Sciweavers

1951 search results - page 271 / 391
» Decoupling Change from Design
Sort
View
APNOMS
2009
Springer
15 years 10 months ago
IP Prefix Hijacking Detection Using Idle Scan
The Internet is comprised of a lot of interconnected networks communicating reachability information using BGP. Due to the design based on trust between networks, IP prefix hijacki...
Seong-Cheol Hong, Hong-Taek Ju, James W. Hong
128
Voted
CSEE
2009
Springer
15 years 10 months ago
Software Engineering Education for Bioinformatics
As software engineering educators, it is important for us to realize the increasing domainspecificity of software, and incorporate these changes in our design of teaching material...
Medha Umarji, Carolyn B. Seaman, Akif Günes K...
ISEUD
2009
Springer
15 years 10 months ago
End-User Development of Enterprise Widgets
Companies are operating in a dynamic environment, resulting in a continuous need of adapting used information systems to changing business processes and associated information need...
Michael Spahn, Volker Wulf
119
Voted
IWSEC
2009
Springer
15 years 10 months ago
Tamper-Tolerant Software: Modeling and Implementation
Abstract. Common software-protection systems attempt to detect malicious observation and modification of protected applications. Upon tamper detection, anti-hacking code may produ...
Mariusz H. Jakubowski, Chit Wei Saw, Ramarathnam V...
137
Voted
SLE
2009
Springer
15 years 10 months ago
ScalaQL: Language-Integrated Database Queries for Scala
One of the most ubiquitous elements of modern computing is the relational database. Very few modern applications are created without some sort of database backend. Unfortunately, r...
Daniel Spiewak, Tian Zhao