Go home now Header Background Image
Search
Submission Procedure
share: |
 
Follow us
 
 
 
 
Articles by Topics
Topic K. - Computing Milieux
Topic K.6 - MANAGEMENT OF COMPUTING AND INFORMATION SYSTEMS
Topic K.6.3 - Software Management

A. Silva Barreto, L.G.P. Murta, A.R. Cavalcanti da Rocha:
Software Process Definition: a Reuse-based Approach
/jucs_17_13/software_process_definition_a
page 1765 - 1799
Vol.17 / Issue 13
M.G. Batista Dias, N. Anquetil, K.M. de Oliveira:
Organizing the Knowledge Used in Software Maintenance
/jucs_9_7/organizing_the_knowledge_used
page 641 - 658
Vol.9 / Issue 7
K. dos Santos Brito, V.C. Garcia, E. Santana de Almeida, S.R. de Lemos Meira:
LIFT - A Legacy InFormation Retrieval Tool
/jucs_14_8/lift_a_legacy_information
page 1256 - 1284
Vol.14 / Issue 8
R. Colomo-Palacios, E. Fernandes, M. Sabbagh, A. de Amescua Seco:
Human and Intellectual Capital Management in the Cloud: Software Vendor Perspective
/jucs_18_11/human_and_intellectual_capital
page 1544 - 1557
Vol.18 / Issue 11
G.M. Giaglis, D. Spinellis:
Division of Effort, Productivity, Quality, and Relationships in FLOSS Virtual Teams: Evidence from the FreeBSD Project
/jucs_18_19/division_of_effort_productivity
page 2625 - 2645
Vol.18 / Issue 19
M. R. Girgis:
Automatic Test Data Generation for Data Flow Testing Using a Genetic Algorithm
/jucs_11_6/automatic_test_data_generation
page 898 - 915
Vol.11 / Issue 6
B. Henderson-Sellers, M. Serour, T. McBride, C. Gonzalez-Perez, L. Dagher:
Process Construction and Customization
/jucs_10_4/process_construction_and_customization
page 326 - 358
Vol.10 / Issue 4
H. Holm, T. Sommestad, U. Franke, M. Ekstedt:
Success Rate of Remote Code Execution Attacks - Expert Assessments and Observations
/jucs_18_6/success_rate_of_remote
page 732 - 749
Vol.18 / Issue 6
P. Holtkamp, J.M. Pawlowski:
A Competence-based View on the Global Software Development Process
/jucs_21_11/a_competence_based_view
page 1385 - 1404
Vol.21 / Issue 11
H. Peter In, D. Olson:
Requirements Negotiation Using Multi-Criteria Preference Analysis
/jucs_10_4/requirements_negotiation_using_multi
page 306 - 325
Vol.10 / Issue 4
Y. Jung, M. Kim:
Situation-Aware Community Computing Model for Developing Dynamic Ubiquitous Computing Systems
/jucs_16_15/situation_aware_community_computing
page 2139 - 2174
Vol.16 / Issue 15
K. Ma, R. Sun, A. Abraham:
Toward a Module-centralized and Aspect-oriented Monitoring Framework in Clouds
/jucs_19_15/toward_a_module_centralized
page 2241 - 2265
Vol.19 / Issue 15
E. D. Popova, C. P. Ullrich:
Generalizing BIAS Specifications
/jucs_3_1/generalizing_bias
page 23 - 41
Vol.3 / Issue 1
K. Schneider:
What to Expect from Software Experience Exploitation
/jucs_8_6/what_to_expect_from
page 570 - 580
Vol.8 / Issue 6
J. Shearer, A. Vermeer:
Software Patents and The Internet
/jucs_1_5/software_patents_and_the
page 312 - 319
Vol.1 / Issue 5
G. Wiederhold:
Determining Software Investment Lag
/jucs_14_22/determining_software_investment_lag%20
page 3737 - 3766
Vol.14 / Issue 22