• Meet Elaine: A Persona- Driven Approach to Exploring Architecturally Significant Requirements

    by Jane Cleland-Huang on  Dec 15, 2013

    Often, requirements elicited from stakeholders describe a system’s functionality but fail to address qualities such as performance, reliability, & availability. Documenting these requirements is often overlooked because there are implicit assumptions that the system will perform to expected levels. This article describes a process developed on the idea of persona sketches to address this problem.

  • Beyond Data Mining

    by Tim Menzies on  Dec 06, 2013

    In this article, author talks about the need for a change in the predictive modeling community’s focus and compares the four types of data mining: algorithm mining, landscape mining, decision mining, and discussion mining.

  • A Brave New World of Testing? An Interview with Google's James Whittaker

    by Forrest Shull on  Aug 06, 2012 2

    Cloud Computing is creating substantial changes to the usual way of doing business. How should organizations leverage this approach to improve testing and quality assurance of software? To get an answer, author Forrest Shull spoke with James Whittaker from Google about cloud computing testing.

A Distributed Access Control Architecture for Cloud Computing

Posted by Abdulrahman A. Almutairi, Muhammad I. Sarfraz, Saleh Basalamah, Walid G. Aref, Arif Ghafoor on  Jun 12, 2012

In this article, authors discuss a distributed architecture based on principles from security management and software engineering to address cloud computing’s security challenges.

The Future of Authentication

Posted by Dirk Balfanz, Richard Chow, Ori Eisen, Markus Jakobsson, Steve Kirsch, Scott Matsumoto, Jesus Molina, Paul van Oorschot on  May 04, 2012

In this IEEE roundtable discussion article, the panelists discuss current authentication approaches, how to authenticate users on mobile devices and the future direction of authentication. 1

Software Engineering Meets Evolutionary Computation

Posted by Mark Harman on  Apr 16, 2012

In this IEEE article, author Mark Harman talks about evolutionary computation and search-based software engineering (SBSE) techniques that can be used to solve problems in software engineering.

Verification and Validation for Trustworthy Software Systems

Posted by James Bret Michael, Doron Drusinsky, Thomas W. Otani, and Man-Tak Shing on  Mar 05, 2012

In this IEEE article, authors discuss a continuous verification and validation of complex and safety-critical software systems.

Pattern-Based Architecture Reviews

Posted by Neil B. Harrison and Paris Avgeriou on  Feb 14, 2012

In this article, authors Neil Harrison and Paris Avgeriou discuss a pattern-based architecture review process to help with quality attributes as well as agile practices like frequent releases. 1

Codesign Challenges for Exascale Systems: Performance, Power, and Reliability

Posted by Darren J. Kerbyson, Abhinav Vishnu, Kevin J. Barker, and Adolfy Hoisie on  Jan 17, 2012

In this IEEE article, authors talks about how a codesign methodology using modeling can benefit exascale computing systems with improved performance, power efficiency, and reliability.

Software Engineering Meets Services and Cloud Computing

Posted by Stephen S. Yau and Ho G. An on  Jan 04, 2012

In this IEEE article, authors Stephen Yau and Ho An talk about the advantages and challenges in application development using service-oriented architecture and cloud computing technologies. 2

Comparison of Intrusion Tolerant System Architectures

Posted by Quyen L. Nguyen and Arun Sood on  Nov 25, 2011

In this IEEE article, authors Quyen L. Nguyen and Arun Sood discuss three types of intrusion tolerant system architectures and their efficiency for intrusion tolerance and survivability. 3

Developer-Driven Threat Modeling

Posted by Danny Dhillon on  Nov 11, 2011

In this IEEE article, author Danny Dhillon discusses a developer-driven threat modeling approach to identify threats based on the dataflow diagrams for assessing and mitigating the security risks. 3

General Feedback
Marketing and all content copyright © 2006-2015 C4Media Inc. hosted at Contegix, the best ISP we've ever worked with.
Privacy policy