1 |
Checking Reachability Property in Complex Concurrent Software Systems with a Knowledge Discovery Approach
|
Journal of Soft Computing and Information Technology (JSCIT)
|
2 |
Using data mining techniques to generate test cases from graph transformation systems specifications
|
Automated Software Engineering
|
3 |
A comprehensive review of the security flaws of hashing algorithms
|
Journal of Computer Virology and Hacking Techniques
|
4 |
A three-phase approach to improve the functionality of t-way strategy
|
Soft computing
|
5 |
Automatic program bug fixing by focusing on finding the shortest sequence of changes
|
Artificial Intelligence Review
|
6 |
Automatic bug localization using a combination of deep learning and model transformation through node classification
|
Software Quality Journal
|
7 |
تولید آرایه پوشش کمینه با استفاده از الگوریتم تکامل تفاضلی تطبیقی مبتنی بر تاریخچه موفقیت و کاهش خطی اندازه جمعیت
|
مهندسي برق دانشگاه تبريز
|
8 |
BBAC: Behavior-based access control to detect user suspicious behavior
|
journal of intelligent and fuzzy systems
|
9 |
Using deep reinforcement learning to search reachability properties in systems specified through graph transformation
|
SOFT COMPUT
|
10 |
Using Bayesian optimization algorithm for model-based integration testing
|
SOFT COMPUT
|
11 |
Secured Access Control in Security Information and Event Management Systems
|
Journal of Information Systems and Telecommunication
|
12 |
GALP: a hybrid artificial intelligence algorithm for generating covering array
|
Applied Soft Computing
|
13 |
Using memetic algorithm for robustness testing of contract‑based software models
|
Artificial Intelligence Review
|
14 |
استفاده از الگوریتم تودۀ ذرات بهینه در تولید دنبالۀ آزمون کمینه در آرایۀ پوشش با قوۀ ثابت
|
نشريه محاسبات نرم
|
15 |
An efficient approach to state space management in model checking of complex software systems using machine learning techniques
|
journal of intelligent and fuzzy systems
|
16 |
Using search‑based techniques for testing executable software models specified through graph transformations
|
International Journal of Machine Learning and Cybernetics
|
17 |
A new metaheuristic approach based on agent systems principles
|
computational science
|
18 |
Using evolutionary algorithms for reachability analysis of complex software systems specified through graph transformation
|
reliability engineering and system safety
|
19 |
Extracting Combinatorial Test parameters and their values using model checking and evolutionary algorithms
|
Applied Soft Computing
|
20 |
An approach based on knowledge exploration for state space management in checking reachability of complex software systems
|
SOFT COMPUT
|
21 |
استفاده از الگوریتم تودۀ ذرات بهینه در تولید دنبالۀ آزمون کمینه در آرایۀ پوشش با قوۀ ثابت
|
نشريه محاسبات نرم
|
22 |
مطالعه مروری بر تولید نمونهآزمون کمینه در آزمون تعاملی
|
پژوهش در علوم رايانه
|
23 |
MS-ACO: a multi-stage ant colony optimization to refute complex software systems specified through graph transformation
|
SOFT COMPUT
|
24 |
Model-based test suite generation for graph transformation system using model simulation and search-based techniques
|
information and software technology
|
25 |
تولید مورد آزمون مبتنی بر مدل از توصیفات تبدیل گراف با استفاده از الگوریتم جستجوی پرتو
|
مهندسي برق دانشگاه تبريز
|
26 |
Using evolutionary algorithms for reachability analysis of complex software systems specified through graph transformation
|
RELIAB ENG SYST SAFE
|
27 |
Searching for violation of safety and liveness properties using knowledge discovery in complex systems specified through graph transformations
|
information and software technology
|
28 |
A Recommendation Method Based on Semantic Similarity and Complementarity Using Weighted Taxonomy: A Case on Construction Materials Dataset
|
Journal of Information & Knowledge Management
|
29 |
آزمون مبتنی بر ترکیبات؛ آرایه پوشش؛ الگوریتم بهینه سازی مبتنی بر آموزش و یادگیری
|
مهندسي برق دانشگاه تبريز
|
30 |
Deadlock detection in complex software systems specified through graph transformation using Bayesian optimization algorithm
|
System and Software
|
31 |
A tuned version of genetic algorithm for efficient test suite generation in interactive t-way testing strategy
|
information and software technology
|
32 |
A recommender system for tourism industry using cluster ensemble and prediction machine learning techniques
|
computers and industrial engineering
|
33 |
Performance improvement for recommender systems using ontology
|
Telematics and Informatics
|
34 |
A greedy algorithm versus metaheuristic solutions to deadlock detection in Graph Transformation Systems
|
journal of intelligent and fuzzy systems
|
35 |
EMCDM: Efficient model checking by data mining for verification of complex software systems specified through architectural styles
|
Applied Soft Computing
|
36 |
راهکاری نوین جهت تولید دنباله آزمون کمینه در فرایند آزمون نرم افزار با ترکیب الگوریتمهای جستجوی تپه نوردی و جستجوی خفاش
|
مهندسي برق دانشگاه تبريز
|
37 |
An Optimal Solution for Test Case Generation Using ROBDD Graph and PSO Algorithm
|
quality and reliability Engineering International
|
38 |
Security analysis of network protocols through model checking: a case study on mobile IPv6
|
SECURITY AND COMMUNICATION NETWORKS
|
39 |
A hybrid optimization algorithm based on harmony search and differential evolution for continuous domain
|
journal of intelligent and fuzzy systems
|
40 |
ارائه راهکاری جهت مقابله با مشکل انفجار فضای حالت در سیستمهای تبدیل گراف با استفاده از الگوریتم پرندگان و جستجوی گرانشی
|
مهندسي برق دانشگاه تبريز
|
41 |
A FRAMEWORK TO PERFORMANCE ANALYSIS OF SOFTWARE ARCHITECTURAL STYLES
|
International Journal in Foundations of Computer Science and Technology
|
42 |
A Formal Approach to Secure Design of the Insulin Pump Behavior
|
Journal of Medical Imaging and Health Informatics
|
43 |
Breast Cancer Prediction by Using C5.0 Algorithm and BOOSTING Method
|
Journal of Medical Imaging and Health Informatics
|
44 |
A Reliable Architectural Style for Designing Pervasive Healthcare Systems
|
Journal of Medical Systems
|
45 |
A heuristic solution for model checking graph transformation systems
|
Applied Soft Computing
|
46 |
A meta-heuristic solution for automated refutation of complex software systems specified through graph transformations
|
Applied Soft Computing
|
47 |
Considering Reliability in Designing Pervasive Healthcare System
|
Journal of Medical Imaging and Health Informatics
|
48 |
A hybrid heuristic workflow scheduling algorithm for cloud computing environments
|
Journal Of Experimental & Theoretical Artificial Intelligence
|
49 |
A security framework for developing service-oriented software architectures
|
security and communication networks
|
50 |
Using graph transformation system to formalize Tropos diagrams
|
Journal of Visual Languages & Computing
|
51 |
An Efficient Approach to Breast Cancer Prediction Based on Neural Network, Adaboost and Gaussian Process
|
Journal of Medical Imaging and Health Informatics
|
52 |
Performance Measurement of Models Specified Through Component-based Software Architectural Styles
|
Measurement
|
53 |
A NOVEL APPROACH TO VERIFY GRAPH SCHEMA-BASED SOFTWARE SYSTEMS
|
International Journal of Software Engineering and Knowledge Engineering
|
54 |
Towards automated software model checking using graph transformation systems and Bogor
|
Journal of Zhejiang University - Science A
|
55 |
Towards automated verification of layered graph transformation specifications
|
Institution of Engineering and Technology
|
56 |
Style-based modeling and verification of fault tolerance service oriented architectures
|
Procedia Computer Science
|
57 |
A formal framework to model and validate event-based software architecture
|
Procedia Computer Science
|
58 |
FORMAL ANALYSIS OF UML 2.0 ACTIVITIES USING GRAPH TRANSFORMATION SYSTEMS
|
International Journal of Software Engineering and Knowledge Engineering
|
59 |
Optimal Real-Time Task Allocation in Wireless Sensor Actor Networks
|
Australian Journal of Basic and Applied Sciences
|
60 |
From Class Diagrams to Relational Tables: A Graph Transformation-based Approach
|
Electrical Review
|
61 |
A Qualitative Framework to Assess Hospital / Medical Websites
|
J Med Syst
|
62 |
Galoan: a multi-agent approach to herd cows
|
Annals of Mathematics and Artificial Intelligence
|
63 |
Formal Analysis of Service-oriented Architectures
|
Przeglad Elektrotchniczny
|
64 |
An Adaptive Method Based on High-Level Petri Nets for E-Learning
|
Journal of Software Engineering and Applications
|
65 |
A Survey on Data Mining Approaches in Medicine
|
International Research Journal of Applied & Basic Sciences
|
66 |
Educational Advisor System Implemented by Web-Based Fuzzy Expert Systems
|
Journal of Software Engineering and Applications
|
67 |
A Novel approach to solve traveling salesman problem inspired by Eurygasters movement
|
International Research Journal of Applied & Basic Sciences
|
68 |
Designing an architectural style for pervasive healthcare systems.
|
Journal of Medical Systems
|
69 |
ASM2Bogor: An approach for verification of models specified through Asmeta language
|
Journal of Visual Languages & Computing
|
70 |
A NOVEL WEB-BASED HUMAN ADVISOR FUZZY EXPERT SYSTEM
|
Journal of Applied Research and Technology
|
71 |
Performance Modeling and Analysis of Software Architectures Specified Through Graph Transformations
|
COMPUTING AND INFORMATICS
|
72 |
A Survey on Coping with the State Space Explosion Problem in Model Checking
|
International Research Journal of Applied & Basic Sciences
|
73 |
Scenario-driven analysis of systems specified through graph transformations
|
Journal of Visual Languages & Computing
|