Sciweavers

4350 search results - page 776 / 870
» Case studies for contract-based systems
Sort
View
ICSE
2008
IEEE-ACM
14 years 8 months ago
Security metrics for source code structures
Software security metrics are measurements to assess security related imperfections (or perfections) introduced during software development. A number of security metrics have been...
Istehad Chowdhury, Brian Chan, Mohammad Zulkernine
HICSS
2010
IEEE
161views Biometrics» more  HICSS 2010»
14 years 3 months ago
Climate Conscious Relations in a Digital Urban Setting
The climate change has challenged urban living: As an omnipresent force nature sets the agenda for urban life. Using stakeholder theory for conceptualizing urban life, we install ...
Anne Ellerup Nielsen, Sophie Esmann Andersen
MFCS
2009
Springer
14 years 3 months ago
Stochastic Games with Finitary Objectives
Abstract. The synthesis of a reactive system with respect to an ωregular specification requires the solution of a graph game. Such games have been extended in two natural ways. F...
Krishnendu Chatterjee, Thomas A. Henzinger, Floria...
ACSAC
2008
IEEE
14 years 3 months ago
PinUP: Pinning User Files to Known Applications
Users commonly download, patch, and use applications such as email clients, office applications, and media-players from the Internet. Such applications are run with the user’s ...
William Enck, Patrick Drew McDaniel, Trent Jaeger
EDOC
2008
IEEE
14 years 3 months ago
MDD4SOA: Model-Driven Service Orchestration
Service-Oriented Architectures (SOAs) have become an important cornerstone of the development of enterprise-scale software applications. Although a range of domain-specific langua...
Philip Mayer, Andreas Schroeder, Nora Koch