Sciweavers

1411 search results - page 184 / 283
» Case Studies of an Insider Framework
Sort
View
INFOCOM
2008
IEEE
14 years 3 months ago
On Data-Centric Trust Establishment in Ephemeral Ad Hoc Networks
—We argue that the traditional notion of trust as a relation among entities, while useful, becomes insufficient for emerging data-centric mobile ad hoc networks. In these system...
Maxim Raya, Panagiotis Papadimitratos, Virgil D. G...
VL
2008
IEEE
130views Visual Languages» more  VL 2008»
14 years 3 months ago
Exploring the evolution of software quality with animated visualization
Assessing software quality and understanding how events in its evolution have lead to anomalies are two important steps toward reducing costs in software maintenance. Unfortunatel...
Guillaume Langelier, Houari A. Sahraoui, Pierre Po...
ER
2007
Springer
128views Database» more  ER 2007»
14 years 3 months ago
Dynamic Modeling of Trajectory Patterns using Data Mining and Reverse Engineering
The constant increase of moving object data imposes the need for modeling, processing, and mining trajectories, in order to find and understand the patterns behind these data. Ex...
Luis Otávio Alvares, Vania Bogorny, Jos&eac...
SAMOS
2007
Springer
14 years 3 months ago
Towards Multi-application Workload Modeling in Sesame for System-Level Design Space Exploration
The Sesame modeling and simulation framework aims at early and thus efficient system-level design space exploration of embedded multimedia system architectures. So far, Sesame onl...
Mark Thompson, Andy D. Pimentel
HICSS
2006
IEEE
101views Biometrics» more  HICSS 2006»
14 years 3 months ago
IT Projects: Conflict, Governance, and Systems Thinking
Triggered by several embarrassing (and costly) IT project collapses in New Zealand’s public sector, a government report found that effective project control required good govern...
David Johnstone, Sid L. Huff, Beverley G. Hope