Sciweavers

276 search results - page 39 / 56
» Software Security Checklist for the Software Life Cycle
Sort
View
CODES
2007
IEEE
14 years 3 months ago
Ensuring secure program execution in multiprocessor embedded systems: a case study
Multiprocessor SoCs are increasingly deployed in embedded systems with little or no security features built in. Code Injection attacks are one of the most commonly encountered sec...
Krutartha Patel, Sridevan Parameswaran, Seng Lin S...
SEW
2006
IEEE
14 years 3 months ago
Qualitative Modeling for Requirements Engineering
Acquisition of “quantitative” models of sufficient accuracy to enable effective analysis of requirements tradeoffs is hampered by the slowness and difficulty of obtaining su...
Tim Menzies, Julian Richardson
WCRE
2006
IEEE
14 years 3 months ago
FINT: Tool Support for Aspect Mining
Aspect mining requires adequate tool support to locate source code elements implementing crosscutting concerns (aka seeds), to explore and understand relations describing these el...
Marius Marin, Leon Moonen, Arie van Deursen
ACSE
1996
ACM
14 years 1 months ago
Integrating professional skills into the curriculum
The need for the teaching of professional skills to undergraduates in areas such as communications, team work, conflict resolution, and ethics has for some time been articulated b...
John Lamp, Chris Keen, Cathy Urquhart
HICSS
1995
IEEE
101views Biometrics» more  HICSS 1995»
14 years 18 days ago
Prototyping of parallel and distributed object-oriented systems: the PDC model and its environment
To ease the implementation of distributed objectoriented systems we developed the PDC technique (Proxy/ Dispatcher/Collocutor technique), a simple and pragmatic approach to allow ...
Rainer Weinreich, Reinhold Plösch