C Wohlin, A Rainer - Journal of Systems and Software, 2022 - Elsevier
The term “case study” is not used consistently when describing studies and, most importantly, is not used according to the established definitions. Given the misuse of the term …
D Van Landuyt, W Joosen - Software and Systems Modeling, 2022 - Springer
Security threat modeling involves the systematic elicitation of plausible threat scenarios, and leads to the identification and articulation of the security requirements in the early stages of …
Context: During software development, some architectural design decisions incur technical debt, either deliberately or inadvertently. These have serious impact on the quality of a …
Citizens of the digital world are threatened. The digital systems that surround them are increasingly able to make autonomous decisions over and above them and on their behalf …
M Soliman, M Galster, P Avgeriou - European Conference on Software …, 2021 - Springer
Software developers use issue trackers (eg Jira) to manage defects, bugs, tasks, change requests, etc. In this paper we explore (a) how architectural knowledge concepts (eg …
C Yang, P Liang, Z Ma - Science of Computer Programming, 2025 - Elsevier
Context Stakeholders constantly make assumptions in the development of deep learning (DL) frameworks. These assumptions are related to various types of software artifacts (eg …
Z Xiong, P Liang, C Yang, T Liu - 2018 25th Asia-Pacific …, 2018 - ieeexplore.ieee.org
Developers constantly make various assumptions regarding requirements, environment, design decisions, etc. during software development. However, these assumptions are …
Data-intensive systems are software applications that process and generate Big Data. Data- intensive systems support the use of large amounts of data strategically and efficiently to …
S El Fassi, MD Guenov, A Riaz - Proceedings of the Design Society …, 2020 - cambridge.org
Presented is an approach to support margin allocation and management via a graph- theoretical network of assumptions. In contrast to the document-centric approach, the …