Sciweavers

168 search results - page 30 / 34
» Software risk management barriers: An empirical study
Sort
View
CLOUDCOM
2009
Springer
15 years 6 months ago
Cloudbus Toolkit for Market-Oriented Cloud Computing
This keynote paper: (1) presents the 21st century vision of computing and identifies various IT paradigms promising to deliver computing as a utility; (2) defines the architecture ...
Rajkumar Buyya, Suraj Pandey, Christian Vecchiola
HICSS
2008
IEEE
134views Biometrics» more  HICSS 2008»
15 years 6 months ago
Simplified Use Case Driven Approach (SUCADA) for Conversion of Legacy System to COTS Package
The conversion of a legacy system to a system based on a commercial-off-the-shelf (COTS) package demands a dedicated guidance. The assumption that it is just a matter of adopting ...
Jose D. Montero, YongSeog Kim, Jeff Johnson
SIGSOFT
2007
ACM
16 years 11 days ago
Differential testing: a new approach to change detection
Regression testing, as it's commonly practiced, is unsound due to inconsistent test repair and test addition. This paper presents a new technique, differential testing, that ...
Robert B. Evans, Alberto Savoia
SIGSAND
2008
15 years 1 months ago
Boundary Objects for Value-based Requirements Engineering
: Value-based requirements engineering focuses on the alignment of requirements engineering decisions and business value decisions. There is much evidence on the importance of this...
Barbara Paech, Aybüke Aurum
ICSM
2008
IEEE
15 years 6 months ago
Understanding the rationale for updating a function's comment
Up-to-date comments are critical for the successful evolution of a software application. When modifying a function, developers may update the comment associated with the function ...
Haroon Malik, Istehad Chowdhury, Hsiao-Ming Tsou, ...