Sciweavers

413 search results - page 37 / 83
» It outsourcing maturity model
Sort
View
COMPSAC
2008
IEEE
15 years 5 months ago
A Probabilistic Attacker Model for Quantitative Verification of DoS Security Threats
This work introduces probabilistic model checking as a viable tool-assisted approach for systematically quantifying DoS security threats. The proposed analysis is based on a proba...
Stylianos Basagiannis, Panagiotis Katsaros, Andrew...
JMLR
2010
162views more  JMLR 2010»
14 years 5 months ago
A Surrogate Modeling and Adaptive Sampling Toolbox for Computer Based Design
An exceedingly large number of scientific and engineering fields are confronted with the need for computer simulations to study complex, real world phenomena or solve challenging ...
Dirk Gorissen, Ivo Couckuyt, Piet Demeester, Tom D...
FDG
2009
ACM
15 years 5 months ago
Relating cognitive models of computer games to user evaluations of entertainment
As the interactive entertainment industry matures, a better understanding of what makes software entertaining is needed. A natural starting point is the application of traditional...
Paolo Piselli, Mark Claypool, James Doyle
JIISIC
2007
15 years 12 days ago
A Minimal OCL-based Profile for Model Transformation
The MDD (Model Driven Development) initiative covers a broad spectrum of research areas such as modeling languages, definition of transformation languages among models, and constr...
Roxana S. Giandini, Gabriela Pérez, Claudia...
CORR
2011
Springer
227views Education» more  CORR 2011»
14 years 6 months ago
Message Structures: a modelling technique for information systems analysis and design
Despite the increasing maturity of model-driven development (MDD), some research challenges remain open in the field of information systems (IS). For instance, there is a need to i...
Sergio España, Arturo González, Osca...