This paper discusses the Trustworthy Computing Security Development Lifecycle (or simply the SDL), a process that Microsoft has adopted for the development of software that needs ...
Over the past decade, the need to build secure software has become a dominant goal in software development. Consequently, software researchers and practitioners have identified wa...
One of the reasons large-scale software development is difficult is the number of dependencies that software engineers face. These dependencies create a need for communication and...
Cleidson R. B. de Souza, Stephen Quirk, Erik Train...
Areas crucial to life such as medicine, transportation, nuclearenergy research and industry, aeronautics, and others, all make use of software in one way or another. However, the ...
W. Eric Wong, Vidroha Debroy, Adithya Surampudi, H...
In this paper, we introduce EXACT, the EXperimental Algorithmics Computational Toolkit. EXACT is a software framework for describing, controlling, and analyzing computer experimen...
William E. Hart, Jonathan W. Berry, Robert T. Heap...
Middleware simplifies the construction of distributed applications. These applications typically require continuous uptime. The maintenance of distributed applications, though, im...
A common belief is that software designs decay as systems evolve. This research examines the extent to which software designs actually decay by studying the aging of design patter...
Software deployment and updating of deployed code is a critical topic in the area of wireless sensor networks (WSN). Reasons are unreliable network connectivity, resource limitatio...
Softwareprofessionals rely on internaldocumentationas an aid in understanding programs. Unfortunately, the documentation for most programs is usually out-of-date and cannot be tru...
Most of the effort that goes into improving the quality of software paradoxically does not lead to quantitative, measurable quality. Software developers and quality-assurance orga...