Sciweavers

669 search results - page 85 / 134
» Managing the Risk of IT Outsourcing
Sort
View
DEXAW
1999
IEEE
322views Database» more  DEXAW 1999»
15 years 2 months ago
The Process of Inconsistency Management: A Framework for Understanding
The process of managing inconsistency is a fundamental activity that permeates a large part of the systems development process. Failure to identify inconsistencies may lead to maj...
Bashar Nuseibeh, Steve M. Easterbrook
ITSSA
2006
132views more  ITSSA 2006»
14 years 9 months ago
A Self-Governance Approach to Supporting Privacy Preference-based Content Sharing
: The increase in the creation and sharing of distributed multimedia content has led to the creation of new tools and methods to automatically and manually annotate content to assi...
Patricia Charlton, Jonathan Teh
OTM
2007
Springer
15 years 4 months ago
Managing Pervasive Environment Privacy Using the "fair trade" Metaphor
Abstract. This article presents a proposal for managing privacy in pervasive environments. These environments are capable of sensing personal information anywhere and at anytime. T...
Abraham Esquivel, Pablo A. Haya, Manuel Garc&iacut...
CISIS
2010
IEEE
15 years 3 months ago
Resilient Critical Infrastructure Management Using Service Oriented Architecture
—The SERSCIS project aims to support the use of interconnected systems of services in Critical Infrastructure (CI) applications. The problem of system interconnectedness is aptly...
Martin Hall-May, Mike Surridge
INFOCOM
2009
IEEE
15 years 4 months ago
Lightweight Remote Image Management for Secure Code Dissemination in Wireless Sensor Networks
Abstract—Wireless sensor networks are considered ideal candidates for a wide range of applications. It is desirable and sometimes necessary to reprogram sensor nodes through wire...
An Liu, Peng Ning, Chun Wang