Sciweavers

4923 search results - page 148 / 985
» Software Risk Management
Sort
View
NCA
2007
IEEE
15 years 2 months ago
Safety management of complex technology
One of the key success factors behind the human species is the ability to think, plan and pursue goals. Apart from wisdom and tacit knowledge, experience and awareness of the phys...
Ali G. Hessami
ISCC
2007
IEEE
127views Communications» more  ISCC 2007»
15 years 9 months ago
Head-to-Tail: Managing Network Load through Random Delay Increase
Window-based congestion control is typically based on exhausting bandwidth capacity, which occasionally leads to transient congestion. Moreover, flow synchronization may deteriora...
Stylianos Dimitriou, Vassilis Tsaoussidis
ICSE
1998
IEEE-ACM
15 years 7 months ago
Consistency Management for Complex Applications
Consistency management is an important requirement in many complex applications, but current programming languages and database systems provide inadequate support for it. To addre...
Peri L. Tarr, Lori A. Clarke
SOUPS
2006
ACM
15 years 8 months ago
Decision strategies and susceptibility to phishing
Phishing emails are semantic attacks that con people into divulging sensitive information using techniques to make the user believe that information is being requested by a legiti...
Julie S. Downs, Mandy B. Holbrook, Lorrie Faith Cr...
CORR
2006
Springer
99views Education» more  CORR 2006»
15 years 2 months ago
Statistical mechanics of neocortical interactions: Portfolio of Physiological Indicators
There are several kinds of non-invasive imaging methods that are used to collect data from the brain, e.g., EEG, MEG, PET, SPECT, fMRI, etc. It is difficult to get resolution of i...
Lester Ingber