Sciweavers

2236 search results - page 323 / 448
» Secure Software Design in Practice
Sort
View
CSMR
2011
IEEE
14 years 1 months ago
RTFM (Read the Factual Mails) - Augmenting Program Comprehension with Remail
—The advent of globalization has led to the adoption of distributed software development as a common practice. One of its drawbacks -the absence of impromptu meetingsis tackled w...
Alberto Bacchelli, Michele Lanza, Vitezslav Humpa
ISSTA
2004
ACM
15 years 3 months ago
Faster constraint solving with subtypes
Constraints in predicate or relational logic can be translated into boolean logic and solved with a SAT solver. For faster solving, it is common to exploit the typing of predicate...
Jonathan Edwards, Daniel Jackson, Emina Torlak, Vi...
HICSS
2003
IEEE
164views Biometrics» more  HICSS 2003»
15 years 3 months ago
From Computer Networks to Agent Networks
From the 1990s on, one of the most important challenges facing computer science researchers has been the design and construction of software tools to exploit Internet computing. A...
Guoqiang Zhong, Kenichi Takahashi, Satoshi Amamiya...
ECAIW
1994
Springer
15 years 2 months ago
Agent Theories, Architectures, and Languages: A Survey
The concept of an agent has recently become important in Artificial Intelligence (AI), and its relatively youthful subfield, Distributed AI (DAI). Our aim in this paper is to poin...
Michael Wooldridge, Nicholas R. Jennings
DAC
2005
ACM
15 years 11 months ago
Efficient fingerprint-based user authentication for embedded systems
User authentication, which refers to the process of verifying the identity of a user, is becoming an important security requirement in various embedded systems. While conventional...
Pallav Gupta, Srivaths Ravi, Anand Raghunathan, Ni...