The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Peer reviews have been identified as one of the best practices in requirements engineering. The most formal peer review technique - inspection - has been found to be effective for the discovery of defects in documents. Nonetheless, many software companies practice inspections infrequently or not at all. For instance, some engineers consider inspections to be uncreative work that adds costs. This paper...
From 2005, Active Learning in Computing partners Newcastle and Durham University (ALiC), part of the UK CETL initiative, introduced a collaborative learning model of Software Engineering to level 2 Computing Science students that reflects global industry practice by focusing on cross-site software development. Assessment for this effort focuses on measuring students' development of both the technical...
Instituting an automated unit testing practice across a large software development team can be technically challenging and time consuming. As a result, teams may question the economic value of instituting such a practice. One large Microsoft team consisting of 32 developers transitioned from ad hoc and individualized unit testing practices to the utilization of the NUnit automated unit testing framework...
Software Risk Management involves analyzing risks that were encountered in the past and taking specific actions to prevent the occurrence of those types of risks in the future. The risks may have been identified on other projects as well as in earlier stages or tasks of the current project. We have select small scale software development project to perform the assessment for software risk management...
Increased popularity of global software engineering (GSE) has resulted in quite a number of research and industrial studies. As the area matures, an increased focus on empirically supported results leads to a greater potential impact on future research and industrial practice. However, since GSE scenarios are diverse, what works in one context might not directly apply in another. Thus it is necessary...
Software development is a highly collaborative activity that requires teams of developers to continually manage and coordinate their programming tasks. In this paper, we describe an empirical study that explored how task annotations embedded within the source code play a role in how software developers manage personal and team tasks. We present findings gathered by combining results from a survey...
Static analysis examines code in the absence of input data and without running the code. It can detect potential security violations (SQL injection), runtime errors (dereferencing a null pointer) and logical inconsistencies (a conditional test that can't possibly be true). Although a rich body of literature exists on algorithms and analytical frameworks used by such tools, reports describing experiences...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.