Sciweavers

94 search results - page 7 / 19
» Sponsors and Supporters
Sort
View
KBSE
2007
IEEE
15 years 3 months ago
Checking threat modeling data flow diagrams for implementation conformance and security
Threat modeling analyzes how an adversary might attack a system by supplying it with malicious data or interacting with it. The analysis uses a Data Flow Diagram (DFD) to describe...
Marwan Abi-Antoun, Daniel Wang, Peter Torr
SIGCPR
2004
ACM
64views Hardware» more  SIGCPR 2004»
15 years 2 months ago
Recruitment is never enough: retention of women and minorities in the IT workplace
Women, as well as African Americans, Hispanic Americans and Native Americans are represented in the information technology (IT) workforce in percentages that are far lower than th...
Andrea Tapia, Lynette Kvasny
UML
2004
Springer
15 years 2 months ago
The AGEDIS Tools for Model Based Testing
We describe the tools and interfaces created by the AGEDIS project, a European Commission sponsored project for the creation of a methodology and tools for automated model driven ...
Alan Hartman, Kenneth Nagin
ISQED
2003
IEEE
85views Hardware» more  ISQED 2003»
15 years 2 months ago
Interoperability Beyond Design: Sharing Knowledge between Design and Manufacturing
The nature of IC design has is necessarily evolving to a more data-centric design flow in which EDA tools share a common information in a design database without the negative cost...
D. R. Cottrell, T. J. Grebinski
CSREAEEE
2006
103views Business» more  CSREAEEE 2006»
14 years 10 months ago
Mobile Web Service Architecture for Software Development Peer Inspection
- Improving software quality remains a key challenge. Software development formal peer inspection has emerged as an effective approach to address this challenge. Software peer insp...
Gilda Pour, Ashwini Ramachandra, Panchali Sarkar