Sciweavers

2236 search results - page 152 / 448
» Secure Software Design in Practice
Sort
View
CCS
2007
ACM
15 years 10 months ago
Program obfuscation: a quantitative approach
Despite the recent advances in the theory underlying obfuscation, there still is a need to evaluate the quality of practical obfuscating transformations more quickly and easily. T...
Bertrand Anckaert, Matias Madou, Bjorn De Sutter, ...
139
Voted
IJWIS
2008
150views more  IJWIS 2008»
15 years 4 months ago
COTS-based software product line development
ed Abstract: Purpose of this paper Software Product Line (SPL) is at the forefront among the techniques for reducing costs, decreasing schedule time, and ensuring commonality of fe...
Luiz Fernando Capretz, Faheem Ahmed, Shereef Al-Ma...
USS
2008
15 years 6 months ago
Pre-Election Testing and Post-Election Audit of Optical Scan Voting Terminal Memory Cards
Optical scan electronic voting machines employ software components that are customized for each specific election. Such software components are critical from a security and integr...
Seda Davtyan, Sotiris Kentros, Aggelos Kiayias, La...
EUROMICRO
2003
IEEE
15 years 9 months ago
Drivers and inhibitors to the development of a software component industry
The idea of component based software systems has a long tradition in the field of software engineering. Component markets have been an integral part of this idea. However, such ma...
Heiko Hahn, Klaus Turowski
ICSE
2009
IEEE-ACM
15 years 1 months ago
Software Assumptions Failure Tolerance: Role, Strategies, and Visions
Abstract. At our behest or otherwise, while our software is being executed, a huge variety of design assumptions is continuously matched with the truth of the current condition. Wh...
Vincenzo De Florio