Folgen
Tomas Cerny
Titel
Zitiert von
Zitiert von
Jahr
Contextual understanding of microservice architecture: current and future directions
T Cerny, MJ Donahoo, M Trnka
ACM SIGAPP Applied Computing Review 17 (4), 29-45, 2018
2592018
Survey of Authentication and Authorization for the Internet of Things
M Trnka, T Cerny, N Stickney
Security and Communication Networks 2018 (1), 4351603, 2018
952018
Disambiguation and comparison of soa, microservices and self-contained systems
T Cerny, MJ Donahoo, J Pechanec
Proceedings of the International Conference on research in adaptive and …, 2017
862017
Aspects of quality in Internet of Things (IoT) solutions: A systematic mapping study
BS Ahmed, M Bures, K Frajtak, T Cerny
IEEE Access 7, 13758-13780, 2019
662019
Internet of things: Current challenges in the quality assurance and testing methods
M Bures, T Cerny, BS Ahmed
International conference on information science and applications, 625-634, 2018
592018
Aspect-driven, Data-reflective and Context-aware User Interfaces Design
T Cerny, K Cemus, MJ Donahoo, E Song
Applied Computing Review 13 (4), 53-65, 2013
51*2013
On Microservice Analysis and Architecture Evolution: A Systematic Mapping Study
V Bushong, AS Abdelfattah, AA Maruf, D Das, A Lehman, E Jaroszewski, ...
Applied Sciences 11 (17), 2021
502021
Open-source tools and benchmarks for code-clone detection: past, present, and future trends
A Walker, T Cerny, E Song
ACM SIGAPP Applied Computing Review 19 (4), 28-39, 2020
482020
Context-sensitive, cross-platform user interface generation
M Macik, T Cerny, P Slavik
Journal on Multimodal User Interfaces, 1-13, 2014
472014
Microservice architecture reconstruction and visualization techniques: A review
T Cerny, AS Abdelfattah, V Bushong, A Al Maruf, D Taibi
2022 IEEE International Conference on Service-Oriented System Engineering …, 2022
462022
Automated code-smell detection in microservices through static analysis: A case study
A Walker, D Das, T Cerny
Applied Sciences 10 (21), 7800, 2020
432020
On vulnerability and security log analysis: A systematic literature review on recent trends
J Svacina, J Raffety, C Woodahl, B Stone, T Cerny, M Bures, D Shin, ...
Proceedings of the International Conference on Research in Adaptive and …, 2020
412020
On security level usage in context-aware role-based access control
M Trnka, T Cerny
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 1192-1195, 2016
392016
Aspect-oriented challenges in system integration with microservices, SOA and IoT
T Cerny
Enterprise Information Systems 13 (4), 467-489, 2019
382019
Competitive and Collaborative Approach Towards a More Effective Education in Computer Science
T Cerny, B Mannova
CONTEMPORARY EDUCATIONAL TECHNOLOGY 2 (2), 163-173, 2011
352011
Systematic Review of Authentication and Authorization Advancements for the Internet of Things
M Trnka, AS Abdelfattah, A Shrestha, M Coffey, T Cerny
Sensors 22 (4), 2022
292022
Advancing static code analysis with language-agnostic component identification
M Schiewe, J Curtis, V Bushong, T Cerny
IEEE Access 10, 30743-30761, 2022
272022
Identity management of devices in internet of things environment
M Trnka, T Cerny
2016 6th international conference on it convergence and security (ICITCS), 1-4, 2016
272016
On distributed concern delivery in user interface design
T Cerny, M Macik, MJ Donahoo, J Janousek
Computer Science and Information Systems 12 (2), 655-681, 2015
262015
Towards effective adaptive user interfaces design
T Cerny, MJ Donahoo, E Song
Proceedings of the 2013 Research in Adaptive and Convergent Systems, 373-380, 2013
252013
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20