The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Context: The assessment of Threats to Validity (TTVs) is critical to secure the quality of empirical studies in Software Engineering (SE). In the recent decade, Systematic Literature Review (SLR) was becoming an increasingly important empirical research method in SE. One of the mechanisms of insuring the level of scientific value in the findings of an SLR is to rigorously assess its validity. Hence,...
Many cyber attacks can be attributed to poorly configured software, where administrators are often unaware of insecure settings due to the configuration complexity or the novelty of an attack. A resilient configuration management approach would address this problem by updating configuration settings based on current threats while continuing to render useful services. This responsive and adaptive behavior...
The execution process is critical to the success of a software outsourcing service. It defines the major roles and activities involved in delivering the outsourced software. This paper presents a process-oriented software outsourcing decision approach, which helps a client selecting appropriate vendors and defining the execution process that both the client and the vendors should comply with during...
Software outsourcing has become a common method used in many IT companies to reduce development cost, increase development efficiency and concentrate limited resource on mainstream business and technology. One of the important software engineering problems under this background is how to form an outsourcing software development process, which sum up all the people, artifacts, methods, working flows...
DPI identification technology is a main technique of P2P data stream identification technology; the advantages of it are higher accuracy and the ability of distinguishing accurately which type of P2P applications. But it is difficult to apply in highspeed networks due to its slow execution speed. To solve this problem, this paper suggests six sampling strategies: invariable random sampling, invariable...
Although understanding the traceability among software artifacts is well recognized as significant to multiple software engineering activities, the software traceability problem remains intractable since software engineers are very prone to get lost in the huge amounts of traceability information, and are unable to distill the required information effectively and efficiently. This paper proposes a...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.