By Topic

IEEE Software

Issue 1 • Date Jan.-Feb. 2005

Filter Results

Displaying Results 1 - 24 of 24
  • [Front cover]

    Publication Year: 2005, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (1172 KB)
    Freely Available from IEEE
  • IEEE Software 2005 Editorial Calendar

    Publication Year: 2005, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (185 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2005, Page(s):2 - 3
    Request permission for commercial reuse | PDF file iconPDF (558 KB)
    Freely Available from IEEE
  • Article Summaries

    Publication Year: 2005, Page(s): 4
    Request permission for commercial reuse | PDF file iconPDF (36 KB)
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Do You Learn Just in Time or Just in Case?

    Publication Year: 2005, Page(s):5 - 7
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (112 KB) | HTML iconHTML

    If a company wants employees to learn a particular review technique or programming language, it will make sure they get "just in time" training: they learn exactly what they need, exactly when they need it. However, far fewer companies are interested in "just in case" training, keeping their employees current in their fields. The author discusses how much time the "top 100 places to work" (accordi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Letters

    Publication Year: 2005, Page(s):8 - 9
    Request permission for commercial reuse | PDF file iconPDF (161 KB) | HTML iconHTML
    Freely Available from IEEE
  • The Tools at Hand

    Publication Year: 2005, Page(s):10 - 13
    Cited by:  Papers (1)
    Request permission for commercial reuse | PDF file iconPDF (784 KB) | HTML iconHTML
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Guest Editors' Introduction: Shake, Rattle, and Requirements

    Publication Year: 2005, Page(s):13 - 15
    Request permission for commercial reuse | PDF file iconPDF (845 KB) | HTML iconHTML
    Freely Available from IEEE
  • Integrated requirements engineering: a tutorial

    Publication Year: 2005, Page(s):16 - 23
    Cited by:  Papers (54)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (128 KB) | HTML iconHTML

    This short tutorial introduces the fundamental activities of RE (requirements engineering) and discusses how it has evolved as a part of the software engineering process. However, rather than focusing on the established RE techniques, the author discusses how the changing nature of software engineering has led to the new challenges in RE. The author then introduces a number of new techniques that ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Sharing requirements engineering experience using patterns

    Publication Year: 2005, Page(s):24 - 31
    Cited by:  Papers (15)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (184 KB) | HTML iconHTML

    Many practitioners - especially those in small and medium enterprises -work in organizations that don't yet implement dedicated requirements engineering methods. Furthermore, these organizations often lack the appropriate knowledge and tools for implementing RE. For this target group of practitioners, we propose patterns as a format for RE knowledge transfer, which can provide guidance by offering... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A linguistic-engineering approach to large-scale requirements management

    Publication Year: 2005, Page(s):32 - 39
    Cited by:  Papers (39)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (744 KB) | HTML iconHTML

    For large software companies, the sheer number of textual requirements presents specific challenges. To find market opportunities, organizations must continuously elicit new requirements and reevaluate old ones as market needs evolve. Developing large, complex software products aimed at broad markets involves identifying and maintaining the link between product requirements and the massive inflow ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improving requirements engineering communication in multiproject environments

    Publication Year: 2005, Page(s):40 - 47
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (328 KB) | HTML iconHTML

    In complex, multiproject environments, communication is the key to successful requirements engineering. An information model helps with this problem by capturing stakeholders documents and responsibilities during RE. The information model effectively and practically ensures that stakeholders of dependent projects are mutually aware of critical communication needs. The author present the informatio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Requirements analysts must also be inventors

    Publication Year: 2005
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (112 KB) | HTML iconHTML

    Requirements analysts write requirements for a system that the client both wants and needs - seems straightforward enough. Requirements analysts are ideally placed to innovate. They understand the business problem, have up-to-date knowledge of the available technology, blamed if the new product doesn't please the customer, and know if inventions are appropriate to the work being studied. In short,... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On systems coaching

    Publication Year: 2005, Page(s):52 - 54
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (312 KB) | HTML iconHTML

    A skill central to requirements engineering is knowing which questions will uncover the real requirements. The author explains how we can apply techniques from family therapy to ask better, more relevant questions, which find its way into the professional business community as an activity known as coaching. The coaching model provides a good framework that can be used for discovering requirements.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The syntactically dangerous all and plural in specifications

    Publication Year: 2005, Page(s):55 - 57
    Cited by:  Papers (13)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (168 KB) | HTML iconHTML

    The items on the private check list are specific problems involving the correct use of the natural language in which the RS is written. It includes incorrect grammar, incorrect word placement, and all kinds of ambiguities. The lists of grammatical and word-placement problems are similar despite the difference in the natural languages involved. The syntactic problems are symptoms of ambiguities in ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evidence-based software engineering for practitioners

    Publication Year: 2005, Page(s):58 - 65
    Cited by:  Papers (114)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (144 KB) | HTML iconHTML

    Software managers and practitioners often must make decisions about what technologies to employ on their projects. They might be aware of problems with their current development practices (for example, production bottlenecks or numerous defect reports from customers) and want to resolve them. Or, they might have read about a new technology and want to take advantage of its promised benefits. Howev... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Soup or Art? The role of evidential force in empirical software engineering

    Publication Year: 2005, Page(s):66 - 73
    Cited by:  Papers (12)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (120 KB) | HTML iconHTML

    Software project managers' decisions should be based on solid evidence, not on common wisdom or vendor hype. What distinguishes the science from the art is the way in which we as managers and practitioners make decisions, by forming rational arguments from the evidence we have - evidence that comes both from our experience and from related research. That is, we move from the part to the whole, exa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Source code review systems

    Publication Year: 2005, Page(s):74 - 77
    Cited by:  Papers (9)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (864 KB) | HTML iconHTML

    Inspections are a well-established, cost-effective way to find defects. But they are not universally used. There are many reasons, including the lack of training on how to do inspections well, the need for project managers to move resources away from testing into inspections, and the large amount of paperwork that formal inspections require. Because of these problems, the software inspections prog... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Web metadata standards: observations and prescriptions

    Publication Year: 2005, Page(s):78 - 85
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (168 KB) | HTML iconHTML

    The World Wide Web has spawned numerous standards initiatives that aim to facilitate more powerful and interoperable functionality based on text exchange, but beyond mere Web page transfers. Software can take a Web page's data as input to further value-added processing, such as filtering items of interest, comparison shopping, finding potential business partners, and executing transactions. But so... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • In-house software development: what project management practices lead to success?

    Publication Year: 2005, Page(s):86 - 93
    Cited by:  Papers (41)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (176 KB) | HTML iconHTML

    Project management is an important part of software development, both for organizations that rely on third-party software development and for those whose software is developed primarily in-house. Moreover, quantitative survey-based research regarding software development's early, nontechnical aspects is lacking. To help provide a project management perspective for managers responsible for in-house... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Coding for Numbers [Bookshelf]

    Publication Year: 2005, Page(s):94 - 97
    Request permission for commercial reuse | PDF file iconPDF (89 KB) | HTML iconHTML
    Freely Available from IEEE
  • Cybercorps scholarships fund new generation of security gurus

    Publication Year: 2005, Page(s):98 - 100
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (73 KB) | HTML iconHTML

    The Cybercorps scholarship program aims US National Science Foundation funds at two important targets. The first is to educate more of the top computer science students in information assurance and security. The second is to convince them to bring those skills to government agencies after graduation. Since the scholarships began in 2001, students and college educators say the program has made a ma... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Viruses Are Beginning to Get to Me!

    Publication Year: 2005, Page(s):104 - 103
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (128 KB) | HTML iconHTML

    The past few years have seen an enormous increase in the proliferation of viruses. Why is this happening, and what, if anything, can be done about it? View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software Design, Part 3

    Publication Year: 2005, Page(s): c3
    Request permission for commercial reuse | PDF file iconPDF (38 KB) | HTML iconHTML
    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

IEEE Software delivers reliable, useful, leading-edge software development information to keep engineers and managers abreast of rapid technology change.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Diomidis Spinellis
Athens University of Economics and Business
28is Oktovriou 76
Athina 104 33, Greece
dds@computer.org