A common theoretical assumption in the study of information flow security in Java-like languages is that pointers are opaque – i.e., that the only properties that can be observ...
Software design patterns are documented best practice solutions that can be applied to reoccurring problems. Although well documented, there are often opportunities to apply them ...
This paper presents data from a study of the current state of practice of software testing. Test managers from twelve different software organizations were interviewed. The interv...
Object-oriented applications are difficult to extend and maintain, due to the presence of implicit dependencies in the inheritance hierarchy. Although these dependencies often co...
Knowledge creation and sharing in organizations is most often assumed to involve direct interactions. It is true that the creation of shared knowledge is really only feasible when...