Sciweavers

331 search results - page 52 / 67
» Assessing the Risk of IT Outsourcing
Sort
View
ICCBSS
2003
Springer
15 years 4 months ago
Not All CBS Are Created Equally: COTS-Intensive Project Types
COTS products affect development strategies and tactics, but not all CBS development efforts are equal. Based on our experiences with 20 large government and industry CBS project...
Barry W. Boehm, Daniel Port, Ye Yang, Jesal Bhuta
66
Voted
ATAL
2008
Springer
15 years 1 months ago
Identifying beneficial teammates using multi-dimensional trust
Multi-agent teams must be capable of selecting the most beneficial teammates for different situations. Multi-dimensional trustworthiness assessments have been shown significantly ...
Jaesuk Ahn, Xin Sui, David DeAngelis, K. Suzanne B...
98
Voted
ESIAT
2009
IEEE
14 years 8 months ago
A Novel Application of Variable Fuzzy Set on Alarming of Coalmine Gas
Coalmine gas disaster is one of the severe natural disasters that restrict the safety production of coalmines. Timely monitoring and alarming of coalmine gas is an important part o...
Jinhui Zhao, Mingliang Li, Xu Qian, Lijuan Jia
TELSYS
2010
140views more  TELSYS 2010»
14 years 5 months ago
Information system security compliance to FISMA standard: a quantitative measure
To ensure that safeguards are implemented to protect against a majority of known threats, industry leaders are requiring information processing systems to comply with security stan...
Elaine Hulitt, Rayford B. Vaughn
ACISP
2009
Springer
15 years 3 months ago
Measurement Study on Malicious Web Servers in the .nz Domain
Client-side attacks have become an increasing problem on the Internet today. Malicious web pages launch so-called drive-by-download attacks that are capable to gain complete contro...
Christian Seifert, Vipul Delwadia, Peter Komisarcz...