Sciweavers

2212 search results - page 174 / 443
» Automated software wrapping
Sort
View
HICSS
2007
IEEE
125views Biometrics» more  HICSS 2007»
15 years 10 months ago
Web Application Scanners: Definitions and Functions
There are many commercial software security assurance tools that claim to detect and prevent vulnerabilities in application software. However, a closer look at the tools often lea...
Elizabeth Fong, Vadim Okun
COMPSAC
2006
IEEE
15 years 10 months ago
Just Enough Requirements Traceability
Even though traceability is legally required in most safety critical software applications and is a recognized component of many software process improvement initiatives, organiza...
Jane Cleland-Huang
WCRE
2002
IEEE
15 years 9 months ago
Relating Expectations to Automatically Recovered Design Patterns
At MITRE we are developing tools to aid analysts in assessing the operational usability and quality of object-oriented code. Our tools statically examine source code, automaticall...
Angel Asencio, Sam Cardman, David Harris, Ellen La...
SIGSOFT
2008
ACM
15 years 3 months ago
Definition and modeling of process using object orientation
Software development processes can be represented as objects because they and the elements that compose them have attributes and operations, can be linked by relationships and hav...
Beatriz Terezinha Borsoi, Jorge Luis Risco Becerra
COMPSAC
2003
IEEE
15 years 9 months ago
A Middleware Service for Secure Group Communication in Mobile Ad Hoc Networks
Secure group communication in mobile ad hoc networks is often dynamic and impromptu, and thus requires efficient and automated secure group management and seamless combination of ...
Stephen S. Yau, Xinyu Zhang