Sciweavers

669 search results - page 122 / 134
» Managing the Risk of IT Outsourcing
Sort
View
SIGSOFT
2010
ACM
13 years 6 months ago
Rethinking the economics of software engineering
Reliance on skilled developers reduces the return on investment for important software engineering tasks such as establishing program correctness. This position paper introduces a...
Todd W. Schiller, Michael D. Ernst
ESIAT
2009
IEEE
13 years 6 months ago
A Novel Application of Variable Fuzzy Set on Alarming of Coalmine Gas
Coalmine gas disaster is one of the severe natural disasters that restrict the safety production of coalmines. Timely monitoring and alarming of coalmine gas is an important part o...
Jinhui Zhao, Mingliang Li, Xu Qian, Lijuan Jia
JDCTA
2010
143views more  JDCTA 2010»
13 years 3 months ago
A Potent Model for Unwanted Traffic Detection in QoS Network Domain
Unwanted traffic injection which amplifies the traffic loading and exhausts network resources is counted as network security threat. Despite of the numerous protection systems, th...
Abdulghani Ali, Aman Jantan, Ghassan Ahmed Ali
EGITALY
2011
12 years 8 months ago
Information Visualization on Organized Crime Trials
Today everyone on the Internet becomes an active writer. It is simpler than ever to produce and to share new knowledge on the net. Users risk to be overwhelmed by too much informa...
Lorenzo Di Silvestro, Giovanni Gallo, Giovanni Giu...
TON
2012
11 years 11 months ago
On New Approaches of Assessing Network Vulnerability: Hardness and Approximation
—Society relies heavily on its networked physical infrastructure and information systems. Accurately assessing the vulnerability of these systems against disruptive events is vit...
Thang N. Dinh, Ying Xuan, My T. Thai, Panos M. Par...