Sciweavers

1012 search results - page 115 / 203
» Identification of System Software Components Using Clusterin...
Sort
View
HICSS
2009
IEEE
209views Biometrics» more  HICSS 2009»
14 years 4 months ago
SIDD: A Framework for Detecting Sensitive Data Exfiltration by an Insider Attack
Detecting and mitigating insider threat is a critical element in the overall information protection strategy. By successfully implementing tactics to detect this threat, organizat...
Yali Liu, Cherita L. Corbett, Ken Chiang, Rennie A...
CISIS
2008
IEEE
14 years 3 months ago
Hybrid Performance Modeling and Prediction of Large-Scale Computing Systems
Abstract—Performance is a key feature of large-scale computing systems. However, the achieved performance when a certain program is executed is significantly lower than the maxi...
Sabri Pllana, Siegfried Benkner, Fatos Xhafa, Leon...
SEM
2004
Springer
14 years 2 months ago
Extending Standard Java Runtime Systems for Resource Management
Resource management is a precondition to build reliable, extensible middleware and to host potentially untrusted user components. Resource accounting allows to charge users for the...
Walter Binder, Jarle Hulaas
ICEIS
1999
IEEE
14 years 1 months ago
Facilitating Organisational Activities Using Plans and Audits
Group Decision Support Systems (GDSS) present important limitations that constrain their usage in current organisations. The fundamental reason is the lack of integration in the c...
Carlos J. Costa, Tania Ho, Pedro Antunes
ADBIS
2005
Springer
138views Database» more  ADBIS 2005»
14 years 2 months ago
Software Quality and Life Cycles
Abstract. Quality of software has growing role of the modern software engineering work. Typical current trends in the development process are the dominating role of quality systems...
Hannu Jaakkola, Bernhard Thalheim