Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Industry practices and challenges for the evolvability assurance of microservices: An interview study and systematic grey literature review
J Bogner, J Fritzsch, S Wagner… - Empirical Software …, 2021 - Springer
Context Microservices as a lightweight and decentralized architectural style with fine-
grained services promise several beneficial characteristics for sustainable long-term …
grained services promise several beneficial characteristics for sustainable long-term …
A maturity model for assessing the digital readiness of manufacturing companies
A De Carolis, M Macchi, E Negri, S Terzi - … 3-7, 2017, Proceedings, Part I, 2017 - Springer
Abstract “The most profound technologies are those that disappear… They weave
themselves into the fabric of everyday life until they are indistinguishable from it” wrote …
themselves into the fabric of everyday life until they are indistinguishable from it” wrote …
Security assurance model of software development for global software development vendors
RA Khan, SU Khan, M Alzahrani, M Ilyas - Ieee Access, 2022 - ieeexplore.ieee.org
The number of security attacks and the impact has grown considerably in the recent several
years. As a result, new emerging software development models are required that assist in …
years. As a result, new emerging software development models are required that assist in …
[ספר][B] Understanding maturity models. Results of a structured content analysis
M Kohlegger, R Maier, S Thalmann - 2009 - Citeseer
Maturity models are popular instruments used, eg, to rate capabilities of maturing elements
and select appropriate actions to take the elements to a higher level of maturity. Their …
and select appropriate actions to take the elements to a higher level of maturity. Their …
Incremental semi-supervised clustering ensemble for high dimensional data clustering
Traditional cluster ensemble approaches have three limitations:() They do not make use of
prior knowledge of the datasets given by experts.() Most of the conventional cluster …
prior knowledge of the datasets given by experts.() Most of the conventional cluster …
[HTML][HTML] Integrating development and operations teams: A control approach for DevOps
A Wiedemann, M Wiesche, H Gewald… - Information and …, 2023 - Elsevier
Abstract Information systems (IS) literature has predominantly studied IS project control with
a focus on software development projects. However, by virtue of digital transformation, an …
a focus on software development projects. However, by virtue of digital transformation, an …
Software evolution and maintenance
V Rajlich - Future of Software Engineering Proceedings, 2014 - dl.acm.org
Successful software requires constant change that is triggered by evolving requirements,
technologies, and stakeholder knowledge. This constant change constitutes software …
technologies, and stakeholder knowledge. This constant change constitutes software …
Readiness and maturity models for Industry 4.0: A systematic literature review
H Ünlü, O Demirörs, V Garousi - Journal of Software: Evolution …, 2024 - Wiley Online Library
Industry 4.0 changes traditional manufacturing relationships from isolated optimized cells to
fully integrated data and product flows across borders with its technological pillars. However …
fully integrated data and product flows across borders with its technological pillars. However …
Security risks of global software development life cycle: Industry practitioner's perspective
Software security has become increasingly important because the malicious attack and
other hacker risks of a computer system have grown popularity in the last few years. As a …
other hacker risks of a computer system have grown popularity in the last few years. As a …
A maturity model for secure software design: a multivocal study
H Al-Matouq, S Mahmood, M Alshayeb, M Niazi - IEEE Access, 2020 - ieeexplore.ieee.org
Security is one of the most important software quality attributes. Software security is about
designing and develo** secure software that does not allow the integrity, confidentiality …
designing and develo** secure software that does not allow the integrity, confidentiality …