default search action
Mehdi Mirakhorli
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j14]Joanna C. S. Santos, Mehdi Mirakhorli, Ali Shokri:
Seneca: Taint-Based Call Graph Construction for Java Object Deserialization. Proc. ACM Program. Lang. 8(OOPSLA1): 1125-1153 (2024) - [c72]Hamid Bagheri, Mehdi Mirakhorli, Mohamad Fazelnia, Ibrahim Mujhid, Md Rashedul Hasan:
Neuro-Symbolic Approach to Certified Scientific Software Synthesis. AIware 2024 - [c71]Viktoria Koscinski, Mehdi Mirakhorli:
Formally Modeled Common Weakness Enumerations (CWEs). ASE Workshops 2024: 88-93 - [c70]Mohamad Fazelnia, Mehdi Mirakhorli, Hamid Bagheri:
Translation Titans, Reasoning Challenges: Satisfiability-Aided Language Models for Detecting Conflicting Requirements. ASE 2024: 2294-2298 - [c69]Mohamad Fazelnia, Viktoria Koscinski, Spencer Herzog, Mehdi Mirakhorli:
Lessons from the Use of Natural Language Inference (NLI) in Requirements Engineering Tasks. RE 2024: 103-115 - [i17]Mehdi Mirakhorli, Derek Garcia, Schuyler Dillon, Kevin Laporte, Matthew Morrison, Henry Lu, Viktoria Koscinski, Christopher Enoch:
A Landscape Study of Open Source and Proprietary Tools for Software Bill of Materials (SBOM). CoRR abs/2402.11151 (2024) - [i16]Ali Shokri, Ibrahim Jameel Mujhid, Mehdi Mirakhorli:
IPSynth: Interprocedural Program Synthesis for Software Security Implementation. CoRR abs/2403.10836 (2024) - [i15]Mohamad Fazelnia, Viktoria Koscinski, Spencer Herzog, Mehdi Mirakhorli:
Lessons from the Use of Natural Language Inference (NLI) in Requirements Engineering Tasks. CoRR abs/2405.05135 (2024) - [i14]Beatrice Casey, Joanna C. S. Santos, Mehdi Mirakhorli:
A Large-Scale Exploit Instrumentation Study of AI/ML Supply Chain Attacks in Hugging Face Models. CoRR abs/2410.04490 (2024) - [i13]Mohamad Fazelnia, Sara Moshtari, Mehdi Mirakhorli:
Establishing Minimum Elements for Effective Vulnerability Management in AI Software. CoRR abs/2411.11317 (2024) - 2023
- [j13]Mohamad Fazelnia, Ahmet Okutan, Mehdi Mirakhorli:
Supporting Artificial Intelligence/Machine Learning Security Workers Through an Adversarial Techniques, Tools, and Common Knowledge Framework. IEEE Secur. Priv. 21(1): 37-48 (2023) - [j12]Ahmet Okutan, Peter Mell, Mehdi Mirakhorli, Igor Khokhlov, Joanna C. S. Santos, Danielle Gonzalez, Steven Simmons:
Empirical Validation of Automated Vulnerability Curation and Characterization. IEEE Trans. Software Eng. 49(5): 3241-3260 (2023) - [c68]Joshua Garcia, Mehdi Mirakhorli, Lu Xiao, Sam Malek, Rick Kazman, Yuanfang Cai, Nenad Medvidovic:
SAIN: A Community-Wide Software Architecture INfrastructure. ICSE Companion 2023: 336-337 - [c67]Viktoria Koscinski, Sara Hashemi, Mehdi Mirakhorli:
On-Demand Security Requirements Synthesis with Relational Generative Adversarial Networks. ICSE 2023: 1609-1621 - [i12]Ahmet Okutan, Ali Shokri, Viktoria Koscinski, Mohamad Fazelnia, Mehdi Mirakhorli:
A Novel Approach to Identify Security Controls in Source Code. CoRR abs/2307.05605 (2023) - [i11]Joanna C. S. Santos, Mehdi Mirakhorli, Ali Shokri:
Sound Call Graph Construction for Java Object Deserialization. CoRR abs/2311.00943 (2023) - 2022
- [c66]Joanna C. S. Santos, Selma Suloglu, Néstor Cataño, Mehdi Mirakhorli:
A Methodological Approach to Verify Architecture Resiliency. ECSA (Tracks and Workshops) 2022: 321-336 - [c65]Sara Moshtari, Ahmet Okutan, Mehdi Mirakhorli:
A Grounded Theory Based Approach to Characterize Software Attack Surfaces. ICSE 2022: 13-24 - [c64]Ahmet Okutan, Mehdi Mirakhorli:
Predicting the severity and exploitability of vulnerability reports using convolutional neural nets. EnCyCriS@ICSE 2022: 1-8 - [i10]Mohamad Fazelnia, Igor Khokhlov, Mehdi Mirakhorli:
Attacks, Defenses, And Tools: A Framework To Facilitate Robust AI/ML Systems. CoRR abs/2202.09465 (2022) - [i9]Mohamad Fazelnia, Ahmet Okutan, Mehdi Mirakhorli:
Supporting AI/ML Security Workers through an Adversarial Techniques, Tools, and Common Knowledge (AI/ML ATT&CK) Framework. CoRR abs/2211.05075 (2022) - 2021
- [c63]Danielle Gonzalez, Paola Peralta Perez, Mehdi Mirakhorli:
Barriers to Shift-Left Security: The Unique Pain Points of Writing Automated Tests Involving Security Controls. ESEM 2021: 11:1-11:12 - [c62]Ali Shokri, Joanna C. S. Santos, Mehdi Mirakhorli:
ArCode: Facilitating the Use of Application Frameworks to Implement Tactics and Patterns. ICSA 2021: 138-149 - [c61]Joshua Garcia, Mehdi Mirakhorli, Lu Xiao, Yutong Zhao, Ibrahim Mujhid, Khoi Pham, Ahmet Okutan, Sam Malek, Rick Kazman, Yuanfang Cai, Nenad Medvidovic:
Constructing a Shared Infrastructure for Software Architecture Analysis and Maintenance. ICSA 2021: 150-161 - [c60]Ali Shokri, Mehdi Mirakhorli:
ArCode: A Tool for Supporting Comprehension and Implementation of Architectural Concerns. ICPC 2021: 485-489 - [c59]Joanna C. S. Santos, Reese A. Jones, Chinomso Ashiogwu, Mehdi Mirakhorli:
Serialization-aware call graph construction. SOAP@PLDI 2021: 37-42 - [c58]Viktoria Koscinski, Celeste Gambardella, Estey Gerstner, Mark Zappavigna, Jennifer Cassetti, Mehdi Mirakhorli:
A Natural Language Processing Technique for Formalization of Systems Requirement Specifications. RE Workshops 2021: 350-356 - [e5]Tao Yue, Mehdi Mirakhorli:
29th IEEE International Requirements Engineering Conference Workshops, RE 2021 Workshops, Notre Dame, IN, USA, September 20-24, 2021. IEEE 2021, ISBN 978-1-6654-1898-0 [contents] - [i8]Ali Shokri, Joanna C. S. Santos, Mehdi Mirakhorli:
ArCode: Facilitating the Use of Application Frameworks to Implement Tactics and Patterns. CoRR abs/2102.08372 (2021) - [i7]Ali Shokri, Mehdi Mirakhorli:
ArCode: A Tool for Supporting Comprehension andImplementation of Architectural Concerns. CoRR abs/2103.06735 (2021) - [i6]Ali Shokri, Mehdi Mirakhorli:
DepRes: A Tool for Resolving Fully Qualified Names and Their Dependencies. CoRR abs/2108.01165 (2021) - [i5]Sara Moshtari, Ahmet Okutan, Mehdi Mirakhorli:
A Grounded Theory Based Approach to Characterize Software Attack Surfaces. CoRR abs/2112.01635 (2021) - 2020
- [j11]Mehdi Mirakhorli, Matthias Galster, Laurie A. Williams:
Understanding Software Security from Design to Deployment. ACM SIGSOFT Softw. Eng. Notes 45(2): 25-26 (2020) - [c57]Joanna C. S. Santos, Reese A. Jones, Mehdi Mirakhorli:
Salsa: static analysis of serialization features. FTfJP@ECOOP 2020: 18-25 - [c56]Jan Keim, Angelika Kaplan, Anne Koziolek, Mehdi Mirakhorli:
Does BERT Understand Code? - An Exploratory Study on the Detection of Architectural Tactics in Code. ECSA 2020: 220-228 - [c55]Joanna C. S. Santos, Sara Moshtari, Mehdi Mirakhorli:
An Automated Approach to Recover the Use-case View of an Architecture. ICSA Companion 2020: 63-66 - [c54]Joanna C. S. Santos, Selma Suloglu, Joanna Ye, Mehdi Mirakhorli:
Towards an Automated Approach for Detecting Architectural Weaknesses in Critical Systems. ICSE (Workshops) 2020: 250-253 - [c53]Joanna C. S. Santos, Ali Shokri, Mehdi Mirakhorli:
Towards Automated Evidence Generation for Rapid and Continuous Software Certification. ISSRE Workshops 2020: 287-294 - [c52]Devjeet Roy, Ziyi Zhang, Maggie Ma, Venera Arnaoudova, Annibale Panichella, Sebastiano Panichella, Danielle Gonzalez, Mehdi Mirakhorli:
DeepTC-Enhancer: Improving the Readability of Automatically Generated Tests. ASE 2020: 287-298 - [c51]Danielle Gonzalez, Michael Rath, Mehdi Mirakhorli:
Did You Remember To Test Your Tokens? MSR 2020: 232-242 - [c50]Sara Moshtari, Joanna C. S. Santos, Mehdi Mirakhorli, Ahmet Okutan:
Looking for Software Defects? First Find the Nonconformists. SCAM 2020: 75-86 - [i4]Danielle Gonzalez, Michael Rath, Mehdi Mirakhorli:
Did You Remember to Test Your Tokens? CoRR abs/2006.14553 (2020)
2010 – 2019
- 2019
- [j10]Joanna C. S. Santos, Katy Tarrit, Adriana Sejfia, Mehdi Mirakhorli, Matthias Galster:
An empirical study of tactical vulnerabilities. J. Syst. Softw. 149: 263-284 (2019) - [c49]Danielle Gonzalez, Fawaz Alhenaki, Mehdi Mirakhorli:
Architectural Security Weaknesses in Industrial Control Systems (ICS) an Empirical Study Based on Disclosed Software Vulnerabilities. ICSA 2019: 31-40 - [c48]Danielle Gonzalez, Holly Hastings, Mehdi Mirakhorli:
Automated Characterization of Software Vulnerabilities. ICSME 2019: 135-139 - [c47]Joanna C. S. Santos, Adriana Sejfia, Taylor Corrello, Smruthi Gadenkanahalli, Mehdi Mirakhorli:
Achilles' heel of plug-and-Play software architectures: a grounded theory based approach. ESEC/SIGSOFT FSE 2019: 671-682 - [e4]Nenad Medvidovic, Mehdi Mirakhorli, Sam Malek, Joshua Garcia, Yuanfang Cai, Rick Kazman, Lu Xiao:
Proceedings of the 2nd International Workshop on Establishing a Community-Wide Infrastructure for Architecture-Based Software Engineering, ECASE@ICSE 2019, May 27, 2019, Montreal, Quebec, Canada. IEEE / ACM 2019, ISBN 978-1-7281-2241-0 [contents] - [i3]Danielle Gonzalez, Holly Hastings, Mehdi Mirakhorli:
Automated Characterization of Software Vulnerabilities. CoRR abs/1909.13693 (2019) - 2018
- [c46]Matthias Galster, Danny Weyns, Antony Tang, Rick Kazman, Mehdi Mirakhorli:
From craft to science: the road ahead for empirical software engineering research. ICSE (NIER) 2018: 77-80 - [c45]Inayat Rehman, Mehdi Mirakhorli, Meiyappan Nagappan, Azat Aralbay Uulu, Matthew Thornton:
Roles and impacts of hands-on software architects in five industrial case studies. ICSE 2018: 117-127 - [c44]Yuzhan Ma, Sarah Fakhoury, Michael Christensen, Venera Arnaoudova, Waleed Zogaan, Mehdi Mirakhorli:
Automatic classification of software artifacts in open-source applications. MSR 2018: 414-425 - [c43]Danielle Gonzalez, Suzanne Prentice, Mehdi Mirakhorli:
A fine-grained approach for automated conversion of JUnit assertions to English. NL4SE@ESEC/SIGSOFT FSE 2018: 14-17 - [e3]Mehdi Mirakhorli, Matthias Galster:
Proceedings of the 1st International Workshop on Security Awareness from Design to Deployment, SEAD@ICSE 2018, Gothenburg, Sweden, May 27, 2018. ACM 2018, ISBN 978-1-4503-5727-2 [contents] - [i2]Danielle Gonzalez, Suzanne Prentice, Mehdi Mirakhorli:
A Fine-Grained Approach for Automated Conversion of JUnit Assertions to English. CoRR abs/1811.05005 (2018) - 2017
- [j9]Waleed Zogaan, Ibrahim Mujhid, Joanna C. S. Santos, Danielle Gonzalez, Mehdi Mirakhorli:
Automated training-set creation for software architecture traceability problem. Empir. Softw. Eng. 22(3): 1028-1062 (2017) - [j8]Ibrahim Mujhid, Joanna C. S. Santos, Raghuram Gopalakrishnan, Mehdi Mirakhorli:
A search engine for finding and reusing architecturally significant code. J. Syst. Softw. 130: 81-93 (2017) - [c42]Joanna C. S. Santos, Anthony Peruma, Mehdi Mirakhorli, Matthias Galster, Jairo Veloz Vidal, Adriana Sejfia:
Understanding Software Vulnerabilities Related to Architectural Security Tactics: An Empirical Investigation of Chromium, PHP and Thunderbird. ICSA 2017: 69-78 - [c41]Joanna C. S. Santos, Katy Tarrit, Mehdi Mirakhorli:
A Catalog of Security Architecture Weaknesses. ICSA Workshops 2017: 220-223 - [c40]Nenad Medvidovic, Sam Malek, Mehdi Mirakhorli, Joshua Garcia:
1st International Workshop on Establishing the Community-Wide Infrecaseructure for Architecture-Based Software Engineering (ECASE 2017). ECASE@ICSE 2017: 1 - [c39]Raghuram Gopalakrishnan, Palak Sharma, Mehdi Mirakhorli, Matthias Galster:
Can latent topics in source code predict missing architectural tactics? ICSE 2017: 15-26 - [c38]Héctor Adrián Valdecantos, Katy Tarrit, Mehdi Mirakhorli, James O. Coplien:
An empirical study on code comprehension: data context interaction compared to classical object oriented. ICPC 2017: 275-285 - [c37]Danielle Gonzalez, Joanna C. S. Santos, Andrew Popovich, Mehdi Mirakhorli, Meiyappan Nagappan:
A large-scale study on the usage of testing patterns that address maintainability attributes: patterns for ease of modification, diagnoses, and comprehension. MSR 2017: 391-401 - [c36]Waleed Zogaan, Palak Sharma, Mehdi Mirakhorli, Venera Arnaoudova:
Datasets from Fifteen Years of Automated Requirements Traceability Research: Current State, Characteristics, and Quality. RE 2017: 110-121 - [i1]Danielle Gonzalez, Joanna C. S. Santos, Andrew Popovich, Mehdi Mirakhorli, Meiyappan Nagappan:
A Large-Scale Study on the Usage of Testing Patterns that Address Maintainability Attributes (Patterns for Ease of Modification, Diagnoses, and Comprehension). CoRR abs/1704.08412 (2017) - 2016
- [j7]Matthias Galster, Mehdi Mirakhorli, Nenad Medvidovic:
Bringing Architecture Thinking into Developers' Daily Activities. ACM SIGSOFT Softw. Eng. Notes 41(6): 24-26 (2016) - [j6]Mehdi Mirakhorli, Jane Cleland-Huang:
Detecting, Tracing, and Monitoring Architectural Tactics in Code. IEEE Trans. Software Eng. 42(3): 206-221 (2016) - [c35]Danielle Gonzalez, Andrew Popovich, Mehdi Mirakhorli:
TestEX: A Search Tool for Finding and Retrieving Example Unit Tests from Open Source Projects. ISSRE Workshops 2016: 153-159 - [c34]Daniel E. Krutz, Mehdi Mirakhorli:
Architectural clones: toward tactical code reuse. SAC 2016: 1480-1485 - [c33]Joanna C. S. Santos, Mehdi Mirakhorli, Ibrahim Mujhid, Waleed Zogaan:
BUDGET: A Tool for Supporting Software Architecture Traceability Research. WICSA 2016: 303-306 - 2015
- [j5]Matthias Galster, Mehdi Mirakhorli, Anne Koziolek:
Twin Peaks goes Agile. ACM SIGSOFT Softw. Eng. Notes 40(5): 47-49 (2015) - [c32]Mehdi Mirakhorli, Hong-Mei Chen, Rick Kazman:
Mining Big Data for Detecting, Extracting and Recommending Architectural Design Concepts. BIGDSE@ICSE 2015: 15-18 - [c31]Saeed Namdar, Mehdi Mirakhorli:
Toward Actionable Software Architecture Traceability. SST@ICSE 2015: 36-42 - [c30]Meiyappan Nagappan, Mehdi Mirakhorli:
Big(ger) Data in Software Engineering. ICSE (2) 2015: 957-958 - [c29]Matthias Galster, Mehdi Mirakhorli:
5th International Workshop on the Twin Peaks of Requirements and Architecture (TwinPeaks 2015). ICSE (2) 2015: 1017-1018 - [c28]Ehsan Kouroshfar, Mehdi Mirakhorli, Hamid Bagheri, Lu Xiao, Sam Malek, Yuanfang Cai:
A Study on the Role of Software Architecture in the Evolution and Quality of Software. MSR 2015: 246-257 - [c27]Mehdi Mirakhorli, Jane Cleland-Huang:
Modifications, Tweaks, and Bug Fixes in Architectural Tactics. MSR 2015: 377-380 - [c26]Daniel E. Krutz, Mehdi Mirakhorli, Samuel A. Malachowsky, Andres Ruiz, Jacob Peterson, Andrew Filipski, Jared Smith:
A Dataset of Open-Source Android Applications. MSR 2015: 522-525 - [c25]Jane Cleland-Huang, Mona Rahimi, Mehdi Mirakhorli:
Ready-Set-Transfer! Technology transfer in the requirements engineering domain. RE 2015: 412-413 - [c24]Catherine Ramirez, Meiyappan Nagappan, Mehdi Mirakhorli:
Studying the impact of evolution in R libraries on software engineering research. SWAN@SANER 2015: 29-30 - [c23]Mehdi Mirakhorli:
Software architecture reconstruction: Why? What? How? SANER 2015: 595 - [e2]Matthias Galster, Mehdi Mirakhorli:
5th IEEE/ACM International Workshop on the Twin Peaks of Requirements and Architecture, TwinPeaks 2015, Florence, Italy, May 17, 2015. IEEE Computer Society 2015, ISBN 978-1-4673-7100-1 [contents] - 2014
- [j4]Matthias Galster, Mehdi Mirakhorli, Jane Cleland-Huang, Xavier Franch, Janet E. Burge, Roshanak Roshandel, Paris Avgeriou:
Towards bridging the twin peaks of requirements and architecture. ACM SIGSOFT Softw. Eng. Notes 39(5): 3:30-3:31 (2014) - [c22]Jane Cleland-Huang, Muhammad Ali Babar, Mehdi Mirakhorli:
An inverted classroom experience: engaging students in architectural thinking for agile projects. ICSE Companion 2014: 364-371 - [c21]Mona Rahimi, Mehdi Mirakhorli, Jane Cleland-Huang:
Automated extraction and visualization of quality concerns from requirements specifications. RE 2014: 253-262 - [c20]Mehdi Mirakhorli, Ahmed Fakhry, Artem Grechko, Mateusz Wieloch, Jane Cleland-Huang:
Archie: a tool for detecting, monitoring, and preserving architecturally significant code. SIGSOFT FSE 2014: 739-742 - [e1]Jane Cleland-Huang, Paris Avgeriou, Janet E. Burge, Xavier Franch, Matthias Galster, Mehdi Mirakhorli, Roshanak Roshandel:
Proceedings of the 4th International Workshop on Twin Peaks of Requirements and Architecture, TwinPeaks 2014, Hyderabad, India, June 1, 2014. ACM 2014, ISBN 978-1-4503-2848-7 [contents] - 2013
- [j3]Matthias Galster, Mehdi Mirakhorli, Jane Cleland-Huang, Janet E. Burge, Xavier Franch, Roshanak Roshandel, Paris Avgeriou:
Views on software engineering from the twin peaks of requirements and architecture. ACM SIGSOFT Softw. Eng. Notes 38(5): 40-42 (2013) - [j2]Mehdi Mirakhorli, Jane Cleland-Huang:
Traversing the Twin Peaks. IEEE Softw. 30(2): 30-36 (2013) - [j1]Negar Hariri, Carlos Castro-Herrera, Mehdi Mirakhorli, Jane Cleland-Huang, Bamshad Mobasher:
Supporting Domain Analysis through Mining and Recommending Features from Online Product Listings. IEEE Trans. Software Eng. 39(12): 1736-1752 (2013) - [c19]Jane Cleland-Huang, Mehdi Mirakhorli, Adam Czauderna, Mateusz Wieloch:
Decision-Centric Traceability of architectural concerns. TEFSE@ICSE 2013: 5-11 - [c18]Paris Avgeriou, Janet E. Burge, Jane Cleland-Huang, Xavier Franch, Matthias Galster, Mehdi Mirakhorli, Roshanak Roshandel:
2nd international workshop on the twin peaks of requirements and architecture (TwinPeaks 2013). ICSE 2013: 1556-1557 - [c17]Mehdi Mirakhorli:
Preventing erosion of architectural tactics through their strategic implementation, preservation, and visualization. ASE 2013: 762-765 - [c16]Mehdi Mirakhorli, Julia Carvalho, Jane Cleland-Huang, Patrick Mäder:
A domain-centric approach for recommending architectural tactics to satisfy quality concerns. TwinPeaks@RE 2013: 1-8 - 2012
- [c15]Mehdi Mirakhorli, Yonghee Shin, Jane Cleland-Huang, Murat Çinar:
A tactic-centric approach for automating traceability of quality concerns. ICSE 2012: 639-649 - [c14]Jane Cleland-Huang, Patrick Mäder, Mehdi Mirakhorli, Sorawit Amornborvornwong:
Breaking the big-bang practice of traceability: Pushing timely trace recommendations to project stakeholders. RE 2012: 231-240 - [c13]Mehdi Mirakhorli, Patrick Mäder, Jane Cleland-Huang:
Variability points and design pattern usage in architectural tactics. SIGSOFT FSE 2012: 52 - [p1]Mehdi Mirakhorli, Jane Cleland-Huang:
Tracing Non-Functional Requirements. Software and Systems Traceability 2012: 299-320 - 2011
- [c12]Mehdi Mirakhorli, Jane Cleland-Huang:
Transforming trace information in architectural documents into re-usable and effective traceability links. SHARK@ICSE 2011: 45-52 - [c11]Horatiu Dumitru, Marek Gibiec, Negar Hariri, Jane Cleland-Huang, Bamshad Mobasher, Carlos Castro-Herrera, Mehdi Mirakhorli:
On-demand feature recommendations derived from mining public product descriptions. ICSE 2011: 181-190 - [c10]Mehdi Mirakhorli, Jane Cleland-Huang:
Tracing architectural concerns in high assurance systems. ICSE 2011: 908-911 - [c9]Mehdi Mirakhorli:
Tracing architecturally significant requirements: a decision-centric approach. ICSE 2011: 1126-1127 - [c8]Mehdi Mirakhorli, Jane Cleland-Huang:
Using tactic traceability information models to reduce the risk of architectural degradation during system maintenance. ICSM 2011: 123-132 - [c7]Mehdi Mirakhorli, Jane Cleland-Huang:
A pattern system for tracing architectural concerns. PLoP 2011: 5:1-5:10
2000 – 2009
- 2008
- [c6]Mehdi Mirakhorli, Abdorrahman Khanipour Rad, Fereidoon Shams Aliee, Abbas Mirakhorli, Maryam Pazoki:
RDP Technique: Take a Different Look at XP for Adoption. Australian Software Engineering Conference 2008: 656-662 - [c5]Mehdi Mirakhorli, Abdorrahman Khanipour Rad, Fereidoon Shams, Maryam Pazoki, Abbas Mirakhorli:
RDP technique: a practice to customize xp. APOS@ICSE 2008: 23-32 - [c4]Fereidoon Shams, Amir Azim Sharifloo, Mehdi Mirakhorli, Mostafa Emaeli:
A service driven development process (sddp) model for ultra large scale systems. ULSSIS@ICSE 2008: 37-40 - [c3]Amir Azim Sharifloo, Mehdi Mirakhorli, Fereidoon Shams:
How could ULS systems achieve architecture benefits? ULSSIS@ICSE 2008: 41-44 - [c2]Mehdi Mirakhorli, Amir Azim Sharifloo, Fereidoon Shams:
Architectural challenges of ultra large scale systems. ULSSIS@ICSE 2008: 45-48 - 2007
- [c1]Mehdi Mirakhorli, Amir Azim Sharifloo, Maghsoud Abbaspour:
A Novel Method for Leader Election Algorithm. CIT 2007: 452-456
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 23:01 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint