Sciweavers

270 search results - page 5 / 54
» Building Software Securely from the Ground Up
Sort
View
ACMSE
2004
ACM
15 years 1 months ago
Methods for the prevention, detection and removal of software security vulnerabilities
Over the past decade, the need to build secure software has become a dominant goal in software development. Consequently, software researchers and practitioners have identified wa...
Jay-Evan J. Tevis, John A. Hamilton Jr.
SEW
2007
IEEE
15 years 4 months ago
A Generative Approach to Building a Framework for Hard Real-Time Applications
The communication and tasking infrastructure of a realtime application makes up a significant portion of any embedded control system. Traditionally, the tasking and communication...
Irfan Hamid, Elie Najm, Jérôme Hugues
AGENTS
2000
Springer
15 years 2 months ago
Open Source, Standards and Scaleable Agencies
Numerous agencies and agent systems are being developed or portrayed as vehicles to deliver novel types of e-commerce services to users. However service agents in one agency are p...
Stefan Poslad, Phil Buckle, Rob Hadingham
AGILEDC
2003
IEEE
15 years 3 months ago
It's More than Just Toys and Food: Leading Agile Development in an Enterprise-Class Start-Up
One of the myths of Agile Development is that selforganizing teams do not need direction. The agile development movement focuses primarily on programmers – programmers should do...
Joseph A. Blotner
MOBISYS
2005
ACM
15 years 9 months ago
Shake them up!: a movement-based pairing protocol for CPU-constrained devices
This paper presents a new pairing protocol that allows two CPU-constrained wireless devices Alice and Bob to establish a shared secret at a very low cost. To our knowledge, this i...
Claude Castelluccia, Pars Mutaf