Sciweavers

Share
warning: Creating default object from empty value in /var/www/modules/taxonomy/taxonomy.module on line 1416.
ASWEC
2006
IEEE
12 years 1 months ago
Requirements Capture and Specification for Enterprise Applications: a UML Based Attempt
We propose a software development method for enterprise applications that combines the use of the structural concepts provided by problem frames, and the use of the UML notation. ...
Christine Choppy, Gianna Reggio
ASWEC
2006
IEEE
12 years 1 months ago
A Java Reuse Repository for Eclipse using LSI
Software Reuse is a concept that is frequently mentioned as a way to improve software developers' productivity. However, there are a number of issues that need to be addresse...
Ming-Yang (Jerry) Lin, Robert Amor, Ewan D. Temper...
ASWEC
2006
IEEE
12 years 3 months ago
The Transparent Adaptation Approach to the Development of Awareness Mechanisms for Groupware
Implementing support for group awareness is an essential and challenging process in groupware development. This paper reports our research on developing a Transparent Adaptation (...
Minh Hong Tran, Yun Yang, Gitesh K. Raikundalia
ASWEC
2006
IEEE
12 years 3 months ago
Formal Verification of the IEEE 802.11i WLAN Security Protocol
With the increased usage of wireless LANs (WLANs), businesses and educational institutions are becoming more concerned about wireless network security. The latest WLAN security pr...
Elankayer Sithirasenan, Saad Zafar, Vallipuram Mut...
ASWEC
2006
IEEE
12 years 3 months ago
Compatibility Test for Coordination Aspects of Software Components
Combining third party software components to customer-individual application systems requires first, standardized specification techniques for describing the technical as well as ...
Johannes Maria Zaha, Antonia Albani
ASWEC
2006
IEEE
12 years 3 months ago
Preventing SQL Injection Attacks in Stored Procedures
An SQL injection attack targets interactive web applications that employ database services. These applications accept user inputs and use them to form SQL statements at runtime. D...
Ke Wei, Muthusrinivasan Muthuprasanna, Suraj Kotha...
ASWEC
2006
IEEE
12 years 3 months ago
Evaluating software refactoring tool support
Up to 75% of the costs associated with the development of software systems occur post-deployment during maintenance and evolution. Software refactoring is a process which can sign...
Erica Mealy, Paul A. Strooper
books