Sciweavers

2236 search results - page 129 / 448
» Secure Software Design in Practice
Sort
View
CHI
2009
ACM
16 years 5 months ago
Understanding how and why open source contributors use diagrams in the development of Ubuntu
Some of the most interesting differences between Open Source Software (OSS) development and commercial colocated software development lie in the communication and collaboration pr...
Koji Yatani, Eunyoung Chung, Carlos Jensen, Khai N...
KBSE
2005
IEEE
15 years 10 months ago
Designing and implementing a family of intrusion detection systems
Intrusion detection systems are distributed applications that analyze the events in a networked system to identify malicious behavior. The analysis is performed using a number of ...
Richard A. Kemmerer
COMPSAC
2009
IEEE
15 years 11 months ago
Towards Validating Security Protocol Deployment in the Wild
As computing technology becomes increasingly pervasive and interconnected, mobility leads to shorter-lasting relationships between end-points with many different security requirem...
Luca Compagna, Ulrich Flegel, Volkmar Lotz
CADUI
2004
15 years 5 months ago
A Design Toolkit for Hypermedia Applications Based on Ariadne Development Method
The development process of hypermedia applications implies very specific problems mainly related, first, to the use of navigational structures, interactive behaviours and multimed...
Susana Montero, Camino Fernández, Juan Manu...
HICSS
1999
IEEE
137views Biometrics» more  HICSS 1999»
15 years 8 months ago
A Methodology for Evaluating and Selecting Data Mining Software
As data mining evolves and matures more and more businesses are incorporating this technology into their business practices. However, currently data mining and decision support so...
Ken W. Collier, Donald Sautter, Curt Marjaniemi, B...