Sciweavers

164 search results - page 6 / 33
» How to Model Operational Risk If You Must
Sort
View
SIGUCCS
2003
ACM
15 years 3 months ago
WebDAV: what it is, what it does, why you need it
Legacy network file services such as NFS, SMB/CIFS, and AFP changed the way we worked. File services running on crossplatform networks allowed us to save our files on remote syste...
Luis O. Hernández, Mahmoud Pegah
SACMAT
2004
ACM
15 years 3 months ago
Using trust and risk in role-based access control policies
Emerging trust and risk management systems provide a framework for principals to determine whether they will exchange resources, without requiring a complete definition of their ...
Nathan Dimmock, András Belokosztolszki, Dav...
CMG
2001
14 years 11 months ago
Jump Start Your Performance Career Using Analytic Modeling
What is the career path for a performance analyst? A capacity planner? Most technicians paid their dues in the trenches of systems programming or operations. Having done it all, t...
Denise P. Kalm
MODELS
2007
Springer
15 years 4 months ago
Deriving Operation Contracts from UML Class Diagrams
Class diagrams must be complemented with a set of system operations that describes how users can modify and evolve the system state. To be useful, such a set must be complete (i.e....
Jordi Cabot, Cristina Gómez
WCE
2007
14 years 11 months ago
Surface Classification from Aircraft Icing Droplet Splash Images
— The build up of water ice on aircraft flight surfaces poses a significant safety risk. As a result, much effort has gone into studying this problem in order to understand how i...
Xueqing Zhang, Stuart Barnes, David W. Hammond