[1]
M. Al-Salem, M. Almomani, M. Alrefaei, and A. Diabat. On the optimal computing budget allocation problem for large scale simulation optimization. Simulation Modelling Practice and Theory, 71:149–159, 2017. (doi:10.1016/j.simpat.2016.05.004)
[2]
G. Xiao, Z. Zheng, and H. Wang. Evolution of Linux operating system network. Physica A: Statistical Mechanics and its Applications, 466:249–258, 2017. (doi:10.1016/j.physa.2016.09.021)
[3]
Yu Zheng and Xing Xie. Determine spatiotemporal causal interactions in data. United States Patent 9,536,146, January 2017. Assignee: Microsoft Technology Licensing, LLC (Redmond, WA).
[4]
B. Keith and V. Vega. Process mining applications in software engineering. International Conference on Software Process Improvement, CIMPS 2016, 537:47–120, 2017. (doi:10.1007/978-3-319-48523-2_5)
[5]
Y. Roumani, J.K. Nwankpa, and Y.F. Roumani. Adopters' trust in enterprise open source vendors: An empirical examination. Journal of Systems and Software, 125:256–270, 2017. (doi:10.1016/j.jss.2016.12.006)
[6]
P. Delgado-Pérez, I. Medina-Bulo, F. Palomo-Lozano, A. Garcıa-Domınguez, and J.J. Domınguez-Jiménez. Assessment of class mutation operators for C++ with the MuCPP mutation system. Information and Software Technology, 81:169–184, 2017. (doi:10.1016/j.infsof.2016.07.002)
[7]
Paul Gazzillo and Robert Grimm. Configuration-preserving preprocessor. United States Patent 9,542,162, January 2017. Assignee: New York University (New York, NY).
[8]
N. Nahas. Buffer allocation and preventive maintenance optimization in unreliable production lines. Journal of Intelligent Manufacturing, 28(1):85–93, 2017. (doi:10.1007/s10845-014-0963-y)
[9]
Stylianos Sidiroglou, Angelos D. Keromytis, and Salvatore J. Stolfo. Systems, methods, and media protecting a digital data processing device from attack. United States Patent 9,544,322, January 2017. Assignee: The Trustees of Columbia University in the City of New York (New York, NY).