Sciweavers

1168 search results - page 134 / 234
» Influencing Software Usage
Sort
View
EUROSEC
2008
ACM
13 years 9 months ago
A methodology for the repeatable forensic analysis of encrypted drives
In this paper we propose a sound methodology to perform the forensic analysis of hard disks protected with whole-disk encryption software, supposing to be in possession of the app...
Cory Altheide, Claudio Merloni, Stefano Zanero
AVI
1998
13 years 9 months ago
Remote evaluation for post-deployment usability improvement
Although existing lab-based formative evaluation is frequently and effectively applied to improving usability of software user interfaces, it has limitations that have led to the ...
H. Rex Hartson, José C. Castillo
ESEM
2010
ACM
13 years 9 months ago
Gender differences and programming environments: across programming populations
Although there has been significant research into gender regarding educational and workplace practices, there has been little investigation of gender differences pertaining to pro...
Margaret M. Burnett, Scott D. Fleming, Shamsi Iqba...
ENTCS
2007
101views more  ENTCS 2007»
13 years 7 months ago
Parametric Performance Contracts: Non-Markovian Loop Modelling and an Experimental Evaluation
Even with todays hardware improvements, performance problems are still common in many software systems. An approach to tackle this problem for component-based software architectur...
Heiko Koziolek, Viktoria Firus
WCRE
2010
IEEE
13 years 6 months ago
Mining Source Code for Structural Regularities
Abstract—During software development, design rules and contracts in the source code are often encoded through regularities, such as API usage protocols, coding idioms and naming ...
Angela Lozano, Andy Kellens, Kim Mens, Gabriela Ar...