Sciweavers

1824 search results - page 208 / 365
» Practices and Techniques for Engineering Process Capability ...
Sort
View
ECSA
2011
Springer
14 years 3 months ago
Delta-oriented architectural variability using MontiCore
Modeling of software architectures is a fundamental part of software development processes. Reuse of software components and early analysis of software topologies allow the reduct...
Arne Haber, Thomas Kutz, Holger Rendel, Bernhard R...
TASE
2007
IEEE
15 years 10 months ago
Constraint-Based Policy Negotiation and Enforcement for Telco Services
Telco services are evolving under several aspects: for instance, services may combine different telecommunication features (messaging, multi-media, etc.) and may be activated and...
Maria Grazia Buscemi, Laura Ferrari, Corrado Moiso...
ECIS
2004
15 years 5 months ago
Deriving business value from IT: converting IT expenditures into assets with desired impacts
The research reported in this paper examines how business value is being created and delivered by IT in large private organisations in Australia. The critical organisational gover...
Judy McKay, Peter Marshall
JNW
2008
97views more  JNW 2008»
15 years 3 months ago
Vehicle Identification using Discrete Spectrums in Wireless Sensor Networks
We studied the possibility of using wireless sensor networks for vehicle identification in a large open field. This is exciting research in that it not only presents a challenge bu...
Seung S. Yang, Yoon G. Kim, Hongsik Choi
135
Voted
ICDCSW
2005
IEEE
15 years 9 months ago
Specifying Information-Flow Controls
The core problem in risk analysis - determining exploitable paths between attackers and system assets is essentially a problem of determining information flow. It is relatively st...
Howard Chivers, Jeremy Jacob