Sciweavers

3792 search results - page 124 / 759
» Techniques for Trusted Software Engineering
Sort
View
116
Voted
WWW
2007
ACM
16 years 4 months ago
Integrating value-based requirement engineering models to webml using vip business modeling framework
Requirement engineering (RE) is emerging as an increasingly important discipline for supporting Web application development, as these are designed to satisfy diverse stakeholder n...
Farooque Azam, Zhang Li, Rashid Ahmad
123
Voted
WCRE
2005
IEEE
15 years 9 months ago
Enriching Reverse Engineering with Semantic Clustering
Understanding a software system by just analyzing the structure of the system reveals only half of the picture, since the structure tells us only how the code is working but not w...
Adrian Kuhn, Stéphane Ducasse, Tudor G&icir...
118
Voted
ARC
2006
Springer
122views Hardware» more  ARC 2006»
15 years 7 months ago
UNITE: Uniform Hardware-Based Network Intrusion deTection Engine
Abstract. Current software implementations of network intrusion detection reach a maximum network connection speed of about 1Gbps (Gigabits per second). This paper analyses the Sno...
Sherif Yusuf, Wayne Luk, M. K. N. Szeto, William G...
109
Voted
UIST
2004
ACM
15 years 9 months ago
Tangible NURBS-curve manipulation techniques using graspable handles on a large display
This paper presents tangible interaction techniques for fine-tuning one-to-one scale NURBS curves on a large display for automotive design. We developed a new graspable handle wit...
Seok-Hyung Bae, Takahiro Kobayash, Ryugo Kijima, W...
115
Voted
ICSM
2005
IEEE
15 years 9 months ago
A Category-theoretic Approach to Syntactic Software Merging
Software merging is a common and essential activity during the lifespan of large-scale software systems. Traditional textual merge techniques are inadequate for detecting syntacti...
Nan Niu, Steve M. Easterbrook, Mehrdad Sabetzadeh