Existing security models require that information of a given security level be prevented from “leaking” into lower-security information. High-security applications must be dem...
Nowadays common practice indicates that the Requirement Engineering (RE) process critically influences the success of the system development life cycle. Several commercial tools ...
Traceability helps stakeholders to understand the relationships that exist between software artifacts created during a software development project. For example, the evolution of ...
The work described in this paper is an investigation of COTS-based software development within a particular NASA environment, with an emphasis on the processes used. Fifteen proje...
Maurizio Morisio, Carolyn B. Seaman, Amy T. Parra,...
A common form of live technical presentation is that given by programmers for a programming audience during conferences, demonstrations, code reviews, and tutorials. Such presenta...
Li-Te Cheng, Michael Desmond, Margaret-Anne D. Sto...