Sciweavers

222 search results - page 43 / 45
» Risk and risk management in software projects: A reassessmen...
Sort
View
WORDS
2005
IEEE
13 years 11 months ago
A Framework for Preparing Experimental Evaluation of Rerouting Mechanisms
Since the deployment of real-time sensitive applications in the Internet, the research community has been struggling to leverage the IP best-effort networks for providing QoS assu...
Reinaldo de Barros Correia, Luiz F. Rust da Costa ...
ICSE
2007
IEEE-ACM
14 years 5 months ago
Analysis of a Redundant Architecture for Critical Infrastructure Protection
Critical infrastructures like the power grid are emerging as collection of existing separated systems of different nature which are interconnected together. Their criticality becom...
Alessandro Daidone, Andrea Bondavalli, Paulo Ver&i...
IEAAIE
2009
Springer
14 years 9 days ago
An Agent Model of Temporal Dynamics in Relapse and Recurrence in Depression
Abstract Unipolar depression is a mental disorder characterized by a persistent low mood and loss of awareness or contentment in usual activities [1]. Despite the modern era of pha...
Azizi Ab Aziz, Michel C. A. Klein, Jan Treur
IEEESP
2007
98views more  IEEESP 2007»
13 years 5 months ago
Educating Students to Create Trustworthy Systems
igh level of abstraction and to provide broad oversight. In contrast, the goal of computer science security education is to provide the technicalexpertisetodevelopsecure software a...
Richard S. Swart, Robert F. Erbacher
DIM
2007
ACM
13 years 9 months ago
Implementing identity provider on mobile phone
We have implemented an identity provider (IdP), which is defined by the Liberty Alliance on a mobile phone. We propose an authentication method, which uses this personal IdP as a ...
Tsuyoshi Abe, Hiroki Itoh, Kenji Takahashi