Buscar
Mostrando ítems 1-8 de 8
Artículo
Empirical Evidence of the Usage of Programming Languages in the Educational Process
(IEEE Computer Society, 2021)
Contribution: A systematic literature review on the empirical evidence regarding the usage of programming languages for learning purposes is presented. The review analyzes different methods and tools at different ...
Artículo
gPROFIT: A Tool to Assist the Automatic Extraction of Business Knowledge From Legacy Information Systems
(IEEE Computer Society, 2021)
Business digitization is a crucial strategy for business growth in the 21st century. Its bene ts include improving business process automation, customer satisfaction, productivity, decision-making, turnover, and adaptation ...
Artículo
Empirical software product line engineering: A systematic literature review
(Elsevier, 2020)
Context: The adoption of Software Product Line Engineering (SPLE) is usually only based on its theoretical benefits instead of empirical evidences. In fact, there is no work that synthesizes the empirical studies on SPLE. ...
Artículo
Open Source Adoption Factors-A Systematic Literature Review
(IEEE Computer Society, 2020)
Nowadays, Free/Libre/OpenSource Software (FLOSS) is becoming a strategic option for many organizations in the public and the private sector. The lack of well defined guidelines for IT managers may jeopardize the FLOSS ...
Artículo
Specifying Compensations with WS-Agreement
(IEEE Computer Society, 2017)
During the last years the use of service level agreements (SLA) is rising uncontrollably to describe the rights and obligations of parties involved in service provisioning (typically the service consumer and the service ...
Artículo
Uniform and scalable sampling of highly configurable systems
(Springer, 2022)
Many analyses on confgurable software systems are intractable when confronted with colossal and highly-constrained confguration spaces. These analyses could instead use statistical inference, where a tractable sample ...
Artículo
A domain-specific language for the specification of UCON policies
(Elsevier, 2022)
Security policies constrain the behavior of all users of an information system. In any non-trivial system, these security policies go beyond simple access control rules and must cover more complex and dynamic scenarios while ...
Artículo
Recommendation and Classification Systems: A Systematic Mapping Study
(Hindawi, 2019)
Today, recommendation algorithms are widely used by companies in multiple sectors with the aim of increasing their profits or offering a more specialized service to their customers. Moreover, there are countless applications ...