Sciweavers

2236 search results - page 112 / 448
» Secure Software Design in Practice
Sort
View
CSCW
1994
ACM
15 years 8 months ago
From Implementation to Design: Tailoring and the Emergence of Systematization in CSCW
In this paper, we look at how people working in a governmental labor inspection agency tailor their shared PC environment. Starting with standard off-the-shelf software, the tailo...
Randall H. Trigg, Susanne Bødker
BCSHCI
2009
15 years 2 months ago
User research in a scientific software development project
The Usable Image project provides usability and user-centred design support to a scientific software development project. OMERO is a complex software application aimed at supporti...
David Sloan, Catriona Macaulay, Paula Forbes, Scot...
WISER
2004
ACM
15 years 10 months ago
Aikido and software engineering
Aikido is a martial art whose core philosophy is about conflict resolution and taking care of our opponents and ourselves. My experience, and the experience of fellow aikidoists w...
David Socha
ICDCSW
2005
IEEE
15 years 10 months ago
Specifying Information-Flow Controls
The core problem in risk analysis - determining exploitable paths between attackers and system assets is essentially a problem of determining information flow. It is relatively st...
Howard Chivers, Jeremy Jacob
XPU
2004
Springer
15 years 9 months ago
Towards a Proper Integration of Large Refactorings in Agile Software Development
Refactoring is a key element of many agile software development methods. While most developers associate small design changes with the term refactoring (as described by Martin Fowl...
Martin Lippert