Search engines are developed using standard sets of realistic test cases that let developers measure the relative effectiveness of alternative approaches. This article talks about NIST's Text Retrieval Conference (TREC) project used to create the infrastructure to measure the quality of search results.
In this article, authors talk about the impact of pattern languages on the software design community over the past 20 years. They discuss patterns like Enterprise Integration Patterns, open source ESBs and patterns as a design tool.
In this article, authors discuss Morphosis, a multi-perspective measuring approach for architecture sustainability that includes compliance checking and tracking of architecture-level code metrics.
In this article, based on a research study the authors discuss the criteria that can help architects assess architectural design decisions’ sustainability.
In this article, authors present an empirical study about the software architecture practices for managing non-functional requirements and decision making in software development processes. 2
In this article, author discusses the effectiveness of using design patterns, based on surveys conducted to indicate which patterns were considered useful under what circumstances. 12
This article describes the relationship between architecture and process of software development and how architecture can respond to functional requirements and developer habitability. 1
This article shares a simple technique used to address problems such as a system’s intended functionality but also qualities such as performance, reliability, portability, and availability.
In this article, author talks about the need for change in predictive modeling focus and compares four types of data mining:algorithm mining, landscape mining, decision mining and discussion mining.
How should organizations leverage Cloud Computing approach to improve testing of software? In this article, author Forrest Shull spoke with James Whittaker from Google about cloud computing testing. 2
In this article, authors discuss a distributed architecture based on principles from security management and software engineering to address cloud computing’s security challenges.