Software organizations follow capability models in order to aggregate quality to their processes and products. Process measurement and analysis are key issues, but their implement...
Duncan Dubugras A. Ruiz, Karin Becker, Taisa C. No...
Threat modeling analyzes how an adversary might attack a system by supplying it with malicious data or interacting with it. The analysis uses a Data Flow Diagram (DFD) to describe...
Data replication is an excellent technique to move and cache data close to users. By replication, data access performance can be improved dramatically. One of the challenges in da...
This paper introduces XHMBS (the eXtended Hyperdocument Model Based on Statecharts) to support the formal specification of general hypermedia applications. XHMBS uses a novel form...
Fabiano Borges Paulo, Marcelo Augusto Santos Turin...
Imagine if you would like to deploy your new simulation online and your systems can just take care of itself. Needed web interface could be generated, database schema objects coul...