夜晚 发表于 2025-3-26 21:45:47

Preventing Incomplete/Hidden Requirements: Reflections on Survey Data from Austria and Brazilvant RE problem in detail: incomplete/hidden requirements. We replicated a global family of RE surveys with representatives of software organizations in Austria and Brazil. We used the data to (a) characterize the criticality of the selected RE problem, and to (b) analyze the reported main

使纠缠 发表于 2025-3-27 03:30:01

http://reply.papertrans.cn/88/8711/871002/871002_32.png

WAIL 发表于 2025-3-27 07:23:05

Experiences from Monitoring Effects of Architectural Changesduct increases the architecture must be changed. In this paper experiences are presented from changing an architecture into independent units, providing basic reuse of main functionality although giving higher priority to independence than reuse. An objective was also to introduce metrics in order t

玷污 发表于 2025-3-27 11:11:29

Making the Case for Centralized Software Architecture Management based on architectural information are architecture reviews, dependency analyses, and conformance analyses. Architecture is also an important artifact for understanding, reuse, evolution, and maintenance. Unfortunately, in many projects architectural knowledge often remains implicit and is not avai

geometrician 发表于 2025-3-27 15:12:11

Preventing Composition Problems in Modular Java Applicationslibraries, they bring new challenges as well. This paper addresses the problem of Linkage Errors that occur when a type incompatibility or a missing dependency between two libraries is detected at runtime. This is a direct impact of composing applications from pre-existing binary libraries as the pr

Insubordinate 发表于 2025-3-27 21:47:04

Deriving Extract Method Refactoring Suggestions for Long Methodshey need to invest time in identifying a suitable refactoring candidate. This paper addresses the problem of finding the most appropriate refactoring candidate for long methods written in Java. The approach determines valid refactoring candidates and ranks them using a scoring function that aims to

aesthetic 发表于 2025-3-27 23:59:38

The Use of Precision of Software Development Effort Estimates to Communicate Uncertaintyrk-hours, for example, communicate different levels of expected estimation accuracy. Through observational and experimental studies we found that software professionals (i) sometimes, but not in the majority of the examined projects, used estimate precision to convey effort uncertainty, (ii) tended

定点 发表于 2025-3-28 03:10:56

http://reply.papertrans.cn/88/8711/871002/871002_38.png

Affluence 发表于 2025-3-28 06:37:05

Integrating a Lightweight Risk Assessment Approach into an Industrial Development Process for the determination of these two factors. For a precise risk-value calculation, an adequate collection of factors is crucial. In this paper, we show the evolution from the first phase until the application of a risk assessment approach in the area of an international insurance company. In such a

Anecdote 发表于 2025-3-28 13:40:55

http://reply.papertrans.cn/88/8711/871002/871002_40.png
页: 1 2 3 [4] 5 6
查看完整版本: Titlebook: Software Quality. The Future of Systems- and Software Development; 8th International Co Dietmar Winkler,Stefan Biffl,Johannes Bergsmann Con