Travelled to:
1 × Canada
1 × China
1 × Sweden
1 × Switzerland
2 × Italy
5 × USA
Collaborated with:
J.Cleland-Huang ∅ J.C.S.Santos P.Mäder M.Nagappan A.Sejfia M.Rahimi Danielle Gonzalez Fawaz Alhenaki Y.Shin M.Çinar S.Amornborvornwong Ibrahim Mujhid Waleed Zogaan A.Fakhry A.Grechko M.Wieloch T.Corrello S.Gadenkanahalli E.Kouroshfar H.Bagheri L.Xiao S.Malek Y.Cai Anthony Peruma M.Galster Jairo Veloz Vidal D.E.Krutz S.A.Malachowsky A.Ruiz J.Peterson A.Filipski J.Smith H.Dumitru M.Gibiec N.Hariri B.Mobasher C.Castro-Herrera
Talks about:
architectur (13) softwar (8) tactic (6) traceabl (4) approach (3) qualiti (3) concern (3) system (3) trace (3) recommend (2)
Person: Mehdi Mirakhorli
DBLP: Mirakhorli:Mehdi
Facilitated 1 volumes:
Contributed to:
Wrote 19 papers:
- ICSE-v2-2015-NagappanM #big data #re-engineering
- Big(ger) Data in Software Engineering (MN, MM), pp. 957–958.
- MSR-2015-KouroshfarMBXMC #architecture #case study #evolution #quality
- A Study on the Role of Software Architecture in the Evolution and Quality of Software (EK, MM, HB, LX, SM, YC), pp. 246–257.
- MSR-2015-KrutzMMRPFS #android #dataset #open source
- A Dataset of Open-Source Android Applications (DEK, MM, SAM, AR, JP, AF, JS), pp. 522–525.
- MSR-2015-MirakhorliC #architecture #debugging
- Modifications, Tweaks, and Bug Fixes in Architectural Tactics (MM, JCH), pp. 377–380.
- SANER-2015-Mirakhorli #architecture #how #question #re-engineering #what #why
- Software architecture reconstruction: Why? What? How? (MM), p. 595.
- FSE-2014-MirakhorliFGWC #architecture #detection #monitoring #named
- Archie: a tool for detecting, monitoring, and preserving architecturally significant code (MM, AF, AG, MW, JCH), pp. 739–742.
- RE-2014-RahimiMC #automation #quality #requirements #specification #visualisation
- Automated extraction and visualization of quality concerns from requirements specifications (MR, MM, JCH), pp. 253–262.
- ASE-2013-Mirakhorli #architecture #implementation #visualisation
- Preventing erosion of architectural tactics through their strategic implementation, preservation, and visualization (MM), pp. 762–765.
- FSE-2012-MirakhorliMC #design pattern #variability
- Variability points and design pattern usage in architectural tactics (MM, PM, JCH), p. 52.
- ICSE-2012-MirakhorliSCC #approach #automation #quality #traceability
- A tactic-centric approach for automating traceability of quality concerns (MM, YS, JCH, MÇ), pp. 639–649.
- RE-2012-Cleland-HuangMMA #recommendation #traceability
- Breaking the big-bang practice of traceability: Pushing timely trace recommendations to project stakeholders (JCH, PM, MM, SA), pp. 231–240.
- ICSE-2011-DumitruGHCMCM #mining #on-demand #recommendation
- On-demand feature recommendations derived from mining public product descriptions (HD, MG, NH, JCH, BM, CCH, MM), pp. 181–190.
- ICSE-2011-Mirakhorli #approach #architecture #requirements
- Tracing architecturally significant requirements: a decision-centric approach (MM), pp. 1126–1127.
- ICSE-2011-MirakhorliC #architecture #assurance
- Tracing architectural concerns in high assurance systems (MM, JCH), pp. 908–911.
- ICSM-2011-MirakhorliC #architecture #information management #maintenance #modelling #traceability #using
- Using tactic traceability information models to reduce the risk of architectural degradation during system maintenance (MM, JCH), pp. 123–132.
- ESEC-FSE-2019-SantosSCGM #approach #architecture
- Achilles' heel of plug-and-Play software architectures: a grounded theory based approach (JCSS, AS, TC, SG, MM), pp. 671–682.
- WICSA-2016-SantosMMZ #architecture #named #research #traceability
- BUDGET: A Tool for Supporting Software Architecture Traceability Research (JCSS, MM, IM, WZ), pp. 303–306.
- ICSA-2017-SantosPMGVS #architecture #comprehension #empirical #php #security
- Understanding Software Vulnerabilities Related to Architectural Security Tactics: An Empirical Investigation of Chromium, PHP and Thunderbird (JCSS, AP, MM, MG, JVV, AS), pp. 69–78.
- ICSA-2019-GonzalezAM #architecture #empirical #industrial #security
- Architectural Security Weaknesses in Industrial Control Systems (ICS) an Empirical Study Based on Disclosed Software Vulnerabilities (DG, FA, MM), pp. 31–40.