scispace - formally typeset
Search or ask a question

Showing papers in "Journal of Systems and Software in 2004"


Journal ArticleDOI
TL;DR: An extensive review of studies related to expert estimation of software development effort suggests that expert estimation is the most frequently applied estimation strategy for software projects, that there is no substantial evidence in favour of use of estimation models, and that there are situations where the authors can expect expert estimates to be more accurate than formal estimation models.

574 citations


Journal ArticleDOI
TL;DR: A novel approach to secret image sharing based on a (k, n)-threshold scheme with the additional capabilities of steganography and authentication with the capability of authenticating the fidelity of each processed camouflage image, called a stego-image is proposed.

454 citations


Journal ArticleDOI
TL;DR: The survey shows that there are no design techniques or assessment tools that allow for design for usability at the architectural level, and it is believed this design approach can be applied not only to ''traditional'' quality attributes such as performance or maintainability but also to usability.

313 citations


Journal ArticleDOI
TL;DR: ALMA is a unified architecture-level analysis method that focuses on modifiability, distinguishes multiple analysis goals, has explicit assumptions and provides repeatable techniques for performing the steps.

272 citations


Journal ArticleDOI
TL;DR: This paper presents a rule-based approach to support the automatic generation of traceability relations between documents which specify requirement statements and use cases, and analysis object models for software systems.

241 citations


Journal ArticleDOI
TL;DR: A BBN-based procedure using a feedback loop to predict potential risks, identify sources of risks, and advise dynamic resource adjustment is developed, which facilitates the visibility and repeatability of the decision-making process of risk management.

153 citations


Journal ArticleDOI
TL;DR: Results from four studies on human judgement (expert) based PIs of software development effort suggest that the PIs were generally much too narrow to reflect the chosen level of confidence, i.e., that there was a strong over-confidence.

132 citations


Journal ArticleDOI
TL;DR: While CS research examines a variety of technical topics it is relatively focused in terms of the level at which research is conducted as well as the research techniques used, it seldom relies on work outside the discipline for its theoretical foundations.

125 citations


Journal ArticleDOI
TL;DR: The work reported in this paper provides a theoretical foundation for workflow modeling and analysis in workflow management and proposes an innovative approach with corresponding algorithms to the checking of resource consistency for a workflow specification.

87 citations


Journal ArticleDOI
TL;DR: It is concluded that most of the basic theory is investigated within biostatistics, most software engineering research is performed on evaluation, a majority ending up in recommendation of the Mh-JK model, and there is a need for application experiences.

83 citations


Journal ArticleDOI
TL;DR: Evidence is provided that the investigated design heuristic affects the evolution of design structures; and considerably affects the way participants apply the inheritance mechanism.

Journal ArticleDOI
TL;DR: Simulation results indicate that the proposed novel clustering method (called ant colony optimization with different favor algorithm) performs better than the fast self-organizing map (SOM) combines K-means approach (FSOM+K-me means) and genetic K-Means algorithm (GKA).

Journal ArticleDOI
TL;DR: In this paper, the authors describe an approach to develop, retrieve, and reuse management knowledge and experience concerned with software development risks. And they show how risk archetypes and scenario models can represent reusable project management knowledge.

Journal ArticleDOI
TL;DR: This study investigated the extraction of a set of software metrics of a given Java source code--by a program written in Visual C++ that could be used as a fingerprint to identify the author of the Java code.

Journal ArticleDOI
TL;DR: An introduction to the numerical taxonomy is provided, the experiences in applying the approach to various areas are discussed, and the technique is related to the context of similar work.

Journal ArticleDOI
TL;DR: This paper proposes the timeboxing model for iterative software development in which each iteration is done in a time box of fixed duration, and the functionality to be built is adjusted to fit the time box.

Journal ArticleDOI
TL;DR: Although the basic approach is to scramble the identifiers in Java bytecode, the scrambled bytecode produced with the techniques is much harder to crack than that produced with other identifier scrambling techniques and the run-time efficiency of the obfuscated bytecode is improved because the size of the bytecode becomes smaller after obfuscation.

Journal ArticleDOI
TL;DR: The main viewpoint and basic content of the RSM are introduced, and a four-step method for designing the logical-level resource spaces is proposed: resource analysis, top-down resource partition, design two-dimensional resource spaces, and join between resource spaces.

Journal ArticleDOI
TL;DR: There is an urgent need for a new integrative framework for modeling, designing and evaluating multi-device user interfaces for the emerging generation of interactive systems, including task and model-based, pattern-driven and device-independent development.

Journal ArticleDOI
TL;DR: The experimental results showed that when compared to five methods used previously, such as list-scheduling algorithms and a specific GA, the performance of the algorithm was comparable or better for 178 out of 180 randomly generated task graphs.

Journal ArticleDOI
TL;DR: A novel exploratory analysis technique: multiple adaptive regression splines (MARS) is used and it is shown how it can help understand the complex trends and interactions in the data, without requiring the analyst to rely on strong assumptions.

Journal ArticleDOI
TL;DR: This article presents a reference model for concepts and definitions around SPCCs, a characterization and classification of essential approaches contributing to this field, and an outline for future research is derived from identified deficiencies of existing approaches.

Journal ArticleDOI
TL;DR: An agent-based computational grid (ACG), which applies the concept of computational grid to agents to implement a uniform higher-level management of the computing resources and services on the Grid and provide users with a consistent and transparent interface for accessing such services.

Journal ArticleDOI
TL;DR: Experimental results show that the recognition ability of the system can be drastically enhanced after integrating these two image features, which are highly complementary to provide an image retrieval system.

Journal ArticleDOI
TL;DR: The search techniques in CLARiFi, a component broker project that supports integrators in the selection of components for systems, are discussed.

Journal ArticleDOI
Xudong He1, Huiqun Yu1, Tianjun Shi1, Junhua Ding1, Yi Deng1 
TL;DR: This paper shows how to formally analyze SAM software architecture specifications using two well-known techniques--symbolic model checking with tool Symbolic Model Verifier, and theorem proving with tool STeP.

Journal ArticleDOI
TL;DR: The paper concludes that the topic should explore other avenues of analysis, in an attempt to establish which analysis approaches are preferable under which conditions, when conducting empirical software engineering studies.

Journal ArticleDOI
TL;DR: A modified Imprimatur model based on a multi-level content distribution model is developed and a formal model of a new DRM system is presented and the properties that a DRM system should have are identified.

Journal ArticleDOI
TL;DR: This paper proposes a flexible Web Service retrieval approach, which solves this issue by means of an orthogonal service space and establishing the multi-valued specialization relationships between services by way of an SQL-like flexible query language.

Journal ArticleDOI
TL;DR: This paper proposes an adaptable vertical partitioning method that can support both best-fit and n-way vertical partitions, and presents several experimental results to clarify the validness of the proposed algorithm.