Sciweavers

405 search results - page 59 / 81
» Avatar-centric Risk Evaluation
Sort
View
ECBS
2005
IEEE
164views Hardware» more  ECBS 2005»
15 years 3 months ago
The Impact of Agile Methods on Software Project Management
As more and more software projects engage Agile Methods, there are emerging patterns of success and failure. With growing adoption of Agile Methods, project managers increasingly ...
Michael Coram, Shawn A. Bohner
WOWMOM
2005
ACM
133views Multimedia» more  WOWMOM 2005»
15 years 3 months ago
A Statistical Matching Approach to Detect Privacy Violation for Trust-Based Collaborations
Distributed trust and reputation management mechanisms are often proposed as a means of providing assurance in dynamic and open environments by enabling principals to building up ...
Mohamed Ahmed, Daniele Quercia, Stephen Hailes
AOSD
2010
ACM
15 years 3 months ago
A permission system for secure AOP
The integration of third-party aspects into applications creates security challenges. Due to the intrusive impact of aspects, one cannot guarantee that the dynamic composition of ...
Wouter De Borger, Bart De Win, Bert Lagaisse, Wout...
82
Voted
WWW
2010
ACM
15 years 3 months ago
Privacy in dynamic social networks
Recent work on anonymizing online social networks (OSNs) has looked at privacy preserving techniques for publishing a single instance of the network. However, OSNs evolve and a si...
Smriti Bhagat, Graham Cormode, Balachander Krishna...
HICSS
2003
IEEE
99views Biometrics» more  HICSS 2003»
15 years 3 months ago
Financial Model-Base Construction for Flexible Model Manipulation of Models and Solvers
As financial markets are volatile and rapidly changing, preciseness and agility in price evaluation and risk assessment in the portfolios are more important and decision support s...
Keun-Woo Lee, Soon-Young Huh