Sciweavers

331 search results - page 44 / 67
» Assessing the Risk of IT Outsourcing
Sort
View
SP
2007
IEEE
108views Security Privacy» more  SP 2007»
15 years 5 months ago
Trojan Detection using IC Fingerprinting
Hardware manufacturers are increasingly outsourcing their IC fabrication work overseas due to much lower costs. This poses a significant security risk for ICs used for critical m...
Dakshi Agrawal, Selçuk Baktir, Deniz Karako...
AGILEDC
2005
IEEE
15 years 4 months ago
Costs of Compliance: Agile in an Inelastic Organization
Doing agile development in a relatively inelastic environment, where policies and procedures are virtually unchangeable, creates an impedance mismatch between the agile team and i...
John J. Cunningham
IHI
2010
160views Healthcare» more  IHI 2010»
14 years 5 months ago
Securing the e-health cloud
Modern information technology is increasingly used in healthcare with the goal to improve and enhance medical services and to reduce costs. In this context, the outsourcing of com...
Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy
HICSS
2007
IEEE
125views Biometrics» more  HICSS 2007»
15 years 5 months ago
Stochastic Model for Power Grid Dynamics
We introduce a stochastic model that describes the quasistatic dynamics of an electric transmission network under perturbations introduced by random load fluctuations, random rem...
Marian Anghel, Kenneth A. Werley, Adilson E. Motte...
ICSE
2003
IEEE-ACM
15 years 11 months ago
Cost Estimation for Web Applications
In this paper, we investigate the application of the COBRATM method (Cost Estimation, Benchmarking, and Risk Assessment) in a new application domain, the area of web development. ...
Melanie Ruhe, D. Ross Jeffery, Isabella Wieczorek