Sciweavers

1654 search results - page 78 / 331
» Comparing Two Software Design Process Theories
Sort
View
ICS
2003
Tsinghua U.
15 years 3 months ago
AEGIS: architecture for tamper-evident and tamper-resistant processing
We describe the architecture for a single-chip aegis processor which can be used to build computing systems secure against both physical and software attacks. Our architecture ass...
G. Edward Suh, Dwaine E. Clarke, Blaise Gassend, M...
89
Voted
WOSP
2004
ACM
15 years 3 months ago
Experimenting different software architectures performance techniques: a case study
In this paper we describe our experience in performance analysis of the software architecture of the NICE case study which is responsible for providing several secure communicatio...
Simonetta Balsamo, Moreno Marzolla, Antinisca Di M...
64
Voted
ICDS
2009
IEEE
15 years 5 months ago
An Iterative Method to Design Traffic Flow Models
Existing traffic flow modeling theory lacks of guidelines to construct traffic flow models from scratch. In addition, traffic flow models are mainly analyzed with computer simulat...
Juan Manuel González-Calleros, Jorge Mart&i...
KBSE
2008
IEEE
15 years 4 months ago
Effort Estimation in Capturing Architectural Knowledge
Capturing and using design rationale is becoming a hot topic for software architects, as architectural design decisions are now considered first class entities that should be reco...
Rafael Capilla, Francisco Nava, Carlos Carrillo
TSE
2010
280views more  TSE 2010»
14 years 8 months ago
How Reliable Are Systematic Reviews in Empirical Software Engineering?
BACKGROUND – the systematic review is becoming a more commonly employed research instrument in empirical software engineering. Before undue reliance is placed on the outcomes of...
Stephen G. MacDonell, Martin J. Shepperd, Barbara ...