Sciweavers

568 search results - page 45 / 114
» Enforcing traceability in software
Sort
View
HICSS
2006
IEEE
120views Biometrics» more  HICSS 2006»
14 years 4 months ago
Reconciling the Irreconcilable? A Software Development Approach that Combines Agile with Formal
Unstable software requirements are common and call for Agile practices. On the other hand, quality standards and recommendations, to which companies must adhere to play in selecte...
José Gonçalo A. Oliveira Basto da Si...
CORR
2010
Springer
110views Education» more  CORR 2010»
13 years 10 months ago
Advanced Software Protection Now
We introduce a novel software-protection method, which can be fully implemented with today's technologies, that provides traitor tracing and license-enforcement functionalitie...
Diego Bendersky, Ariel Futoransky, Luciano Notarfr...
VMCAI
2010
Springer
14 years 7 months ago
Model-Checking In-Lined Reference Monitors
Abstract. A technique for elegantly expressing In-lined Reference Monitor (IRM) certification as model-checking is presented and implemented. In-lined Reference Monitors (IRM'...
Meera Sridhar, Kevin W. Hamlen
PAMI
2012
12 years 13 days ago
Altered Fingerprints: Analysis and Detection
—The widespread deployment of Automated Fingerprint Identification Systems (AFIS) in law enforcement and border control applications has heightened the need for ensuring that the...
Soweon Yoon, Jianjiang Feng, Anil K. Jain
EDO
2000
Springer
14 years 1 months ago
Architectural Reflection: Realising Software Architectures via Reflective Activities
Architectural reflection is the computation performed by a software system about its own software architecture. Building on previous research and on practical experience in industr...
Francesco Tisato, Andrea Savigni, Walter Cazzola, ...