Cleanroom Engineering}, journal = {Adv. Comput.}, volume = {36}, pages = {1--41}, year = {1993}, url = {https://doi.org/10.1016/S0065-2458(08)60269-7}, doi = {10.1016/S0065-2458(08)60269-7}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Mills93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Nievergelt93, author = {J{\"{u}}rg Nievergelt}, title = {Experiments in Computational Heuristics and Their Lessons for Software and Knowledge Engineering}, journal = {Adv. Comput.}, volume = {37}, pages = {167--205}, year = {1993}, url = {https://doi.org/10.1016/S0065-2458(08)60405-2}, doi = {10.1016/S0065-2458(08)60405-2}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Nievergelt93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Olazaran93, author = {Mikel Olazaran}, title = {A Sociological History of the Neural Network Controversy}, journal = {Adv. Comput.}, volume = {37}, pages = {335--425}, year = {1993}, url = {https://doi.org/10.1016/S0065-2458(08)60408-8}, doi = {10.1016/S0065-2458(08)60408-8}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Olazaran93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/RichW93, author = {Charles Rich and Richard C. Waters}, title = {Approaches to Automatic Programming}, journal = {Adv. Comput.}, volume = {37}, pages = {1--57}, year = {1993}, url = {https://doi.org/10.1016/S0065-2458(08)60402-7}, doi = {10.1016/S0065-2458(08)60402-7}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/RichW93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Vemuri93, author = {V. Vemuri}, title = {Artificial Neural Networks in Control Applications}, journal = {Adv. Comput.}, volume = {36}, pages = {203--254}, year = {1993}, url = {https://doi.org/10.1016/S0065-2458(08)60272-7}, doi = {10.1016/S0065-2458(08)60272-7}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Vemuri93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/WittlichIH93, author = {Gary E. Wittlich and Eric J. Isaacson and Jeffrey E. Hass}, title = {Computer Applications in Music Composition and Research}, journal = {Adv. Comput.}, volume = {36}, pages = {111--202}, year = {1993}, url = {https://doi.org/10.1016/S0065-2458(08)60271-5}, doi = {10.1016/S0065-2458(08)60271-5}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/WittlichIH93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Zelkowitz93, author = {Marvin V. Zelkowitz}, title = {Role of Verification in the Software Specification Process}, journal = {Adv. Comput.}, volume = {36}, pages = {43--109}, year = {1993}, url = {https://doi.org/10.1016/S0065-2458(08)60270-3}, doi = {10.1016/S0065-2458(08)60270-3}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Zelkowitz93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Biggerstaff92, author = {Ted J. Biggerstaff}, title = {An Assessment and Analysis of Software Reuse}, journal = {Adv. Comput.}, volume = {34}, pages = {1--57}, year = {1992}, url = {https://doi.org/10.1016/S0065-2458(08)60323-X}, doi = {10.1016/S0065-2458(08)60323-X}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Biggerstaff92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/ChisvinD92, author = {Lawrence Chisvin and R. James Duckworth}, title = {Content-Addressable and Associative Memory}, journal = {Adv. Comput.}, volume = {34}, pages = {159--235}, year = {1992}, url = {https://doi.org/10.1016/S0065-2458(08)60326-5}, doi = {10.1016/S0065-2458(08)60326-5}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/ChisvinD92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/CrossCM92, author = {James H. Cross II and Elliot J. Chikofsky and Charles H. May Jr.}, title = {Reverse Engineering}, journal = {Adv. Comput.}, volume = {35}, pages = {199--254}, year = {1992}, url = {https://doi.org/10.1016/S0065-2458(08)60596-3}, doi = {10.1016/S0065-2458(08)60596-3}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/CrossCM92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Duncan92, author = {Ralph Duncan}, title = {Parallel Computer Architectures}, journal = {Adv. Comput.}, volume = {34}, pages = {113--157}, year = {1992}, url = {https://doi.org/10.1016/S0065-2458(08)60325-3}, doi = {10.1016/S0065-2458(08)60325-3}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Duncan92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/FleckensteinGHMMPRW92, author = {Charles J. Fleckenstein and Helen Gill and David Hemmendinger and Carolyn McCreary and John D. McGregor and Roy P. Pargas and Arthur M. Riehl and Virgil Wallentine}, title = {Multiprocessing}, journal = {Adv. Comput.}, volume = {35}, pages = {255--324}, year = {1992}, url = {https://doi.org/10.1016/S0065-2458(08)60597-5}, doi = {10.1016/S0065-2458(08)60597-5}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/FleckensteinGHMMPRW92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/GadagkarT92, author = {Hrishikesh P. Gadagkar and Mohan M. Trivedi}, title = {Computational Approaches for Tactile Information Processing and Analysis}, journal = {Adv. Comput.}, volume = {35}, pages = {81--134}, year = {1992}, url = {https://doi.org/10.1016/S0065-2458(08)60594-X}, doi = {10.1016/S0065-2458(08)60594-X}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/GadagkarT92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/GroskyM92, author = {William I. Grosky and Rajiv Mehrotra}, title = {Image Database Management}, journal = {Adv. Comput.}, volume = {34}, pages = {237--291}, year = {1992}, url = {https://doi.org/10.1016/S0065-2458(08)60327-7}, doi = {10.1016/S0065-2458(08)60327-7}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/GroskyM92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Hevner92, author = {Alan R. Hevner}, title = {Object-Oriented System Development Methods}, journal = {Adv. Comput.}, volume = {35}, pages = {135--198}, year = {1992}, url = {https://doi.org/10.1016/S0065-2458(08)60595-1}, doi = {10.1016/S0065-2458(08)60595-1}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Hevner92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/HirschheimK92, author = {Rudy Hirschheim and Heinz K. Klein}, title = {Paradigmatic Influences on Information Systems Development Methodologies: Evolution and Conceptual Advances}, journal = {Adv. Comput.}, volume = {34}, pages = {293--392}, year = {1992}, url = {https://doi.org/10.1016/S0065-2458(08)60328-9}, doi = {10.1016/S0065-2458(08)60328-9}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/HirschheimK92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/NandhakumarA92, author = {Nagaraj Nandhakumar and Jake K. Aggarwal}, title = {Multisensory Computer Vision}, journal = {Adv. Comput.}, volume = {34}, pages = {59--111}, year = {1992}, url = {https://doi.org/10.1016/S0065-2458(08)60324-1}, doi = {10.1016/S0065-2458(08)60324-1}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/NandhakumarA92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/NavatheP92, author = {Shamkant B. Navathe and G{\"{u}}nther Pernul}, title = {Conceptual and Logical Design of Relational Databases}, journal = {Adv. Comput.}, volume = {35}, pages = {1--80}, year = {1992}, url = {https://doi.org/10.1016/S0065-2458(08)60593-8}, doi = {10.1016/S0065-2458(08)60593-8}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/NavatheP92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/RocheGC92, author = {Edward M. Roche and Seymour E. Goodman and Hsinchun Chen}, title = {The Landscape of International Computing}, journal = {Adv. Comput.}, volume = {35}, pages = {325--371}, year = {1992}, url = {https://doi.org/10.1016/S0065-2458(08)60598-7}, doi = {10.1016/S0065-2458(08)60598-7}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/RocheGC92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/DeFantiB91, author = {Thomas A. DeFanti and Maxine D. Brown}, title = {Visualization in Scientific Computing}, journal = {Adv. Comput.}, volume = {33}, pages = {247--305}, year = {1991}, url = {https://doi.org/10.1016/S0065-2458(08)60168-0}, doi = {10.1016/S0065-2458(08)60168-0}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/DeFantiB91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/GulatiBI91, author = {Sandeep Gulati and Jacob Barhen and S. Sitharama Iyengar}, title = {Neurocomputing Formalisms for Computational Learning and Machine Intelligence}, journal = {Adv. Comput.}, volume = {33}, pages = {173--245}, year = {1991}, url = {https://doi.org/10.1016/S0065-2458(08)60167-9}, doi = {10.1016/S0065-2458(08)60167-9}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/GulatiBI91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/HursonB91, author = {Ali R. Hurson and M. W. Bright}, title = {Multidatabase Systems: An Advanced Concept in Handling Distributed Data}, journal = {Adv. Comput.}, volume = {32}, pages = {149--200}, year = {1991}, url = {https://doi.org/10.1016/S0065-2458(08)60247-8}, doi = {10.1016/S0065-2458(08)60247-8}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ac/HursonB91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Muroga91, author = {Saburo Muroga}, title = {Computer-Aided Logic Synthesis for {VLSI} Chips}, journal = {Adv. Comput.}, volume = {32}, pages = {1--103}, year = {1991}, url = {https://doi.org/10.1016/S0065-2458(08)60245-4}, doi = {10.1016/S0065-2458(08)60245-4}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Muroga91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Norman91, author = {Kent L. Norman}, title = {Models of the Mind and Machine: Information Flow and Control between Humans and Computers}, journal = {Adv. Comput.}, volume = {32}, pages = {201--254}, year = {1991}, url = {https://doi.org/10.1016/S0065-2458(08)60248-X}, doi = {10.1016/S0065-2458(08)60248-X}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Norman91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/PalanivelH91, author = {Thiagarajan Palanivel and Martin Helander}, title = {Human-Factors Issues in Dialog Design}, journal = {Adv. Comput.}, volume = {33}, pages = {115--171}, year = {1991}, url = {https://doi.org/10.1016/S0065-2458(08)60166-7}, doi = {10.1016/S0065-2458(08)60166-7}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/PalanivelH91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Saltman91, author = {Roy G. Saltman}, title = {Computerized Voting}, journal = {Adv. Comput.}, volume = {32}, pages = {255--305}, year = {1991}, url = {https://doi.org/10.1016/S0065-2458(08)60249-1}, doi = {10.1016/S0065-2458(08)60249-1}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Saltman91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/TrivediC91, author = {Mohan M. Trivedi and ChuXin Chen}, title = {Sensor-Driven Intelligent Robotics}, journal = {Adv. Comput.}, volume = {32}, pages = {105--148}, year = {1991}, url = {https://doi.org/10.1016/S0065-2458(08)60246-6}, doi = {10.1016/S0065-2458(08)60246-6}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/TrivediC91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/WeideOZ91, author = {Bruce W. Weide and William F. Ogden and Stuart H. Zweben}, title = {Reusable Software Components}, journal = {Adv. Comput.}, volume = {33}, pages = {1--65}, year = {1991}, url = {https://doi.org/10.1016/S0065-2458(08)60164-3}, doi = {10.1016/S0065-2458(08)60164-3}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/WeideOZ91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Zeigler91, author = {Bernard P. Zeigler}, title = {Object-Oriented Modeling and Discrete-Event Simulation}, journal = {Adv. Comput.}, volume = {33}, pages = {67--114}, year = {1991}, url = {https://doi.org/10.1016/S0065-2458(08)60165-5}, doi = {10.1016/S0065-2458(08)60165-5}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Zeigler91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Andriole90, author = {Stephen J. Andriole}, title = {Command and Control Information Systems Engineering: Progress and Prospects}, journal = {Adv. Comput.}, volume = {31}, pages = {1--98}, year = {1990}, url = {https://doi.org/10.1016/S0065-2458(08)60152-7}, doi = {10.1016/S0065-2458(08)60152-7}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Andriole90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Conrad90, author = {Michael Conrad}, title = {Molecular Computing}, journal = {Adv. Comput.}, volume = {31}, pages = {235--324}, year = {1990}, url = {https://doi.org/10.1016/S0065-2458(08)60155-2}, doi = {10.1016/S0065-2458(08)60155-2}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Conrad90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/DavidaD90, author = {George I. Davida and Yvo Desmedt}, title = {Cryptography Based Data Security}, journal = {Adv. Comput.}, volume = {30}, pages = {171--222}, year = {1990}, url = {https://doi.org/10.1016/S0065-2458(08)60300-9}, doi = {10.1016/S0065-2458(08)60300-9}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/DavidaD90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/DeMoriPC90, author = {Renato de Mori and Mathew J. Palakal and Piero Cosi}, title = {Perceptual Models for Automatic Speech Recognition Systems}, journal = {Adv. Comput.}, volume = {31}, pages = {99--173}, year = {1990}, url = {https://doi.org/10.1016/S0065-2458(08)60153-9}, doi = {10.1016/S0065-2458(08)60153-9}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/DeMoriPC90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Debons90, author = {Anthony Debons}, title = {Foundations of Information Science}, journal = {Adv. Comput.}, volume = {31}, pages = {325--378}, year = {1990}, url = {https://doi.org/10.1016/S0065-2458(08)60156-4}, doi = {10.1016/S0065-2458(08)60156-4}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Debons90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Gillenson90, author = {Mark Lee Gillenson}, title = {Database Design and Performance}, journal = {Adv. Comput.}, volume = {30}, pages = {39--83}, year = {1990}, url = {https://doi.org/10.1016/S0065-2458(08)60298-3}, doi = {10.1016/S0065-2458(08)60298-3}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Gillenson90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/HeimannMT90, author = {David I. Heimann and Nitin Mittal and Kishor S. Trivedi}, title = {Availability and Reliability Modeling for Computer Systems}, journal = {Adv. Comput.}, volume = {31}, pages = {175--233}, year = {1990}, url = {https://doi.org/10.1016/S0065-2458(08)60154-0}, doi = {10.1016/S0065-2458(08)60154-0}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/HeimannMT90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/HursonMPC90, author = {Ali R. Hurson and Les L. Miller and Simin H. Pakzad and Jia{-}bing R. Cheng}, title = {Specialized Parallel Architectures for Textual Databases}, journal = {Adv. Comput.}, volume = {30}, pages = {1--37}, year = {1990}, url = {https://doi.org/10.1016/S0065-2458(08)60297-1}, doi = {10.1016/S0065-2458(08)60297-1}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ac/HursonMPC90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/IanninoM90, author = {Anthony Iannino and John D. Musa}, title = {Software Reliability}, journal = {Adv. Comput.}, volume = {30}, pages = {85--170}, year = {1990}, url = {https://doi.org/10.1016/S0065-2458(08)60299-5}, doi = {10.1016/S0065-2458(08)60299-5}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/IanninoM90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/JudyC90, author = {Richard W. Judy and Robert W. Clough}, title = {Soviet Computing in the 1980s: {A} Survey of the Software and Its Applications}, journal = {Adv. Comput.}, volume = {30}, pages = {223--306}, year = {1990}, url = {https://doi.org/10.1016/S0065-2458(08)60301-0}, doi = {10.1016/S0065-2458(08)60301-0}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/JudyC90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Carroll89, author = {John M. Carroll}, title = {Evaluation, Description and Invention: Paradigms for Human-Computer Interaction}, journal = {Adv. Comput.}, volume = {29}, pages = {47--77}, year = {1989}, url = {https://doi.org/10.1016/S0065-2458(08)60532-X}, doi = {10.1016/S0065-2458(08)60532-X}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Carroll89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Dasgupta89, author = {Subrata Dasgupta}, title = {The Structure of Design Processes}, journal = {Adv. Comput.}, volume = {28}, pages = {1--67}, year = {1989}, url = {https://doi.org/10.1016/S0065-2458(08)60045-5}, doi = {10.1016/S0065-2458(08)60045-5}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Dasgupta89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/HursonMPES89, author = {Ali R. Hurson and Les L. Miller and Simin H. Pakzad and Margaret H. Eich and Behrooz A. Shirazi}, title = {Parallel Architectures for Database Systems}, journal = {Adv. Comput.}, volume = {28}, pages = {107--151}, year = {1989}, url = {https://doi.org/10.1016/S0065-2458(08)60047-9}, doi = {10.1016/S0065-2458(08)60047-9}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ac/HursonMPES89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/JudyC89, author = {Richard W. Judy and Robert W. Clough}, title = {Soviet Computers in the 1980s: {A} Review of the Hardware}, journal = {Adv. Comput.}, volume = {29}, pages = {251--330}, year = {1989}, url = {https://doi.org/10.1016/S0065-2458(08)60535-5}, doi = {10.1016/S0065-2458(08)60535-5}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/JudyC89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/KandelS89, author = {Abraham Kandel and Mordechay Schneider}, title = {Fuzzy Sets and Their Applications to Artificial Intelligence}, journal = {Adv. Comput.}, volume = {28}, pages = {69--105}, year = {1989}, url = {https://doi.org/10.1016/S0065-2458(08)60046-7}, doi = {10.1016/S0065-2458(08)60046-7}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/KandelS89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Kochen89, author = {Manfred Kochen}, title = {Management Intelligence Systems}, journal = {Adv. Comput.}, volume = {28}, pages = {227--278}, year = {1989}, url = {https://doi.org/10.1016/S0065-2458(08)60049-2}, doi = {10.1016/S0065-2458(08)60049-2}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Kochen89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Liu89, author = {Ming T. Liu}, title = {Protocol Engineering}, journal = {Adv. Comput.}, volume = {29}, pages = {79--195}, year = {1989}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Liu89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Millen89, author = {Jonathan K. Millen}, title = {Models of Multilevel Computer Security}, journal = {Adv. Comput.}, volume = {29}, pages = {1--45}, year = {1989}, url = {https://doi.org/10.1016/S0065-2458(08)60531-8}, doi = {10.1016/S0065-2458(08)60531-8}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Millen89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/MirsalehiAC89, author = {Mir Mojtaba Mirsalehi and Mustafa A. G. Abushagur and H. John Caulfield}, title = {Optical and Optoelectronic Computing}, journal = {Adv. Comput.}, volume = {28}, pages = {153--226}, year = {1989}, url = {https://doi.org/10.1016/S0065-2458(08)60048-0}, doi = {10.1016/S0065-2458(08)60048-0}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/MirsalehiAC89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Newborn89, author = {Monroe M. Newborn}, title = {Computer Chess: Ten Years of Significant Progress}, journal = {Adv. Comput.}, volume = {29}, pages = {197--250}, year = {1989}, url = {https://doi.org/10.1016/S0065-2458(08)60534-3}, doi = {10.1016/S0065-2458(08)60534-3}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Newborn89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Draper88, author = {James Stark Draper}, title = {Military Information Processing}, journal = {Adv. Comput.}, volume = {27}, pages = {1--67}, year = {1988}, url = {https://doi.org/10.1016/S0065-2458(08)60256-9}, doi = {10.1016/S0065-2458(08)60256-9}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Draper88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/HevnerR88, author = {Alan R. Hevner and Aruna Rao}, title = {Distributed Data Allocation Strategies}, journal = {Adv. Comput.}, volume = {27}, pages = {121--155}, year = {1988}, url = {https://doi.org/10.1016/S0065-2458(08)60258-2}, doi = {10.1016/S0065-2458(08)60258-2}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/HevnerR88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/IyengarKVR88, author = {S. Sitharama Iyengar and Rangasami L. Kashyap and Vijay K. Vaishnavi and Nageswara S. V. Rao}, title = {Multidimensional Data Structures: Review and Outlook}, journal = {Adv. Comput.}, volume = {27}, pages = {69--119}, year = {1988}, url = {https://doi.org/10.1016/S0065-2458(08)60257-0}, doi = {10.1016/S0065-2458(08)60257-0}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/IyengarKVR88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Lubeck88, author = {Olaf M. Lubeck}, title = {Supercomputer Performance: The Theory, Practice, and Results}, journal = {Adv. Comput.}, volume = {27}, pages = {309--362}, year = {1988}, url = {https://doi.org/10.1016/S0065-2458(08)60262-4}, doi = {10.1016/S0065-2458(08)60262-4}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Lubeck88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Maier88, author = {John H. Maier}, title = {Computer Science and Information Technology in the People's Republic of China: The Emergence of Connectivity}, journal = {Adv. Comput.}, volume = {27}, pages = {363--458}, year = {1988}, url = {https://doi.org/10.1016/S0065-2458(08)60263-6}, doi = {10.1016/S0065-2458(08)60263-6}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Maier88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Miller88, author = {Stephen W. Miller}, title = {A Reference Model for Mass Storage Systems}, journal = {Adv. Comput.}, volume = {27}, pages = {157--210}, year = {1988}, url = {https://doi.org/10.1016/S0065-2458(08)60259-4}, doi = {10.1016/S0065-2458(08)60259-4}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Miller88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/OKane88, author = {Kevin C. O'Kane}, title = {Computers in the Health Sciences}, journal = {Adv. Comput.}, volume = {27}, pages = {211--263}, year = {1988}, url = {https://doi.org/10.1016/S0065-2458(08)60260-0}, doi = {10.1016/S0065-2458(08)60260-0}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/OKane88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Rosenfeld88, author = {Azriel Rosenfeld}, title = {Computer Vision}, journal = {Adv. Comput.}, volume = {27}, pages = {265--308}, year = {1988}, url = {https://doi.org/10.1016/S0065-2458(08)60261-2}, doi = {10.1016/S0065-2458(08)60261-2}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Rosenfeld88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Dutta87, author = {Amitava Dutta}, title = {The Explicit Support of Human Reasoning in Decision Support Systems}, journal = {Adv. Comput.}, volume = {26}, pages = {1--45}, year = {1987}, url = {https://doi.org/10.1016/S0065-2458(08)60004-2}, doi = {10.1016/S0065-2458(08)60004-2}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Dutta87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Kothari87, author = {Suresh C. Kothari}, title = {Multistage Interconnection Networks for Multiprocessor Systems}, journal = {Adv. Comput.}, volume = {26}, pages = {155--199}, year = {1987}, url = {https://doi.org/10.1016/S0065-2458(08)60007-8}, doi = {10.1016/S0065-2458(08)60007-8}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Kothari87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/MoitraI87, author = {Abha Moitra and S. Sitharama Iyengar}, title = {Parallel Algorithms for Some Computational Problems}, journal = {Adv. Comput.}, volume = {26}, pages = {93--153}, year = {1987}, url = {https://doi.org/10.1016/S0065-2458(08)60006-6}, doi = {10.1016/S0065-2458(08)60006-6}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/MoitraI87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/PoppelbaumDGO87, author = {W. J. Poppelbaum and Apostolos Dollas and J. B. Glickman and C. O'Toole}, title = {Unary Processing}, journal = {Adv. Comput.}, volume = {26}, pages = {47--92}, year = {1987}, url = {https://doi.org/10.1016/S0065-2458(08)60005-4}, doi = {10.1016/S0065-2458(08)60005-4}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/PoppelbaumDGO87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/RamamoorthyPGYB87, author = {C. V. Ramamoorthy and Atul Prakash and Vijay K. Garg and Tsuneo Yamaura and Anupam Bhide}, title = {Issues in the Development of Large, Distributed, and Reliable Software}, journal = {Adv. Comput.}, volume = {26}, pages = {393--443}, year = {1987}, url = {https://doi.org/10.1016/S0065-2458(08)60011-X}, doi = {10.1016/S0065-2458(08)60011-X}, timestamp = {Wed, 12 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/RamamoorthyPGYB87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Reghbati87, author = {Hassan K. Reghbati}, title = {Techniques and Issues in Testing and Validation of {VLSI} Systems}, journal = {Adv. Comput.}, volume = {26}, pages = {281--334}, year = {1987}, url = {https://doi.org/10.1016/S0065-2458(08)60009-1}, doi = {10.1016/S0065-2458(08)60009-1}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Reghbati87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Toy87, author = {Wing N. Toy}, title = {Fault-Tolerant Computing}, journal = {Adv. Comput.}, volume = {26}, pages = {201--279}, year = {1987}, url = {https://doi.org/10.1016/S0065-2458(08)60008-X}, doi = {10.1016/S0065-2458(08)60008-X}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Toy87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/White87, author = {Lee J. White}, title = {Software Testing and Verification}, journal = {Adv. Comput.}, volume = {26}, pages = {335--391}, year = {1987}, url = {https://doi.org/10.1016/S0065-2458(08)60010-8}, doi = {10.1016/S0065-2458(08)60010-8}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/White87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/CerconeM86, author = {Nick Cercone and Gordon I. McCalla}, title = {Accessing Knowledge through Natural Language}, journal = {Adv. Comput.}, volume = {25}, pages = {1--99}, year = {1986}, url = {https://doi.org/10.1016/S0065-2458(08)60473-8}, doi = {10.1016/S0065-2458(08)60473-8}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/CerconeM86.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/DemurjianHS86, author = {Steven A. Demurjian and David K. Hsiao and Paula R. Strawser}, title = {Design Analysis and Performance Evaluation Methodologies for Database Computers}, journal = {Adv. Comput.}, volume = {25}, pages = {101--214}, year = {1986}, url = {https://doi.org/10.1016/S0065-2458(08)60474-X}, doi = {10.1016/S0065-2458(08)60474-X}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/DemurjianHS86.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/LeePS86, author = {Insup Lee and Noah S. Prywes and Boleslaw K. Szymanski}, title = {Partitioning of Massive/Real-Time Programs for Parallel Processing}, journal = {Adv. Comput.}, volume = {25}, pages = {215--275}, year = {1986}, url = {https://doi.org/10.1016/S0065-2458(08)60475-1}, doi = {10.1016/S0065-2458(08)60475-1}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ac/LeePS86.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Metcalf86, author = {Michael Metcalf}, title = {Computers in High-Energy Physics}, journal = {Adv. Comput.}, volume = {25}, pages = {277--334}, year = {1986}, url = {https://doi.org/10.1016/S0065-2458(08)60476-3}, doi = {10.1016/S0065-2458(08)60476-3}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Metcalf86.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Mowshowitz86, author = {Abbe Mowshowitz}, title = {Social Dimensions of Office Automation}, journal = {Adv. Comput.}, volume = {25}, pages = {335--404}, year = {1986}, url = {https://doi.org/10.1016/S0065-2458(08)60477-5}, doi = {10.1016/S0065-2458(08)60477-5}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Mowshowitz86.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Atchison85, author = {William F. Atchison}, title = {The Development of Computer Science Education}, journal = {Adv. Comput.}, volume = {24}, pages = {319--377}, year = {1985}, url = {https://doi.org/10.1016/S0065-2458(08)60370-8}, doi = {10.1016/S0065-2458(08)60370-8}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Atchison85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Banerji85, author = {Ranan B. Banerji}, title = {The Logic of Learning: {A} Basis for Pattern Recognition and for Improvement of Performance}, journal = {Adv. Comput.}, volume = {24}, pages = {177--216}, year = {1985}, url = {https://doi.org/10.1016/S0065-2458(08)60367-8}, doi = {10.1016/S0065-2458(08)60367-8}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Banerji85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/ConteDS85, author = {Samuel D. Conte and Hubert E. Dunsmore and Vincent Y. Shen}, title = {Software Effort Estimation and Productivity}, journal = {Adv. Comput.}, volume = {24}, pages = {1--60}, year = {1985}, url = {https://doi.org/10.1016/S0065-2458(08)60364-2}, doi = {10.1016/S0065-2458(08)60364-2}, timestamp = {Wed, 11 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/ConteDS85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/DasguptaS85, author = {Subrata Dasgupta and Bruce D. Shriver}, title = {Developments in Firmware Engineering}, journal = {Adv. Comput.}, volume = {24}, pages = {101--176}, year = {1985}, url = {https://doi.org/10.1016/S0065-2458(08)60366-6}, doi = {10.1016/S0065-2458(08)60366-6}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/DasguptaS85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Garvin85, author = {Paul L. Garvin}, title = {The Current State of Language Data Processing}, journal = {Adv. Comput.}, volume = {24}, pages = {217--275}, year = {1985}, url = {https://doi.org/10.1016/S0065-2458(08)60368-X}, doi = {10.1016/S0065-2458(08)60368-X}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Garvin85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Harrison85, author = {Michael A. Harrison}, title = {Theoretical Issues Concerning Protection in Operating Systems}, journal = {Adv. Comput.}, volume = {24}, pages = {61--100}, year = {1985}, url = {https://doi.org/10.1016/S0065-2458(08)60365-4}, doi = {10.1016/S0065-2458(08)60365-4}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Harrison85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Kraft85, author = {Donald H. Kraft}, title = {Advances in Information Retrieval: Where Is That /{\#}*{\&}@{\textcent} Record?}, journal = {Adv. Comput.}, volume = {24}, pages = {277--318}, year = {1985}, url = {https://doi.org/10.1016/S0065-2458(08)60369-1}, doi = {10.1016/S0065-2458(08)60369-1}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Kraft85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/BonczekHW84, author = {Robert H. Bonczek and Clyde W. Holsapple and Andrew B. Whinston}, title = {Developments in Decision Support Systems}, journal = {Adv. Comput.}, volume = {23}, pages = {141--175}, year = {1984}, url = {https://doi.org/10.1016/S0065-2458(08)60464-7}, doi = {10.1016/S0065-2458(08)60464-7}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/BonczekHW84.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/DeFanti84, author = {Thomas A. DeFanti}, title = {The Mass Impact of Videogame Technology}, journal = {Adv. Comput.}, volume = {23}, pages = {93--140}, year = {1984}, url = {https://doi.org/10.1016/S0065-2458(08)60463-5}, doi = {10.1016/S0065-2458(08)60463-5}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/DeFanti84.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/DoratoP84, author = {Peter Dorato and Daniel Petersen}, title = {Digital Control Systems}, journal = {Adv. Comput.}, volume = {23}, pages = {177--252}, year = {1984}, url = {https://doi.org/10.1016/S0065-2458(08)60465-9}, doi = {10.1016/S0065-2458(08)60465-9}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/DoratoP84.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Gupta84, author = {G. K. Gupta}, title = {International Developments in Information Privacy}, journal = {Adv. Comput.}, volume = {23}, pages = {253--294}, year = {1984}, url = {https://doi.org/10.1016/S0065-2458(08)60466-0}, doi = {10.1016/S0065-2458(08)60466-0}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Gupta84.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/LakshmivarahanDM84, author = {S. Lakshmivarahan and Sudarshan K. Dhall and Leslie L. Miller}, title = {Parallel Sorting Algorithms}, journal = {Adv. Comput.}, volume = {23}, pages = {295--354}, year = {1984}, url = {https://doi.org/10.1016/S0065-2458(08)60467-2}, doi = {10.1016/S0065-2458(08)60467-2}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/LakshmivarahanDM84.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Snyder84, author = {Lawrence Snyder}, title = {Supercomputers and {VLSI:} The Effect of Large-Scale Integration on Computer Architecture}, journal = {Adv. Comput.}, volume = {23}, pages = {1--33}, year = {1984}, url = {https://doi.org/10.1016/S0065-2458(08)60461-1}, doi = {10.1016/S0065-2458(08)60461-1}, timestamp = {Mon, 29 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Snyder84.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/TraubW84, author = {Joseph F. Traub and Henryk Wozniakowski}, title = {Information and Computation}, journal = {Adv. Comput.}, volume = {23}, pages = {35--92}, year = {1984}, url = {https://doi.org/10.1016/S0065-2458(08)60462-3}, doi = {10.1016/S0065-2458(08)60462-3}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/TraubW84.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/BerztissT83, author = {Alfs T. Berztiss and Satish Thatte}, title = {Specification and Implementation of Abstract Data Types}, journal = {Adv. Comput.}, volume = {22}, pages = {295--353}, year = {1983}, url = {https://doi.org/10.1016/S0065-2458(08)60131-X}, doi = {10.1016/S0065-2458(08)60131-X}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/BerztissT83.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/BuchananD83, author = {Bruce G. Buchanan and Richard O. Duda}, title = {Principles of Rule-Based Expert Systems}, journal = {Adv. Comput.}, volume = {22}, pages = {163--216}, year = {1983}, url = {https://doi.org/10.1016/S0065-2458(08)60129-1}, doi = {10.1016/S0065-2458(08)60129-1}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/BuchananD83.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/ChandrasekaranM83, author = {B. Chandrasekaran and Sanjay Mittal}, title = {Conceptual Representation of Medical Knowledge for Diagnosis by Computer: {MDX} and Related Systems}, journal = {Adv. Comput.}, volume = {22}, pages = {217--293}, year = {1983}, url = {https://doi.org/10.1016/S0065-2458(08)60130-8}, doi = {10.1016/S0065-2458(08)60130-8}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/ChandrasekaranM83.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Gemignani83, author = {Michael C. Gemignani}, title = {Legal Protection of Software: {A} Survey}, journal = {Adv. Comput.}, volume = {22}, pages = {1--44}, year = {1983}, url = {https://doi.org/10.1016/S0065-2458(08)60126-6}, doi = {10.1016/S0065-2458(08)60126-6}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Gemignani83.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Lakshmivarahan83, author = {S. Lakshmivarahan}, title = {Algorithms for Public Key Cryptosystems: Theory and Application}, journal = {Adv. Comput.}, volume = {22}, pages = {45--108}, year = {1983}, url = {https://doi.org/10.1016/S0065-2458(08)60127-8}, doi = {10.1016/S0065-2458(08)60127-8}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Lakshmivarahan83.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Wasserman83, author = {Anthony I. Wasserman}, title = {Software Engineering Environments}, journal = {Adv. Comput.}, volume = {22}, pages = {109--161}, year = {1983}, url = {https://doi.org/10.1016/S0065-2458(08)60128-X}, doi = {10.1016/S0065-2458(08)60128-X}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Wasserman83.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Dasgupta82, author = {Subrata Dasgupta}, title = {Computer Design and Description Languages}, journal = {Adv. Comput.}, volume = {21}, pages = {91--154}, year = {1982}, url = {https://doi.org/10.1016/S0065-2458(08)60568-9}, doi = {10.1016/S0065-2458(08)60568-9}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Dasgupta82.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Gammill82, author = {Robert C. Gammill}, title = {Microcomputers: Applications, Problems, and Promise}, journal = {Adv. Comput.}, volume = {21}, pages = {155--224}, year = {1982}, url = {https://doi.org/10.1016/S0065-2458(08)60569-0}, doi = {10.1016/S0065-2458(08)60569-0}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Gammill82.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/KlingS82, author = {Rob Kling and Walt Scacchi}, title = {The Web of Computing: Computer Technology as Social Organization}, journal = {Adv. Comput.}, volume = {21}, pages = {1--90}, year = {1982}, url = {https://doi.org/10.1016/S0065-2458(08)60567-7}, doi = {10.1016/S0065-2458(08)60567-7}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/KlingS82.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Lykos82, author = {Peter Lykos}, title = {Computers in the World of Chemistry}, journal = {Adv. Comput.}, volume = {21}, pages = {275--331}, year = {1982}, url = {https://doi.org/10.1016/S0065-2458(08)60571-9}, doi = {10.1016/S0065-2458(08)60571-9}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Lykos82.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Rush82, author = {James E. Rush}, title = {Library Automation Systems and Networks}, journal = {Adv. Comput.}, volume = {21}, pages = {333--422}, year = {1982}, url = {https://doi.org/10.1016/S0065-2458(08)60572-0}, doi = {10.1016/S0065-2458(08)60572-0}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Rush82.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/SaccoY82, author = {Giovanni Maria Sacco and S. Bing Yao}, title = {Query Optimization in Distributed Data Base Systems}, journal = {Adv. Comput.}, volume = {21}, pages = {225--273}, year = {1982}, url = {https://doi.org/10.1016/S0065-2458(08)60570-7}, doi = {10.1016/S0065-2458(08)60570-7}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/SaccoY82.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Dickson81, author = {Gary W. Dickson}, title = {Management Information Systems: Evolution and Status}, journal = {Adv. Comput.}, volume = {20}, pages = {1--37}, year = {1981}, url = {https://doi.org/10.1016/S0065-2458(08)60494-5}, doi = {10.1016/S0065-2458(08)60494-5}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Dickson81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/FrantaJKM81, author = {William R. Franta and E. Douglas Jensen and Richard Y. Kain and George D. Marshall}, title = {Real-Time Distributed Computer Systems}, journal = {Adv. Comput.}, volume = {20}, pages = {39--82}, year = {1981}, url = {https://doi.org/10.1016/S0065-2458(08)60495-7}, doi = {10.1016/S0065-2458(08)60495-7}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/FrantaJKM81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/HwangSN81, author = {Kai Hwang and Shun{-}Piao Su and Lionel M. Ni}, title = {Vector Computer Architecture and Processing Techniques}, journal = {Adv. Comput.}, volume = {20}, pages = {115--197}, year = {1981}, url = {https://doi.org/10.1016/S0065-2458(08)60497-0}, doi = {10.1016/S0065-2458(08)60497-0}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/HwangSN81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Sammet81, author = {Jean E. Sammet}, title = {An Overview of High-Level Languages}, journal = {Adv. Comput.}, volume = {20}, pages = {199--259}, year = {1981}, url = {https://doi.org/10.1016/S0065-2458(08)60498-2}, doi = {10.1016/S0065-2458(08)60498-2}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Sammet81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Thurber81, author = {Kenneth J. Thurber}, title = {Architecture and Strategies for Local Networks: Examples and Important Systems}, journal = {Adv. Comput.}, volume = {20}, pages = {83--114}, year = {1981}, url = {https://doi.org/10.1016/S0065-2458(08)60496-9}, doi = {10.1016/S0065-2458(08)60496-9}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Thurber81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/DubesJ80, author = {Richard C. Dubes and Anil K. Jain}, title = {Clustering Methodologies in Exploratory Data Analysis}, journal = {Adv. Comput.}, volume = {19}, pages = {113--228}, year = {1980}, url = {https://doi.org/10.1016/S0065-2458(08)60034-0}, doi = {10.1016/S0065-2458(08)60034-0}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/DubesJ80.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Gear80, author = {C. William Gear}, title = {Numerical Software: Science or Alchemy?}, journal = {Adv. Comput.}, volume = {19}, pages = {229--248}, year = {1980}, url = {https://doi.org/10.1016/S0065-2458(08)60035-2}, doi = {10.1016/S0065-2458(08)60035-2}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Gear80.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Hsiao80, author = {David K. Hsiao}, title = {Data Base Computers}, journal = {Adv. Comput.}, volume = {19}, pages = {1--64}, year = {1980}, url = {https://doi.org/10.1016/S0065-2458(08)60032-7}, doi = {10.1016/S0065-2458(08)60032-7}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Hsiao80.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/KlingS80, author = {Rob Kling and Walt Scacchi}, title = {Computing as Social Action: The Social Dynamics of Computing in Complex Organizations}, journal = {Adv. Comput.}, volume = {19}, pages = {249--327}, year = {1980}, url = {https://doi.org/10.1016/S0065-2458(08)60036-4}, doi = {10.1016/S0065-2458(08)60036-4}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/KlingS80.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Kung80, author = {H. T. Kung}, title = {The Structure of Parallel Algorithms}, journal = {Adv. Comput.}, volume = {19}, pages = {65--112}, year = {1980}, url = {https://doi.org/10.1016/S0065-2458(08)60033-9}, doi = {10.1016/S0065-2458(08)60033-9}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Kung80.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Goodman79, author = {Seymour E. Goodman}, title = {Software in the Soviet Union: Progress and Problems}, journal = {Adv. Comput.}, volume = {18}, pages = {231--287}, year = {1979}, url = {https://doi.org/10.1016/S0065-2458(08)60585-9}, doi = {10.1016/S0065-2458(08)60585-9}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Goodman79.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Halstead79, author = {Maurice H. Halstead}, title = {Advances in Software Science}, journal = {Adv. Comput.}, volume = {18}, pages = {119--172}, year = {1979}, url = {https://doi.org/10.1016/S0065-2458(08)60583-5}, doi = {10.1016/S0065-2458(08)60583-5}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Halstead79.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Newborn79, author = {Monroe M. Newborn}, title = {Recent Progress in Computer Chess}, journal = {Adv. Comput.}, volume = {18}, pages = {59--117}, year = {1979}, url = {https://doi.org/10.1016/S0065-2458(08)60582-3}, doi = {10.1016/S0065-2458(08)60582-3}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Newborn79.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Rosenfeld79, author = {Azriel Rosenfeld}, title = {Image Processing and Recognition}, journal = {Adv. Comput.}, volume = {18}, pages = {1--57}, year = {1979}, url = {https://doi.org/10.1016/S0065-2458(08)60581-1}, doi = {10.1016/S0065-2458(08)60581-1}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Rosenfeld79.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Suppes79, author = {Patrick Suppes}, title = {Current Trends in Computer-Assisted Instruction}, journal = {Adv. Comput.}, volume = {18}, pages = {173--229}, year = {1979}, url = {https://doi.org/10.1016/S0065-2458(08)60584-7}, doi = {10.1016/S0065-2458(08)60584-7}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Suppes79.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/ChenC78, author = {Tien Chi Chen and Hsu Chang}, title = {Magnetic Bubble Memory and Logic}, journal = {Adv. Comput.}, volume = {17}, pages = {223--282}, year = {1978}, url = {https://doi.org/10.1016/S0065-2458(08)60393-9}, doi = {10.1016/S0065-2458(08)60393-9}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/ChenC78.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Liu78, author = {Ming T. Liu}, title = {Distributed Loop Computer Networks}, journal = {Adv. Comput.}, volume = {17}, pages = {163--221}, year = {1978}, url = {https://doi.org/10.1016/S0065-2458(08)60392-7}, doi = {10.1016/S0065-2458(08)60392-7}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Liu78.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Sager78, author = {Naomi Sager}, title = {Natural Language Information Formatting: The Automatic Conversion of Texts to a Structured Data Base}, journal = {Adv. Comput.}, volume = {17}, pages = {89--162}, year = {1978}, url = {https://doi.org/10.1016/S0065-2458(08)60391-5}, doi = {10.1016/S0065-2458(08)60391-5}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Sager78.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Westin78, author = {Alan F. Westin}, title = {Computers and the Public's Right of Access to Government Information}, journal = {Adv. Comput.}, volume = {17}, pages = {283--316}, year = {1978}, url = {https://doi.org/10.1016/S0065-2458(08)60394-0}, doi = {10.1016/S0065-2458(08)60394-0}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Westin78.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Woods78, author = {William A. Woods}, title = {Semantics and Quantification in Natural Language Question Answering}, journal = {Adv. Comput.}, volume = {17}, pages = {1--87}, year = {1978}, url = {https://doi.org/10.1016/S0065-2458(08)60390-3}, doi = {10.1016/S0065-2458(08)60390-3}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Woods78.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Csuri77, author = {Charles A. Csuri}, title = {3-D Computer Animation}, journal = {Adv. Comput.}, volume = {16}, pages = {1--55}, year = {1977}, url = {https://doi.org/10.1016/S0065-2458(08)60114-X}, doi = {10.1016/S0065-2458(08)60114-X}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Csuri77.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Mamrak77, author = {Sandra A. Mamrak}, title = {The Design and Development of Resource-Sharing Services in Computer Communications Networks: {A} Survey}, journal = {Adv. Comput.}, volume = {16}, pages = {183--219}, year = {1977}, url = {https://doi.org/10.1016/S0065-2458(08)60117-5}, doi = {10.1016/S0065-2458(08)60117-5}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Mamrak77.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/OKaneH77, author = {Kevin C. O'Kane and Edward A. Haluska}, title = {Perspectives in Clinical Computing}, journal = {Adv. Comput.}, volume = {16}, pages = {127--182}, year = {1977}, url = {https://doi.org/10.1016/S0065-2458(08)60116-3}, doi = {10.1016/S0065-2458(08)60116-3}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/OKaneH77.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Prywes77, author = {Noah S. Prywes}, title = {Automatic Generation of Computer Programs}, journal = {Adv. Comput.}, volume = {16}, pages = {57--125}, year = {1977}, url = {https://doi.org/10.1016/S0065-2458(08)60115-1}, doi = {10.1016/S0065-2458(08)60115-1}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Prywes77.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Turn77, author = {Rein Turn}, title = {Privacy Protection in Information Systems}, journal = {Adv. Comput.}, volume = {16}, pages = {221--335}, year = {1977}, url = {https://doi.org/10.1016/S0065-2458(08)60118-7}, doi = {10.1016/S0065-2458(08)60118-7}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Turn77.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Biermann76, author = {Alan W. Biermann}, title = {Approaches to Automatic Programming}, journal = {Adv. Comput.}, volume = {15}, pages = {1--63}, year = {1976}, url = {https://doi.org/10.1016/S0065-2458(08)60519-7}, doi = {10.1016/S0065-2458(08)60519-7}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Biermann76.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Bitzer76, author = {Donald Bitzer}, title = {The Wide World of Computer-Based Education}, journal = {Adv. Comput.}, volume = {15}, pages = {239--283}, year = {1976}, url = {https://doi.org/10.1016/S0065-2458(08)60523-9}, doi = {10.1016/S0065-2458(08)60523-9}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Bitzer76.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/CheathamT76, author = {Thomas E. Cheatham Jr. and Judy A. Townley}, title = {A Look at Programming and Programming Systems}, journal = {Adv. Comput.}, volume = {14}, pages = {45--76}, year = {1976}, url = {https://doi.org/10.1016/S0065-2458(08)60450-7}, doi = {10.1016/S0065-2458(08)60450-7}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/CheathamT76.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/GrahamH76, author = {Susan L. Graham and Michael A. Harrison}, title = {Parsing of General Context-Free Languages}, journal = {Adv. Comput.}, volume = {14}, pages = {77--185}, year = {1976}, url = {https://doi.org/10.1016/S0065-2458(08)60451-9}, doi = {10.1016/S0065-2458(08)60451-9}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/GrahamH76.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/HartmanisS76, author = {Juris Hartmanis and Janos Simon}, title = {On the Structure of Feasible Computations}, journal = {Adv. Comput.}, volume = {14}, pages = {1--43}, year = {1976}, url = {https://doi.org/10.1016/S0065-2458(08)60449-0}, doi = {10.1016/S0065-2458(08)60449-0}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/HartmanisS76.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/HsiaoB76, author = {David K. Hsiao and Richard I. Baum}, title = {Information Secure Systems}, journal = {Adv. Comput.}, volume = {14}, pages = {231--272}, year = {1976}, url = {https://doi.org/10.1016/S0065-2458(08)60453-2}, doi = {10.1016/S0065-2458(08)60453-2}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/HsiaoB76.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Kuck76, author = {David J. Kuck}, title = {Parallel Processing of Ordinary Programs}, journal = {Adv. Comput.}, volume = {15}, pages = {119--179}, year = {1976}, url = {https://doi.org/10.1016/S0065-2458(08)60521-5}, doi = {10.1016/S0065-2458(08)60521-5}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Kuck76.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Poppelbaum76, author = {W. J. Poppelbaum}, title = {Statistical Processors}, journal = {Adv. Comput.}, volume = {14}, pages = {187--230}, year = {1976}, url = {https://doi.org/10.1016/S0065-2458(08)60452-0}, doi = {10.1016/S0065-2458(08)60452-0}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Poppelbaum76.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Reeker76, author = {Larry H. Reeker}, title = {The Computational Study of Language Acquisition}, journal = {Adv. Comput.}, volume = {15}, pages = {181--237}, year = {1976}, url = {https://doi.org/10.1016/S0065-2458(08)60522-7}, doi = {10.1016/S0065-2458(08)60522-7}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Reeker76.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Rice76, author = {John R. Rice}, title = {The Algorithm Selection Problem}, journal = {Adv. Comput.}, volume = {15}, pages = {65--118}, year = {1976}, url = {https://doi.org/10.1016/S0065-2458(08)60520-3}, doi = {10.1016/S0065-2458(08)60520-3}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Rice76.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Chandrasekaran75, author = {B. Chandrasekaran}, title = {Artificial Intelligence - The Past Decade}, journal = {Adv. Comput.}, volume = {13}, pages = {169--232}, year = {1975}, url = {https://doi.org/10.1016/S0065-2458(08)60658-0}, doi = {10.1016/S0065-2458(08)60658-0}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Chandrasekaran75.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Fulton75, author = {Patricia Fulton}, title = {Mapping and Computers}, journal = {Adv. Comput.}, volume = {13}, pages = {73--108}, year = {1975}, url = {https://doi.org/10.1016/S0065-2458(08)60656-7}, doi = {10.1016/S0065-2458(08)60656-7}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Fulton75.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Joyce75, author = {James Joyce}, title = {Poetry Generation and Analysis}, journal = {Adv. Comput.}, volume = {13}, pages = {43--72}, year = {1975}, url = {https://doi.org/10.1016/S0065-2458(08)60655-5}, doi = {10.1016/S0065-2458(08)60655-5}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Joyce75.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/ThompsonT75, author = {Frederick B. Thompson and Bozena Henisz Thompson}, title = {Practical Natural Language Processing: The {REL} System as Prototype}, journal = {Adv. Comput.}, volume = {13}, pages = {109--168}, year = {1975}, url = {https://doi.org/10.1016/S0065-2458(08)60657-9}, doi = {10.1016/S0065-2458(08)60657-9}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/ThompsonT75.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Wexelblat75, author = {Richard L. Wexelblat}, title = {Programmed Control of Asynchronous Program Interrupts}, journal = {Adv. Comput.}, volume = {13}, pages = {1--41}, year = {1975}, url = {https://doi.org/10.1016/S0065-2458(08)60654-3}, doi = {10.1016/S0065-2458(08)60654-3}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Wexelblat75.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Anderson72, author = {James P. Anderson}, title = {Information Security in a Multi-User Computer Environment}, journal = {Adv. Comput.}, volume = {12}, pages = {1--36}, year = {1972}, url = {https://doi.org/10.1016/S0065-2458(08)60506-9}, doi = {10.1016/S0065-2458(08)60506-9}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Anderson72.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/BergeronGSTD72, author = {R. Daniel Bergeron and John D. Gannon and D. P. Shecter and Frank Wm. Tompa and Andries van Dam}, title = {Systems Programming Languages}, journal = {Adv. Comput.}, volume = {12}, pages = {175--284}, year = {1972}, url = {https://doi.org/10.1016/S0065-2458(08)60510-0}, doi = {10.1016/S0065-2458(08)60510-0}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/BergeronGSTD72.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Lincoln72, author = {Harry B. Lincoln}, title = {Uses of the Computer in Music Composition and Research}, journal = {Adv. Comput.}, volume = {12}, pages = {73--114}, year = {1972}, url = {https://doi.org/10.1016/S0065-2458(08)60508-2}, doi = {10.1016/S0065-2458(08)60508-2}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Lincoln72.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Prewitt72, author = {Judith M. S. Prewitt}, title = {Parametric and Nonparametric Recognition by Computer: An Application to Leukocyte Image Processing}, journal = {Adv. Comput.}, volume = {12}, pages = {285--414}, year = {1972}, url = {https://doi.org/10.1016/S0065-2458(08)60511-2}, doi = {10.1016/S0065-2458(08)60511-2}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Prewitt72.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Roberts72, author = {David C. Roberts}, title = {File Organization Techniques}, journal = {Adv. Comput.}, volume = {12}, pages = {115--174}, year = {1972}, url = {https://doi.org/10.1016/S0065-2458(08)60509-4}, doi = {10.1016/S0065-2458(08)60509-4}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Roberts72.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Roccaferrera72, author = {G. M. Ferrero di Roccaferrera}, title = {Managers, Deterministic Models, and Computers}, journal = {Adv. Comput.}, volume = {12}, pages = {37--72}, year = {1972}, url = {https://doi.org/10.1016/S0065-2458(08)60507-0}, doi = {10.1016/S0065-2458(08)60507-0}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Roccaferrera72.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Debons71, author = {Anthony Debons}, title = {Command and Control: Technology and Social Impact}, journal = {Adv. Comput.}, volume = {11}, pages = {319--390}, year = {1971}, url = {https://doi.org/10.1016/S0065-2458(08)60634-8}, doi = {10.1016/S0065-2458(08)60634-8}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Debons71.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Hill71, author = {David R. Hill}, title = {Man-Machine Interaction Using Speech}, journal = {Adv. Comput.}, volume = {11}, pages = {165--230}, year = {1971}, url = {https://doi.org/10.1016/S0065-2458(08)60632-4}, doi = {10.1016/S0065-2458(08)60632-4}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Hill71.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Jackson71, author = {David M. Jackson}, title = {Classification, Relevance, and Information Retrieval}, journal = {Adv. Comput.}, volume = {11}, pages = {59--125}, year = {1971}, url = {https://doi.org/10.1016/S0065-2458(08)60630-0}, doi = {10.1016/S0065-2458(08)60630-0}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Jackson71.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Josselson71, author = {Harry H. Josselson}, title = {Automatic Translation of Languages Since 1960: {A} Linguist's View}, journal = {Adv. Comput.}, volume = {11}, pages = {1--58}, year = {1971}, url = {https://doi.org/10.1016/S0065-2458(08)60629-4}, doi = {10.1016/S0065-2458(08)60629-4}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Josselson71.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/KieburtzN71, author = {Richard B. Kieburtz and Edmund E. Newhall}, title = {Balanced Magnetic Circuits for Logic and Memory Devices}, journal = {Adv. Comput.}, volume = {11}, pages = {231--317}, year = {1971}, url = {https://doi.org/10.1016/S0065-2458(08)60633-6}, doi = {10.1016/S0065-2458(08)60633-6}, timestamp = {Wed, 02 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ac/KieburtzN71.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Otten71, author = {Klaus W. Otten}, title = {Approaches to the Machine Recognition of Conversational Speech}, journal = {Adv. Comput.}, volume = {11}, pages = {127--163}, year = {1971}, url = {https://doi.org/10.1016/S0065-2458(08)60631-2}, doi = {10.1016/S0065-2458(08)60631-2}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Otten71.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Ahlberg70, author = {J. H. Ahlberg}, title = {Spline Approximation and Computer-Aided Design}, journal = {Adv. Comput.}, volume = {10}, pages = {275--289}, year = {1970}, url = {https://doi.org/10.1016/S0065-2458(08)60439-8}, doi = {10.1016/S0065-2458(08)60439-8}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Ahlberg70.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Brooks70, author = {Frederick P. Brooks Jr.}, title = {Computer-Man Communication: Using Graphics in the Instructional Process}, journal = {Adv. Comput.}, volume = {10}, pages = {129--143}, year = {1970}, url = {https://doi.org/10.1016/S0065-2458(08)60434-9}, doi = {10.1016/S0065-2458(08)60434-9}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Brooks70.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/DamR70, author = {Andries van Dam and David E. Rice}, title = {Computers and Publishing: Writing, Editing, and Printing}, journal = {Adv. Comput.}, volume = {10}, pages = {145--174}, year = {1970}, url = {https://doi.org/10.1016/S0065-2458(08)60435-0}, doi = {10.1016/S0065-2458(08)60435-0}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/DamR70.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/David70, author = {Edward E. David Jr.}, title = {Computing from the Communication Point of View}, journal = {Adv. Comput.}, volume = {10}, pages = {109--128}, year = {1970}, url = {https://doi.org/10.1016/S0065-2458(08)60433-7}, doi = {10.1016/S0065-2458(08)60433-7}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/David70.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/DeCarlo70, author = {Charles DeCarlo}, title = {Humanism, Technology, and Language}, journal = {Adv. Comput.}, volume = {10}, pages = {1--6}, year = {1970}, url = {https://doi.org/10.1016/S0065-2458(08)60430-1}, doi = {10.1016/S0065-2458(08)60430-1}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/DeCarlo70.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Grenander70, author = {Ulf Grenander}, title = {A Unified Approach to Pattern Analysis}, journal = {Adv. Comput.}, volume = {10}, pages = {175--216}, year = {1970}, url = {https://doi.org/10.1016/S0065-2458(08)60436-2}, doi = {10.1016/S0065-2458(08)60436-2}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Grenander70.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Ledley70, author = {Robert S. Ledley}, title = {Use of Computers in Biomedical Pattern Recognition}, journal = {Adv. Comput.}, volume = {10}, pages = {217--252}, year = {1970}, url = {https://doi.org/10.1016/S0065-2458(08)60437-4}, doi = {10.1016/S0065-2458(08)60437-4}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Ledley70.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Prager70, author = {William Prager}, title = {Numerical Methods of Stress Analysis}, journal = {Adv. Comput.}, volume = {10}, pages = {253--273}, year = {1970}, url = {https://doi.org/10.1016/S0065-2458(08)60438-6}, doi = {10.1016/S0065-2458(08)60438-6}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Prager70.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Slotnick70, author = {Daniel L. Slotnick}, title = {Logic per Track Devices}, journal = {Adv. Comput.}, volume = {10}, pages = {291--296}, year = {1970}, url = {https://doi.org/10.1016/S0065-2458(08)60440-4}, doi = {10.1016/S0065-2458(08)60440-4}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Slotnick70.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Thwaites70, author = {Bryan Thwaites}, title = {Mathematics in 1984 - The Impact of Computers}, journal = {Adv. Comput.}, volume = {10}, pages = {79--108}, year = {1970}, url = {https://doi.org/10.1016/S0065-2458(08)60432-5}, doi = {10.1016/S0065-2458(08)60432-5}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Thwaites70.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Wegner70, author = {Peter Wegner}, title = {Three Computer Cultures: Computer Technology, Computer Mathematics, and Computer Science}, journal = {Adv. Comput.}, volume = {10}, pages = {7--78}, year = {1970}, url = {https://doi.org/10.1016/S0065-2458(08)60431-3}, doi = {10.1016/S0065-2458(08)60431-3}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Wegner70.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Abrahams68, author = {Paul W. Abrahams}, title = {Symbol Manipulation Languages}, journal = {Adv. Comput.}, volume = {9}, pages = {51--111}, year = {1968}, url = {https://doi.org/10.1016/S0065-2458(08)60311-3}, doi = {10.1016/S0065-2458(08)60311-3}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Abrahams68.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Buchman68, author = {A. S. Buchman}, title = {Aerospace Computers}, journal = {Adv. Comput.}, volume = {9}, pages = {239--284}, year = {1968}, url = {https://doi.org/10.1016/S0065-2458(08)60314-9}, doi = {10.1016/S0065-2458(08)60314-9}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Buchman68.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Fraenkel68, author = {Aviezri S. Fraenkel}, title = {Legal Information Retrieval}, journal = {Adv. Comput.}, volume = {9}, pages = {113--178}, year = {1968}, url = {https://doi.org/10.1016/S0065-2458(08)60312-5}, doi = {10.1016/S0065-2458(08)60312-5}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Fraenkel68.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Koczela68, author = {L. J. Koczela}, title = {The Distributed Processor Organization}, journal = {Adv. Comput.}, volume = {9}, pages = {285--353}, year = {1968}, url = {https://doi.org/10.1016/S0065-2458(08)60315-0}, doi = {10.1016/S0065-2458(08)60315-0}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Koczela68.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/McLeod68, author = {John McLeod}, title = {Advances in Simulation}, journal = {Adv. Comput.}, volume = {9}, pages = {23--49}, year = {1968}, url = {https://doi.org/10.1016/S0065-2458(08)60310-1}, doi = {10.1016/S0065-2458(08)60310-1}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/McLeod68.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Poppelbaum68, author = {W. J. Poppelbaum}, title = {What Next in Computer Technology?}, journal = {Adv. Comput.}, volume = {9}, pages = {1--21}, year = {1968}, url = {https://doi.org/10.1016/S0065-2458(08)60309-5}, doi = {10.1016/S0065-2458(08)60309-5}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Poppelbaum68.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Spandorfer68, author = {L. M. Spandorfer}, title = {Large Scale Integration - an Appraisal}, journal = {Adv. Comput.}, volume = {9}, pages = {179--238}, year = {1968}, url = {https://doi.org/10.1016/S0065-2458(08)60313-7}, doi = {10.1016/S0065-2458(08)60313-7}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Spandorfer68.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Lombardi67, author = {Lionello A. Lombardi}, title = {Incremental Computation: The Preliminary Design of a Programming System Which Allows for Incremental Data Assimilation in Open-Ended Man-Computer Information Systems}, journal = {Adv. Comput.}, volume = {8}, pages = {247--333}, year = {1967}, url = {https://doi.org/10.1016/S0065-2458(08)60698-1}, doi = {10.1016/S0065-2458(08)60698-1}, timestamp = {Fri, 16 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Lombardi67.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Narasimhan67, author = {R. Narasimhan}, title = {Programming Languages and Computers: {A} Unified Metatheory}, journal = {Adv. Comput.}, volume = {8}, pages = {189--245}, year = {1967}, url = {https://doi.org/10.1016/S0065-2458(08)60697-X}, doi = {10.1016/S0065-2458(08)60697-X}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Narasimhan67.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Pyke67, author = {Thomas N. Pyke Jr.}, title = {Time-Shared Computer Systems}, journal = {Adv. Comput.}, volume = {8}, pages = {1--45}, year = {1967}, url = {https://doi.org/10.1016/S0065-2458(08)60693-2}, doi = {10.1016/S0065-2458(08)60693-2}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Pyke67.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Sager67, author = {Naomi Sager}, title = {Syntactic Analysis of Natural Language}, journal = {Adv. Comput.}, volume = {8}, pages = {153--188}, year = {1967}, url = {https://doi.org/10.1016/S0065-2458(08)60696-8}, doi = {10.1016/S0065-2458(08)60696-8}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Sager67.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Sammet67, author = {Jean E. Sammet}, title = {Formula Manipulation by Computer}, journal = {Adv. Comput.}, volume = {8}, pages = {47--102}, year = {1967}, url = {https://doi.org/10.1016/S0065-2458(08)60694-4}, doi = {10.1016/S0065-2458(08)60694-4}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Sammet67.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Steel67, author = {Thomas B. Steel Jr.}, title = {Standards for Computers and Information Processing}, journal = {Adv. Comput.}, volume = {8}, pages = {103--152}, year = {1967}, url = {https://doi.org/10.1016/S0065-2458(08)60695-6}, doi = {10.1016/S0065-2458(08)60695-6}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Steel67.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Bozman66, author = {William R. Bozman}, title = {Computer-Aided Typesetting}, journal = {Adv. Comput.}, volume = {7}, pages = {195--207}, year = {1966}, url = {https://doi.org/10.1016/S0065-2458(08)60105-9}, doi = {10.1016/S0065-2458(08)60105-9}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Bozman66.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Dam66, author = {Andries van Dam}, title = {Computer Driven Displays and Their Use in Man/Machine Interaction}, journal = {Adv. Comput.}, volume = {7}, pages = {239--290}, year = {1966}, url = {https://doi.org/10.1016/S0065-2458(08)60107-2}, doi = {10.1016/S0065-2458(08)60107-2}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Dam66.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Danielson66, author = {Wayne A. Danielson}, title = {The Man-Machine Combination for Computer-Assisted Copy Editing}, journal = {Adv. Comput.}, volume = {7}, pages = {181--193}, year = {1966}, url = {https://doi.org/10.1016/S0065-2458(08)60104-7}, doi = {10.1016/S0065-2458(08)60104-7}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Danielson66.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Davis66, author = {Ruth M. Davis}, title = {Programming Language Processors}, journal = {Adv. Comput.}, volume = {7}, pages = {117--180}, year = {1966}, url = {https://doi.org/10.1016/S0065-2458(08)60103-5}, doi = {10.1016/S0065-2458(08)60103-5}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Davis66.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Murtha66, author = {John C. Murtha}, title = {Highly Parallel Information Processing Systems}, journal = {Adv. Comput.}, volume = {7}, pages = {1--116}, year = {1966}, url = {https://doi.org/10.1016/S0065-2458(08)60102-3}, doi = {10.1016/S0065-2458(08)60102-3}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Murtha66.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Satterthwait66, author = {Arnold C. Satterthwait}, title = {Programming Languages for Computational Linguistics}, journal = {Adv. Comput.}, volume = {7}, pages = {209--238}, year = {1966}, url = {https://doi.org/10.1016/S0065-2458(08)60106-0}, doi = {10.1016/S0065-2458(08)60106-0}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Satterthwait66.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Bargellini65, author = {Pier L. Bargellini}, title = {Considerations on Man Versus Machine for Space Probing}, journal = {Adv. Comput.}, volume = {6}, pages = {195--227}, year = {1965}, url = {https://doi.org/10.1016/S0065-2458(08)60421-0}, doi = {10.1016/S0065-2458(08)60421-0}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Bargellini65.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Garner65, author = {Harvey L. Garner}, title = {Number Systems and Arithmetic}, journal = {Adv. Comput.}, volume = {6}, pages = {131--194}, year = {1965}, url = {https://doi.org/10.1016/S0065-2458(08)60420-9}, doi = {10.1016/S0065-2458(08)60420-9}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Garner65.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Gelernter65, author = {Herbert L. Gelernter}, title = {Data Collection and Reduction for Nuclear Particle Trace Detectors}, journal = {Adv. Comput.}, volume = {6}, pages = {229--296}, year = {1965}, url = {https://doi.org/10.1016/S0065-2458(08)60422-2}, doi = {10.1016/S0065-2458(08)60422-2}, timestamp = {Tue, 01 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Gelernter65.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Good65, author = {Irving John Good}, title = {Speculations Concerning the First Ultraintelligent Machine}, journal = {Adv. Comput.}, volume = {6}, pages = {31--88}, year = {1965}, url = {https://doi.org/10.1016/S0065-2458(08)60418-0}, doi = {10.1016/S0065-2458(08)60418-0}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Good65.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Walston65, author = {Claude E. Walston}, title = {Information Retrieval}, journal = {Adv. Comput.}, volume = {6}, pages = {1--30}, year = {1965}, url = {https://doi.org/10.1016/S0065-2458(08)60417-9}, doi = {10.1016/S0065-2458(08)60417-9}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Walston65.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Wickman65, author = {Charles R. Wickman}, title = {Digital Training Devices}, journal = {Adv. Comput.}, volume = {6}, pages = {89--130}, year = {1965}, url = {https://doi.org/10.1016/S0065-2458(08)60419-2}, doi = {10.1016/S0065-2458(08)60419-2}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Wickman65.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Coulter64, author = {Charles L. Coulter}, title = {Computing Problems and Methods in X-Ray Crystallography}, journal = {Adv. Comput.}, volume = {5}, pages = {257--287}, year = {1964}, url = {https://doi.org/10.1016/S0065-2458(08)60355-1}, doi = {10.1016/S0065-2458(08)60355-1}, timestamp = {Tue, 01 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Coulter64.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Cuthill64, author = {Elizabeth H. Cuthill}, title = {Digital Computers in Nuclear Reactor Design}, journal = {Adv. Comput.}, volume = {5}, pages = {289--348}, year = {1964}, url = {https://doi.org/10.1016/S0065-2458(08)60356-3}, doi = {10.1016/S0065-2458(08)60356-3}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Cuthill64.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Huskey64, author = {Harry D. Huskey}, title = {An Introduction to Procedure-Oriented Languages}, journal = {Adv. Comput.}, volume = {5}, pages = {349--377}, year = {1964}, url = {https://doi.org/10.1016/S0065-2458(08)60357-5}, doi = {10.1016/S0065-2458(08)60357-5}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Huskey64.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Moshman64, author = {Jack Moshman}, title = {The Role of Computers in Election Night Broadcasting}, journal = {Adv. Comput.}, volume = {5}, pages = {1--21}, year = {1964}, url = {https://doi.org/10.1016/S0065-2458(08)60351-4}, doi = {10.1016/S0065-2458(08)60351-4}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Moshman64.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Pask64, author = {Gordon Pask}, title = {A Discussion of Artificial Intelligence and Self-Organization}, journal = {Adv. Comput.}, volume = {5}, pages = {109--226}, year = {1964}, url = {https://doi.org/10.1016/S0065-2458(08)60353-8}, doi = {10.1016/S0065-2458(08)60353-8}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Pask64.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Stavroudis64, author = {Orestes N. Stavroudis}, title = {Automatic Optical Design}, journal = {Adv. Comput.}, volume = {5}, pages = {227--255}, year = {1964}, url = {https://doi.org/10.1016/S0065-2458(08)60354-X}, doi = {10.1016/S0065-2458(08)60354-X}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Stavroudis64.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Turksi64, author = {Wladyslaw M. Turski}, title = {Some Results of Research on Automatic Programming in Eastern Europe}, journal = {Adv. Comput.}, volume = {5}, pages = {23--108}, year = {1964}, url = {https://doi.org/10.1016/S0065-2458(08)60352-6}, doi = {10.1016/S0065-2458(08)60352-6}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Turksi64.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/BennionC63, author = {David R. Bennion and Hewitt D. Crane}, title = {All-Magnetic Circuit Techniques}, journal = {Adv. Comput.}, volume = {4}, pages = {53--133}, year = {1963}, url = {https://doi.org/10.1016/S0065-2458(08)60219-3}, doi = {10.1016/S0065-2458(08)60219-3}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/BennionC63.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Curtin63, author = {William A. Curtin}, title = {Multiple Computer Systems}, journal = {Adv. Comput.}, volume = {4}, pages = {245--303}, year = {1963}, url = {https://doi.org/10.1016/S0065-2458(08)60222-3}, doi = {10.1016/S0065-2458(08)60222-3}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Curtin63.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Glaettli63, author = {H. H. Glaettli}, title = {Digital Fluid Logic Elements}, journal = {Adv. Comput.}, volume = {4}, pages = {169--243}, year = {1963}, url = {https://doi.org/10.1016/S0065-2458(08)60221-1}, doi = {10.1016/S0065-2458(08)60221-1}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Glaettli63.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/McGee63, author = {William C. McGee}, title = {The Formulation of Data Processing Problems for Computers}, journal = {Adv. Comput.}, volume = {4}, pages = {1--52}, year = {1963}, url = {https://doi.org/10.1016/S0065-2458(08)60218-1}, doi = {10.1016/S0065-2458(08)60218-1}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/McGee63.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Tompkins63, author = {Howard E. Tompkins}, title = {Computer Education}, journal = {Adv. Comput.}, volume = {4}, pages = {135--168}, year = {1963}, url = {https://doi.org/10.1016/S0065-2458(08)60220-X}, doi = {10.1016/S0065-2458(08)60220-X}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Tompkins63.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/BirkhoffVY62, author = {Garrett Birkhoff and Richard S. Varga and David Young}, title = {Alternating Direction Implicit Methods}, journal = {Adv. Comput.}, volume = {3}, pages = {189--273}, year = {1962}, url = {https://doi.org/10.1016/S0065-2458(08)60620-8}, doi = {10.1016/S0065-2458(08)60620-8}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/BirkhoffVY62.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Codd62, author = {E. F. Codd}, title = {Multiprogramming}, journal = {Adv. Comput.}, volume = {3}, pages = {77--153}, year = {1962}, url = {https://doi.org/10.1016/S0065-2458(08)60618-X}, doi = {10.1016/S0065-2458(08)60618-X}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Codd62.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Conte62, author = {Samuel D. Conte}, title = {The Computation of Satellite Orbit Trajectories}, journal = {Adv. Comput.}, volume = {3}, pages = {1--76}, year = {1962}, url = {https://doi.org/10.1016/S0065-2458(08)60617-8}, doi = {10.1016/S0065-2458(08)60617-8}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Conte62.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Lawlor62, author = {Reed C. Lawlor}, title = {Information Technology and the Law}, journal = {Adv. Comput.}, volume = {3}, pages = {299--346}, year = {1962}, url = {https://doi.org/10.1016/S0065-2458(08)60622-1}, doi = {10.1016/S0065-2458(08)60622-1}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Lawlor62.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Skramstad62, author = {Harold K. Skramstad}, title = {Combined Analog-Digital Techniques in Simulation}, journal = {Adv. Comput.}, volume = {3}, pages = {275--298}, year = {1962}, url = {https://doi.org/10.1016/S0065-2458(08)60621-X}, doi = {10.1016/S0065-2458(08)60621-X}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Skramstad62.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Wolfe62, author = {Philip Wolfe}, title = {Recent Developments in Nonlinear Programming}, journal = {Adv. Comput.}, volume = {3}, pages = {155--187}, year = {1962}, url = {https://doi.org/10.1016/S0065-2458(08)60619-1}, doi = {10.1016/S0065-2458(08)60619-1}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Wolfe62.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/DavisR61, author = {Philip J. Davis and Philip Rabinowitz}, title = {Advances in Orthonormalizing Computation}, journal = {Adv. Comput.}, volume = {2}, pages = {55--133}, year = {1961}, url = {https://doi.org/10.1016/S0065-2458(08)60141-2}, doi = {10.1016/S0065-2458(08)60141-2}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/DavisR61.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Douglas61, author = {Jim Douglas Jr.}, title = {A Survey of Numerical Methods for Parabolic Differential Equations}, journal = {Adv. Comput.}, volume = {2}, pages = {1--54}, year = {1961}, url = {https://doi.org/10.1016/S0065-2458(08)60140-0}, doi = {10.1016/S0065-2458(08)60140-0}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Douglas61.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Gass61, author = {Saul I. Gass}, title = {Recent Developments in Linear Programming}, journal = {Adv. Comput.}, volume = {2}, pages = {295--377}, year = {1961}, url = {https://doi.org/10.1016/S0065-2458(08)60143-6}, doi = {10.1016/S0065-2458(08)60143-6}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Gass61.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/McNaughton61, author = {Robert McNaughton}, title = {The Theory of Automata, a Survey}, journal = {Adv. Comput.}, volume = {2}, pages = {379--421}, year = {1961}, url = {https://doi.org/10.1016/S0065-2458(08)60144-8}, doi = {10.1016/S0065-2458(08)60144-8}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/McNaughton61.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Shoulders61, author = {Kenneth R. Shoulders}, title = {Microelectronics Using Electron-Beam-Activated Machining Techniques}, journal = {Adv. Comput.}, volume = {2}, pages = {135--293}, year = {1961}, url = {https://doi.org/10.1016/S0065-2458(08)60142-4}, doi = {10.1016/S0065-2458(08)60142-4}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Shoulders61.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Bar-Hillel60, author = {Yehoshua Bar{-}Hillel}, title = {The Present Status of Automatic Translation of Languages}, journal = {Adv. Comput.}, volume = {1}, pages = {91--163}, year = {1960}, url = {https://doi.org/10.1016/S0065-2458(08)60607-5}, doi = {10.1016/S0065-2458(08)60607-5}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Bar-Hillel60.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Fatehchand60, author = {Richard Fatehchand}, title = {Machine Recognition of Spoken Words}, journal = {Adv. Comput.}, volume = {1}, pages = {193--229}, year = {1960}, url = {https://doi.org/10.1016/S0065-2458(08)60609-9}, doi = {10.1016/S0065-2458(08)60609-9}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Fatehchand60.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Gotlieb60, author = {C. C. Gotlieb}, title = {General-Purpose Programming for Business Applications}, journal = {Adv. Comput.}, volume = {1}, pages = {1--42}, year = {1960}, url = {https://doi.org/10.1016/S0065-2458(08)60605-1}, doi = {10.1016/S0065-2458(08)60605-1}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Gotlieb60.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Phillips60, author = {Norman A. Phillips}, title = {Numerical Weather Prediction}, journal = {Adv. Comput.}, volume = {1}, pages = {43--90}, year = {1960}, url = {https://doi.org/10.1016/S0065-2458(08)60606-3}, doi = {10.1016/S0065-2458(08)60606-3}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Phillips60.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Reitwiesner60, author = {George W. Reitwiesner}, title = {Binary Arithmetic}, journal = {Adv. Comput.}, volume = {1}, pages = {231--308}, year = {1960}, url = {https://doi.org/10.1016/S0065-2458(08)60610-5}, doi = {10.1016/S0065-2458(08)60610-5}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Reitwiesner60.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Samuel60, author = {Arthur L. Samuel}, title = {Programming Computers to Play Games}, journal = {Adv. Comput.}, volume = {1}, pages = {165--192}, year = {1960}, url = {https://doi.org/10.1016/S0065-2458(08)60608-7}, doi = {10.1016/S0065-2458(08)60608-7}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Samuel60.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.