Sciweavers

212 search results - page 33 / 43
» Risk Assessment and Integrity in System Design
Sort
View
CSCW
2012
ACM
13 years 5 months ago
Shepherding the crowd yields better work
Micro-task platforms provide massively parallel, ondemand labor. However, it can be difficult to reliably achieve high-quality work because online workers may behave irresponsibly...
Steven Dow, Anand Pramod Kulkarni, Scott R. Klemme...
JOT
2010
108views more  JOT 2010»
14 years 8 months ago
Dynamic adaptability with .NET service components
In self-adaptive systems components are dynamically modified according to the execution environment requirement, where each component is a probable point of failure. Existing appr...
Arun Mishra, A. K. Misra
89
Voted
DATE
2009
IEEE
116views Hardware» more  DATE 2009»
15 years 4 months ago
An MDE methodology for the development of high-integrity real-time systems
—This paper reports on experience gained and lessons learned from an intensive investigation of model-driven engineering methodology and technology for application to high-integr...
Silvia Mazzini, Stefano Puri, Tullio Vardanega
71
Voted
WETICE
2003
IEEE
15 years 2 months ago
Software Security Checklist for the Software Life Cycle
A formal approach to security in the software life cycle is essential to protect corporate resources. However, little thought has been given to this aspect of software development...
David P. Gilliam, Thomas L. Wolfe, Joseph S. Sheri...
82
Voted
ACSAC
2007
IEEE
15 years 3 months ago
Centralized Security Labels in Decentralized P2P Networks
This paper describes the design of a peer-to-peer network that supports integrity and confidentiality labeling of shared data. A notion of data ownership privacy is also enforced...
Nathalie Tsybulnik, Kevin W. Hamlen, Bhavani M. Th...