Sciweavers

747 search results - page 61 / 150
» Toward a software development methodology for anonymity appl...
Sort
View
DBSEC
2009
124views Database» more  DBSEC 2009»
13 years 9 months ago
Towards System Integrity Protection with Graph-Based Policy Analysis
Abstract. Identifying and protecting the trusted computing base (TCB) of a system is an important task, which is typically performed by designing and enforcing a system security po...
Wenjuan Xu, Xinwen Zhang, Gail-Joon Ahn
ER
1998
Springer
123views Database» more  ER 1998»
14 years 1 months ago
From Object Oriented Conceptual Modeling to Automated Programming in Java
The development of Internet commercial applications and corporate Intranets around the world, which uses Java as the de facto standard language, is a significant topic in modern S...
Oscar Pastor, Vicente Pelechano, Emilio Insfr&aacu...
CONCURRENCY
2002
199views more  CONCURRENCY 2002»
13 years 8 months ago
Application portals: practice and experience
The implementation of multiple Grid computing portals has led us to develop a methodology for Grid portal development that facilitates rapid prototyping and building of portals. B...
Mary Thomas, Maytal Dahan, Kurt Mueller, Stephen M...
EUROMICRO
2007
IEEE
14 years 3 months ago
Scope Management of Non-Functional Requirements
Getting business stakeholders’ goals formulated clearly and project scope defined realistically increases the chance of success for any application development process. As a cons...
Mohamad Kassab, Maya Daneva, Olga Ormandjieva
CODES
2004
IEEE
14 years 15 days ago
Design and programming of embedded multiprocessors: an interface-centric approach
We present design technology for the structured design and programming of embedded multi-processor systems. It comprises a task-level interface that can be used both for developin...
Pieter van der Wolf, Erwin A. de Kock, Tomas Henri...