SELECTED
RECENT PUBLICATIONS
Note: All minor publications
(workshops, presentations, internal reports, etc.) are explicitly excluded.
In Print
Black-Box
String Test Case Generation through a Multi-Objective Optimization, A. Shahbazi, J. Miller, IEEE Transactions on Software
Engineering
Identifying
Semantic Blocks in Web Pages Using Gestalt Laws of Grouping, Z. Xu, J. Miller,
Journal of the World Wide Web
Using π-calculus
for Formal Modelling and Verification of WS-CDL Choreographies", A.
Khaled, J Miller, IEEE Transactions on Services Computing.
Test
Case Prioritization Using Extended Digraphs, S. S. Emam,
J. Miller, ACM Transactions on Software Engineering and Methodology.
An
Investigation of Implicit Features in Compression-Based Learning for Comparing
Webpages, T-C Chen, T. Stepan, S. Dick, J. Miller,
Pattern Analysis and Applications
ADAMAS: Interweaving Unicode and Color
to Enhance CAPTCHA Security, N. Roshanbin, J. Miller,
Future Generation Computer Systems
The Kanban Approach, Between Agility and Leanness: A
Systematic Review, O. Al-Baik, J. Miller, Empirical
Software Engineering.
2016
Kaizen Cookbook: The Success Recipe for Continuous
Learning and Improvements, O. Al-Baik, J. Miller, Hawaii
International Conference on System Sciences, 2016
Policy Generator (PG): A Heuristic-Based Fuzzer, A. Felix, A. Tappenden,
J. Miller, Hawaii International Conference on System Sciences, 2016
2015
Enhancing
Hardware Assisted Test Insertion Capabilities on Embedded Processors using a
FPGA-based Agile Test Support co-processor, M. Smith, S. Islam, D. Deng, J.
Miller, The Journal of Signal Processing Systems, Vol. 79, pp. 285 298, 2015
A New Webpage
Classification Model based on Visual Information using Gestalt Laws of
Grouping, Z Xu, J. Miller, 16th International Conference on Web Information
System Engineering, 2015
2014
Waste
Identification and Elimination in Information Technology Organizations, O. Al-Baik, J. Miller, Empirical Software Engineering. Volume 19, Issue 6, Page 2019-2061, 2014
Towards Real
Time Contextual Advertising, A Panwar, I-V Onut, J Miller, 15th International Conference on Web
Information System Engineering, 2014
Extended
Subtree: A New Similarity Function for Tree Structured Data, A. Shahbazi, J. Miller, IEEE Transactions on Knowledge and
Data Engineering, Vol. 26, No. 4, pp 864-877, 2014
Automated Cookie Collection Testing, A. Tappenden, J. Miller, ACM Transactions on Software
Engineering and Methodology, Vol. 23, No. 1, 3:1 3:40, 2014
An empirical investigation of web session workloads,
S. Dick, O. Yazdanbaksh, X. Tang, T. Huynh, J.
Miller, Information Processing and Management, Vol. 50, No. 1, pp. 41 53,
2014
An Anti-Phishing System Employing
Diffused Information, T-C Chen, T Stepan, S Dick, J Miller: ACM
Transactions on Information Systems and Security, 16(4): 16, 2014
2013
Ian Reay, Patricia Beatty, Scott Dick,
James Miller: Privacy policies and national culture on the internet.
Information Systems Frontiers 15(2): 279-292 (2013)
Ming Ying, James Miller: Refactoring
legacy AJAX applications to improve the efficiency of the data exchange
component. Journal of Systems and Software 86(1): 72-88 (2013)
Ejike
Ofuonye, James Miller: Securing web-clients with
instrumented code and dynamic runtime monitoring. Journal of Systems and
Software 86(6): 1689-1711 (2013)
Narges
Roshanbin, James Miller: A Survey and Analysis of
Current CAPTCHA Approaches. J. Web Eng. 12(1&2): 1-40 (2013)
Ali Shahbazi,
Andrew F. Tappenden, James Miller: Centroidal Voronoi Tessellations
- A New Approach to Random Testing. IEEE Trans. Software Eng. 39(2): 163-183
(2013)
Joshua Charles Campbell, Chenlei Zhang, Zhen Xu, Abram Hindle,
James Miller: Deficient documentation detection: a
methodology to locate deficient project documentation using topic analysis. MSR
2013: 57-
2012
Constructing
High Quality Use Case Models: A Systematic Review of Current Practices, M.
El-Attar, J Miller, Requirements Engineering Journal, Vol. 17, No. 3, pp 187
201. 2012
Refactoring
Flash Embedding Methods, Y. Ming, J. Miller, International Journal of Systems
and Service-Oriented Engineering, Vol 3, No. 3, pp 26 40, 2012
Is In-Depth Object-Oriented
Knowledge Necessary to Develop Quality Robustness Diagrams?, M. El-Attar, M. O. Elish, S. Mahmood, J. Miller, Journal of Software,
Vol 7, No 11, pp. 2538-2552, Nov 2012
Embracing
Composite Metrics in Software Experiments, M. El-Attar, R. Singh, J. Miller,
Journal of Software, Vol. 7, No. 7, pp. 1664 1676, 2012
On
Spam Susceptibility and Browser Updating, E. Luong, T. Huynh, J. Miller,
International Journal of Systems and Service-Oriented Engineering, Vol 3, No.
1, pp 44 57, 2012
AIWAS:
The Automatic Identification of Web Attacks System, T. Huynh, J. Miller,
International Journal of Systems and Service-Oriented Engineering, Vol 3, No.
1, pp 73 91, 2012
2011
Consumer
Trust in E-Commerce Websites: A Meta-Study, P. Beatty, I. Reay, S. Dick, J.
Miller, ACM Computing Surveys, Vol. 43, No. 3, Article 14, 46 pages, 2011
Token-based
Graphical Password Authentication, J. Gyorffy, A. Tappenden, J Miller, International Journal of Information
Security, Vol. 10, No. 6, pp. 321-336,
2011
A
User-Centric Evaluation of the Readability of Privacy Policies in Popular Web
Sites, R. I. Singh, M. Sumeeth, J. Miller,
Information Systems Frontiers, Vol. 13, No. 4, pp. 501 514, 2011
Finding
Homoglyphs a step towards detecting Unicode-based
visual spoofing attacks, N. Roshanbin, J. Miller, The 12th International Conference on Web Information System Engineering,
2011
Migrating
Functional Requirements in SSUCD Use Cases to a More Formal Representation, M.
El-Attar, J. Miller, 6th International Conference on Software Engineering
Advances, 2011
Refactoring
Traditional Forms into Ajax-enabled Forms, M. Ying, J. Miller, 18th Working Conference on Reverse Engineering
Issues Surrounding Moving a Successful Business
Oriented Test Driven Development Process into the Environment of Real-time
Embedded Systems, M. Smith, A. Beaudin, J. Miller, C.
Steinback, S. Islam, M. Poulin,
The 22nd IET Irish Signals and Systems Conference
Evaluating the Readability of Privacy Policies in
Mobile Environments. R. I.
Singh, M. Sumeeth, J. Miller, International Journal
of Mobile Human Computer Interaction, Vol. 3, No. 1, pp 55 - 78
ART- Improving Execution Time for Flash Applications,
M. Ying, J. Miller, International Journal of Systems and Service-Oriented
Engineering, Vol 2, No. 1, pp 1 20
FTT:
A System to Refactor Traditional Forms into Ajax-Enabled Forms. M. Ying, J.
Miller, International Journal of Systems and Service-Oriented Engineering, Vol.
2, No.1, 1-20, 2011
2010
Detecting
Visually Similar Web Pages: Application to Phishing Detection, T-C Chen, S.
Dick, J. Miller, ACM Transactions on Internet Technology, Vol. 2, No. 10, pp
5:1- 5:38
Chronological
fault-based mutation processes for WS-BPEL 2.0 programs, A. Khaled, J. Miller,
International Journal Web Engineering and Technology, Vol. 6, No.2, pp. 141 -
170
Developing Comprehensive
Acceptance Tests from Use Cases and Robustness Diagrams, M. El-Attar, J.
Miller, Requirements Engineering Journal Vol.
15, No. 3, pp. 285-306
Empirical
Knowledge Discovery by Triangulation in Computer Science, R.I. Singh, J.
Miller, Advances in Computers, Vol. 80, pp 163 190
On the causes
of open source web systems vulnerabilities, T. Huynh, J. Miller, Journal of
Empirical Software Engineering, Vol. 15, No. 15, pp 556 576
Improving the Quality of Use Case Models Using Antipatterns, M. El-Attar, J. Miller, Journal of Software
and Systems Modeling, Vol. 9, No.2, pp 140 160
Are Online Privacy Policies
Readable? M. Sumeeth, R.I.
Singh, J. Miller, International
Journal of Information Security and Privacy, Vol. 4, No. 1, pp 91 -- 114
Prevalence
and Classification of Web Page Defects, E. Ofuonye,
P. Beatty, S. Dick, J. Miller, Online Information Review, Vol. 34, No. 1, pp
160 -- 174
Feature and Product Markup Languages in
service-oriented CAX collaboration, A. Khaled, Y. Ma, J. Miller, International
Journal of Manufacturing Research, Vol. 5, No. 1, pp. 87 - 101
Investigating the Distributional Property of the Session Workload, J. Miller, T. Huynh, Journal of Web Engineering, Vol. 9, No. 1, pp 25 -- 47
Practical Elimination of External
Interaction Vulnerabilities in Web Applications, T. Huynh, J. Miller, Journal
of Web Engineering, Vol. 9, No. 1, pp 1 -- 24
2009
A
Novel Evolutionary Approach for Adaptive Random Testing, A. Tappenden,
J. Miller, IEEE Transactions on Reliability, Vol. 58, No. 4, pp. 619- 633
Do You Know Where Your Data Is? A Study
of the Effect of Enforcement Strategies on Privacy Policies I. Reay, P.
Beatty, S. Dick, J. Miller, International Journal of Information Security and
Privacy, Vol. 3, No. 4, 68 -- 95
Empirical Observations on the Session Timeout Threshold, T Huynh, J. Miller, Journal of Information Processing & Management, Vol. 45, No. 5, pp. 513 -- 528
Cookies: A Deployment Study and the Testing Implications, A. Tappenden, J. Miller, ACM Transactions on the Web, Vol. 3,
No. 3, pp. 9:1 -- 9:49
A survey of cookie technology
adoption amongst nations, A. Tappenden, J. Miller,
Journal of Web Engineering, Vol. 8, No. 3, pp 211 244
A Subject-Based Empirical Evaluation of SSUCD's
Performance in Reducing Inconsistencies in Use Case Models, M. El-Attar, J.
Miller, Journal of Empirical Software Engineering, Vol. 14, pp. 477
-- 512
A large scale empirical study of P3P
privacy policies: stated actions versus legal obligations, I Reay, S. Dick, J.
Miller, ACM Transactions on the Web, Vol. 3(2), pp. 6:1 6:33, 2009
An Embedded Test oriented production methodology, M. Smith, S. Daenick, J Miller, The Journal of Signal Processing Systems, Vol. 56, pp 69 89, 2009
Another viewpoint on "Evaluating Web Software
Reliability Based on Workload and Failure Data Extracted from Server Logs",
T. Huynh, J. Miller, Journal of Empirical Software Engineering, Vol. 14,
pp. 371 396, 2009
A More Agile Approach to Embedded System
Development, M. Smith, J. Miller, L. Huang, A. Tran, IEEE Software, Vol.
26, no. 3, pp. 50-57, 2009
An
Analysis of Privacy Signals on the World Wide Web: Past, Present and Future, I
Reay, S Dick, J Miller, Information Sciences, Vol. 179, No. 8, pp. 1102-1115, 2009
A Scalable Testing
Framework for Location Based Services, J Yu, A Tappenden, J Miller, M Smith, Journal of Computer Science
and Technology, Vol. 24, No. 2, pp 386 404, 2009
Mobile
ICT support for the continuum of Care, M. Miyazaki, T. Ohyanagi,
L. Liu, B. Dobbs, M. Rowe, S. Sutphen, J. Miller, A.
Cook, Advances in Information Technology and Communication
in Health, Volume 143 Studies in Health Technology and Informatics, IOS Press
2008
Resolving JavaScript Vulnerabilities in Browser Runtime, E. Ofuonye, J. Miller, 19th IEEE International Symposium on Software Reliability Engineering
How Do We Build Trust Into Ecommerce Web Sites? E. Ofuonye, P. Beatty, I. Reay, S. Dick, J. Miller, IEEE Software Vol 25 , No. 5, pp. 7 9
The Theory and Implementation of InputValidator
A Semi-Automated Value-Level Bypass Testing Tool, J Miller, L. Zhang, E. Ofuonye, M. Smith, International Journal of Information
Technology and Web Engineering, Vol. 3, No. 3, pp 28 - 49
Triangulation as a basis for knowledge discovery in
Software Engineering, J Miller, Journal of Empirical Software Engineering, Vol.
13, No. 2, pp 223 - 228
Producing Robust Use Case Diagrams via Reverse Engineering
of Use Case Descriptions, M. El Attar, J. Miller, Journal of Software and
Systems Modelling, vol. 7, No. 1, pp. 67 - 84, 2008
A Three-Tiered Testing Strategy for Cookies, A. Tappenden, J. Miller, 1st IEEE International Conference on
Software Testing, Verification and Validation
A Service Oriented Architecture for CAX Concurrent Collaboration, A. Khaled, Y. Ma, and J. Miller, The 4th Annual IEEE Conference on Automation Science and Engineering (CASE 2008)
Is HTML in a Race to the Bottom?,
Patricia Beatty, Scott Dick, and James Miller, IEEE Internet Computing, Vol. 13
, No. 2, pp. 76 - 81, 2008
On the possibilities of (pseudo-)
software cloning from external interactions, M. Reformat, X. Chai, J. Miller,
Soft Computing, Vol. 12, No. 1, pp. 29-49, 2008
2007
A Survey and Analysis of the P3P
Protocol's Agents, Adoption, Maintenance, and Future, I. Reay, T. Beatty, S.
Dick, J. Miller, IEEE Transactions on Dependable and Secure Computing, Vol. 5,
No. 2, pp 151 164, 2007
A Practical
Approach to Testing GUI Systems, P. Li, T. Huynh, M. Reformat,
J. Miller, Journal of Empirical Software Engineering, Vol. 12, No. 4, pp. 331 -
357
Modelling defects in e-projects, J.
Ferguson, J. Miller, International Journal of Information Technology and Web
Engineering, Vol. 2, No. 3, pp. 1 16, 2007
Replication's Role in
Software Engineering, A. Brooks, M. Roper, M. Wood, J. Daly,
and J. Miller. In Guide to
Advanced Empirical Software Engineering. Edited by
F. Schull and J. Singer and D. Sjoberg,
Springer-Science, pp. 365-379.
A TDD Approach to Introducing Students
to Embedded Programming, J. Miller, M. Smith, The 12th Annual
Conference on Innovation Technology in Computer Science Education (ItiCSE), 2007
Empirical Evaluation
of Optimisation Algorithms When Used in Goal-oriented Automated Test Data
Generation Techniques, M. Xiao, M. El-Attar, M. Reformat, J. Miller, Journal of
Empirical Software Engineering, vol. 12, pp. 183 239, 2007
P3P Adoption on E-Commerce Websites: A
Survey & Analysis, T. Beatty, I. Reay, S. Dick, J. Miller, IEEE Internet
Computing, Vol. 11(2), pp. 65 71, 2007
A User-Centered
Approach to Modeling BPEL Business Processes Using
SUCD Use Cases, M. El Attar, J. Miller, e-Informatica
- Software Development Theory, Practice and Experimentation (Journal), Vol.
1(1), pp. 61 78, 2007
2006
COTS
Acquisition Process: Incorporating Business Factors into COTS Vendor Evaluation
Taxonomies, J. Miller, H.C. Yeoh, Software
Process Improvement and Practice, Vol. 11, pp. 601 626, 2006
An XP inspired test-oriented life-cycle
production strategy for building embedded biomedical applications, J. Miller,
M. Smith, S. Daenick, J. Chen, J. Qiao,
F. Huang, A. Kwan and M. Roper, TAIC PART, 2006
Matching Antipatterns to Improve the
Quality of Use Case Models, M. El-Attar, J. Miller, 14th IEEE
International Requirements Engineering Conference, 2006
AGADUC: Towards a More Precise
Presentation of Functional Requirements in Use Case Models, M. El-Attar, J.
Miller, 4th ACIS International Conference on Software Engineering,
Research, Management and Applications, 2006
Approaches to
validating the quantity in quantitative MR cerebral perfusion studies, M. R.
Smith, J. Miller, L. Ko, J.
Chen, A. Geras, R. Frayne, 3rd
International Conference on Advances in Medical, Signal and Information, 2006
Configuring Hybrid Agile-Traditional
Software Processes, A. Geras, M. Smith, J. Miller,
7th International Conference on eXtreme Programming
and Agile Processes in Software, 2006
Extending the Embedded System E-TDDunit Test Driven Development Tool For
Development of a Real Time Video Security System Prototype, S. Daeninck, M. R. Smith, J. Miller and L. Ko
7th International Conference on eXtreme Programming
and Agile Processes in Software, 2006.
AreFit/FitNesse Appropriate for Biomedical Engineering Research?
Jingwen Chen, Michael Smith, Adam Geras,
James Miller, 7th International Conference on eXtreme
Programming and Agile Processes in Software, 2006
Agile Development of Secure Web-Based
Applications, A. Tappenden, T. Huynh, J. Miller, A. Geras, M. Smith, International Journal of Information
Technology and Web Engineering, Vol. 1(2), pp. 1 24, 2006
Automatic Test Data Generation Using
Genetic Algorithm and Program Dependence Graphs, J. Miller, M. Reformat and H.
Zhang, Journal of Information and Software Technology, Vol. 48, pp. 586 605,
2006
Developing Secure Web-based
Applications, T. Huynh, J. Miller, 1st IEEE International Symposium
on Secure Software Engineering, 2006
2005
Further Investigations into Evaluating
Website Reliability, T. Huynh, J. Miller, 4th International
Symposium on Empirical Software Engineering, 2005
Agile Security
Testing of Web-Based Systems via HTTPUnit, A. Tappenden, P. Beatty,
J. Miller, A. Geras, M. Smith, Agile
2005
Testing the Semantics of W3C XML Schema,
J.B. Li, J. Miller, COMPSAC 2005
A Survey of Test Notations and Tools for
Customer Testing, A. Geras, J. Miller, M. Smith, J.
Love, 6th International Conference on eXtreme
Programming and Agile Processes in Software, 2005
Agile Testing of Location-Based
Services, J. Yu, A. Tappenden, A. Geras,
M. Smith, J. Miller, 6th International Conference on eXtreme
Programming and Agile Processes in Software, 2005
E-TDD -- Embedded Test Driven
Development: A Tool for Hardware-Software Co-design Projects, M Smith, A Kwan,
A Martin, J Miller, 6th International Conference on eXtreme
Programming and Agile Processes in Software, 2005
Replicating
Software Engineering Experiments: A poisoned Chalice or the Holy Grail, J.
Miller, Journal of Information and Software Technology, Vol. 47, pp. 233 244,
2005
2004 and
Before
Ancient
History please contact an archaeologist!