Sciweavers

3441 search results - page 499 / 689
» Provenance of Software Development Processes
Sort
View
MICRO
2008
IEEE
124views Hardware» more  MICRO 2008»
15 years 9 months ago
SHARK: Architectural support for autonomic protection against stealth by rootkit exploits
Rootkits have become a growing concern in cyber-security. Typically, they exploit kernel vulnerabilities to gain root privileges of a system and conceal malware’s activities fro...
Vikas R. Vasisht, Hsien-Hsin S. Lee
159
Voted
ISESE
2006
IEEE
15 years 9 months ago
A goal question metric based approach for efficient measurement framework definition
In software engineering, measurements can be used to monitor, understand and improve software processes as well as products and resource utilization. Commonly, measurement framewo...
Patrik Berander, Per Jönsson
155
Voted
KBSE
1995
IEEE
15 years 7 months ago
A Model for Decision Maintenance in the WinWin Collaboration Framework
Cost-effective engineering and evolution of complex software must involve the different stakeholders concurrently and collaboratively. The hard problem is providing computer suppo...
Prasanta K. Bose
JUCS
2008
115views more  JUCS 2008»
15 years 3 months ago
Capturing Interaction Requirements in a Model Transformation Technology Based on MDA
: Currently, many models are used to capture functional software requirements. However, the Software Engineering community has faded interaction requirements into the background, d...
José Ignacio Panach, Sergio España, ...
115
Voted
WWW
2007
ACM
16 years 4 months ago
Integrating value-based requirement engineering models to webml using vip business modeling framework
Requirement engineering (RE) is emerging as an increasingly important discipline for supporting Web application development, as these are designed to satisfy diverse stakeholder n...
Farooque Azam, Zhang Li, Rashid Ahmad