Sciweavers

1963 search results - page 60 / 393
» How is aliasing used in systems software
Sort
View
ACSAC
2003
IEEE
14 years 3 months ago
Practical Random Number Generation in Software
There is a large gap between the theory and practice for random number generation. For example, on most operating systems, using /dev/random to generate a 256-bit AES key is highl...
John Viega
RE
2006
Springer
13 years 10 months ago
Using trust assumptions with security requirements
Assumptions are frequently made during requirements analysis of a system about the trustworthiness of its various components (including human components). These trust assumptions, ...
Charles B. Haley, Robin C. Laney, Jonathan D. Moff...
ICSE
2003
IEEE-ACM
14 years 10 months ago
From HCI to Software Engineering and Back
Methods to assess and ensure system usability are becoming increasingly important as market edge becomes less dependent on function and more dependent on ease of use, and as recog...
José Creissac Campos, Michael D. Harrison
INFSOF
2007
126views more  INFSOF 2007»
13 years 10 months ago
Software maintenance seen as a knowledge management issue
Creating and maintaining software systems is a knowledge intensive task. One needs to have a good understanding of the application domain, the problem to solve and all its require...
Nicolas Anquetil, Káthia Marçal de O...
CD
2004
Springer
14 years 3 months ago
Towards a Dynamic Resource Contractualisation for Software Components
Abstract In this paper we present a framework defining the architecture of systems providing software components with means to contractualise their resource access conditions with...
Nicolas Le Sommer