Sciweavers

331 search results - page 38 / 67
» Assessing the Risk of IT Outsourcing
Sort
View
JUCS
2008
155views more  JUCS 2008»
14 years 11 months ago
Determining Software Investment Lag
: The investments needed to bring a software project to the market are substantial and can extend over several years. Managing software development requires not only technical expe...
Gio Wiederhold
PET
2005
Springer
15 years 4 months ago
Privacy in India: Attitudes and Awareness
Abstract. In recent years, numerous surveys have been conducted to assess attitudes about privacy in the United States, Australia, Canada, and the European Union. Very little infor...
Ponnurangam Kumaraguru, Lorrie Faith Cranor
SIGSOFT
2008
ACM
14 years 11 months ago
Efficient online monitoring of web-service SLAs
If an organization depends on the service quality provided by another organization it often enters into a bilateral service level agreement (SLA), which mitigates outsourcing risk...
Franco Raimondi, James Skene, Wolfgang Emmerich
IDTRUST
2009
ACM
15 years 5 months ago
A calculus of trust and its application to PKI and identity management
We introduce a formal semantics based calculus of trust that explicitly represents trust and quantifies the risk associated with trust in public key infrastructure (PKI) and iden...
Jingwei Huang, David Nicol
DMIN
2007
90views Data Mining» more  DMIN 2007»
15 years 15 days ago
On Minimal Infrequent Itemset Mining
—A new algorithm for minimal infrequent itemset mining is presented. Potential applications of finding infrequent itemsets include statistical disclosure risk assessment, bioinf...
David J. Haglin, Anna M. Manning