Sciweavers

591 search results - page 48 / 119
» An Environment for Conducting Families of Software Engineeri...
Sort
View
SAC
2010
ACM
14 years 3 months ago
Botzilla: detecting the "phoning home" of malicious software
Hosts infected with malicious software, so called malware, are ubiquitous in today’s computer networks. The means whereby malware can infiltrate a network are manifold and rang...
Konrad Rieck, Guido Schwenk, Tobias Limmer, Thorst...
ACSAC
2002
IEEE
14 years 1 months ago
Protecting Data from Malicious Software
Corruption or disclosure of sensitive user documents can be among the most lasting and costly effects of malicious software attacks. Many malicious programs specifically target fi...
Matthew Schmid, Frank Hill, Anup K. Ghosh
AGILEDC
2005
IEEE
14 years 2 months ago
Staying Agile in Government Software Projects
Can government software projects be agile? What do Scrum and XP practices have to offer in this regulated and highly political environment? In this experience report, I will discu...
Barg Upender
SIGUCCS
1998
ACM
14 years 1 months ago
The ResNet Obstacle Course
There are many ways to train student employees, but hands-on experience is invaluable. To provide our Resident Computer Consultants (RCCs) with the experience they need to solve t...
Kathleen A. Hausmann
ICSE
1997
IEEE-ACM
14 years 1 months ago
Reuse of Off-the-Shelf Components in C2-Style Architectures
-- Reuse of large-grain software components offers the potential for significant savings in application development cost and time. Successful component reuse and substitutability ...
Nenad Medvidovic, Peyman Oreizy, Richard N. Taylor