Sciweavers

270 search results - page 5 / 54
» Building Software Securely from the Ground Up
Sort
View
ACMSE
2004
ACM
15 years 8 months ago
Methods for the prevention, detection and removal of software security vulnerabilities
Over the past decade, the need to build secure software has become a dominant goal in software development. Consequently, software researchers and practitioners have identified wa...
Jay-Evan J. Tevis, John A. Hamilton Jr.
SEW
2007
IEEE
15 years 11 months ago
A Generative Approach to Building a Framework for Hard Real-Time Applications
The communication and tasking infrastructure of a realtime application makes up a significant portion of any embedded control system. Traditionally, the tasking and communication...
Irfan Hamid, Elie Najm, Jérôme Hugues
AGENTS
2000
Springer
15 years 9 months ago
Open Source, Standards and Scaleable Agencies
Numerous agencies and agent systems are being developed or portrayed as vehicles to deliver novel types of e-commerce services to users. However service agents in one agency are p...
Stefan Poslad, Phil Buckle, Rob Hadingham
AGILEDC
2003
IEEE
15 years 10 months ago
It's More than Just Toys and Food: Leading Agile Development in an Enterprise-Class Start-Up
One of the myths of Agile Development is that selforganizing teams do not need direction. The agile development movement focuses primarily on programmers – programmers should do...
Joseph A. Blotner
144
Voted
MOBISYS
2005
ACM
16 years 4 months ago
Shake them up!: a movement-based pairing protocol for CPU-constrained devices
This paper presents a new pairing protocol that allows two CPU-constrained wireless devices Alice and Bob to establish a shared secret at a very low cost. To our knowledge, this i...
Claude Castelluccia, Pars Mutaf