Sciweavers

1654 search results - page 106 / 331
» Comparing Two Software Design Process Theories
Sort
View
79
Voted
ACSAC
2004
IEEE
15 years 6 months ago
The Trustworthy Computing Security Development Lifecycle
This paper discusses the Trustworthy Computing Security Development Lifecycle (or simply the SDL), a process that Microsoft has adopted for the development of software that needs ...
Steven B. Lipner
128
Voted
SAC
2010
ACM
15 years 9 months ago
SE-155 DBSA: a device-based software architecture for data mining
In this paper a new architecture for a variety of data mining tasks is introduced. The Device-Based Software Architecture (DBSA) is a highly portable and generic data mining softw...
Janne Kätevä, Perttu Laurinen, Taneli Ra...
IPPS
2006
IEEE
15 years 8 months ago
Monitoring remotely executing shared memory programs in software DSMs
Peer-to-Peer (P2P) cycle sharing over the Internet has become increasingly popular as a way to share idle cycles. A fundamental problem faced by P2P cycle sharing systems is how t...
Long Fei, Xing Fang, Y. Charlie Hu, Samuel P. Midk...
AROBOTS
2008
84views more  AROBOTS 2008»
15 years 2 months ago
Top-down vs bottom-up methodologies in multi-agent system design
Traditionally, two alternative design design approaches have been available to engineers: top-down and bottom-up. In the top-down approach, the design process starts with specifyin...
Valentino Crespi, Aram Galstyan, Kristina Lerman
CHI
2007
ACM
16 years 3 months ago
Exploring affective design for physical controls
Physical controls such as knobs, sliders, and buttons are experiencing a revival as many computing systems progress from personal computing architectures towards ubiquitous comput...
Colin Swindells, Karon E. MacLean, Kellogg S. Boot...