Sciweavers

175 search results - page 29 / 35
» Mutual Development: A Case Study in Customer-Initiated Softw...
Sort
View
ICSE
2008
IEEE-ACM
14 years 7 months ago
Security metrics for source code structures
Software security metrics are measurements to assess security related imperfections (or perfections) introduced during software development. A number of security metrics have been...
Istehad Chowdhury, Brian Chan, Mohammad Zulkernine
PROFES
2004
Springer
14 years 22 days ago
Requirements Prioritization Challenges in Practice
Requirements prioritization is recognized as an important activity in product development. In this paper, we describe the current state of requirements prioritization practices in ...
Laura Lehtola, Marjo Kauppinen, Sari Kujala
COMAD
2009
13 years 8 months ago
CRM Analytics Framework
Implementing a CRM Analytics solution for a business involves many steps including data extraction, populating the extracted data into a warehouse, and running an appropriate mini...
Joseph P. Bigus, Upendra Chitnis, Prasad M. Deshpa...
SIGSOFT
2007
ACM
14 years 8 months ago
Recovering and using use-case-diagram-to-source-code traceability links
Use case diagrams (UCDs) are widely used to describe requirements and desired functionality of software products. However, UCDs are loosely linked to source code, and maintaining ...
Mark Grechanik, Kathryn S. McKinley, Dewayne E. Pe...
KBSE
2008
IEEE
14 years 1 months ago
Exploring the composition of unit test suites
In agile software development, test code can considerably contribute to the overall source code size. Being a valuable asset both in terms of verification and documentation, the ...
Bart Van Rompaey, Serge Demeyer