Sciweavers

1779 search results - page 246 / 356
» Requirements Engineering and Agile Software Development
Sort
View
138
Voted
ESSOS
2009
Springer
15 years 9 months ago
Systematically Eradicating Data Injection Attacks Using Security-Oriented Program Transformations
Injection attacks and their defense require a lot of creativity from attackers and secure system developers. Unfortunately, as attackers rely increasingly on systematic approaches ...
Munawar Hafiz, Paul Adamczyk, Ralph E. Johnson
SDL
2007
192views Hardware» more  SDL 2007»
15 years 6 months ago
OpenComRTOS: An Ultra-Small Network Centric Embedded RTOS Designed Using Formal Modeling
Abstract. OpenComRTOS is one of the few Real-Time Operating Systems (RTOS) for embedded systems that was developed using formal modeling techniques. The goal was to obtain a proven...
Eric Verhulst, Gjalt G. de Jong
KDD
2002
ACM
112views Data Mining» more  KDD 2002»
16 years 5 months ago
From run-time behavior to usage scenarios: an interaction-pattern mining approach
A key challenge facing IT organizations today is their evolution towards adopting e-business practices that gives rise to the need for reengineering their underlying software syst...
Mohammad El-Ramly, Eleni Stroulia, Paul G. Sorenso...
SAC
2009
ACM
15 years 9 months ago
Towards "WYDIWYS" for MIMI using concept analysis
This paper presents a novel software engineering approach for developing a dynamic web interface that meets the quality criterion of “WYDIWYS” - What You Do Is What You See. T...
Jie Dai, Remo Mueller, Jacek Szymanski, Guo-Qiang ...
ISM
2005
IEEE
120views Multimedia» more  ISM 2005»
15 years 10 months ago
MML: A Language for Modeling Interactive Multimedia Applications
The development of highly interactive multimedia applications is still a challenging and complex task. In addition to the application logic multimedia applications typically provi...
Andreas Pleuß