Sciweavers

553 search results - page 42 / 111
» An examination of software engineering work practices
Sort
View
CCS
2010
ACM
14 years 10 months ago
Practical leakage-resilient pseudorandom generators
Cryptographic systems and protocols are the core of many Internet security procedures (such as SSL, SSH, IPSEC, DNSSEC, secure mail, etc.). At the heart of all cryptographic funct...
Yu Yu, François-Xavier Standaert, Olivier P...
AOSD
2006
ACM
15 years 7 months ago
Using aspects to support the software process: XP over Eclipse
Usually, aspects enhance a software product by being composed - or woven - into it. Here, on the other hand, we use aspects to support the software development process itself. The...
Oren Mishali, Shmuel Katz
ACE
2004
221views Education» more  ACE 2004»
15 years 3 months ago
Personal Software Process in the Database Course
This paper describes the integration of the Personal Software Process (PSP) into an introductory database course in an MIS curriculum. PSP is a highly disciplined, process-based a...
William I. Bullers Jr.
SOFTVIS
2010
ACM
14 years 12 months ago
Visual comparison of software architectures
Reverse engineering methods produce different descriptions of software architectures. In this work we analyze and define the task of exploring and comparing these descriptions. ...
Fabian Beck, Stephan Diehl
WCRE
2009
IEEE
15 years 8 months ago
Static Detection of Disassembly Errors
—Static disassembly is a crucial first step in reverse engineering executable files, and there is a considerable body of work in reverse-engineering of binaries, as well as are...
Nithya Krishnamoorthy, Saumya K. Debray, Keith Fli...