Sciweavers

2741 search results - page 479 / 549
» Engineering Mathematical Knowledge
Sort
View
ISSRE
2005
IEEE
15 years 8 months ago
Automated Checking for Windows Host Vulnerabilities
Evaluation of computing system security requires knowledge of the vulnerabilities present in the system and of potential attacks against the system. Vulnerabilities can be classif...
Matin Tamizi, Matt Weinstein, Michel Cukier
SAC
2005
ACM
15 years 8 months ago
Use case-driven component specification: a medical applications perspective to product line development
Modular and flexible software components can be useful for reuse across a class of domain-specific applications or product lines. By varying the composition of components suited t...
M. Brian Blake, Kevin Cleary, Sohan Ranjan, Luis I...
SACMAT
2005
ACM
15 years 8 months ago
Role mining with ORCA
With continuously growing numbers of applications, enterprises face the problem of efficiently managing the assignment of access permissions to their users. On the one hand, secur...
Jürgen Schlegelmilch, Ulrike Steffens
SIGCSE
2005
ACM
179views Education» more  SIGCSE 2005»
15 years 8 months ago
Design patterns for database pedagogy: a proposal
Courses in Relational Databases largely use a domain-specific design approach different from that used in the rest of the curriculum. Use of the Unified Process, UML, and Design P...
Thomas J. Marlowe, Cyril S. Ku, James W. Benham
SIGITE
2005
ACM
15 years 8 months ago
The role of programming in IT
Early in its history as an academic discipline, depth in computer programming was a primary distinguishing factor between IT and older computing disciplines, such as computer scie...
Dianne P. Bills, John A. Biles