Software-Practice & Experience

Papers
(The TQCC of Software-Practice & Experience is 4. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-05-01 to 2024-05-01.)
ArticleCitations
Quantum computing: A taxonomy, systematic review and future directions135
Joint computation offloading and resource provisioning for edge‐cloud computing environment: A machine learning‐based approach58
Senti‐eSystem: A sentiment‐based eSystem‐using hybridized fuzzy and deep neural network for measuring customer satisfaction58
NovidChain: Blockchain‐based privacy‐preserving platform for COVID‐19 test/vaccine certificates54
FPFTS: A joint fuzzy particle swarm optimization mobility‐aware approach to fog task scheduling algorithm for Internet of Things devices47
An approach to forecast impact of Covid‐19 using supervised machine learning model45
Integrated model‐driven engineering of blockchain applications for business processes and asset management36
Software effort estimation accuracy prediction of machine learning techniques: A systematic performance evaluation34
IoT‐fog‐cloud based architecture for smart systems: Prototypes of autism and COVID‐19 monitoring systems34
A graph‐based convolutional neural network stock price prediction with leading indicators31
Spatiotemporal‐based sentiment analysis on tweets for risk assessment of event using deep learning approach28
Microservice transition and its granularity problem: A systematic mapping study27
PARCIV: Recognizing physical activities having complex interclass variations using semantic data of smartphone26
Software reuse analytics using integrated random forest and gradient boosting machine learning algorithm25
Function delivery network: Extending serverless computing for heterogeneous platforms25
An empirical comparison of commercial and open‐source web vulnerability scanners23
EFFORT: Energy efficient framework for offload communication in mobile cloud computing22
Impact of etcd deployment on Kubernetes, Istio, and application performance22
Advanced data integration in banking, financial, and insurance software in the age of COVID‐1922
Design and evaluation of a scalable Internet of Things backend for smart ports21
An autonomous IoT service placement methodology in fog computing21
Comparative study of support vector machines and random forests machine learning algorithms on credit operation20
Practical and secure multifactor authentication protocol for autonomous vehicles in 5G20
AuctionWhisk: Using an auction‐inspired approach for function placement in serverless fog platforms19
PDMA: Probabilistic service migration approach for delay‐aware and mobility‐aware mobile edge computing19
Container lifecycle‐aware scheduling for serverless computing19
SafeMan: A unified framework to manage cybersecurity and safety in manufacturing industry19
Data dimensionality reduction techniques for Industry 4.0: Research results, challenges, and future research directions18
From zero to fog: Efficient engineering of fog‐based Internet of Things applications18
Energy‐Saving Multisensor Data Sampling and Fusion with Decision‐Making for Monitoring Health Risk Using WBSNs17
A Blockchain‐based Cyber Attack Detection Scheme for Decentralized Internet of Things using Software‐Defined Network17
Cybersecurity protection on in‐vehicle networks for distributed automotive cyber‐physical systems: State‐of‐the‐art and future challenges16
Service offloading oriented edge server placement in smart farming15
An energy‐aware virtual machines consolidation method for cloud computing: Simulation and verification15
RESCUE: Enabling green healthcare services using integrated IoT‐edge‐fog‐cloud computing environments14
Component‐aware orchestration of cloud‐based enterprise applications, from TOSCA to Docker and Kubernetes14
CREW: Cost and Reliability aware Eagle‐Whale optimiser for service placement in Fog13
Server configuration optimization in mobile edge computing: A cost‐performance tradeoff perspective13
Finite‐state model extraction and visualization from Java program execution13
The μTOSCA toolchain: Mining, analyzing, and refactoring microservice‐based architectures13
Dual‐grained representation for hand, foot, and mouth disease prediction within public health cyber‐physical systems13
Exploring reliable edge‐cloud computing for service latency optimization in sustainable cyber‐physical systems13
KubCG: A dynamic Kubernetes scheduler for heterogeneous clusters12
Notebook‐as‐a‐VRE (NaaVRE): From private notebooks to a collaborative cloud virtual research environment12
Migrating production monolithic systems to microservices using aspect oriented programming12
Toward an autonomic approach for Internet of Things service placement using gray wolf optimization in the fog computing environment12
Edge‐adaptable serverless acceleration for machine learning Internet of Things applications12
Root causing, detecting, and fixing flaky tests: State of the art and future roadmap12
Code‐level model checking in the software development workflow at Amazon Web Services12
Software system to predict the infection in COVID‐19 patients using deep learning and web of things11
What factors influence the lifetime of pull requests?11
Timing isolation and improved scheduling of deep neural networks for real‐time systems11
Human microservices: A framework for turning humans into service providers11
Control and data acquisition software of the high‐energy particle detector on board the China Seismo‐Electromagnetic Satellite space mission10
Valuating requirements arguments in the online user's forum for requirements decision‐making: The CrowdRE‐VArg framework10
A decade of research in fog computing: Relevance, challenges, and future directions10
Journey from cloud of things to fog of things: Survey, new trends, and research directions10
Keywords‐driven web APIs group recommendation for automatic app service creation process10
Systematic scalability analysis for microservices granularity adaptation design decisions10
HEART: Unrelated parallel machines problem with precedence constraints for task scheduling in cloud computing using heuristic and meta‐heuristic algorithms10
Post‐quantum cryptography techniques for secure communication in resource‐constrained Internet of Things devices: A comprehensive survey10
A cloud‐based integration platform for enterprise application integration: A Model‐Driven Engineering approach9
Real time flood disaster monitoring based on energy efficient ensemble clustering mechanism in wireless sensor network9
NAS Parallel Benchmarks with CUDA and beyond9
Global outliers detection in wireless sensor networks: A novel approach integrating time‐series analysis, entropy, and random forest‐based classification.9
STOPPAGE: Spatio‐temporal data driven cloud‐fog‐edge computing framework for pandemic monitoring and management9
BigDataSDNSim: A simulator for analyzing big data applications in software‐defined cloud data centers9
A service graph based extraction of microservices from monolith services of service‐oriented architecture9
A flexible approach for virtual machine selection in cloud data centers with AHP9
Android malware detection using network traffic based on sequential deep learning models9
DevOps benefits: A systematic literature review8
Effective approaches to combining lexical and syntactical information for code summarization8
SQVDT: A scalable quantitative vulnerability detection technique for source code security assessment8
An autonomous model for self‐optimizing virtual machine selection by learning automata in cloud environment8
Practical dynamic reconstruction of control flow graphs8
Software fault prediction using Whale algorithm with genetics algorithm8
Proactive content caching in edge computing environment: A review8
Retracted: An unmanned aerial vehicles navigation system on the basis of pattern recognition applications—Review of implementation options and prospects for development8
QuantumPath: A quantum software development platform8
Providing high‐level self‐adaptive abstractions for stream parallelism on multicores8
Data fusion analysis for attention‐deficit hyperactivity disorder emotion recognition with thermal image and Internet of Things devices8
A lightweight virtualization model to enable edge computing in deeply embedded systems8
Profiling and controlling I/O‐related memory contention in COTS heterogeneous platforms8
Edge intelligence based digital twins for internet of autonomous unmanned vehicles7
Resource management of IoT edge devices: Challenges, techniques, and solutions7
Reformulation of the performance portability metric7
Network traffic prediction method based on echo state network with adaptive reservoir7
A scalable framework for healthcare monitoring application using the Internet of Medical Things7
Unit of measurement libraries, their popularity and suitability7
Blockchain for Health IoT: A privacy‐preserving data sharing system7
Predicting just‐in‐time software defects to reduce post‐release quality costs in the maritime industry7
Standards‐based modeling and deployment of serverless function orchestrations using BPMN and TOSCA7
Managing data replication and distribution in the fog with FReD7
A tool for the semantic annotation, validation and optimization of business process models7
Using Ginkgo's memory accessor for improving the accuracy of memory‐bound low precision BLAS6
Autonomic rejuvenation of cloud applications as a countermeasure to software anomalies6
Constraint‐aware and multi‐objective optimization for micro‐service composition in mobile edge computing6
The human in model‐driven engineering loop: A case study on integrating handwritten code in model‐driven engineering repositories6
Equivalent mutant identification using hybrid wavelet convolutional rain optimization6
Detecting functional and security‐related issues in smart contracts: A systematic literature review6
A framework for microservices synchronization6
Engineering faster sorters for small sets of items6
On the (un‐)adoption of JavaScript front‐end frameworks6
Optimizing checkpoint‐based fault‐tolerance in distributed stream processing systems: Theory to practice6
Evaluating system architectures for driving range estimation and charge planning for electric vehicles6
Sensei: Enforcing secure coding guidelines in the integrated development environment6
A systematic gray literature review: The technologies and concerns of microservice application programming interfaces5
ThingsMigrate: Platform‐independent migration of stateful JavaScript Internet of Things applications5
Synthesizing secure software development activities for linear and agile lifecycle models5
Validating UTF‐8 in less than one instruction per byte5
Software assistants in software engineering: A systematic mapping study5
Reusability affecting factors and software metrics for reusability: A systematic literature review5
Computationally easy, spectrally good multipliers for congruential pseudorandom number generators5
Scaling scrum with a customized nexus framework: A report from a joint industry‐academia research project5
DEPO: A dynamic energy‐performance optimizer tool for automatic power capping for energy efficient high‐performance computing5
APISonar: Mining API usage examples5
Drug investigation tool: Identifying the effect of drug on cell image by using improved correlation5
Bug detection in Java code: An extensive evaluation of static analysis tools using Juliet Test Suites5
A comprehensive survey on nature‐inspired algorithms and their applications in edge computing: Challenges and future directions5
Configurable three‐way model merging5
Number parsing at a gigabyte per second5
Usability implications in software architecture: The case study of a mobile app5
Author classification using transfer learning and predicting stars in co‐author networks5
HSCR: Hierarchical structured cluster routing protocol for load balanced wireless sensor networks5
On the relative value of imbalanced learning for code smell detection5
Energy‐efficiency and sustainability in new generation cloud computing: A vision and directions for integrated management of data centre resources and workloads5
Standard versus uniform binary search and their variants in learned static indexing: The case of the searching on sorted data benchmarking software platform5
A metaheuristic‐based data replica placement approach for data‐intensive IoT applications in the fog computing environment5
Leveraging machine learning for software redocumentation—A comprehensive comparison of methods in practice5
xDEVS: A toolkit for interoperable modeling and simulation of formal discrete event systems4
OntoSuSD: Software engineering approaches integration ontology for sustainable software development4
An efficient Hadoop‐based brain tumor detection framework using big data analytic4
Deploying IoT services on the fog infrastructure: A graph partitioning‐based approach4
Charging stations‐oriented electric vehicle charging strategy based on battery characteristics4
Message‐sensing classified transmission scheme based on mobile edge computing in the Internet of Vehicles4
On the synthesis of metadata tags for HTML files4
Recommending software features to designers: From the perspective of users4
RIFLING: A reinforcement learning‐based GPU scheduler for deep learning research and development platforms4
Better Scrum through Essence4
MyNeutronDAQ: A general program for data acquisition of neutron scattering spectrometers at China Mianyang Research Reactor and on‐line data‐analysis4
A procedural and flexible approach for specification, modeling, definition, and analysis for self‐adaptive systems4
Integrated machine learning with semantic web for open government data recommendation based on cloud computing4
PAS: A new powerful and simple quantum computing simulator4
Towards efficient federated learning‐based scheme in medical cyber‐physical systems for distributed data4
Analyzing spatial analytics systems based on Hadoop and Spark: A user perspective4
Software design pattern selection approaches: A systematic literature review4
Multiuser collaborative illustration and visualization for volumetric scientific data4
Practical trade‐offs for the prefix‐sum problem4
0.038768768310547