Sciweavers

2632 search results - page 332 / 527
» Management Issues in Eda
Sort
View
ESEM
2008
ACM
15 years 6 months ago
Why do programmers avoid metrics?
Software process improvement initiatives such as metrics programs have a high failure rate during their assimilation in a software organization. Social and organizational issues a...
Medha Umarji, Carolyn B. Seaman
ESORICS
2010
Springer
15 years 4 months ago
D(e|i)aling with VoIP: Robust Prevention of DIAL Attacks
We carry out attacks using Internet services that aim to keep telephone devices busy, hindering legitimate callers from gaining access. We use the term DIAL (Digitally Initiated A...
Alexandros Kapravelos, Iasonas Polakis, Elias Atha...
ISF
2008
114views more  ISF 2008»
15 years 4 months ago
An OVAL-based active vulnerability assessment system for enterprise computer networks
Abstract Many security problems are caused by vulnerabilities hidden in enterprise computer networks. It is very important for system administrators to have knowledge about the sec...
Xiuzhen Chen, Qinghua Zheng, Xiaohong Guan
COMPUTER
2002
91views more  COMPUTER 2002»
15 years 4 months ago
Representative Democracy and the Profession
the term refers in an abstract way to a process or institution under which government openly solicits, preserves, and fosters information about its citizens' interests. At the...
W. Neville Holmes
VLSID
2008
IEEE
150views VLSI» more  VLSID 2008»
16 years 5 months ago
PTSMT: A Tool for Cross-Level Power, Performance, and Thermal Exploration of SMT Processors
Simultaneous Multi-Threading (SMT) processors are becoming popular because they exploit both instruction-level and threadlevel parallelism by issuing instructions from different t...
Deepa Kannan, Aseem Gupta, Aviral Shrivastava, Nik...