Sciweavers

2236 search results - page 75 / 448
» Secure Software Design in Practice
Sort
View
106
Voted
PLDI
2004
ACM
15 years 8 months ago
The set constraint/CFL reachability connection in practice
Many program analyses can be reduced to graph reachability problems involving a limited form of context-free language reachability called Dyck-CFL reachability. We show a new redu...
John Kodumal, Alexander Aiken
106
Voted
ICPW
2007
15 years 4 months ago
A practical method for courseware evaluation
As more courseware becomes available, choosing the right functionality for a particular e-learning community is becoming more problematic. Systematic methods for evaluating course...
Aldo de Moor
99
Voted
GI
2009
Springer
15 years 6 months ago
On the Role of Evolvability for Architectural Design
: Today software systems have to face frequent requests for change during their whole lifetime. It is very important that they can adapt to the frequently changing needs and are fl...
Stephan Bode
130
Voted
APCCM
2008
15 years 4 months ago
A Practical Guide to Testing the Understandability of Notations
Model-driven development is the process of creating models of a software system and transforming them into source code. Since the stepwise transformations can be done automaticall...
Susanne Patig
257
Voted
COMCOM
2000
105views more  COMCOM 2000»
15 years 2 months ago
Security broker for multimedia wireless LANs
To secure interactive multimedia applications in wireless LANs WLANs it is pertinent to implement a number of security services such as authentication, key exchange and real-time e...
Aura Ganz, Se Hyun Park, Zvi Ganz