scispace - formally typeset
Search or ask a question

Showing papers in "Journal of Systems and Software in 2012"


Journal ArticleDOI
TL;DR: The conceptual structure underlying agile scholarship is delineated by performing an analysis of authors who have made notable contributions to the field and urging agile researchers to embrace a theory-based approach in their scholarship.

944 citations


Journal ArticleDOI
TL;DR: A new color image encryption algorithm based on DNA (Deoxyribonucleic acid) sequence addition operation is presented that not only has good encryption effect, but also has the ability of resisting exhaustive attack, statistical attack and differential attack.

346 citations


Journal ArticleDOI
TL;DR: The gray distance is much better than the Minkowski distance at both capturing the proximity relationship (or nearness) of two instances and dealing with mixed attributes, and experimental results show that the GkNN algorithm is much more efficient than existent kNN imputation methods.

228 citations


Journal ArticleDOI
TL;DR: The results of this study show that lean can be applied in agile processes in different manners for different purposes, with the most recent introduction being the kanban approach, introducing a continuous, flow-based substitute to time-boxed agile processes.

216 citations


Journal ArticleDOI
TL;DR: Decision obstacles facing decision making in Agile development are identified and mapped to descriptive decision making principles to demonstrate where the obstacles affect the decision process.

179 citations


Journal ArticleDOI
TL;DR: This paper presents a survey of techniques and technologies proposed over the years either to prevent architecture erosion or to detect and restore architectures that have been eroded, and argues that no single strategy can address the problem of erosion.

175 citations


Journal ArticleDOI
TL;DR: Stitch is presented, a language for representing repair strategies within the context of an architecture-based self-adaptation framework that supports the explicit representation of repair decision trees together with the ability to express business objectives, allowing a self- Adaptive system to select a strategy that has optimal utility in a given context, even in the presence of potential timing delays and outcome uncertainty.

168 citations


Journal ArticleDOI
TL;DR: The theoretical model of coordination in agile software development projects proposes that an agile coordination strategy increases coordination effectiveness and has application for practitioners who want to select appropriate practices from agile methods to ensure they achieve coordination coverage in their project.

167 citations


Journal ArticleDOI
TL;DR: This paper provides friend recommendations, also known as the link prediction problem, by traversing all paths of a limited length, based on the ''algorithmic small world hypothesis'' and is able to provide more accurate and faster friend recommendations.

160 citations


Journal ArticleDOI
TL;DR: The results of a study on the structure of a large collection of open-source programs developed in Java indicate that the proposed thresholds can support the identification of classes which violate design principles, as well as the Identification of well-designed classes.

159 citations


Journal ArticleDOI
TL;DR: This work is the first to examine the impact of multiple machine learning dimensions (classifiers, attributes, and training history) along with bug tossing graphs on prediction accuracy in bug assignment, and proposes optimization techniques that achieve high prediction accuracy while reducing training and prediction time.

Journal ArticleDOI
TL;DR: T-Rex is a new CEP middleware that combines expressiveness and efficiency that adopts a language (TESLA) explicitly conceived to easily and naturally describe composite events to identify the composite events relevant for the application.

Journal ArticleDOI
TL;DR: The results indicate that the optimism bias caused by group discussion diminishes or even disappears as the expertise of the people involved in the group estimation process increases.

Journal ArticleDOI
TL;DR: A systematic review of relevant published studies related to topics in Requirements Engineering, dated from 1984 to 2011, suggests that the analyzed approaches still have serious limitations in terms of covering all aspects of stakeholder identification as an important part of requirements elicitation.

Journal ArticleDOI
TL;DR: The response time of a proposed system for detecting fire hazard in a Bord-and-Pillar coal mine panel (Hustrulid and Bullock, 2001) is presented and results show that the average network delay varies almost linearly with the increasing the number of hops.

Journal ArticleDOI
TL;DR: This paper compares the success of university students in interpreting business process descriptions, for an established graphical notation (BPMN) and for an alternative textual notation (based on written use-cases)

Journal ArticleDOI
TL;DR: The open software enterprise model is presented that enables one to establish the degree of openness of a software producing organization and shows that organizational openness and transparency are complex variables, that should not be determined based on belief or prejudice.

Journal ArticleDOI
TL;DR: An improved particle swarm optimization (IPSO) is used to train the functional link artificial neural network (FLANN) for classification and it is named ISO-FLANN, which has less architectural complexity, easier to train, and more insight may be gained in the classification problem.

Journal ArticleDOI
TL;DR: An intelligent reversible watermarking approach GA-RevWM for medical images is proposed, based on the concept of block-based embedding using genetic algorithm and integer wavelet transform.

Journal ArticleDOI
TL;DR: It is concluded that the observed change has led to an increase in collaboration across (previously closed) organizational borders, and to the development of a shared value consisting of two components: the technology (the product line, as an extensible platform), and the business domain it supports.

Journal ArticleDOI
TL;DR: This study concludes that in order to apply statistical or data mining techniques to these type of repositories extensive preprocessing of the data needs to be performed due to ambiguities, wrongly recorded values, missing values, unbalanced datasets, etc.

Journal ArticleDOI
TL;DR: The graphical password enlarges the password space size and promotes the KDA utility in touch screen handheld mobile devices, and explores a pressure feature, which is easy to use in touch screens, and applies it in the proposed system.

Journal ArticleDOI
TL;DR: This paper proposes a method of cost-cognizant test case prioritization based on the use of historical records and proposes a genetic algorithm to determine the most effective order.

Journal ArticleDOI
TL;DR: This paper reviews the state of the art in the field of COP in the perspective of the benefits that this technique can provide to software engineers in the design and implementation of context-aware applications.

Journal ArticleDOI
TL;DR: A comprehensive research model of OSS success is developed which includes both extrinsic and intrinsic attributes and shows marked differences in some of the relationships at different points in time lending support to the notion that different factors need to be emphasized as the OSS project unfolds over time.

Journal ArticleDOI
TL;DR: Results suggest that UniSpaCh offers higher embedding efficiency while exhibiting higher imperceptivity of white space manipulation when compared to the existing methods considered.

Journal ArticleDOI
TL;DR: The construction of an interactive PDP protocol is addressed to prevent the fraudulence of prover and the leakage of verified data (zero-knowledge property) and it is proved that the construction holds these properties based on the computation Diffie-Hellman assumption and the rewindable black-box knowledge extractor.

Journal ArticleDOI
TL;DR: Through a set of experiments, it is shown that the tool is able to identify and extract new classes that developers recognize as "coherent concepts" and improve the design quality of the underlying system.

Journal ArticleDOI
TL;DR: A method to detect and recognize leukocytes automatically and shows that even though only leukocyte nucleus features are used for classification in this method, it achieves a high and promised accurate recognition rate.

Journal ArticleDOI
TL;DR: In this field study, a grounded theory of how people manage the process of software development is generated and an attempt to converge individuals' points of view or perspectives about a software project is made.