Sciweavers

3792 search results - page 14 / 759
» Techniques for Trusted Software Engineering
Sort
View
OOIS
2001
Springer
14 years 2 months ago
Analysis of Software Engineering Data Using Computational Intelligence Techniques
The accurate estimation of software development effort has major implications for the management of software development in the industry. Underestimates lead to time pressures tha...
Gabriel Jarillo, Giancarlo Succi, Witold Pedrycz, ...
COMPSAC
2006
IEEE
14 years 3 months ago
Application of Fuzzy Logic in Federated Trust Management for Pervasive Computing
In federated and pervasive networks, trust management has become a cornerstone for information security and privacy. Although people have recognized the importance of privacy and ...
Zhengping Wu, Alfred C. Weaver
RE
2005
Springer
14 years 3 months ago
Modeling Security Requirements Through Ownership, Permission and Delegation
Security Requirements Engineering is emerging as a branch of Software Engineering, spurred by the realization that security must be dealt with early on during the requirements pha...
Paolo Giorgini, Fabio Massacci, John Mylopoulos, N...
ACJ
2000
43views more  ACJ 2000»
13 years 9 months ago
The OPEN Software Engineering Process Architecture: From Activities to Techniques
Brian Henderson-Sellers, Anthony J. H. Simons