Sciweavers

1183 search results - page 85 / 237
» Risk Management with Benchmarking
Sort
View
ECBS
2008
IEEE
121views Hardware» more  ECBS 2008»
15 years 10 months ago
Agile Release Planning: Dealing with Uncertainty in Development Time and Business Value
Release planning is a critical activity in the software development process. The creation of a clear and realistic plan is extremely difficult, as key factors such as time and cos...
Kevin Logue, Kevin McDaid
RE
2007
Springer
15 years 10 months ago
Secure and Dependable Patterns in Organizations: An Empirical Approach
Designing a secure and dependable system is not just a technical issue, it involves also a deep analysis of the organizational and the social environment in which the system will ...
Yudistira Asnar, Paolo Giorgini, Roberto Bonato, V...
119
Voted
SEC
2007
15 years 5 months ago
Identity Theft - Empirical evidence from a Phishing Exercise
Identity theft is an emerging threat in our networked world and more individuals and companies fall victim to this type of fraud. User training is an important part of ICT security...
Tjaart Steyn, Hennie A. Kruger, Lynette Drevin
140
Voted
EUROMED
2010
15 years 2 months ago
A Sustainable Repository Infrastructure for Digital Humanities: The DHO Experience
Abstract. The Digital Humanities Observatory was created to support the longterm management of electronic cultural heritage resources for the digital humanities in Ireland. However...
Donald Gourley, Paolo Battino Viterbo
AMW
2011
14 years 7 months ago
Private Database Synthesis for Outsourced System Evaluation
The goal of this paper is to permit secure outsourced system evaluation. We propose a method for generating synthetic databases and obfuscating a workload of queries in order to pr...
Vani Gupta, Gerome Miklau, Neoklis Polyzotis