Sciweavers

331 search results - page 54 / 67
» Assessing the Risk of IT Outsourcing
Sort
View
SCAM
2003
IEEE
15 years 4 months ago
Managing Multi-Billion Dollar IT Budgets using Source Code Analysis
We present a quantitative approach for IT portfolio management. This is an approach that CMM level 1 organizations can use to obtain a corporate wide impression of the state of th...
Chris Verhoef
ECBS
1999
IEEE
138views Hardware» more  ECBS 1999»
15 years 3 months ago
Multi-Domain Surety Modeling and Analysis for High Assurance Systems
Engineering systems are becoming increasingly complex as state of the art technologies are incorporated into designs. Surety modeling and analysis is an emerging science which per...
James Davis, Jason Scott, Janos Sztipanovits, Marc...
ICDE
2008
IEEE
119views Database» more  ICDE 2008»
16 years 11 days ago
Toward Simulation-Based Optimization in Data Stream Management Systems
Abstract-- Our demonstration introduces a novel system architecture which massively facilitates optimization in data stream management systems (DSMS). The basic idea is to decouple...
Bernhard Seeger, Christoph Heinz, Jürgen Kr&a...
CHI
2004
ACM
15 years 11 months ago
Safety-critical interaction: usability in incidents and accidents
Recent years have seen an increasing use of sophisticated interaction techniques in the field of command and control systems. The use of such techniques has been required in order...
Philippe A. Palanque, Floor Koornneef, Chris Johns...
HICSS
2009
IEEE
122views Biometrics» more  HICSS 2009»
15 years 5 months ago
Empirical Estimates and Observations of 0Day Vulnerabilities
We define a 0Day vulnerability to be any vulnerability, in deployed software, that has been discovered by at least one person but has not yet been publicly announced or patched. T...
Miles A. McQueen, Trevor A. McQueen, Wayne F. Boye...