nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A Bayesian network model for likelihood estimations of acquirement of critical software vulnerabilities and exploits
|
Holm, Hannes |
|
2015 |
58 |
C |
p. 304-318 15 p. |
artikel |
2 |
A framework to identify primitives that represent usability within Model-Driven Development methods
|
Panach, Jose Ignacio |
|
2015 |
58 |
C |
p. 338-354 17 p. |
artikel |
3 |
Analogy-based software development effort estimation: A systematic mapping and review
|
Idri, Ali |
|
2015 |
58 |
C |
p. 206-230 25 p. |
artikel |
4 |
Approach for estimating similarity between procedures in differently compiled binaries
|
Stojanović, Saša |
|
2015 |
58 |
C |
p. 259-271 13 p. |
artikel |
5 |
A systematic literature review of studies on business process modeling quality
|
Moreno-Montes de Oca, Isel |
|
2015 |
58 |
C |
p. 187-205 19 p. |
artikel |
6 |
A systematic review on the relationship between user involvement and system success
|
Bano, Muneera |
|
2015 |
58 |
C |
p. 148-169 22 p. |
artikel |
7 |
Automated events identification in use cases
|
Jurkiewicz, J. |
|
2015 |
58 |
C |
p. 110-122 13 p. |
artikel |
8 |
Automatic transformation of iterative loops into recursive methods
|
Insa, David |
|
2015 |
58 |
C |
p. 95-109 15 p. |
artikel |
9 |
Categorization of risk factors for distributed agile projects
|
Shrivastava, Suprika V. |
|
2015 |
58 |
C |
p. 373-387 15 p. |
artikel |
10 |
Current state of research on cross-site scripting (XSS) – A systematic literature review
|
Hydara, Isatou |
|
2015 |
58 |
C |
p. 170-186 17 p. |
artikel |
11 |
Empirical evaluation of a cloud computing information security governance framework
|
Rebollo, Oscar |
|
2015 |
58 |
C |
p. 44-57 14 p. |
artikel |
12 |
Identifying refactoring opportunities in object-oriented code: A systematic literature review
|
Al Dallal, Jehad |
|
2015 |
58 |
C |
p. 231-249 19 p. |
artikel |
13 |
IFC Editorial Board
|
|
|
2015 |
58 |
C |
p. IFC- 1 p. |
artikel |
14 |
Infeasible path generalization in dynamic symbolic execution
|
Delahaye, Mickaël |
|
2015 |
58 |
C |
p. 403-418 16 p. |
artikel |
15 |
Investigating software testing and maintenance reports: Case study
|
Janczarek, Paweł |
|
2015 |
58 |
C |
p. 272-288 17 p. |
artikel |
16 |
“Old” theories, “New” technologies: Understanding knowledge sharing and learning in Brazilian software development companies
|
Menolli, André |
|
2015 |
58 |
C |
p. 289-303 15 p. |
artikel |
17 |
On the probability distribution of faults in complex software systems
|
Galinac Grbac, Tihana |
|
2015 |
58 |
C |
p. 250-258 9 p. |
artikel |
18 |
Product derivation in practice
|
de Souza, Leandro Oliveira |
|
2015 |
58 |
C |
p. 319-337 19 p. |
artikel |
19 |
Search based algorithms for test sequence generation in functional testing
|
Ferrer, Javier |
|
2015 |
58 |
C |
p. 419-432 14 p. |
artikel |
20 |
Semantics for consistent activation in context-oriented systems
|
Cardozo, Nicolás |
|
2015 |
58 |
C |
p. 71-94 24 p. |
artikel |
21 |
Similarity testing for access control
|
Bertolino, Antonia |
|
2015 |
58 |
C |
p. 355-372 18 p. |
artikel |
22 |
Software defect prediction using ensemble learning on selected features
|
Laradji, Issam H. |
|
2015 |
58 |
C |
p. 388-402 15 p. |
artikel |
23 |
Software test-code engineering: A systematic mapping
|
Garousi Yusifoğlu, Vahid |
|
2015 |
58 |
C |
p. 123-147 25 p. |
artikel |
24 |
Using Bayesian regression and EM algorithm with missing handling for software effort prediction
|
Zhang, Wen |
|
2015 |
58 |
C |
p. 58-70 13 p. |
artikel |
25 |
Using CMMI together with agile software development: A systematic review
|
Selleri Silva, Fernando |
|
2015 |
58 |
C |
p. 20-43 24 p. |
artikel |
26 |
Using intentional fragments to bridge the gap between organizational and intentional levels
|
Cortes-Cornax, M. |
|
2015 |
58 |
C |
p. 1-19 19 p. |
artikel |