Sciweavers

1327 search results - page 37 / 266
» Cost-Benefit Analysis of Software Development Techniques and...
Sort
View
IWPC
2005
IEEE
15 years 3 months ago
A Qualitative Comparison of Three Aspect Mining Techniques
The fact that crosscutting concerns (aspects) cannot be well modularized in object oriented software is an impediment to program comprehension: the implementation of a concern is ...
Mariano Ceccato, Marius Marin, Kim Mens, Leon Moon...
HICSS
2009
IEEE
126views Biometrics» more  HICSS 2009»
15 years 4 months ago
Computational Evaluation of Software Security Attributes
In the current state of practice, security properties of software systems are typically assessed through subjective, labor-intensive human evaluation. Moreover, much of the quanti...
Gwendolyn H. Walton, Thomas A. Longstaff, Richard ...
ISSRE
2003
IEEE
15 years 3 months ago
Early Warning of Failures through Alarm Analysis - A Case Study in Telecom Voice Mail Systems
-- This paper presents three principles for alarm analysis to develop early warnings of failure. The concepts are illustrated with real data and experience drawn from Comverse Voic...
Dorron Levy, Ram Chillarege
WISER
2004
ACM
15 years 3 months ago
Aikido and software engineering
Aikido is a martial art whose core philosophy is about conflict resolution and taking care of our opponents and ourselves. My experience, and the experience of fellow aikidoists w...
David Socha
76
Voted
ISW
2000
Springer
15 years 1 months ago
Towards a Practical Secure Framework for Mobile Code Commerce
Securing the mobile code commerce is not an easy task at all. We propose in this paper a framework to tackle this problem. In a first step, we analyse the general issues that must ...
Gaël Hachez, Laurent Den Hollander, Mehrdad J...