標(biāo)題: Titlebook: Evaluation of Novel Approaches to Software Engineering; 13th International C Ernesto Damiani,George Spanoudakis,Leszek A. Macia Conference [打印本頁] 作者: 戰(zhàn)神 時間: 2025-3-21 17:32
書目名稱Evaluation of Novel Approaches to Software Engineering影響因子(影響力)
書目名稱Evaluation of Novel Approaches to Software Engineering影響因子(影響力)學(xué)科排名
書目名稱Evaluation of Novel Approaches to Software Engineering網(wǎng)絡(luò)公開度
書目名稱Evaluation of Novel Approaches to Software Engineering網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Evaluation of Novel Approaches to Software Engineering被引頻次
書目名稱Evaluation of Novel Approaches to Software Engineering被引頻次學(xué)科排名
書目名稱Evaluation of Novel Approaches to Software Engineering年度引用
書目名稱Evaluation of Novel Approaches to Software Engineering年度引用學(xué)科排名
書目名稱Evaluation of Novel Approaches to Software Engineering讀者反饋
書目名稱Evaluation of Novel Approaches to Software Engineering讀者反饋學(xué)科排名
作者: 千篇一律 時間: 2025-3-21 21:11 作者: sigmoid-colon 時間: 2025-3-22 00:27 作者: Limited 時間: 2025-3-22 05:12 作者: extract 時間: 2025-3-22 09:12
Incremental Bidirectional Transformations: Comparing Declarative and Procedural Approaches Using thee performed not only in forward, but also in backward direction. In this paper, we compare declarative and procedural approaches to defining bidirectional transformations. More specifically, we use the well-known Families to Persons benchmark to evaluate two approaches. The declarative approach is b作者: 隼鷹 時間: 2025-3-22 13:53 作者: 隼鷹 時間: 2025-3-22 20:48
Detecting Behavioral Design Patterns from Software Execution Datan detection techniques require as input the source code of software systems. Hence, these techniques may become not applicable in case the source code is not available anymore. Large volumes of data are recorded and stored during software execution, which is very useful for design pattern detection 作者: Immobilize 時間: 2025-3-22 23:39 作者: GLARE 時間: 2025-3-23 03:35
From Object-Oriented to Workflow: Refactoring of OO Applications into Workflows for an Efficient Resstics are its elastic nature and its payment model (pay-as-you-go). In order to run applications in the cloud while using its resources efficiently, and thus reducing their usage costs, one of the requirements related to this type of environment is to perform dynamic configurations of these applicat作者: Genistein 時間: 2025-3-23 05:51 作者: Disk199 時間: 2025-3-23 13:17
A Detailed Analysis of the Influence of Saudi Arabia Culture on the Requirement Engineering Processs might influence both the RE process and its outcomes. The purpose of this study is to explore the influence of culture on the RE process in a context of a conservative culture: Saudi Arabia. Our goal is to understand how the RE process can be adapted, taking into account cultural aspects. We explo作者: CORD 時間: 2025-3-23 17:01
Formal Verification of Cyber-physical Feature Coordination with Minimalist Qualitative Modelsysical software system (i.e., its cyber-part), an approach based on the Situation Calculus was previously published. However, no verification of the feature coordination in the physical environment was possible in spite of its formal specification. Verification of (safety-critical) feature coordinat作者: 6Applepolish 時間: 2025-3-23 21:10 作者: 者變 時間: 2025-3-23 23:37
GenesLove.Me 2.0: Improving the Prioritization of Genetic Variations manage large amounts of genomic information for further exploitation through of genomic reports that allow enhancing the highly acclaimed “.”. This software project is considered from the perspective of . (ISE) applied to the genomic domain, this with the goal of eradicating or reducing the problem作者: 慷慨援助 時間: 2025-3-24 06:17 作者: 別名 時間: 2025-3-24 10:03
The Formal Reference Model for Software Requirements. The topological functioning model (TFM) can serve as such reference model for specifying mappings from software requirements to functional characteristics and structure of the modeled system. Different types of mapping of functional requirements and their aspects such as completeness and overlappi作者: 機(jī)密 時間: 2025-3-24 11:03
Effective Decision Making in Self-adaptive Systems Using Cost-Benefit Analysis at Runtime and Onlinetem employs a feedback loop that tracks changes and adapts the system accordingly to ensure its quality goals. However, making effective adaptation decisions at runtime is challenging. In this chapter we tackle two problems of effective decision making in self-adaptive systems. First, current resear作者: adduction 時間: 2025-3-24 18:55
1865-0929 ewed and selected from 95 submissions. The papers are organized in topical sections on service science and business information systems and?software engineering..978-3-030-22558-2978-3-030-22559-9Series ISSN 1865-0929 Series E-ISSN 1865-0937 作者: 推崇 時間: 2025-3-24 19:24 作者: Genistein 時間: 2025-3-25 00:28 作者: AFFIX 時間: 2025-3-25 06:10 作者: Gum-Disease 時間: 2025-3-25 09:45
Lessons Learned from an Action Research Study on the Use of Cloud Computing in Undergraduate Compute using cloud computing scenarios. The results of this study provided initial evidence that the cloud computing capabilities integrated into the content of the above mentioned courses can contribute to motivate and engage students in the proposed activities.作者: Nutrient 時間: 2025-3-25 12:42 作者: 使高興 時間: 2025-3-25 17:29
Conference proceedings 20192018, held in Funchal, Madeira, Portugal, in March 2018..The 17 revised full papers and 5 revised short papers presented were carefully reviewed and selected from 95 submissions. The papers are organized in topical sections on service science and business information systems and?software engineering作者: PAN 時間: 2025-3-25 20:20 作者: Free-Radical 時間: 2025-3-26 02:51
Die Entwicklungsformen der Kostenrechnung,tions which are implemented in Xtend, a procedural and object-oriented programming language. Surprisingly, the comparative evaluation demonstrates that the procedural approach outperforms the declarative approach with respect to different criteria such as correctness of the solution, implementation effort, or cognitive complexity.作者: 柳樹;枯黃 時間: 2025-3-26 06:05 作者: 剝皮 時間: 2025-3-26 09:35
Marta Mierendorff,Heinrich Tostrn detection techniques are implemented in the open-source process mining toolkit ProM. The applicability of the proposed framework is evaluated using software execution data containing around 1.000.000 method calls that are generated by running both synthetic and real-life software systems.作者: acrimony 時間: 2025-3-26 14:02 作者: 初次登臺 時間: 2025-3-26 18:46 作者: 賞錢 時間: 2025-3-27 00:01
Risk-Based Elicitation of Security Requirements According to the ISO 27005 Standardequirements based on functional requirements. Our method complies to the ISO 27005 standard for security risk management. We provide guidance for all steps of that process, and the results are collected in a model. We also define validation conditions to support the identification of errors when carrying out the process as early as possible.作者: 引水渠 時間: 2025-3-27 04:54
Incremental Bidirectional Transformations: Comparing Declarative and Procedural Approaches Using thetions which are implemented in Xtend, a procedural and object-oriented programming language. Surprisingly, the comparative evaluation demonstrates that the procedural approach outperforms the declarative approach with respect to different criteria such as correctness of the solution, implementation effort, or cognitive complexity.作者: FLASK 時間: 2025-3-27 08:28
Adopting Collaborative Games into Agile Software Developmentinvolvement, and creativity, make participants more willing to attend Scrum meetings, and produce better results than the standard approach. This paper is an extended version of our previous work [.].作者: 青春期 時間: 2025-3-27 09:59 作者: 變白 時間: 2025-3-27 14:28 作者: crescendo 時間: 2025-3-27 20:30 作者: 欲望小妹 時間: 2025-3-28 01:08 作者: Inveterate 時間: 2025-3-28 04:00
Aufgaben und Ziele der Kinderheilkunde, of their application. This paper presents an extension of frameworks for auditing with process mining with a series of participatory workshops involving three business roles: Business Expert, Audit Expert and IT specialist. Such workshops produce the necessary input to apply frameworks of auditing 作者: habitat 時間: 2025-3-28 09:02 作者: sperse 時間: 2025-3-28 13:59
Einführung in die Kontinuumsmechanik can lead to substantial damage, not only financially, but also in term of reputation loss. The security of a software system can be compromised by threats, which may harm assets with a certain likelihood, thus constituting a risk. All such risks should be identified, and unacceptable risks should b作者: FLOUR 時間: 2025-3-28 18:12
Die Entwicklungsformen der Kostenrechnung,e performed not only in forward, but also in backward direction. In this paper, we compare declarative and procedural approaches to defining bidirectional transformations. More specifically, we use the well-known Families to Persons benchmark to evaluate two approaches. The declarative approach is b作者: resilience 時間: 2025-3-28 20:54
https://doi.org/10.1007/978-3-322-87515-0s, neither the Scrum Guide nor the Agile Manifesto prescribe techniques that aid the human side of software development. To address this challenge, we enriched the Scrum process with a set of collaborative games. Collaborative games refer to techniques inspired by game play, but designed for the pur作者: 不滿分子 時間: 2025-3-29 00:29 作者: Commemorate 時間: 2025-3-29 05:54 作者: Kernel 時間: 2025-3-29 08:58
https://doi.org/10.1007/978-3-7091-3220-3stics are its elastic nature and its payment model (pay-as-you-go). In order to run applications in the cloud while using its resources efficiently, and thus reducing their usage costs, one of the requirements related to this type of environment is to perform dynamic configurations of these applicat作者: 上坡 時間: 2025-3-29 14:53
https://doi.org/10.1007/978-3-662-34576-4e code anonymization and (3) results aggregation and quality control. We re-formulate the Reverse Engineering activity of concept assignment as a crowdsourced classification task to exemplify these challenges and describe suitable methods to address them. Our overview on existing research of crowdso作者: magnanimity 時間: 2025-3-29 18:37 作者: 難取悅 時間: 2025-3-29 19:45
Biologische Studienbücher (geschlossen)ysical software system (i.e., its cyber-part), an approach based on the Situation Calculus was previously published. However, no verification of the feature coordination in the physical environment was possible in spite of its formal specification. Verification of (safety-critical) feature coordinat作者: 喊叫 時間: 2025-3-30 03:23 作者: adulterant 時間: 2025-3-30 08:00 作者: 意見一致 時間: 2025-3-30 10:47
https://doi.org/10.1007/978-3-662-36801-5ng, especially to improve software quality. However, often there are other factors that influence the refactoring process. One such factor, the recentness of the code elements, is identified in this paper as important. The paper describes the use of a multi-objective genetic algorithm to automate so作者: nauseate 時間: 2025-3-30 14:57
Anwendungen der Differentialrechnung,. The topological functioning model (TFM) can serve as such reference model for specifying mappings from software requirements to functional characteristics and structure of the modeled system. Different types of mapping of functional requirements and their aspects such as completeness and overlappi作者: cloture 時間: 2025-3-30 18:33 作者: nautical 時間: 2025-3-30 21:46 作者: 會議 時間: 2025-3-31 02:29 作者: Mortal 時間: 2025-3-31 08:24
https://doi.org/10.1007/978-3-030-22559-9artificial intelligence; data mining; evolutionary algorithms; Internet of Things (IoT); network archite