Sciweavers

686 search results - page 88 / 138
» Empirical Studies in Reverse Engineering
Sort
View
IPM
2008
142views more  IPM 2008»
14 years 10 months ago
Tagging and searching: Search retrieval effectiveness of folksonomies on the World Wide Web
Many Web sites have begun allowing users to submit items to a collection and tag them with keywords. The folksonomies built from these tags are an interesting topic that has seen ...
P. Jason Morrison
SAC
2009
ACM
15 years 4 months ago
Remote software protection by orthogonal client replacement
In a typical client-server scenario, a trusted server provides valuable services to a client, which runs remotely on an untrusted platform. Of the many security vulnerabilities th...
Mariano Ceccato, Paolo Tonella, Mila Dalla Preda, ...
ICSE
2003
IEEE-ACM
15 years 10 months ago
New Directions on Agile Methods: A Comparative Analysis
Agile software development methods have caught the attention of software engineers and researchers worldwide. Scientific research is yet scarce. This paper reports results from a ...
Pekka Abrahamsson, Juhani Warsta, Mikko T. Siponen...
ICSE
2008
IEEE-ACM
15 years 10 months ago
A value-based approach for documenting design decisions rationale: a replicated experiment
The explicit documentation of the rationale of design decisions is a practice generally encouraged but rarely implemented in industry because of a variety of inhibitors. Known met...
Davide Falessi, Rafael Capilla, Giovanni Cantone
ICSE
2007
IEEE-ACM
15 years 4 months ago
Cost-Benefit Analysis of Software Development Techniques and Practices
Investigations of software development practices, processes, and techniques frequently report separately on the costs and benefits of a phenomenon under study, but rarely adequate...
Hakan Erdogmus