{"title":"IEEE Annals of the History of Computing","authors":"","doi":"10.1109/ms.2024.3399349","DOIUrl":"https://doi.org/10.1109/ms.2024.3399349","url":null,"abstract":"","PeriodicalId":55018,"journal":{"name":"IEEE Software","volume":"3 1","pages":""},"PeriodicalIF":3.3,"publicationDate":"2024-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141946717","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IEEE Transactions on Big Data","authors":"","doi":"10.1109/ms.2024.3399348","DOIUrl":"https://doi.org/10.1109/ms.2024.3399348","url":null,"abstract":"","PeriodicalId":55018,"journal":{"name":"IEEE Software","volume":"56 1","pages":""},"PeriodicalIF":3.3,"publicationDate":"2024-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141946816","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Overload can threaten a software system’s performance and reliability due to resource exhaustion. Multiple or long-running incidents can similarly diminish an engineer’s ability to meet sustained workload demands by exhausting the adaptive capacity of human resources. In this article, we will look at the risk of saturation and coping strategies.
{"title":"Work Management Strategies to Prevent Overload","authors":"Laure Maguire","doi":"10.1109/ms.2024.3386016","DOIUrl":"https://doi.org/10.1109/ms.2024.3386016","url":null,"abstract":"Overload can threaten a software system’s performance and reliability due to resource exhaustion. Multiple or long-running incidents can similarly diminish an engineer’s ability to meet sustained workload demands by exhausting the adaptive capacity of human resources. In this article, we will look at the risk of saturation and coping strategies.","PeriodicalId":55018,"journal":{"name":"IEEE Software","volume":"16 1","pages":""},"PeriodicalIF":3.3,"publicationDate":"2024-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141530564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Juan M. Carrillo-de-Gea, Christof Ebert, Mohamed Hosni, Aurora Vizcaíno, Joaquín Nicolás, José L. Fernández-Alemán
Requirements engineering needs a good process and the right tool. Yet in many companies I observe unsuitable use of tools. Missing, wrong, and changing requirements are major failure points. Tools for requirements facilitate professional and efficient engineering throughout the lifecycle. We provide here an overview and evaluation of current requirements engineering tools. Hands-on guidance on tool selection and their usage facilitates selecting the right tool for your environment.—Christof Ebert
{"title":"Tools for Requirements Engineering","authors":"Juan M. Carrillo-de-Gea, Christof Ebert, Mohamed Hosni, Aurora Vizcaíno, Joaquín Nicolás, José L. Fernández-Alemán","doi":"10.1109/ms.2024.3385466","DOIUrl":"https://doi.org/10.1109/ms.2024.3385466","url":null,"abstract":"Requirements engineering needs a good process and the right tool. Yet in many companies I observe unsuitable use of tools. Missing, wrong, and changing requirements are major failure points. Tools for requirements facilitate professional and efficient engineering throughout the lifecycle. We provide here an overview and evaluation of current requirements engineering tools. Hands-on guidance on tool selection and their usage facilitates selecting the right tool for your environment.—Christof Ebert","PeriodicalId":55018,"journal":{"name":"IEEE Software","volume":"147 1","pages":""},"PeriodicalIF":3.3,"publicationDate":"2024-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141530561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Miroslaw Staron, Silvia Abrahão, Birgit Penzenstaler, Alexander Serebrenik
This edition of the “Practitioners’ Digest” brings you recent articles on approaches to addressing selected human and technical aspects of software development, from finding security vulnerabilities, system-level testing, to understanding the impact of personality on requirements engineering activities, published at selected software engineering conferences.
{"title":"Human Aspects and Security in Software Development","authors":"Miroslaw Staron, Silvia Abrahão, Birgit Penzenstaler, Alexander Serebrenik","doi":"10.1109/ms.2024.3385455","DOIUrl":"https://doi.org/10.1109/ms.2024.3385455","url":null,"abstract":"This edition of the “Practitioners’ Digest” brings you recent articles on approaches to addressing selected human and technical aspects of software development, from finding security vulnerabilities, system-level testing, to understanding the impact of personality on requirements engineering activities, published at selected software engineering conferences.","PeriodicalId":55018,"journal":{"name":"IEEE Software","volume":"33 1","pages":""},"PeriodicalIF":3.3,"publicationDate":"2024-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141530563","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}