Sciweavers

3792 search results - page 18 / 759
» Techniques for Trusted Software Engineering
Sort
View
103
Voted
SOCO
2008
Springer
15 years 3 months ago
Soft computing techniques for web services brokering
Roy Ladner, Frederick E. Petry, Kalyan Moy Gupta, ...
117
Voted
ACSAC
2005
IEEE
15 years 9 months ago
Countering Trusting Trust through Diverse Double-Compiling
An Air Force evaluation of Multics, and Ken Thompson’s famous Turing award lecture “Reflections on Trusting Trust,” showed that compilers can be subverted to insert maliciou...
David Wheeler
101
Voted
EUROSYS
2009
ACM
16 years 18 days ago
Statistical profiling-based techniques for effective power provisioning in data centers
Sriram Govindan, Jeonghwan Choi, Bhuvan Urgaonkar,...
ATC
2007
Springer
15 years 9 months ago
An Approach to a Trustworthy System Architecture Using Virtualization
We present a system architecture for trusted transactions in highly sensitive environments. This architecture takes advantage of techniques provided by the Trusted Computing Group ...
Frederic Stumpf, Michael Benz, Martin Hermanowski,...
COMPSAC
2002
IEEE
15 years 8 months ago
Multi-Criteria Preference Analysis for Systematic Requirements Negotiation
Many software projects have failed because their requirements were poorly negotiated among stakeholders. This paper proposes a systematic model, called "MultiCriteria Prefere...
Hoh Peter In, David Olson, Tom Rodgers