Sciweavers

1412 search results - page 44 / 283
» The Value of Outsourced Software
Sort
View
XPU
2004
Springer
14 years 2 months ago
Assessing Agility
Abstract. A technique is described that uses goals to assess the agility of software development teams and shows how it can be used with some examples. The agile assessment can be ...
Peter Lappo, Henry C. T. Andrew
ICSE
2003
IEEE-ACM
14 years 8 months ago
Undergraduate Software Engineering Curriculum Enhancement via Human-Computer Interaction
More needs to be done to train students to deliver usable software. The current Software Engineering curriculum includes Human-Computer Interaction (HCI) topics in terms of a lect...
Stephanie Ludi
COMPSAC
2002
IEEE
14 years 1 months ago
Temporal Modeling of Software Test Coverage
This paper presents a temporal model for the coverage achieved by software testing. The proposed model, which is applicable at any level of the testing hierarchy, can determine th...
Sahra Sedigh-Ali, Arif Ghafoor, Raymond A. Paul
DSN
2008
IEEE
13 years 10 months ago
Convicting exploitable software vulnerabilities: An efficient input provenance based approach
Software vulnerabilities are the root cause of a wide range of attacks. Existing vulnerability scanning tools are able to produce a set of suspects. However, they often suffer fro...
Zhiqiang Lin, Xiangyu Zhang, Dongyan Xu
JSS
2008
157views more  JSS 2008»
13 years 8 months ago
Can k-NN imputation improve the performance of C4.5 with small software project data sets? A comparative evaluation
Missing data is a widespread problem that can affect the ability to use data to construct effective prediction systems. We investigate a common machine learning technique that can...
Qinbao Song, Martin J. Shepperd, Xiangru Chen, Jun...