Sciweavers

270 search results - page 37 / 54
» Building Software Securely from the Ground Up
Sort
View
WOSP
2005
ACM
15 years 3 months ago
Performance by unified model analysis (PUMA)
Evaluation of non-functional properties of a design (such as performance, dependability, security, etc.) can be enabled by design annotations specific to the property to be evalua...
C. Murray Woodside, Dorina C. Petriu, Dorin Bogdan...
ICICS
2007
Springer
15 years 4 months ago
Drive-By Pharming
Inexpensive broadband routers are a popular way for people to create an internal, and sometimes wireless, network in their homes. By purchasing such a router and plugging it in, t...
Sid Stamm, Zulfikar Ramzan, Markus Jakobsson
CSEE
2008
Springer
14 years 11 months ago
Improving Knowledge Acquisition in Capstone Projects Using Learning Spaces for Experiential Learning
Students have to cope with new technologies, changing environments, and conflicting changes in capstone projects. They often lack practical experience, which might lead to failing...
Eric Ras, Jörg Rech
SOSP
2003
ACM
15 years 6 months ago
Terra: a virtual machine-based platform for trusted computing
We present a flexible architecture for trusted computing, called Terra, that allows applications with a wide range of security requirements to run simultaneously on commodity har...
Tal Garfinkel, Ben Pfaff, Jim Chow, Mendel Rosenbl...
ISM
2008
IEEE
273views Multimedia» more  ISM 2008»
14 years 10 months ago
Understanding Data-Driven Decision Support Systems
It is important for managers and Information Technology professionals to understand data-driven decision support systems and how such systems can provide business intelligence and ...
Daniel J. Power