Sciweavers

1183 search results - page 111 / 237
» Risk Management with Benchmarking
Sort
View
GCC
2004
Springer
15 years 9 months ago
Trust Establishment in Large Scale Grid Settings
Trust establishment is hard in grid architecture by the ad hoc nature. To set up trust in large scale of network is more difficult. In this paper, we propose an automatic key manag...
Bo Zhu, Tieyan Li, Huafei Zhu, Mohan S. Kankanhall...
HICSS
2002
IEEE
123views Biometrics» more  HICSS 2002»
15 years 9 months ago
On the Performance of a Survivability Architecture for Networked Computing Systems
This research focuses on the performance and timing behavior of a two level survivability architecture. The lower level of the architecture involves attack analysis based on kernel...
William S. Harrison, Axel W. Krings, Nadine Hanebu...
ICECCS
2000
IEEE
196views Hardware» more  ICECCS 2000»
15 years 8 months ago
Complexity: Concept, Causes and Control
Complexity arises from many sources – both within and outwith the system. Internal sources include modern hardware, e.g. super-scalar processors, and external sources include th...
John A. McDermid
SIGECOM
2000
ACM
121views ECommerce» more  SIGECOM 2000»
15 years 8 months ago
Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior
Reputation reporting systems have emerged as an important risk management mechanism in online trading communities. However, the predictive value of these systems can be compromise...
Chrysanthos Dellarocas
CAISE
2006
Springer
15 years 8 months ago
On the Notion of Value Object
It is increasingly recognized that business models offer an abstraction that is useful not only in the exploration of new business networks but also for the design and redesign of ...
Hans Weigand, Paul Johannesson, Birger Andersson, ...