Sciweavers

568 search results - page 84 / 114
» Enforcing traceability in software
Sort
View
CCS
2006
ACM
14 years 1 months ago
Bridging the gap between web application firewalls and web applications
Web applications are the Achilles heel of our current ICT infrastructure. NIST's national vulnerability database clearly shows that the percentage of vulnerabilities located ...
Lieven Desmet, Frank Piessens, Wouter Joosen, Pier...
EUROMICRO
2004
IEEE
14 years 1 months ago
Melisa - A Distributed Multimedia System for Multi-Platform Interactive Sports Content Broadcasting
The new generation of television viewers is currently being confronted and becoming acquainted with a series of technological developments in the realm of consumer electronics and...
Emmanuel Papaioannou, Vasilis Karagianis, Kostas K...
RE
1995
Springer
14 years 1 months ago
Managing inconsistencies in an evolving specification
In an evolving specification, considerable development time and effort is spent handling recurrent inconsistencies. Tools and techniques for detecting and resolving inconsistencie...
Steve M. Easterbrook, Bashar Nuseibeh
DRM
2008
Springer
13 years 11 months ago
A four-layer model for security of digital rights management
Defining Digital Rights Management (DRM) is a complex task. There is no unique universal definition. There are many legal, economic, functional, and technical definitions. This co...
Eric Diehl
SETP
2007
13 years 11 months ago
Dimensional Inference Using Symbol Lives
Scientific equations embedded in computer programs must obey the rules for dimensional consistency. Many efforts have been made to enforce these rules within computer programs. So...
Brian Farrimond, John Collins