Sciweavers

575 search results - page 21 / 115
» A model for evaluating IT security investments
Sort
View
JSSPP
2005
Springer
15 years 7 months ago
Enhancing Security of Real-Time Applications on Grids Through Dynamic Scheduling
Real-time applications with security requirements are emerging in various areas including government, education, and business. The security sensitive real-time applications can ta...
Tao Xie 0004, Xiao Qin
DSN
2011
IEEE
14 years 1 months ago
Resource and virtualization costs up in the cloud: Models and design choices
—Virtualization offers the potential for cost-effective service provisioning. For service providers who make significant investments in new virtualized data centers in support of...
Daniel Gmach, Jerry Rolia, Ludmila Cherkasova
87
Voted
HICSS
2009
IEEE
101views Biometrics» more  HICSS 2009»
15 years 8 months ago
A Cost-Based Model for Improving Customer Waiting Times
The effective management of a service organization requires measuring system performance on many attributes. Customer waiting time is inherent to nearly all service operations and...
Alfred L. Guiffrida, Michael J. Messina
IWCLS
1999
Springer
15 years 6 months ago
An Adaptive Agent Based Economic Model
In this paper we describe a simple model of adaptive agents of different types, represented by Learning Classifier Systems (LCS), which make investment decisions about a risk fre...
Sonia Schulenburg, Peter Ross
JSAC
2006
181views more  JSAC 2006»
15 years 1 months ago
Information theoretic framework of trust modeling and evaluation for ad hoc networks
Abstract-- The performance of ad hoc networks depends on cooperation and trust among distributed nodes. To enhance security in ad hoc networks, it is important to evaluate trustwor...
Yan Lindsay Sun, Wei Yu, Zhu Han, K. J. Ray Liu