Sciweavers

757 search results - page 34 / 152
» Composing Security-Aware Software
Sort
View
114
Voted
GCC
2004
Springer
15 years 8 months ago
A Software Engineering Perspective for Services Security
Services are usually developed and deployed independently; and systems can be formed by composing relevant services to achieve set goals. In such an open and dynamic environment, s...
Jun Han
SPAA
2010
ACM
15 years 7 months ago
Lightweight, robust adaptivity for software transactional memory
When a program uses Software Transactional Memory (STM) to synchronize accesses to shared memory, the performance often depends on which STM implementation is used. Implementation...
Michael F. Spear
105
Voted
IASTEDSEA
2004
15 years 3 months ago
Towards flexible software processes by using process patterns
Process patterns allow the modular modelling and adaptable application of software processes. Present descriptions of process patterns show defects like non-uniform and unequivoca...
Mariele Hagen, Volker Gruhn
SIGUCCS
2004
ACM
15 years 8 months ago
Spam software evaluation, training, and support: fighting back to reclaim the email inbox
This paper explains two projects dealing with spam recently completed at Iowa State University (ISU). The first project was undertaken by a team composed of members of the campus ...
Jeff Balvanz, Don Paulsen, Joe Struss
149
Voted
USENIX
2004
15 years 3 months ago
EmStar: A Software Environment for Developing and Deploying Wireless Sensor Networks
Many Wireless Sensor Network (WSN) applications are composed of a mixture of deployed devices with varying capabilities, from extremely constrained 8-bit "Motes" to less...
Lewis Girod, Jeremy Elson, Alberto Cerpa, Thanos S...