Sciweavers

1015 search results - page 176 / 203
» Usability Engineering integrated with Requirements Engineeri...
Sort
View
156
Voted
ISPASS
2005
IEEE
15 years 10 months ago
Anatomy and Performance of SSL Processing
A wide spectrum of e-commerce (B2B/B2C), banking, financial trading and other business applications require the exchange of data to be highly secure. The Secure Sockets Layer (SSL...
Li Zhao, Ravi R. Iyer, Srihari Makineni, Laxmi N. ...
152
Voted
CIKM
2005
Springer
15 years 10 months ago
Biasing web search results for topic familiarity
Depending on a web searcher’s familiarity with a query’s target topic, it may be more appropriate to show her introductory or advanced documents. The TREC HARD [1] track defi...
Giridhar Kumaran, Rosie Jones, Omid Madani
CCS
2004
ACM
15 years 10 months ago
MAC and UML for secure software design
Security must be a first class citizen in the design of large scale, interacting, software applications, at early and all stages of the lifecycle, for accurate and precise policy ...
Thuong Doan, Steven A. Demurjian, T. C. Ting, Andr...
145
Voted
ECBS
2003
IEEE
133views Hardware» more  ECBS 2003»
15 years 10 months ago
Enterprise-Wide Solutions Architecting Using UML
- In concert with customer and marketing staffs, systems engineers often formulate and codify an initial overall software system solution to fulfill customer needs. Without a focus...
Diane Feldman, Josephine Micallef, Dennis Mulcare
144
Voted
KBSE
2003
IEEE
15 years 10 months ago
Tool-Assisted Unit Test Selection Based on Operational Violations
Unit testing, a common step in software development, presents a challenge. When produced manually, unit test suites are often insufficient to identify defects. The main alternativ...
Tao Xie, David Notkin