Results 21 to 30 of about 829,080 (295)
Software Engineering for Tagging Software [PDF]
Tagging is integrated into web application to ease maintenance of large amount of information stored in a web application. With no mention of requirement specification or design document for tagging software, academically or otherwise, integrating tagging software in a web application is a tedious task.
Anita Goel, Karan Gupta
openaire +2 more sources
Software Quality Models: A Comprehensive Review and Analysis [PDF]
Background and Objectives: One of the major challenges in software engineering is how to respond to the desolate state of high-quality software development in a timely and cost-effective manner. Many studies have been conducted in an attempt to formalize
M. Sadeghzadeh Hemayati, H. Rashidi
doaj +1 more source
Brief review of classical Effort Estimation models for Software development projects
A critical synthesis on the most representative models for software development project effort estimation is provided. This work is a basis for a discussion about the methodological and practical challenges which entail the effort estimation field ...
Diego Bravo-Estrada, Roxana López-Cruz
doaj +1 more source
The ever‐growing open‐source software tools in different domains increase the difficulty of software selection from the end‐users perspective. The process of evaluating, comparing, and selecting open‐source solutions is far from trivial. Especially, when
Yuqi Li+4 more
doaj +1 more source
Intersectional Software Engineering as a Field
Intersectionality is a concept used to explain the power dynamics and inequalities that some groups experience owing to the interconnection of social differences such as in gender, sexual identity, poverty status, race, geographic location, disability ...
Alicia Julia Wilson Takaoka+2 more
doaj +1 more source
Structuring meaningful bug‐fixing patches to fix software defect
Currently, software projects require a significant amount of time, effort and other resources to be invested in software testing to reduce the number of code defects.
Hui Li+4 more
doaj +1 more source
Revisit security in the era of DevOps: An evidence‐based inquiry into DevSecOps industry
By adopting agile and lean practices, DevOps aims to achieve rapid value delivery by speeding up development and deployment cycles, which however lead to more security concerns that cannot be fully addressed by an isolated security role only in the final
Xin Zhou+7 more
doaj +1 more source
An Activity Theory-Based Approach for Context Analysis, Design and Evolution
This paper presents a new interdisciplinary approach to support context modeling in context-awareness software developments. The premise of this approach relies on the idea that understanding a complex socio-technical ecology, while adapting the software
Ismael Camargo-Henríquez, Andrés Silva
doaj +1 more source
Analysis of cryptographic mechanisms used in ransomware CryptXXX v3 [PDF]
The main purpose of this paper was to analysis how malicious software is using cryptographic mechanisms. Reverse engineering were applied in order to discover mechanisms used in ransomware CryptXXX v3.
Michał Glet
doaj +1 more source