Sciweavers

203 search results - page 12 / 41
» A Secure PLAN
Sort
View
ECBS
2009
IEEE
119views Hardware» more  ECBS 2009»
14 years 2 months ago
Software Architectural Design Meets Security Engineering
Security requirements strongly influence the architectural design of complex IT systems in a similar way as other non-functional requirements. Both security engineering as well a...
Stephan Bode, Anja Fischer, Winfried E. Kühnh...
WWW
2008
ACM
14 years 8 months ago
Web people search: results of the first evaluation and the plan for the second
This paper presents the motivation, resources and results for the first Web People Search task, which was organized as part of the SemEval-2007 evaluation exercise. Also, we will ...
Javier Artiles, Satoshi Sekine, Julio Gonzalo
OOPSLA
2009
Springer
14 years 2 months ago
Towards automation of iteration planning
Iterations are time-boxed periods with an intended outcome that is often a set of implemented requirements. Iterations are part of most common software development lifecycle model...
Jonas Helming, Maximilian Koegel, Zardosht Hodaie
VTC
2010
IEEE
114views Communications» more  VTC 2010»
13 years 5 months ago
A Secure Multi-Application Platform for Vehicle Telematics
Contemporary vehicles offer an advanced telematics platform with multiple applications available such as electronic road tolling, emergency call, breakdown call, or route planning....
Jef Maerien, Sam Michiels, Stefan Van Baelen, Chri...
SIGCOMM
2010
ACM
13 years 7 months ago
Cloudward bound: planning for beneficial migration of enterprise applications to the cloud
In this paper, we tackle challenges in migrating enterprise services into hybrid cloud-based deployments, where enterprise operations are partly hosted on-premise and partly in th...
Mohammad Y. Hajjat, Xin Sun, Yu-Wei Eric Sung, Dav...