Sciweavers

3792 search results - page 197 / 759
» Techniques for Trusted Software Engineering
Sort
View
ACSAC
1999
IEEE
15 years 8 months ago
Using Abuse Case Models for Security Requirements Analysis
The relationships between the work products of a security engineering process can be hard to understand, even for persons with a strong technical background but little knowledge o...
John P. McDermott, Chris Fox
CBSE
2009
Springer
15 years 9 months ago
Extracting Behavior Specification of Components in Legacy Applications
A challenge of componentizing legacy applications is to extract behavior specification of suggested components. It is desirable to preserve a relation between the original structur...
Tomás Poch, Frantisek Plasil
HPDC
2008
IEEE
15 years 10 months ago
Ontological framework for a free-form query based grid search engine
If the model of free-form queries, which has proved successful for HTML based search on the Web, is made available for Grid services, it will serve as a powerful tool for scientis...
Chaitali Gupta, Rajdeep Bhowmik, Madhusudhan Govin...
PC
2007
161views Management» more  PC 2007»
15 years 3 months ago
High performance combinatorial algorithm design on the Cell Broadband Engine processor
The Sony–Toshiba–IBM Cell Broadband Engine (Cell/B.E.) is a heterogeneous multicore architecture that consists of a traditional microprocessor (PPE) with eight SIMD co-process...
David A. Bader, Virat Agarwal, Kamesh Madduri, Seu...
CSMR
2004
IEEE
15 years 8 months ago
Adaptation of Large-Scale Open Source Software - An Experience Report
Within a long-term distributed systems project we repeatedly stumbled across the well-known yet difficult question to either implement from scratch or comprehend and adapt existin...
Markus Pizka