Sciweavers

7380 search results - page 1381 / 1476
» Engineering Software Intensive Systems
Sort
View
NLDB
2007
Springer
15 years 4 months ago
Treatment of Passive Voice and Conjunctions in Use Case Documents
Abstract. Requirements engineering, the first phase of any software development project, is the Achilles’ heel of the whole development process, as requirements documents are of...
Leonid Kof
SIGPLAN
1998
14 years 9 months ago
The DrScheme Project: An Overview
DrScheme provides a graphical user interface for editing and interactively evaluating Scheme programs on all major graphical platforms (Windows 95/nt, MacOs, Unix/X). The environm...
Matthias Felleisen, Robert Bruce Findler, Matthew ...
EUROSYS
2009
ACM
15 years 7 months ago
Pointless tainting?: evaluating the practicality of pointer tainting
This paper evaluates pointer tainting, an incarnation of Dynamic Information Flow Tracking (DIFT), which has recently become an important technique in system security. Pointer tai...
Asia Slowinska, Herbert Bos
EUROSYS
2009
ACM
15 years 7 months ago
Privacy-preserving browser-side scripting with BFlow
Some web sites provide interactive extensions using browser scripts, often without inspecting the scripts to verify that they are benign and bug-free. Others handle users’ con...
Alexander Yip, Neha Narula, Maxwell N. Krohn, Robe...
EUROSYS
2008
ACM
15 years 7 months ago
Protectit: trusted distributed services operating on sensitive data
Protecting shared sensitive information is a key requirement for today’s distributed applications. Our research uses virtualization technologies to create and maintain trusted d...
Jiantao Kong, Karsten Schwan, Min Lee, Mustaque Ah...
« Prev « First page 1381 / 1476 Last » Next »