Ville Leppänen

Orcid: 0000-0001-5296-677X

Affiliations:
  • University of Turku, Finland


According to our database1, Ville Leppänen authored at least 186 papers between 1994 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Realizing multioperations and multiprefixes in Thick Control Flow processors.
Microprocess. Microsystems, April, 2023

Extracting LPL privacy policy purposes from annotated web service source code.
Softw. Syst. Model., February, 2023

From Whistle to Echo: Data Leaks in Web-Based Whistleblowing Channels.
Proceedings of the Secure IT Systems - 28th Nordic Conference, NordSec 2023, Oslo, Norway, 2023

Preliminary Performance and Memory Access Scalability Study of Thick Control Flow Processors.
Proceedings of the IEEE Nordic Circuits and Systems Conference, 2023

Privacy in Popular Children's Mobile Applications: A Network Traffic Analysis.
Proceedings of the 46th MIPRO ICT and Electronics Convention, 2023

Third-party services as a privacy threat on university websites.
Proceedings of the 24th International Conference on Computer Systems and Technologies, 2023

2022
Performance and programmability comparison of the thick control flow architecture and current multicore processors.
J. Supercomput., 2022

Where Does Your Data Go? Comparing Network Traffic and Privacy Policies of Public Sector Mobile Applications.
Proceedings of the Information Systems and Technologies, 2022

Assessing discrepancies between network traffic and privacy policies of public sector web services.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

2021
Security in agile software development: A practitioner survey.
Inf. Softw. Technol., 2021

From Setting Up Innovation in a Novel Context To Discovering Sustainable Business - A Framework for Short-Term Events.
Proceedings of the 47th Euromicro Conference on Software Engineering and Advanced Applications, 2021

2020
Recent trends in applying TPM to cloud computing.
Secur. Priv., 2020

A mixed methods probe into the direct disclosure of software vulnerabilities.
Comput. Hum. Behav., 2020

Extracting Layered Privacy Language Purposes from Web Services.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020

Network Science, Homophily and Who Reviews Who in the Linux Kernel?
Proceedings of the 28th European Conference on Information Systems, 2020

2019
The General Data Protection Regulation: Requirements, Architectures, and Constraints.
Proceedings of the 27th IEEE International Requirements Engineering Conference, 2019

Annotation-Based Static Analysis for Personal Data Protection.
Proceedings of the Privacy and Identity Management. Data for Better Living: AI and Privacy, 2019

Processos e Práticas Ágeis Sensíveis à Dívida Técnica - Comparação dos Resultados de um Survey Executado no Brasil, Finlândia e Nova Zelândia.
Proceedings of the 25th Americas Conference on Information Systems, 2019

2018
REPLICA MBTAC: multithreaded dual-mode processor.
J. Supercomput., 2018

Supporting concurrent memory access in TCF processor architectures.
Microprocess. Microsystems, 2018

Internal Interface Diversification as a Security Measure in Sensor Networks.
J. Sens. Actuator Networks, 2018

A case study on software vulnerability coordination.
Inf. Softw. Technol., 2018

Diversification and obfuscation techniques for software security: A systematic literature review.
Inf. Softw. Technol., 2018

Technical debt and agile software development practices and processes: An industry practitioner survey.
Inf. Softw. Technol., 2018

Fitting Security into Agile Software Development.
Int. J. Syst. Softw. Secur. Prot., 2018

The Role of Organisational Phenomena in Software Cost Estimation: A Case Study of Supporting and Hindering Factors.
e Informatica Softw. Eng. J., 2018

Mitigating Branch-Shadowing Attacks on Intel SGX using Control Flow Randomization.
CoRR, 2018

Aligning security objectives with agile software development.
Proceedings of the 19th International Conference on Agile Software Development, 2018

Invisible Pixels Are Dead, Long Live Invisible Pixels!
Proceedings of the 2018 Workshop on Privacy in the Electronic Society, 2018

Recognizing Dynamic Fields in Network Traffic with a Manually Assisted Solution.
Proceedings of the Trends and Advances in Information Systems and Technologies, 2018

A Case-Control Study on the Server-Side Bandages Against XSS.
Proceedings of the Seventh Workshop on Software Quality Analysis, 2018

A Survey on the Use of Data Points in IDS Research.
Proceedings of the Tenth International Conference on Soft Computing and Pattern Recognition, 2018

Towards Profiling Program Instances in Host-Based Intrusion Detection Systems by Recognizing Software Update Patterns.
Proceedings of the 11th International Conference on Security of Information and Networks, 2018

Investigating the Effects of Agile Practices and Processes on Technical Debt - The Viewpoint of the Brazilian Software Industry.
Proceedings of the 30th International Conference on Software Engineering and Knowledge Engineering, 2018

On the Integrity of Cross-Origin JavaScripts.
Proceedings of the ICT Systems Security and Privacy Protection, 2018

Crossing Cross-Domain Paths in the Current Web.
Proceedings of the 16th Annual Conference on Privacy, Security and Trust, 2018

Implementation of Multioperations in Thick Control Flow Processors.
Proceedings of the 2018 IEEE International Parallel and Distributed Processing Symposium Workshops, 2018

A Comparison of Online JavaScript Obfuscators.
Proceedings of the International Conference on Software Security and Assurance, 2018

Toward Validation of Textual Information Retrieval Techniques for Software Weaknesses.
Proceedings of the Database and Expert Systems Applications, 2018

Virtual Machine Introspection based Cloud Monitoring Platform.
Proceedings of the 19th International Conference on Computer Systems and Technologies, 2018

2017
Tightroping between APT and BCI in small enterprises.
Inf. Comput. Secur., 2017

Evaluation factors in successful global selective outsourcing operations.
Int. J. Serv. Technol. Manag., 2017

Case Study of Agile Security Engineering: Building Identity Management for a Government Agency.
Int. J. Secur. Softw. Eng., 2017

A Proxy-Based Solution for Asynchronous Telemedical Systems.
Int. J. E Health Medical Commun., 2017

PEN: a power law-enhanced network design for high efficiency multicore architecture.
Concurr. Comput. Pract. Exp., 2017

Modeling the delivery of security advisories and CVEs.
Comput. Sci. Inf. Syst., 2017

A Survey on Anti-honeypot and Anti-introspection Methods.
Proceedings of the Recent Advances in Information Systems and Technologies, 2017

The Impact of Agile Software Development Approach on Software Developers' Responsibilities.
Proceedings of the Recent Advances in Information Systems and Technologies, 2017

Practical challenges in building fake services with the record and play approach.
Proceedings of the 10th International Conference on Security of Information and Networks, 2017

Internal interface diversification with multiple fake interfaces.
Proceedings of the 10th International Conference on Security of Information and Networks, 2017

Top Management Support for Software Cost Estimation - A Case Study of the Current Practice and Impacts.
Proceedings of the Product-Focused Software Process Improvement, 2017

A Survey on Fake Entities as a Method to Detect and Monitor Malicious Activity.
Proceedings of the 25th Euromicro International Conference on Parallel, 2017

Supporting concurrent memory access in TCF-aware processor architectures.
Proceedings of the IEEE Nordic Circuits and Systems Conference, 2017

Mining social networks of open source CVE coordination.
Proceedings of the 27th International Workshop on Software Measurement and 12th International Conference on Software Process and Product Measurement, 2017

Towards a Language Framework for Thick Control Flows.
Proceedings of the 2017 IEEE International Parallel and Distributed Processing Symposium Workshops, 2017

Usability of a gamified application to promote family wellbeing in child health clinics.
Proceedings of the 1st International GamiFIN Conference, Pori, Finland, May 9-10, 2017., 2017

Whose Hands Are in the Finnish Cookie Jar?
Proceedings of the European Intelligence and Security Informatics Conference, 2017

The Transformation Challenge of IT Education and Training in Higher Education and Industry.
Proceedings of the CSEDU 2017, 2017

Measuring Software Security from the Design of Software.
Proceedings of the 18th International Conference on Computer Systems and Technologies, 2017

A Comparison of Record and Play Honeypot Designs.
Proceedings of the 18th International Conference on Computer Systems and Technologies, 2017

A Survey on Application Sandboxing Techniques.
Proceedings of the 18th International Conference on Computer Systems and Technologies, 2017

How PHP Releases Are Adopted in the Wild?
Proceedings of the 24th Asia-Pacific Software Engineering Conference, 2017

Investigating the Agility Bias in DNS Graph Mining.
Proceedings of the 2017 IEEE International Conference on Computer and Information Technology, 2017

"You have a Potential Hacker's Infection": A Study on Technical Support Scams.
Proceedings of the 2017 IEEE International Conference on Computer and Information Technology, 2017

Busting a Myth: Review of Agile Security Engineering Methods.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

Applications of Trusted Computing in Cloud Context.
Proceedings of the Research Advances in Cloud Computing, 2017

Analysis of Security in Modern Container Platforms.
Proceedings of the Research Advances in Cloud Computing, 2017

2016
An outlook on the institutional evolution of the European Union cyber security apparatus.
Gov. Inf. Q., 2016

Exploring the Use of Deprecated PHP Releases in the Wild Internet: Still a LAMP Issue?
Proceedings of the 6th International Conference on Web Intelligence, Mining and Semantics, 2016

Interface diversification in IoT operating systems.
Proceedings of the 9th International Conference on Utility and Cloud Computing, 2016

Security in container-based virtualization through vTPM.
Proceedings of the 9th International Conference on Utility and Cloud Computing, 2016

Outline of a Thick Control Flow Architecture.
Proceedings of the 2016 International Symposium on Computer Architecture and High Performance Computing Workshops, 2016

Trading exploits online: A preliminary case study.
Proceedings of the Tenth IEEE International Conference on Research Challenges in Information Science, 2016

A Survey on Internal Interfaces Used by Exploits and Implications on Interface Diversification.
Proceedings of the Secure IT Systems - 21st Nordic Conference, NordSec 2016, Oulu, Finland, 2016

The REPLICA on-chip network.
Proceedings of the IEEE Nordic Circuits and Systems Conference, 2016

Software Security Considerations for IoT.
Proceedings of the 2016 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2016

LUTMap: A Dynamic Heuristic Application Mapping Algorithm Based on Lookup Tables.
Proceedings of the Internet and Distributed Computing Systems, 2016

Applying Internal Interface Diversification to IoT Operating Systems.
Proceedings of the International Conference on Software Security and Assurance, 2016

The Impact of a Delayed Software Project on Product Launch Coordination: A Case Study.
Proceedings of the 2016 International Conference on Engineering, 2016

The Black Mark beside My Name Server: Exploring the Importance of Name Server IP Addresses in Malware DNS Graphs.
Proceedings of the 4th IEEE International Conference on Future Internet of Things and Cloud Workshops, 2016

Analysing and Modelling the On-Chip Traffic of Parallel Applications.
Proceedings of the 42th Euromicro Conference on Software Engineering and Advanced Applications, 2016

Modelling Propagation of Technical Debt.
Proceedings of the 42th Euromicro Conference on Software Engineering and Advanced Applications, 2016

A Post-Mortem Empirical Investigation of the Popularity and Distribution of Malware Files in the Contemporary Web-Facing Internet.
Proceedings of the 2016 European Intelligence and Security Informatics Conference, 2016

Correlating file-based malware graphs against the empirical ground truth of DNS graphs.
Proceedings of the Proccedings of the 10th European Conference on Software Architecture Workshops, Copenhagen, Denmark, November 28, 2016

An interface diversified honeypot for malware analysis.
Proceedings of the Proccedings of the 10th European Conference on Software Architecture Workshops, Copenhagen, Denmark, November 28, 2016

Practical implications and requirements of diversifying interpreted languages.
Proceedings of the 11th Annual Cyber and Information Security Research Conference, 2016

On the Design of a Simple Network Resolver for DNS Mining.
Proceedings of the 17th International Conference on Computer Systems and Technologies, 2016

Compiler assisted dynamic allocation of finite hardware acceleration resources for parallel tasks.
Proceedings of the 17th International Conference on Computer Systems and Technologies, 2016

A Survey on Aims and Environments of Diversification and Obfuscation in Software Security.
Proceedings of the 17th International Conference on Computer Systems and Technologies, 2016

Software Vulnerability Life Cycles and the Age of Software Products: An Empirical Assertion with Operating System Products.
Proceedings of the Advanced Information Systems Engineering Workshops, 2016

Adoption and Suitability of Software Development Methods and Practices.
Proceedings of the 23rd Asia-Pacific Software Engineering Conference, 2016

Co-Existence of the 'Technical Debt' and 'Software Legacy' Concepts.
Proceedings of the Joint Proceedings of the 4th International Workshop on Quantitative Approaches to Software Quality (QuASoQ 2016) and 1st International Workshop on Technical Debt Analytics (TDA 2016) co-located with the 23rd Asia-Pacific Software Engineering Conference (APSEC 2016), 2016

Exploring the clustering of software vulnerability disclosure notifications across software vendors.
Proceedings of the 13th IEEE/ACS International Conference of Computer Systems and Applications, 2016

Case Study of Security Development in an Agile Environment: Building Identity Management for a Government Agency.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016

2015
Event-driven asynchronous method calls with the D-Bus message system.
Softw. Pract. Exp., 2015

Time series trends in software evolution.
J. Softw. Evol. Process., 2015

PDNOC: Partially diagonal network-on-chip for high efficiency multicore systems.
Concurr. Comput. Pract. Exp., 2015

Performance tuning and sparse traversal technique for a cell-based fetch length algorithm on a GPU.
Concurr. Comput. Pract. Exp., 2015

The sigmoidal growth of operating system security vulnerabilities: An empirical revisit.
Comput. Secur., 2015

Diversifying SQL to Prevent Injection Attacks.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

EyeCloud: A BotCloud Detection System.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Preventing malicious attacks by diversifying Linux shell commands.
Proceedings of the 14th Symposium on Programming Languages and Software Tools (SPLST'15), 2015

Mining knowledge on technical debt propagation.
Proceedings of the 14th Symposium on Programming Languages and Software Tools (SPLST'15), 2015

Securing Scrum for VAHTI.
Proceedings of the 14th Symposium on Programming Languages and Software Tools (SPLST'15), 2015

Accounting testing in software cost estimation: A case study of the current practice and impacts.
Proceedings of the 14th Symposium on Programming Languages and Software Tools (SPLST'15), 2015

Cost of Bandwidth-Optimized Sparse Mesh Layouts.
Proceedings of the Parallel Computing Technologies - 13th International Conference, PaCT 2015, Petrozavodsk, Russia, August 31, 2015

Software evolution and time series volatility: an empirical exploration.
Proceedings of the 14th International Workshop on Principles of Software Evolution, 2015

Parallel Applications and On-chip Traffic Distributions: Observation, Implication and Modelling.
Proceedings of the ICSOFT-EA 2015, 2015

Exploring the Stability of Software with Time-Series Cross-Sectional Data.
Proceedings of the 2nd IEEE/ACM International Workshop on Software Architecture and Metrics, 2015

The Theoretical Connections Between Agile Software Development and Innovative Climate.
Proceedings of the Information and Software Technologies - 21st International Conference, 2015

DBFS: Dual Best-First Search Mapping Algorithm for Shared-Cache Multicore Processors.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

Trio: A Triple Class On-chip Network Design for Efficient Multicore Processors.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

Obfuscation and Diversification for Securing Cloud Computing.
Proceedings of the Enterprise Security - Second International Workshop, 2015

A comparison of security assurance support of agile software development methods.
Proceedings of the 16th International Conference on Computer Systems and Technologies, 2015

Reusability based program clone detection: case study on large scale healthcare software system.
Proceedings of the 16th International Conference on Computer Systems and Technologies, 2015

Towards an extensible, modular compiler construction with scalable abstractions and types.
Proceedings of the 16th International Conference on Computer Systems and Technologies, 2015

Diversification of system calls in linux kernel.
Proceedings of the 16th International Conference on Computer Systems and Technologies, 2015

RefUTU: automatic bibliography database generation for freely formatted reference listings.
Proceedings of the 16th International Conference on Computer Systems and Technologies, 2015

Security and Privacy in Cloud Computing via Obfuscation and Diversification: A Survey.
Proceedings of the 7th IEEE International Conference on Cloud Computing Technology and Science, 2015

Cache- and Communication-aware Application Mapping for Shared-cache Multicore Processors.
Proceedings of the Architecture of Computing Systems - ARCS 2015, 2015

2014
NUMA Computing with Hardware and Software Co-Support on Configurable Emulated Shared Memory Architectures.
Int. J. Netw. Comput., 2014

Symbol diversification of linux binaries.
Proceedings of the 2014 World Congress on Internet Security, 2014

A Proxy-Based Security Solution for Web-Based Online eHealth Services.
Proceedings of the Safe and Secure Cities, 2014

BDMap: A Heuristic Application Mapping Algorithm for the Big Data Era.
Proceedings of the 2014 IEEE 11th Intl Conf on Ubiquitous Intelligence and Computing and 2014 IEEE 11th Intl Conf on Autonomic and Trusted Computing and 2014 IEEE 14th Intl Conf on Scalable Computing and Communications and Its Associated Workshops, 2014

Prototyping the MBTAC Processor for the REPLICA CMP.
Proceedings of the 2014 IEEE International Parallel & Distributed Processing Symposium Workshops, 2014

Diversification of System Calls in Linux Binaries.
Proceedings of the Trusted Systems - 6th International Conference, 2014

Technical Debt and the Effect of Agile Software Development Practices on It - An Industry Practitioner Survey.
Proceedings of the Sixth International Workshop on Managing Technical Debt, 2014

Towards a diversification framework for operating system protection.
Proceedings of the 15th International Conference on Computer Systems and Technologies, 2014

Two-phase routing in three-dimensional blocked optical tori.
Proceedings of the 15th International Conference on Computer Systems and Technologies, 2014

Exploration of a Heterogeneous Concentrated-Sparse On-Chip Interconnect for Energy Efficient Multicore Architecture.
Proceedings of the 14th IEEE International Conference on Computer and Information Technology, 2014

Illustrating Software Modifiability - Capturing Cohesion and Coupling in a Force-Optimized Graph.
Proceedings of the 14th IEEE International Conference on Computer and Information Technology, 2014

2013
An Extended PRAM-NUMA Model of Computation for TCF Programming.
Int. J. Netw. Comput., 2013

PDNOC: An Efficient Partially Diagonal Network-on-Chip Design.
Proceedings of the Parallel Processing and Applied Mathematics, 2013

Hardware and Software Support for NUMA Computing on Configurable Emulated Shared Memory Architectures.
Proceedings of the 2013 IEEE International Symposium on Parallel & Distributed Processing, 2013

<i>DebtFlag</i>: technical debt management with a development environment integrated tool.
Proceedings of the 4th International Workshop on Managing Technical Debt, 2013

DSNOC: A Hybrid Dense-Sparse Network-on-Chip Architecture for Efficient Scalable Computing.
Proceedings of the IEEE 11th International Conference on Dependable, 2013

Towards a parallel debugging framework for the massively multi-threaded, step-synchronous REPLICA architecture.
Proceedings of the Computer Systems and Technologies, 2013

2012
Routing in Coloured Sparse Optical Tori by Using Balanced WDM and Network Sparseness.
Int. J. Distributed Syst. Technol., 2012

Design of the Language Replica for Hybrid PRAM-NUMA Many-core Architectures.
Proceedings of the 10th IEEE International Symposium on Parallel and Distributed Processing with Applications, 2012

Browser extension-based man-in-the-browser attacks against Ajax applications with countermeasures.
Proceedings of the 2012 Conference on Computer Systems and Technologies, 2012

Preliminary analysis of feasible benchmark problems for the hydrid PRAM/NUMA REPLICA architecture.
Proceedings of the 2012 Conference on Computer Systems and Technologies, 2012

Work-optimal two-phase routing in a sparse optical torus.
Proceedings of the 2012 Conference on Computer Systems and Technologies, 2012

2011
A moving threads processor architecture MTPA.
J. Supercomput., 2011

Balanced WDM and TDM Routing in Coloured Sparse Optical Tori.
Proceedings of the Sixth International Symposium on Parallel Computing in Electrical Engineering (PARELEC 2011), 2011

Cost of Sparse Mesh Layouts Supporting Throughput Computing.
Proceedings of the 14th Euromicro Conference on Digital System Design, 2011

A parallel GPU implementation of an algorithm for determining directional distances.
Proceedings of the 12th International Conference on Computer Systems and Technologies, 2011

RISC-based moving threads multicore architecture.
Proceedings of the 12th International Conference on Computer Systems and Technologies, 2011

A layout for sparse cube-connected-cycles network.
Proceedings of the 12th International Conference on Computer Systems and Technologies, 2011

2010
Thinning protocols for routing h-relations over shared media.
J. Parallel Distributed Comput., 2010

Layouts for Sparse Networks Supporting Throughput Computing.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2010

Lambda-Systolic Routing in a Dense Optical Torus.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2010

Supporting Concurrent Memory Access and Multioperations in Moving Threads CMPs.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2010

Towards programming on the moving threads architecture.
Proceedings of the 11th International Conference on Computer Systems and Technologies and Workshop for PhD Students in Computing, 2010

Work-optimal routing in wavelength-division multiplexed three-dimensional dense optical tori.
Proceedings of the 11th International Conference on Computer Systems and Technologies and Workshop for PhD Students in Computing, 2010

2009
Client-based cohesion metrics for Java programs.
Sci. Comput. Program., 2009

Determining directional distances between points and shorelines using sweep line technique.
Int. J. Geogr. Inf. Sci., 2009

Improving the Performance of Bus Platforms by Means of Segmentation and Optimized Resource Allocation.
EURASIP J. Embed. Syst., 2009

Experimental Evaluation of Interpretations for Local Cohesion Metrics.
Proceedings of the 2009 International Conference on Software Engineering Research & Practice, 2009

Object-Oriented Design Pattern: Access Protector.
Proceedings of the 2009 International Conference on Software Engineering Research & Practice, 2009

MTPA - A Processor Architecture for MP-SOCs Employing the Moving Threads Paradigm.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2009

Outline of RISC-based core for multiprocessor on chip architecture supporting moving threads.
Proceedings of the 2009 International Conference on Computer Systems and Technologies and Workshop for PhD Students in Computing, 2009

MVTsim: software simulator for multicore on chip parallel computer architectures.
Proceedings of the 2009 International Conference on Computer Systems and Technologies and Workshop for PhD Students in Computing, 2009

Experiences with embedding MPL security monitors into Java programs.
Proceedings of the 2009 International Conference on Computer Systems and Technologies and Workshop for PhD Students in Computing, 2009

2008
Embedding Rule-Based Security Monitors into Java Programs.
Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference, 2008

2007
Quantifying distances from points to polygons - applications in determining fetch in coastal environments.
Comput. Geosci., 2007

Device allocation on the SegBus platform based on communication scheduling cost minimization.
Proceedings of the 2007 IEEE International SOC Conference, 2007

Safe Aliasing for Java-Like languages.
Proceedings of the 2007 International Conference on Software Engineering Research & Practice, 2007

A software metric for coherence of class roles in Java programs.
Proceedings of the 5th International Symposium on Principles and Practice of Programming in Java, 2007

Moving Threads: A Non-Conventional Approach for Mapping Computation to MP-SOC.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2007

Address-Free All-to-All Routing in Sparse Torus.
Proceedings of the Parallel Computing Technologies, 2007

A compact aspect-based security monitor for J2ME applications.
Proceedings of the 2007 International Conference on Computer Systems and Technologies, 2007

External views on class cohesion.
Proceedings of the 2007 International Conference on Computer Systems and Technologies, 2007

Client based Object-Oriented Cohesion Metrics.
Proceedings of the 31st Annual International Computer Software and Applications Conference, 2007

2005
Resource allocation methodology for the segmented bus platform.
Proceedings of the Proceedings 2005 IEEE International SOC Conference, 2005

2004
Recurrence equation as basis for designing hot-potato routing protocols.
Proceedings of the 5th International Conference on Computer Systems and Technologies, 2004

2001
Hot-Potato Routing Algorithms for Sparse Optical Torus.
Proceedings of the 30th International Workshops on Parallel Processing (ICPP 2001 Workshops), 2001

1998
Balanced PRAM Simulations via Moving Threads and Hashing.
J. Univers. Comput. Sci., 1998

Constant Thinning Protocol for Routing h-Relations in Complete Networks.
Proceedings of the Euro-Par '98 Parallel Processing, 1998

1997
Embedding and Emulation Results for Static Multichannel Mesh of Optical Buses.
Proceedings of the Euro-Par '97 Parallel Processing, 1997

1996
Efficient Two-Level Mesh based Simulation of PRAMs.
Proceedings of the 1996 International Symposium on Parallel Architectures, 1996

Goodness of Time-Processor Optimal PRAM Simulations.
Proceedings of the Euro-Par '96 Parallel Processing, 1996

Simulations of PRAM on Complete Optical Networks.
Proceedings of the Euro-Par '96 Parallel Processing, 1996

1995
Work-Optimal Simulation of PRAM Models on Meshes.
Nord. J. Comput., 1995

On Implementing EREW Work-Optimally on Mesh of Trees.
J. Univers. Comput. Sci., 1995

Performance of Work-Optimal PRAM Simulation Algorithms on Coated Meshes.
Comput. J., 1995

1994
Simulation of PRAM Models on Meshes.
Proceedings of the PARLE '94: Parallel Architectures and Languages Europe, 1994


  Loading...