Sciweavers

357 search results - page 30 / 72
» A methodology for the selection of requirements engineering ...
Sort
View
COMPSAC
2005
IEEE
13 years 9 months ago
Efficiently Managing Security Concerns in Component Based System Design
Component-based software development (CBSD) offers many advantages like reduced product time to market, reduced complexity and cost etc. Despite these advantages its wide scale ut...
Ammar Masood, Sahra Sedigh-Ali, Arif Ghafoor
EUROCRYPT
2010
Springer
14 years 12 days ago
Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption
In this paper, we present two fully secure functional encryption schemes. Our first result is a fully secure attribute-based encryption (ABE) scheme. Previous constructions of AB...
Allison B. Lewko, Tatsuaki Okamoto, Amit Sahai, Ka...
HICSS
2006
IEEE
123views Biometrics» more  HICSS 2006»
14 years 1 months ago
An Economic Model for Comparing Search Services
Search services are now ubiquitously employed in searching for documents on the Internet and on enterprise intranets. This research develops an economic model for comparing search...
Stephen K. Kwan, Shailaja Venkatsubramanyan
CAISE
2010
Springer
13 years 8 months ago
Situational Evaluation of Method Fragments: An Evidence-Based Goal-Oriented Approach
Despite advances in situational method engineering, many software organizations continue to adopt an ad-hoc mix of method fragments from wellknown development methods such as Scrum...
Hesam Chiniforooshan Esfahani, Eric Yu, Jordi Cabo...
JMLR
2010
157views more  JMLR 2010»
13 years 2 months ago
Causality Challenge: Benchmarking relevant signal components for effective monitoring and process control
A complex modern manufacturing process is normally under consistent surveillance via the monitoring of signals/variables collected from sensors. However, not all of these signals ...
Michael McCann, Yuhua Li, Liam P. Maguire, Adrian ...