Sciweavers

669 search results - page 73 / 134
» Managing the Risk of IT Outsourcing
Sort
View
HICSS
2005
IEEE
109views Biometrics» more  HICSS 2005»
15 years 5 months ago
Staffing Software Maintenance and Support Projects
In the past decade outsourcing a software system’s support and maintenance has become relatively common across most organizations. In this paper we consider a few issues governi...
Jai Asundi, Sumit Sarkar
ESORICS
2005
Springer
15 years 5 months ago
Minimal Disclosure in Hierarchical Hippocratic Databases with Delegation
Abstract. Hippocratic Databases have been proposed as a mechanism to guarantee the respect of privacy principles in data management. We argue that three major principles are missin...
Fabio Massacci, John Mylopoulos, Nicola Zannone
JIT
2005
Springer
134views Database» more  JIT 2005»
15 years 5 months ago
MAGI - Mobile Access to Grid Infrastructure: Bringing the gifts of Grid to Mobile Computing
: Access to Grid services is currently limited to devices having significant computing, network resources etc. such as desktop computers. On the other hand, most of mobile devices ...
Ali Sajjad, Hassan Jameel, Umar Kalim, Young-Koo L...
FTDCS
2004
IEEE
15 years 3 months ago
A New Perspective in Defending against DDoS
Distributed denial of service (DDoS) is a major threat to the availability of Internet services. The anonymity allowed by IP networking, together with the distributed, large scale...
Shigang Chen, Randy Chow
WSC
2007
15 years 2 months ago
Partial cross training in call centers with uncertain arrivals and global service level agreements
Inbound call center operations are challenging to manage; there is considerable uncertainty in estimates of arrival rates, and the operation is often subject to strict service lev...
Thomas R. Robbins, Terry P. Harrison, Deborah J. M...