Sciweavers

15779 search results - page 2892 / 3156
» Change-oriented software engineering
Sort
View
CCS
2007
ACM
15 years 8 months ago
Improving vulnerability discovery models
Security researchers are applying software reliability models to vulnerability data, in an attempt to model the vulnerability discovery process. I show that most current work on t...
Andy Ozment
112
Voted
EMSOFT
2007
Springer
15 years 8 months ago
Buffer optimization and dispatching scheme for embedded systems with behavioral transparency
Software components are modular and can enable post-deployment update, but their high overhead in runtime and memory is prohibitive for many embedded systems. This paper proposes ...
Jiwon Hahn, Pai H. Chou
144
Voted
IFIP
2007
Springer
15 years 8 months ago
Capable Leader and Skilled and Motivated Team Practices to Introduce eXtreme Programming
Abstract. Applying changes to software engineering processes in organisations usually raises many problems of varying nature. Basing on a real-world 2-year project and a simultaneo...
Lech Madeyski, Wojciech Biela
132
Voted
LADC
2007
Springer
15 years 8 months ago
Security Patterns and Secure Systems Design
Analysis and design patterns are well established as a convenient and reusable way to build high-quality object-oriented software. Patterns combine experience and good practices t...
Eduardo B. Fernández
129
Voted
LCTRTS
2007
Springer
15 years 8 months ago
External memory page remapping for embedded multimedia systems
As memory speeds and bus capacitances continue to rise, external memory bus power will make up an increasing portion of the total system power budget for system-on-a-chip embedded...
Ke Ning, David R. Kaeli
« Prev « First page 2892 / 3156 Last » Next »