Sciweavers

1912 search results - page 129 / 383
» XML Technologies and Software Engineering
Sort
View
ITCC
2005
IEEE
15 years 9 months ago
Misuse Case-Based Design and Analysis of Secure Software Architecture
This paper presents an approach to the architectural design and analysis of secure software systems based on the system requirements elicited in the form of use cases and misuse c...
Joshua J. Pauli, Dianxiang Xu
106
Voted
IWPSE
2005
IEEE
15 years 9 months ago
Challenges in Software Evolution
Today’s information technology society increasingly relies on software at all levels. Nevertheless, software quality generally continues to fall short of expectations, and softw...
Tom Mens, Michel Wermelinger, Stéphane Duca...
KBSE
2007
IEEE
15 years 9 months ago
A dynamic birthmark for java
Code theft is a threat for companies that consider code as a core asset. A birthmark can help them to prove code theft by identifying intrinsic properties of a program. Two progra...
David Schuler, Valentin Dallmeier, Christian Lindi...
212
Voted
IUI
2006
ACM
15 years 9 months ago
Splitting rules for graceful degradation of user interfaces
This paper addresses the problem of the graceful degradation of user interfaces where an initial interface is transferred to a smaller platform. It presents a technique for pagina...
Murielle Florins, Francisco Montero Simarro, Jean ...
140
Voted
AVI
2008
15 years 5 months ago
Agent warp engine: formula based shape warping for networked applications
Computer visualization and networking have advanced dramatically over the last few years, partially driven by the exploding video game market. 3D hardware acceleration has reached...
Alexander Repenning, Andri Ioannidou