Sciweavers

2608 search results - page 170 / 522
» Issue Management
Sort
View
109
Voted
SIGUCCS
1999
ACM
15 years 7 months ago
Who's Got the Key?
This paper attempts to illuminate several fundamental concepts used in the creation of a Public Key Infrastructure (PKI). These concepts include encryption, public key cryptograph...
David Henry
122
Voted
SERP
2004
15 years 4 months ago
Using UML in a Risk-Driven Development Process
Risk-driven development focus on identifying and treating risks as an integrated part of the development process. One then obtain an adequate security level by treating security i...
Siv Hilde Houmb, Ørjan Markhus Lillevik
JOT
2006
92views more  JOT 2006»
15 years 3 months ago
Complexity, its in the mind of the beholder
Complexity is a much analyzed, much debated, much measured property of softwareintensive products. From a strategic point of view, complexity has implications for the development ...
John D. McGregor
148
Voted
CJ
2006
84views more  CJ 2006»
15 years 3 months ago
Instruction Level Parallelism through Microthreading - A Scalable Approach to Chip Multiprocessors
Most microprocessor chips today use an out-of-order instruction execution mechanism. This mechanism allows superscalar processors to extract reasonably high levels of instruction ...
Kostas Bousias, Nabil Hasasneh, Chris R. Jesshope
131
Voted
SPRINGSIM
2007
15 years 4 months ago
Bringing knowledge to network defense
Security managers must scan through multiple continuous data streams issuing from diverse sources in an effort to defend computer networks from attack. However, manual aggregation...
Leigh Flagg, Gordon Streeter, Andrew Potter