Sciweavers

1606 search results - page 289 / 322
» Methodological Approach for Developing a KMS: A Case Study
Sort
View
CHES
2009
Springer
150views Cryptology» more  CHES 2009»
14 years 2 months ago
A Design Flow and Evaluation Framework for DPA-Resistant Instruction Set Extensions
Power-based side channel attacks are a significant security risk, especially for embedded applications. To improve the security of such devices, protected logic styles have been p...
Francesco Regazzoni, Alessandro Cevrero, Fran&cced...
ICST
2009
IEEE
14 years 2 months ago
WS-TAXI: A WSDL-based Testing Tool for Web Services
Web Services (WSs) are the W3C-endorsed realization of the Service-Oriented Architecture (SOA). Since they are supposed to be implementation-neutral, WSs are typically tested blac...
Cesare Bartolini, Antonia Bertolino, Eda Marchetti...
ISORC
2009
IEEE
14 years 2 months ago
From Requirements to Code Revisited
In his article entitled "From Play-In Scenarios to Code: An Achievable Dream", David Harel presented a development schema that makes it possible to go from high-level us...
Tewfik Ziadi, Xavier Blanc, Amine Raji
ICSM
2007
IEEE
14 years 1 months ago
An Activity-Based Quality Model for Maintainability
Maintainability is a key quality attribute of successful software systems. However, its management in practice is still problematic. Currently, there is no comprehensive basis for...
Florian Deissenboeck, Stefan Wagner, Markus Pizka,...
KBSE
2007
IEEE
14 years 1 months ago
Inferring structural patterns for concern traceability in evolving software
As part of the evolution of software systems, effort is often invested to discover in what parts of the source code a feature (or other concern) is implemented. Unfortunately, kn...
Barthélémy Dagenais, Silvia Breu, Fr...