Sciweavers

1412 search results - page 45 / 283
» The Value of Outsourced Software
Sort
View
ACSAC
2005
IEEE
14 years 2 months ago
Strengthening Software Self-Checksumming via Self-Modifying Code
Recent research has proposed self-checksumming as a method by which a program can detect any possibly malicious modification to its code. Wurster et al. developed an attack again...
Jonathon T. Giffin, Mihai Christodorescu, Louis Kr...
XPU
2004
Springer
14 years 2 months ago
Human Aspects of Software Engineering: The Case of Extreme Programming
As with to other agile methods, which value "Individuals and interactions over processes and tools" (http://agilemanifesto.org/), Extreme Programming (XP) cares about th...
Orit Hazzan, James E. Tomayko
ESEM
2009
ACM
14 years 3 months ago
Software risk management barriers: An empirical study
This paper reports results from a survey of experienced project managers on their perception of software risk management. From a sample of 18 experienced project managers, we have...
Edzreena Edza Odzaly, Paul Sage Des Greer
AMOST
2005
ACM
14 years 2 months ago
Modeling requirements for combinatorial software testing
The combinatorial approach to software testing uses models to generate a minimal number of test inputs so that selected combinations of input values are covered. The most common c...
Christopher M. Lott, Ashish Jain, Siddhartha R. Da...
RE
2002
Springer
13 years 8 months ago
AGORA: Attributed Goal-Oriented Requirements Analysis Method
This paper presents an extended version of GoalOriented Requirements Analysis Method called AGORA, where attribute values, e.g. contribution values and preference matrices, are ad...
Haruhiko Kaiya, Hisayuki Horai, Motoshi Saeki