Sciweavers

4029 search results - page 180 / 806
» Experience with Software Watermarking
Sort
View
ICSE
2004
IEEE-ACM
16 years 5 months ago
Evidence-Based Software Engineering
Objective: Our objective is to describe how software engineering might benefit from an evidence-based approach and to identify the potential difficulties associated with the appro...
Barbara A. Kitchenham, Magne Jørgensen, Tor...
154
Voted
ESSOS
2009
Springer
15 years 11 months ago
Protection Poker: Structuring Software Security Risk Assessment and Knowledge Transfer
Discovery of security vulnerabilities is on the rise. As a result, software development teams must place a higher priority on preventing the injection of vulnerabilities in softwar...
Laurie Williams, Michael Gegick, Andrew Meneely
SIGCSE
2006
ACM
131views Education» more  SIGCSE 2006»
15 years 11 months ago
An undergraduate course on software bug detection tools and techniques
The importance of software bug detection tools is high with the constant threat of malicious activity. Companies are increasingly relying on software bug detection tools to catch ...
Eric Larson
APLAS
2004
ACM
15 years 10 months ago
Detecting Software Defects in Telecom Applications Through Lightweight Static Analysis: A War Story
In safety-critical and high-reliability systems, software development and maintenance are costly endeavors. The cost can be reduced if software errors can be identified through au...
Tobias Lindahl, Konstantinos F. Sagonas
ICSE
2001
IEEE-ACM
15 years 9 months ago
Effective Software Architecture Design: From Global Analysis to UML Descriptions
It is now generally accepted that separating software architecture into multiple views can help in reducing complexity and in making sound decisions about design trade-offs. Our f...
Robert L. Nord, Daniel J. Paulish, Dilip Soni, Chr...