派博傳思國際中心

標(biāo)題: Titlebook: Evaluation of Novel Approaches to Software Engineering; 13th International C Ernesto Damiani,George Spanoudakis,Leszek A. Macia Conference [打印本頁]

作者: 戰(zhàn)神    時間: 2025-3-21 17:32
書目名稱Evaluation of Novel Approaches to Software Engineering影響因子(影響力)




書目名稱Evaluation of Novel Approaches to Software Engineering影響因子(影響力)學(xué)科排名




書目名稱Evaluation of Novel Approaches to Software Engineering網(wǎng)絡(luò)公開度




書目名稱Evaluation of Novel Approaches to Software Engineering網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Evaluation of Novel Approaches to Software Engineering被引頻次




書目名稱Evaluation of Novel Approaches to Software Engineering被引頻次學(xué)科排名




書目名稱Evaluation of Novel Approaches to Software Engineering年度引用




書目名稱Evaluation of Novel Approaches to Software Engineering年度引用學(xué)科排名




書目名稱Evaluation of Novel Approaches to Software Engineering讀者反饋




書目名稱Evaluation of Novel Approaches to Software Engineering讀者反饋學(xué)科排名





作者: 千篇一律    時間: 2025-3-21 21:11

作者: sigmoid-colon    時間: 2025-3-22 00:27

作者: Limited    時間: 2025-3-22 05:12

作者: extract    時間: 2025-3-22 09:12
Incremental Bidirectional Transformations: Comparing Declarative and Procedural Approaches Using thee performed not only in forward, but also in backward direction. In this paper, we compare declarative and procedural approaches to defining bidirectional transformations. More specifically, we use the well-known Families to Persons benchmark to evaluate two approaches. The declarative approach is b
作者: 隼鷹    時間: 2025-3-22 13:53

作者: 隼鷹    時間: 2025-3-22 20:48
Detecting Behavioral Design Patterns from Software Execution Datan detection techniques require as input the source code of software systems. Hence, these techniques may become not applicable in case the source code is not available anymore. Large volumes of data are recorded and stored during software execution, which is very useful for design pattern detection
作者: Immobilize    時間: 2025-3-22 23:39

作者: GLARE    時間: 2025-3-23 03:35
From Object-Oriented to Workflow: Refactoring of OO Applications into Workflows for an Efficient Resstics are its elastic nature and its payment model (pay-as-you-go). In order to run applications in the cloud while using its resources efficiently, and thus reducing their usage costs, one of the requirements related to this type of environment is to perform dynamic configurations of these applicat
作者: Genistein    時間: 2025-3-23 05:51

作者: Disk199    時間: 2025-3-23 13:17
A Detailed Analysis of the Influence of Saudi Arabia Culture on the Requirement Engineering Processs might influence both the RE process and its outcomes. The purpose of this study is to explore the influence of culture on the RE process in a context of a conservative culture: Saudi Arabia. Our goal is to understand how the RE process can be adapted, taking into account cultural aspects. We explo
作者: CORD    時間: 2025-3-23 17:01
Formal Verification of Cyber-physical Feature Coordination with Minimalist Qualitative Modelsysical software system (i.e., its cyber-part), an approach based on the Situation Calculus was previously published. However, no verification of the feature coordination in the physical environment was possible in spite of its formal specification. Verification of (safety-critical) feature coordinat
作者: 6Applepolish    時間: 2025-3-23 21:10

作者: 者變    時間: 2025-3-23 23:37
GenesLove.Me 2.0: Improving the Prioritization of Genetic Variations manage large amounts of genomic information for further exploitation through of genomic reports that allow enhancing the highly acclaimed “.”. This software project is considered from the perspective of . (ISE) applied to the genomic domain, this with the goal of eradicating or reducing the problem
作者: 慷慨援助    時間: 2025-3-24 06:17

作者: 別名    時間: 2025-3-24 10:03
The Formal Reference Model for Software Requirements. The topological functioning model (TFM) can serve as such reference model for specifying mappings from software requirements to functional characteristics and structure of the modeled system. Different types of mapping of functional requirements and their aspects such as completeness and overlappi
作者: 機(jī)密    時間: 2025-3-24 11:03
Effective Decision Making in Self-adaptive Systems Using Cost-Benefit Analysis at Runtime and Onlinetem employs a feedback loop that tracks changes and adapts the system accordingly to ensure its quality goals. However, making effective adaptation decisions at runtime is challenging. In this chapter we tackle two problems of effective decision making in self-adaptive systems. First, current resear
作者: adduction    時間: 2025-3-24 18:55
1865-0929 ewed and selected from 95 submissions. The papers are organized in topical sections on service science and business information systems and?software engineering..978-3-030-22558-2978-3-030-22559-9Series ISSN 1865-0929 Series E-ISSN 1865-0937
作者: 推崇    時間: 2025-3-24 19:24

作者: Genistein    時間: 2025-3-25 00:28

作者: AFFIX    時間: 2025-3-25 06:10

作者: Gum-Disease    時間: 2025-3-25 09:45
Lessons Learned from an Action Research Study on the Use of Cloud Computing in Undergraduate Compute using cloud computing scenarios. The results of this study provided initial evidence that the cloud computing capabilities integrated into the content of the above mentioned courses can contribute to motivate and engage students in the proposed activities.
作者: Nutrient    時間: 2025-3-25 12:42

作者: 使高興    時間: 2025-3-25 17:29
Conference proceedings 20192018, held in Funchal, Madeira, Portugal, in March 2018..The 17 revised full papers and 5 revised short papers presented were carefully reviewed and selected from 95 submissions. The papers are organized in topical sections on service science and business information systems and?software engineering
作者: PAN    時間: 2025-3-25 20:20

作者: Free-Radical    時間: 2025-3-26 02:51
Die Entwicklungsformen der Kostenrechnung,tions which are implemented in Xtend, a procedural and object-oriented programming language. Surprisingly, the comparative evaluation demonstrates that the procedural approach outperforms the declarative approach with respect to different criteria such as correctness of the solution, implementation effort, or cognitive complexity.
作者: 柳樹;枯黃    時間: 2025-3-26 06:05

作者: 剝皮    時間: 2025-3-26 09:35
Marta Mierendorff,Heinrich Tostrn detection techniques are implemented in the open-source process mining toolkit ProM. The applicability of the proposed framework is evaluated using software execution data containing around 1.000.000 method calls that are generated by running both synthetic and real-life software systems.
作者: acrimony    時間: 2025-3-26 14:02

作者: 初次登臺    時間: 2025-3-26 18:46

作者: 賞錢    時間: 2025-3-27 00:01
Risk-Based Elicitation of Security Requirements According to the ISO 27005 Standardequirements based on functional requirements. Our method complies to the ISO 27005 standard for security risk management. We provide guidance for all steps of that process, and the results are collected in a model. We also define validation conditions to support the identification of errors when carrying out the process as early as possible.
作者: 引水渠    時間: 2025-3-27 04:54
Incremental Bidirectional Transformations: Comparing Declarative and Procedural Approaches Using thetions which are implemented in Xtend, a procedural and object-oriented programming language. Surprisingly, the comparative evaluation demonstrates that the procedural approach outperforms the declarative approach with respect to different criteria such as correctness of the solution, implementation effort, or cognitive complexity.
作者: FLASK    時間: 2025-3-27 08:28
Adopting Collaborative Games into Agile Software Developmentinvolvement, and creativity, make participants more willing to attend Scrum meetings, and produce better results than the standard approach. This paper is an extended version of our previous work [.].
作者: 青春期    時間: 2025-3-27 09:59

作者: 變白    時間: 2025-3-27 14:28

作者: crescendo    時間: 2025-3-27 20:30

作者: 欲望小妹    時間: 2025-3-28 01:08

作者: Inveterate    時間: 2025-3-28 04:00
Aufgaben und Ziele der Kinderheilkunde, of their application. This paper presents an extension of frameworks for auditing with process mining with a series of participatory workshops involving three business roles: Business Expert, Audit Expert and IT specialist. Such workshops produce the necessary input to apply frameworks of auditing
作者: habitat    時間: 2025-3-28 09:02

作者: sperse    時間: 2025-3-28 13:59
Einführung in die Kontinuumsmechanik can lead to substantial damage, not only financially, but also in term of reputation loss. The security of a software system can be compromised by threats, which may harm assets with a certain likelihood, thus constituting a risk. All such risks should be identified, and unacceptable risks should b
作者: FLOUR    時間: 2025-3-28 18:12
Die Entwicklungsformen der Kostenrechnung,e performed not only in forward, but also in backward direction. In this paper, we compare declarative and procedural approaches to defining bidirectional transformations. More specifically, we use the well-known Families to Persons benchmark to evaluate two approaches. The declarative approach is b
作者: resilience    時間: 2025-3-28 20:54
https://doi.org/10.1007/978-3-322-87515-0s, neither the Scrum Guide nor the Agile Manifesto prescribe techniques that aid the human side of software development. To address this challenge, we enriched the Scrum process with a set of collaborative games. Collaborative games refer to techniques inspired by game play, but designed for the pur
作者: 不滿分子    時間: 2025-3-29 00:29

作者: Commemorate    時間: 2025-3-29 05:54

作者: Kernel    時間: 2025-3-29 08:58
https://doi.org/10.1007/978-3-7091-3220-3stics are its elastic nature and its payment model (pay-as-you-go). In order to run applications in the cloud while using its resources efficiently, and thus reducing their usage costs, one of the requirements related to this type of environment is to perform dynamic configurations of these applicat
作者: 上坡    時間: 2025-3-29 14:53
https://doi.org/10.1007/978-3-662-34576-4e code anonymization and (3) results aggregation and quality control. We re-formulate the Reverse Engineering activity of concept assignment as a crowdsourced classification task to exemplify these challenges and describe suitable methods to address them. Our overview on existing research of crowdso
作者: magnanimity    時間: 2025-3-29 18:37

作者: 難取悅    時間: 2025-3-29 19:45
Biologische Studienbücher (geschlossen)ysical software system (i.e., its cyber-part), an approach based on the Situation Calculus was previously published. However, no verification of the feature coordination in the physical environment was possible in spite of its formal specification. Verification of (safety-critical) feature coordinat
作者: 喊叫    時間: 2025-3-30 03:23

作者: adulterant    時間: 2025-3-30 08:00

作者: 意見一致    時間: 2025-3-30 10:47
https://doi.org/10.1007/978-3-662-36801-5ng, especially to improve software quality. However, often there are other factors that influence the refactoring process. One such factor, the recentness of the code elements, is identified in this paper as important. The paper describes the use of a multi-objective genetic algorithm to automate so
作者: nauseate    時間: 2025-3-30 14:57
Anwendungen der Differentialrechnung,. The topological functioning model (TFM) can serve as such reference model for specifying mappings from software requirements to functional characteristics and structure of the modeled system. Different types of mapping of functional requirements and their aspects such as completeness and overlappi
作者: cloture    時間: 2025-3-30 18:33

作者: nautical    時間: 2025-3-30 21:46

作者: 會議    時間: 2025-3-31 02:29

作者: Mortal    時間: 2025-3-31 08:24
https://doi.org/10.1007/978-3-030-22559-9artificial intelligence; data mining; evolutionary algorithms; Internet of Things (IoT); network archite




歡迎光臨 派博傳思國際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
毕节市| 长春市| 临沭县| 恭城| 汾阳市| 吕梁市| 城口县| 辉县市| 莫力| 菏泽市| 阿克陶县| 云安县| 肃宁县| 聊城市| 九龙城区| 松阳县| 略阳县| 临湘市| 射洪县| 乌兰察布市| 门源| 宣武区| 襄汾县| 澳门| 漯河市| 台湾省| 都昌县| 府谷县| 柏乡县| 垫江县| 宝鸡市| 洮南市| 广州市| 孟村| 永新县| 都江堰市| 奉化市| 三明市| 平和县| 平顺县| 社旗县|