Sciweavers

2236 search results - page 220 / 448
» Secure Software Design in Practice
Sort
View
135
Voted
APLAS
2005
ACM
15 years 9 months ago
Integrating Physical Systems in the Static Analysis of Embedded Control Software
Interpretation interpretation is a theory of effective abstraction and/or approximation of discrete mathematical structures as found in the semantics of programming languages, mod...
Patrick Cousot
148
Voted
CSCW
2007
ACM
15 years 3 months ago
Supporting Community Emergency Management Planning through a Geocollaboration Software Architecture
Emergency management is more than just events occurring within an emergency situation. It encompasses a variety of persistent activities such as planning, training, assessment, and...
Wendy A. Schafer, Craig H. Ganoe, John M. Carroll
SERP
2003
15 years 5 months ago
A Maturity Model for the Implementation of Software Process Improvement
Different advances have been made in the development of software process improvement (SPI) standards and models, e.g. capability maturity model (CMM), more recently CMMI, and ISO...
Mahmood Niazi, David Wilson
125
Voted
IPCCC
2006
IEEE
15 years 9 months ago
Optimising malware
In recent years, malicious software (malware) has become one of the most insidious threats in computer security. However, this is arguably not the result of increased sophisticati...
José M. Fernandez, Pierre-Marc Bureau
153
Voted
BMCBI
2011
14 years 10 months ago
R2R - software to speed the depiction of aesthetic consensus RNA secondary structures
Background: With continuing identification of novel structured noncoding RNAs, there is an increasing need to create schematic diagrams showing the consensus features of these mol...
Zasha Weinberg, Ronald R. Breaker