Sciweavers

7202 search results - page 1375 / 1441
» Software System Engineering: A Tutorial
Sort
View
CCS
2008
ACM
15 years 6 months ago
Mutual authentication in RFID: security and privacy
In RFID protocols, tags identify and authenticate themselves to readers. At Asiacrypt 2007, Vaudenay studied security and privacy models for these protocols. We extend this model ...
Radu-Ioan Paise, Serge Vaudenay
136
Voted
EGOV
2008
Springer
15 years 6 months ago
Test Strategies for Evaluation of Semantic eGovernment Applications
In this paper we present a framework for identifying the test focus and test objectives based on the assumption that automatic information processing based on encoded meaning is th...
Ralf Klischewski, Stefan Ukena
153
Voted
IE
2007
15 years 6 months ago
Patterns and computer game design innovation
How can we help people design well-formed and innovative games? The design Patterns of Christopher Alexander is one methodology that has been proposed to assist in the design of w...
Kevin McGee
ICWS
2008
IEEE
15 years 6 months ago
Dynamic Exception Handling Based on Web Services and OPC XML-DA
Programmable Logic Controllers (PLC) are widely used in process automation due to their fast and guarantee response time. However their programming and interfacing capacities are ...
Francisco Javier Díez, Iñaki Maurtua
DAGSTUHL
2006
15 years 6 months ago
Rule-based Model Extraction from Source Code
Abstract. In the context of an approach for reengineering legacy software systems at the architectural level, we present in this paper a reverse engineering methodology that uses a...
Rui Correia, Carlos M. P. Matos, Mohammad El-Ramly...
« Prev « First page 1375 / 1441 Last » Next »