Sciweavers

747 search results - page 109 / 150
» Toward a software development methodology for anonymity appl...
Sort
View
TACS
2001
Springer
14 years 1 months ago
Lightweight Analysis of Object Interactions
The state of the practice in object-oriented software development has moved beyond reuse of code to reuse of conceptual structures such as design patterns. This paper draws attenti...
Daniel Jackson, Alan Fekete
ACMSE
2006
ACM
14 years 2 months ago
Static analysis of anomalies and security vulnerabilities in executable files
Software researchers have already developed static code security checkers to parse through and scan source code files, looking for security vulnerabilities [8, 9]. What about exec...
Jay-Evan J. Tevis, John A. Hamilton Jr.
EOR
2002
96views more  EOR 2002»
13 years 8 months ago
Multicriteria classification and sorting methods: A literature review
The assignment of alternatives (observations/objects) into predefined homogenous groups is a problem of major practical and research interest. This type of problem is referred to ...
Constantin Zopounidis, Michael Doumpos
SETP
2007
13 years 10 months ago
Using Communication Objects During Requirements Analysis
Requirement analysis continues to be one of the most critical and challenging phases during the software development process. Many object-oriented methodologies identify three pri...
Peter J. Clarke, Yingbo Wang, Tuan L. Cameron, Yal...
ISW
2009
Springer
14 years 3 months ago
Hardware-Assisted Application-Level Access Control
Abstract. Applications typically rely on the operating system to enforce access control policies such as MAC, DAC, or other policies. However, in the face of a compromised operatin...
Yu-Yuan Chen, Ruby B. Lee