Sciweavers

9272 search results - page 1564 / 1855
» Process Management Agent
Sort
View
HICSS
2009
IEEE
123views Biometrics» more  HICSS 2009»
15 years 11 months ago
Towards Conceptual Metamodeling of IT Governance Frameworks Approach - Use - Benefits
Up to now, there has been little academic support for the challenges of IT governance/IT management. As a reaction, various best practice frameworks - like COBIT or CMMI - were de...
Matthias Goeken, Stefanie Alter
IEEEARES
2009
IEEE
15 years 11 months ago
Estimating ToE Risk Level Using CVSS
—Security management is about calculated risk and requires continuous evaluation to ensure cost, time and resource effectiveness. Parts of which is to make future-oriented, costb...
Siv Hilde Houmb, Virginia N. L. Franqueira
ISQED
2009
IEEE
328views Hardware» more  ISQED 2009»
15 years 11 months ago
VLSI architectures of perceptual based video watermarking for real-time copyright protection
For effective digital rights management (DRM) of multimedia in the framework of embedded systems, both watermarking and cryptography are necessary. In this paper, we present a wat...
Saraju P. Mohanty, Elias Kougianos, Wei Cai, Manis...
DAC
2009
ACM
15 years 11 months ago
On-line thermal aware dynamic voltage scaling for energy optimization with frequency/temperature dependency consideration
With new technologies, temperature has become a major issue to be considered at system level design. Without taking temperature aspects into consideration, no approach to energy o...
Min Bao, Alexandru Andrei, Petru Eles, Zebo Peng
IDTRUST
2009
ACM
15 years 11 months ago
Palantir: a framework for collaborative incident response and investigation
Organizations owning cyber-infrastructure assets face large scale distributed attacks on a regular basis. In the face of increasing complexity and frequency of such attacks, we ar...
Himanshu Khurana, Jim Basney, Mehedi Bakht, D. Mic...
« Prev « First page 1564 / 1855 Last » Next »