Sciweavers

2588 search results - page 165 / 518
» Project risk management
Sort
View
140
Voted
COMCOM
2007
100views more  COMCOM 2007»
15 years 3 months ago
Using the vulnerability information of computer systems to improve the network security
In these years, the security problem becomes more important to everyone using computers. However, vulnerabilities on computers are found so frequently that system managers can not...
Yeu-Pong Lai, Po-Lun Hsia
ISF
2006
118views more  ISF 2006»
15 years 3 months ago
Does information security attack frequency increase with vulnerability disclosure? An empirical analysis
Abstract Research in information security, risk management and investment has grown in importance over the last few years. However, without reliable estimates on attack probabiliti...
Ashish Arora, Anand Nandkumar, Rahul Telang
104
Voted
AGILEDC
2003
IEEE
15 years 8 months ago
Observations on Balancing Discipline and Agility
Agile development methodologies promise higher customer satisfaction, lower defect rates, faster development times and a solution to rapidly changing requirements. Plan-driven app...
Barry W. Boehm, Richard Turner
120
Voted
ICSE
2001
IEEE-ACM
15 years 8 months ago
Applying WinWin to Quality Requirements: A Case Study
This paper describes the application of the WinWin paradigm to identify and resolve conflicts in a series of real-client, student-developer digital library projects. The paper is ...
Hoh In, Barry W. Boehm, Thomas Lee Rodgers, Michae...
JCDL
2010
ACM
148views Education» more  JCDL 2010»
15 years 7 months ago
Citing for high impact
The question of citation behavior has always intrigued scientists from various disciplines. While general citation patterns have been widely studied in the literature we develop t...
Xiaolin Shi, Jure Leskovec, Daniel A. McFarland