Sciweavers

43 search results - page 4 / 9
» Protective Wrapper Development: A Case Study
Sort
View
EDBTW
2010
Springer
14 years 2 months ago
Toward a software development methodology for anonymity applications
There are some software applications especially in privacy protection domain which they need anonymity support. Therefore lots of methods and protocols have been presented so far ...
Marzieh Ispareh, Behrouz Tork Ladani, Shirin Shari...
CHI
2004
ACM
14 years 8 months ago
Story lifecycle in a product development organization
This poster describes an integrated set of stories and story-based activities that we have used in product development in IBM Software Group's Lotus product organizations. We...
Majie Zeller, Sandra L. Kogan, Michael J. Muller, ...
KBSE
2008
IEEE
14 years 2 months ago
Using dependency model to support software architecture evolution
Evolution of software systems is characterized by inevitable changes of software and increasing software complexity, which in turn may lead to huge maintenance and development cos...
Hongyu Pei Breivold, Ivica Crnkovic, Rikard Land, ...
ASIASIM
2004
Springer
14 years 1 months ago
Simulating Cyber-intrusion Using Ordered UML Model-Based Scenarios
Abstract. Network security simulator is required for the study on the cyber intrusion and defense as cyber terrors have been increasingly popular. Until now, network security simul...
Eung Ki Park, Joo Beom Yun, Hoh Peter In
ASM
2008
ASM
13 years 9 months ago
A Concept-Driven Construction of the Mondex Protocol Using Three Refinements
Abstract. The Mondex case study concerns the formal development and verification of an electronic purse protocol. Several groups have worked on its specification and mechanical ver...
Gerhard Schellhorn, Richard Banach