Sciweavers

206 search results - page 30 / 42
» Deploying Agile Practices in Organizations: A Case Study
Sort
View
HICSS
2007
IEEE
137views Biometrics» more  HICSS 2007»
14 years 1 months ago
Value Driven Security Threat Modeling Based on Attack Path Analysis
This paper presents a quantitative threat modeling method, the Threat Modeling method based on Attack Path Analysis (T-MAP), which quantifies security threats by calculating the t...
Yue Chen, Barry W. Boehm, Luke Sheppard
IPPS
2008
IEEE
14 years 2 months ago
Assuring information quality in e-Science
In this paper we outline a framework for assuring information quality (IQ) in an e-Science context, using semiotics theory, semantic explanation of resources, and data couplings. ...
Ying Su, Zhanming Jin, Jie Peng
WPES
2004
ACM
14 years 1 months ago
Specifying privacy policies with P3P and EPAL: lessons learned
As computing becomes more ubiquitous and Internet use continues to rise, it is increasingly important for organizations to construct accurate and effective privacy policies that d...
William H. Stufflebeam, Annie I. Antón, Qin...
OSDI
2002
ACM
14 years 7 months ago
TCP Nice: A Mechanism for Background Transfers
Many distributed applications can make use of large background transfers ? transfers of data that humans are not waiting for ? to improve availability, reliability, latency or con...
Arun Venkataramani, Ravi Kokku, Michael Dahlin
CSCW
2004
ACM
13 years 7 months ago
Domestic Routines and Design for the Home
The domestic environment is predicted by market analysts to be the major growth area in computing over the next decade, yet it is a poorly understood domain at the current time of...
Andy Crabtree, Tom Rodden