By Topic

IEEE Software

Issue 2 • March-April 2011

Filter Results

Displaying Results 1 - 25 of 28
  • Front Cover

    Publication Year: 2011, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (1188 KB)
    Freely Available from IEEE
  • John Wiley & Sons Advertisement

    Publication Year: 2011, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (512 KB)
    Freely Available from IEEE
  • Table of Contents

    Publication Year: 2011, Page(s):2 - 3
    Request permission for commercial reuse | PDF file iconPDF (928 KB)
    Freely Available from IEEE
  • Perfectionists in a World of Finite Resources

    Publication Year: 2011, Page(s):4 - 6
    Cited by:  Papers (2)
    Request permission for commercial reuse | PDF file iconPDF (474 KB) | HTML iconHTML
    Freely Available from IEEE
  • Software Experts Summit [advertisement]

    Publication Year: 2011, Page(s): 7
    Request permission for commercial reuse | PDF file iconPDF (1084 KB)
    Freely Available from IEEE
  • Dominant Design

    Publication Year: 2011, Page(s):8 - 9
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (238 KB) | HTML iconHTML

    The article is discussing architecture of software-intensive systems and its application in road traffic management. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Success of a COTS Caseload Management System in State Government

    Publication Year: 2011, Page(s):10 - 14
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1927 KB) | HTML iconHTML

    This article discusses about the COTS caseload management system in state government. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Process Management Tools

    Publication Year: 2011, Page(s):15 - 18
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1854 KB) | HTML iconHTML

    Software development is complex, especially with many interacting people and teams. A variety of tools exist to model the development process and thus facilitate communication, automation, and collaboration. This installment looks to support tools for process modeling and their underlying methodologies. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software in an Evolving Train Traffic Control System

    Publication Year: 2011, Page(s):19 - 21
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (567 KB) | HTML iconHTML

    This contribution is rather different from the other articles we're run in this department to date. Here, software volume isn't an issue as there is only one Tokyo-instead, we look at the incremental development of a network of systems controlling railway lines, which requires adding value without disruption. This particular scenario contains many interesting facets, including the use of COTS and ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Requirements Analysis: The Next Generation

    Publication Year: 2011, Page(s):22 - 23
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1492 KB) | HTML iconHTML

    One technological advance that will influence future requirements processes is ubiquitous computing. Technologies will be far more integrated into the fabric of our every day lives, from our homes to our cars to even our clothes and jewelry. It's likely to mean that scoping new computer-based applications-differentiating them from other applications and everyday tasks such as preparing meals, clea... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Guest Editors' Introduction: Software Protection

    Publication Year: 2011, Page(s):24 - 27
    Cited by:  Papers (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4047 KB) | HTML iconHTML

    A computer system's security can be compromised in many ways a denial-of-service attack can make a server inoperable, a worm can destroy a user's private data, or an eavesdrop per can reap financial rewards by inserting himself in the communication link between a customer and her bank through a man-in-the-middle (MITM) attack. What all these scenarios have in common is that the adversary is an unt... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CodeBender: Remote Software Protection Using Orthogonal Replacement

    Publication Year: 2011, Page(s):28 - 34
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1608 KB) | HTML iconHTML

    CodeBender implements a novel client replacement strategy to counter the malicious host problem and address the problem of guaranteeing client-code security. CodeBender is a tool that implements a novel client-replacement strategy to counter the malicious host problem. It works by limiting the client code's validity and, when the code expires, by having the server provide a new client that replace... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Trusted Platform Agent

    Publication Year: 2011, Page(s):35 - 41
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1612 KB) | HTML iconHTML

    The Trusted Platform Agent is an open source library for writing applications that use Trusted Computing technology. The TPA simplifies the integration of TC primitives with other commonly needed functions. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Guilty or Not Guilty: Using Clone Metrics to Determine Open Source Licensing Violations

    Publication Year: 2011, Page(s):42 - 47
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1432 KB) | HTML iconHTML

    To increase productivity, programmers often unwittingly violate open source software licenses by reusing code fragments, or clones. The authors explore metrics that can reveal the existence or absence of code reuse and apply these metrics to 1,225 open source product pairs. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Managing Copyrights and Moral Rights of Service-Based Software

    Publication Year: 2011, Page(s):48 - 55
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1674 KB) | HTML iconHTML

    Service orientation of software raises new challenges for representing the intellectual rights associated with services and requirements for developing service licensing strategies. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Point/Counterpoint

    Publication Year: 2011, Page(s):56 - 59
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (570 KB) | HTML iconHTML

    The article is discussing new challenges faced by modern security systems because the traditional perimeter defenses against man-in-the-middle attacks are inadequate in protection against the man-at-the-end white-box attacks favored by many attackers. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Computer Society Certification Advertisement

    Publication Year: 2011, Page(s): 60
    Request permission for commercial reuse | PDF file iconPDF (6590 KB)
    Freely Available from IEEE
  • A Service-Based Framework for Flexible Business Processes

    Publication Year: 2011, Page(s):61 - 67
    Cited by:  Papers (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1805 KB) | HTML iconHTML

    A framework for the design and enactment of flexible and adaptive business processes combines design-time and runtime mechanisms to offer a single integrated solution. Globalization and accessibility have caused a significant shift in business processes, from static solutions to flexible processes that can ad dress rapidly changing business needs. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Scrapheap Software Development: Lessons from an Experiment on Opportunistic Reuse

    Publication Year: 2011, Page(s):68 - 74
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1659 KB) | HTML iconHTML

    In this paper a set of 10 guidelines for opportunistic software reuse is discussed. These guidelines are based on observations of nine systems developed entirely with scraps of functionality scavenged from abandoned projects. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Oh Dear, We Bought Our Competitor: Integrating Similar Software Systems

    Publication Year: 2011, Page(s):75 - 82
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1693 KB) | HTML iconHTML

    A look at 10 case studies addresses the technological, personnel, and organizational challenges. The 10 cases involved seven organizations in different business sectors. Our data collection methods included our participation in projects, several rounds of interviews with project leaders and software architects, and several rounds of questionnaires with software architects and project managers, as ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Computer Society Membership Advertisement

    Publication Year: 2011, Page(s): 83
    Request permission for commercial reuse | PDF file iconPDF (1355 KB)
    Freely Available from IEEE
  • Agile Model-Driven Development in Practice

    Publication Year: 2011, Page(s):84 - 91
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1643 KB) | HTML iconHTML

    This article presents practical experiences and lessons learned in defining and implementing an agile model-driven development process using the MDD tools chain. This process and its implementation inherit the merits of scrum, extreme programming, and the Unified Software Development Processes. The experience data demonstrates that combining MDD practices with agile development process can signifi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Don't Read Books

    Publication Year: 2011, Page(s):92 - 94
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (690 KB) | HTML iconHTML

    Reading is a critical habit to learn and keeping current. But books aren't the only thing available to read. The articles discuss pros and cons of articles related to books and how to organize and choose your readings. Reading articles is a good source of knowledge and will help you to read better, read better books, and even read more books. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Five Facts on the Adoption of Open Source Software

    Publication Year: 2011, Page(s):95 - 99
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1364 KB) | HTML iconHTML

    Across the spectrum of software organizations-from traditional software houses to service providers, in both public and private sectors-open source software (OSS) is changing the way they develop, acquire, use, and commercialize software. However, con flicting views about exactly what the OSS phenomenon is remain common. Furthermore, the professional literature doesn't clarify as much as it could-... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Unusable Software Is Useless, Part 2

    Publication Year: 2011, Page(s):100 - 102
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (273 KB) | HTML iconHTML

    In this installment, I turn my attention to the internals of software-centric systems, since usability is also of prime importance for the architectures we create. Ultimately, unusable architectures can lead to architecture drift, complex code, and other consequences that are costly to fix. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

IEEE Software delivers reliable, useful, leading-edge software development information to keep engineers and managers abreast of rapid technology change.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Diomidis Spinellis
Athens University of Economics and Business
28is Oktovriou 76
Athina 104 33, Greece
dds@computer.org