Sciweavers

411 search results - page 65 / 83
» The Collaboration Engineering Maturity Model
Sort
View
ESSOS
2009
Springer
14 years 2 months ago
Protection Poker: Structuring Software Security Risk Assessment and Knowledge Transfer
Discovery of security vulnerabilities is on the rise. As a result, software development teams must place a higher priority on preventing the injection of vulnerabilities in softwar...
Laurie Williams, Michael Gegick, Andrew Meneely
PCI
2009
Springer
14 years 2 days ago
A Foundation for Defining Security Requirements in Grid Computing
—Despite the wide adoption by the scientific community, grid technologies have not been given the appropriate attention by enterprises. This is merely due to the lack of enough s...
Antonios Gouglidis, Ioannis Mavridis
SIGADA
1998
Springer
13 years 11 months ago
Algorithm Animation with Symbol Processing Robots
This experience report demonstrates several running programs with visual, animated, colorful displays of "algorithms in action." A common element of all of the programs ...
Brad S. Crawford
EMSOFT
2006
Springer
13 years 11 months ago
Modeling a system controller for timing analysis
Upper bounds on worst-case execution times, which are commonly called WCET, are a prerequisite for validating the temporal correctness of tasks in a real-time system. Due to the e...
Stephan Thesing
GECCO
2008
Springer
179views Optimization» more  GECCO 2008»
13 years 8 months ago
Evolutionary swarm design of architectural idea models
In this paper we present a swarm grammar system that makes use of bio-inspired mechanisms of reproduction, communication and construction in order to build three-dimensional struc...
Sebastian von Mammen, Christian Jacob