Search. Review. Repeat? An empirical study of threats to replicating SLR searches
J Krüger, C Lausberger, I von Nostitz-Wallwitz… - Empirical Software …, 2020 - Springer
A systematic literature review (SLR) is an empirical method used to provide an overview of
existing knowledge and to aggregate evidence within a domain. For computer science …
existing knowledge and to aggregate evidence within a domain. For computer science …
ANWOA: an adaptive nonlinear whale optimization algorithm for high-dimensional optimization problems
One of the most competitive nature-inspired metaheuristic optimization algorithms is the
whale optimization algorithm (WOA). This algorithm is proven awesome in solving complex …
whale optimization algorithm (WOA). This algorithm is proven awesome in solving complex …
The symposium on search-based software engineering: Past, present and future
Abstract Context Search-Based Software Engineering (SBSE) is the research field where
Software Engineering (SE) problems are modelled as search problems to be solved by …
Software Engineering (SE) problems are modelled as search problems to be solved by …
(Automated) literature analysis: threats and experiences
The number of scientific publications is increasing each year, specifically in the field of
computer science. In order to condense existing knowledge, evidence-based software …
computer science. In order to condense existing knowledge, evidence-based software …
Identifying Main Dimensions of Digital Transformation Maturity at Industrial Organizations through Systematic Literature Review
M GhelichKhani, Y Samadi Moghadam… - Journal of Technology …, 2021 - jtdm.irost.ir
The digital transformation of industries, known as Industry 4.0, has become an important
topic in the organizational transformation literature lately, and its fulfillment leads to …
topic in the organizational transformation literature lately, and its fulfillment leads to …
[PDF][PDF] Providing a Business-to-Business Marketing Maturity Model
F Tellohosseini, R Sanavifard… - Journal of Business …, 2022 - jibm.ut.ac.ir
Conclusion Based on the obtained results, the six aforementioned categories include: 1)
Causal categories ie the new roles of leadership in B2B business, policy-making, B2B …
Causal categories ie the new roles of leadership in B2B business, policy-making, B2B …
Strategies to manage cloud computing operational costs
FNA Sackey - 2018 - search.proquest.com
Abstract Information technology (IT) managers worldwide have adopted cloud computing
because of its potential to improve reliability, scalability, security, business agility, and cost …
because of its potential to improve reliability, scalability, security, business agility, and cost …
Designing a model for achieving food security in Iran based on the views of the Supreme Leader (Grounded theory approach)
SM Fahimifard - Passive Defense, 2024 - pd.ihu.ac.ir
Since food insecurity threatens the national security, Iran's constitution based on the ideals
of Islamic Revolution, emphasized on eradicating poverty and meeting basic needs of …
of Islamic Revolution, emphasized on eradicating poverty and meeting basic needs of …
Cloud Modernization and Migration
C Surianarayanan, PR Chelliah - … of Cloud Computing: A Holistic, Cloud …, 2023 - Springer
Cloud Modernization and Migration | SpringerLink Skip to main content Advertisement
SpringerLink Account Menu Find a journal Publish with us Track your research Search Cart …
SpringerLink Account Menu Find a journal Publish with us Track your research Search Cart …
Cloud Migration
C Surianarayanan, PR Chelliah… - Essentials of Cloud …, 2019 - Springer
Having dealt with security it is now time to introduce a decision-related concept: cloud
migration. The objective of this chapter is to introduce the fundamentals of cloud migration …
migration. The objective of this chapter is to introduce the fundamentals of cloud migration …