Sciweavers

331 search results - page 36 / 67
» Assessing the Risk of IT Outsourcing
Sort
View
TON
2012
13 years 1 months ago
On New Approaches of Assessing Network Vulnerability: Hardness and Approximation
—Society relies heavily on its networked physical infrastructure and information systems. Accurately assessing the vulnerability of these systems against disruptive events is vit...
Thang N. Dinh, Ying Xuan, My T. Thai, Panos M. Par...
RE
2010
Springer
14 years 9 months ago
Assessing traceability of software engineering artifacts
Abstract The generation of traceability links or traceability matrices is vital to many software engineering activities. It is also person-power intensive, time-consuming, error-pr...
Senthil Karthikeyan Sundaram, Jane Huffman Hayes, ...
FECS
2007
86views Education» more  FECS 2007»
15 years 15 days ago
Providing Experiential Learning Through Transnational Teamwork
- The requirement for high standards of professionalism in graduating Computer Science and Information Technology students suggests the applicability of experiential learning. This...
Kirsten Wahlstrom, Susan Tyerman, Rebecca Witt, Ky...
IJNSEC
2007
95views more  IJNSEC 2007»
14 years 11 months ago
Evaluation of Distributed File Integrity Analyzers in the Presence of Tampering
In this paper, the Collaborative Object Notification Framework for Insider Defense using Autonomous Network Transactions (CONFIDANT) is evaluated in the presence of tampering. CO...
Adam J. Rocke, Ronald F. DeMara, Simon Foo
SCP
2002
77views more  SCP 2002»
14 years 10 months ago
Quantitative IT portfolio management
We present a quantitative approach for IT portfolio management. This is an approach that CMM level 1 organizations can use to obtain a corporate wide impression of the state of th...
Chris Verhoef