Sciweavers

3792 search results - page 136 / 759
» Techniques for Trusted Software Engineering
Sort
View
SIGSOFT
2000
ACM
15 years 8 months ago
Implicit context: easing software evolution and reuse
Software systems should consist of simple, conceptually clean software components interacting along narrow, well-defined paths. All too often, this is not reality: complex compon...
Robert J. Walker, Gail C. Murphy
ATAL
2009
Springer
15 years 10 months ago
agentTool III: from process definition to code generation
The agentTool III (aT3 ) development environment is built on the Eclipse platform and provides traditional model creation tools to support the analysis, design, and implementation...
Juan C. García-Ojeda, Scott A. DeLoach, Rob...
147
Voted
NDSS
2009
IEEE
15 years 10 months ago
Two-Party Computation Model for Privacy-Preserving Queries over Distributed Databases
Many existing privacy-preserving techniques for querying distributed databases of sensitive information do not scale for large databases due to the use of heavyweight cryptographi...
Sherman S. M. Chow, Jie-Han Lee, Lakshminarayanan ...
121
Voted
CSMR
2004
IEEE
15 years 7 months ago
Architecture-Aware Adaptive Clustering of OO Systems
The recovery of software architecture is a first important step towards re-engineering a software system. Architecture recovery usually involves clustering. The problem with curre...
Markus Bauer, Mircea Trifu
128
Voted
AVI
2004
15 years 5 months ago
Sim-U-Sketch: a sketch-based interface for SimuLink
Sim-U-Sketch is an experimental sketch-based interface we developed for Matlab 's Simulink software package. With this tool, users can construct functional Simulink models si...
Levent Burak Kara, Thomas F. Stahovich