Sciweavers

6 search results - page 1 / 2
» ijseke 2007
Sort
View
68
Voted
IJSEKE
2007
50views more  IJSEKE 2007»
15 years 23 hour ago
Secure Tropos: a Security-Oriented Extension of the Tropos Methodology
Haralambos Mouratidis, Paolo Giorgini
77
Voted
IJSEKE
2007
77views more  IJSEKE 2007»
14 years 12 months ago
Guest Editors: Introduction
Kang Zhang, George Spanoudakis, Giuseppe Visaggio
58
Voted
IJSEKE
2007
61views more  IJSEKE 2007»
15 years 22 hour ago
Detecting Fault Modules Using Bioinformatics Techniques
Gregor Stiglic, Matej Mertik, Peter Kokol, Maurizi...
69
Voted
IJSEKE
2007
64views more  IJSEKE 2007»
15 years 23 hour ago
Protect Virtual Property in Online Gaming System
Ronggong Song, Larry Korba, George Yee, Ying-Chieh...
IJSEKE
2007
52views more  IJSEKE 2007»
15 years 22 hour ago
Software Architecture Decomposition Using Attributes
Software architectural design has an enormous effect on downstream software artifacts. Decomposition of functions for the final system is one of the critical steps in software arch...
Chung-Horng Lung, Xia Xu, Marzia Zaman