Providing robust decision support for software engineering (SE) requires the collection of data across multiple contexts so that one can begin to elicit the context variables that...
Daniela Cruzes, Victor R. Basili, Forrest Shull, M...
Threat modeling analyzes how an adversary might attack a system by supplying it with malicious data or interacting with it. The analysis uses a Data Flow Diagram (DFD) to describe...
Today, software-engineering research and industry alike recognize the need for practical tools to support reverseengineering activities. Most of the well-known CASE tools support ...
Ralf Kollman, Petri Selonen, Eleni Stroulia, Tarja...
Despite the growing research on usability in the predevelopment phase, we know little about post-deployment usability activities. To characterize these activities, we surveyed 333...
Parmit K. Chilana, Andrew J. Ko, Jacob O. Wobbrock...
We describe how development productivity for multi-tier webbased database ‘forms’ oriented applications can be significantly improved using ‘InstantApps’, an interpretive ...
Gautam Shroff, Puneet Agarwal, Premkumar T. Devanb...