Sciweavers

3792 search results - page 13 / 759
» Techniques for Trusted Software Engineering
Sort
View
RE
2006
Springer
13 years 9 months ago
Using trust assumptions with security requirements
Assumptions are frequently made during requirements analysis of a system about the trustworthiness of its various components (including human components). These trust assumptions, ...
Charles B. Haley, Robin C. Laney, Jonathan D. Moff...
ICSE
2003
IEEE-ACM
14 years 10 months ago
Software Engineering and HCI Techniques Joined to Develop Virtual Environments
Maria Isabel Sánchez Segura, Antonio de Ame...
WCRE
1999
IEEE
14 years 2 months ago
A Framework for Classifying and Comparing Software Reverse Engineering and Design Recovery Techniques
Several techniques have been suggested for supporting reverse engineering and design recovery activities. While many of these techniques have been cataloged in various collections...
Gerald C. Gannod, Betty H. C. Cheng
HICSS
2007
IEEE
181views Biometrics» more  HICSS 2007»
14 years 4 months ago
A Methodology to Evaluate Agent Oriented Software Engineering Techniques
Systems using Software Agents (or Multi-Agent Systems, MAS) are becoming more popular within the development mainstream because, as the name suggests, an Agent aims to handle task...
Chia-En Lin, Krishna M. Kavi, Frederick T. Sheldon...
SIGCSE
2006
ACM
150views Education» more  SIGCSE 2006»
14 years 3 months ago
Pedagogical techniques supported by the use of student devices in teaching software engineering
This paper describes our experiences in promoting a learning environment where active student involvement and interaction, as well as openness to diversity of ideas are supported ...
Valentin Razmov, Richard J. Anderson