Gotowa bibliografia na temat „Defective software”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Spis treści
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Defective software”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "Defective software"
Lloyd, I. "Liability for defective software". Reliability Engineering & System Safety 32, nr 1-2 (styczeń 1991): 193–207. http://dx.doi.org/10.1016/0951-8320(91)90054-b.
Pełny tekst źródłaGuzdial, Mark, i Bertrand Meyer. "Understanding CS1 students; defective software". Communications of the ACM 55, nr 1 (styczeń 2012): 14–15. http://dx.doi.org/10.1145/2063176.2063180.
Pełny tekst źródłaHedley, Steve. "Defective Software in the Court of Appeal". Cambridge Law Journal 56, nr 1 (marzec 1997): 21–25. http://dx.doi.org/10.1017/s000819730001761x.
Pełny tekst źródłaParry, Rex. "Who bears the risk of defective software?" Computer Audit Update 1996, nr 12 (grudzień 1996): 27–29. http://dx.doi.org/10.1016/s0960-2593(97)80803-8.
Pełny tekst źródłaRakitin, S. R. "Coping with Defective Software in Medical Devices". Computer 39, nr 4 (kwiecień 2006): 40–45. http://dx.doi.org/10.1109/mc.2006.123.
Pełny tekst źródłaWan, Hongyan, Guoqing Wu, Mali Yu i Mengting Yuan. "Software Defect Prediction Based on Cost-Sensitive Dictionary Learning". International Journal of Software Engineering and Knowledge Engineering 29, nr 09 (wrzesień 2019): 1219–43. http://dx.doi.org/10.1142/s0218194019500384.
Pełny tekst źródłaTomar, Divya, i Sonali Agarwal. "Prediction of Defective Software Modules Using Class Imbalance Learning". Applied Computational Intelligence and Soft Computing 2016 (2016): 1–12. http://dx.doi.org/10.1155/2016/7658207.
Pełny tekst źródłaHuhryanskaya, E., i M. Surikova. "Mathematical software for automation systems of defective whips bucking". Актуальные направления научных исследований XXI века: теория и практика 3, nr 2 (3.05.2015): 364–68. http://dx.doi.org/10.12737/11115.
Pełny tekst źródłaMehrez, Ahmed. "Reassessing Software Quality Performance". International Journal of Knowledge Management 10, nr 1 (styczeń 2014): 58–77. http://dx.doi.org/10.4018/ijkm.2014010104.
Pełny tekst źródłaMishra, Bharavi, i K. K. Shukla. "Mining Attributes Patterns of Defective Modules for Object Oriented Software". International Journal of Computer Applications 54, nr 11 (25.09.2012): 14–18. http://dx.doi.org/10.5120/8610-2462.
Pełny tekst źródłaRozprawy doktorskie na temat "Defective software"
Marshall, Andrew. "Liability for Defective Software in South Africa". Master's thesis, University of Cape Town, 2014. http://hdl.handle.net/11427/4663.
Pełny tekst źródłaVandehei, Bailey R. "Leveraging Defects Life-Cycle for Labeling Defective Classes". DigitalCommons@CalPoly, 2019. https://digitalcommons.calpoly.edu/theses/2111.
Pełny tekst źródłaPowell, Daniel, i n/a. "Formal Methods For Verification Based Software Inspection". Griffith University. School of Computing and Information Technology, 2003. http://www4.gu.edu.au:8080/adt-root/public/adt-QGU20030925.154706.
Pełny tekst źródłaPowell, Daniel. "Formal Methods For Verification Based Software Inspection". Thesis, Griffith University, 2003. http://hdl.handle.net/10072/366466.
Pełny tekst źródłaThesis (PhD Doctorate)
Doctor of Philosophy (PhD)
School of Computing and Information Technology
Full Text
Al-Agealy, Talal Ali Kadhim. "Computer software packages and factor analysis to deal with defective and incomplete demographic data". Thesis, City University London, 1989. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.346423.
Pełny tekst źródłaKsiążki na temat "Defective software"
Girot, Clarisse. User protection in IT contracts: A comparative study of the protection of the user against defective performance in information technology. Boston: Kluwer Law International, 2001.
Znajdź pełny tekst źródłaLloyd, Ian J. 24. Contractual liability for defective software. Oxford University Press, 2017. http://dx.doi.org/10.1093/he/9780198787556.003.0024.
Pełny tekst źródłaGirot, Clarisse. User Protection in IT Contracts: A Comparative Study of the Protection of the User Against Defective Performance in Information Technology. Kluwer Law International, 2002.
Znajdź pełny tekst źródłaContract pricing: Subcontractor defective pricing audits : fact sheet for the Chairman, Committee on Governmental Affairs, U.S. Senate. Washington, D.C: The Office, 1991.
Znajdź pełny tekst źródłaCzęści książek na temat "Defective software"
Nascimento, Alexandre Moreira, Vinícius Veloso de Melo, Luiz Alberto Vieira Dias i Adilson Marques da Cunha. "Increasing the Prediction Quality of Software Defective Modules with Automatic Feature Engineering". W Advances in Intelligent Systems and Computing, 527–35. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-77028-4_68.
Pełny tekst źródłaMartono, Niken Prasasti, Katsutoshi Kanamori i Hayato Ohwada. "Utilizing Customers’ Purchase and Contract Renewal Details to Predict Defection in the Cloud Software Industry". W Lecture Notes in Computer Science, 138–49. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-13332-4_12.
Pełny tekst źródłaPrasasti, Niken, Masato Okada, Katsutoshi Kanamori i Hayato Ohwada. "Customer Lifetime Value and Defection Possibility Prediction Model Using Machine Learning: An Application to a Cloud-Based Software Company". W Intelligent Information and Database Systems, 62–71. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-05458-2_7.
Pełny tekst źródłaLloyd, Ian J. "24. Contractual liability for defective software". W Information Technology Law, 469–502. Oxford University Press, 2014. http://dx.doi.org/10.1093/he/9780198702320.003.0024.
Pełny tekst źródła"Influence research on file of software defective testing configuration". W Civil, Architecture and Environmental Engineering, 1341–46. CRC Press, 2017. http://dx.doi.org/10.1201/9781315226187-247.
Pełny tekst źródłaSalzman, Harold, i Stephen R. Rosenthal. "Keeping the Customer Satisfied: Field Service and the Art of Automation". W Software by Design. Oxford University Press, 1994. http://dx.doi.org/10.1093/oso/9780195083408.003.0011.
Pełny tekst źródłaVossler, Colleen Kotyk, i Jeffrey Voas. "Defective software: An overview of legal remedies and technical measures available to consumers". W Advances in Computers, 451–97. Elsevier, 2000. http://dx.doi.org/10.1016/s0065-2458(00)80010-8.
Pełny tekst źródłaPanda, Mrutyunjaya, i Ahmad Taher Azar. "Hybrid Multi-Objective Grey Wolf Search Optimizer and Machine Learning Approach for Software Bug Prediction". W Advances in Systems Analysis, Software Engineering, and High Performance Computing, 314–37. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-5788-4.ch013.
Pełny tekst źródłaRao, K. Nitalaksheswara. "Improved Hybrid Sampling Strategy for Software Defect Prediction of Imbalanced Data Distribution". W Advances in Systems Analysis, Software Engineering, and High Performance Computing, 215–36. IGI Global, 2022. http://dx.doi.org/10.4018/978-1-6684-4225-8.ch013.
Pełny tekst źródłaSprague, Robert D. "Liability for System and Data Quality". W Social, Ethical and Policy Implications of Information Technology, 183–203. IGI Global, 2004. http://dx.doi.org/10.4018/978-1-59140-168-1.ch011.
Pełny tekst źródłaStreszczenia konferencji na temat "Defective software"
Blanks, Michael. "Why we tolerate defective software". W the 22nd annual ACM computer science conference. New York, New York, USA: ACM Press, 1994. http://dx.doi.org/10.1145/197530.197636.
Pełny tekst źródłaZhang, Hongyu, Xiuzhen Zhang i Ming Gu. "Predicting Defective Software Components from Code Complexity Measures". W 13th Pacific Rim International Symposium on Dependable Computing (PRDC 2007). IEEE, 2007. http://dx.doi.org/10.1109/prdc.2007.28.
Pełny tekst źródłaGozuacik, Necip, i ve Altan Parlak. "A Virtual Assistant for Predicting Defective Software Module". W 2021 29th Signal Processing and Communications Applications Conference (SIU). IEEE, 2021. http://dx.doi.org/10.1109/siu53274.2021.9477786.
Pełny tekst źródła"Using Models to Assess Impact of Defective Software". W 9th International Workshop on Modelling, Simulation, Verification and Validation of Enterprise Information Systems. SciTePress - Science and and Technology Publications, 2011. http://dx.doi.org/10.5220/0003596000710077.
Pełny tekst źródłaIbrahim, A. Al, C. Chauviere i P. Bonnet. "Software Correction of Defective Lossy Transmission Line Networks". W 2019 PhotonIcs & Electromagnetics Research Symposium - Spring (PIERS-Spring). IEEE, 2019. http://dx.doi.org/10.1109/piers-spring46901.2019.9017375.
Pełny tekst źródłaYu, Yangxin, i Liuyang Wang. "Influence research on file of software defective testing configuration". W Proceedings of the International Conference on Civil, Architecture and Environmental Engineering (ICCAE2016). CRC Press/Balkema P.O. Box 11320, 2301 EH Leiden, The Netherlands: CRC Press/Balkema, 2017. http://dx.doi.org/10.1201/9781315116242-49.
Pełny tekst źródłaRahman, Akond. "Characteristics of defective infrastructure as code scripts in DevOps". W ICSE '18: 40th International Conference on Software Engineering. New York, NY, USA: ACM, 2018. http://dx.doi.org/10.1145/3183440.3183452.
Pełny tekst źródłaPetrić, Jean, Tracy Hall i David Bowes. "How Effectively Is Defective Code Actually Tested?" W PROMISE'18: The 14th International Conference on Predictive Models and Data Analytics in Software Engineering. New York, NY, USA: ACM, 2018. http://dx.doi.org/10.1145/3273934.3273939.
Pełny tekst źródłaRahman, Akond, i Laurie Williams. "Characterizing Defective Configuration Scripts Used for Continuous Deployment". W 2018 IEEE 11th International Conference on Software Testing, Verification and Validation (ICST). IEEE, 2018. http://dx.doi.org/10.1109/icst.2018.00014.
Pełny tekst źródłaAn, Do Gyu, Jung Won Jung i Jae Wook Jeon. "Defective Fiducial Mark Detection Using Machine Learning". W 2018 19th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD). IEEE, 2018. http://dx.doi.org/10.1109/snpd.2018.8441132.
Pełny tekst źródła