Results 41 to 50 of about 5,323,332 (338)
Software Engineering for Tagging Software [PDF]
Tagging is integrated into web application to ease maintenance of large amount of information stored in a web application. With no mention of requirement specification or design document for tagging software, academically or otherwise, integrating tagging software in a web application is a tedious task.
Anita Goel, Karan Gupta
openaire +2 more sources
Revisit security in the era of DevOps: An evidence‐based inquiry into DevSecOps industry
By adopting agile and lean practices, DevOps aims to achieve rapid value delivery by speeding up development and deployment cycles, which however lead to more security concerns that cannot be fully addressed by an isolated security role only in the final
Xin Zhou+7 more
doaj +1 more source
Software Quality Models: A Comprehensive Review and Analysis [PDF]
Background and Objectives: One of the major challenges in software engineering is how to respond to the desolate state of high-quality software development in a timely and cost-effective manner. Many studies have been conducted in an attempt to formalize
M. Sadeghzadeh Hemayati, H. Rashidi
doaj +1 more source
The ever‐growing open‐source software tools in different domains increase the difficulty of software selection from the end‐users perspective. The process of evaluating, comparing, and selecting open‐source solutions is far from trivial. Especially, when
Yuqi Li+4 more
doaj +1 more source
Systematic Mapping Studies in Software Engineering
BACKGROUND: A software engineering systematic map is a defined method to build a classification scheme and structure a software engineering field of interest. The analysis of results focuses on frequencies of publications for categories within the scheme.
K. Petersen+3 more
semanticscholar +1 more source
An Activity Theory-Based Approach for Context Analysis, Design and Evolution
This paper presents a new interdisciplinary approach to support context modeling in context-awareness software developments. The premise of this approach relies on the idea that understanding a complex socio-technical ecology, while adapting the software
Ismael Camargo-Henríquez, Andrés Silva
doaj +1 more source
Analysis of cryptographic mechanisms used in ransomware CryptXXX v3 [PDF]
The main purpose of this paper was to analysis how malicious software is using cryptographic mechanisms. Reverse engineering were applied in order to discover mechanisms used in ransomware CryptXXX v3.
Michał Glet
doaj +1 more source
Geographic variation in walking activity in the red flour beetle Tribolium castaneum
This study examined whether there is geographic variation in field populations, focusing on the moving activity in the red flour beetle Tribolium castaneum. Results showed significant differences in moving activity among field populations but no correlation with latitude or meteorological factors.
Kentarou Matsumura
wiley +1 more source
An Empirical Study on Software Test Effort Estimation for Defense Projects
Effort estimation of software testing plays a vital role in the effective completion of testing. In particular, software test effort estimation in defense projects is not an easy and simple phenomenon, owing to internal and external factors.
Esra Cibir, Tulin Ercelebi Ayyildiz
doaj +1 more source
occumb: An R package for site occupancy modeling of eDNA metabarcoding data
This study introduces a new R package, occumb, for the convenient application of site occupancy modeling using environmental DNA (eDNA) metabarcoding data. We outline a data analysis workflow, including data setup, model fitting, model assessment, and comparison of potential study settings based on model predictions, all of which can be performed using
Keiichi Fukaya, Yuta Hasebe
wiley +1 more source