This paper introduced coding guidelines for use by academics developing code as part of their research in areas of computer science or similar disciplines. We introduce the guidel...
There are many situations in which it is desirable to protect a piece of software from illegitimate tampering once it gets distributed to the users. Protecting the software code me...
: Self-adaptive software systems use observations of their own behavior, and that of their environment, to select and enact adaptations in accordance with some objective(s). This a...
Since the rise of the light weight software processes, the paradigm on how software should be developed has started to shift. Agile methods strive to supersede the traditional soft...
: Refactoring und Testen bilden wesentliche Bausteine des Extreme Programming. In diesem Beitrag wird der konzeptionelle Zusammenhang zwischen beiden Praktiken herausgearbeitet. In...