Sciweavers

1654 search results - page 106 / 331
» Comparing Two Software Design Process Theories
Sort
View
103
Voted
ACSAC
2004
IEEE
15 years 8 months ago
The Trustworthy Computing Security Development Lifecycle
This paper discusses the Trustworthy Computing Security Development Lifecycle (or simply the SDL), a process that Microsoft has adopted for the development of software that needs ...
Steven B. Lipner
SAC
2010
ACM
15 years 11 months ago
SE-155 DBSA: a device-based software architecture for data mining
In this paper a new architecture for a variety of data mining tasks is introduced. The Device-Based Software Architecture (DBSA) is a highly portable and generic data mining softw...
Janne Kätevä, Perttu Laurinen, Taneli Ra...
154
Voted
IPPS
2006
IEEE
15 years 11 months ago
Monitoring remotely executing shared memory programs in software DSMs
Peer-to-Peer (P2P) cycle sharing over the Internet has become increasingly popular as a way to share idle cycles. A fundamental problem faced by P2P cycle sharing systems is how t...
Long Fei, Xing Fang, Y. Charlie Hu, Samuel P. Midk...
AROBOTS
2008
84views more  AROBOTS 2008»
15 years 5 months ago
Top-down vs bottom-up methodologies in multi-agent system design
Traditionally, two alternative design design approaches have been available to engineers: top-down and bottom-up. In the top-down approach, the design process starts with specifyin...
Valentino Crespi, Aram Galstyan, Kristina Lerman
149
Voted
CHI
2007
ACM
16 years 5 months ago
Exploring affective design for physical controls
Physical controls such as knobs, sliders, and buttons are experiencing a revival as many computing systems progress from personal computing architectures towards ubiquitous comput...
Colin Swindells, Karon E. MacLean, Kellogg S. Boot...