Sciweavers

859 search results - page 36 / 172
» Explaining Synthesized Software
Sort
View
IFIP
1998
Springer
14 years 2 months ago
Security Requirements for Mobile Agents in Electronic Markets
Abstract. In this article we identify security threats and requirements for software agent systems in the context of an electronic market. A short description of our own agent syst...
Michael Zapf, Helge Müller, Kurt Geihs
AC
1998
Springer
14 years 1 months ago
Contemporary Block Ciphers
This paper considers modern secret-key block ciphers. The theory behind the design and analysis of modern block ciphers is explained, and the most important known attacks are outli...
Lars R. Knudsen
KBSE
1999
IEEE
14 years 2 months ago
An Integration of Deductive Retrieval into Deductive Synthesis
Deductive retrieval and deductive synthesis are two conceptually closely related software development methods which apply theorem proving techniques to support the construction of...
Bernd Fischer 0002, Jon Whittle
KBSE
2009
IEEE
14 years 4 months ago
Towards Augmenting Requirements Models with Preferences
—The analysis of stakeholder requirements is a critical aspect of software engineering. A common way of specifying stakeholder requirements is in terms of a hierarchy of goals wh...
Sotirios Liaskos, Sheila A. McIlraith, John Mylopo...
ISPW
2005
IEEE
14 years 3 months ago
Unifying Microprocess and Macroprocess Research
This paper proposes the unification of two complementary approaches to software process research. The two approaches can be characterized as macroprocess research, focused on pheno...
Leon J. Osterweil