James Miller

According to our database1, James Miller
  • authored at least 147 papers between 1985 and 2017.
  • has a "Dijkstra number"2 of four.



In proceedings 
PhD thesis 


On csauthors.net:


Using π-calculus for Formal Modeling and Verification of WS-CDL Choreographies.
IEEE Trans. Services Computing, 2017

A comparative study of the performance of local feature-based pattern recognition algorithms.
Pattern Anal. Appl., 2017

Automated policy generation for testing access control software.
Information Security Journal: A Global Perspective, 2017

Estimating similarity of rich internet pages using visual information.
Int. J. Web Eng. Technol., 2017

A Fuzzy Recommender System for Public Library Catalogs.
Int. J. Intell. Syst., 2017

Detecting Security Vulnerabilities in Object-Oriented PHP Programs.
Proceedings of the 17th IEEE International Working Conference on Source Code Analysis and Manipulation, 2017

Towards an Innovative Validation-Driven Approach to Lean Product Development.
Proceedings of the 50th Hawaii International Conference on System Sciences, 2017

Identifying semantic blocks in Web pages using Gestalt laws of grouping.
World Wide Web, 2016

Black-Box String Test Case Generation through a Multi-Objective Optimization.
IEEE Trans. Software Eng., 2016

Incorporating Spatial, Temporal, and Social Context in Recommendations for Location-Based Social Networks.
IEEE Trans. Comput. Social Systems, 2016

An investigation of implicit features in compression-based learning for comparing webpages.
Pattern Anal. Appl., 2016

Enhancing CAPTCHA Security Using Interactivity, Dynamism, and Mouse Movement Patterns.
IJSSOE, 2016

ADAMAS: Interweaving unicode and color to enhance CAPTCHA security.
Future Generation Comp. Syst., 2016

Policy Generator (PG): A Heuristic-Based Fuzzer.
Proceedings of the 49th Hawaii International Conference on System Sciences, 2016

Kaizen Cookbook: The Success Recipe for Continuous Learning and Improvements.
Proceedings of the 49th Hawaii International Conference on System Sciences, 2016

Frames: data-driven windows.
Proceedings of the 10th ACM International Conference on Distributed and Event-based Systems, 2016

Enhancing Hardware Assisted Test Insertion Capabilities on Embedded Processors using an FPGA-based Agile Test Support Co-processor.
Signal Processing Systems, 2015

Test Case Prioritization Using Extended Digraphs.
ACM Trans. Softw. Eng. Methodol., 2015

The kanban approach, between agility and leanness: a systematic review.
Empirical Software Engineering, 2015

A New Webpage Classification Model Based on Visual Information Using Gestalt Laws of Grouping.
Proceedings of the Web Information Systems Engineering - WISE 2015, 2015

Workshop on the application of security and testing to rich internet applications.
Proceedings of 25th Annual International Conference on Computer Science and Software Engineering, 2015

Automated cookie collection testing.
ACM Trans. Softw. Eng. Methodol., 2014

Extended Subtree: A New SimilarityFunction for Tree Structured Data.
IEEE Trans. Knowl. Data Eng., 2014

An Anti-Phishing System Employing Diffused Information.
ACM Trans. Inf. Syst. Secur., 2014

An empirical investigation of Web session workloads: Can self-similarity be explained by deterministic chaos?
Inf. Process. Manage., 2014

Waste identification and elimination in information technology organizations.
Empirical Software Engineering, 2014

Towards Real Time Contextual Advertising.
Proceedings of the Web Information Systems Engineering - WISE 2014, 2014

Media in built environments: the technologies of mediatization.
Proceedings of the 2nd Media Architecture Biennale Conference: World Cities, 2014

Centroidal Voronoi Tessellations - A New Approach to Random Testing.
IEEE Trans. Software Eng., 2013

A Survey and Analysis of Current CAPTCHA Approaches.
J. Web Eng., 2013

Refactoring legacy AJAX applications to improve the efficiency of the data exchange component.
Journal of Systems and Software, 2013

Securing web-clients with instrumented code and dynamic runtime monitoring.
Journal of Systems and Software, 2013

Privacy policies and national culture on the internet.
Information Systems Frontiers, 2013

Deficient documentation detection: a methodology to locate deficient project documentation using topic analysis.
Proceedings of the 10th Working Conference on Mining Software Repositories, 2013

Constructing high quality use case models: a systematic review of current practices.
Requir. Eng., 2012

Embracing Composite Metrics in Software Experiments.
JSW, 2012

Is In-Depth Object-Oriented Knowledge Necessary to Develop Quality Robustness Diagrams?
JSW, 2012

Refactoring Flash Embedding Methods.
IJSSOE, 2012

On Spam Susceptibility and Browser Updating.
IJSSOE, 2012

AIWAS: The Automatic Identification of Web Attacks System.
IJSSOE, 2012

The Broadcasters' Transition Date Roulette: Strategic Aspects of the DTV Transition.
JTHTL, 2011

A user-centric evaluation of the readability of privacy policies in popular web sites.
Information Systems Frontiers, 2011

FTT: A System to Refactor Traditional Forms into Ajax-Enabled Forms.
IJSSOE, 2011

ART-Improving Execution Time for Flash Applications.
IJSSOE, 2011

Token-based graphical password authentication.
Int. J. Inf. Sec., 2011

Consumer trust in e-commerce web sites: A meta-study.
ACM Comput. Surv., 2011

Finding Homoglyphs - A Step towards Detecting Unicode-Based Visual Spoofing Attacks.
Proceedings of the Web Information System Engineering - WISE 2011, 2011

Refactoring Traditional Forms into Ajax-enabled Forms.
Proceedings of the 18th Working Conference on Reverse Engineering, 2011

Detecting visually similar Web pages: Application to phishing detection.
ACM Trans. Internet Techn., 2010

Improving the quality of use case models using antipatterns.
Software and System Modeling, 2010

Developing comprehensive acceptance tests from use cases and robustness diagrams.
Requir. Eng., 2010

Prevalence and classification of web page defects.
Online Information Review, 2010

Investigating the Distributional Property of the Session Workload.
J. Web Eng., 2010

Practical Elimination of External Interaction Vulnerabilities in Web Applications.
J. Web Eng., 2010

Chronological fault-based mutation processes for WS-BPEL 2.0 programs.
Int. J. Web Eng. Technol., 2010

An empirical investigation into open source web applications' implementation vulnerabilities.
Empirical Software Engineering, 2010

Empirical Knowledge Discovery by Triangulation in Computer Science.
Advances in Computers, 2010

Refactoring ActionScript for Improving Application Execution Time.
Proceedings of the Web Information Systems Engineering - WISE 2010 Workshops, 2010

A Test-oriented Embedded System Production Methodology.
Signal Processing Systems, 2009

Cookies: A deployment study and the testing implications.
TWEB, 2009

A large-scale empirical study of P3P privacy policies: Stated actions vs. legal obligations.
TWEB, 2009

A Novel Evolutionary Approach for Adaptive Random Testing.
IEEE Trans. Reliability, 2009

A More Agile Approach to Embedded System Development.
IEEE Software, 2009

A Survey of Cookie Technology Adoption Amongst Nations.
J. Web Eng., 2009

A Scalable Testing Framework for Location-Based Services.
J. Comput. Sci. Technol., 2009

An analysis of privacy signals on the World Wide Web: Past, present and future.
Inf. Sci., 2009

Empirical observations on the session timeout threshold.
Inf. Process. Manage., 2009

Do You Know Where Your Data Is? A Study of the Effect of Enforcement Strategies on Privacy Policies.
IJISP, 2009

Another viewpoint on "evaluating web software reliability based on workload and failure data extracted from server logs".
Empirical Software Engineering, 2009

A subject-based empirical evaluation of SSUCD's performance in reducing inconsistencies in use case models.
Empirical Software Engineering, 2009

Producing robust use case diagrams via reverse engineering of use case descriptions.
Software and System Modeling, 2008

How Do We Build Trust into E-commerce Web Sites?
IEEE Software, 2008

On the possibilities of (pseudo-) software cloning from external interactions.
Soft Comput., 2008

Is HTML in a Race to the Bottom? A Large-Scale Survey and Analysis of Conformance to W3C Standards.
IEEE Internet Computing, 2008

The Theory and Implementation of InputValidator: A Semi-Automated Value-Level Bypass Testing Tool.
IJITWE, 2008

Triangulation as a basis for knowledge discovery in software engineering.
Empirical Software Engineering, 2008

A Hardware-Assisted Tool for Fast, Full Code Coverage Analysis.
Proceedings of the 19th International Symposium on Software Reliability Engineering (ISSRE 2008), 2008

Resolving JavaScript Vulnerabilities in the Browser Runtime.
Proceedings of the 19th International Symposium on Software Reliability Engineering (ISSRE 2008), 2008

E-RACE, A Hardware-Assisted Approach to Lockset-Based Data Race Detection for Embedded Products.
Proceedings of the 19th International Symposium on Software Reliability Engineering (ISSRE 2008), 2008

A Three-Tiered Testing Strategy for Cookies.
Proceedings of the First International Conference on Software Testing, 2008

A Service Oriented Architecture for CAX concurrent collaboration.
Proceedings of the 2008 IEEE International Conference on Automation Science and Engineering, 2008

A Survey and Analysis of the P3P Protocol's Agents, Adoption, Maintenance, and Future.
IEEE Trans. Dependable Sec. Comput., 2007

P3P Adoption on E-Commerce Web sites: A Survey and Analysis.
IEEE Internet Computing, 2007

Modeling Defects In E-Projects.
IJITWE, 2007

Empirical evaluation of optimization algorithms when used in goal-oriented automated test data generation techniques.
Empirical Software Engineering, 2007

A practical approach to testing GUI systems.
Empirical Software Engineering, 2007

A User-Centered Approach to Modeling BPEL Business Processes Using SUCD Use Cases.
e-Informatica, 2007

A TDD approach to introducing students to embedded programming.
Proceedings of the 12th Annual SIGCSE Conference on Innovation and Technology in Computer Science Education, 2007

COTS acquisition process: incorporating business factors into COTS vendor evaluation taxonomies.
Software Process: Improvement and Practice, 2006

Automatic test data generation using genetic algorithm and program dependence graphs.
Information & Software Technology, 2006

Agile Development of Secure Web-Based Applications.
IJITWE, 2006

An Overview of the U.S. and Japanese Approaches to Cognitive Radio and SDR.
IEICE Transactions, 2006

Configuring Hybrid Agile-Traditional Software Processes.
Proceedings of the Extreme Programming and Agile Processes in Software Engineering, 2006

Extending the Embedded System E-TDDunit Test Driven Development Tool for Development of a Real Time Video Security System Prototype.
Proceedings of the Extreme Programming and Agile Processes in Software Engineering, 2006

Making Fit / FitNesse Appropriate for Biomedical Engineering Research.
Proceedings of the Extreme Programming and Agile Processes in Software Engineering, 2006

An XP Inspired Test-Oriented Life-Cycle Production Strategy for Building Embedded Biomedical Applications.
Proceedings of the Testing: Academia and Industry Conference, 2006

AGADUC: Towards a More Precise Presentation of Functional Requirement in Use Case Mod.
Proceedings of the Fourth International Conference on Software Engineering, 2006

Matching Antipatterns to Improve the Quality of Use Case Models.
Proceedings of the 14th IEEE International Conference on Requirements Engineering (RE 2006), 2006

Creating Real Value in Software Engineering Experiments.
Proceedings of the Empirical Software Engineering Issues. Critical Assessment and Future Directions, 2006

Replicating software engineering experiments: a poisoned chalice or the Holy Grail.
Information & Software Technology, 2005

Agile Testing of Location Based Services.
Proceedings of the Extreme Programming and Agile Processes in Software Engineering, 2005

E-TDD - Embedded Test Driven Development a Tool for Hardware-Software Co-design Projects.
Proceedings of the Extreme Programming and Agile Processes in Software Engineering, 2005

A Survey of Test Notations and Tools for Customer Testing.
Proceedings of the Extreme Programming and Agile Processes in Software Engineering, 2005

Access grid performance and presentation space.
Proceedings of the 32. International Conference on Computer Graphics and Interactive Techniques, 2005

Further investigations into evaluating Web site reliability.
Proceedings of the 2005 International Symposium on Empirical Software Engineering (ISESE 2005), 2005

Testing the Semantics of W3C XML Schema.
Proceedings of the 29th Annual International Computer Software and Applications Conference, 2005

Agile Security Testing of Web-Based Systems via HTTPUnit.
Proceedings of the AGILE 2005 Conference (AGILE 2005), 24-29 July 2005, Denver, CO, USA, 2005

A Cognitive-Based Mechanism for Constructing Software Inspection Teams.
IEEE Trans. Software Eng., 2004

Multi-Project Management in Software Engineering Using Simulation Modelling.
Software Quality Journal, 2004

Multi-project software engineering analysis using systems thinking.
Software Process: Improvement and Practice, 2004

Statistical significance testing--a panacea for software technology experiments? .
Journal of Systems and Software, 2004

Self-assessment of performance in software inspection processes.
Information & Software Technology, 2004

COTS Acquisition Process: Incorporating Business Factors in COTS Vendor Evaluation Taxonomy.
Proceedings of the 10th IEEE International Software Metrics Symposium (METRICS 2004), 2004

A Prototype Empirical Evaluation of Test Driven Development.
Proceedings of the 10th IEEE International Software Metrics Symposium (METRICS 2004), 2004

Practical assessment of the models for identification of defect-prone classes in object-oriented commercial systems using design metrics.
Journal of Systems and Software, 2003

Experiments in Automatic Programming for General Purposes.
Proceedings of the 15th IEEE International Conference on Tools with Artificial Intelligence (ICTAI 2003), 2003

Adding Diversity to Software Inspections.
Proceedings of the 2nd IEEE International Conference on Cognitive Informatics (ICCI 2003), 2003

ASSISTing Management Decisions in the Software Inspection Process.
Information Technology and Management, 2002

Applying meta-analytical procedures to software engineering experiments.
Journal of Systems and Software, 2000

Managing Educational Web-dependence.
Proceedings of WebNet 2000 - World Conference on the WWW and Internet, San Antonio, Texas, USA, October 30, 2000

Design and Deployment Decisions within an E-Commerce Environment.
Proceedings of WebNet 2000 - World Conference on the WWW and Internet, San Antonio, Texas, USA, October 30, 2000

Estimating the Number of Remaining Defects after Inspection.
Softw. Test., Verif. Reliab., 1999

Multi-method research: An empirical investigation of object-oriented technology.
Journal of Systems and Software, 1999

A Comparison of Computer Support Systems for Software Inspection.
Autom. Softw. Eng., 1999

Estimating the Number of Defects at a WWW Site.
Proceedings of WebNet 99, 1999

Groupware support for asynchronous document review.
Proceedings of the 17th annual international conference on Documentation, 1999

Can Results from Software Engineering Experiments be Safely Combined?
Proceedings of the 6th IEEE International Software Metrics Symposium (METRICS 1999), 1999

Further Experiences with Scenarios and Checklists.
Empirical Software Engineering, 1998

ASSISTing Exit Decisions in Software Inspection.
Proceedings of the Thirteenth IEEE Conference on Automated Software Engineering, 1998

A Software Inspection Process Definition Language and Prototype Support Tool.
Softw. Test., Verif. Reliab., 1997

An empirical evaluation of defect detection techniques.
Information & Software Technology, 1997

Statistical power and its subcomponents - missing and misunderstood concepts in empirical software engineering research.
Information & Software Technology, 1997

Comparing and Combining Software Defect Detection Techniques: A Replicated Empirical Study.
Proceedings of the Software Engineering, 1997

Applying Inspection to Object-Oriented Code.
Softw. Test., Verif. Reliab., 1996

Electronic bulletin board distributed questionnaires for exploratory research.
J. Information Science, 1996

Evaluating inheritance depth on the maintainability of object-oriented software.
Empirical Software Engineering, 1996

PICS: Internet Access Controls Without Censorship.
Commun. ACM, 1996

Automating the Software Inspection Process.
Autom. Softw. Eng., 1996

Towards a benchmark for the evaluation of software testing techniques.
Information & Software Technology, 1995

The effect of inheritance on the maintainability of object-oriented software: an empirical study.
Proceedings of the International Conference on Software Maintenance, 1995

A Survey of Experiences amongst Object-Oriented Practitioners.
Proceedings of the 2nd Asia-Pacific Software Engineering Conference (APSEC '95), 1995

Changing Programming Paradigm - An Empirical Investigation.
Proceedings of the Software Quality and Productivity: Theory, 1994

Verification of Results in Software Maintenance Through External Replication.
Proceedings of the International Conference on Software Maintenance, 1994

Applying object-oriented construction to fault tolerant systems.
Proceedings of the First Asia-Pacific Software Engineering Conference, 1994

Research directions for user interface software tools.
Behaviour & IT, 1993

Validated Retrieval in Case-Based Reasoning.
Proceedings of the 8th National Conference on Artificial Intelligence. Boston, Massachusetts, July 29, 1990

Retrofitting machine tools with computer control.
Microprocessors and Microsystems - Embedded Hardware Design, 1985