default search action
Information & Software Technology, Volume 58
Volume 58, February 2015
- Mario Cortes Cornax, Alexandru Matei, Sophie Dupuy-Chessa, Dominique Rieu, Nadine Mandran, Emmanuel Letier:
Using intentional fragments to bridge the gap between organizational and intentional levels. 1-19 - Fernando Selleri Silva, Felipe Santana Furtado Soares, Angela Lima Peres, Ivanildo Monteiro de Azevedo, Ana Paula L. F. Vasconcelos, Fernando Kenji Kamei, Silvio Romero de Lemos Meira:
Using CMMI together with agile software development: A systematic review. 20-43 - Oscar Rebollo, Daniel Mellado, Eduardo Fernández-Medina, Haralambos Mouratidis:
Empirical evaluation of a cloud computing information security governance framework. 44-57 - Wen Zhang, Ye Yang, Qing Wang:
Using Bayesian regression and EM algorithm with missing handling for software effort prediction. 58-70 - Nicolás Cardozo, Sebastián González, Kim Mens, Ragnhild Van Der Straeten, Jorge Vallejos, Theo D'Hondt:
Semantics for consistent activation in context-oriented systems. 71-94 - David Insa, Josep Silva:
Automatic transformation of iterative loops into recursive methods. 95-109 - Jakub Jurkiewicz, Jerzy R. Nawrocki:
Automated events identification in use cases. 110-122 - Vahid Garousi-Yusifoglu, Yasaman Amannejad, Aysu Betin Can:
Software test-code engineering: A systematic mapping. 123-147 - Muneera Bano, Didar Zowghi:
A systematic review on the relationship between user involvement and system success. 148-169 - Isatou Hydara, Abu Bakar Md Sultan, Hazura Zulzalil, Novia Admodisastro:
Current state of research on cross-site scripting (XSS) - A systematic literature review. 170-186 - Isel Moreno-Montes de Oca, Monique Snoeck, Hajo A. Reijers, Abel Rodríguez-Morffi:
A systematic literature review of studies on business process modeling quality. 187-205 - Ali Idri, Fatima Azzahra Amazal, Alain Abran:
Analogy-based software development effort estimation: A systematic mapping and review. 206-230 - Jehad Al-Dallal:
Identifying refactoring opportunities in object-oriented code: A systematic literature review. 231-249 - Tihana Galinac Grbac, Darko Huljenic:
On the probability distribution of faults in complex software systems. 250-258 - Sasa Stojanovic, Zaharije Radivojevic, Milos Cvetanovic:
Approach for estimating similarity between procedures in differently compiled binaries. 259-271 - Pawel Janczarek, Janusz Sosnowski:
Investigating software testing and maintenance reports: Case study. 272-288 - André Luís Andrade Menolli, Maria Alexandra Cunha, Sheila S. Reinehr, Andreia Malucelli:
"Old" theories, "New" technologies: Understanding knowledge sharing and learning in Brazilian software development companies. 289-303 - Hannes Holm, Matus Korman, Mathias Ekstedt:
A Bayesian network model for likelihood estimations of acquirement of critical software vulnerabilities and exploits. 304-318 - Leandro Souza de Oliveira, Pádraig O'Leary, Eduardo Santana de Almeida, Silvio Romero de Lemos Meira:
Product derivation in practice. 319-337 - José Ignacio Panach, Natalia Juristo Juzgado, Francisco Valverde, Oscar Pastor:
A framework to identify primitives that represent usability within Model-Driven Development methods. 338-354 - Antonia Bertolino, Said Daoudagh, Donia El Kateb, Christopher Henard, Yves Le Traon, Francesca Lonetti, Eda Marchetti, Tejeddine Mouelhi, Mike Papadakis:
Similarity testing for access control. 355-372 - Suprika Vasudeva Shrivastava, Urvashi Rathod:
Categorization of risk factors for distributed agile projects. 373-387 - Issam H. Laradji, Mohammad R. Alshayeb, Lahouari Ghouti:
Software defect prediction using ensemble learning on selected features. 388-402 - Mickaël Delahaye, Bernard Botella, Arnaud Gotlieb:
Infeasible path generalization in dynamic symbolic execution. 403-418 - Javier Ferrer, Peter M. Kruse, Francisco Chicano, Enrique Alba:
Search based algorithms for test sequence generation in functional testing. 419-432
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.