Sciweavers

3792 search results - page 56 / 759
» Techniques for Trusted Software Engineering
Sort
View
COMPSAC
2000
IEEE
14 years 2 months ago
Dependence Analysis of Java Bytecode
Understanding program dependencies in a computer program is essential for many software engineering tasks such as program understanding, testing, debugging, reverse engineering, a...
Jianjun Zhao
ICSE
2005
IEEE-ACM
14 years 3 months ago
How to teach software modeling
To enhance motivation of students to study software engineering, some way of finding balance between the scientific aspect and the practical aspect of software engineering is re...
Tetsuo Tamai
HICSS
2000
IEEE
108views Biometrics» more  HICSS 2000»
14 years 2 months ago
Quality Control in Spreadsheets: A Software Engineering-based Approach to Spreadsheet Development
This paper presents work conducted towards the development of an effective software engineering-based methodology for integrity control in the process of spreadsheet development. ...
Kamalasen Rajalingham, David Chadwick, Brian Knigh...
WPES
2005
ACM
14 years 3 months ago
Privacy for RFID through trusted computing
Radio Frequency Identification (RFID) technology raises significant privacy issues because it enables tracking of items and people possibly without their knowledge or consent. O...
David Molnar, Andrea Soppera, David Wagner
UIST
1996
ACM
14 years 2 months ago
The Go-Go Interaction Technique: Non-Linear Mapping for Direct Manipulation in VR
The Go-Go immersive interaction technique uses the metaphor of interactively growing the user's arm and non-linear mapping for reaching and manipulating distant objects. Unli...
Ivan Poupyrev, Mark Billinghurst, Suzanne Weghorst...