Usability is the weakest link in the security chain of many prominent applications. A set of security usability principles should therefore be considered when designing and engine...
Several tools and methods for source code quality assurance based on static analysis finally reached a state when they are applicable in practice and recognized by the industry. H...
Modular design methodologies, which decompose large and complex systems into components that are relatively easy to develop and maintain, have been widely adopted in the software ...
Software development and maintenance are highly distributed processes that involve a multitude of supporting tools and resources. Knowledge relevant to these resources is typicall...
Drawing on our previous work on survey and reporting tools that compare faculty expectations with what students report experiencing in class, this paper presents details of a new ...
Judith Ann Ouimet, Sermsak Buntha, Sergiu M. Dasca...