959 resultados para Computer software maintenance


Relevância:

100.00% 100.00%

Publicador:

Resumo:

As a summary of past, current, and future trends in software maintenance and reengineering research, we give in this editorial a retrospective look from the past 14 years to now. We provide insight on how software maintenance has evolved and on the most important research topics presented in the series of the European Conference on Software Maintenance and Reengineering.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Replication of software engineering experiments is crucial for dealing with validity threats to experiments in this area. Even though the empirical software engineering community is aware of the importance of replication, the replication rate is still very low. The RESER'11 Joint Replication Project aims to tackle this problem by simultaneously running a series of several replications of the same experiment. In this article, we report the results of the replication run at the Universidad Politécnica de Madrid. Our results are inconsistent with the original experiment. However, we have identified possible causes for them. We also discuss our experiences (in terms of pros and cons) during the replication.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Includes bibliographical references (p. 48-49).

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Improvement of training students using modern information technologies, like collective developing teaching computer software, is discussed. Organizational, technical, technological advices are given. Experience of using information technologies in educational course “Decision Theory” is described.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Modern agriculture demands investments in technology that allows the farmers to improve productivity and quality of their products, aiming to establish themselves in a competitive market. However, the high costs of acquiring and maintaining such technology may be an inhibiting factor to its spread and acceptance, mainly to a large number of small grain Brazilian farmers, who need low cost innovative technological solutions, suitable for their financial reality. Starting from this premise, this paper presents the development of a low cost prototype for monitoring the temperature and humidity of grains stored in silos, and the economic implications of cost/benefit ratio of innovative applications of low cost technology in the process of thermometry of grains. The prototype was made of two electronic units, one for acquisition and another one for data reception, as well as software, which offered the farmers more precise information for the control of aeration. The data communication between the electronic units and the software was reliable and both were developed using low cost electronic components and free software tools. The developed system was considered as potentially viable to small grain Brazilian farmers; it can be used in any type of small silos. It provided reduction of costs of installation and maintenance and also offered an easy expansion system; besides the low cost of development when compared to similar products available in the Brazilian market.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Existing secure software development principles tend to focus on coding vulnerabilities, such as buffer or integer overflows, that apply to individual program statements, or issues associated with the run-time environment, such as component isolation. Here we instead consider software security from the perspective of potential information flow through a program’s object-oriented module structure. In particular, we define a set of quantifiable "security metrics" which allow programmers to quickly and easily assess the overall security of a given source code program or object-oriented design. Although measuring quality attributes of object-oriented programs for properties such as maintainability and performance has been well-covered in the literature, metrics which measure the quality of information security have received little attention. Moreover, existing securityrelevant metrics assess a system either at a very high level, i.e., the whole system, or at a fine level of granularity, i.e., with respect to individual statements. These approaches make it hard and expensive to recognise a secure system from an early stage of development. Instead, our security metrics are based on well-established compositional properties of object-oriented programs (i.e., data encapsulation, cohesion, coupling, composition, extensibility, inheritance and design size), combined with data flow analysis principles that trace potential information flow between high- and low-security system variables. We first define a set of metrics to assess the security quality of a given object-oriented system based on its design artifacts, allowing defects to be detected at an early stage of development. We then extend these metrics to produce a second set applicable to object-oriented program source code. The resulting metrics make it easy to compare the relative security of functionallyequivalent system designs or source code programs so that, for instance, the security of two different revisions of the same system can be compared directly. This capability is further used to study the impact of specific refactoring rules on system security more generally, at both the design and code levels. By measuring the relative security of various programs refactored using different rules, we thus provide guidelines for the safe application of refactoring steps to security-critical programs. Finally, to make it easy and efficient to measure a system design or program’s security, we have also developed a stand-alone software tool which automatically analyses and measures the security of UML designs and Java program code. The tool’s capabilities are demonstrated by applying it to a number of security-critical system designs and Java programs. Notably, the validity of the metrics is demonstrated empirically through measurements that confirm our expectation that program security typically improves as bugs are fixed, but worsens as new functionality is added.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Enterprise resource planning (ERP) software is a dominant approach for dealing with legacy information system problems. In order to avoid invalidating maintenance and development support from the ERP vendor, most organizations reengineer their business processes in line with those implicit within the software. Regardless, some customization is typically required. This paper presents two case studies of ERP projects where customizations have been performed. The case analysis suggests that while customizations can give true organizational benefits, careful consideration is required to determine whether a customization is viable given its potential impact upon future maintenance. Copyright © 2001 John Wiley & Sons, Ltd.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Safety of repair, maintenance, alteration, and addition (RMAA) works have long been neglected because RMAAworks are often minute and only last for a short period of time. With rising importance of the RMAA sector in many developed societies, safety of RMAA works has begun to draw attention. Many RMAA contracting companies are small- and medium-sized enterprises (SMEs) that do not have comprehensive safety management systems. Existing safety legislation and regulations for new construction sites are not fully applicable to RMAAworks. Instead of relying on explicit and well-established safety systems, tacit safety knowledge plays an extremely important role in RMAA projects. To improve safety of RMAAworks, safety knowledge should be better managed. However, safety knowledge is difficult to capture in RMAA works. This study aims to examine safety management practices of RMAA contracting companies to see how safety knowledge of RMAA projects is managed. Findings show that RMAA contracting companies undertaking large-scale RMAA projects have more initiatives of safety management. Safety management of small-scale RMAA works relies heavily on the motivation of site supervisors and self-regulation of workers. Better tacit knowledge management improves safety performance. To enhance safety capability of RMAA contracting companies, a knowledge sharing culture should be cultivated. The government should provide assistance to SMEs to implement proper safety management practices in small-sized projects. Potentials of applying computer software technology in RMAA projects to capture, store, and retrieve safety information should be explored. Employees should be motivated to share safety knowledge by giving proper recognition to those who are willing to share.