Sciweavers

669 search results - page 101 / 134
» Managing the Risk of IT Outsourcing
Sort
View
HICSS
2002
IEEE
123views Biometrics» more  HICSS 2002»
14 years 1 months ago
On the Performance of a Survivability Architecture for Networked Computing Systems
This research focuses on the performance and timing behavior of a two level survivability architecture. The lower level of the architecture involves attack analysis based on kernel...
William S. Harrison, Axel W. Krings, Nadine Hanebu...
ICECCS
2000
IEEE
196views Hardware» more  ICECCS 2000»
14 years 27 days ago
Complexity: Concept, Causes and Control
Complexity arises from many sources – both within and outwith the system. Internal sources include modern hardware, e.g. super-scalar processors, and external sources include th...
John A. McDermid
SIGECOM
2000
ACM
121views ECommerce» more  SIGECOM 2000»
14 years 26 days ago
Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior
Reputation reporting systems have emerged as an important risk management mechanism in online trading communities. However, the predictive value of these systems can be compromise...
Chrysanthos Dellarocas
CAISE
2006
Springer
14 years 7 days ago
On the Notion of Value Object
It is increasingly recognized that business models offer an abstraction that is useful not only in the exploration of new business networks but also for the design and redesign of ...
Hans Weigand, Paul Johannesson, Birger Andersson, ...
WSC
2007
13 years 10 months ago
Allocation of resources for hospital evacuations via simulation
Department of Health and Environmental Control (DHEC) issued an order recently requiring that all hospitals have an evacuation plan with the following components: sheltering plan,...
Esengul Tayfur, Kevin Taaffe