Sciweavers

2236 search results - page 110 / 448
» Secure Software Design in Practice
Sort
View
SIGSOFT
2007
ACM
16 years 5 months ago
SLEDE: lightweight verification of sensor network security protocol implementations
Finding flaws in security protocol implementations is hard. Finding flaws in the implementations of sensor network security protocols is even harder because they are designed to p...
Youssef Hanna
CODES
2003
IEEE
15 years 9 months ago
Security wrappers and power analysis for SoC technologies
Future wireless internet enabled devices will be increasingly powerful supporting many more applications including one of the most crucial, security. Although SoCs offer more resi...
Catherine H. Gebotys, Y. Zhang
IADIS
2004
15 years 5 months ago
New Perspectives on Teaching and Learning Software Systems Development in Large Groups - Telecollaboration
This paper outlines new perspectives on the teaching and learning of software systems development in large groups based on a newly designed, final year, Software Systems Analysis ...
Zenon Chaczko, David J. Davis, Craig Scott
KBSE
2006
IEEE
15 years 10 months ago
Modularity Analysis of Logical Design Models
Traditional design representations are inadequate for generalized reasoning about modularity in design and its technical and economic implications. We have developed an architectu...
Yuanfang Cai, Kevin J. Sullivan
CSEE
2003
Springer
15 years 9 months ago
An Experimental Card Game for Teaching Software Engineering
The typical software engineering course consists of lectures in which concepts and theories are conveyed, along with a small “toy” software engineering project which attempts ...
Alex Baker, Emily Oh Navarro, André van der...