Sciweavers

657 search results - page 54 / 132
» Secure and Usable Requirements Engineering
Sort
View
ISCC
2005
IEEE
107views Communications» more  ISCC 2005»
15 years 3 months ago
FTSE: The FNP-Like TCAM Searching Engine
As the Internet grows at a very rapid pace, so does the incidence of attack events and documented unlawful intrusions. The Network Intrusion Detection Systems (NIDSes) are designe...
Rong-Tai Liu, Chia-Nan Kao, Hung-Shen Wu, Ming-Cha...
BALT
2008
14 years 12 months ago
Flexible Database Platform for Biomedical Research with Multiple User Interfaces and a Universal Query Engine
Biomedical research on human subjects often requires a large amount of data to be collected by personal interviews, Internet based questionnaires, lab measurements or by extracting...
Margus Jäger, Liina Kamm, Darja Krushevskaja,...
WWW
2010
ACM
15 years 4 months ago
Alhambra: a system for creating, enforcing, and testing browser security policies
Alhambra is a browser-based system designed to enforce and test web browser security policies. At the core of Alhambra is a policyenhanced browser supporting fine-grain security ...
Shuo Tang, Chris Grier, Onur Aciiçmez, Samu...
ICSE
2007
IEEE-ACM
15 years 10 months ago
UML/Analyzer: A Tool for the Instant Consistency Checking of UML Models
Large design models contain tens of thousands of model elements. Designers easily get overwhelmed maintaining the consistency of such design models over time. Not only is it hard ...
Alexander Egyed
ADAEUROPE
1998
Springer
15 years 2 months ago
Automating the Ada Binding Process for Java- How Far Can We Go?
This paper describes an automated approach for generating Ada bindings from Java class files. We start with the set of Java features that require a visible Ada binding, and an Ada ...
David E. Emery, Robert F. Mathias, Karl A. Nyberg