Sciweavers

4752 search results - page 827 / 951
» Dependability in Web Software
Sort
View
UML
2005
Springer
14 years 3 months ago
Exceptional Use Cases
Many exceptional situations arise during the execution of an application. When developing dependable software, the first step is to foresee these exceptional situations and docume...
Aaron Shui, Sadaf Mustafiz, Jörg Kienzle, Chr...
CC
2004
Springer
14 years 3 months ago
Using Multiple Memory Access Instructions for Reducing Code Size
An important issue in embedded systems design is the size of programs. As computing devices decrease in size, yet with more and more functions, better code size optimizations are i...
Neil Johnson, Alan Mycroft
EMISA
2004
Springer
14 years 3 months ago
A Virtual Laboratory for IT Security Education
Abstract: Success of IT security not only depends on the evolution of technologies, but also relies on the knowledge of IT-Personnel and the level of their IT-security education. I...
Ji Hu, Dirk Cordel, Christoph Meinel
ESAW
2004
Springer
14 years 3 months ago
Managing Conflicts Between Individuals and Societies in Multi-agent Systems
The development of multi-agent systems (MAS) implies considering both the social and individual levels of these systems. However, the elements in these levels are not necessarily c...
Rubén Fuentes, Jorge J. Gómez-Sanz, ...
FC
2004
Springer
88views Cryptology» more  FC 2004»
14 years 3 months ago
Mental Models of Computer Security
Improved computer security requires improvements in risk communication to naive end users. Efficacy of risk communication depends not only on the nature of the risk, but also on t...
L. Jean Camp