As the time of mobile Internet has come gently, the mobile applications has progressively designed by techniques based on web technology. The web technology has a lot of strong po...
Some "non-' or "extra-functional" features, such as reliability, security, and tracing, defy modularization mechanisms in programming languages. This makes suc...
Eric Wohlstadter, Stoney Jackson, Premkumar T. Dev...
Conducting controlled experiments about programming activities often requires the use of multiple tasks of similar difficulty. In previously reported work about a controlled exper...
The prevailing model for digital preservation is that archives should be similar to a “fortress”: a large, protective infrastructure built to defend a relatively small collect...
Component Based Software Engineering has been perceived to have immense reuse potential. This area has evoked wide interest and has led to considerable investment in research and ...