Sciweavers

8623 search results - page 211 / 1725
» Software engineering for secure systems
Sort
View
CISSE
2008
Springer
15 years 6 months ago
Anonymity Leakage Reduction in Network Latency
Each Internet communication leaves trails here or there, that can be followed back to the user. Notably, anonymous communication schemes are purposed to hide users' identity ...
Longy O. Anyanwu, Jared Keengwe, Gladys A. Arome
SEKE
1995
Springer
15 years 8 months ago
Computational Mechanisms for Distributed Requirements Engineering
This paper argues for new computational mechanisms to aid specification of requirements for composite systems. It presents mechanisms for storing specification fragments, or viewp...
Neil A. M. Maiden, Alistair G. Sutcliffe, Petia As...
127
Voted
HICSS
2003
IEEE
105views Biometrics» more  HICSS 2003»
15 years 9 months ago
New Software Development Paradigms and Possible Adoption for Security
EGovernment would be a lot easier if it could be handled like eBusiness. Unfortunately there are organizational and legal obstacles that make it virtually impossible. The security...
Matthias Günter, Michael Gisler, Bianca von B...
CSMR
2007
IEEE
15 years 10 months ago
The Sisyphus Continuous Integration System
Integration hell is a prime example of software evolution gone out of control. The Sisyphus continuous integration system is designed to prevent this situation in the context of c...
Tijs van der Storm
AADEBUG
2005
Springer
15 years 10 months ago
Tdb: a source-level debugger for dynamically translated programs
Debugging techniques have evolved over the years in response to changes in programming languages, implementation techniques, and user needs. A new type of implementation vehicle f...
Naveen Kumar, Bruce R. Childers, Mary Lou Soffa