Sciweavers

3674 search results - page 86 / 735
» Information Dependencies
Sort
View
CRYPTO
2007
Springer
106views Cryptology» more  CRYPTO 2007»
14 years 3 months ago
Information Security Economics - and Beyond
The economics of information security has recently become a thriving and fast-moving discipline. As distributed systems are assembled from machines belonging to principals with div...
Ross Anderson, Tyler Moore
HICSS
2009
IEEE
117views Biometrics» more  HICSS 2009»
14 years 3 months ago
Information Security: User Precautions, Attacker Efforts, and Enforcement
We analyze the strategic interactions among endusers and between end-users and attackers in mass and targeted attacks. In mass attacks, precautions by endusers are strategic subst...
Ivan P. L. Png, Qiu-Hong Wang
MSR
2006
ACM
14 years 2 months ago
The evolution radar: visualizing integrated logical coupling information
In software evolution research logical coupling has extensively been used to recover the hidden dependencies between source code artifacts. They would otherwise go lost because of...
Marco D'Ambros, Michele Lanza, Mircea Lungu
CSUR
2006
135views more  CSUR 2006»
13 years 8 months ago
Adaptive information extraction
The growing availability of on-line textual sources and the potential number of applications of knowledge acquisition from textual data has lead to an increase in Information Extr...
Jordi Turmo, Alicia Ageno, Neus Català
ECIS
2004
13 years 10 months ago
A study of information systems outsourcing risks
Despite the considerable growth of Information Systems (IS) outsourcing in recent years, this trend is still the object of strong criticism. This study has as its aim to show the ...
Reyes-G. Gonzalez, Jose Gasco, Juan Llopis