Sciweavers

713 search results - page 107 / 143
» A reference model for IT management responsibilities
Sort
View
ISCA
1999
IEEE
187views Hardware» more  ISCA 1999»
15 years 2 months ago
Area Efficient Architectures for Information Integrity in Cache Memories
Information integrity in cache memories is a fundamental requirement for dependable computing. Conventional architectures for enhancing cache reliability using check codes make it...
Seongwoo Kim, Arun K. Somani
83
Voted
WSC
2007
15 years 11 hour ago
Partial cross training in call centers with uncertain arrivals and global service level agreements
Inbound call center operations are challenging to manage; there is considerable uncertainty in estimates of arrival rates, and the operation is often subject to strict service lev...
Thomas R. Robbins, Terry P. Harrison, Deborah J. M...
JTAER
2010
100views more  JTAER 2010»
14 years 8 months ago
Determinants of Consumers' Perceived Trust in IT-Ecosystems
Digital ecosystems, or IT-ecosystems (ITEs), are composed of multiple and independent entities such as individuals, organizations, services, software, and applications. Together, ...
Klaus-Peter Wiedmann, Nadine Hennigs, Dieter Varel...
TII
2011
206views Education» more  TII 2011»
14 years 4 months ago
Timing-Failure Risk Assessment of UML Design Using Time Petri Net Bound Techniques
Abstract—Software systems that do not meet their timing constraints can cause risks. In this work, we propose a comprehensive method for assessing the risk of timing failure by e...
Simona Bernardi, Javier Campos, José Merseg...
IACR
2011
129views more  IACR 2011»
13 years 9 months ago
Bounded Vector Signatures and their Applications
Although malleability is undesirable in traditional digital signatures, schemes with limited malleability properties enable interesting functionalities that may be impossible to o...
Lei Wei, Scott E. Coull, Michael K. Reiter