Sciweavers

8623 search results - page 166 / 1725
» Software engineering for secure systems
Sort
View
ICSE
2000
IEEE-ACM
14 years 1 months ago
Reverse engineering: a roadmap
By the early 1990s the need for reengineering legacy systems was already acute, but recently the demand has increased significantly with the shift toward web-based user interfaces...
Hausi A. Müller, Jens H. Jahnke, Dennis B. Sm...
HICSS
2003
IEEE
165views Biometrics» more  HICSS 2003»
14 years 2 months ago
Analysis of the Effectiveness of Global Virtual Teams in Software Engineering Projects
Global software development projects use virtual teams, which are primarily linked through computer and telecommunications technologies across national boundaries. Global Virtual ...
H. Keith Edwards, Varadharajan Sridhar
ICSE
2005
IEEE-ACM
14 years 9 months ago
Deciding what to design: closing a gap in software engineering education
Software has jumped "out of the box" ? it controls critical systems, pervades business and commerce, and infuses entertainment, communication, and other everyday activiti...
Mary Shaw, James D. Herbsleb, Ipek Ozkaya
FASE
2009
Springer
14 years 4 months ago
A Formal Connection between Security Automata and JML Annotations
Security automata are a convenient way to describe security policies. Their typical use is to monitor the execution of an application, and to interrupt it as soon as the security p...
Marieke Huisman, Alejandro Tamalet
AAAI
1990
13 years 10 months ago
AI and Software Engineering: Will the Twain Ever Meet?
This session will explore the reasons for the lack of impact in four important areas in which AI has been expected to significantly affect real world Software Engineering. The pan...
Robert Balzer