A key challenge in ubiquitous computing is how to manage ambient information about the environment where a variety of devices appear. Traditional capability descriptions are inadeq...
Hardware/software co-verification is becoming an indispensable tool for building highly trustworthy embedded systems. A stumbling block to effective co-verification using model ch...
This paper applies Lehman's theory of software evolution to analyse the characteristics of web-based applications and identifies the essences and incidents that cause difficu...
Short product cycles and rapidly changing requirements are increasingly forcing developers to use agile development strategies like extreme programming and test–driven developme...
Egon Teiniker, Stefan Mitterdorfer, Leif Morgan Jo...
Increased reuse of software components has led to a software mishmash as existing packages are used as building blocks for new systems. Current debuggers cannot cope with the intr...