Sciweavers

2236 search results - page 143 / 448
» Secure Software Design in Practice
Sort
View
139
Voted
IBERAMIA
1998
Springer
15 years 8 months ago
The "Semantics" of Evolution: Trajectories and Trade-offs in Design Space and Niche Space
This paper 1 attempts to characterise a unifying overview of the practice of software engineers, AI designers, developers of evolutionary forms of computation, designers of adapti...
Aaron Sloman
JOT
2006
106views more  JOT 2006»
15 years 4 months ago
ABS++: Assertion Based Subtyping in C++
For software engineering to meet today's challenges, well designed reuse and composition mechanisms must be established in both theory and practice. Starting roughly ten year...
Herbert Toth
CCS
2009
ACM
15 years 8 months ago
On lightweight mobile phone application certification
Users have begun downloading an increasingly large number of mobile phone applications in response to advancements in handsets and wireless networks. The increased number of appli...
William Enck, Machigar Ongtang, Patrick Drew McDan...
ICSE
2001
IEEE-ACM
15 years 8 months ago
David L. Parnas Symposium
David L. Parnas is one of the grandmasters of software engineering. His academic research and industrial collaborations have exerted far-reaching influence on software design and ...
Daniel Hoffman, David M. Weiss
EIT
2008
IEEE
15 years 6 months ago
Experiments in attacking FPGA-based embedded systems using differential power analysis
Abstract--In the decade since the concept was publicly introduced, power analysis attacks on cryptographic systems have become an increasingly studied topic in the computer securit...
Song Sun, Zijun Yan, Joseph Zambreno