Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Researchers have developed ways to think about, visualize, and measure software modularity and its erosion objectively and quantifiably. Using these techniques, you’ll be able to determine whether your software is modular and identify complexity hotspots in your code that warrant further investigation.
Caches are traditionally organized as a rigid hierarchy, with multiple levels of progressively larger and slower memories. Hierarchy allows a simple, fixed design to benefit a wide range of applications, since working sets settle at the smallest (i.e., fastest and most energy-efficient) level they fit in. However, rigid hierarchies also add overheads, because each level adds latency and energy even...
The Agile Software Factory (ASF) was created in the Department of Computer Science at Bowling Green State University nearly ten years ago to promote the use of agile methods, improve student education through service-learning opportunities, and to facilitate community engagement by handling the many software requests that regularly arrive in the department. In pursuit of these goals, the ASF has had...
Context: A growing number of software organizations have been adopting Continuous DElivery (CDE) and Continuous Deployment (CD) practices. Researchers have started investing significant efforts in studying different aspects of CDE and CD. Many studies refer to CDE (i.e., where an application is potentially capable of being deployed) and CD (i.e., where an application is automatically deployed to production...
Distributed Software Development course is a joint project-based course involving three universities, from Croatia, Sweden and Italy, running each year since 2003. Distributed student teams work on all phases of a complex software engineering project, solving several challenges of working in a global environment, thus obtaining a valuable experience for their future careers. The course is very well...
This study describes the roles of architects in scaling agile frameworks with the help of a structured literature review. We aim to provide a primary analysis of 20 identified scaling agile frameworks. Subsequently, we thoroughly describe three popular scaling agile frameworks: Scaled Agile Framework, Large Scale Scrum, and Disciplined Agile 2.0. After specifying the main concepts of scaling agile...
The use of an Application Lifecycle Management (ALM) system to promote cross-discipline data capture, tracking and traceability has shown to provide a dramatic improvement during airworthiness audits of software-centric avionics systems by reducing both the time to locate relevant information and rework associated with errors in captured data and their traceability. When configured correctly, an ALM...
Nowadays the importance of the term DevOps (Developer Operations) has increased around the world, and Mexico is not the exception. This paper describes the implementation of information security and risk management best practices in a DevOps approach established in a Data Center of a large government organization of Mexico. The DevOps approach with security and risk management practices was named...
Agile software development methods introduced a new approach for software development compared to traditional methods and they have become increasingly popular. While traditional methods focus on disciplined processes and rigid practices, agile methods emphasizes on individuals, communication and product. Capability Maturity Model Integration (CMMI) was introduced as a process improvement model in...
Information is the most important asset of organizations, currently, the fast, effective and accurate access is vital for strategic decision making and the organizations competitiveness. The education area is not the exception, so this article aims to share the experiences of collaboration between two Universities about learning analitycs and academic analytics tools, to motivate other universities...
Nowadays reports from the CMMI Institute show that the implementation of software process improvement (SPI) is used in order to establish continuous process improvement to increase the quality of software products through the CMMI-DEV model and the SCAMPI appraisal method. In this context this method of evaluation allows to validate establish and identify opportunities for process improvement to obtain...
Autism Spectrum Disorder (ASD) is a neurodevelopmental condition characterized by a decrease in social interaction, communication, creativity, imagination, and organization of daily activities of those who have this condition. People with ASD present difficulties in the comprehension of figurative language, such as idioms. Due to the lack of mobile applications that support people with ASD in the...
We describe a framework for constructing an IV&V case, which is an expanded safety case, in order to applyIndependent Verification and Validation (IV&V). The objectivesof IV&V at the Japan Aerospace Exploration Agency (JAXA) areto reduce and explain the risks of products. Although a safety caseis a useful framework to explain the risks to customers, virtuallyall past studies...
In our daily life we develop many activities that result imperceptible for the majority of us because the null effort that they represent to develop them, however, when we most develop those activities with any type of restriction, they acquire a higher level of difficulty. One simple activity is the communication process; we develop it in an easy way during almost all day, however, for people with...
Popularization of process approach as a standard necessitates changing the ways of defining and identifying requisite competencies. They should be seen in the framework of tasks implemented within the business process. The complex nature of competencies requires expressive forms of description regarding their multidimensional character therefore codification of competencies is the area predestinated...
The article is devoted to the experience of the Russian and Soviet Fund of algorithms and programs. The fund, created more than half a century, played a noticeable role in creating a regulatory framework for requirements for replicable software. Fund experience also contributed to the development of the copyright to the software. Currently, due to the widespread use of free software, the fund performs...
The objective of our research is to define a requirements model for Adaptive Multi-organizational Systems. Our work considers the functional complexity of contemporary internet-based, multi-organizational systems. Not only the business functions, but also the interactions between the components of such systems are highly dynamic and global. Furthermore, these systems function in extremely uncertain...
Understanding and keeping the customer happy is a central tenet of requirements engineering. Strategies to gather, analyze, and negotiate requirements are complemented by efforts to manage customer input after products have been deployed. For the latter, support tickets are key in allowing customers to submit their issues, bug reports, and feature requests. Whenever insufficient attention is given...
Increasingly developers are becoming aware of the importance of software security, as frequent high-profile security incidents emphasize the need for secure code. Faced with this new problem, most developers will use their normal approach: web search. But are the resulting web resources useful and effective at promoting security in practice? Recent research has identified security problems arising...
Different contexts determine a different software process. This is especially true for requirements production. Different situations in a given universe of discourse will require different requirements processes. This paper proposes a family pattern that approaches the universe of discourse (context) from the viewpoint of whom are the actors demanding the software. We show five different instantiations...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.