Sciweavers

4923 search results - page 186 / 985
» Software Risk Management
Sort
View
AVI
2006
15 years 6 months ago
Design and evaluation of a shoulder-surfing resistant graphical password scheme
When users input their passwords in a public place, they may be at risk of attackers stealing their password. An attacker can capture a password by direct observation or by record...
Susan Wiedenbeck, Jim Waters, Leonardo Sobrado, Je...
SIAMCO
2011
14 years 11 months ago
Nonlinear Black-Scholes Equations in Finance: Associated Control Problems and Properties of Solutions
We study properties of solutions to fully nonlinear versions of the standard Black– Scholes partial differential equation. These equations have been introduced in financial mat...
Rüdiger Frey, Ulrike Polte
STEP
2003
IEEE
15 years 10 months ago
Bloom's Taxonomy Levels for Three Software Engineer Profiles
This paper is the product of a workshop held in Amsterdam during the Software Technology and Practice Conference (STEP 2003). The purpose of the paper is to propose Bloom’s taxo...
Pierre Bourque, Luigi Buglione, Alain Abran, Alain...
ICSE
2009
IEEE-ACM
15 years 9 months ago
ReMan: A pro-active reputation management infrastructure for composite Web services
REMAN is a reputation management infrastructure for composite Web services. It supports the aggregation of client feedback on the perceived QoS of external services, using reputat...
Domenico Bianculli, Walter Binder, Mauro Luigi Dra...
WORM
2003
15 years 6 months ago
Access for sale: a new class of worm
The damage inflicted by viruses and worms has been limited because the payloads that are most lucrative to malware authors have also posed the greatest risks to them. The problem...
Stuart E. Schechter, Michael D. Smith