Sciweavers

405 search results - page 33 / 81
» Avatar-centric Risk Evaluation
Sort
View
RE
2010
Springer
14 years 4 months ago
Risk-based Confidentiality Requirements Specification for Outsourced IT Systems
Today, companies are required to be in control of their IT assets, and to provide proof of this in the form of independent IT audit reports. However, many companies have outsourced...
Ayse Morali, Roel Wieringa
CORR
2008
Springer
88views Education» more  CORR 2008»
14 years 9 months ago
Framework for Dynamic Evaluation of Muscle Fatigue in Manual Handling Work
- Muscle fatigue is defined as the point at which the muscle is no longer able to sustain the required force or work output level. The overexertion of muscle force and muscle fatig...
Liang Ma, Fouad Bennis, Damien Chablat, Wei Zhang
SIGSOFT
2004
ACM
15 years 10 months ago
Empirical evaluation of defect projection models for widely-deployed production software systems
Defect-occurrence projection is necessary for the development of methods to mitigate the risks of software defect occurrences. In this paper, we examine user-reported software def...
Paul Luo Li, Mary Shaw, James D. Herbsleb, Bonnie ...
MOBICOM
2005
ACM
15 years 3 months ago
Architecture and evaluation of an unplanned 802.11b mesh network
This paper evaluates the ability of a wireless mesh architecture to provide high performance Internet access while demanding little deployment planning or operational management. ...
John C. Bicket, Daniel Aguayo, Sanjit Biswas, Robe...
WORDS
2005
IEEE
15 years 3 months ago
A Framework for Preparing Experimental Evaluation of Rerouting Mechanisms
Since the deployment of real-time sensitive applications in the Internet, the research community has been struggling to leverage the IP best-effort networks for providing QoS assu...
Reinaldo de Barros Correia, Luiz F. Rust da Costa ...