Abstract. Software clustering techniques are useful for extracting architectural information about a system directly from its source code structure. This paper starts by examining ...
—Information systems are expected to satisfy increasingly ambitious requirements, while reducing time–to–market has become a primary objective. This trend has necessitated th...
The Nix software deployment system is based on the paradigm of transparent source/binary deployment: distributors deploy descriptors that build components from source, while clien...
This article presents an empirical study performed to evaluate the Moodle usability, from the point of view of teachers who are using this system to support their classes. The usa...
Upper bounds on worst-case execution times, which are commonly called WCET, are a prerequisite for validating the temporal correctness of tasks in a real-time system. Due to the e...