Sciweavers

416 search results - page 24 / 84
» Some new approaches for preventing software tampering
Sort
View
IJNSEC
2007
194views more  IJNSEC 2007»
14 years 11 months ago
Covert Channel Forensics on the Internet: Issues, Approaches, and Experiences
The exponential growth of the Internet (WWW in particular) has opened-up several avenues for covert channel communication. Steganographic communication is one such avenue. Hiding ...
Ashish Patel, M. Shah, Rajarathnam Chandramouli, K...
HICSS
2006
IEEE
125views Biometrics» more  HICSS 2006»
15 years 5 months ago
The Tension between Integration and Fragmentation in a Component Based Software Development Ecosystem
Historically, software application systems have been produced either individually tailored for the specific customer, or they have been adapted from standardized packages. This pa...
Jens-Magnus Arndt, Jens Dibbern
ICSE
2009
IEEE-ACM
14 years 9 months ago
Software Assumptions Failure Tolerance: Role, Strategies, and Visions
Abstract. At our behest or otherwise, while our software is being executed, a huge variety of design assumptions is continuously matched with the truth of the current condition. Wh...
Vincenzo De Florio
ICSE
2008
IEEE-ACM
15 years 11 months ago
Using software engineering technology to improve the quality of medical processes
In this paper, we describe some of the key observations resulting from our work on using software engineering technologies to help detect errors in medical processes. In many ways...
Lori A. Clarke, George S. Avrunin, Leon J. Osterwe...
CISIS
2010
IEEE
15 years 6 months ago
Computational Grid as an Appropriate Infrastructure for Ultra Large Scale Software Intensive Systems
—Ultra large scale (ULS) systems are future software intensive systems that have billions of lines of code, composed of heterogeneous, changing, inconsistent and independent elem...
Babak Rezaei Rad, Fereidoon Shams Aliee