By Topic

IEEE Software

Issue 6 • Nov.-Dec. 2015

Filter Results

Displaying Results 1 - 25 of 25
  • Front Cover

    Publication Year: 2015, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (4466 KB)
    Freely Available from IEEE
  • Watch the World's Leading Experts Take Multi-Core Strategies to New Heights

    Publication Year: 2015, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (290 KB)
    Freely Available from IEEE
  • Keep Your Career Moving Forward

    Publication Year: 2015, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (68 KB)
    Freely Available from IEEE
  • Table of Contents

    Publication Year: 2015, Page(s):2 - 3
    Request permission for commercial reuse | PDF file iconPDF (1201 KB)
    Freely Available from IEEE
  • Extending Our Field's Reach

    Publication Year: 2015, Page(s):4 - 6
    Request permission for commercial reuse | PDF file iconPDF (298 KB) | HTML iconHTML
    Freely Available from IEEE
  • Masthead

    Publication Year: 2015, Page(s): 7
    Request permission for commercial reuse | PDF file iconPDF (48 KB)
    Freely Available from IEEE
  • I, for One, Welcome Our New Computer Overlords

    Publication Year: 2015, Page(s):8 - 10
    Request permission for commercial reuse | PDF file iconPDF (780 KB) | HTML iconHTML
    Freely Available from IEEE
  • The Connected Car in the Cloud: A Platform for Prototyping Telematics Services

    Publication Year: 2015, Page(s):11 - 17
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1463 KB) | HTML iconHTML

    The Connected-Car Prototyping Platform provides both a back end for applications interacting with connected cars and an abstraction of such connected devices for developers. It also provides services such as identity management and data storage. Its main purposes are experimentation, prototyping, evaluation of ideas, and reduction of time-to-market for successful applications. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Code Ownership Perspectives

    Publication Year: 2015, Page(s):18 - 19
    Request permission for commercial reuse | PDF file iconPDF (148 KB) | HTML iconHTML
    Freely Available from IEEE
  • Agile Compass: A Tool for Identifying Maturity in Agile Software-Development Teams

    Publication Year: 2015, Page(s):20 - 23
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (704 KB) | HTML iconHTML

    Researchers investigated how agile software development teams evolve. They analyzed nine teams' evolution of practices and found that the process was idiosyncratic. Each team adopted practices on the basis of its circumstances and improved the practices on the basis of the challenges it faced. Using this research, the researchers designed the Agile Compass, a questionnaire based on a set of guidel... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Out of Bounds

    Publication Year: 2015, Page(s):24 - 26
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1100 KB) | HTML iconHTML

    Writing reliable code means understanding bounds. Only a finite amount of memory is available for computation, only a finite amount of time exists to do it, and every object we store and modify must be finite. Resources are similarly bounded. Stacks are bounded, queues are bounded, file system capacity is bounded, and even numbers are bounded. This makes the world of computer science very differen... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Refactoring [Guest editors' introduction]

    Publication Year: 2015, Page(s):27 - 29
    Request permission for commercial reuse | PDF file iconPDF (4675 KB) | HTML iconHTML
    Freely Available from IEEE
  • The Birth of Refactoring: A Retrospective on the Nature of High-Impact Software Engineering Research

    Publication Year: 2015, Page(s):30 - 38
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (862 KB) | HTML iconHTML

    Software refactoring was independently invented in the late '80s by two students in two research groups: Ralph Johnson's group at the University of Illinois and David Notkin's group at the University of Washington. This article provides a retrospective of the birth of refactoring, reflecting on how the ideas came about and were developed in those two students' doctoral dissertations. The analysis ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Refactoring Myths

    Publication Year: 2015, Page(s):39 - 43
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1705 KB) | HTML iconHTML

    Refactoring myths are popular misconceptions about tool-based refactoring-about the tools' intent, the principle they follow, their robustness, and support for them. This article is part of a special issue on Refactoring. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Challenges to and Solutions for Refactoring Adoption: An Industrial Perspective

    Publication Year: 2015, Page(s):44 - 51
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1065 KB) | HTML iconHTML

    Refactoring is a key approach for managing technical debt. In the past few years, refactoring techniques and tools have received considerable attention from researchers and tool vendors. However, several practical challenges must be overcome to facilitate the adoption of refactoring in industrial contexts. Results from a survey at the Siemens Corporate Development Center India highlight common cha... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Refactoring for Asynchronous Execution on Mobile Devices

    Publication Year: 2015, Page(s):52 - 61
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1756 KB) | HTML iconHTML

    To improve responsiveness, developers often use asynchronous programming. In the post-PC era, asynchronous programming is even more in demand because mobile and wearable devices have limited resources and access the network excessively. One current development task is refactoring long-running, blocking synchronous code (for example, accessing the Web, a cloud, a database, or a file system) into no... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Refactoring-a Shot in the Dark?

    Publication Year: 2015, Page(s):62 - 70
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1119 KB) | HTML iconHTML

    A study performed semistructured interviews of 12 seasoned software architects and developers at nine Finnish companies. Its main goals were to find out how the practitioners viewed the role and importance of refactoring, and how and when they refactored. Another goal was to see whether shortened cycle times and, especially, continuous-deployment practices affected how and when refactoring was don... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Database Refactoring: Lessons from the Trenches

    Publication Year: 2015, Page(s):71 - 79
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1038 KB) | HTML iconHTML

    Although database refactoring has been advocated as an important area of database development, little research has studied its implications. A small software development firm refactored a database related to an application that lets clients optimize their logistics processes. This project was based on the design of clear database development conventions and the need to package documentation in the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Refactoring Tools are Trustworthy Enough and Trust Must be Earned

    Publication Year: 2015, Page(s):80 - 83
    Request permission for commercial reuse | PDF file iconPDF (573 KB) | HTML iconHTML
    Freely Available from IEEE
  • Coping with Quality Requirements in Large, Contract-Based Projects

    Publication Year: 2015, Page(s):84 - 91
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1049 KB) | HTML iconHTML

    A typical contract for delivering a large software system must address a variety of related issues such as system quality, timelines, delivery cost and effort, and service-level agreements. Interviews with 20 software architects revealed how they coped with quality requirements in this context. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Looking into the Future

    Publication Year: 2015, Page(s):92 - 97
    Cited by:  Papers (1)
    Request permission for commercial reuse | PDF file iconPDF (521 KB) | HTML iconHTML
    Freely Available from IEEE
  • Software Quality, Energy Awareness, and More

    Publication Year: 2015, Page(s):98 - 100
    Request permission for commercial reuse | PDF file iconPDF (910 KB) | HTML iconHTML
    Freely Available from IEEE
  • Barry O'Reilly on Lean Enterprises

    Publication Year: 2015, Page(s):101 - 104
    Request permission for commercial reuse | PDF file iconPDF (277 KB) | HTML iconHTML
    Freely Available from IEEE
  • Rock Stars of Cybersecurity

    Publication Year: 2015, Page(s): c3
    Request permission for commercial reuse | PDF file iconPDF (850 KB)
    Freely Available from IEEE
  • Software Experts Summit

    Publication Year: 2015, Page(s): c4
    Request permission for commercial reuse | PDF file iconPDF (1467 KB)
    Freely Available from IEEE

Aims & Scope

IEEE Software delivers reliable, useful, leading-edge software development information to keep engineers and managers abreast of rapid technology change.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Diomidis Spinellis
Athens University of Economics and Business
28is Oktovriou 76
Athina 104 33, Greece
dds@computer.org