Sciweavers

726 search results - page 85 / 146
» Formal Requirements Engineering: Learning from the Students
Sort
View
SIGSOFT
2002
ACM
16 years 17 days ago
Secure systems development based on the common criteria: the PalME project
Security is a very important issue in information processing, especially in open network environments like the Internet. The Common Criteria (CC) is the standard requirements cata...
Monika Vetterling, Guido Wimmel, Alexander K. Wi&s...
CAI
2010
Springer
14 years 9 months ago
SMA - The Smyle Modeling Approach
Abstract. This paper introduces the model-based software development lifecycle model SMA--the Smyle Modeling Approach--which is centered around Smyle. Smyle is a dedicated learning...
Benedikt Bollig, Joost-Pieter Katoen, Carsten Kern...
DMIN
2010
262views Data Mining» more  DMIN 2010»
14 years 10 months ago
SMO-Style Algorithms for Learning Using Privileged Information
Recently Vapnik et al. [11, 12, 13] introduced a new learning model, called Learning Using Privileged Information (LUPI). In this model, along with standard training data, the tea...
Dmitry Pechyony, Rauf Izmailov, Akshay Vashist, Vl...
APSEC
2002
IEEE
15 years 4 months ago
Contextual Matching of Software Library Components
Many automated programming environments construct software by integrating predefined components from a software library. A fundamental challenge in this process is to match the p...
Colin J. Fidge
INFSOF
2007
83views more  INFSOF 2007»
14 years 11 months ago
On the design of more secure software-intensive systems by use of attack patterns
Retrofitting security implementations to a released software-intensive system or to a system under development may require significant architectural or coding changes. These late...
Michael Gegick, Laurie Williams