Sciweavers

33 search results - page 3 / 7
» Induced intentional software views
Sort
View
CTRSA
2012
Springer
229views Cryptology» more  CTRSA 2012»
12 years 1 months ago
Practical Realisation and Elimination of an ECC-Related Software Bug Attack
We analyse and exploit implementation features in OpenSSL version 0.9.8g which permit an attack against ECDH-based functionality. The attack, although more general, can recover the...
Billy Bob Brumley, Manuel Barbosa, Dan Page, Frede...
METRICS
2005
IEEE
13 years 11 months ago
Acceptance Issues in Metrics Program Implementation
Software process improvement initiatives such as metrics programs have a high failure rate during their assimilation in a software organization. Social and individual issues are s...
Medha Umarji, Henry Emurian
IUI
2006
ACM
14 years 21 hour ago
Automatic construction of personalized customer interfaces
Interface personalization can improve a user’s performance and subjective impression of interface quality and responsiveness. Personalization is difficult to implement as it req...
Robert Price, Russell Greiner, Gerald Häubl, ...
INFSOF
2007
116views more  INFSOF 2007»
13 years 6 months ago
An analysis of the most cited articles in software engineering journals - 2000
Citations and related work are crucial in any research to position the work and to build on the work of others. A high citation count is an indication of the influence of speciï¬...
Claes Wohlin
EUROSYS
2009
ACM
14 years 3 months ago
Tralfamadore: unifying source code and execution experience
Program source is an intermediate representation of software; it lies between a developer’s intention and the hardware’s execution. Despite advances in languages and developme...
Geoffrey Lefebvre, Brendan Cully, Michael J. Feele...