The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The alignment degree existing between a business process and the supporting software systems expresses at which extent the software systems support the business process. This measure can be used for indicating business requirements that the software systems do not implement. Methods are needed for identifying the software changes to be performed for increasing and keeping an adequate alignment level...
In this paper, the authors investigate the usefulness of the knowledge regarding business processes for clarifying change requirements concerning the software systems supporting them. With this in mind, the correctness and completeness of the change requirement impact have been evaluated with and without the business process knowledge. Results of this preliminary empirical study are encouraging and...
Design patterns are solutions to recurring design problems, aimed at increasing reuse, code quality and, above all, maintainability and resilience to changes. Despite such advantages, the usage of design patterns implies the presence of crosscutting code implementing the pattern usage and access from other system components. When the system evolves, the presence of crosscutting code can cause repeated...
Mining services from existing software system is a relevant challenge to enable the development of service-oriented systems. Very often, although a service realizing a feature needed to develop a service-oriented system is not available, such a feature might have been implemented in existing software systems. This paper proposes an approach for the identification of services in existing legacy code...
The presence of vulnerable statements in the source code is a crucial problem for maintainers: properly monitoring and, if necessary, removing them is highly desirable to ensure high security and reliability. To this aim, a number of static analysis tools have been developed to detect the presence of instructions that can be subject to vulnerability attacks, ranging from buffer overflow exploitations...
Crosscutting concerns consist in software system features having the implementation spread across modules as tangled and scattered code. In many cases, these crosscutting concerns represent design pattern clients, i.e., invocations to pattern features. When a design pattern evolves, this can cause the addition or the change of scattered and tangled code, which contributes to the evolution of the crosscutting...
To directly compare the efficacy and safety of etoricoxib, 30 mg once daily, ibuprofen, 800 mg 3 times daily, and placebo for treatment of osteoarthritis (OA) of the hip and knee. A randomized, double-blind, placebocontrolled trial of patients with OA of the knee or hip was performed between February 2003 and November 2003 in 61 medical centers in the United States. Qualified patients aged 40 to...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.