Sciweavers

2455 search results - page 467 / 491
» Graphical abstract help
Sort
View
ICISS
2007
Springer
14 years 2 months ago
Security in Practice - Security-Usability Chasm
Abstract. Computer systems security area has received increased attention from both academics and in industry. However, recent work indicates that substantial security gaps emerge ...
Atul Prakash
IFIP
2007
Springer
14 years 2 months ago
Capable Leader and Skilled and Motivated Team Practices to Introduce eXtreme Programming
Abstract. Applying changes to software engineering processes in organisations usually raises many problems of varying nature. Basing on a real-world 2-year project and a simultaneo...
Lech Madeyski, Wojciech Biela
OOPSLA
2007
Springer
14 years 2 months ago
Modular typestate checking of aliased objects
Objects often define usage protocols that clients must follow in order for these objects to work properly. Aliasing makes it notoriously difficult to check whether clients and i...
Kevin Bierhoff, Jonathan Aldrich
SPIN
2007
Springer
14 years 2 months ago
Generating Counter-Examples Through Randomized Guided Search
Abstract. Computational resources are increasing rapidly with the explosion of multi-core processors readily available from major vendors. Model checking needs to harness these res...
Neha Rungta, Eric G. Mercer
AGILEDC
2006
IEEE
14 years 2 months ago
Using an Agile Approach in a Large, Traditional Organization
Can Agile approaches be used successfully in large organizations, where traditional methods and high levels of governance are the norm? Although the iterative, agile approaches ha...
Dot Tudor, George A. Walter