James Miller

According to our database1, James Miller authored at least 123 papers between 1985 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
Integrative Double Kaizen Loop (IDKL): Towards a Culture of Continuous Learning and Sustainable Improvements for Software Organizations.
IEEE Trans. Software Eng., 2019

M-Lean: An end-to-end development framework for predictive models in B2B scenarios.
Inf. Softw. Technol., 2019

The current state of software license renewals in the I.T. industry.
Inf. Softw. Technol., 2019

Automated Testing of Motion-based Events in Mobile Applications.
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019

2018
A comprehensive review of tools for exploratory analysis of tabular industrial datasets.
Visual Informatics, 2018

Inferring Extended Probabilistic Finite-State Automaton Models from Software Executions.
ACM Trans. Softw. Eng. Methodol., 2018

Cross-Browser Differences Detection Based on an Empirical Metric for Web Page Visual Similarity.
ACM Trans. Internet Techn., 2018

Hybridization of Active Learning and Data Programming for Labeling Large Industrial Datasets.
Proceedings of the IEEE International Conference on Big Data, 2018

2017
Using π-calculus for Formal Modeling and Verification of WS-CDL Choreographies.
IEEE Trans. Services Computing, 2017

A comparative study of the performance of local feature-based pattern recognition algorithms.
Pattern Anal. Appl., 2017

Automated policy generation for testing access control software.
Information Security Journal: A Global Perspective, 2017

Estimating similarity of rich internet pages using visual information.
Int. J. Web Eng. Technol., 2017

On the Concept of Automatic User Behavior Profiling of Websites.
IJSSOE, 2017

Towards Building a New Age Commercial Contextual Advertising System.
IJSSOE, 2017

A Fuzzy Recommender System for Public Library Catalogs.
Int. J. Intell. Syst., 2017

Detecting Security Vulnerabilities in Object-Oriented PHP Programs.
Proceedings of the 17th IEEE International Working Conference on Source Code Analysis and Manipulation, 2017

Towards an Innovative Validation-Driven Approach to Lean Product Development.
Proceedings of the 50th Hawaii International Conference on System Sciences, 2017

2016
Identifying semantic blocks in Web pages using Gestalt laws of grouping.
World Wide Web, 2016

Incorporating Spatial, Temporal, and Social Context in Recommendations for Location-Based Social Networks.
IEEE Trans. Comput. Social Systems, 2016

An investigation of implicit features in compression-based learning for comparing webpages.
Pattern Anal. Appl., 2016

Enhancing CAPTCHA Security Using Interactivity, Dynamism, and Mouse Movement Patterns.
IJSSOE, 2016

ADAMAS: Interweaving unicode and color to enhance CAPTCHA security.
Future Gener. Comput. Syst., 2016

Policy Generator (PG): A Heuristic-Based Fuzzer.
Proceedings of the 49th Hawaii International Conference on System Sciences, 2016

Kaizen Cookbook: The Success Recipe for Continuous Learning and Improvements.
Proceedings of the 49th Hawaii International Conference on System Sciences, 2016

2015
Enhancing Hardware Assisted Test Insertion Capabilities on Embedded Processors using an FPGA-based Agile Test Support Co-processor.
Signal Processing Systems, 2015

Test Case Prioritization Using Extended Digraphs.
ACM Trans. Softw. Eng. Methodol., 2015

The kanban approach, between agility and leanness: a systematic review.
Empirical Software Engineering, 2015

A New Webpage Classification Model Based on Visual Information Using Gestalt Laws of Grouping.
Proceedings of the Web Information Systems Engineering - WISE 2015, 2015

Workshop on the application of security and testing to rich internet applications.
Proceedings of 25th Annual International Conference on Computer Science and Software Engineering, 2015

2014
Automated cookie collection testing.
ACM Trans. Softw. Eng. Methodol., 2014

An Anti-Phishing System Employing Diffused Information.
ACM Trans. Inf. Syst. Secur., 2014

An empirical investigation of Web session workloads: Can self-similarity be explained by deterministic chaos?
Inf. Process. Manag., 2014

Waste identification and elimination in information technology organizations.
Empirical Software Engineering, 2014

Towards Real Time Contextual Advertising.
Proceedings of the Web Information Systems Engineering - WISE 2014, 2014

2013
Centroidal Voronoi Tessellations - A New Approach to Random Testing.
IEEE Trans. Software Eng., 2013

A Survey and Analysis of Current CAPTCHA Approaches.
J. Web Eng., 2013

Refactoring legacy AJAX applications to improve the efficiency of the data exchange component.
Journal of Systems and Software, 2013

Privacy policies and national culture on the internet.
Information Systems Frontiers, 2013

Deficient documentation detection: a methodology to locate deficient project documentation using topic analysis.
Proceedings of the 10th Working Conference on Mining Software Repositories, 2013

2012
Constructing high quality use case models: a systematic review of current practices.
Requir. Eng., 2012

Embracing Composite Metrics in Software Experiments.
JSW, 2012

Is In-Depth Object-Oriented Knowledge Necessary to Develop Quality Robustness Diagrams?
JSW, 2012

Refactoring Flash Embedding Methods.
IJSSOE, 2012

2011
The Broadcasters' Transition Date Roulette: Strategic Aspects of the DTV Transition.
JTHTL, 2011

FTT: A System to Refactor Traditional Forms into Ajax-Enabled Forms.
IJSSOE, 2011

ART-Improving Execution Time for Flash Applications.
IJSSOE, 2011

Token-based graphical password authentication.
Int. J. Inf. Sec., 2011

Consumer trust in e-commerce web sites: A meta-study.
ACM Comput. Surv., 2011

Finding Homoglyphs - A Step towards Detecting Unicode-Based Visual Spoofing Attacks.
Proceedings of the Web Information System Engineering - WISE 2011, 2011

Refactoring Traditional Forms into Ajax-enabled Forms.
Proceedings of the 18th Working Conference on Reverse Engineering, 2011

2010
Detecting visually similar Web pages: Application to phishing detection.
ACM Trans. Internet Techn., 2010

Improving the quality of use case models using antipatterns.
Software and Systems Modeling, 2010

Developing comprehensive acceptance tests from use cases and robustness diagrams.
Requir. Eng., 2010

Prevalence and classification of web page defects.
Online Information Review, 2010

Chronological fault-based mutation processes for WS-BPEL 2.0 programs.
Int. J. Web Eng. Technol., 2010

Refactoring ActionScript for Improving Application Execution Time.
Proceedings of the Web Information Systems Engineering - WISE 2010 Workshops, 2010

2009
A Test-oriented Embedded System Production Methodology.
Signal Processing Systems, 2009

Cookies: A deployment study and the testing implications.
TWEB, 2009

A large-scale empirical study of P3P privacy policies: Stated actions vs. legal obligations.
TWEB, 2009

A Novel Evolutionary Approach for Adaptive Random Testing.
IEEE Trans. Reliability, 2009

A More Agile Approach to Embedded System Development.
IEEE Software, 2009

A Survey of Cookie Technology Adoption Amongst Nations.
J. Web Eng., 2009

A Scalable Testing Framework for Location-Based Services.
J. Comput. Sci. Technol., 2009

An analysis of privacy signals on the World Wide Web: Past, present and future.
Inf. Sci., 2009

Do You Know Where Your Data Is? A Study of the Effect of Enforcement Strategies on Privacy Policies.
IJISP, 2009

A subject-based empirical evaluation of SSUCD's performance in reducing inconsistencies in use case models.
Empirical Software Engineering, 2009

2008
Producing robust use case diagrams via reverse engineering of use case descriptions.
Software and Systems Modeling, 2008

How Do We Build Trust into E-commerce Web Sites?
IEEE Software, 2008

Is HTML in a Race to the Bottom? A Large-Scale Survey and Analysis of Conformance to W3C Standards.
IEEE Internet Computing, 2008

The Theory and Implementation of InputValidator: A Semi-Automated Value-Level Bypass Testing Tool.
IJITWE, 2008

Triangulation as a basis for knowledge discovery in software engineering.
Empirical Software Engineering, 2008

A Hardware-Assisted Tool for Fast, Full Code Coverage Analysis.
Proceedings of the 19th International Symposium on Software Reliability Engineering (ISSRE 2008), 2008

E-RACE, A Hardware-Assisted Approach to Lockset-Based Data Race Detection for Embedded Products.
Proceedings of the 19th International Symposium on Software Reliability Engineering (ISSRE 2008), 2008

A Three-Tiered Testing Strategy for Cookies.
Proceedings of the First International Conference on Software Testing, 2008

A Service Oriented Architecture for CAX concurrent collaboration.
Proceedings of the 2008 IEEE International Conference on Automation Science and Engineering, 2008

Replication's Role in Software Engineering.
Proceedings of the Guide to Advanced Empirical Software Engineering, 2008

2007
A Survey and Analysis of the P3P Protocol's Agents, Adoption, Maintenance, and Future.
IEEE Trans. Dependable Sec. Comput., 2007

P3P Adoption on E-Commerce Web sites: A Survey and Analysis.
IEEE Internet Computing, 2007

Empirical evaluation of optimization algorithms when used in goal-oriented automated test data generation techniques.
Empirical Software Engineering, 2007

A User-Centered Approach to Modeling BPEL Business Processes Using SUCD Use Cases.
e-Informatica, 2007

A TDD approach to introducing students to embedded programming.
Proceedings of the 12th Annual SIGCSE Conference on Innovation and Technology in Computer Science Education, 2007

2006
COTS acquisition process: incorporating business factors into COTS vendor evaluation taxonomies.
Software Process: Improvement and Practice, 2006

Agile Development of Secure Web-Based Applications.
IJITWE, 2006

Configuring Hybrid Agile-Traditional Software Processes.
Proceedings of the Extreme Programming and Agile Processes in Software Engineering, 2006

Extending the Embedded System E-TDDunit Test Driven Development Tool for Development of a Real Time Video Security System Prototype.
Proceedings of the Extreme Programming and Agile Processes in Software Engineering, 2006

Making Fit / FitNesse Appropriate for Biomedical Engineering Research.
Proceedings of the Extreme Programming and Agile Processes in Software Engineering, 2006

An XP Inspired Test-Oriented Life-Cycle Production Strategy for Building Embedded Biomedical Applications.
Proceedings of the Testing: Academia and Industry Conference, 2006

AGADUC: Towards a More Precise Presentation of Functional Requirement in Use Case Mod.
Proceedings of the Fourth International Conference on Software Engineering, 2006

Matching Antipatterns to Improve the Quality of Use Case Models.
Proceedings of the 14th IEEE International Conference on Requirements Engineering (RE 2006), 2006

2005
Replicating software engineering experiments: a poisoned chalice or the Holy Grail.
Inf. Softw. Technol., 2005

Agile Testing of Location Based Services.
Proceedings of the Extreme Programming and Agile Processes in Software Engineering, 2005

E-TDD - Embedded Test Driven Development a Tool for Hardware-Software Co-design Projects.
Proceedings of the Extreme Programming and Agile Processes in Software Engineering, 2005

A Survey of Test Notations and Tools for Customer Testing.
Proceedings of the Extreme Programming and Agile Processes in Software Engineering, 2005

Testing the Semantics of W3C XML Schema.
Proceedings of the 29th Annual International Computer Software and Applications Conference, 2005

Agile Security Testing of Web-Based Systems via HTTPUnit.
Proceedings of the AGILE 2005 Conference (AGILE 2005), 24-29 July 2005, Denver, CO, USA, 2005

2004
Multi-Project Management in Software Engineering Using Simulation Modelling.
Software Quality Journal, 2004

Multi-project software engineering analysis using systems thinking.
Software Process: Improvement and Practice, 2004

Statistical significance testing--a panacea for software technology experiments? .
Journal of Systems and Software, 2004

COTS Acquisition Process: Incorporating Business Factors in COTS Vendor Evaluation Taxonomy.
Proceedings of the 10th IEEE International Software Metrics Symposium (METRICS 2004), 2004

A Prototype Empirical Evaluation of Test Driven Development.
Proceedings of the 10th IEEE International Software Metrics Symposium (METRICS 2004), 2004

2002
ASSISTing Management Decisions in the Software Inspection Process.
Information Technology and Management, 2002

2000
Applying meta-analytical procedures to software engineering experiments.
Journal of Systems and Software, 2000

1999
Estimating the Number of Remaining Defects after Inspection.
Softw. Test., Verif. Reliab., 1999

Multi-method research: An empirical investigation of object-oriented technology.
Journal of Systems and Software, 1999

A Comparison of Computer Support Systems for Software Inspection.
Autom. Softw. Eng., 1999

Can Results from Software Engineering Experiments be Safely Combined?
Proceedings of the 6th IEEE International Software Metrics Symposium (METRICS 1999), 1999

1998
Further Experiences with Scenarios and Checklists.
Empirical Software Engineering, 1998

ASSISTing Exit Decisions in Software Inspection.
Proceedings of the Thirteenth IEEE Conference on Automated Software Engineering, 1998

1997
A Software Inspection Process Definition Language and Prototype Support Tool.
Softw. Test., Verif. Reliab., 1997

An empirical evaluation of defect detection techniques.
Inf. Softw. Technol., 1997

Statistical power and its subcomponents - missing and misunderstood concepts in empirical software engineering research.
Inf. Softw. Technol., 1997

Comparing and Combining Software Defect Detection Techniques: A Replicated Empirical Study.
Proceedings of the Software Engineering, 1997

1996
Applying Inspection to Object-Oriented Code.
Softw. Test., Verif. Reliab., 1996

Electronic bulletin board distributed questionnaires for exploratory research.
J. Inf. Sci., 1996

Evaluating inheritance depth on the maintainability of object-oriented software.
Empirical Software Engineering, 1996

Automating the Software Inspection Process.
Autom. Softw. Eng., 1996

1995
Towards a benchmark for the evaluation of software testing techniques.
Inf. Softw. Technol., 1995

The effect of inheritance on the maintainability of object-oriented software: an empirical study.
Proceedings of the International Conference on Software Maintenance, 1995

A Survey of Experiences amongst Object-Oriented Practitioners.
Proceedings of the 2nd Asia-Pacific Software Engineering Conference (APSEC '95), 1995

1994
Changing Programming Paradigm - An Empirical Investigation.
Proceedings of the Software Quality and Productivity: Theory, 1994

Verification of Results in Software Maintenance Through External Replication.
Proceedings of the International Conference on Software Maintenance, 1994

Applying object-oriented construction to fault tolerant systems.
Proceedings of the First Asia-Pacific Software Engineering Conference, 1994

1985
Retrofitting machine tools with computer control.
Microprocess. Microsystems, 1985


  Loading...