Sciweavers

2236 search results - page 145 / 448
» Secure Software Design in Practice
Sort
View
IJBC
2008
88views more  IJBC 2008»
15 years 4 months ago
Characterizing the Structural Quality of General Complex Software Networks
nodes and their interactions are abstract edges. This paper attempts to characterize the structural quality of complex software networks. We propose to use a novel statistical meas...
Jing Liu, Jinhu Lu, Keqing He, Bing Li, Chi Kong T...
AKA
2004
15 years 5 months ago
Towards a Generic Framework for Evaluating Component-Based Software Architectures
Abstract: The evaluation of software architectures is crucial to ensure that the design of software systems meets the requirements. We present a generic methodical framework that e...
Steffen Becker, Viktoria Firus, Simon Giesecke, Wi...
SOFTVIS
2010
ACM
15 years 2 months ago
Visual comparison of software architectures
Reverse engineering methods produce different descriptions of software architectures. In this work we analyze and define the task of exploring and comparing these descriptions. ...
Fabian Beck, Stephan Diehl
TISSEC
2002
82views more  TISSEC 2002»
15 years 3 months ago
Trust management for IPsec
IPsec is the standard suite of protocols for networklayer confidentiality and authentication of Internet traffic. The IPsec protocols, however, do not address the policies for how...
Matt Blaze, John Ioannidis, Angelos D. Keromytis
HICSS
2009
IEEE
154views Biometrics» more  HICSS 2009»
15 years 11 months ago
Follow The Sun Software Development: New Perspectives, Conceptual Foundation, and Exploratory Field Study
Follow The Sun (FTS) is a special case of global software development. FTS means that software work is handed off every day from one development site to the next -- many time zone...
Erran Carmel, Yael Dubinsky, J. Alberto Espinosa