Academic literature on the topic 'Software crisis'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Software crisis.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Software crisis"

1

Fitzgerald, Brian. "Software Crisis 2.0." Computer 45, no. 4 (April 2012): 89–91. http://dx.doi.org/10.1109/mc.2012.147.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Plant, Norman. "Software in crisis." Physics World 5, no. 9 (September 1992): 43–48. http://dx.doi.org/10.1088/2058-7058/5/9/26.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Wolf, Marilyn. "Embedded Software in Crisis." Computer 49, no. 1 (January 2016): 88–90. http://dx.doi.org/10.1109/mc.2016.18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

McFadden, Fred, and Richard Discenza. "Confronting the software crisis." Business Horizons 30, no. 6 (November 1987): 68–73. http://dx.doi.org/10.1016/0007-6813(87)90054-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Glass, R. L. "The software-research crisis." IEEE Software 11, no. 6 (November 1994): 42–47. http://dx.doi.org/10.1109/52.329400.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Krishnamurthi, Shriram, and Jan Vitek. "The real software crisis." Communications of the ACM 58, no. 3 (February 23, 2015): 34–36. http://dx.doi.org/10.1145/2658987.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Auer, Antti, Mikko Levanto, Ari Okkonen, and Jyrki Okkonen. "Solution in software crisis." Microprocessing and Microprogramming 30, no. 1-5 (August 1990): 273–80. http://dx.doi.org/10.1016/0165-6074(90)90254-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Vandierendonck, H., and T. Mens. "Averting the Next Software Crisis." Computer 44, no. 4 (April 2011): 88–90. http://dx.doi.org/10.1109/mc.2011.99.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Fáy, G., and E. Szücs. "Second literacy and software crisis." Education and Computing 4, no. 1 (January 1988): 45–48. http://dx.doi.org/10.1016/s0167-9287(88)80025-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Albusays, Khaled, Pernille Bjorn, Laura Dabbish, Denae Ford, Emerson Murphy-Hill, Alexander Serebrenik, and Margaret-Anne Storey. "The Diversity Crisis in Software Development." IEEE Software 38, no. 2 (March 2021): 19–25. http://dx.doi.org/10.1109/ms.2020.3045817.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Software crisis"

1

Pelaez, Valdez Maria Eloina. "A gift from Pandora's Box : the software crisis." Thesis, University of Edinburgh, 1988. http://hdl.handle.net/1842/19228.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Santos, Daniel Soares. "Quality Evaluation Model for Crisis and Emergency Management Systems-of-Systems." Universidade de São Paulo, 2017. http://www.teses.usp.br/teses/disponiveis/55/55134/tde-10072017-162919/.

Full text
Abstract:
Systems-of-Systems (SoS) have performed an important and even essential role to the whole society and refer to complex softwareintensive systems, resulted from interoperability of independent constituent systems that work together to achieve more complex missions. SoS have emerged specially in critical application domains and, therefore, high level of quality must be assured during their development and evolution. However, dealing with quality of SoS still presents great challenges, as SoS present a set of unique characteristics that can directly affect the quality of such systems. Moreover, there are not comprehensive models that can support the quality evaluation of SoS. Motivated by this scenario, the main contribution of this Masters project is to present a SoS Evaluation Model, more specifically, addressing the crisis/emergency management domain, built in the context of a large international research project. The proposed model covers important evaluation activities and considers all SoS characteristics and challenges not usually addressed by other models. This model was applied to evaluate a crisis/emergency management SoS and our results have shown it viability to the effective management of the SoS quality.
Sistemas-de-Sistemas (SoS, do inglês Systems-of-Systems) realizam um importante e até essencial papel na sociedade. Referem-se a complexos sistemas intensivos em software, resultado da interoperabilidade de sistemas constituintes independentes que trabalham juntos para realizar missões mais complexas. SoS têm emergido especialmente em domínios de aplicação crítica, portanto, um alto nível de qualidade deve ser garantido durante seu desenvolvimento e evolução. Entretanto, lidar com qualidade em SoS ainda apresenta grandes desafios, uma vez que possuem um conjunto de características únicas que podem diretamente afetar a qualidade desses sistemas. Além disso, não existem modelos abrangentes para o suporte à avaliação de qualidade de SoS. Motivado por este cenário, a principal contribuição deste projeto de mestrado é apresentar um modelo de avaliação para SoS, especialmente destinado ao domínio de gerenciamento de crises e emergências. Este modelo foi construído no contexto de um grande projeto de pesquisa internacional, e cobre as mais importantes atividades de avaliação, considerando as principais características e desafios de SoS geralmente não abordados por outros modelos. Este modelo foi aplicado na avaliação de um SoS de gerenciamento de crises e emergência, e nossos resultados têm mostrado sua viabilidade para o efetivo gerenciamento da qualidade de SoS.
APA, Harvard, Vancouver, ISO, and other styles
3

Nourjou, Reza. "GIS-based Intelligent Assistant Agent for Supporting Decisions of Incident Commander in Disaster Response." 京都大学 (Kyoto University), 2014. http://hdl.handle.net/2433/188867.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Saoutal, Amina. "Amélioration de l'awareness informationnelle dans la collaboration inter-organisations pendant la gestion de crise." Thesis, Troyes, 2015. http://www.theses.fr/2015TROY0036/document.

Full text
Abstract:
Des verrous technologiques et sociaux importants sont identifiés lors du soutien de la collaboration entre acteurs d’une crise : en particulier, souvent la conception de systèmes informatiques dans ce but ne répond pas aux besoins des utilisateurs et les systèmes trop rigides ne permettent pas de supporter des situations dynamiques où les évènements sont imprévus et font appel à des mesures émergentes. Pour s’affranchir de ces verrous, notre travail se positionne dans le domaine du travail collaboratif assisté par ordinateur (TCAO) focalisé sur les systèmes sociotechniques. Cette recherche s’inscrit dans la problématique d’un système flexible d’information et de communication qui supporte l’awareness informationnelle dans un contexte précis : la collaboration inter-organisationnelle dans des situations émergentes et complexes. Celles-ci ajoutent au travail collaboratif plusieurs contraintes, notamment le stress, l’imprévision, la multitude des acteurs et les frontières organisationnelles. Dans ce contexte, les différentes organisations – SAMU, pompiers, gendarmerie et autres - doivent acquérir et percevoir les informations qui leur sont utiles pour accomplir leurs activités inter-organisationnelles. Certes, les acteurs rencontrent des problèmes qui entravent l’atteinte de leurs objectifs. Avec l’aide des sciences sociales, cette étude apporte une contribution de recherche en informatique ouverte sur l’interdisciplinarité. Un apport important en est l’étude de l’aspect organisationnel et de l’aspect informationnel à partir des pratiques réelles des utilisateurs
In order to overcome the technological and social locks that are identified in supporting collaboration - for instance, the computer systems design problems that do not meet the needs of users and/or systems that are rigid and do not allow to deal with dynamic situations where events are unexpected and appeal to emerging measures - our work is positioned in the field of Computer-Supported Cooperative Work (CSCW) characterized by the dualistic social and technical aspects.This research proposes flexible information and communication system that supports the information awareness in the inter-agency collaboration in emerging and complex situations as crisis. These situations add to a collaborative work several constraints such as stress, lack of foresight, the multitude of actors and organizational boundaries. In crisis management, the various organizations – emergency medical service, firefighters, police and others - need to perceive useful information to them to complete their inter-agency activities. However, actors encounter problems that prevent them to reach their goals. This study brings to its scale, a contribution in computer sciences opened to interdisciplinary with the help of social sciences which rely on study of current practices to understand and analyze the users, their activities and the work environment
APA, Harvard, Vancouver, ISO, and other styles
5

Sonnekus, Michael Hendrik. "A comparison of open source and proprietary digital forensic software." Thesis, Rhodes University, 2015. http://hdl.handle.net/10962/d1017939.

Full text
Abstract:
Scrutiny of the capabilities and accuracy of computer forensic tools is increasing as the number of incidents relying on digital evidence and the weight of that evidence increase. This thesis describes the capabilities of the leading proprietary and open source digital forensic tools. The capabilities of the tools were tested separately on digital media that had been formatted using Windows and Linux. Experiments were carried out with the intention of establishing whether the capabilities of open source computer forensics are similar to those of proprietary computer forensic tools, and whether these tools could complement one another. The tools were tested with regards to their capabilities to make and analyse digital forensic images in a forensically sound manner. The tests were carried out on each media type after deleting data from the media, and then repeated after formatting the media. The results of the experiments performed demonstrate that both proprietary and open source computer forensic tools have superior capabilities in different scenarios, and that the toolsets can be used to validate and complement one another. The implication of these findings is that investigators have an affordable means of validating their findings and are able to more effectively investigate digital media.
APA, Harvard, Vancouver, ISO, and other styles
6

Chitturi, Kiran. "Building CTRnet Digital Library Services using Archive-It and LucidWorks Big Data Software." Thesis, Virginia Tech, 2014. http://hdl.handle.net/10919/46865.

Full text
Abstract:
When a crisis occurs, information flows rapidly in the Web through social media, blogs, and news articles. The shared information captures the reactions, impacts, and responses from the government as well as the public. Later, researchers, scholars, students, and others seek information about earlier events, sometimes for cross-event analysis or comparison. There are very few integrated systems which try to collect and permanently archive the information about an event and provide access to the crisis information at the same time. In this thesis, we describe the CTRnet Digital Library and Archive which aims to permanently archive crisis event information by using Archive-It services and then provide access to the archived information by using LucidWorks Big Data software. Through the Big Data (LWBD) software, we take advantage of text extraction, clustering, similarity, annotation, and indexing services and build digital libraries with the generated metadata that will be helpful for the system stakeholders to locate information about an event. Through this study, we collected data for 46 crises events using Archive-It. We built a CTRnet DL prototype and its services for the ``Boston Marathon Bombing" collection by using the components of LucidWorks Big Data. Running LucidWorks Big Data on a 30 node Hadoop cluster accelerates the sub-workflows processing and also provides fault tolerant execution. LWBD sub-workflows, ``ingest" and ``extract", processed the textual data present in the WARC files. Other sub-workflows ``kmeans", ``simdoc", and ``annotate" helped in grouping the search-results, deleting the duplicates and providing metadata for additional facets in the CTRnet DL prototype, respectively.
Master of Science
APA, Harvard, Vancouver, ISO, and other styles
7

Judd, Aaron C. "Improved Network Security and Disguising TCP/IP Fingerprint Through Dynamic Stack Modification /." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Sep%5FJudd.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Santos, Rodrigo Antônio dos. "Criminalidade em Goiânia: mapeamento dos crimes contra a pessoa nos contextos sociais de 2010 a 2014." Universidade Federal de Goiás, 2016. http://repositorio.bc.ufg.br/tede/handle/tede/6604.

Full text
Abstract:
Submitted by Jaqueline Silva (jtas29@gmail.com) on 2016-12-16T15:29:32Z No. of bitstreams: 2 Dissertação - Rodrigo Antônio dos Santos - 2016.pdf: 7982615 bytes, checksum: d618d017d5a9c7d3c33ce6611af601bb (MD5) license_rdf: 0 bytes, checksum: d41d8cd98f00b204e9800998ecf8427e (MD5)
Approved for entry into archive by Jaqueline Silva (jtas29@gmail.com) on 2016-12-16T15:29:53Z (GMT) No. of bitstreams: 2 Dissertação - Rodrigo Antônio dos Santos - 2016.pdf: 7982615 bytes, checksum: d618d017d5a9c7d3c33ce6611af601bb (MD5) license_rdf: 0 bytes, checksum: d41d8cd98f00b204e9800998ecf8427e (MD5)
Made available in DSpace on 2016-12-16T15:29:53Z (GMT). No. of bitstreams: 2 Dissertação - Rodrigo Antônio dos Santos - 2016.pdf: 7982615 bytes, checksum: d618d017d5a9c7d3c33ce6611af601bb (MD5) license_rdf: 0 bytes, checksum: d41d8cd98f00b204e9800998ecf8427e (MD5) Previous issue date: 2016-11-07
Coordenação de Aperfeiçoamento de Pessoal de Nível Superior - CAPES
This paper aimed to map, for neighborhoods of Goiânia, crimes against the person recorded in the 2010-2014 period. With the support of GIS software ArcGIS, crossed crime data with demographic and criminal, such as drug dealing, drug dealing association, color / race, gender and income of the population. The chosen crimes against the person were intentional homicide, manslaughter, bodily injury followed by death and robbery (the latter being a crime against property). At the end, you can see the rapid growth of violence in the city of Goiânia, as well as the most prominent criminal neighborhoods, and its correlation with the demographic variables
O presente trabalho buscou fazer um mapeamento, por bairros de Goiânia, dos crimes contra a pessoa registrados no período de 2010 a 2014. Com o apoio do software SIG ArcGIS, cruzou-se os dados criminais com variáveis demográficas e, também, criminais, sendo: tráfico de drogas, associação ao tráfico de drogas, cor/ raça da população, gênero e renda. Os crimes contra a pessoa escolhidos foram: homicídio doloso, homicídio culposo, lesão corporal seguida de morte e latrocínio (sendo este último um crime contra o patrimônio). Ao final, é possível perceber o crescimento acelerado da violência dentro da cidade de Goiânia, bem como aqueles bairros com maior destaque criminal, e, ainda, sua correlação com as variáveis demográficas.
APA, Harvard, Vancouver, ISO, and other styles
9

Forrester, Jock Ingram. "An exploration into the use of webinjects by financial malware." Thesis, Rhodes University, 2014. http://hdl.handle.net/10962/d1012079.

Full text
Abstract:
As the number of computing devices connected to the Internet increases and the Internet itself becomes more pervasive, so does the opportunity for criminals to use these devices in cybercrimes. Supporting the increase in cybercrime is the growth and maturity of the digital underground economy with strong links to its more visible and physical counterpart. The digital underground economy provides software and related services to equip the entrepreneurial cybercriminal with the appropriate skills and required tools. Financial malware, particularly the capability for injection of code into web browsers, has become one of the more profitable cybercrime tool sets due to its versatility and adaptability when targeting clients of institutions with an online presence, both in and outside of the financial industry. There are numerous families of financial malware available for use, with perhaps the most prevalent being Zeus and SpyEye. Criminals create (or purchase) and grow botnets of computing devices infected with financial malware that has been configured to attack clients of certain websites. In the research data set there are 483 configuration files containing approximately 40 000 webinjects that were captured from various financial malware botnets between October 2010 and June 2012. They were processed and analysed to determine the methods used by criminals to defraud either the user of the computing device, or the institution of which the user is a client. The configuration files contain the injection code that is executed in the web browser to create a surrogate interface, which is then used by the criminal to interact with the user and institution in order to commit fraud. Demographics on the captured data set are presented and case studies are documented based on the various methods used to defraud and bypass financial security controls across multiple industries. The case studies cover techniques used in social engineering, bypassing security controls and automated transfers.
APA, Harvard, Vancouver, ISO, and other styles
10

Ransbotham, III Samuel B. "Acquisition and diffusion of technology innovation." Atlanta, Ga. : Georgia Institute of Technology, 2008. http://hdl.handle.net/1853/28094.

Full text
Abstract:
Thesis (M. S.)--Management, Georgia Institute of Technology, 2008.
Committee Chair: Sabyasachi Mitra; Committee Member: Frank Rothaermel; Committee Member: Sandra Slaughter; Committee Member: Sridhar Narasimhan; Committee Member: Vivek Ghosal.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Software crisis"

1

1954-, Brown William J., ed. AntiPatterns: Refactoring software, architectures, and projects in crisis. New York: Wiley, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Boogaard, Martin. Defusing the software crisis: Information systems flexibility through data independence. Amsterdam: Thesis Publishers, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Hayes, Ian. The year 2000 software crisis: The continuing challenge. Upper Saddle River, N.J: Prentice Hall, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Zykov, Sergey V. Crisis Management for Software Development and Knowledge Transfer. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-42966-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Zykov, Sergey V. IT Crisisology: Smart Crisis Management in Software Engineering. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-33-4435-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Amuta, Adakole. The software crisis: Is ISO9001/TickiT the cure?. London: University of East London, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Malveau, Raphael C. AntiPatterns: Refactoring Software, Architectures, and Projects in Crisis. New York, New York, USA: John Wiley & Sons, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

M, Ulrich William, ed. The year 2000 software crisis: The continuing challenge. Upper Saddle River, N.J: Prentice Hall PTR, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Zykov, Sergey V. Managing Software Crisis: A Smart Way to Enterprise Agility. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-77917-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Year 2000 software crisis: Solutions for IBM legacy systems. London: International Thomson Computer Press, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Software crisis"

1

Fitzgerald, Brian. "Software Crisis 2.0." In Software Technology: 10 Years of Innovation in IEEE Computer, 1–16. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2018. http://dx.doi.org/10.1002/9781119174240.ch1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Weiss, Eric A. "The Permanent Software Crisis." In A Computer Science Reader, 292–303. New York, NY: Springer New York, 1988. http://dx.doi.org/10.1007/978-1-4419-8726-6_21.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Zykov, Sergey V. "Software Patterns: Ready for Crisis Development?" In Crisis Management for Software Development and Knowledge Transfer, 69–83. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-42966-3_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Litvinov, Stanislav, and Vladimir Ivanov. "Crisis Management in Software Engineering: Behavioral Aspects." In Advances in Intelligent Systems and Computing, 177–90. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-70578-1_17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Zykov, Sergey V. "Software Engineering: The End of the Crisis?" In Crisis Management for Software Development and Knowledge Transfer, 1–26. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-42966-3_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Zykov, Sergey V. "Software Methodologies: Are Our Processes Crisis-Agile?" In Crisis Management for Software Development and Knowledge Transfer, 51–68. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-42966-3_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Albrecht, Kerstin, Christian Nitzl, and Uwe M. Borghoff. "Transdisciplinary Software Development for Early Crisis Detection." In Computer Aided Systems Theory – EUROCAST 2022, 3–10. Cham: Springer Nature Switzerland, 2022. http://dx.doi.org/10.1007/978-3-031-25312-6_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Zykov, Sergey V. "Knowledge Transfer: Manageable in Crisis?" In Crisis Management for Software Development and Knowledge Transfer, 85–118. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-42966-3_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Zykov, Sergey V. "Models and Methods of Crisis Management." In IT Crisisology: Smart Crisis Management in Software Engineering, 17–58. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-33-4435-8_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Mangold, Karlotto. "Ada95 — An approach to overcome the software crisis?" In Ada in Europe, 4–10. Berlin, Heidelberg: Springer Berlin Heidelberg, 1996. http://dx.doi.org/10.1007/bfb0015479.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Software crisis"

1

Yu, Angus G. "Software Crisis, What Software Crisis?" In 2009 International Conference on Management and Service Science (MASS). IEEE, 2009. http://dx.doi.org/10.1109/icmss.2009.5302061.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Chehrazi, Golriz. "Economic impact of software security activities in software development." In 2013 International Conference on Risks and Security of Internet and Systems (CRiSIS). IEEE, 2013. http://dx.doi.org/10.1109/crisis.2013.6766349.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Hessel, Mary. "Avoiding the software performance crisis." In the first international workshop. New York, New York, USA: ACM Press, 1998. http://dx.doi.org/10.1145/287318.287336.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Wang, Han, Chao Wu, Chunyang Chen, Burak Turhan, Shiping Chen, and Jon Whittle. "Software engineers' response to public crisis." In ICSE '22: 44th International Conference on Software Engineering. New York, NY, USA: ACM, 2022. http://dx.doi.org/10.1145/3510458.3513010.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Blahova, Marta. "Crisis Management and Its Information Software Security." In 2022 26th International Conference on Circuits, Systems, Communications and Computers (CSCC). IEEE, 2022. http://dx.doi.org/10.1109/cscc55931.2022.00032.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Allison, Mark, Cindy Zhang, and Miyako Jones. "Engineering Crisis Response Software: Lessons Learnt from a Flint Water Crisis App Platform." In 2018 IEEE Global Humanitarian Technology Conference (GHTC). IEEE, 2018. http://dx.doi.org/10.1109/ghtc.2018.8601635.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Khzam, Nadin Bou, and Gunter Mussbacher. "Domain-Specific Software Language for Crisis Management Systems." In 2018 IEEE 8th International Model-Driven Requirements Engineering Workshop (MoDRE). IEEE, 2018. http://dx.doi.org/10.1109/modre.2018.00011.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Ghani, Hamza, Jesus Luna, and Neeraj Suri. "Quantitative assessment of software vulnerabilities based on economic-driven security metrics." In 2013 International Conference on Risks and Security of Internet and Systems (CRiSIS). IEEE, 2013. http://dx.doi.org/10.1109/crisis.2013.6766361.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kadri, Hela, Simon Collart-Dutilleul, Philippe Bon, and Samir Ben Ahmed. "A Formal Approach for Multi-occurrence Crisis Management." In 13th International Conference on Software Technologies. SCITEPRESS - Science and Technology Publications, 2018. http://dx.doi.org/10.5220/0006865606070614.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Kadri, Hela, Simon Collart-Dutilleul, Philippe Bon, and Samir Ben Ahmed. "A Formal Approach for Multi-occurrence Crisis Management." In 13th International Conference on Software Technologies. SCITEPRESS - Science and Technology Publications, 2018. http://dx.doi.org/10.5220/0006865606410648.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Software crisis"

1

Bauman, D. M., and A. E. Jensen. Contracting in the Software Engineering Crisis. Fort Belvoir, VA: Defense Technical Information Center, March 1992. http://dx.doi.org/10.21236/ada250241.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Striuk, Andrii M. Software engineering: first 50 years of formation and development. [б. в.], December 2018. http://dx.doi.org/10.31812/123456789/2880.

Full text
Abstract:
The article analyzes the main stages of software engineering (SE) development. Based on the analysis of materials from the first SE conferences (1968-1969), it was determined how the software crisis prompted scientists and practitioners to join forces to form an engineering approach to programming. Differences in professional training for SE are identified. The fundamental components of the training of future software engineers are highlighted. The evolution of approaches to the design, implementation, testing and documentation of software is considered. The system scientific, technological approaches and methods for the design and construction of computer programs are highlighted. Analysis of the historical stages of the development of SE showed that despite the universal recognition of the importance of using the mathematical apparatus of logic, automata theory and linguistics when developing software, it was created empirically without its use. The factor that led practitioners to turn to the mathematical foundations of an SE is the increasing complexity of software and the inability of empirical approaches to its development and management to cope with it. The training of software engineers highlighted the problem of the rapid obsolescence of the technological content of education, the solution of which lies in its fundamentalization through the identification of the basic foundations of the industry. It is determined that mastering the basics of computer science is the foundation of vocational training in SE.
APA, Harvard, Vancouver, ISO, and other styles
3

Gurieiev, Viktor, Yulii Kutsan, Anna Iatsyshyn, Andrii Iatsyshyn, Valeriia Kovach, Evgen Lysenko, Volodymyr Artemchuk, and Oleksandr Popov. Simulating Systems for Advanced Training and Professional Development of Energy Specialists in Power Sector. [б. в.], November 2020. http://dx.doi.org/10.31812/123456789/4456.

Full text
Abstract:
The crisis of the system of professional development and personnel training in the energy sector exists not only in Ukraine but also all over the world. The article describes the concept of development and functioning of the industry system of personnel training in the energy sector of Ukraine. The importance of using modern web-oriented technologies to improve the skills of operational and dispatching personnel in the energy sector of Ukraine is substantiated. The meth- ods of distributed power system operating modes modelling are presented. De- velopment and software tools for the construction of distributed simulating sys- tems and particular features of cloud technologies application for the creation of a virtual training centers network in the energy sector, as well as the ways to automate the process of simulating scenarios development are described. The ex- perience of introducing remote training courses for energy specialists and remote web-based training simulators based on a comprehensive model of the energy system of Ukraine is presented. An important practical aspect of the research is the application of software and data support for the development of personnel key competencies in the energy sector for rapid recognition of accidents and, if necessary, accident management. This will allow them to acquire knowledge and practical skills to solve the problems of analysis, modelling, forecasting, and monitoring data visualization of large power systems operating modes.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography