—By utilizing XML representations of source programs under test, a new approach is proposed to concisely implement some prototypes for TACCLE, a software testing methodology. The...
An approach to recover/discover traceability links between software artifacts via the examination of a software system’s version history is presented. A heuristic-based approach...
Huzefa H. Kagdi, Jonathan I. Maletic, Bonita Shari...
Security patterns capture best practice on secure software design and development. They document typical solutions to security problems. To ensure security, large software system ...
Distributed applications are based on algorithms which should be able to deal with time constraints. It is mandatory to express time constraints in (mathematical) models and the cu...
Compliance with privacy legislation is a primary concern for health care institutions that are building information systems support for their business processes. This paper descri...