Sciweavers

3149 search results - page 213 / 630
» IT security risk management
Sort
View
CORIA
2008
13 years 11 months ago
On the use of tolerant graded inclusions in information retrieval
In this contribution, a fuzzy-set-based information retrieval model is considered. First, we show that the retrieval mechanism of such a retrieval model can be defined in terms of ...
Patrick Bosc, Olivier Pivert
JUCS
2008
155views more  JUCS 2008»
13 years 9 months ago
Determining Software Investment Lag
: The investments needed to bring a software project to the market are substantial and can extend over several years. Managing software development requires not only technical expe...
Gio Wiederhold
CSREASAM
2006
13 years 11 months ago
Firewall Design: Understandable, Designable and Testable
Firewalls are the cornerstones of network security. To make firewalls working effectively, firewall manager must design firewall rules and the rule order correctly. In this paper, ...
Yan-ning Huang, Yong Jiang
DEXAW
1999
IEEE
322views Database» more  DEXAW 1999»
14 years 2 months ago
The Process of Inconsistency Management: A Framework for Understanding
The process of managing inconsistency is a fundamental activity that permeates a large part of the systems development process. Failure to identify inconsistencies may lead to maj...
Bashar Nuseibeh, Steve M. Easterbrook
ITSSA
2006
132views more  ITSSA 2006»
13 years 9 months ago
A Self-Governance Approach to Supporting Privacy Preference-based Content Sharing
: The increase in the creation and sharing of distributed multimedia content has led to the creation of new tools and methods to automatically and manually annotate content to assi...
Patricia Charlton, Jonathan Teh