Sciweavers

3792 search results - page 66 / 759
» Techniques for Trusted Software Engineering
Sort
View
EUROSYS
2008
ACM
14 years 7 months ago
Itrustpage: a user-assisted anti-phishing tool
Despite the many solutions proposed by industry and the research community to address phishing attacks, this problem continues to cause enormous damage. Because of our inability t...
Troy Ronda, Stefan Saroiu, Alec Wolman
SIGSOFT
2008
ACM
14 years 10 months ago
Requirements engineering: from craft to discipline
Getting the right software requirements under the right environment assumptions is a critical precondition for developing the right software. This task is intrinsically difficult....
Axel van Lamsweerde
ICSM
2002
IEEE
14 years 2 months ago
A Case Study of Unanticipated Incremental Change
Incremental changes add new functionality and properties to software. They are the core of software evolution, maintenance, iterative development, agile development, and similar s...
Václav Rajlich, Prashant Gosavi
WWW
2006
ACM
14 years 10 months ago
Towards DSL-based web engineering
Strong user involvement and clear business objectives, both relying on efficient communication between the developers and the business, are key factors for a project's succes...
Martin Nussbaumer, Patrick Freudenstein, Martin Ga...
ICSE
2009
IEEE-ACM
13 years 7 months ago
Engineering adaptive requirements
Challenges in the engineering of self-adaptive software have been recently discussed and summarized in a seminal research road map. Following it, we focus on requirements engineer...
Nauman A. Qureshi, Anna Perini