Sciweavers

669 search results - page 80 / 134
» Managing the Risk of IT Outsourcing
Sort
View
BIRTHDAY
2009
Springer
14 years 7 months ago
Management of UML Clusters
Abstract. Software engineering uses UML diagrams as a standard technique for specification and development of software. Various UML diagrams are used for specification of different...
Peggy Schmidt, Bernhard Thalheim
SOUPS
2006
ACM
15 years 3 months ago
Decision strategies and susceptibility to phishing
Phishing emails are semantic attacks that con people into divulging sensitive information using techniques to make the user believe that information is being requested by a legiti...
Julie S. Downs, Mandy B. Holbrook, Lorrie Faith Cr...
APSEC
2005
IEEE
15 years 3 months ago
An Industrial Case Study on Requirements Volatility Measures
Requirements volatility is an important risk factor for software projects. Software measures can help in quantifying and predicting this risk. In this paper, we present an industr...
Annabella Loconsole, Jürgen Börstler
CORR
2006
Springer
99views Education» more  CORR 2006»
14 years 10 months ago
Statistical mechanics of neocortical interactions: Portfolio of Physiological Indicators
There are several kinds of non-invasive imaging methods that are used to collect data from the brain, e.g., EEG, MEG, PET, SPECT, fMRI, etc. It is difficult to get resolution of i...
Lester Ingber
DSN
2009
IEEE
14 years 7 months ago
ICT resilience of power control systems: experimental results from the CRUTIAL testbeds
Distributed intelligence and secure interconnected communication networks constitute recognized key factors for the economic operation of electricity infrastructures in competitiv...
Giovanna Dondossola, Fabrizio Garrone, Judit Szant...