Sciweavers

ENTCS
2002
144views more  ENTCS 2002»
13 years 4 months ago
Comparative Analysis of Architectural Views Based on UML
The need to model systems and their different aspects leads to research and development of models which support all views of a system. The growing complexity of the software impos...
Lyrene Fernandes da Silva, Virginia C. Carneiro de...
AMC
2007
114views more  AMC 2007»
13 years 4 months ago
Software complexity: A statistical case study through insertion sort
: The present paper makes use of factorial experiments to assess software complexity using insertion sort as a trivial example. We next propose to implement the methodology in quic...
Anchala Kumari, Soubhik Chakraborty
ASWEC
2010
IEEE
13 years 4 months ago
Studying Software Evolution for Taming Software Complexity
—Reducing software complexity is key to reducing software maintenance costs. To discover complexity-reducing practices, in this paper we study the evolution of seven sizable open...
Steve D. Suh, Iulian Neamtiu
ICIS
1989
13 years 5 months ago
Software complexity and maintainability
This paper examines the relationships between software complexity and software maintainability in commercial software environments. Models are proposed for estimating the economic...
Rajiv D. Banker, Srikant M. Datar, Dani Zweig
APVIS
2006
13 years 5 months ago
Pattern puzzle: a metaphor for visualizing software complexity measures
Software systems have become increasingly complex over the years. Complexity metrics measures software complexity using real numbers. It is, however, hard to gain insight into dif...
Adam Ghandar, A. S. M. Sajeev, Xiaodi Huang
CCS
2008
ACM
13 years 6 months ago
Is complexity really the enemy of software security?
Software complexity is often hypothesized to be the enemy of software security. We performed statistical analysis on nine code complexity metrics from the JavaScript Engine in the...
Yonghee Shin, Laurie Williams
IEEESCC
2008
IEEE
13 years 11 months ago
A Secure Information Flow Architecture for Web Services
Current web service platforms (WSPs) often perform all web services-related processing, including securitysensitive information handling, in the same protection domain. Consequent...
Lenin Singaravelu, Jinpeng Wei, Calton Pu