Sciweavers

1151 search results - page 205 / 231
» A Requirements Negotiation Model Based on Multi-Criteria Ana...
Sort
View
AISM
2004
13 years 9 months ago
Understanding Challenges of Information Security Culture: A Methodological Issue
Although, many organisations have implemented technical solutions to protect information resources from adverse events, internal security breaches continue to occur. Therefore an ...
Omar Zakaria
COMCOM
2008
138views more  COMCOM 2008»
13 years 7 months ago
Secure content access and replication in pure P2P networks
Despite the advantages offered by pure Peer-to-Peer (P2P) networks (e.g. robustness and fault tolerance), a crucial requirement is to guarantee basic security properties, such as ...
Esther Palomar, Juan M. Estévez-Tapiador, J...
CORR
2007
Springer
137views Education» more  CORR 2007»
13 years 7 months ago
Subjective Evaluation of Forms in an Immersive Environment
: User’s perception of product, by essence subjective, is a major topic in marketing and industrial design. Many methods, based on users’ tests, are used so as to characterise ...
Jean-François Petiot, Damien Chablat
TSE
2008
113views more  TSE 2008»
13 years 7 months ago
Discovering Neglected Conditions in Software by Mining Dependence Graphs
Neglected conditions are an important but difficult-to-find class of software defects. This paper presents a novel approach for revealing neglected conditions that integrates stati...
Ray-Yaung Chang, Andy Podgurski, Jiong Yang
AI
2000
Springer
13 years 7 months ago
Stochastic dynamic programming with factored representations
Markov decisionprocesses(MDPs) haveproven to be popular models for decision-theoretic planning, but standard dynamic programming algorithms for solving MDPs rely on explicit, stat...
Craig Boutilier, Richard Dearden, Moisés Go...