Sciweavers

2236 search results - page 244 / 448
» Secure Software Design in Practice
Sort
View
SOCO
2009
Springer
15 years 9 months ago
Lazy Composition of Representations in Java
Abstract. The separation of concerns has been a core idiom of software engineering for decades. In general, software can be decomposed properly only according to a single concern, ...
Rémi Douence, Xavier Lorca, Nicolas Loriant
SERP
2004
15 years 4 months ago
Keeping Secrets within a Family: Rediscovering Parnas
David Parnas wrote several papers in the 1970's and 1980's that are now considered classics. The concepts he advocated such as information hiding and bstract interfaces ...
H. Conrad Cunningham, Cuihua Zhang, Yi Liu
EUROMICRO
2000
IEEE
15 years 7 months ago
Formal Coverification of Embedded Systems Using Model Checking
The complexity of embedded systems is increasing rapidly. In consequence, new verification techniques that overcome the limitations of traditional methods and are suitable for har...
Luis Alejandro Cortés, Petru Eles, Zebo Pen...
CHI
2002
ACM
16 years 3 months ago
LMNKui: overlaying computer controls on a piano controller keyboard
We introduce the Look Ma No Keyboard user interface, an ergonomic and intuitive method for controlling music sequencing software from a piano controller by adding a momentary foot...
Farhan Mohamed, Sidney Fels
137
Voted
VSTTE
2005
Springer
15 years 8 months ago
Linking the Meaning of Programs to What the Compiler Can Verify
We formulate some research and development challenges that relate what a verifying compiler can verify to the definition and analysis of the application-content of programs, where...
Egon Börger