James Miller

Orcid: 0000-0001-5095-3000

Affiliations:
  • University of Alberta, Department of Electrical and Computer Engineering, Edmonton, AB, Canada
  • University of Strathclyde, Glasgow, UK (PhD)


According to our database1, James Miller authored at least 173 papers between 1985 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Towards Efficient Fine-Tuning of Language Models With Organizational Data for Automated Software Review.
IEEE Trans. Software Eng., September, 2024

ServiceAnomaly: An anomaly detection approach in microservices using distributed traces and profiling metrics.
J. Syst. Softw., March, 2024

Efficient Unsupervised Latency Culprit Ranking in Distributed Traces with GNN and Critical Path Analysis.
Proceedings of the Companion of the 15th ACM/SPEC International Conference on Performance Engineering, 2024

Context-aware Root Cause Localization in Distributed Traces Using Social Network Analysis (Work In Progress paper).
Proceedings of the Companion of the 15th ACM/SPEC International Conference on Performance Engineering, 2024

2023
DCNFIS: Deep Convolutional Neuro-Fuzzy Inference System.
CoRR, 2023

2022
VisExPreS: A Visual Interactive Toolkit for User-Driven Evaluations of Embeddings.
IEEE Trans. Vis. Comput. Graph., 2022

Interpretation of Structural Preservation in Low-Dimensional Embeddings.
IEEE Trans. Knowl. Data Eng., 2022

Semi-Supervised Ensemble Learning for Dealing with Inaccurate and Incomplete Supervision.
ACM Trans. Knowl. Discov. Data, 2022

Integrated-Block: A New Combination Model to Improve Web Page Segmentation.
J. Web Eng., 2022

Automatically inferring user behavior models in large-scale web applications.
Inf. Softw. Technol., 2022

An End-to-End Trainable Deep Convolutional Neuro-Fuzzy Classifier.
Proceedings of the IEEE International Conference on Fuzzy Systems, 2022

A Scalable Blockchain-based Smart Contract Model for Decentralized Voltage Stability Using Sharding Technique.
Proceedings of the IEEE International Conference on Blockchain, 2022

2021
Context-Based Evaluation of Dimensionality Reduction Algorithms - Experiments and Statistical Significance Analysis.
ACM Trans. Knowl. Discov. Data, 2021

TabReformer: Unsupervised Representation Learning for Erroneous Data Detection.
Trans. Data Sci., 2021

A New Semantic Approach to Improve Webpage Segmentation.
J. Web Eng., 2021

Improving News Popularity Estimation via Weak Supervision and Meta-active Learning.
Proceedings of the 54th Hawaii International Conference on System Sciences, 2021

2020
Interpretable Deep Convolutional Fuzzy Classifier.
IEEE Trans. Fuzzy Syst., 2020

Asterisk: Generating Large Training Datasets with Automatic Active Supervision.
Trans. Data Sci., 2020

WeSAL: Applying Active Supervision to Find High-quality Labels at Industrial Scale.
Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020

Towards A Lean Innovative Approach to Rethinking Employees Turnover. Surviving with Less-Knowledge, but not Knowledge-less: A Case Study.
Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020

2019
Integrative Double Kaizen Loop (IDKL): Towards a Culture of Continuous Learning and Sustainable Improvements for Software Organizations.
IEEE Trans. Software Eng., 2019

A Pure Visual Approach for Automatically Extracting and Aligning Structured Web Data.
ACM Trans. Internet Techn., 2019

M-Lean: An end-to-end development framework for predictive models in B2B scenarios.
Inf. Softw. Technol., 2019

The current state of software license renewals in the I.T. industry.
Inf. Softw. Technol., 2019

Automated Testing of Motion-based Events in Mobile Applications.
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019

2018
A comprehensive review of tools for exploratory analysis of tabular industrial datasets.
Vis. Informatics, 2018

Inferring Extended Probabilistic Finite-State Automaton Models from Software Executions.
ACM Trans. Softw. Eng. Methodol., 2018

Cross-Browser Differences Detection Based on an Empirical Metric for Web Page Visual Similarity.
ACM Trans. Internet Techn., 2018

Black-box tree test case generation through diversity.
Autom. Softw. Eng., 2018

Hybridization of Active Learning and Data Programming for Labeling Large Industrial Datasets.
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018

2017
Using π-calculus for Formal Modeling and Verification of WS-CDL Choreographies.
IEEE Trans. Serv. Comput., 2017

A comparative study of the performance of local feature-based pattern recognition algorithms.
Pattern Anal. Appl., 2017

Automated policy generation for testing access control software.
Inf. Secur. J. A Glob. Perspect., 2017

Estimating similarity of rich internet pages using visual information.
Int. J. Web Eng. Technol., 2017

On the Concept of Automatic User Behavior Profiling of Websites.
Int. J. Syst. Serv. Oriented Eng., 2017

Towards Building a New Age Commercial Contextual Advertising System.
Int. J. Syst. Serv. Oriented Eng., 2017

A Fuzzy Recommender System for Public Library Catalogs.
Int. J. Intell. Syst., 2017

Detecting Security Vulnerabilities in Object-Oriented PHP Programs.
Proceedings of the 17th IEEE International Working Conference on Source Code Analysis and Manipulation, 2017

Towards an Innovative Validation-Driven Approach to Lean Product Development.
Proceedings of the 50th Hawaii International Conference on System Sciences, 2017

2016
Identifying semantic blocks in Web pages using Gestalt laws of grouping.
World Wide Web, 2016

Black-Box String Test Case Generation through a Multi-Objective Optimization.
IEEE Trans. Software Eng., 2016

Incorporating Spatial, Temporal, and Social Context in Recommendations for Location-Based Social Networks.
IEEE Trans. Comput. Soc. Syst., 2016

An investigation of implicit features in compression-based learning for comparing webpages.
Pattern Anal. Appl., 2016

Enhancing CAPTCHA Security Using Interactivity, Dynamism, and Mouse Movement Patterns.
Int. J. Syst. Serv. Oriented Eng., 2016

ADAMAS: Interweaving unicode and color to enhance CAPTCHA security.
Future Gener. Comput. Syst., 2016

Policy Generator (PG): A Heuristic-Based Fuzzer.
Proceedings of the 49th Hawaii International Conference on System Sciences, 2016

Kaizen Cookbook: The Success Recipe for Continuous Learning and Improvements.
Proceedings of the 49th Hawaii International Conference on System Sciences, 2016

2015
Enhancing Hardware Assisted Test Insertion Capabilities on Embedded Processors using an FPGA-based Agile Test Support Co-processor.
J. Signal Process. Syst., 2015

Test Case Prioritization Using Extended Digraphs.
ACM Trans. Softw. Eng. Methodol., 2015

The kanban approach, between agility and leanness: a systematic review.
Empir. Softw. Eng., 2015

A New Webpage Classification Model Based on Visual Information Using Gestalt Laws of Grouping.
Proceedings of the Web Information Systems Engineering - WISE 2015, 2015

Workshop on the application of security and testing to rich internet applications.
Proceedings of 25th Annual International Conference on Computer Science and Software Engineering, 2015

2014
Automated cookie collection testing.
ACM Trans. Softw. Eng. Methodol., 2014

Extended Subtree: A New SimilarityFunction for Tree Structured Data.
IEEE Trans. Knowl. Data Eng., 2014

An Anti-Phishing System Employing Diffused Information.
ACM Trans. Inf. Syst. Secur., 2014

An empirical investigation of Web session workloads: Can self-similarity be explained by deterministic chaos?
Inf. Process. Manag., 2014

Waste identification and elimination in information technology organizations.
Empir. Softw. Eng., 2014

Towards Real Time Contextual Advertising.
Proceedings of the Web Information Systems Engineering - WISE 2014, 2014

2013
Centroidal Voronoi Tessellations - A New Approach to Random Testing.
IEEE Trans. Software Eng., 2013

A Survey and Analysis of Current CAPTCHA Approaches.
J. Web Eng., 2013

Refactoring legacy AJAX applications to improve the efficiency of the data exchange component.
J. Syst. Softw., 2013

Securing web-clients with instrumented code and dynamic runtime monitoring.
J. Syst. Softw., 2013

Privacy policies and national culture on the internet.
Inf. Syst. Frontiers, 2013

Deficient documentation detection: a methodology to locate deficient project documentation using topic analysis.
Proceedings of the 10th Working Conference on Mining Software Repositories, 2013

2012
Constructing high quality use case models: a systematic review of current practices.
Requir. Eng., 2012

Embracing Composite Metrics in Software Experiments.
J. Softw., 2012

Is In-Depth Object-Oriented Knowledge Necessary to Develop Quality Robustness Diagrams?
J. Softw., 2012

Refactoring Flash Embedding Methods.
Int. J. Syst. Serv. Oriented Eng., 2012

On Spam Susceptibility and Browser Updating.
Int. J. Syst. Serv. Oriented Eng., 2012

AIWAS: The Automatic Identification of Web Attacks System.
Int. J. Syst. Serv. Oriented Eng., 2012

2011
The Broadcasters' Transition Date Roulette: Strategic Aspects of the DTV Transition.
J. Telecommun. High Technol. Law, 2011

A user-centric evaluation of the readability of privacy policies in popular web sites.
Inf. Syst. Frontiers, 2011

FTT: A System to Refactor Traditional Forms into Ajax-Enabled Forms.
Int. J. Syst. Serv. Oriented Eng., 2011

ART-Improving Execution Time for Flash Applications.
Int. J. Syst. Serv. Oriented Eng., 2011

Token-based graphical password authentication.
Int. J. Inf. Sec., 2011

Consumer trust in e-commerce web sites: A meta-study.
ACM Comput. Surv., 2011

Finding Homoglyphs - A Step towards Detecting Unicode-Based Visual Spoofing Attacks.
Proceedings of the Web Information System Engineering - WISE 2011, 2011

Refactoring Traditional Forms into Ajax-enabled Forms.
Proceedings of the 18th Working Conference on Reverse Engineering, 2011

2010
Detecting visually similar Web pages: Application to phishing detection.
ACM Trans. Internet Techn., 2010

Improving the quality of use case models using antipatterns.
Softw. Syst. Model., 2010

Developing comprehensive acceptance tests from use cases and robustness diagrams.
Requir. Eng., 2010

Prevalence and classification of web page defects.
Online Inf. Rev., 2010

Investigating the Distributional Property of the Session Workload.
J. Web Eng., 2010

Practical Elimination of External Interaction Vulnerabilities in Web Applications.
J. Web Eng., 2010

Chronological fault-based mutation processes for WS-BPEL 2.0 programs.
Int. J. Web Eng. Technol., 2010

An empirical investigation into open source web applications' implementation vulnerabilities.
Empir. Softw. Eng., 2010

Empirical Knowledge Discovery by Triangulation in Computer Science.
Adv. Comput., 2010

Refactoring ActionScript for Improving Application Execution Time.
Proceedings of the Web Information Systems Engineering - WISE 2010 Workshops, 2010

2009
A Test-oriented Embedded System Production Methodology.
J. Signal Process. Syst., 2009

Cookies: A deployment study and the testing implications.
ACM Trans. Web, 2009

A large-scale empirical study of P3P privacy policies: Stated actions vs. legal obligations.
ACM Trans. Web, 2009

A Novel Evolutionary Approach for Adaptive Random Testing.
IEEE Trans. Reliab., 2009

A More Agile Approach to Embedded System Development.
IEEE Softw., 2009

A Survey of Cookie Technology Adoption Amongst Nations.
J. Web Eng., 2009

A Scalable Testing Framework for Location-Based Services.
J. Comput. Sci. Technol., 2009

An analysis of privacy signals on the World Wide Web: Past, present and future.
Inf. Sci., 2009

Empirical observations on the session timeout threshold.
Inf. Process. Manag., 2009

Do You Know Where Your Data Is? A Study of the Effect of Enforcement Strategies on Privacy Policies.
Int. J. Inf. Secur. Priv., 2009

Another viewpoint on "evaluating web software reliability based on workload and failure data extracted from server logs".
Empir. Softw. Eng., 2009

A subject-based empirical evaluation of SSUCD's performance in reducing inconsistencies in use case models.
Empir. Softw. Eng., 2009

2008
Producing robust use case diagrams via reverse engineering of use case descriptions.
Softw. Syst. Model., 2008

How Do We Build Trust into E-commerce Web Sites?
IEEE Softw., 2008

On the possibilities of (pseudo-) software cloning from external interactions.
Soft Comput., 2008

Is HTML in a Race to the Bottom? A Large-Scale Survey and Analysis of Conformance to W3C Standards.
IEEE Internet Comput., 2008

The Theory and Implementation of InputValidator: A Semi-Automated Value-Level Bypass Testing Tool.
Int. J. Inf. Technol. Web Eng., 2008

Triangulation as a basis for knowledge discovery in software engineering.
Empir. Softw. Eng., 2008

A Hardware-Assisted Tool for Fast, Full Code Coverage Analysis.
Proceedings of the 19th International Symposium on Software Reliability Engineering (ISSRE 2008), 2008

Resolving JavaScript Vulnerabilities in the Browser Runtime.
Proceedings of the 19th International Symposium on Software Reliability Engineering (ISSRE 2008), 2008

E-RACE, A Hardware-Assisted Approach to Lockset-Based Data Race Detection for Embedded Products.
Proceedings of the 19th International Symposium on Software Reliability Engineering (ISSRE 2008), 2008

A Three-Tiered Testing Strategy for Cookies.
Proceedings of the First International Conference on Software Testing, 2008

A Service Oriented Architecture for CAX concurrent collaboration.
Proceedings of the 2008 IEEE International Conference on Automation Science and Engineering, 2008

Replication's Role in Software Engineering.
Proceedings of the Guide to Advanced Empirical Software Engineering, 2008

2007
A Survey and Analysis of the P3P Protocol's Agents, Adoption, Maintenance, and Future.
IEEE Trans. Dependable Secur. Comput., 2007

P3P Adoption on E-Commerce Web sites: A Survey and Analysis.
IEEE Internet Comput., 2007

Modeling Defects In E-Projects.
Int. J. Inf. Technol. Web Eng., 2007

Empirical evaluation of optimization algorithms when used in goal-oriented automated test data generation techniques.
Empir. Softw. Eng., 2007

A practical approach to testing GUI systems.
Empir. Softw. Eng., 2007

A User-Centered Approach to Modeling BPEL Business Processes Using SUCD Use Cases.
e Informatica Softw. Eng. J., 2007

A TDD approach to introducing students to embedded programming.
Proceedings of the 12th Annual SIGCSE Conference on Innovation and Technology in Computer Science Education, 2007

2006
COTS acquisition process: incorporating business factors into COTS vendor evaluation taxonomies.
Softw. Process. Improv. Pract., 2006

Automatic test data generation using genetic algorithm and program dependence graphs.
Inf. Softw. Technol., 2006

Agile Development of Secure Web-Based Applications.
Int. J. Inf. Technol. Web Eng., 2006

Configuring Hybrid Agile-Traditional Software Processes.
Proceedings of the Extreme Programming and Agile Processes in Software Engineering, 2006

Extending the Embedded System <i>E-TDDunit </i>Test Driven Development Tool for Development of a Real Time Video Security System Prototype.
Proceedings of the Extreme Programming and Agile Processes in Software Engineering, 2006

Making Fit / FitNesse Appropriate for Biomedical Engineering Research.
Proceedings of the Extreme Programming and Agile Processes in Software Engineering, 2006

An XP Inspired Test-Oriented Life-Cycle Production Strategy for Building Embedded Biomedical Applications.
Proceedings of the Testing: Academia and Industry Conference, 2006

AGADUC: Towards a More Precise Presentation of Functional Requirement in Use Case Mod.
Proceedings of the Fourth International Conference on Software Engineering, 2006

Matching Antipatterns to Improve the Quality of Use Case Models.
Proceedings of the 14th IEEE International Conference on Requirements Engineering (RE 2006), 2006

Developing Secure Web-Based Applications.
Proceedings of the 2006 IEEE International Symposium on Secure Software Engineering, 2006

2005
Replicating software engineering experiments: a poisoned chalice or the Holy Grail.
Inf. Softw. Technol., 2005

Agile Testing of Location Based Services.
Proceedings of the Extreme Programming and Agile Processes in Software Engineering, 2005

E-TDD - Embedded Test Driven Development a Tool for Hardware-Software Co-design Projects.
Proceedings of the Extreme Programming and Agile Processes in Software Engineering, 2005

A Survey of Test Notations and Tools for Customer Testing.
Proceedings of the Extreme Programming and Agile Processes in Software Engineering, 2005

Further investigations into evaluating Web site reliability.
Proceedings of the 2005 International Symposium on Empirical Software Engineering (ISESE 2005), 2005

Testing the Semantics of W3C XML Schema.
Proceedings of the 29th Annual International Computer Software and Applications Conference, 2005

Agile Security Testing of Web-Based Systems via HTTPUnit.
Proceedings of the AGILE 2005 Conference (AGILE 2005), 24-29 July 2005, Denver, CO, USA, 2005

2004
A Cognitive-Based Mechanism for Constructing Software Inspection Teams.
IEEE Trans. Software Eng., 2004

Multi-Project Management in Software Engineering Using Simulation Modelling.
Softw. Qual. J., 2004

Multi-project software engineering analysis using systems thinking.
Softw. Process. Improv. Pract., 2004

Statistical significance testing--a panacea for software technology experiments? .
J. Syst. Softw., 2004

Self-assessment of performance in software inspection processes.
Inf. Softw. Technol., 2004

COTS Acquisition Process: Incorporating Business Factors in COTS Vendor Evaluation Taxonomy.
Proceedings of the 10th IEEE International Software Metrics Symposium (METRICS 2004), 2004

A Prototype Empirical Evaluation of Test Driven Development.
Proceedings of the 10th IEEE International Software Metrics Symposium (METRICS 2004), 2004

2003
Practical assessment of the models for identification of defect-prone classes in object-oriented commercial systems using design metrics.
J. Syst. Softw., 2003

Experiments in Automatic Programming for General Purposes.
Proceedings of the 15th IEEE International Conference on Tools with Artificial Intelligence (ICTAI 2003), 2003

Adding Diversity to Software Inspections.
Proceedings of the 2nd IEEE International Conference on Cognitive Informatics (ICCI 2003), 2003

2002
ASSISTing Management Decisions in the Software Inspection Process.
Inf. Technol. Manag., 2002

2000
Applying meta-analytical procedures to software engineering experiments.
J. Syst. Softw., 2000

Managing Educational Web-dependence.
Proceedings of WebNet 2000 - World Conference on the WWW and Internet, San Antonio, Texas, USA, October 30, 2000

Design and Deployment Decisions within an E-Commerce Environment.
Proceedings of WebNet 2000 - World Conference on the WWW and Internet, San Antonio, Texas, USA, October 30, 2000

1999
Estimating the Number of Remaining Defects after Inspection.
Softw. Test. Verification Reliab., 1999

Multi-method research: An empirical investigation of object-oriented technology.
J. Syst. Softw., 1999

A Comparison of Computer Support Systems for Software Inspection.
Autom. Softw. Eng., 1999

Estimating the Number of Defects at a WWW Site.
Proceedings of WebNet 99, 1999

Groupware support for asynchronous document review.
Proceedings of the 17th annual international conference on Documentation, 1999

Can Results from Software Engineering Experiments be Safely Combined?
Proceedings of the 6th IEEE International Software Metrics Symposium (METRICS 1999), 1999

1998
Further Experiences with Scenarios and Checklists.
Empir. Softw. Eng., 1998

ASSISTing Exit Decisions in Software Inspection.
Proceedings of the Thirteenth IEEE Conference on Automated Software Engineering, 1998

1997
A Software Inspection Process Definition Language and Prototype Support Tool.
Softw. Test. Verification Reliab., 1997

An empirical evaluation of defect detection techniques.
Inf. Softw. Technol., 1997

Statistical power and its subcomponents - missing and misunderstood concepts in empirical software engineering research.
Inf. Softw. Technol., 1997

Comparing and Combining Software Defect Detection Techniques: A Replicated Empirical Study.
Proceedings of the Software Engineering, 1997

1996
Applying Inspection to Object-Oriented Code.
Softw. Test. Verification Reliab., 1996

Electronic bulletin board distributed questionnaires for exploratory research.
J. Inf. Sci., 1996

Evaluating inheritance depth on the maintainability of object-oriented software.
Empir. Softw. Eng., 1996

Automating the Software Inspection Process.
Autom. Softw. Eng., 1996

1995
Towards a benchmark for the evaluation of software testing techniques.
Inf. Softw. Technol., 1995

The effect of inheritance on the maintainability of object-oriented software: an empirical study.
Proceedings of the International Conference on Software Maintenance, 1995

A Survey of Experiences amongst Object-Oriented Practitioners.
Proceedings of the 2nd Asia-Pacific Software Engineering Conference (APSEC '95), 1995

1994
Changing Programming Paradigm - An Empirical Investigation.
Proceedings of the Software Quality and Productivity: Theory, 1994

Verification of Results in Software Maintenance Through External Replication.
Proceedings of the International Conference on Software Maintenance, 1994

Applying object-oriented construction to fault tolerant systems.
Proceedings of the First Asia-Pacific Software Engineering Conference, 1994

1985
Retrofitting machine tools with computer control.
Microprocess. Microsystems, 1985


  Loading...