Sciweavers

488 search results - page 47 / 98
» ST-Tool: A CASE Tool for Security Requirements Engineering
Sort
View
ICSE
2010
IEEE-ACM
15 years 1 months ago
EMFStore: a model repository for EMF models
Models need to be put under version control to facilitate collaboration and to control change. EMFStore is a Software Configuration Management system tailored to the specific re...
Maximilian Koegel, Jonas Helming
MSR
2009
ACM
15 years 4 months ago
On the transfer of evolutionary couplings to industry
In this paper, we describe a case study at Philips Healthcare MRI focusing on evolutionary couplings, i.e., a technique to infer relationships among modules by analyzing their his...
Piërre van de Laar
ACSAC
2007
IEEE
15 years 6 months ago
Secure Input for Web Applications
The web is an indispensable part of our lives. Every day, millions of users purchase items, transfer money, retrieve information and communicate over the web. Although the web is ...
Martin Szydlowski, Christopher Kruegel, Engin Kird...
DEPCOS
2008
IEEE
96views Hardware» more  DEPCOS 2008»
15 years 6 months ago
Standards Conformity Framework in Comparison with Contemporary Methods Supporting Standards Application
Achieving and assessing conformity with standards and compliance with various sets of requirements generates significant costs for contemporary economies. Great deal of this is sp...
Lukasz Cyra, Janusz Górski
WISTP
2010
Springer
15 years 6 months ago
Fraud Detection for Voice over IP Services on Next-Generation Networks
The deployment of Next-Generation Networks (NGN) is a challenge that requires integrating heterogeneous services into a global system of All-IP telecommunications. These networks c...
Igor Ruiz-Agundez, Yoseba K. Penya, Pablo Garcia B...