Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
  Browse All Reviews > Software (D) > Software Engineering (D.2)  
  Software Engineering (D.2) See Reviews  
General (552)
Requirements/Specifications (6)
Design Tools and Techniques (10)
Coding Tools and Techniques (186)
Software/Program Verification (407)
Testing And Debugging (6)
Programming Environments (13)
Distribution, Maintenance, and Enhancement (220)
Metrics (280)
Management (560)
Design (191)
Software Architectures (323)
Interoperability (71)
Reusable Software (111)
Miscellaneous (93)
Reviews limited to:

Reviews in category "Software Engineering (D.2)":
APE: an annotation language and middleware for energy-efficient mobile application development
Nikzad N., Chipara O., Griswold W.  ICSE 2014 (Proceedings of the 36th International Conference on Software Engineering, Hyderabad, India,  May 31-Jun 7, 2014) 515-526, 2014. Type: Proceedings
On integrating confidentiality and functionality in a formal method
Banks M., Jacob J.  Formal Aspects of Computing 26(5): 963-992, 2014. Type: Article
Formal specification level: concepts, methods, and algorithms
Soeken M., Drechsler R.,  Springer Publishing Company, Incorporated, Cham, Switzerland, 2015. 138 pp. Type: Book (978-3-319086-98-9)
Exercises in programming style
Lopes C.,  Chapman & Hall/CRC, Boca Raton, FL, 2014. 304 pp. Type: Book (978-1-482227-37-6), Reviews: (3 of 3)
Security testing methodology for vulnerabilities detection of XSS in web services and WS-Security
Salas M., Martins E.  Electronic Notes in Theoretical Computer Science (ENTCS) 302133-154, 2014. Type: Article

Related Topics

Software Engineering
  - Software Management

  - Hardware/Software Protection

  - Formal Definitions And Theory

Software/Program Verification
  - Specifying And Verifying And Reasoning About Programs

  - Performance

  - System Management
  - Software Management
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2015 ThinkLoud, Inc.
Terms of Use
| Privacy Policy