Sciweavers

6 search results - page 1 / 2
» ijseke 2007
Sort
View
75
Voted
IJSEKE
2007
50views more  IJSEKE 2007»
15 years 1 months ago
Secure Tropos: a Security-Oriented Extension of the Tropos Methodology
Haralambos Mouratidis, Paolo Giorgini
84
Voted
IJSEKE
2007
77views more  IJSEKE 2007»
15 years 26 days ago
Guest Editors: Introduction
Kang Zhang, George Spanoudakis, Giuseppe Visaggio
64
Voted
IJSEKE
2007
61views more  IJSEKE 2007»
15 years 1 months ago
Detecting Fault Modules Using Bioinformatics Techniques
Gregor Stiglic, Matej Mertik, Peter Kokol, Maurizi...
77
Voted
IJSEKE
2007
64views more  IJSEKE 2007»
15 years 1 months ago
Protect Virtual Property in Online Gaming System
Ronggong Song, Larry Korba, George Yee, Ying-Chieh...
108
Voted
IJSEKE
2007
52views more  IJSEKE 2007»
15 years 1 months ago
Software Architecture Decomposition Using Attributes
Software architectural design has an enormous effect on downstream software artifacts. Decomposition of functions for the final system is one of the critical steps in software arch...
Chung-Horng Lung, Xia Xu, Marzia Zaman