Sciweavers

1051 search results - page 91 / 211
» Protocols in the use of empirical software engineering artif...
Sort
View
FOSSACS
2008
Springer
13 years 10 months ago
Compositional Methods for Information-Hiding
Protocols for information-hiding often use randomized primitives to obfuscate the link between the observables and the information to be protected. The degree of protection provide...
Christelle Braun, Konstantinos Chatzikokolakis, Ca...
COMPSAC
2006
IEEE
14 years 3 months ago
Testability of Software in Service-Oriented Architecture
Service-Oriented Architecture (SOA) is a system architecture in which a collection of loosely coupled services communicate with each other using standard interfaces and message-ex...
Wei-Tek Tsai, Jerry Gao, Xiao Wei, Yinong Chen
ISESE
2005
IEEE
14 years 2 months ago
Quality vs. quantity: comparing evaluation methods in a usability-focused software architecture modification task
A controlled experiment was performed to assess the usefulness of portions of a Usability-Supporting Architectural Pattern (USAP) in modifying the design of software architectures...
Elspeth Golden, Bonnie E. John, Len Bass
KBSE
2008
IEEE
14 years 3 months ago
Using Simulation to Investigate Requirements Prioritization Strategies
—Agile and traditional plan-based approaches to software system development both agree that prioritizing requirements is an essential activity. They differ in basic strategy - wh...
Daniel Port, Alexy Olkov, Tim Menzies
ESEM
2007
ACM
13 years 10 months ago
Mining Software Evolution to Predict Refactoring
Can we predict locations of future refactoring based on the development history? In an empirical study of open source projects we found that attributes of software evolution data ...
Jacek Ratzinger, Thomas Sigmund, Peter Vorburger, ...