Sciweavers

519 search results - page 34 / 104
» Enterprise computing asset management: a case study
Sort
View
OOPSLA
2004
Springer
15 years 4 months ago
Empirical investigation of the impact of extreme programming practices on software projects
Extreme Programming (XP) is an agile software development methodology composed of several practices that purportedly yield high quality and high customer satisfaction. However, th...
Lucas Layman
LISA
2008
15 years 1 months ago
Automatic Software Fault Diagnosis by Exploiting Application Signatures
Application problem diagnosis in complex enterprise environments is a challenging problem, and contributes significantly to the growth in IT management costs. While application pr...
Xiaoning Ding, Hai Huang, Yaoping Ruan, Anees Shai...
CAISE
2006
Springer
15 years 2 months ago
Inter-organisational Controls as Value Objects in Network Organisations
Inter-organizational controls are mechanisms used to ensure and monitor that networked enterprises do not commit a fraud and behave as agreed. Many of such controls have, apart fro...
Vera Kartseva, Jaap Gordijn, Yao-Hua Tan
ALT
2010
Springer
15 years 19 days ago
Optimal Online Prediction in Adversarial Environments
: In many prediction problems, including those that arise in computer security and computational finance, the process generating the data is best modeled as an adversary with whom ...
Peter L. Bartlett
VIZSEC
2007
Springer
15 years 5 months ago
An Interactive Attack Graph Cascade and Reachability Display
Abstract Attack graphs for large enterprise networks improve security by revealing critical paths used by adversaries to capture network assets. Even with simplification, current a...
Leevar Williams, Richard Lippmann, Kyle Ingols