Sciweavers

2236 search results - page 78 / 448
» Secure Software Design in Practice
Sort
View
122
Voted
ICSM
2008
IEEE
15 years 9 months ago
Design principles in architectural evolution: A case study
We wish to investigate how structural design principles are used in practice, in order to assess the utility and relevance of such principles to the maintenance of large, complex,...
Michel Wermelinger, Yijun Yu, Angela Lozano
86
Voted
ICSE
2003
IEEE-ACM
16 years 2 months ago
Quantifying the Value of Architecture Design Decisions: Lessons from the Field
This paper outlines experiences with using economic criteria to make architecture design decisions. It briefly describes the CBAM (Cost Benefit Analysis Method) framework applied ...
Mike Moore, Rick Kazman, Mark Klein, Jai Asundi
IJSN
2006
124views more  IJSN 2006»
15 years 2 months ago
Wireless networking security: open issues in trust, management, interoperation and measurement
: The pervasive availability and wide usage of wireless networks with different kinds of topologies, techniques and protocol suites have brought with them a need to improve securit...
Joseph B. Evans, Weichao Wang, Benjamin J. Ewy
OOPSLA
2009
Springer
15 years 9 months ago
S.P.L.O.T.: software product lines online tools
This paper introduces S.P.L.O.T., a Web-based reasoning and configuration system for Software Product Lines (SPLs). The system benefits from mature logic-based reasoning techniq...
Marcílio Mendonça, Moises Branco, Do...
OOPSLA
2009
Springer
15 years 7 months ago
Good examples for exposing bad practice: a "killer examples" workshop
The “Killer Examples” series of workshops are highly interactive workshops which have been an annual occurrence at OOPSLA since 2002. The goals of the workshop are to bring to...
Dale Skrien, Michael E. Caspersen, Jürgen B&o...