Sciweavers

6 search results - page 1 / 2
» ijseke 2007
Sort
View
IJSEKE
2007
50views more  IJSEKE 2007»
13 years 5 months ago
Secure Tropos: a Security-Oriented Extension of the Tropos Methodology
Haralambos Mouratidis, Paolo Giorgini
IJSEKE
2007
77views more  IJSEKE 2007»
13 years 5 months ago
Guest Editors: Introduction
Kang Zhang, George Spanoudakis, Giuseppe Visaggio
IJSEKE
2007
61views more  IJSEKE 2007»
13 years 5 months ago
Detecting Fault Modules Using Bioinformatics Techniques
Gregor Stiglic, Matej Mertik, Peter Kokol, Maurizi...
IJSEKE
2007
64views more  IJSEKE 2007»
13 years 5 months ago
Protect Virtual Property in Online Gaming System
Ronggong Song, Larry Korba, George Yee, Ying-Chieh...
IJSEKE
2007
52views more  IJSEKE 2007»
13 years 5 months ago
Software Architecture Decomposition Using Attributes
Software architectural design has an enormous effect on downstream software artifacts. Decomposition of functions for the final system is one of the critical steps in software arch...
Chung-Horng Lung, Xia Xu, Marzia Zaman