Sciweavers

276 search results - page 24 / 56
» Software Security Checklist for the Software Life Cycle
Sort
View
INFOVIS
1999
IEEE
14 years 1 months ago
Domain Analysis: A Technique to Design a User-Centered Visualization Framework
Domain Analysis for Data Visualization (DADV) is a technique to use when investigating a domain where data visualizations are going to be designed and added to existing software s...
Octavio Juarez Espinosa, Chris Hendrickson, James ...
CLEIEJ
2007
86views more  CLEIEJ 2007»
13 years 9 months ago
Requirements Game: Teaching Software Project Management
: Several business areas, like Management and Negotiation, have used games like a didactic way to simulate world reality, to introduce students to the day-to-day generated problems...
Carlos Mario Zapata Jaramillo, Gabriel Awad-Aubad
MICRO
2006
IEEE
114views Hardware» more  MICRO 2006»
14 years 3 months ago
Authentication Control Point and Its Implications For Secure Processor Design
Secure processor architecture enables tamper-proof protection on software that addresses many difficult security problems such as reverse-engineering prevention, trusted computing...
Weidong Shi, Hsien-Hsin S. Lee
JUCS
2008
130views more  JUCS 2008»
13 years 9 months ago
LIFT - A Legacy InFormation Retrieval Tool
Software maintenance tasks are the most expensive activities on legacy systems life cycle, and system understanding is the most important factor of this cost. Thus, in order to aid...
Kellyton dos Santos Brito, Vinicius Cardoso Garcia...
COMPSAC
2002
IEEE
14 years 1 months ago
The Application of Case-Based Reasoning to Early Web Project Cost Estimation
Literature shows that over the years numerous techniques for estimating development effort have been suggested, derived from late project measures. However, to the successful mana...
Emilia Mendes, Nile Mosley, Steve Counsell