Estimating software size is a difficult task that requires a methodological approach. Many different methods that exist today use distinct abstractions to depict a software system...
Embedded systems are being deployed as a part of critical infrastructures and are vulnerable to malicious attacks due to internet accessibility. Intrusion detection systems have b...
Tao Zhang, Xiaotong Zhuang, Santosh Pande, Wenke L...
Intensional views and relations have been proposed as a way of actively documenting high-level structural regularities in the source code of a software system. By checking conform...
Software product lines have already proven to be a successful methodology for building and maintaining a collection of similar software products, based on a common architecture. H...
Israel Herraiz, Gregorio Robles, Rafael Capilla, J...
Although Non-Functional Requirements (NFR) have been present in many software development methods, they have been faced as a second or even third class type of requirement, frequen...
Luiz Marcio Cysneiros, Julio Cesar Sampaio do Prad...