Security researchers are applying software reliability models to vulnerability data, in an attempt to model the vulnerability discovery process. I show that most current work on t...
A widely used computational model for constructing fault-tolerant distributed applications employs atomic transactions for controlling operations on persistent objects. There has ...
Application integration is a major trend in information technology today. In this paper we present a number of principles for the design, validation and presentation of process mod...
How to implement an IS (information system) successfully remains a problem. To address this, drawing on information processing theory, this study proposes an integrated model that...
How do design decisions impact the quality of the resulting software? In an empirical study of 52 ECLIPSE plug-ins, we found that the software design as well as past failure histo...