Sciweavers

2588 search results - page 178 / 518
» Project risk management
Sort
View
118
Voted
HICSS
2007
IEEE
108views Biometrics» more  HICSS 2007»
15 years 9 months ago
Addressing IT Security for Critical Control Systems
— Control systems for critical infrastructures like national power grids make increasingly use of open technologies and protocols, and the Internet. In this environment, the risk...
Martin Naedele
ECBS
2005
IEEE
162views Hardware» more  ECBS 2005»
15 years 9 months ago
Architecture Rationalization: A Methodology for Architecture Verifiability, Traceability and Completeness
Architecture modeling is practiced extensively in the software industry but there is little attention paid to the traceability, verifiability and completeness of architecture desi...
Antony Tang, Jun Han
113
Voted
HICSS
2000
IEEE
99views Biometrics» more  HICSS 2000»
15 years 8 months ago
Selecting a Model Interchange Format: The SPOOL Case Study
The aim of this paper is to provide tool developers with effective strategies to minimize the risks, costs, effort and time involved in handling model interchange issues. Specific...
Guy Saint-Denis, Reinhard Schauer, Rudolf K. Kelle...
131
Voted
AHS
2006
IEEE
188views Hardware» more  AHS 2006»
15 years 7 months ago
Finite State Machine IP Watermarking: A Tutorial
Sharing Intellectual Property (IP) blocks in today's competitive market poses significant high security risks. In this paper, we present a tutorial for a watermarking approach...
Amr T. Abdel-Hamid, Sofiène Tahar, El Mosta...
121
Voted
DSOM
2006
Springer
15 years 7 months ago
Detecting Bottleneck in n-Tier IT Applications Through Analysis
As the complexity of large-scale enterprise applications increases, providing performance verification through staging becomes an important part of reducing business risks associat...
Gueyoung Jung, Galen S. Swint, Jason Parekh, Calto...