Sciweavers

3920 search results - page 334 / 784
» Challenges in Software Evolution
Sort
View
COMPSAC
2009
IEEE
15 years 11 months ago
On Information Flow Forensics in Business Application Scenarios
To-date, security analysis techniques focus on the explicit access to data, thereby neglecting information flows happening over covert channels. As a result, critical business so...
Claus Wonnemann, Rafael Accorsi, Günter M&uum...
COMPSAC
2007
IEEE
15 years 11 months ago
Qianxiang Wang
Software that runs in the network environment is facing with many challenges. One of them is the dynamic feature of the network. To keep the quality of service, the service entity...
Qianxiang Wang
ISPW
2007
IEEE
15 years 11 months ago
Coping with the Cone of Uncertainty: An Empirical Study of the SAIV Process Model
There is large uncertainty with the software cost in the early stages of software development due to requirement volatility, incomplete understanding of product domain, reuse oppor...
Da Yang, Barry W. Boehm, Ye Yang, Qing Wang, Mings...
OTM
2007
Springer
15 years 11 months ago
Compiler Assisted Elliptic Curve Cryptography
Abstract. Although cryptographic implementation tasks are often undertaken by expert programmers, a plethora of performance and security driven options, as well as more mundane sof...
Manuel Barbosa, Andrew Moss, Dan Page
ASWEC
2006
IEEE
15 years 11 months ago
The Transparent Adaptation Approach to the Development of Awareness Mechanisms for Groupware
Implementing support for group awareness is an essential and challenging process in groupware development. This paper reports our research on developing a Transparent Adaptation (...
Minh Hong Tran, Yun Yang, Gitesh K. Raikundalia