Sciweavers

669 search results - page 111 / 134
» Managing the Risk of IT Outsourcing
Sort
View
MANSCI
2007
92views more  MANSCI 2007»
13 years 8 months ago
The Strategic Perils of Delayed Differentiation
Postponement or delayed product differentiation has been identified as a key strategy to manage increasing demand uncertainty. The benefits of postponement arise out of the abil...
Krishnan S. Anand, Karan Girotra
VEE
2010
ACM
238views Virtualization» more  VEE 2010»
14 years 1 months ago
Optimizing crash dump in virtualized environments
Crash dump, or core dump is the typical way to save memory image on system crash for future offline debugging and analysis. However, for typical server machines with likely abund...
Yijian Huang, Haibo Chen, Binyu Zang
DAC
1999
ACM
14 years 9 months ago
CAD Directions for High Performance Asynchronous Circuits
This paper describes a novel methodology for high performance asynchronous design based on timed circuits and on CAD support for their synthesis using Relative Timing. This method...
Ken S. Stevens, Shai Rotem, Steven M. Burns, Jordi...
ESORICS
2009
Springer
14 years 9 months ago
User-Centric Handling of Identity Agent Compromise
Digital identity credentials are a key enabler for important online services, but widespread theft and misuse of such credentials poses serious risks for users. We believe that an ...
Daisuke Mashima, Mustaque Ahamad, Swagath Kannan
SIGMOD
2004
ACM
170views Database» more  SIGMOD 2004»
14 years 8 months ago
A Formal Analysis of Information Disclosure in Data Exchange
We perform a theoretical study of the following queryview security problem: given a view V to be published, does V logically disclose information about a confidential query S? The...
Gerome Miklau, Dan Suciu