Sciweavers

3901 search results - page 198 / 781
» software 2008
Sort
View
139
Voted
FM
2008
Springer
130views Formal Methods» more  FM 2008»
15 years 6 months ago
Specification and Checking of Software Contracts for Conditional Information Flow
Abstract. Information assurance applications built according to the MILS (Multiple Independent Levels of Security) architecture often contain information flow policies that are con...
Torben Amtoft, John Hatcliff, Edwin Rodrígu...
ESEM
2008
ACM
15 years 6 months ago
Reducing biases in individual software effort estimations: a combining approach
Software effort estimation techniques abound, each with its own set of advantages and disadvantages, and no one proves to be the single best answer. Combining estimating is an app...
Qi Li, Qing Wang, Ye Yang, Mingshu Li
ICSE
2008
IEEE-ACM
16 years 4 months ago
Effecting change: coordination in large-scale software development
Large-scale software development requires coordination within and between very large engineering teams, each of which may be located in different locations and time zones. Numerou...
Andrew Begel
CSMR
2008
IEEE
15 years 11 months ago
A Flexible Framework to Support Collaborative Software Evolution Analysis
To understand the evolution of software researchers have developed a plethora of tools to parse, model, and analyze the history of systems. Despite their usefulness, a common down...
Marco D'Ambros, Michele Lanza
ESSOS
2009
Springer
15 years 11 months ago
Protection Poker: Structuring Software Security Risk Assessment and Knowledge Transfer
Discovery of security vulnerabilities is on the rise. As a result, software development teams must place a higher priority on preventing the injection of vulnerabilities in softwar...
Laurie Williams, Michael Gegick, Andrew Meneely