Sciweavers

1601 search results - page 98 / 321
» The affordable application of formal methods to software eng...
Sort
View
ICSM
2002
IEEE
14 years 2 months ago
Maintaining Software with a Security Perspective
Testing for software security is a lengthy, complex and costly process. Currently, security testing is done using penetration analysis and formal verification of security kernels....
Kanta Jiwnani, Marvin V. Zelkowitz
ER
2003
Springer
150views Database» more  ER 2003»
14 years 2 months ago
EITH - A Unifying Representation for Database Schema and Application Code in Enterprise Knowledge Extraction
The integration of heterogeneous legacy databases requires understanding of database structure and content. We previously developed a theoretical and software infrastructure to sup...
Mark S. Schmalz, Joachim Hammer, Mingxi Wu, Oguzha...
COMPSAC
2009
IEEE
14 years 3 months ago
Towards Validating Security Protocol Deployment in the Wild
As computing technology becomes increasingly pervasive and interconnected, mobility leads to shorter-lasting relationships between end-points with many different security requirem...
Luca Compagna, Ulrich Flegel, Volkmar Lotz
IJCAI
1989
13 years 10 months ago
A Technique for Customizing Object-Oriented Knowledge Representation Systems, With An Application to Network Problem Management
Over the last few years, object-oriented techniques have gained an increasing recognition both in software engineering and in AI. Object-oriented systems present undisputable adva...
Lisiane Goffaux, Robert Mathonet
SIGSOFT
2008
ACM
14 years 10 months ago
The implications of method placement on API learnability
To better understand what makes Application Programming Interfaces (APIs) hard to use and how to improve them, recent research has begun studying programmers' strategies and ...
Jeffrey Stylos, Brad A. Myers