Sciweavers

669 search results - page 58 / 134
» Managing the Risk of IT Outsourcing
Sort
View
RE
2001
Springer
15 years 4 months ago
Evolving Beyond Requirements Creep: A Risk-Based Evolutionary Prototyping Model
Evolutionary prototyping focuses on gathering a correct and consistent set of requirements. The process lends particular strength to building quality software by means of the ongo...
Ryan A. Carter, Annie I. Antón, Laurie A. W...
CMS
2006
127views Communications» more  CMS 2006»
15 years 1 months ago
Towards Practical Attacker Classification for Risk Analysis in Anonymous Communication
Abstract. There are a number of attacker models in the area of anonymous communication. Most of them are either very simplified or pretty abstract - therefore difficult to generali...
Andriy Panchenko, Lexi Pimenidis
ICEIS
2002
IEEE
15 years 4 months ago
The AEX Method and Its Instrumentation
: We aim at elaborating a decision support system to manage concrete experience, using Artificial Intelligence methods, such as Case-Based Reasoning. We target any organization tha...
Sabine Delaître, Alain Giboin, Sabine Moisan
ITRUST
2005
Springer
15 years 5 months ago
Experience-Based Trust: Enabling Effective Resource Selection in a Grid Environment
The Grid vision is to allow heterogeneous computational resources to be shared and utilised globally. Grid users are able to submit tasks to remote resources for execution. Howeve...
Nathan Griffiths, Kuo-Ming Chao
ICIS
2000
15 years 1 months ago
Mechanisms for coping with unfair ratings and discriminatory behavior in online reputation reporting systems
Reputation reporting systems have emerged as an important risk management mechanism in online trading communities. However, the predictive value of these systems can be compromise...
Chrysanthos Dellarocas