Sciweavers

669 search results - page 84 / 134
» Managing the Risk of IT Outsourcing
Sort
View
NSDI
2008
15 years 6 days ago
Understanding Privacy Settings in Facebook with an Audience View
Users of online social networking communities are disclosing large amounts of personal information, putting themselves at a variety of risks. Our ongoing research investigates mec...
Heather Richter Lipford, Andrew Besmer, Jason Wats...
WSC
2008
15 years 6 days ago
Valuation of variable annuity contracts with cliquet options in Asia markets
Variable annuities are very appealing to the investor. For example, in United States, sales volume on variable annuities grew to a record 184 billion in calendar year 2006. Howeve...
Ming-hua Hsieh
CORIA
2008
14 years 11 months ago
On the use of tolerant graded inclusions in information retrieval
In this contribution, a fuzzy-set-based information retrieval model is considered. First, we show that the retrieval mechanism of such a retrieval model can be defined in terms of ...
Patrick Bosc, Olivier Pivert
JUCS
2008
155views more  JUCS 2008»
14 years 9 months ago
Determining Software Investment Lag
: The investments needed to bring a software project to the market are substantial and can extend over several years. Managing software development requires not only technical expe...
Gio Wiederhold
ER
2004
Springer
169views Database» more  ER 2004»
15 years 3 months ago
Intentional Modeling to Support Identity Management
Identity management has arisen as a major and urgent challenge for internet-based communications and information services. Internet services involve complex networks of relationshi...
Lin Liu, Eric S. K. Yu