夜晚 发表于 2025-3-26 21:45:47
Preventing Incomplete/Hidden Requirements: Reflections on Survey Data from Austria and Brazilvant RE problem in detail: incomplete/hidden requirements. We replicated a global family of RE surveys with representatives of software organizations in Austria and Brazil. We used the data to (a) characterize the criticality of the selected RE problem, and to (b) analyze the reported main使纠缠 发表于 2025-3-27 03:30:01
http://reply.papertrans.cn/88/8711/871002/871002_32.pngWAIL 发表于 2025-3-27 07:23:05
Experiences from Monitoring Effects of Architectural Changesduct increases the architecture must be changed. In this paper experiences are presented from changing an architecture into independent units, providing basic reuse of main functionality although giving higher priority to independence than reuse. An objective was also to introduce metrics in order t玷污 发表于 2025-3-27 11:11:29
Making the Case for Centralized Software Architecture Management based on architectural information are architecture reviews, dependency analyses, and conformance analyses. Architecture is also an important artifact for understanding, reuse, evolution, and maintenance. Unfortunately, in many projects architectural knowledge often remains implicit and is not avaigeometrician 发表于 2025-3-27 15:12:11
Preventing Composition Problems in Modular Java Applicationslibraries, they bring new challenges as well. This paper addresses the problem of Linkage Errors that occur when a type incompatibility or a missing dependency between two libraries is detected at runtime. This is a direct impact of composing applications from pre-existing binary libraries as the prInsubordinate 发表于 2025-3-27 21:47:04
Deriving Extract Method Refactoring Suggestions for Long Methodshey need to invest time in identifying a suitable refactoring candidate. This paper addresses the problem of finding the most appropriate refactoring candidate for long methods written in Java. The approach determines valid refactoring candidates and ranks them using a scoring function that aims toaesthetic 发表于 2025-3-27 23:59:38
The Use of Precision of Software Development Effort Estimates to Communicate Uncertaintyrk-hours, for example, communicate different levels of expected estimation accuracy. Through observational and experimental studies we found that software professionals (i) sometimes, but not in the majority of the examined projects, used estimate precision to convey effort uncertainty, (ii) tended定点 发表于 2025-3-28 03:10:56
http://reply.papertrans.cn/88/8711/871002/871002_38.pngAffluence 发表于 2025-3-28 06:37:05
Integrating a Lightweight Risk Assessment Approach into an Industrial Development Process for the determination of these two factors. For a precise risk-value calculation, an adequate collection of factors is crucial. In this paper, we show the evolution from the first phase until the application of a risk assessment approach in the area of an international insurance company. In such aAnecdote 发表于 2025-3-28 13:40:55
http://reply.papertrans.cn/88/8711/871002/871002_40.png