Sciweavers

2236 search results - page 218 / 448
» Secure Software Design in Practice
Sort
View
143
Voted
AUIC
2004
IEEE
15 years 7 months ago
A Knowledge Management Approach to User Support
This paper considers the problem of computer user support and workplace learning in general. Theoretically our work is influenced by ideas on knowledge management, expertise netwo...
R. T. Jim Eales
125
Voted
EUROCRYPT
2009
Springer
16 years 4 months ago
Order-Preserving Symmetric Encryption
We initiate the cryptographic study of order-preserving symmetric encryption (OPE), a primitive suggested in the database community by Agrawal et al. (SIGMOD '04) for allowin...
Alexandra Boldyreva, Nathan Chenette, Younho Lee, ...
OOPSLA
2007
Springer
15 years 10 months ago
The design and implementation of formal monitoring techniques
In runtime monitoring, a programmer specifies a piece of code to execute when a trace of events occurs during program execution. Previous and related work has shown that runtime m...
Eric Bodden
131
Voted
ICSE
2001
IEEE-ACM
15 years 8 months ago
The Coming-of-Age of Software Architecture Research
Over the past decade, software architecture research has emerged as the principled study of the overall structure of software systems, especially the relations among subsystems an...
Mary M. Shaw
SERP
2003
15 years 5 months ago
A Process for BDI Agent-Based Software Construction
Agent-based programming comes us as a next generation programming paradigm. However, we have not been ready yet to fully use it without having sound and concrete software engineer...
Chang-Hyun Jo, Jeffery M. Einhorn