Go home now Header Background Image
Search
Submission Procedure
share: |
 
Follow us
 
 
 
 
Articles by Topics
Topic D. - Software
Topic D.2 - SOFTWARE ENGINEERING
Topic D.2.8 - Metrics

I. Abunadi, M. Alenezi:
An Empirical Investigation of Security Vulnerabilities within Web Applications
/jucs_22_4/an_empirical_investigation_of
page 537 - 551
Vol.22 / Issue 4
R. Andrade, H. Rebelo, M. Ribeiro, P. Borba:
Flexible Feature Binding with AspectJ-based Idioms
/jucs_20_5/flexible_feature_binding_with
page 692 - 719
Vol.20 / Issue 5
P. Charuenporn, S. Intakosum:
Qos-Security Metrics Based on ITIL and COBIT Standard for Measurement Web Services
/jucs_18_6/qos_security_metrics_based
page 775 - 797
Vol.18 / Issue 6
M. Di Santo, F. Frattolillo:
Time Costs in Actor Computations
/jucs_11_6/time_costs_in_actor
page 850 - 873
Vol.11 / Issue 6
H. Dong, F. Khadeer Hussain, E. Chang:
ORPMS: An Ontology-based Real-time Project Monitoring System in the Cloud
/jucs_17_8/orpms_an_ontology_based
page 1161 - 1182
Vol.17 / Issue 8
M. Jovanović, A.-L. Mesquida, N. Radaković, A. Mas:
Agile Retrospective Games for Different Team Development Phases
/jucs_22_12/agile_retrospective_games_for
page 1489 - 1508
Vol.22 / Issue 12
F. Jurado, A.I. Molina, M.A. Redondo, M. Ortega, A. Giemza, L. Bollen, H.U. Hoppe:
Learning to Program with COALA, a Distributed Computer Assisted Environment
/jucs_15_7/learning_to_program_with
page 1472 - 1485
Vol.15 / Issue 7
D. Mishra, S. Abdalhamid:
Software Quality Issues in SCRUM: A Systematic Mapping
/jucs_24_12/software_quality_issues_in
page 1690 - 1716
Vol.24 / Issue 12
S. Moya, S. Grau, D. Tost:
First-Person Locomotion in 3D Virtual Environments: a Usability Analysis
/jucs_20_7/first_person_locomotion_in
page 1026 - 1045
Vol.20 / Issue 7
C. Nunes, U. Kulesza, C. Sant'Anna, I. Nunes, A. Garcia, C. Lucena:
Assessment of the Design Modularity and Stability of Multi-Agent System Product Lines
/jucs_15_11/assessment_of_the_design
page 2254 - 2283
Vol.15 / Issue 11
E. Papatheocharous, A.S. Andreou:
Software Cost Modelling and Estimation Using Artificial Neural Networks Enhanced by Input Sensitivity Analysis
/jucs_18_14/software_cost_modelling_and
page 2041 - 2070
Vol.18 / Issue 14
A. Rathee, J.K. Chhabra:
Clustering for Software Remodularization by Using Structural, Conceptual and Evolutionary
/jucs_24_12/clustering_for_software_remodularization
page 1731 - 1757
Vol.24 / Issue 12
L. Reynoso, M. Genero, M. Piattini:
Refinement and Extension of SMDM, a Method for Defining Valid Measures
/jucs_16_21/refinement_and_extension_of_smdm
page 3210 - 3244
Vol.16 / Issue 21
R.M. Savola, C. Frühwirth, A. Pietikäinen:
Risk-Driven Security Metrics in Agile Software Development - An Industrial Pilot Study
/jucs_18_12/risk_driven_security_metrics
page 1679 - 1702
Vol.18 / Issue 12
M. Solar, F. Daniels, R. López, L. Meijueiro:
A Model to Guide the Open Government Data Implementation in Public Agencies
/jucs_20_11/a_model_to_guide
page 1564 - 1582
Vol.20 / Issue 11
M. Spruit, C. Sacu:
DWCMM: The Data Warehouse Capability Maturity Model
/jucs_21_11/dwcmm_the_data_warehouse
page 1508 - 1534
Vol.21 / Issue 11
D. da Cruz, P.R. Henriques:
Visualizing and Analyzing the Quality of XML Documents
/jucs_17_1/visualizing_and_analyzing_the
page 126 - 150
Vol.17 / Issue 1