Open-source software, usually created by volunteer programmers dispersed worldwide, now competes with that developed by software firms. This achievement is particularly impressive...
A common theme in information security is protection of trusted software components against unauthorized access by untrusted users. In the context of distributed object technologi...
We present an overview of a software architecting method and visual language we call Visual Frameworks. The method creates concrete, strongly typed software architectures throu...
Internet search engines display understanding or misunderstanding of user intent in and through the particular batches of results they retrieve and their perceived relevance. Yet ...
Robert J. Moore, Elizabeth F. Churchill, Raj Gopal...
In this paper, we aim to identify what kinds of knowledge management (KM) challenges are typical in the renewal of software development processes, and to propose solutions to the ...