Learn More
This paper aims at identifying some of the key factors in adopting an organization-wide software reuse program. The factors are derived from practical experience reported by industry professionals, through a survey involving 57 Brazilian small, medium and large software organizations. Some of them produce software with commonality between applications, and(More)
Nowadays software systems are essential to the environment of most organizations, and their maintenance is a key point to support business dynamics. Thus, reverse engineering legacy systems for knowledge reuse has become a major concern in software industry. This article, based on a survey about reverse engineering tools, discusses a set of functional and(More)
Content sharing services have become immensel popular on the Web. More than 1 billion people use this kind o services to communicate with friends and exchange all sorts o information. In this new context, privacy guarantees are essential guarantees about the potential release of data to unintended recipients and the use of user data by the service provider(More)
Government concerns about transparency date from 1957, but current technological advances and real-time worldwide communications hold great promise to transform accountability, transparency, citizen participation and collaboration, in addition to offering better public services, by increasing efficiency and effectiveness and decreasing corruption in(More)
Technological advances and real-time worldwide communications hold great promise for transforming the efficiency and effectiveness of public services through the ease of publishing and access to government public information or through the offer of new kinds of services. In this paper, we describe two initiatives, <i>Rio Inteligente</i> (Smart Rio) and(More)
Software maintenance tasks are the most expensive activities on legacy systems life cycle, and system understanding is the most important factor of this cost. Thus, in order to aid legacy knowledge retrieval and reuse, this paper presents LIFT: a Legacy InFormation retrieval Tool, discussing since its initial requirements until its preliminary experience in(More)
The aim of this paper is to present a taxonomy for security threats on the Web ecosystem. We proposes a classification model based on 21 vectors divided into 8 distinct security threats, making use of levels of abstraction and criteria for discrimination which consider propagation and similarity in vulnerabilities. We also propose to estimate the risk(More)
The use of Government Open Data to deliver services and promote transparency is a current goal of many governments. In this paper, we briefly describe two contest winner applications with focus on these goals, and present a discussion about the difficulties of integrating Government Open Data to develop them.