首页
OALib 期刊
快速投稿通道
我的图书馆
常见问题
关于我们
关注我们+
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
LinkedIn (OALib Group)
LinkedIn (OALib Company Page)
Facebook
Twitter
全部
标题
作者
关键词
摘要
OALib Journal期刊
ISSN: 2333-9721
费用:99美元
投递稿件
为什么选择我们?
>>
- 开源期刊
- 同行审议
- 快速出刊
- 终身存储
- 免费检索
- 免费推广
- 更多...
- 搜索引擎
International Journal of Software Engineering
ISSN Print: 1687-6954
ISSN Online:
主页:
http://www.ijse.org.eg/
分享:
Go
Automated Source Code Analysis to Identify and Remove Software Security Vulnerabilities: Case Studies on Java Programs
Natarajan Meghanathan;
A Hybrid Metrics Suite for Evaluating Object-Oriented Design
Saddam H. Ahmed
,
Taysir Hassan A. Soliman
,
Adel A. Sewisy
Proposed Method for Computing Interprocedure Slicing
Lipika Jha
,
Dr. K.S. Patnaik
Predictive and Stochastic Approach for Software Effort Estimation
Srinivasa Rao T.
,
Hari CH.V.M.K.
,
Prasad Reddy P.V.G.D
Secure ETL Process Model: An Assessment of Security in Different Phases of ETL
M Mrunalini
,
T V Suresh Kumar
,
K Rajani Kanth
A Framework for Instituting Software Metrics in Small Software Organizations
Hisham M. Haddad
,
Nancy C. Ross
,
Donald E. Meredith
Design of a Software Framework for the Management and Personalization of Contents in Smart Museums
Luca Caviglione
,
Mauro Coccoli
Designing and Implementing Telerehabilitation on Hand Skill Development for the Disabled People in Bangladesh
Md. Sami Uddin
,
Jahidul I. Khan
,
Hasan Mahmud
The CleanJava Language for Functional Program Verification
Yoonsik Cheon
,
Cesar Yeep
,
Melisa Vela
How Time-Fault Ratio helps in Test Case Prioritization for Regression Testing
Prem Parashar
,
Arvind Kalia
,
Rajesh Bhatia
Recovering Use Case Diagrams from Object Oriented Code: an MDA-based Approach
Claudia T. Pereira
,
Liliana I. Martinez
,
Liliana M. Favre
A Tactic-Based Framework to Evaluate the Relationships between the Software Product Quality Attributes
Saleh H. Al-Daajeh
,
Rafa E. Al-Qutaish
,
Fuad Al-Qirem
RFID Factor Authentication Application For Trusted Identities in Cyberspace
Jing-Chiou Liou
,
Gregory Egan
,
Jay K. Patel
,
Sujith Bhashyam
Information Resource Planning and Management: An Interactive Model
Jianchao Han
,
Hosung Kim
,
Deepak Murthy
,
Mohsen Beheshti
VRS Model: A Model for Estimation of Efforts and Time Duration in Development of IVR Software System
Devesh Kumar Srivastava
,
Durg Singh Chauhan
,
Raghuraj Singh
Designing Aspects with AODL
Saqib Iqbal
,
Gary Allen
Model Consistency Checker Using Object State Machine
Ahmed F.Shosha
,
Mahmoud Allam
,
Amr Kamel
Traditional versus Agile: The Tragile Framework for Information Systems Development
Mohammed S. Seyam
,
Galal H. Galal-Edeen
Evaluate and Improve GUI Testing Coverage Automatically
Izzat Alsmadi
,
Samer Samarah
,
Ahmed Soefan
,
Mohammed AL Zamil
Patterns Mining from Java Source Code
Mohamed A. Soliman
,
Islam A. M. ElMaddah
,
Ayman M. Wahba
Takagi-Sugeno Fuzzy Logic for Software Cost Estimation Using Fuzzy Operator
P.V.G.D Prasad Reddy
,
CH.V.M.K.Hari
,
M.Jagadeesh
A Software Architecture for Summarising and Interpreting ICU Monitor Data
Apkar Salatian
,
Peter Oriogun
Qualitative Investigation of Object Oriented Frameworks Key Success Factors
Gregor Polan
,
Andrej Krajnc
,
Marjan Heri ko
Software Design Level Security Vulnerabilities
S. Rehman
,
K. Mustafa
The Influence of Culture on Systems Usability
Perihan Elbaz
,
Galal Hassan Galal-Edeen
,
Mervat Gheith
Applying the PSP in CMMI Level 5 Organizations: A Case Study
Adham Shaher
,
Amr Kamel
,
Osman Hegazi
Software Security Requirements Checklist
Mahtab Alam
The Pattern of Software Defects Spanning Across Size Complexity
T.R.Gopalakrishnan Nair
,
V. Suma
Soft Computing Approach for Software Cost Estimation
Iman Attarzadeh
,
Siew Hock Ow
Test Case Generation Based on Use case and Sequence Diagram
Santosh Kumar Swain
,
Durga Prasad Mohapatra
,
Rajib Mall
Using UML to Model Web Services for Automatic Composition
Amal Elgammal
,
Mohamed El-Sharkawi
Criteria-Based Framework for Software Product Management
Samer I. Mohamed
,
Islam A. M. ElMaddah
,
Ayman M. Wahba
Object-Level Behavior Analysis using Cohesion and Coupling Metrics
Justus Selwyn
,
Ka Iyakutti
Assessing User-Centric Quality of Web-Based Systems
Khaled M. Khan
,
Mohammed Samaka
,
Christopher Van Eeno
,
Surianto Budihardjo
Lessons Learned from Building an Effort Estimation Model for Software Projects
Galal H. Galal-Edeen
,
Amr Kamel
,
Hanan Moussa
An Optimal Neural Network Model for Software Effort Estimation
Ch.Satyananda Reddy
,
KVSVN Raju
Enhancing Flexibility of Workflow Systems
A. Elfatatry
,
Z. Mohamed
,
M. Eleskandarany
UDB: An Agent-Oriented Source-Level Debugger
Ziad A. Al-Sharif
,
Clinton L. Jeffery
A Software Development Simulation Model of a Spiral Process
Carolyn Mizell
,
Linda Malone
Hybrid-Based Maintainability Impact Analysis for Evolving Systems
Samer I. Mohamed
,
Islam A. M. ElMaddah
,
Ayman M. Wahba
ABC Tester - Artificial Bee Colony Based Software Test Suite Optimization Approach
D. Jeya Mala
,
V. Mohan
Using Robustness Diagrams to Help With Software Understanding: an Eclipse Plug-in
Philippe Dugerdil
,
Javier Belmonte
,
David Kony
Usability Analysis of Geographic Information System
Mehedi Masud
,
Delwar Hossain
A Model for Rearchitecting Frameworks
Galal H. Galal-Edeen
,
Mohamed A. Shouman
,
Nissreen A. El-Saber
Reliability Evaluation of Object Oriented Software Systems Using Communication Variabiles – A Review
S. Somasundaram
,
R. Chinnaiyan
Component-based Software Design and Implementation for Network Security System
Jianchao Han
,
Mohsen Beheshti
,
Kazimierz Kowalski
,
Johnly Tomelden
Multi-Objective Optimization for Ensemble of Models in Software Reliability Prediction
Sultan H. Aljahdali
Agile Maturity Model (AMM): A Software Process Improvement framework for Agile Software Development Practices
Chetankumar Patel
,
Muthu Ramachandran
Generalized Mignotte Sequences and Software Watermarking
Hedley Morris
,
Mohammed Eyadat
Asset Identification for Security Risk Assessment in Web Applications
Hisham M. Haddad
,
Brunil D. Romero
Go