Sciweavers

237 search results - page 27 / 48
» Modularisation of Software Configuration Management
Sort
View
ACSAC
2002
IEEE
14 years 10 days ago
Protecting Data from Malicious Software
Corruption or disclosure of sensitive user documents can be among the most lasting and costly effects of malicious software attacks. Many malicious programs specifically target fi...
Matthew Schmid, Frank Hill, Anup K. Ghosh
ECBS
2010
IEEE
209views Hardware» more  ECBS 2010»
13 years 11 months ago
Continuous Verification of Large Embedded Software Using SMT-Based Bounded Model Checking
The complexity of software in embedded systems has increased significantly over the last years so that software verification now plays an important role in ensuring the overall pr...
Lucas Cordeiro, Bernd Fischer 0002, João Ma...
COMPSAC
2005
IEEE
14 years 29 days ago
Considerations on a New Software Architecture for Distributed Environments Using Autonomous Semantic Agents
Distributed processing environments such as that of a traffic management network system (TMS) can be implemented easier, faster, and secure and perform better through use of auton...
Atilla Elçi, Behnam Rahnama
CSCW
2006
ACM
14 years 1 months ago
Interruptions on software teams: a comparison of paired and solo programmers
This study explores interruption patterns among software developers who program in pairs versus those who program solo. Ethnographic observations indicate that interruption length...
Jan Chong, Rosanne Siino
CMG
2001
13 years 8 months ago
Software That Can Think and Do
Rapid advances in research and technology now allow data analysis and modeling of extremely complex systems. Methods from artificial intelligence (AI) such as Neural Networks have...
Bernard Domanski