Sciweavers

4350 search results - page 776 / 870
» Case studies for contract-based systems
Sort
View
113
Voted
ICSE
2008
IEEE-ACM
16 years 3 months ago
Security metrics for source code structures
Software security metrics are measurements to assess security related imperfections (or perfections) introduced during software development. A number of security metrics have been...
Istehad Chowdhury, Brian Chan, Mohammad Zulkernine
HICSS
2010
IEEE
161views Biometrics» more  HICSS 2010»
15 years 10 months ago
Climate Conscious Relations in a Digital Urban Setting
The climate change has challenged urban living: As an omnipresent force nature sets the agenda for urban life. Using stakeholder theory for conceptualizing urban life, we install ...
Anne Ellerup Nielsen, Sophie Esmann Andersen
MFCS
2009
Springer
15 years 10 months ago
Stochastic Games with Finitary Objectives
Abstract. The synthesis of a reactive system with respect to an ωregular specification requires the solution of a graph game. Such games have been extended in two natural ways. F...
Krishnendu Chatterjee, Thomas A. Henzinger, Floria...
134
Voted
ACSAC
2008
IEEE
15 years 10 months ago
PinUP: Pinning User Files to Known Applications
Users commonly download, patch, and use applications such as email clients, office applications, and media-players from the Internet. Such applications are run with the user’s ...
William Enck, Patrick Drew McDaniel, Trent Jaeger
126
Voted
EDOC
2008
IEEE
15 years 10 months ago
MDD4SOA: Model-Driven Service Orchestration
Service-Oriented Architectures (SOAs) have become an important cornerstone of the development of enterprise-scale software applications. Although a range of domain-specific langua...
Philip Mayer, Andreas Schroeder, Nora Koch