Sciweavers

62 search results - page 4 / 13
» assets 2004
Sort
View
ISI
2004
Springer
15 years 2 months ago
Composite Role-Based Monitoring (CRBM) for Countering Insider Threats
Through their misuse of authorized privileges, insiders have caused great damage and loss to corporate internal information assets, especially within the Intelligence Community (IC...
Joon S. Park, Shuyuan Mary Ho
SPLC
2004
14 years 11 months ago
A Feature-Based Approach to Product Line Production Planning
Abstract. A production plan, which describes how core assets are used to develop products, has an important role in product line engineering as a communication medium between core ...
Jaejoon Lee, Kyo Chul Kang, Sajoong Kim
AOSD
2004
ACM
15 years 3 months ago
Deriving security requirements from crosscutting threat descriptions
It is generally accepted that early determination of the stakeholder requirements assists in the development of systems that better meet the needs of those stakeholders. General s...
Charles B. Haley, Robin C. Laney, Bashar Nuseibeh
CSMR
2004
IEEE
15 years 1 months ago
Legacy Software Evaluation Model for Outsourced Maintainer
Outsourcing has become common practice in the software industry. Organizations routinely subcontract the maintenance of their software assets to specialized companies. A great cha...
Cristiane S. Ramos, Káthia Marçal de...
CAI
2004
Springer
14 years 9 months ago
On the Use of the Choquet Integral for the Collaborative Creation of Learning Objects
Abstract. Computer-supported collaborative knowledge creation is the continuous process of development of knowledge assets, where produced knowledge has to be assessed by the devel...
Juan Manuel Dodero, Miguel-Ángel Sicilia, C...