Sciweavers

141 search results - page 14 / 29
» Construction by Configuration: Challenges for Software Engin...
Sort
View
CCS
2010
ACM
13 years 4 months ago
Practical leakage-resilient pseudorandom generators
Cryptographic systems and protocols are the core of many Internet security procedures (such as SSL, SSH, IPSEC, DNSSEC, secure mail, etc.). At the heart of all cryptographic funct...
Yu Yu, François-Xavier Standaert, Olivier P...
TASE
2007
IEEE
14 years 1 months ago
Automating Language Evolution
The design and implementation of complex software systems ly spans multiple levels of abstractions. The concepts of el of abstractions and their interplay are represented by forma...
Markus Pizka, Elmar Jürgens
ESWA
2006
96views more  ESWA 2006»
13 years 7 months ago
Identifying requirements for communication support: A maturity grid-inspired approach
Communication is a critical success factor in design. It can be seen as the social and cognitive process by which information is selected, messages are exchanged between interacti...
Anja M. Maier, Claudia M. Eckert, P. John Clarkson
HICSS
2003
IEEE
164views Biometrics» more  HICSS 2003»
14 years 24 days ago
From Computer Networks to Agent Networks
From the 1990s on, one of the most important challenges facing computer science researchers has been the design and construction of software tools to exploit Internet computing. A...
Guoqiang Zhong, Kenichi Takahashi, Satoshi Amamiya...
ICSE
2005
IEEE-ACM
14 years 7 months ago
Tool support for just-in-time architecture reconstruction and evaluation: an experience report
The need for software architecture evaluation has drawn considerable attention in recent years. In practice, this is a challenging exercise for two main reasons. First, in deploye...
Ian Gorton, Liming Zhu