In this article, author talks about the need for a change in the predictive modeling community’s focus and compares the four types of data mining: algorithm mining, landscape mining, decision mining, and discussion mining.
Cloud Computing is creating substantial changes to the usual way of doing business. How should organizations leverage this approach to improve testing and quality assurance of software? To get an answer, author Forrest Shull spoke with James Whittaker from Google about cloud computing testing.
Cloud computing’s multitenancy and virtualization features pose unique security and access control challenges. In this article, authors discuss a distributed architecture based on the principles from security management and software engineering to address cloud computing’s security challenges.
In this IEEE roundtable discussion article, the panelists discuss current authentication approaches, how to authenticate users on mobile devices and the future direction of authentication. 1
In this IEEE article, author Mark Harman talks about evolutionary computation and search-based software engineering (SBSE) techniques that can be used to solve problems in software engineering.
In this IEEE article, authors discuss a continuous verification and validation of complex and safety-critical software systems.
In this article, authors Neil Harrison and Paris Avgeriou discuss a pattern-based architecture review process to help with quality attributes as well as agile practices like frequent releases. 1
In this IEEE article, authors talks about how a codesign methodology using modeling can benefit exascale computing systems with improved performance, power efficiency, and reliability.
In this IEEE article, authors Stephen Yau and Ho An talk about the advantages and challenges in application development using service-oriented architecture and cloud computing technologies. 2
In this IEEE article, authors Quyen L. Nguyen and Arun Sood discuss three types of intrusion tolerant system architectures and their efficiency for intrusion tolerance and survivability. 3
In this IEEE article, author Danny Dhillon discusses a developer-driven threat modeling approach to identify threats based on the dataflow diagrams for assessing and mitigating the security risks. 3
In this IEEE article, author Charlie Miller talks about mobile security vulnerabilities. He discusses how iOS and Android phones can be attacked using mobile malware and drive-by downloads.