Sciweavers

331 search results - page 56 / 67
» Assessing the Risk of IT Outsourcing
Sort
View
ASWEC
2005
IEEE
15 years 4 months ago
Australian Software Development: What Software Project Management Practices Lead to Success?
We surveyed a number of Australian software practitioners in order to understand what software development practices were used in their recent software projects. We were particula...
June M. Verner, Narciso Cerpa
WINE
2005
Springer
109views Economy» more  WINE 2005»
15 years 4 months ago
New Algorithms for Mining the Reputation of Participants of Online Auctions
The assessment of credibility and reputation of contractors in online auctions is the key issue in providing reliable environment for customer-to-customer e-commerce. Confident re...
Mikolaj Morzy
HICSS
2003
IEEE
99views Biometrics» more  HICSS 2003»
15 years 4 months ago
Financial Model-Base Construction for Flexible Model Manipulation of Models and Solvers
As financial markets are volatile and rapidly changing, preciseness and agility in price evaluation and risk assessment in the portfolios are more important and decision support s...
Keun-Woo Lee, Soon-Young Huh
IAW
2003
IEEE
15 years 4 months ago
Wireless Intrusion Detection and Response
— Intrusion detection and countermeasures response is an active area of research. In this paper, we examine integrating an intrusion detection engine with an active countermeasur...
Yu-Xi Lim, Tim Schmoyer, John G. Levine, Henry L. ...
CCS
2003
ACM
15 years 4 months ago
Incentive-based modeling and inference of attacker intent, objectives, and strategies
Although the ability to model and infer Attacker Intent, Objectives and Strategies (AIOS) may dramatically advance the literature of risk assessment, harm prediction, and predicti...
Peng Liu, Wanyu Zang