Sciweavers

1815 search results - page 127 / 363
» Making the Business Case for Software Performance Engineerin...
Sort
View
EUROMICRO
2007
IEEE
15 years 10 months ago
Scope Management of Non-Functional Requirements
Getting business stakeholders’ goals formulated clearly and project scope defined realistically increases the chance of success for any application development process. As a cons...
Mohamad Kassab, Maya Daneva, Olga Ormandjieva
CCS
2008
ACM
15 years 5 months ago
Reducing protocol analysis with XOR to the XOR-free case in the horn theory based approach
In the Horn theory based approach for cryptographic protocol analysis, cryptographic protocols and (Dolev-Yao) intruders are modeled by Horn theories and security analysis boils d...
Ralf Küsters, Tomasz Truderung
CCGRID
2008
IEEE
15 years 10 months ago
Reputation-Based Estimation of Individual Performance in Grids
Hidden information is a critical issue for the successful delivery of SLAs in grid systems. It arises when the agents (hardware and software resources) employed to serve a task be...
Thanasis G. Papaioannou, George D. Stamoulis
SAC
2009
ACM
15 years 10 months ago
Open source vs. closed source software: towards measuring security
The increasing availability and deployment of open source software in personal and commercial environments makes open source software highly appealing for hackers, and others who ...
Guido Schryen, Rouven Kadura
SIGSOFT
2007
ACM
16 years 4 months ago
The symmetry of the past and of the future: bi-infinite time in the verification of temporal properties
Model checking techniques have traditionally dealt with temporal logic languages and automata interpreted over -words, i.e., infinite in the future but finite in the past. However...
Matteo Pradella, Angelo Morzenti, Pierluigi San Pi...