Sciweavers

63 search results - page 11 / 13
» The Challenge of Assuring Data Trustworthiness
Sort
View
CORR
2010
Springer
134views Education» more  CORR 2010»
13 years 7 months ago
Effective Defect Prevention Approach in Software Process for Achieving Better Quality Levels
Defect prevention is the most vital but habitually neglected facet of software quality assurance in any project. If functional at all stages of software development, it can condens...
V. Suma, T. R. Gopalakrishnan Nair
ENTCS
2002
145views more  ENTCS 2002»
13 years 7 months ago
Combining Monitors for Runtime System Verification
Runtime verification permits checking system properties that cannot be fully verified off-line. This is particularly true when the system includes complex third-party components, ...
Joshua Levy, Hassen Saïdi, Tomás E. Ur...
DAS
2010
Springer
14 years 10 days ago
Document analysis issues in reading optical scan ballots
Optical scan voting is considered by many to be the most trustworthy option for conducting elections because it provides an independently verifiable record of each voter’s inte...
Daniel P. Lopresti, George Nagy, Elisa H. Barney S...
CCS
2007
ACM
13 years 11 months ago
Reconfigurable trusted computing in hardware
Trusted Computing (TC) is an emerging technology towards building trustworthy computing platforms. The Trusted Computing Group (TCG) has proposed several specifications to impleme...
Thomas Eisenbarth, Tim Güneysu, Christof Paar...
CISIS
2009
IEEE
14 years 2 months ago
Strengths and Weaknesses of Maturity Driven Process Improvement Effort
In the recent decades most of the big organizations have adopted maturity driven process improvement efforts (MDPI). Most of these efforts have been inspired of maturity models li...
Asadullah Shaikh, Ashfaq Ahmed, Nasrullah Memon, M...