Sciweavers

1183 search results - page 58 / 237
» Risk Management with Benchmarking
Sort
View
CHES
2005
Springer
111views Cryptology» more  CHES 2005»
15 years 5 months ago
Security Limits for Compromising Emanations
Nearly half a century ago, military organizations introduced “Tempest” emission-security test standards to control information leakage from unintentional electromagnetic emanat...
Markus G. Kuhn
ICSE
2003
IEEE-ACM
15 years 12 months ago
Cost Estimation for Web Applications
In this paper, we investigate the application of the COBRATM method (Cost Estimation, Benchmarking, and Risk Assessment) in a new application domain, the area of web development. ...
Melanie Ruhe, D. Ross Jeffery, Isabella Wieczorek
ICMAS
2000
15 years 1 months ago
Integer Programming for Combinatorial Auction Winner Determination
Combinatorial auctions are important as they enable bidders to place bids on combinations of items; compared to other auction mechanisms, they often increase the efficiency of the...
Arne Andersson, Mattias Tenhunen, Fredrik Ygge
HICSS
2006
IEEE
102views Biometrics» more  HICSS 2006»
15 years 6 months ago
Organization Antecedents of Successful IT Management
As local law enforcement organizations continue to embrace IT, the successful management of these technologies will continue to have expanding implications for the municipal organ...
Keith Schildt, Suzanne Beaumaster, Susan Bailey
PAKM
2000
15 years 1 months ago
Knowledge Re-Use as Engineering Re-Use: Extracting Values from Knowledge Management
This paper presents a knowledge-sharing framework for achieving effective knowledge reuse within industrial organisations. This knowledge re-use paradigm goes beyond traditional e...
Christopher Yeung, Tony Holden