Sciweavers

2669 search results - page 315 / 534
» Improvement of a configuration management system
Sort
View
CCS
2006
ACM
15 years 5 months ago
A scalable approach to attack graph generation
Attack graphs are important tools for analyzing security vulnerabilities in enterprise networks. Previous work on attack graphs has not provided an account of the scalability of t...
Xinming Ou, Wayne F. Boyer, Miles A. McQueen
CSMR
2007
IEEE
15 years 8 months ago
Monitoring Requirements Evolution using Views
This paper describes a research project concentrating on improving requirements management. We started this research by identifying the problems companies face with respect to req...
Marco Lormans
CCGRID
2005
IEEE
15 years 7 months ago
A distributed resource and network partitioning architecture for service grids
Abstract In this paper, we propose the use of a distributed service management architecture for state-of-the-art service-enabled Grids. The architecture is capable of performing au...
Bruno Volckaert, Pieter Thysebaert, Marc De Leenhe...
HICSS
2000
IEEE
135views Biometrics» more  HICSS 2000»
15 years 6 months ago
The IT Performance Evaluation in the Construction Industry
To date there has been limited published work in the construction management and engineering literature that has provided empirical evidence to demonstrate that IT can improve org...
Heng Li, Zahir Irani, Peter E. D. Love
EMSOFT
2007
Springer
15 years 8 months ago
Exploiting non-volatile RAM to enhance flash file system performance
Non-volatile RAM (NVRAM) such as PRAM (Phase-change RAM), FeRAM (Ferroelectric RAM), and MRAM (Magnetoresistive RAM) has characteristics of both non-volatile storage and random ac...
In Hwan Doh, Jongmoo Choi, Donghee Lee, Sam H. Noh