Sciweavers

2270 search results - page 10 / 454
» Modelling Secure IT Systems - A Survey
Sort
View
AISM
2004
13 years 10 months ago
Approaches to IT Security in Small and Medium Enterprises
Organisations of all sizes are now significantly reliant upon information technology and networks for the operation of their business activities. All therefore have a consequent r...
Vassilis Dimopoulos, Steven Furnell, Murray Jennex...
CORR
2008
Springer
114views Education» more  CORR 2008»
13 years 8 months ago
Modeling Time in Computing: A Taxonomy and a Comparative Survey
The increasing relevance of areas such as real-time and embedded systems, pervasive computing, hybrid systems control, and biological and social systems modeling is bringing a gro...
Carlo A. Furia, Dino Mandrioli, Angelo Morzenti, M...
GD
2008
Springer
13 years 9 months ago
Graph Drawing for Security Visualization
Abstract. As the number of devices connected to the internet continues to grow rapidly and software systems are being increasingly deployed on the web, security and privacy have be...
Roberto Tamassia, Bernardo Palazzi, Charalampos Pa...
PE
2010
Springer
135views Optimization» more  PE 2010»
13 years 3 months ago
Performance evaluation of component-based software systems: A survey
Performance prediction and measurement approaches for component-based software systems help software architects to evaluate their systems based on component performance specificat...
Heiko Koziolek
PERCOM
2006
ACM
14 years 8 months ago
Balancing Autonomy and User Control in Context-Aware Systems - a Survey
Application autonomy can reduce interactions with users, ease the use of the system, and decrease user distraction. On the other hand, users may feel loss of control over their ap...
Bob Hardian, Jadwiga Indulska, Karen Henricksen