Sciweavers

5843 search results - page 978 / 1169
» Software Security in Practice
Sort
View
135
Voted
ENVSOFT
2007
78views more  ENVSOFT 2007»
15 years 5 months ago
CREDOS: A Conservation Reserve Evaluation And Design Optimisation System
A number of spatial decision support systems (SDSSs) are already available for the systematic planning of conservation reserves. These existing systems offer varying levels of int...
Neville D. Crossman, Lyall M. Perry, Brett A. Brya...
CCE
2005
15 years 4 months ago
CFD analyses of complex flows
Computational fluid dynamics (CFD) of complex processes and complicated geometries embraces the transport of momentum, heat, and mass including the description of reaction kinetic...
Richard Farmer, Ralph Pike, Gary Cheng
JSS
2010
150views more  JSS 2010»
15 years 3 months ago
Towards a general purpose architecture for UI generation
Many software projects spend a significant proportion of their time developing the User Interface (UI), therefore any degree of automation in this area has clear benefits. Such au...
Richard Kennard, John Leaney
RE
2010
Springer
14 years 11 months ago
Risk-based Confidentiality Requirements Specification for Outsourced IT Systems
Today, companies are required to be in control of their IT assets, and to provide proof of this in the form of independent IT audit reports. However, many companies have outsourced...
Ayse Morali, Roel Wieringa
SIGSOFT
2007
ACM
16 years 5 months ago
Mining API patterns as partial orders from source code: from usage scenarios to specifications
A software system interacts with third-party libraries through various APIs. Using these library APIs often needs to follow certain usage patterns. Furthermore, ordering rules (sp...
Mithun Acharya, Tao Xie, Jian Pei, Jun Xu