Sciweavers

5843 search results - page 174 / 1169
» Software Security in Practice
Sort
View
DISCEX
2003
IEEE
15 years 9 months ago
Achieving Principled Assuredly Trustworthy Composable Systems and Networks
Huge challenges exist with systems and networks that must dependably satisfy stringent requirements for security, reliability, and other attributes of trustworthiness. Drawing on ...
Peter G. Neumann
BMCBI
2008
95views more  BMCBI 2008»
15 years 4 months ago
Methodology capture: discriminating between the "best" and the rest of community practice
Background: The methodologies we use both enable and help define our research. However, as experimental complexity has increased the choice of appropriate methodologies has become...
James M. Eales, John W. Pinney, Robert D. Stevens,...
SIGCSE
1994
ACM
150views Education» more  SIGCSE 1994»
15 years 8 months ago
Using literate programming to teach good programming practices
The ability to comprehend a program written by other individuals is becoming increasingly important in software development and maintenance. In an attempt to encourage undergradua...
Stephen Shum, Curtis R. Cook
COMPSAC
2002
IEEE
15 years 9 months ago
WWM: A Practical Methodology for Web Application Modeling
Web applications are becoming more complex and the way to manage that complexity is to model them. This paper presents a methodology to model Web applications directly from the ob...
Chanwit Kaewkasi, Wanchai Rivepiboon
CBSE
2008
Springer
15 years 6 months ago
A Practical Approach for Finding Stale References in a Dynamic Service Platform
The OSGiTM Service Platform is becoming the de facto standard for modularized Java applications. The market of OSGi based COTS components is continuously growing. OSGi specific pro...
Kiev Gama, Didier Donsez