標題: Titlebook: Software Quality. The Future of Systems- and Software Development; 8th International Co Dietmar Winkler,Stefan Biffl,Johannes Bergsmann Con [打印本頁] 作者: 哪能仁慈 時間: 2025-3-21 16:16
書目名稱Software Quality. The Future of Systems- and Software Development影響因子(影響力)
書目名稱Software Quality. The Future of Systems- and Software Development影響因子(影響力)學科排名
書目名稱Software Quality. The Future of Systems- and Software Development網(wǎng)絡公開度
書目名稱Software Quality. The Future of Systems- and Software Development網(wǎng)絡公開度學科排名
書目名稱Software Quality. The Future of Systems- and Software Development被引頻次
書目名稱Software Quality. The Future of Systems- and Software Development被引頻次學科排名
書目名稱Software Quality. The Future of Systems- and Software Development年度引用
書目名稱Software Quality. The Future of Systems- and Software Development年度引用學科排名
書目名稱Software Quality. The Future of Systems- and Software Development讀者反饋
書目名稱Software Quality. The Future of Systems- and Software Development讀者反饋學科排名
作者: fertilizer 時間: 2025-3-21 21:33
Kamil Jezek,Lukas Holy,Jakub Danekg System Number 7 (SS7). SS7 was considered one of the most reliable and capable signaling protocols. IN is defined as an architectural concept for the operation and provision of services as recommended by ITU-T standard. Workstations installed with software interfaces with the network can provide m作者: 確定 時間: 2025-3-22 01:39 作者: 蚊帳 時間: 2025-3-22 04:59
Magne J?rgensenSIP) is quickly becoming a popular signaling protocol for VoIP-based applications. SIP is a peer-to-peer multimedia signaling protocol standardized by the Internet Engineering Task Force (IETF), and it plays a vital role in providing IP telephony services through its use of the SIP Proxy Server (SPS作者: acquisition 時間: 2025-3-22 12:07
oaches have been proposed to address this question. In this chapter, we focus on approaches that assess the importance of a node in a citation network based not just on the local structure of the network but instead on the network’s global structure. For instance, rather than just counting the numbe作者: 欲望小妹 時間: 2025-3-22 16:04 作者: 禍害隱伏 時間: 2025-3-22 20:27 作者: 虛情假意 時間: 2025-3-23 00:20 作者: 極小量 時間: 2025-3-23 03:00 作者: obnoxious 時間: 2025-3-23 08:58
Marcos Kalinowski,Michael Felderer,Tayana Conte,Rodrigo Spínola,Rafael Prikladnicki,Dietmar Winkler,作者: Gene408 時間: 2025-3-23 12:09
Emilia Mendes,Veronica Taquete Vaz,Fernando Muradas作者: brachial-plexus 時間: 2025-3-23 14:37
Georg Buchgeher,Rainer Weinreich,Thomas Kriechbaum作者: outrage 時間: 2025-3-23 18:21 作者: Magnitude 時間: 2025-3-23 23:06
How Scrum Tools May Change Your Agile Software Development Approach present a first solution, which focuses on the agile philosophy of Scrum and the elements needed most by ScrumMasters. Features of Scrumpy include, for example, web-based access to the task board with real-time updates, advanced dashboard visualisation techniques and a sophisticated chat system, wh作者: Mri485 時間: 2025-3-24 05:16
Preventing Incomplete/Hidden Requirements: Reflections on Survey Data from Austria and Brazilented the main causes and documented solution options to address these causes. Further, we compiled a list of reported mitigation actions. [Conclusions] From a practical point of view, this paper provides further insights into common causes of incomplete/hidden requirements and on how to prevent thi作者: Ventilator 時間: 2025-3-24 07:29 作者: 輕率看法 時間: 2025-3-24 10:49 作者: BRAND 時間: 2025-3-24 17:27 作者: 書法 時間: 2025-3-24 20:38
Kamil Jezek,Lukas Holy,Jakub Danekmes or offices. Telephone subscribers are normally attached to a central office within their geographic area. These central offices have large-scale computers, generally called switches, built with huge hardware and managed by various software modules. These switches are considered as the brain of t作者: Ordeal 時間: 2025-3-24 23:33
Roman Haas,Benjamin Hummelzed by the transaction states of each SIP session, the book analyzes an existing M/M/1-network performance model for SIP proxy servers in light of key performance benchmarks, such as the average response time for processing the SIP calls and the average number of SIP calls in the system. It also pre作者: 可能性 時間: 2025-3-25 05:42
Magne J?rgensenzed by the transaction states of each SIP session, the book analyzes an existing M/M/1-network performance model for SIP proxy servers in light of key performance benchmarks, such as the average response time for processing the SIP calls and the average number of SIP calls in the system. It also pre作者: antiquated 時間: 2025-3-25 11:23 作者: 放逐某人 時間: 2025-3-25 12:49
Harry M. Sneedional context with respect to the phases of program and project life cycle management from requirements definition through retirement and closeout of systems. During the explanation of these examples, the advances in research techniques to collect, analyze, and process the data will be examined.作者: Comprise 時間: 2025-3-25 16:48 作者: 破譯 時間: 2025-3-25 23:44
1865-1348 ference, SWQD 2016, held in Vienna,Austria, in January 2016..The SWQD conference offers a range of comprehensive and valuableinformation by presenting new ideas from the latest research papers, keynotespeeches by renowned academics and industry leaders, professional lectures,exhibits, and tutorials.作者: 小故事 時間: 2025-3-26 02:21 作者: subacute 時間: 2025-3-26 08:17 作者: Highbrow 時間: 2025-3-26 10:18 作者: angiography 時間: 2025-3-26 16:25 作者: LVAD360 時間: 2025-3-26 17:07
An Experience on Applying Process Mining Techniques to the Tuscan Port Community Systemping an executable framework for the management of the process itself. In particular the monitoring facilities associated to the on-line process execution provide an important means to the control of process evolution and quality. In this context, this paper provides an experience on the application作者: 夜晚 時間: 2025-3-26 21:45
Preventing Incomplete/Hidden Requirements: Reflections on Survey Data from Austria and Brazilvant RE problem in detail: incomplete/hidden requirements. [Method] We replicated a global family of RE surveys with representatives of software organizations in Austria and Brazil. We used the data to (a) characterize the criticality of the selected RE problem, and to (b) analyze the reported main 作者: 使糾纏 時間: 2025-3-27 03:30 作者: WAIL 時間: 2025-3-27 07:23
Experiences from Monitoring Effects of Architectural Changesduct increases the architecture must be changed. In this paper experiences are presented from changing an architecture into independent units, providing basic reuse of main functionality although giving higher priority to independence than reuse. An objective was also to introduce metrics in order t作者: 玷污 時間: 2025-3-27 11:11
Making the Case for Centralized Software Architecture Management based on architectural information are architecture reviews, dependency analyses, and conformance analyses. Architecture is also an important artifact for understanding, reuse, evolution, and maintenance. Unfortunately, in many projects architectural knowledge often remains implicit and is not avai作者: geometrician 時間: 2025-3-27 15:12
Preventing Composition Problems in Modular Java Applicationslibraries, they bring new challenges as well. This paper addresses the problem of Linkage Errors that occur when a type incompatibility or a missing dependency between two libraries is detected at runtime. This is a direct impact of composing applications from pre-existing binary libraries as the pr作者: Insubordinate 時間: 2025-3-27 21:47
Deriving Extract Method Refactoring Suggestions for Long Methodshey need to invest time in identifying a suitable refactoring candidate. This paper addresses the problem of finding the most appropriate refactoring candidate for long methods written in Java. The approach determines valid refactoring candidates and ranks them using a scoring function that aims to 作者: aesthetic 時間: 2025-3-27 23:59
The Use of Precision of Software Development Effort Estimates to Communicate Uncertaintyrk-hours, for example, communicate different levels of expected estimation accuracy. Through observational and experimental studies we found that software professionals (i) sometimes, but not in the majority of the examined projects, used estimate precision to convey effort uncertainty, (ii) tended 作者: 定點 時間: 2025-3-28 03:10 作者: Affluence 時間: 2025-3-28 06:37
Integrating a Lightweight Risk Assessment Approach into an Industrial Development Process for the determination of these two factors. For a precise risk-value calculation, an adequate collection of factors is crucial. In this paper, we show the evolution from the first phase until the application of a risk assessment approach in the area of an international insurance company. In such a 作者: Anecdote 時間: 2025-3-28 13:40 作者: 保守黨 時間: 2025-3-28 16:27 作者: DENT 時間: 2025-3-28 21:07
Making the Case for Centralized Software Architecture Managementnd analyzed by different tools. In this paper we discuss important elements and use cases of such an approach, and present an example for an architecture knowledge and information repository in the context of an enterprise service-oriented architecture (SOA).作者: 課程 時間: 2025-3-28 23:57
Preventing Composition Problems in Modular Java Applications to runtime errors. The tools work automatically, may complement existing testing, and find problems effectively from the start of development. Their additional features such as detection of redundant or duplicated libraries are usually not provided by standard testing tools.作者: ciliary-body 時間: 2025-3-29 05:29
Deriving Extract Method Refactoring Suggestions for Long Methodsare also considered by the scoring function. We evaluate our approach to three open source systems using a user study with ten experienced developers. Our results show that they would actually apply 86?% of suggestions for an extract method refactoring.作者: Intruder 時間: 2025-3-29 10:18 作者: vibrant 時間: 2025-3-29 14:37 作者: 察覺 時間: 2025-3-29 17:50
The Disciplined Agile Process Decision Frameworkvides a range of?options for doing so, and describes the tradeoffs associated with each option. Every person, every team, and every organization is unique, therefore process frameworks must provide choices, not prescribe answers.作者: 諷刺 時間: 2025-3-29 22:00 作者: thrombus 時間: 2025-3-30 00:11
Integrating a Lightweight Risk Assessment Approach into an Industrial Development Processrisk-aware field we have to systematically determine relevant factors and their severity. The final results are melted into a calculation tool that is embedded in the companies development process and used for decision support system. This paper shows the results and observations for the whole implementation process achieved via action research.作者: infringe 時間: 2025-3-30 06:04
Conference proceedings 2016or SWQD were each peer reviewed by three ormore reviewers and selected out of 13 high-quality submissions. Further, nineshort papers were also presented and are included in this book. In addition,one keynote paper by Scott Ambler and Mark Lines is also included..作者: 創(chuàng)造性 時間: 2025-3-30 08:38
Dietmar Winkler,Stefan Biffl,Johannes BergsmannIncludes supplementary material: 作者: Detonate 時間: 2025-3-30 13:03 作者: Culmination 時間: 2025-3-30 17:48
https://doi.org/10.1007/978-3-319-27033-3Process Improvement; Quality insurance; requirements engineering; risk management; software architecture