Software Engineering Institute

Results: 1594



#Item
21

Trustworthy Systems Through Quantitative Software Engineering Larry Bernstein Stevens Institute of Technology Castle Point, Hoboken, NJ 07030

Add to Reading List

Source URL: princetonacm.acm.org

Language: English - Date: 2006-08-13 17:17:37
    22

    Retrieval Optimization of Pertinent Answers for NL Questions with the E-Librarian Service Serge Linckels,Harald Sack, Christoph Meinel Hasso Plattner Institute for Software Systems Engineering (HPI) University of Potsdam

    Add to Reading List

    Source URL: www.linckels.lu

    Language: English - Date: 2013-09-25 04:07:42
      23

      Reducing the Effects of Requirements Changes through System Design Israel Navarro, Nancy Leveson, Kristina Lundqvist Massachusetts Institute of Technology Software Engineering Research Laboratory, Cambridge, MA 02

      Add to Reading List

      Source URL: sunnyday.mit.edu

      Language: English - Date: 2015-12-11 12:32:11
        24

        Integrating Business Process Descriptions and Lessons Learned with an Experience Factory Björn Decker, Klaus-Dieter Althoff, Markus Nick, Carsten Tautz Fraunhofer Institute for Experimental Software Engineering, Sauerwi

        Add to Reading List

        Source URL: sunsite.informatik.rwth-aachen.de

        Language: English - Date: 2001-02-01 04:03:12
          25

          Hands-On Tutorial: Auditing Static Analysis Alerts Using a Lexicon & Rules Lori Flynn, David Svoboda, and William Snavely Software Engineering Institute Carnegie Mellon University Pittsburgh, Pennsylvania USA

          Add to Reading List

          Source URL: s3.amazonaws.com

          Language: English - Date: 2017-09-23 15:23:43
            26

            Creating and Managing Computer Security Incident Handling Teams (CSIRTs) CERT Training and Education Networked Systems Survivability Software Engineering Institute

            Add to Reading List

            Source URL: www.first.org

            - Date: 2017-08-08 15:42:43
              27

              Killed by Proxy: Analyzing Client-end TLS Interception Software Xavier de Carné de Carnavalet and Mohammad Mannan Concordia Institute for Information Systems Engineering Concordia University, Montreal, Canada {x_decarn,

              Add to Reading List

              Source URL: users.encs.concordia.ca

              - Date: 2015-12-19 20:18:32
                28

                Proof-Carrying Apps: Contract-Based Deployment-Time Verification⋆ Sönke Holthusen, Michael Nieke, Thomas Thüm, and Ina Schaefer Institute of Software Engineering and Automotive Informatics TU Braunschweig, Germany {s

                Add to Reading List

                Source URL: www.isf.cs.tu-bs.de

                - Date: 2016-08-15 09:53:47
                  29

                  Algorithmic Logic-Based Verification with SeaHorn (Invited Tutorial) Arie Gurfinkel Software Engineering Institute Carnegie Mellon University http://arieg.bitbucket.org

                  Add to Reading List

                  Source URL: arieg.bitbucket.org

                  - Date: 2016-11-24 00:26:40
                    30

                    APPLYING SOFTWARE ENGINEERING TO A GENERAL PURPOSE GEOGRAPHIC INFORMATION SYSTEM Peter Aronson Environmental Systems Research Institute 380 New York Street Redlands, California 92373

                    Add to Reading List

                    Source URL: mapcontext.com

                    - Date: 2008-08-29 23:59:16
                      UPDATE