THE UNIFIED APPROACH FOR ORGANIZATIONAL NETWORK VULNERABILITY ASSESSMENT

Author(s): Dhanamma Jagli | Rohini Temkar
Volume: 4
Issue: 5
Year: 2013





MANAGING AND ANALYSING SOFTWARE PRODUCT LINE REQUIREMENTS

Author(s): Shamim Ripon | Sk. Jahir Hossain | Touhid Bhuiyan
Volume: 4
Issue: 5
Year: 2013





SOCIO-DEMOGRAPHIC DIFFERENCES IN THE PERCEPTIONS OF LEARNING MANAGEMENT SYSTEM (LMS) DESIGN

Author(s): Yee Mei Lim | Keh Niang Chee | Aladdin Ayesh
Volume: 4
Issue: 5
Year: 2013





DETECTION AND REFACTORING OF BAD SMELL CAUSED BY LARGE SCALE

Author(s): Jiang Dexun | Ma Peijun | Su Xiaohong | Wang Tiantian
Volume: 4
Issue: 5
Year: 2013





STABLENESSMEASUREMENTMODEL: A MATHEMATICAL APPROACH FORMEASURING THE STABILITY OF HANDHELD APPLICATION USAGE

Author(s): Amalina Farhi Ahmad Fadzlah
Volume: 4
Issue: 5
Year: 2013





A Model-Driven Engineering Approach to Develop a Cooperative Information System

Author(s): Mohamed Amroune | Pierre Jean Charrel | Nacereddine Zarour | Jean Michel Inglebert
Volume: 4
Issue: 3
Year: 2013





EA-MDA Model to Resolve is Characteristic Problems in Educational Institutions

Author(s): Mardiana | Keijiro Araki
Volume: 4
Issue: 3
Year: 2013





Scheduling and Inspection Planning in Software Development Projects Using Multi-Objective Hyper-Heuristic Evolutionary Algorithm

Author(s): A.Charan Kumari | K. Srinivas
Volume: 4
Issue: 3
Year: 2013





Distributed Graphical User Interfaces to Class Diagram: Reverse Engineering Approach using Pattern Recognition

Author(s): Akram Abdel Qader | Khaled Musa
Volume: 4
Issue: 3
Year: 2013





An Effective Verification and Validation Strategy for Safety-Critical Embedded Systems

Author(s): Manju Nanda | Jayanthi J | Shrisha Rao
Volume: 4
Issue: 2
Year: 2013





A Paradigm for the Application of Cloud Computing in Mobile Intelligent Tutoring Systems

Author(s): Hossein Movafegh Ghadirli | Maryam Rastgarpour
Volume: 4
Issue: 2
Year: 2013





The Removal of Numerical Drift from Scientific Models

Author(s): John Collins | Brian Farrimond | David Flower | Mark Anderson | David Gill
Volume: 4
Issue: 2
Year: 2013





A Taxonomy of Performance Assurance Methodologies and its Application in High Performance Computer Architectures

Author(s): Hemant Rotithor
Volume: 4
Issue: 2
Year: 2013





Simulation-Based Application Software Development in Time-Triggered Communication Systems

Author(s): Alexander Hanzlik
Volume: 4
Issue: 2
Year: 2013





Structural Validation of Software Product Line Variants: A Graph Transformations Based Approach

Author(s): Khaled Khalfaoui | Allaoua Chaoui | Cherif Foudil | Elhillali Kerkouche
Volume: 4
Issue: 2
Year: 2013





Development of an Arabic Handwriting Learning Educational System

Author(s): Hala Bezine | Adel M. Alimi,
Volume: 4
Issue: 2
Year: 2013





Managing S/W Design Changes Using C.R. Designer

Author(s): Siddharth Dixit | Ranu Ratnawat | Umesh Sharma | Praveen Kr. Srivastava
Volume: 4
Issue: 2
Year: 2013





Logistic Regression Approach to Software Reliability Engineering with Failure Prediction

Author(s): K.Venkata Subba Reddy | Dr.B.Raveendra Babu
Volume: 4
Issue: 1
Year: 2013





Quality Model Based on Cots Quality Attributes

Author(s): Khaled Musa | Jawad Alkhateeb
Volume: 4
Issue: 1
Year: 2013





Defining a Formal Semantics for Real-Time Test Specification with TTCN-31

Author(s): Diana Alina Serbanescu | Ina Schieferdecker
Volume: 4
Issue: 1
Year: 2013





Characterizing and Evaluating the Impact of Software Interface Clones

Author(s): Hani Abdeen | Osama Shata
Volume: 4
Issue: 1
Year: 2013





Using Computing Intelligence Techniques to Estimate Software Effort

Author(s): Jin-Cherng Lin | Yueh-Ting Lin | Han-Yuan Tzeng | Yan-Chin Wang
Volume: 4
Issue: 1
Year: 2013





Integration of Automatic Theorem Provers in Event-B Patterns

Author(s): Eman Elsayed | Gaber El-Sharawy | Enas El-Sharawy
Volume: 4
Issue: 1
Year: 2013





Model Checking and Code Generation for UML Diagrams Using Graph Transformation

Author(s): Wafa Chama | Raida Elmansouri | Allaoua Chaoui
Volume: 3
Issue: 6
Year: 2012





Test Case Prioritization Algorithm Based Upon Modified Code Coverage in Regression Testing

Author(s): Usha Badhera | G.N Purohit | Debarupa Biswas
Volume: 3
Issue: 6
Year: 2012





Prediction of Software Requirements Stability Based on Complexity Point Measurement Using Multi-Criteria Fuzzy Approach

Author(s): D. Francis Xavier Christopher | E.Chandra
Volume: 3
Issue: 6
Year: 2012





Introducing Integrated Component-Based Development (ICBD) Lifecycle and Model

Author(s): Amr Rekaby | Ayat Osama
Volume: 3
Issue: 6
Year: 2012





Enhancement in Function Point Analysis

Author(s): Archana Srivastava | Syed Qamar Abbas | S.K.Singh
Volume: 3
Issue: 6
Year: 2012





A Survey of Service Oriented Architecture Systems Testing

Author(s): Ebrahim Shamsoddin-Motlagh
Volume: 3
Issue: 6
Year: 2012





Redesign of A Seismic Monitor Using Contextual Design

Author(s): Ozgur Aktunc | Berat A. Erol | John D. Garcia
Volume: 3
Issue: 6
Year: 2012





Intelligent Knowledge Database (IKD) Tool for Formal Methods

Author(s): Manju Nanda | J.Jayanthi | Madhan.V
Volume: 3
Issue: 6
Year: 2012





Integrating Software Repository Mining: A Decision Support Centered Approach

Author(s): Luiz Dourado Dias Junior | Eloi Favero
Volume: 3
Issue: 6
Year: 2012





The Application of Cause Effect Graph for the College Placement Process

Author(s): Dhanamma Jagli | Mamatha T | Swetha Mahalingam | Namrata Ojha
Volume: 3
Issue: 6
Year: 2012





An Image Authentication Technique in Frequency Domain using Genetic Algorithm (IAFDGA)

Author(s): J. K. Mandal | A. Khamru
Volume: 3
Issue: 5
Year: 2012





Justification of Montgomery Modular Reduction

Author(s): Salem Sherif Elfard
Volume: 3
Issue: 5
Year: 2012





Effective Concurrent Engineering with the Usage of Genetic Algorithms for Software Development

Author(s): D.Sundar | K.Alagarsamy
Volume: 3
Issue: 5
Year: 2012





An Architecture Framework For Spatiotemporal Data Mining System

Author(s): K.Venkateswara Rao | A.Govardhan | K.V.Chalapati Rao
Volume: 3
Issue: 5
Year: 2012





Mitigation strategies to Major challenges Faced in Market Driven Development Scenario

Author(s): Ranjith Engu | Sairam Vakkalanka
Volume: 3
Issue: 5
Year: 2012





A Survey Identifying Trends on Use of Software Development Tools in Different Indian SMEs

Author(s): Nomi Baruah Ashima | Ashima
Volume: 3
Issue: 5
Year: 2012





Distributed Software Development Modelling and Control Framework

Author(s): Lei Wu | Yi Feng | Sharon White | James Helm
Volume: 3
Issue: 5
Year: 2012





NVC Based Model for Selecting Effective Requirement Elicitation Technique

Author(s): Md. Muqeem | Md. Rizwan Beg
Volume: 3
Issue: 5
Year: 2012





Five Layered Model for identification of software Performance Requirements

Author(s): Gopichand.Merugu | AnandaRao.Akepogu
Volume: 3
Issue: 5
Year: 2012





A Comparison of Parameter Best Estimation Method for Software Reliability Models

Author(s): Latha Shanmugam | Lilly Florence
Volume: 3
Issue: 5
Year: 2012





A Methodology to Identify the Level of Reuse Using Template Factors

Author(s): Md Jubair Basha | Chandra Mohan
Volume: 3
Issue: 5
Year: 2012





Conducting Verification and Validation of Multi- Agent Systems

Author(s): A. Al-Neaimi | Nedhal Al Saiyd | S. Qatawneh
Volume: 3
Issue: 5
Year: 2012





An Expert Estimator Tool to Estimate Project Cost and Risk with Early Stage of Function Points

Author(s): Ajay Jaiswal | Meena Sharma
Volume: 3
Issue: 5
Year: 2012





A DDS-Based Scalable and Reconfigurable Framework for Cyber-Physical Systems

Author(s): Ismael Etxeberria-Agiriano | Isidro Calvo | Liliana Montero | Ivan Alonso
Volume: 3
Issue: 4
Year: 2012





MIDI-LAB, A Powerful Visual Basic Program for Creating Midi Music

Author(s): Kai Yang | Xi Zhou
Volume: 3
Issue: 4
Year: 2012




