var bibbase_data = {"data":"\"Loading..\"\n\n
\n\n \n\n \n\n \n \n\n \n\n \n \n\n \n\n \n
\n generated by\n \n \"bibbase.org\"\n\n \n
\n \n\n
\n\n \n\n\n
\n\n Excellent! Next you can\n create a new website with this list, or\n embed it in an existing web page by copying & pasting\n any of the following snippets.\n\n
\n JavaScript\n (easiest)\n
\n \n <script src=\"https://bibbase.org/show?bib=lordamit.github.io%2Ffiles%2Fmypubs.bib&jsonp=1&jsonp=1\"></script>\n \n
\n\n PHP\n
\n \n <?php\n $contents = file_get_contents(\"https://bibbase.org/show?bib=lordamit.github.io%2Ffiles%2Fmypubs.bib&jsonp=1\");\n print_r($contents);\n ?>\n \n
\n\n iFrame\n (not recommended)\n
\n \n <iframe src=\"https://bibbase.org/show?bib=lordamit.github.io%2Ffiles%2Fmypubs.bib&jsonp=1\"></iframe>\n \n
\n\n

\n For more details see the documention.\n

\n
\n
\n\n
\n\n This is a preview! To use this list on your own web site\n or create a new web site from it,\n create a free account. The file will be added\n and you will be able to edit it in the File Manager.\n We will show you instructions once you've created your account.\n
\n\n
\n\n

To the site owner:

\n\n

Action required! Mendeley is changing its\n API. In order to keep using Mendeley with BibBase past April\n 14th, you need to:\n

    \n
  1. renew the authorization for BibBase on Mendeley, and
  2. \n
  3. update the BibBase URL\n in your page the same way you did when you initially set up\n this page.\n
  4. \n
\n

\n\n

\n \n \n Fix it now\n

\n
\n\n
\n\n\n
\n \n \n
\n
\n  \n 2016\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n A Static Code Search Technique to Identify Dead Fields by Analyzing Usage of Setup Fields and Field Dependency in Test Code.\n \n \n \n\n\n \n Satter, A.; Ami, A. S.; and Sakib, K.\n\n\n \n\n\n\n In CDUD 2016–The 3rd International Workshop on Concept Discovery in Unstructured Data, pages 60, 2016. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{satter2016static,\n  title={A Static Code Search Technique to Identify Dead Fields by Analyzing Usage of Setup Fields and Field Dependency in Test Code},\n  author={Satter, Abdus and Ami, Amit Seal and Sakib, Kazi},\n  booktitle={CDUD 2016--The 3rd International Workshop on Concept Discovery in Unstructured Data},\n  pages={60},\n  year={2016}\n}\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2015\n \n \n (2)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n Selecting best attributes for software defect prediction.\n \n \n \n\n\n \n Mandal, P.; and Ami, A. S.\n\n\n \n\n\n\n In 2015 IEEE International WIE Conference on Electrical and Computer Engineering (WIECON-ECE), pages 110-113, Dec 2015. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@INPROCEEDINGS{7444011,\nauthor={P. Mandal and A. S. Ami},\nbooktitle={2015 IEEE International WIE Conference on Electrical and Computer Engineering (WIECON-ECE)},\ntitle={Selecting best attributes for software defect prediction},\nyear={2015},\npages={110-113},\nkeywords={Data preprocessing;NASA;Prediction algorithms;Predictive models;Software;Software algorithms;Software metrics},\ndoi={10.1109/WIECON-ECE.2015.7444011},\nmonth={Dec},}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n A Content Assist based Approach for Providing Rationale of Method Change for Object Oriented Programming.\n \n \n \n\n\n \n Ami, A. S; and Islam, S.\n\n\n \n\n\n\n International Journal of Information Engineering and Electronic Business (IJIEEB), 7(1): 49. 2015.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{ami2015content,\n  title={A Content Assist based Approach for Providing Rationale of Method Change for Object Oriented Programming},\n  author={Ami, Amit S and Islam, Shariful},\n  journal={International Journal of Information Engineering and Electronic Business (IJIEEB)},\n  volume={7},\n  number={1},\n  pages={49},\n  year={2015}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2014\n \n \n (3)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n Cloud-Niagara: A high availability and low overhead fault tolerance middleware for the cloud.\n \n \n \n\n\n \n Imran, A.; Gias, A. U.; Rahman, R.; Seal, A.; Rahman, T.; Ishraque, F.; and Sakib, K.\n\n\n \n\n\n\n In Computer and Information Technology (ICCIT), 2013 16th International Conference on, pages 271-276, March 2014. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@INPROCEEDINGS{6997344,\nauthor={A. Imran and A. U. Gias and R. Rahman and A. Seal and T. Rahman and F. Ishraque and K. Sakib},\nbooktitle={Computer and Information Technology (ICCIT), 2013 16th International Conference on},\ntitle={Cloud-Niagara: A high availability and low overhead fault tolerance middleware for the cloud},\nyear={2014},\npages={271-276},\nkeywords={cloud computing;fault tolerant computing;middleware;set theory;Cloud-Niagara middleware;cloud based applications;cloud computing;deterministic algorithm;effective descriptive set theory;fault tolerance middleware;open source cloud;Availability;Central Processing Unit;Computer architecture;Fault tolerance;Fault tolerant systems;Middleware;Random access memory},\ndoi={10.1109/ICCITechn.2014.6997344},\nmonth={March},}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n A formal approach to verify software scalability requirements using set theory and Hoare triple.\n \n \n \n\n\n \n Gias, A. U.; Tabassum, M. R.; Ami, A. S.; Imran, A.; Ibrahim, M.; Rahman, R.; and Sakib, K.\n\n\n \n\n\n\n In Computer and Information Technology (ICCIT), 2013 16th International Conference on, pages 7-12, March 2014. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@INPROCEEDINGS{6997367,\nauthor={A. U. Gias and M. R. Tabassum and A. S. Ami and A. Imran and M. Ibrahim and R. Rahman and K. Sakib},\nbooktitle={Computer and Information Technology (ICCIT), 2013 16th International Conference on},\ntitle={A formal approach to verify software scalability requirements using set theory and Hoare triple},\nyear={2014},\npages={7-12},\nkeywords={program verification;set theory;software quality;Hoare triple;caching;code level;code quality measurement;code segment;data compression;execution environment;formal approach;performance fulfillment measurement;real life online ticketing system;response time;set notations;set theory;software scalability requirements verification;user needs;user requests;variation handling;workload variation;Computers;Data compression;Information technology;Scalability;Servers;Set theory;Time factors;Formal Method;Hoare Triple;Set Theory;Software Scalability;Verification},\ndoi={10.1109/ICCITechn.2014.6997367},\nmonth={March},}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n An efficient approach for providing rationale of method change for object oriented programming.\n \n \n \n\n\n \n Ami, A. S.; and Islam, M. S.\n\n\n \n\n\n\n In Informatics, Electronics & Vision (ICIEV), 2014 International Conference on, pages 1–6, 2014. IEEE\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{ami2014efficient,\n  title={An efficient approach for providing rationale of method change for object oriented programming},\n  author={Ami, Amit Seal and Islam, Md Shariful},\n  booktitle={Informatics, Electronics \\& Vision (ICIEV), 2014 International Conference on},\n  pages={1--6},\n  year={2014},\n  organization={IEEE}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2013\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n Face Recognition and Adaptation for Secure Human Computer Interaction.\n \n \n \n\n\n \n Khaled, S. M.; Gias, A. U.; Seal, A.; and Hasanuzzaman, M.\n\n\n \n\n\n\n International Journal of Advanced Computer Science, 3(10). 2013.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{khaled2013face,\n  title={Face Recognition and Adaptation for Secure Human Computer Interaction},\n  author={Khaled, Shah Mostafa and Gias, Alim Ul and Seal, Amit and Hasanuzzaman, Md},\n  journal={International Journal of Advanced Computer Science},\n  volume={3},\n  number={10},\n  year={2013}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n\n\n\n
\n\n\n \n\n \n \n \n \n\n
\n"}; document.write(bibbase_data.data);