Sciweavers

946 search results - page 118 / 190
» Software engineering for security: a roadmap
Sort
View
81
Voted
IUI
2010
ACM
15 years 3 months ago
Towards a reputation-based model of social web search
While web search tasks are often inherently collaborative in nature, many search engines do not explicitly support collaboration during search. In this paper, we describe HeyStaks...
Kevin KcNally, Michael P. O'Mahony, Barry Smyth, M...
ICSE
1999
IEEE-ACM
15 years 2 months ago
Experience with Performing Architecture Tradeoff Analysis
Software architectures, like complex designs in any field, embody tradeoffs made by the designers. However, these tradeoffs are not always made explicitly by the designers and the...
Rick Kazman, Mario Barbacci, Mark Klein, S. Jeromy...
SIGMOD
2008
ACM
119views Database» more  SIGMOD 2008»
15 years 10 months ago
Report on the Principles of Provenance Workshop
Provenance, or records of the origin, context, custody, derivation or other historical information about a (digital) object, has recently become an important research topic in a n...
James Cheney, Peter Buneman, Bertram Ludäscher
SEFM
2009
IEEE
15 years 4 months ago
Implementation Correctness of a Real-Time Operating System
—In the modern car, electronic devices are even employed for safety-critical missions like brake control, where failures might cost human lives. Among various approaches to incre...
Matthias Daum, Norbert Schirmer, Mareike Schmidt
SOCO
2009
Springer
15 years 4 months ago
Specifying and Composing Non-functional Requirements in Model-Based Development
Abstract. Non-functional requirements encompass important design concerns such as schedulability, security, and communication constraints. In model-based development they non-local...
Ethan K. Jackson, Dirk Seifert, Markus Dahlweid, T...