Sciweavers

184 search results - page 30 / 37
» Software Requirements Negotiation: Some Lessons Learned
Sort
View
IWPC
2006
IEEE
14 years 2 months ago
Understanding Obfuscated Code
Code obfuscation makes it harder for a security analyst to understand the malicious payload of a program. In most cases an analyst needs to study the program at the machine code l...
Matias Madou, Ludo Van Put, Koen De Bosschere
SOUPS
2005
ACM
14 years 2 months ago
Developing privacy guidelines for social location disclosure applications and services
In this article, we describe the design process of Reno, a location-enhanced, mobile coordination tool and person finder. The design process included three field experiments: a ...
Giovanni Iachello, Ian E. Smith, Sunny Consolvo, M...
ER
2007
Springer
146views Database» more  ER 2007»
14 years 15 days ago
Achieving, Satisficing, and Excelling
Abstract. Definitions of the concepts derived from the goal concept (including functional and nonfunctional goal, hardgoal, and softgoal) used in requirements engineering are discu...
Ivan Jureta, Stéphane Faulkner, Pierre-Yves...
HPCA
2003
IEEE
14 years 9 months ago
TCP: Tag Correlating Prefetchers
Although caches for decades have been the backbone of the memory system, the speed gap between CPU and main memory suggests their augmentation with prefetching mechanisms. Recentl...
Zhigang Hu, Margaret Martonosi, Stefanos Kaxiras
JFP
2007
126views more  JFP 2007»
13 years 8 months ago
Engineering Software Correctness
Software engineering courses offer one of many opportunities for providing students with a significant experience in declarative programming. This report discusses some results fr...
Rex L. Page