A decade of agile methodologies
Ever since the agile manifesto was created in 2001, the research community has devoted a great deal of attention to agile software development. This article examines publications and citations to illustrate how the research on agile has progressed in ...
Coordination in co-located agile software development projects
Agile software development provides a way to organise the complex task of multi-participant software development while accommodating constant project change. Agile software development is well accepted in the practitioner community but there is little ...
Obstacles to decision making in Agile software development teams
Highlights We conducted focus group with 43 Agile developers and managers. We conducted 6 case studies with 33 interviews across 5 organizations. Results indicate 6 decision obstacles Agile software development teams face. Decision obstacles were mapped ...
Understanding post-adoptive agile usage
While past research has contributed to the understanding of how organizations adopt agile methodologies (AM), little is known about their post-adoptive usage in organizations. By integrating theories from systems development methodologies, diffusion of ...
Reconciling perspectives
Highlights A grounded theory of how people manage the process of software development. Perspectives mismatches between individuals and groups impede the process. Reconciling Perspectives is a four-stage process for removing impediments. Early stages ...
"Leagile" software development
In recent years there has been a noticeable shift in attention from those who use agile software development toward lean software development, often labelled as a shift "from agile to lean". However, the reality may not be as simple or linear as this ...
Automatic test case selection for regression testing of composite service based on extensible BPEL flow graph
Highlights We propose a flow graph to model BPEL-based composite service. XBFG path is introduced and analyzed for test case selection. A new classification for service modification is discussed. Five different versions of a running example are ...
Efficient (n, t, n) secret sharing schemes
Highlights We propose an efficient (n, t, n)-VSS. We propose a (n, t, n)-MSS. We propose a (n, t, n)-VMSS. All our (n, t, n) SS are unconditionally secure. Recently, Harn and Lin introduced a notion of strong t-consistency of a (t, n) secret sharing ...
An improved swarm optimized functional link artificial neural network (ISO-FLANN) for classification
Highlights A novel HONs for classification task of data mining. A novel improved PSO for training FLANN (ISO-FLANN). A new complex medical domain dataset is introduced for validating the method. Multilayer perceptron (MLP) (trained with back propagation ...
Mining frequent patterns from dynamic data streams with data load management
Highlights We propose a count-approximation method for data-stream frequent-itemset mining. One mechanism to accelerate the processing rate is devised for overload handling. Another mechanism to shed the exceeding data is also designed for overload ...
Sharetouch
Highlights Sharetouch system is designed for raising users' participation in community events. Sharetouch projects users into fishes in order to encourage users to make more friends to increase the number of fishes. Sharetouch combines virtual images ...
A family of case studies on business process mining using MARBLE
Highlights Business processes, most of which are automated by information systems, have become a key asset in organizations. During software modernization, ageing systems cannot be entirely discarded because they gradually embed meaningful business ...
Quasi-static fault-tolerant scheduling schemes for energy-efficient hard real-time systems
Highlights Quasi-static fault-tolerance task scheduling algorithms consisting of offline components and online components are proposed. The algorithms are based on a fault model that considers the effect of DVS on transient fault rate. The design of ...
Comparison of scheduling schemes for on-demand IaaS requests
Highlights We investigate the interaction aspects between on-demand requests and the allocation of virtual machines in a server farm operated by a specific infrastructure owner. We compare scheduling algorithms from the aspect of the average energy ...
Strongly secure certificateless short signatures
Highlights We introduce a new efficient and secure short certificateless signature scheme. It is strongly unforgeable. The security is based on the CDH assumption. The proposed scheme is provably secure against a relatively stronger adversary. Short ...
A symbolic analysis framework for static analysis of imperative programming languages
Highlights We present a generic symbolic analysis framework for imperative programming languages. Our framework computes all valid variable bindings at a given program point. Variable bindings are kept in an algebraic structure called supercontext. Path ...
Goal alignment in process improvement
Highlights We evaluate the impact of process assessment on the success of process improvement. Focus on aligning process goals to organisation's business goals in process improvement. Data from 63 IT organisations conducting process improvements were ...