Sciweavers

1494 search results - page 147 / 299
» Less Extreme Programming
Sort
View
IEEEIAS
2009
IEEE
15 years 9 months ago
Organizational Barriers to the Implementation of Security Engineering
: The link between security engineering and systems engineering exists at the earliest stage of systems development, and, as a whole, there is sufficient evidence to suggest the di...
Bryan Stewart Cline
IFM
2009
Springer
107views Formal Methods» more  IFM 2009»
15 years 9 months ago
Incremental Reasoning for Multiple Inheritance
Object-orientation supports code reuse and incremental programming. Multiple inheritance increases the power of code reuse, but complicates the binding of method calls and thereby ...
Johan Dovland, Einar Broch Johnsen, Olaf Owe, Mart...
GROUP
2009
ACM
15 years 9 months ago
Two peers are better than one: aggregating peer reviews for computing assignments is surprisingly accurate
Scientific peer review, open source software development, wikis, and other domains use distributed review to improve quality of created content by providing feedback to the workā...
Ken Reily, Pam Ludford Finnerty, Loren G. Terveen
IWPC
2008
IEEE
15 years 9 months ago
A Tool for Visual Understanding of Source Code Dependencies
Many program comprehension tools use graphs to visualize and analyze source code. The main issue is that existing approaches create graphs overloaded with too much information. Gr...
Martin Pinzger, Katja Grafenhain, Patrick Knab, Ha...
RTAS
2008
IEEE
15 years 9 months ago
A Modular Worst-case Execution Time Analysis Tool for Java Processors
Recent technologies such as the Real-Time Specification for Java promise to bring Java’s advantages to real-time systems. While these technologies have made Java more predictab...
Trevor Harmon, Martin Schoeberl, Raimund Kirner, R...