Sfoglia per Autore
Malaj: A Proposal to Eliminate Clashes Between Aspect oriented Programming and Object Oriented Programming
2000 M. Monga, G. Cugola, G. Picco, C. Ghezzi
Freeing Cooperation from Servers Tyranny
2002 D. Balzarotti, C. Ghezzi, M. Monga
Extreme programming: programmazione estrema o revisionismo estremista?
2002 C. Ghezzi, M. Monga
Supporting Nomadic Co-Workers: an Experience with a Peer-To-Peer Configuration Management Tool
2003 M. Monga
Managing Code Dependencies in C#
2004 R. Casero, M. Cesarini, M. Monga
L'evoluzione della sicurezza informatica: la prospettiva del CERT-IT
2004 D.M. Bruschi, M. Monga, E. Rosti
Learning Objects and Tests
2004 M. Cesarini, P. Mazzoni, M. Monga
Carrying on the e-Learning process with a Workflow Management Engine
2004 M. Cesarini, M. Monga, R. Tedesco
Using Program Slicing to Analyze Aspect-Oriented Composition
2004 D. Balzarotti, M. Monga
From Bazaar to Kibbutz: How Freedom Deals with Coherence in the Debian Project
2004 M. Monga
How to Reuse Knowledge about Forensic Investigations
2004 D.M. Bruschi, L. Martignoni, M. Monga
A comparative assessment of peer-to-peer and server-based configuration management systems
2004 C. Bellettini, L. Capra, M. Monga
Software engineering for secure systems
2005 Danilo Bruschi, Bart De Win, Mattia Monga
Quantitative assessment of a peer-to-peer cooperative infrastructure using Stochastic Well-Formed Nets
2005 C. Bellettini, L. Capra, M. Monga
Replay attack in TCG specification and solution
2005 D. Bruschi, L. Cavallaro, A. Lanzi, M. Monga
Slicing AspectJ Woven Code
2005 D. Balzarotti, A. Castaldo D'Ursi, L. Cavallaro, M. Monga
A Generic Serializer for Mobile Devices
2005 M. Monga, A. Scotto
Trusted Internet Forensics: design of a network forensics appliance
2005 Danilo Bruschi,Mattia Monga,Emilia Rosti
Improving the Security of TCG Specification
2005 D.M. Bruschi, L. Cavallaro, A. Lanzi, M. Monga
Introduction to software engineering for secure systems
2006 D. Bruschi, B. De Win, M. Monga
Legenda icone
- file ad accesso aperto
- file disponibili sulla rete interna
- file disponibili agli utenti autorizzati
- file disponibili solo agli amministratori
- file sotto embargo
- nessun file disponibile