Sciweavers

2154 search results - page 247 / 431
» Evidence-based software production
Sort
View
ICSE
2009
IEEE-ACM
15 years 10 months ago
Predicting faults using the complexity of code changes
Predicting the incidence of faults in code has been commonly associated with measuring complexity. In this paper, we propose complexity metrics that are based on the code change p...
Ahmed E. Hassan
148
Voted
RE
2001
Springer
15 years 9 months ago
Evolving System Architecture to Meet Changing Business Goals: An Agent and Goal-Oriented Approach
Today's requirements engineering approaches focus on notation and techniques for modeling the intended functionality and qualities of a software system. Little attention has ...
Daniel Gross, Eric S. K. Yu
137
Voted
SACRYPT
2001
Springer
106views Cryptology» more  SACRYPT 2001»
15 years 9 months ago
Fast Normal Basis Multiplication Using General Purpose Processors
—For cryptographic applications, normal bases have received considerable attention, especially for hardware implementation. In this article, we consider fast software algorithms ...
Arash Reyhani-Masoleh, M. Anwarul Hasan
ICSE
1998
IEEE-ACM
15 years 9 months ago
Calibrating the COCOMO II Post-Architecture Model
The COCOMO II model was created to meet the need for a cost model that accounted for future software development practices. This resulted in the formulation of three submodels for...
Bradford Clark, Sunita Devnani-Chulani, Barry W. B...
142
Voted
EUROMICRO
2004
IEEE
15 years 9 months ago
Intrusion Detection in Virtual Machine Environments
A virtual machine is a software replica of an underlying real machine. Multiple virtual machines can operate on the same host machine concurrently, without interfere each other. S...
Marcos Laureano, Carlos Maziero, Edgard Jamhour