Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             26 results found
no title author magazine year volume issue page(s) type
1 A Bayesian network model for likelihood estimations of acquirement of critical software vulnerabilities and exploits Holm, Hannes
2015
58 C p. 304-318
15 p.
article
2 A framework to identify primitives that represent usability within Model-Driven Development methods Panach, Jose Ignacio
2015
58 C p. 338-354
17 p.
article
3 Analogy-based software development effort estimation: A systematic mapping and review Idri, Ali
2015
58 C p. 206-230
25 p.
article
4 Approach for estimating similarity between procedures in differently compiled binaries Stojanović, Saša
2015
58 C p. 259-271
13 p.
article
5 A systematic literature review of studies on business process modeling quality Moreno-Montes de Oca, Isel
2015
58 C p. 187-205
19 p.
article
6 A systematic review on the relationship between user involvement and system success Bano, Muneera
2015
58 C p. 148-169
22 p.
article
7 Automated events identification in use cases Jurkiewicz, J.
2015
58 C p. 110-122
13 p.
article
8 Automatic transformation of iterative loops into recursive methods Insa, David
2015
58 C p. 95-109
15 p.
article
9 Categorization of risk factors for distributed agile projects Shrivastava, Suprika V.
2015
58 C p. 373-387
15 p.
article
10 Current state of research on cross-site scripting (XSS) – A systematic literature review Hydara, Isatou
2015
58 C p. 170-186
17 p.
article
11 Empirical evaluation of a cloud computing information security governance framework Rebollo, Oscar
2015
58 C p. 44-57
14 p.
article
12 Identifying refactoring opportunities in object-oriented code: A systematic literature review Al Dallal, Jehad
2015
58 C p. 231-249
19 p.
article
13 IFC Editorial Board 2015
58 C p. IFC-
1 p.
article
14 Infeasible path generalization in dynamic symbolic execution Delahaye, Mickaël
2015
58 C p. 403-418
16 p.
article
15 Investigating software testing and maintenance reports: Case study Janczarek, Paweł
2015
58 C p. 272-288
17 p.
article
16 “Old” theories, “New” technologies: Understanding knowledge sharing and learning in Brazilian software development companies Menolli, André
2015
58 C p. 289-303
15 p.
article
17 On the probability distribution of faults in complex software systems Galinac Grbac, Tihana
2015
58 C p. 250-258
9 p.
article
18 Product derivation in practice de Souza, Leandro Oliveira
2015
58 C p. 319-337
19 p.
article
19 Search based algorithms for test sequence generation in functional testing Ferrer, Javier
2015
58 C p. 419-432
14 p.
article
20 Semantics for consistent activation in context-oriented systems Cardozo, Nicolás
2015
58 C p. 71-94
24 p.
article
21 Similarity testing for access control Bertolino, Antonia
2015
58 C p. 355-372
18 p.
article
22 Software defect prediction using ensemble learning on selected features Laradji, Issam H.
2015
58 C p. 388-402
15 p.
article
23 Software test-code engineering: A systematic mapping Garousi Yusifoğlu, Vahid
2015
58 C p. 123-147
25 p.
article
24 Using Bayesian regression and EM algorithm with missing handling for software effort prediction Zhang, Wen
2015
58 C p. 58-70
13 p.
article
25 Using CMMI together with agile software development: A systematic review Selleri Silva, Fernando
2015
58 C p. 20-43
24 p.
article
26 Using intentional fragments to bridge the gap between organizational and intentional levels Cortes-Cornax, M.
2015
58 C p. 1-19
19 p.
article
                             26 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands