Sciweavers

575 search results - page 11 / 115
» A model for evaluating IT security investments
Sort
View
95
Voted
JPDC
2007
86views more  JPDC 2007»
14 years 11 months ago
Performance evaluation of a new scheduling algorithm for distributed systems with security heterogeneity
High quality of security is increasingly critical for applications running on heterogeneous distributed systems. However, existing scheduling algorithms for heterogeneous distribu...
Tao Xie 0004, Xiao Qin
CISS
2008
IEEE
15 years 1 months ago
Portfolio diversification using subspace factorizations
Abstract-- Successful investment management relies on allocating assets so as to beat the stock market. Asset classes are affected by different market dynamics or latent trends. Th...
Ruairi de Frein, Konstantinos Drakakis, Scott Rick...
EUROPKI
2004
Springer
15 years 5 months ago
A Framework for Evaluating the Usability and the Utility of PKI-enabled Applications
Abstract. Besides the pure technical features, the usability of a PKIenabled application plays a crucial role since the best security application will fail in practice if its usabi...
Tobias Straub, Harald Baier
CF
2009
ACM
15 years 6 months ago
Evaluating multi-core platforms for HPC data-intensive kernels
Multi-core platforms have proven themselves able to accelerate numerous HPC applications. But programming dataintensive applications on such platforms is a hard, and not yet solve...
Alexander S. van Amesfoort, Ana Lucia Varbanescu, ...
ESORICS
2006
Springer
15 years 3 months ago
Modeling and Evaluating the Survivability of an Intrusion Tolerant Database System
The immaturity of current intrusion detection techniques limits the traditional security systems in surviving malicious attacks. Intrusion tolerance approaches have emerged to over...
Hai Wang, Peng Liu