Sciweavers

3792 search results - page 27 / 759
» Techniques for Trusted Software Engineering
Sort
View
ESSOS
2009
Springer
14 years 4 months ago
Idea: Trusted Emergency Management
Through first-responder access to sensitive information for which they have not been pre-vetted, lives and property can be saved. We describe enhancements to a trusted emergency i...
Timothy E. Levin, Cynthia E. Irvine, Terry Benzel,...
ICSE
2003
IEEE-ACM
14 years 10 months ago
Undergraduate Software Engineering Curriculum Enhancement via Human-Computer Interaction
More needs to be done to train students to deliver usable software. The current Software Engineering curriculum includes Human-Computer Interaction (HCI) topics in terms of a lect...
Stephanie Ludi
KBSE
2010
IEEE
13 years 8 months ago
Realizing architecture frameworks through megamodelling techniques
Most practising software architects operate within an architecture framework which is a coordinated set of viewpoints, models and notations prescribed for them. Whereas architectu...
Rich Hilliard, Ivano Malavolta, Henry Muccini, Pat...
ICSM
2007
IEEE
14 years 4 months ago
SCARPE: A Technique and Tool for Selective Capture and Replay of Program Executions
Because of software’s increasing dynamism and the heterogeneity of execution environments, the results of in-house testing and maintenance are often not representative of the wa...
Shrinivas Joshi, Alessandro Orso
DATE
2005
IEEE
125views Hardware» more  DATE 2005»
14 years 3 months ago
Hardware Engines for Bus Encryption: A Survey of Existing Techniques
The widening spectrum of applications and services provided by portable and embedded devices bring a new dimension of concerns in security. Most of those embedded systems (pay-TV,...
Reouven Elbaz, Lionel Torres, Gilles Sassatelli, P...