Sciweavers

2588 search results - page 211 / 518
» Project risk management
Sort
View
122
Voted
ITRUST
2005
Springer
15 years 9 months ago
Security and Trust in the Italian Legal Digital Signature Framework
Abstract. The early adoption of a national, legal digital signature framework in Italy has brought forth a series of problems and vulnerabilities. In this paper we describe each of...
Stefano Zanero
115
Voted
MLDM
2005
Springer
15 years 9 months ago
A Grouping Method for Categorical Attributes Having Very Large Number of Values
In supervised machine learning, the partitioning of the values (also called grouping) of a categorical attribute aims at constructing a new synthetic attribute which keeps the info...
Marc Boullé
148
Voted
GCC
2004
Springer
15 years 9 months ago
Trust Establishment in Large Scale Grid Settings
Trust establishment is hard in grid architecture by the ad hoc nature. To set up trust in large scale of network is more difficult. In this paper, we propose an automatic key manag...
Bo Zhu, Tieyan Li, Huafei Zhu, Mohan S. Kankanhall...
150
Voted
HICSS
2002
IEEE
123views Biometrics» more  HICSS 2002»
15 years 8 months ago
On the Performance of a Survivability Architecture for Networked Computing Systems
This research focuses on the performance and timing behavior of a two level survivability architecture. The lower level of the architecture involves attack analysis based on kernel...
William S. Harrison, Axel W. Krings, Nadine Hanebu...
127
Voted
ICECCS
2000
IEEE
196views Hardware» more  ICECCS 2000»
15 years 8 months ago
Complexity: Concept, Causes and Control
Complexity arises from many sources – both within and outwith the system. Internal sources include modern hardware, e.g. super-scalar processors, and external sources include th...
John A. McDermid