Sciweavers

2588 search results - page 329 / 518
» Project risk management
Sort
View
TARK
2007
Springer
15 years 10 months ago
Knowledge-based modelling of voting protocols
We contend that reasoning about knowledge is both natural and pragmatic for verification of electronic voting protocols. We present a model in which desirable properties of elect...
A. Baskar, Ramaswamy Ramanujam, S. P. Suresh
ECBS
2003
IEEE
133views Hardware» more  ECBS 2003»
15 years 9 months ago
Enterprise-Wide Solutions Architecting Using UML
- In concert with customer and marketing staffs, systems engineers often formulate and codify an initial overall software system solution to fulfill customer needs. Without a focus...
Diane Feldman, Josephine Micallef, Dennis Mulcare
CCS
2001
ACM
15 years 8 months ago
Practical forward secure group signature schemes
A group signature scheme allows a group member to sign messages anonymously on behalf of the group, while in case of a dispute, a designated entity can reveal the identity of a si...
Dawn Xiaodong Song
SIGSOFT
1995
ACM
15 years 7 months ago
An Experiment to Assess the Cost-Benefits of Code Inspections in Large Scale Software Development
—We conducted a long-term experiment to compare the costs and benefits of several different software inspection methods. These methods were applied by professional developers to ...
Adam A. Porter, Harvey P. Siy, Carol A. Toman, Law...
INFORMATIKTAGE
2008
15 years 5 months ago
Constraint Based Transformation Theory
During the last 25 years the complexity and functionality of software systems has increased dramatically. Software systems have to be updated and restructured continuously [22]. I...
Stefan Natelberg