Sciweavers

10575 search results - page 1958 / 2115
» Programming Languages
Sort
View
CIIT
2004
132views Communications» more  CIIT 2004»
14 years 11 months ago
A vulnerability taxonomy for network protocols: Corresponding engineering best practice countermeasures
Vulnerabilities arising from in-secure network protocol design and implementation present significant challenges to the network protocol community. Yet much of the focus is on sof...
Venkat Pothamsetty, Bora A. Akyol
DAGSTUHL
2004
14 years 11 months ago
Testing with Functions as Specifications
Although computer systems penetrate all facets of society, the software running those systems may contain many errors. Producing high quality software appears to be difficult and v...
Pieter W. M. Koopman
I3E
2003
100views Business» more  I3E 2003»
14 years 11 months ago
Use of Models and Modelling Techniques for Service Development
: E-applications are increasingly being composed from individual services that can be realized with different technologies, such as, e.g., Web Services and standard component techn...
Luís Ferreira Pires, Marten van Sinderen, C...
TREC
2001
14 years 11 months ago
Oracle at TREC 10: Filtering and Question-Answering
: Oracle's objective in TREC-10 was to study the behavior of Oracle information retrieval in previously unexplored application areas. The software used was Oracle9i Text[1], O...
Shamin Alpha, Paul Dixon, Ciya Liao, Changwen Yang
WICSA
2001
14 years 11 months ago
Focus: A Light-Weight, Incremental Approach to Software Architecture Recovery and Evolution
During the past decade, object-orientation (OO) has become the dominant software development methodology, accompanied by a number of modeling notations, programming languages, and...
Lei Ding, Nenad Medvidovic
« Prev « First page 1958 / 2115 Last » Next »