Sciweavers

293 search results - page 35 / 59
» Preliminary Guidelines for Empirical Research in Software En...
Sort
View
ICSE
2005
IEEE-ACM
14 years 7 months ago
A cross-program investigation of students' perceptions of agile methods
Research was conducted on using agile methods in software engineering education. This paper explores the perceptions of students from five different academic levels of agile pract...
Grigori Melnik, Frank Maurer
COMPGEOM
2001
ACM
13 years 11 months ago
Efficient and small representation of line arrangements with applications
This paper addresses the problem of lossy compression of arrangements. Given an arrangement of n lines in the plane, we show how to construct another arrangement consisting of man...
David P. Dobkin, Ayellet Tal
SAC
2009
ACM
14 years 2 months ago
Remote software protection by orthogonal client replacement
In a typical client-server scenario, a trusted server provides valuable services to a client, which runs remotely on an untrusted platform. Of the many security vulnerabilities th...
Mariano Ceccato, Paolo Tonella, Mila Dalla Preda, ...
SP
1998
IEEE
173views Security Privacy» more  SP 1998»
13 years 11 months ago
An Automated Approach for Identifying Potential Vulnerabilities in Software
This paper presents results from analyzing the vulnerability of security-critical software applications to malicious threats and anomalous events using an automated fault injectio...
Anup K. Ghosh, Tom O'Connor, Gary McGraw
RE
2001
Springer
13 years 12 months ago
Domain Independent Regularities in Scenarios
Scenario is a description technique which has attracted much attention not only from practitioners but also from researchers. Literature on this topic shows the possibilities that...
Marcela Ridao, Jorge Horacio Doorn, Julio Cesar Sa...