Mladen A. Vouk
#166,313
Most Influential Person Now
Mladen A. Vouk's AcademicInfluence.com Rankings
Mladen A. Voukcomputer-science Degrees
Computer Science
#10008
World Rank
#10500
Historical Rank
Cloud Computing
#45
World Rank
#46
Historical Rank
Database
#6959
World Rank
#7201
Historical Rank

Download Badge
Computer Science
Mladen A. Vouk's Degrees
- PhD Computer Science University of Belgrade
- Masters Computer Science University of Belgrade
- Bachelors Computer Science University of Belgrade
Similar Degrees You Can Earn
Why Is Mladen A. Vouk Influential?
(Suggest an Edit or Addition)Mladen A. Vouk's Published Works
Number of citations in a given year to any of this author's works
Total number of citations to an author for the works they published in a given year. This highlights publication of the most important work(s) by the author
Published Works
- Cloud computing — Issues, research and implementations (2008) (777)
- Cloud Computing – Issues, Research and Implementations (2008) (714)
- Software Reliability Engineering (1999) (332)
- On the value of static analysis for fault detection in software (2006) (272)
- Test-driven development as a defect-reduction practice (2003) (212)
- An Experimental Evaluation of Software Redundancy as a Strategy For Improving Reliability (1991) (211)
- SDIoT: a software defined based internet of things framework (2015) (193)
- The next generation of integrated air quality modeling: EPA's models-3 (1996) (150)
- NCSU's Virtual Computing Lab: A Cloud Computing Solution (2009) (107)
- Abstracting log lines to log event types for mining software system logs (2010) (106)
- Software defined cloud: Survey, system and evaluation (2016) (106)
- Scientific Process Automation and Workflow Management (2009) (102)
- Balancing Cognitive and Motivational Scaffolding in Tutorial Dialogue (2008) (92)
- Predicting Shine–Dalgarno Sequence Locations Exposes Genome Annotation Errors (2006) (85)
- Prioritizing software security fortification throughcode-level metrics (2008) (81)
- On predicting the time taken to correct bug reports in open source projects (2009) (68)
- SDSecurity: A Software Defined Security experimental framework (2015) (68)
- Workflow and End-User Quality of Service Issues in Web-Based Education (1999) (66)
- A development environment for distributed synchronous collaborative programming (2008) (65)
- SDStorage: A Software Defined Storage Experimental Framework (2015) (64)
- Investigating the Relationship Between Dialogue Structure and Tutoring Effectiveness: A Hidden Markov Modeling Approach (2011) (59)
- A large scale second generation experiment in multi-version software: description and early results (1988) (55)
- On back-to-back testing (1988) (54)
- A high resolution investigation of the recombination radiation from Si containing the acceptors B, Al, Ga, In and Tl (1977) (53)
- Reliability of voting in fault-tolerant software systems for small output-spaces (1990) (53)
- Early estimation of software quality using in-process testing metrics: a controlled case study (2005) (53)
- Efficiently Extracting Operational Profiles from Execution Logs Using Suffix Arrays (2009) (52)
- SU(6) quadrupole phonon model for even and odd nuclei and the SU(3) limit (1982) (52)
- An error-correcting code framework for genetic sequence analysis (2003) (50)
- On effectiveness of pairwise methodology for testing network-centric software (2005) (50)
- The Reliable Hybrid Pattern A Generalized Software Fault Tolerant Design Pattern (1997) (49)
- Using VCL technology to implement distributed reconfigurable data centers and computational services for educational institutions (2009) (49)
- Preliminary results on using static analysis tools for software inspection (2004) (45)
- SDDC: A Software Defined Datacenter Experimental Framework (2015) (44)
- A modeling and execution environment for distributed scientific workflows (2003) (44)
- Using Reliability Models During Testing With Non-Operational Profiles* (2002) (44)
- Defensive computer-security deception operations: processes, principles and techniques (2006) (41)
- Specification‐based testing using cause‐effect graphs (1997) (41)
- Characterizing the Effectiveness of Tutorial Dialogue with Hidden Markov Models (2010) (41)
- Resource-constrained non-operational testing of software (1998) (40)
- Experimental Analysis of the Q-Matrix Method in Knowledge Discovery (2005) (39)
- Dialogue Act Modeling in a Complex Task-Oriented Domain (2010) (39)
- On operational availability of a large software-based telecommunications system (1992) (37)
- Automatic test generation for predicates (1996) (36)
- The Virtual Computing Lab (VCL): An Open Source Cloud Computing Solution Designed Specifically for Education and Research (2014) (35)
- Providing test quality feedback using static source code and automatic test suite metrics (2005) (35)
- Introduction to scientific workflow management and the Kepler system (2006) (35)
- Discovering Tutorial Dialogue Strategies with Hidden Markov Models (2009) (34)
- An experimental evaluation on reliability features of N-version programming (2005) (34)
- Simulation of Fusion Plasmas: Current Status and Future Direction (2007) (33)
- Two-phonon assisted free exciton recombination radiation from intrinsic silicon (1977) (33)
- An experimental evaluation of the effectiveness of random testing of fault-tolerant software (1986) (33)
- Field data analysis (1996) (32)
- The Effects of the Business Model on Object-Oriented Software Development Productivity (1997) (31)
- Network Computing (1999) (31)
- Towards a Metric Suite for Early Software Reliability Assessment (2003) (31)
- Empirical studies of predicate-based software testing (1994) (31)
- Modeling Dialogue Structure with Adjacency Pair Analysis and Hidden Markov Models (2009) (30)
- Coding theory based models for protein translation initiation in prokaryotic organisms. (2004) (30)
- A Fault-Tolerance Architecture for Kepler-Based Distributed Scientific Workflows (2010) (29)
- Quality of service and scientific workflows (1996) (28)
- Optimizing effectiveness and efficiency of software testing: a hybrid approach (2006) (28)
- Evaluation of a Predicate-Based Software Testing Strategy (1994) (28)
- Towards a Unifying Approach in Understanding Security Problems (2009) (27)
- Tracking Files in the Kepler Provenance Framework (2009) (26)
- Early estimation of software quality using in-process testing metrics (2005) (26)
- Learner Characteristics and Feedback in Tutorial Dialogue (2008) (25)
- Classification of Escherichia coli K-12 ribosome binding sites (2006) (25)
- The Influence of Learner Characteristics on Task-Oriented Tutorial Dialogue (2007) (25)
- Evidence for a Cost Effective Cloud Computing Implementation Based Upon the NC State Virtual Computing Laboratory Model (2008) (25)
- Analysis of coding theory based models for initiating protein translation in prokaryotic organisms (2002) (24)
- Measuring the field quality of wide-distribution commercial software (1992) (24)
- A case for smaller class size with integrated lab for introductory computer science (2007) (23)
- Some issues in multi-phase software reliability modeling (1993) (23)
- Increasing technical excellence, leadership and commitment of computing students through identity-based mentoring (2010) (23)
- Fault-tolerant software reliability engineering (1996) (22)
- Toward a first-principles integrated simulation of tokamak edge plasmas (2008) (22)
- An Approach to the Modeling and Analysis of Software Production Processes (1995) (22)
- Analysis of faults detected in a large-scale multi-version software development experiment (1990) (21)
- Equipment Operator Training in the Age of Internet2 (2002) (20)
- GERT: an empirical reliability estimation and testing feedback tool (2004) (20)
- A table-driven (feedback) decoder (1991) (20)
- Enhancing security of Hadoop in a public cloud (2015) (19)
- On mining data across software repositories (2009) (19)
- Communication genres: Integrating communication into the software engineering curriculum (2011) (19)
- Integration of High-Performance Computing into Cloud Computing Services (2010) (19)
- An Empirical Evaluation of Consensus Voting and Consensus Recovery Block Reliability in the Presence of Failure Correlation (2007) (18)
- On testing of functionally equivalent components of fault-tolerant software (1986) (18)
- Principles of asking effective questions during student problem solving (2010) (18)
- Accelerating the scientific exploration process with scientific workflows (2006) (18)
- An Empirically-Derived Question Taxonomy for Task-Oriented Tutorial Dialogue (2009) (17)
- Investigating the role of student motivation in computer science education through one-on-one tutoring (2009) (17)
- Collaborative visualization spaces for petascale simulations (2008) (16)
- Table based decoding of rate one-half convolutional codes (1995) (16)
- Teaching software testing: Experiences, lessons learned and the path forward (2011) (16)
- Modeling cloud failure data: a case study of the virtual computing lab (2011) (16)
- Data management on the fusion computational pipeline (2005) (16)
- Early estimation of defect density using an in-process Haskell metrics model (2005) (16)
- Productivity analysis of object‐oriented software developed in a commercial environment (1999) (16)
- Coding model for translation in E. coli K-12 (1999) (15)
- Automatic test-generation for predicates [software testing] (1996) (15)
- On Reliability Analysis of Open Source Software - FEDORA (2008) (14)
- Analysis of Free Energy Signals Arising from Nucleotide Hybridization Between rRNA and mRNA Sequences during Translation in Eubacteria (2006) (14)
- The impact of instructor initiative on student learning: a tutoring study (2009) (14)
- An empirical evaluation of maximum likelihood voting in failure correlation conditions (1996) (13)
- DiffServ experiments: analysis of the premium service over the Alcatel-NCSU Internet2 testbed (2002) (13)
- Modeling execution time of multi-stage N-version fault-tolerant software (1990) (13)
- The ribosome as a table-driven convolutional decoder for the Escherichia coli K-12 translation initiation system (2000) (13)
- "Days of the week" effect in predicting the time taken to fix defects (2009) (12)
- Automation of Network-Based Scientific Workflows (2007) (12)
- Composition Constraints for Semantic Web Services (2002) (12)
- Predictive models for identifying software components prone to failure during security attacks (2008) (12)
- On the cost of mixed language programming (1984) (12)
- Verifying commitment based business protocols and their compositions: model checking using promela and spin (2006) (12)
- Construction of Reliable Software in Resource‐Constrained Environments (2003) (12)
- Locally Invertible Multivariate Polynomial Matrices (2005) (11)
- On Locally Invertible Rate-1/n Convolutional Encoders (1998) (11)
- Study of proton-hole states in 61Co using the 62Ni(d, 3He)61Co reaction at 78 MeV (1984) (11)
- Fault-tolerant software voters based on fuzzy equivalence relations (1998) (11)
- Early estimation of defect density using an in-process Haskell metrics model (2005) (11)
- Collaboration portal for petascale simulations (2009) (11)
- Deadlock detection of EFSMs using simultaneous reachability analysis (2000) (11)
- Using In-Process Testing Metrics to Estimate Post-Release Field Quality (2007) (11)
- A Model for Sharing of Confidential Provenance Information in a Query Based System (2008) (11)
- A novel framework for software defined based secure storage systems (2017) (10)
- Conditions necessary for the formation of the electron-hole liquid in diamond and calculation of its parameters (1979) (10)
- An empirical study of security problem reports in Linux distributions (2009) (10)
- CS/SE Instructors Can Improve Student Writing without Reducing Class Time Devoted to Technical Content: Experimental Results (2015) (10)
- Development productivity for commercial software using object-oriented methods (1995) (10)
- A study of software security problem disclosure, correction and patching processes (2011) (10)
- Using In-Process Metrics to Predict Defect Density in Haskell Programs (2004) (10)
- Low-lying levels of 77Se studied by thermal neutron capture and evidence for a new term in the E2 operator of RQM (IBM) (1985) (10)
- A CODING THEORY FRAMEWORK FOR GENETIC SEQUENCE ANALYSIS (2002) (9)
- A survey of common security vulnerabilities and corresponding countermeasures for SaaS (2014) (9)
- An investigation of the recombination radiation from the electron-hole condensate in intrinsic silicon (1975) (9)
- SDM center technologies for accelerating scientific discoveries (2007) (9)
- Collaborative monitoring and analysis for simulation scientists (2010) (9)
- "Good enough" software reliability estimation plug-in for Eclipse (2003) (9)
- Using In-Process Testing Metrics to Estimate Software Reliability: A Feasibility Study (2004) (9)
- Proton-hole states in 57Co studied with the 58Ni(d, 3He) 57Co reaction at 78 MeV (1985) (8)
- Productivity Analysis of Object-Oriented Software Development in a Commercial Environment (1999) (8)
- Leveraging Hidden Dialogue State to Select Tutorial Moves (2010) (8)
- Performance of Network-Based Problem-Solving Environments (2000) (7)
- Utilizing Open Source Cloud Computing Environments to Provide Cost Effective Support for University Education and Research (2012) (7)
- A Lightweight Software Bus for Prototyping Problem Solving Environments (1996) (7)
- Reliability and availability of a wide area network-based education system (1996) (7)
- Free energy periodicity in E. coli coding (2000) (7)
- Luminescence associated with transitions from an excited state of the bound excitons in P, As, Sb and Bi doped Si (1977) (7)
- Investigating complexity metrics as indicators of software vulnerability (2011) (7)
- Using software reliability models for security assessment — Verification of assumptions (2013) (7)
- Verifying Constraints on Web Service Compositions (2002) (7)
- Fault-based test generation for cause-effect graphs (1993) (7)
- Initial results of using in-process testing metrics to estimate software reliability (2004) (6)
- A Lost Cell Recovery Technique Using Convolutional Coding at the ATM Adaptation Layer in B-ISDN/ATM (1993) (6)
- Towards a Bayesian Approach in Modeling the Disclosure of Unique Security Faults in Open Source Projects (2010) (6)
- Characterizing communication instruction in computer science and engineering programs: Methods and applications (2012) (6)
- Inferring Tutorial Dialogue Structure with Hidden Markov Modeling (2009) (6)
- Developing CS/SE students' communication abilities through a program-wide framework (2014) (6)
- An efficient table-driven decoder for one-half rate convolutional codes (1992) (6)
- Cross-institutional research cyberinfrastructure for data intensive science (2016) (5)
- Fault-Tolerance in Dataflow-Based Scientific Workflow Management (2010) (5)
- Factors influencing ATM adapter throughput (1996) (5)
- Locally Invertible Multidimensional Convolutional Encoders (2012) (5)
- On High-Assurance Scientific Workflows (2011) (5)
- Quality of service modeling for wide area network based systems (1998) (5)
- Integrating Communication Instruction Throughout Computer Science and Software Engineering Curricula (2011) (5)
- Free Energy Analysis on the Coding Region of the Individual Genes of Saccharomyces cerevisiae (2006) (4)
- Constructing optimal convolutional code models for prokaryotic translation initiation (2002) (4)
- Modeling the behavior of large software projects (1991) (4)
- A computational model for reading frame maintenance (2006) (4)
- Efficient Operational Profiling of Systems Using Suffix Arrays on Execution Logs (2008) (4)
- Engineering of telecommunications software (1992) (4)
- Free energy periodicity in E.coli (1999) (4)
- Changing the High School Culture to Promote Interest in Information Technology Careers among High-Achieving Girls (2007) (4)
- Integration of heterogeneous scientific data using workflows - a case study in bioinformatics (2003) (4)
- Assessing Run-time Overhead of Securing Kepler (2016) (4)
- Securing Scientific Workflows (2015) (4)
- Developing an Open Source 'Big Data' Cognitive Computing Platform (2018) (4)
- Free energy based analysis of the coding region of Saccharomyces cerevisiae (2004) (4)
- The Lightweight Software Bus : A Message Broker for Prototyping Problem Solving Environments (1997) (4)
- Cost Analysis Comparing HPC Public Versus Private Cloud Computing (2016) (4)
- Diversity-based detection of security anomalies (2014) (3)
- Clouds in Higher Education (2015) (3)
- Analysis of high-speed data transfer protocol algorithms (2004) (3)
- Access Control Policy Evolution: An Empirical Study (2014) (3)
- Participation of Women in Information Technology (2006) (3)
- Free energy periodicity in prokaryotic coding and its role in identification of +1 ribosomal frameshifting in the Escherichia Coli K-12 gene prfb (2004) (3)
- About PaaS security (2017) (3)
- Constructing next generation academic cloud services (2013) (3)
- Using Redundancy to Detect Security Anomalies: Towards IoT security attack detectors (2016) (3)
- Testing Process Guidance for Resource Constrained Software Testing (1999) (3)
- A variable-redundancy hybrid ARQ scheme using invertible convolutional codes (1994) (3)
- Proceedings of the 30th annual Southeast regional conference (1992) (3)
- Coding theory based maximum-likelihood classifier for translation initiation regions in Escherichia coli K-12 (2000) (3)
- Simultaneous reachability analysis of concurrent systems (2001) (3)
- A lightweight middleware architecture and evaluation of middleware performance (1998) (3)
- Experiments in fault tolerant software reliability (1987) (3)
- Non-operational testing of software for security issues (2013) (3)
- A Preliminary Investigation of Hierarchical Hidden Markov Models for Tutorial Planning (2010) (3)
- Locally invertible rate-1/n convolutional encoders (1994) (3)
- A fault tolerance framework for kepler-based distributed scientific workflows (2011) (3)
- Guiding resource constrained software testing (1999) (3)
- Table-Driven Decoding of Convolutional Codes with Soft Decision (1992) (2)
- Automatically generated web-based multimedia presentations (1996) (2)
- Productivity of object oriented software development (1996) (2)
- Software Reliabilit y Engineering (2000) (2)
- Integration of high-performance computing into a VCL cloud (2013) (2)
- Modeling ribosome dynamics to optimize heterologous protein production in escherichia coli (2014) (2)
- Development of a quantitative process model for object-oriented software development (1996) (2)
- Securing Hadoop in cloud (2014) (2)
- The search for the optimal ribosome 3' tail end in E. coli (2004) (2)
- On Coverage-Based Attack Profiles (2014) (2)
- ATM-to-the-desktop: performance considerations in positioning it among emerging network technologies (1996) (2)
- A Time-Domain Analysis of Minimal Convolutional Encoders (1995) (2)
- Toward a Proof of Concept Implementation of a Cloud Infrastructure on the Blue Gene/Q (2015) (2)
- Theoretical analysis of the SABUL congestion control algorithm (2006) (2)
- Inverses of multivariate polynomial matrices using discrete convolution (2004) (2)
- A Practical Implementation of Maximum Likelihood Voting (1997) (2)
- Improvements of the SABUL Congestion Control Algorithm (2006) (2)
- Identification of protein-coding sequences using the hybridization of 18S rRNA and mRNA during translation (2008) (2)
- Real-Time Full Motion Stereo Microscopy Over Internet (1999) (2)
- Predictive Modeling of End-User Quality of Service for Network-Based Education (1997) (2)
- A study of static analysis for fault detection in software (2005) (1)
- Examining Time as a Factor in Young Women's Information Technology Career Decisions (2007) (1)
- A formal model towards scientific workflow security in a cloud (2018) (1)
- Working with Workflows: Highlights from 5 years Building Scientific Workflows (2011) (1)
- Scientific Data Management: Essential Technology for Accelerating Scientific Discoveries (2007) (1)
- LAVA: secure delegation of mobile applets: design, implementation and applications (1997) (1)
- A framework for analyzing software system log files (2011) (1)
- Learning a Tutorial Dialogue Policy for Delayed Feedback (2011) (1)
- Reliability behavior of a large network based education system (1997) (1)
- A predicate-based software testing strategy (1994) (1)
- Integrating communication skills into the computer science curriculum (abstract only) (2013) (1)
- Ribosome tail ends as "signal detectors" for protein production in prokaryotes (2004) (1)
- Structural and dialogue act modeling in task-oriented tutorial dialogue (2010) (1)
- ATM to the desktop (1995) (1)
- High Consequence Systems and Semantic Computing (2013) (1)
- Experimental Analysis of the SABUL Congestion Control Algorithm (2004) (1)
- 13. Software-Reliability Engineering of Numerical Systems (2005) (1)
- Rate-k/n Convolutional Encoders: A Time-Domain Analysis (1995) (1)
- Statistical significance and biological relevance of a sinusoidal pattern detected in translational free energy signals (2006) (1)
- Locally invertible m-dimensional convolutional codes (2004) (1)
- On Locally Invertible Rate- Convolutional Encoders (1998) (1)
- Producing dependable object-oriented software using testing and design patterns (1998) (1)
- Internet of Things (2021) (1)
- Everything You Wanted to Know About SRE But Didn't Know Who To Ask (1998) (1)
- ATM-to-the-desktop: its position and advantages in emerging networks (1996) (1)
- A Note on Uncertainty in Real-Time Analytics (2011) (1)
- Which code construct metrics are symptoms of post release failures? (2011) (1)
- Chapter 13 Scientific Process Automation and Workflow Management ∗ (2009) (1)
- ITWF : Collaboration Through Agile Software Development Practices : A Means for Improvement in Quality & Retention of IT Worker (2009) (0)
- A Table-Based Reduced Complexity Sequential Decoding Method for Convolutional Decoding on Fading Channels (1995) (0)
- Conversations (oral history interviews) with members of North Carolina State University Computer Science Department by Carol Lee and Carolyn Miller (2017) (0)
- Digital Imaging in Remote Control (2000) (0)
- SECross: securing cross cloud boundary (2018) (0)
- A flexible soft DiffServ test-bed (2002) (0)
- Predictive Modeling of End-User Quality of Service for NetworkBased (1997) (0)
- Embedding Cloud Computing inside Supercomputer Architectures (2016) (0)
- THROUGHPUT AND VIDEO PERFORMANCE OF EMERGING LAN (1997) (0)
- On the effectiveness of static analysis tools for fault-detection (2005) (0)
- SDIoT: a software defined based internet of things framework (2015) (0)
- Binding motif based code models for prokaryotic translation initiation (2003) (0)
- Helping students become better communicators (abstract only) (2012) (0)
- An analysis of Fedora security profile (2014) (0)
- Performance of Network-based Problem-solving Environments Performance of Network-based Pses (2007) (0)
- Reliability and Availability of a Wide Area Network-Based Education System1 (1996) (0)
- DiffServ experiments: evaluation of some approaches to quality of service control over the Alcatel-NCSU Internet2 testbed (2002) (0)
- Distributed Data Integration Infrastructure (2003) (0)
- Young Women and Persistence in Information Technology (2006) (0)
- Detecting and Mitigating Security Anomaliies (2004) (0)
- Software reliability through fault-avoidance and fault-tolerance (1990) (0)
- Effectiveness of back-to-back testing (1987) (0)
- The Scientific Data Management Center: Available Technologies and Highlights (2011) (0)
- Message from the steering committee and general chairs (2016) (0)
- The use of locally invertible convolutional encoders for encryption (2010) (0)
- 1 A Practical Implementation of Maximum Likelihood Voting (2007) (0)
- MULTI-VERSION SOFTWARE RELIABILITY THROUGH FAULT-AVOIDANCE AND FAULT-TOLERANCE (1990) (0)
- A PERFORMANCE EVALUATION OF EMERGING ETHERNET ETHERNET LAIN EMULATION OVER ATM TECHNOLOGIES: SWITCHED/HIGH-SPEED/FULL-DUPLEX ETHERNET AND (1996) (0)
- Reliability and security analysis of open source software (2008) (0)
- Searching for ribosome-mRNA hybridization sites (2006) (0)
- What can rna hybrids tell us about translation (2006) (0)
- Call for papers. (1996) (0)
- Network-Based Education (2015) (0)
- ENGINEERING OF TELECOMMUNICATIONS SOFTWARE1 (2007) (0)
- Securing Software Application Chains in a Cloud (2015) (0)
- ESCHERICHIA COLI PROTEIN CODING SEQUENCE DETECTION BY ANALYSIS OF FREE ENERGY PERIODICITY (0)
- Comparison of the Q-Matrix Clustering Method with Factor Analysis and K-Means Cluster Analysis (0)
- Alcatel: North Carolina State University virtual laboratory for end-to-end quality of service engineering (2001) (0)
- Scientific Data Management Center for Enabling Technologies (2013) (0)
- Toward a Proof of Concept Cloud Framework for Physics Applications on Blue Gene Supercomputers (2015) (0)
- A System for On-Line Detection and Analysis of Saccadic Eye Movements (1982) (0)
- Technology for support of network-based education workflows in North Carolina (1997) (0)
- A mechanistic model for +1 frameshifts in eubacteria (2007) (0)
- Scientific Data Management Center Scientific Data Integration (2003) (0)
This paper list is powered by the following services:
What Schools Are Affiliated With Mladen A. Vouk?
Mladen A. Vouk is affiliated with the following schools: