Sciweavers

76 search results - page 12 / 16
» Experiences from Conducting Semi-structured Interviews in Em...
Sort
View
ICSE
2009
IEEE-ACM
13 years 5 months ago
Security Test Generation Using Threat Trees
Software security issues have been a major concern to the cyberspace community, so a great deal of research on security testing has been performed, and various security testing te...
Aaron Marback, Hyunsook Do, Ke He, Samuel Kondamar...
ICSE
1998
IEEE-ACM
13 years 12 months ago
Modeling and Analysis of a Virtual Reality System with Time Petri Nets
The design, implementation, and testing of virtual environments is complicated by the concurrency and realtime features of these systems. Therefore, the development of formal meth...
Rajesh Mascarenhas, Dinkar Karumuri, Ugo A. Buy, R...
ICSE
2007
IEEE-ACM
14 years 7 months ago
Tracking Code Clones in Evolving Software
Code clones are generally considered harmful in software development, and the predominant approach is to try to eliminate them through refactoring. However, recent research has pr...
Ekwa Duala-Ekoko, Martin P. Robillard
WOSP
2004
ACM
14 years 1 months ago
Early performance testing of distributed software applications
Performance characteristics, such as response time, throughput and scalability, are key quality attributes of distributed applications. Current practice, however, rarely applies s...
Giovanni Denaro, Andrea Polini, Wolfgang Emmerich
JTAER
2007
104views more  JTAER 2007»
13 years 7 months ago
Key Drivers of Mobile Commerce Adoption. An Exploratory Study of Spanish Mobile Users
Despite dramatic differences between non-store shoppers were discovered, very limited research has been conducted to examine them. This paper analyses the background of M-commerce...
Enrique Bigné, Carla Ruiz-Mafé, Silv...