Search

Showing total 5,283 results

Search Constraints

Start Over You searched for: Topic computer software Remove constraint Topic: computer software Publisher wiley-blackwell Remove constraint Publisher: wiley-blackwell
5,283 results

Search Results

1. Top 100 most‐cited oral health‐related quality of life papers: Bibliometric analysis.

2. Prevalence of nonsensical algorithmically generated papers in the scientific literature.

3. 91‐5: Late‐News Paper: The MicroAssembler: Deterministic Fluidic Assembly for Manufacturing MicroLED Displays.

4. Scheduling Function-Foreman Interface on Paper Mill Maintenance Projects.

6. Software processes: a retrospective and a path to the future <FNR></FNR><FN>This paper is an expanded version of the keynote presentation given by Carlo Ghezzi at the 5th International Conference on Software Process (Lisle, IL, 14–17 June 1998)...

7. Rapid understanding of scientific paper collections: Integrating statistics, text analytics, and visualization.

8. Panelists' Performances and Strategies in Paper-Based and Computer-Based Projective Mapping.

10. Software gegen Fälschung.

11. From paper-and-pen annotations to artefact-based mobile learning.

12. SimPharm: How pharmacy students made meaning of a clinical case differently in paper- and simulation-based workshops.

13. A retrospective view of software maintenance and reengineering research -- a selection of papers from European Conference on Software Maintenance and Reengineering 2010.

14. Computerized testing augments pencil-and-paper tasks in measuring HIV-associated mild cognitive impairment.

15. ORIGINAL PAPER First comparison of productivity and citrate donor load between the Trima® version 4 (dual-stage filler) and the Trima Accel® (single-stage filler) in the same donors.

16. A review of methods for evaluation of maturity models for process improvement.

17. Systematic literature review on software architecture of educational websites.

18. Special Issue: Selected Papers from the 2004 U.K. e-Science All Hands Meeting (AHM 2004).

19. Trends in Anorexia Nervosa Research: An Analysis of the Top 100 Most Cited Works.

20. Engaging students with online assignments: a replacement for digital dropboxes and paper assignments.

21. Editorial: Why are you submitting to the ISJ?

22. International coauthorship and citation impact: A bibliometric study of six LIS journals, 1980-2008.

23. Code Bad Smells: a review of current knowledge.

24. A selection of distinguished papers from the 19th Working Conference on Reverse Engineering 2012.

25. A selection of distinguished papers from the 19th Working Conference on Reverse Engineering 2012.

26. Editorial: Why should I review papers?

27. A comparison of concurrent programming and cooperative multithreading<FN>A preliminary version of this paper appeared in Euro–Par 2000, held in Munich, Germany, August 2000 </FN>.

28. A many objective based feature selection model for software defect prediction.

29. Evolution of secure development lifecycles and maturity models in the context of hosted solutions.

30. Formal analysis of some secure procedures for certificate delivery<FNR></FNR><FN>An early version of this paper appeared as ‘Automated analysis of some security mechanisms of SCEP’ by Fabio Martinelli, Marinella Petrocchi and Anna Vaccarelli in Proceedings of the Fifth International Information Security Conference (ISC 2002), (Lecture Notes in Computer Science, vol. 2433), pp. 414–427 [1], Copyright © 2002 Springer-Verlag. This revised and extended version appears here with the permission of Springer-Verlag </FN>

31. Experimental evaluation of the tolerance for control-flow test criteria<FNR></FNR><FN>A version of this paper was originally presented at SoftTest II: The Second U.K. Workshop on Software Testing Research, held at the University of York, U.K., 4–5 September 2003. It is reproduced here in modified form with the permission of the Workshop organizers </FN>

32. DISCUSSION ON THE PAPER BY STEELE.

33. A test of the design of a video tutorial for software training.

34. Attributes of communication aids as described by those supporting children and young people with AAC.

35. 25‐2: Invited Paper: Predicting Excited State Lifetimes from Scratch Using Quantum Theory: Results from the ORCA Software.

36. Comparison of Automated Crater Catalogs for Mars From Benedix et al. (2020) and Lee and Hogan (2021).

37. Specification and testing of autonomous agents in e-commerce systems<FNR></FNR><FN>Parts of this paper appeared in ‘Specification of autonomous agents in e-commerce systems’ by Ismael Rodríguez, Manuel Núñez and Fernando Rubio and in ‘Testing of autonomous agents described as utility state machines’ by Manuel Núñez, Ismael Rodríguez and Fernando Rubio, Lecture Notes in Computer Science, vol. 3236 (pp. 30–43 and 322–336, respectively) © 2004 Springer-Verlag. This revised and expanded version appears with the permission of Springer-Verlag </FN>

38. Concurrent software fine‐coarse‐grained automatic modelling by Coloured Petri Nets for model checking.

39. Software effort estimation accuracy prediction of machine learning techniques: A systematic performance evaluation.

40. Language and gesture neural correlates: A meta‐analysis of functional magnetic resonance imaging studies.

41. Behaviour change communication to improve complementary feeding practices in Ethiopia: Couples' beliefs concerning paternal involvement in childcare.

42. A Cognitive Method for Comparing and Elaborating on Technology Frames.

43. Multi‐stakeholder structured dialogues: Five generations of evolution of dialogic design.

44. Computers and Qualitative Data Analysis: Paper, Pens, and Highlighters vs. Screen, Mouse, and Keyboard.

45. TIM—a test improvement model<FNR></FNR><FN>A version of this paper was originally presented at the 4th European Conference on Software Testing, Analysis and Review (EuroSTAR ‘96) and it is reproduced here in modified form with the permission of EuroSTAR Conferences and Software Quality Engineering </FN>

46. Unit and integration testing strategies for C programs using mutation<FN>A version of this paper was originally presented at Mutation 2000, a Symposium on Mutation Testing, held in San Jose, California, 6–7 October 2000. It is reproduced here in modified form with the permission of the Symposium organizers. </FN>

47. Investigating the effectiveness of object-oriented testing strategies using the mutation method<FN>A version of this paper was originally presented at Mutation 2000, a Symposium on Mutation Testing, held in San Jose, California, 6–7 October 2000. It is reproduced here in modified form with the permission of the Symposium organizers. </FN>

48. A framework for practical, automated black-box testing of component-based software<FNR>†</FNR><FN>A version of this paper was originally presented at the First International Workshop on Automated Program Analysis, Testing and Verification, held in Limerick, Ireland, 4–5 June 2000. It is reproduced here in modified form with the permission of the Workshop organizers. </FN>

49. Software model checking: extracting verification models from source code<FNR>†</FNR><FN>An earlier version of this paper appeared in the Proceedings of FORTE XII/PSTV XIX, which was published as: Formal Methods for Protocol Engineering and Distributed Systems, Wu J, Chanson ST, Gao Q (eds.). Kluwer, 1999; 481–499. It is reproduced here in modified form with the permission of Kluwer Academic Publishers. </FN>

50. Embedding key word sign prompts in a shared book reading activity: The impact on communication between children with Down syndrome and their parents.