Sciweavers

669 search results - page 114 / 134
» Managing the Risk of IT Outsourcing
Sort
View
IRI
2008
IEEE
14 years 2 months ago
Model check stochastic supply chains
—Supply chain [2], [6] is an important component of business operations. Understanding its stochastic behaviors is the key to risk analysis and performance evaluation in supply c...
Li Tan, Shenghan Xu
AIMS
2008
Springer
14 years 2 months ago
Towards Resilient Community Wireless Mesh Networks
Abstract. Wireless Mesh Networks are an increasingly common technology providing connectivity in many communities, particularly where Internet access is unavailable or restricted v...
Sara Bury, Nicholas J. P. Race
ESA
2007
Springer
125views Algorithms» more  ESA 2007»
14 years 2 months ago
Online Primal-Dual Algorithms for Maximizing Ad-Auctions Revenue
We study the online ad-auctions problem introduced by Mehta et. al. [15]. We design a (1 − 1/e)competitive (optimal) algorithm for the problem, which is based on a clean primal-...
Niv Buchbinder, Kamal Jain, Joseph Naor
PKC
2007
Springer
144views Cryptology» more  PKC 2007»
14 years 2 months ago
Traceable Ring Signature
Abstract. The ring signature allows a signer to leak secrets anonymously, without the risk of identity escrow. At the same time, the ring signature provides great flexibility: No ...
Eiichiro Fujisaki, Koutarou Suzuki
SEAFOOD
2007
Springer
14 years 2 months ago
An Evaluation Method for Offshore Software Development by Structural Equation Modeling
Abstract. To determine the magnitude of risk factors in offshore software development, we explain how structural equation modeling works for questionnaire samples. Each response to...
Yoshihisa Wada, Daiki Nakahigashi, Hiroshi Tsuji