Sciweavers

2236 search results - page 87 / 448
» Secure Software Design in Practice
Sort
View
109
Voted
OOPSLA
1998
Springer
15 years 6 months ago
Role Model Based Framework Design and Integration
Today, any large object-oriented software system is built using frameworks. Yet, designing frameworks and defining their interaction with clients remains a difficult task. A prima...
Dirk Riehle, Thomas R. Gross
123
Voted
EMSOFT
2010
Springer
15 years 19 days ago
Initiating a design pattern catalog for embedded network systems
In the domain of desktop software, design patterns have had a profound impact; they are applied ubiquitously across a broad range of applications. Patterns serve both to promulgat...
Sally K. Wahba, Jason O. Hallstrom, Neelam Soundar...
143
Voted
WINE
2005
Springer
179views Economy» more  WINE 2005»
15 years 8 months ago
A Graph-Theoretic Network Security Game
Consider a network vulnerable to viral infection. The system security software can guarantee safety only to a limited part of the network. Such limitations result from economy cos...
Marios Mavronicolas, Vicky G. Papadopoulou, Anna P...
102
Voted
ICSE
2007
IEEE-ACM
16 years 2 months ago
SCL: Static Enforcement and Exploration of Developer Intent in Source Code
Developers are often unaware of, or fail to respect, the intentions behind a design due to poor communication of design intent. SCL (Structural Constraint Language) helps develope...
Daqing Hou
146
Voted
CASCON
2004
129views Education» more  CASCON 2004»
15 years 4 months ago
Practical language-independent detection of near-miss clones
Previous research shows that most software systems contain significant amounts of duplicated, or cloned, code. Some clones are exact duplicates of each other, while others differ ...
James R. Cordy, Thomas R. Dean, Nikita Synytskyy