Sciweavers

CTRSA
2012
Springer
229views Cryptology» more  CTRSA 2012»
12 years 8 months ago
Practical Realisation and Elimination of an ECC-Related Software Bug Attack
We analyse and exploit implementation features in OpenSSL version 0.9.8g which permit an attack against ECDH-based functionality. The attack, although more general, can recover the...
Billy Bob Brumley, Manuel Barbosa, Dan Page, Frede...
IJMMS
2008
90views more  IJMMS 2008»
14 years 21 days ago
Pair programming and the mysterious role of the navigator
Computer programming is generally understood to be highly challenging and since its inception a wide range of approaches, tools and methodologies have been developed to assist in ...
Sallyann Bryant, Pablo Romero, Benedict du Boulay
EHCI
2004
14 years 2 months ago
Supporting Group Awareness in Distributed Software Development
Abstract. Collaborative software development presents a variety of coordination and communication problems, particularly when teams are geographically distributed. One reason for t...
Carl Gutwin, Kevin A. Schneider, David Paquette, R...
MKWI
2008
143views Business» more  MKWI 2008»
14 years 2 months ago
Designing and Implementing a Tool for Distributed Collaborative Traceability and Rationale Management
: Traceability and rationale management are highly important--especially in distributed collaborative software development projects due to a lack of mutual awareness and informal c...
Tobias Hildenbrand, Michael Geisser, Lars Klimpke,...
TMRA
2005
Springer
14 years 6 months ago
Collaborative Software Development and Topic Maps
This work-in-progress report subsumes our ongoing research to develop a Topic Maps centric, modularised system which supports collaborative software development by combining the me...
Markus Ueberall, Oswald Drobnik
SIGSOFT
2004
ACM
15 years 1 months ago
How a good software practice thwarts collaboration: the multiple roles of APIs in software development
The principle of information hiding has been very influential in software engineering since its inception in 1972. This principle prescribes that software modules hide implementat...
Cleidson R. B. de Souza, David F. Redmiles, Li-Te ...