Sciweavers

82 search results - page 11 / 17
» Source-Based Software Risk Assessment
Sort
View
COMPSAC
2009
IEEE
15 years 2 months ago
A Framework for Cost Sensitive Assessment of Intrusion Response Selection
Abstract—In recent years, cost-sensitive intrusion response has gained significant interest, mainly due to its emphasis on the balance between potential damage incurred by the i...
Chris Strasburg, Natalia Stakhanova, Samik Basu, J...
APVIS
2004
14 years 11 months ago
A Solar System Metaphor for 3D Visualisation of Object Oriented Software Metrics
Early detection of problems within a code base can save much effort and associated cost as time progresses. One method of performing routine assessment of code with a view to pre-...
Hamish Graham, Hong Yul Yang, Rebecca Berrigan
77
Voted
EDBTW
2010
Springer
15 years 4 months ago
Expressing privacy metrics as one-symbol information
Organizations often need to release microdata without revealing sensitive information. To this scope, data are anonymized and, to assess the quality of the process, various privac...
Michele Bezzi
89
Voted
IADIS
2004
14 years 11 months ago
Process maturity for software project outsourcing
There is no standard model for judging the maturity of the software processes followed in software project outsourcing. The aim of this work is to describe a possible approach for...
Aatif Kamal, Arshad Ali, Ashiq Anjum, Fawad Nazir,...
IWC
2002
79views more  IWC 2002»
14 years 9 months ago
Trust in information sources: seeking information from people, documents, and virtual agents
The notion of trust has been virtually absent from most work on how people assess and choose their information sources. Based on two empirical cases this study shows that software ...
Morten Hertzum, Hans H. K. Andersen, Verner Anders...